Onyx Ethernet User Manual For HPE PDF
Onyx Ethernet User Manual For HPE PDF
Onyx Ethernet User Manual For HPE PDF
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard
Enterprise products and services are set forth in the express warranty statements accompanying such products and
services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall
not be liable for technical or editorial errors or omissions contained herein.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise has
no control over and is not responsible for information outside the Hewlett Packard Enterprise website.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use or copying.
Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and
Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.
Mellanox®, Mellanox logo, ConnectX®, Mellanox Spectrum®, MLNX-OS®, SwitchX®, Virtual Protocol
Interconnect®, are registered trademarks of Mellanox Technologies, Ltd. Mellanox Onyx is a trademark of Mellanox
Technologies, Ltd.
2
Table of Contents
1 Intended Audience.........................................................................................................................45
2 Related Documentation.................................................................................................................46
3 Revision History ............................................................................................................................47
4 Glossary ........................................................................................................................................48
5 Feature Overview ..........................................................................................................................51
5.1 System Features ..................................................................................................................... 51
5.2 Ethernet Features.................................................................................................................... 52
6 Getting Started ..............................................................................................................................55
6.1 Configuring the Switch for the First Time ................................................................................ 55
6.1.1 Configuring the Switch with ZTP ........................................................................................ 61
6.1.2 Rerunning the Wizard......................................................................................................... 62
6.2 Starting the Command Line (CLI)............................................................................................ 62
6.3 Starting the Web User Interface (WebUI)................................................................................ 62
6.4 Zero-touch Provisioning .......................................................................................................... 63
6.4.1 Running DHCP-ZTP........................................................................................................... 64
6.4.2 ZTP and OS Upgrade......................................................................................................... 65
6.4.3 DHCPv4 Configuration Example ........................................................................................ 65
6.4.4 DHCPv6 Configuration Example ........................................................................................ 66
6.4.5 ZTP Commands ................................................................................................................. 66
6.5 Licenses .................................................................................................................................. 68
6.5.1 Installing OS License via CLI ............................................................................................. 69
6.5.2 Installing OS License via Web............................................................................................ 69
6.5.3 Autopass License Support ................................................................................................. 71
6.5.4 Retrieving a Lost License Key............................................................................................ 71
6.5.5 License Commands............................................................................................................ 71
6.5.5.1 file eula upload ............................................................................................................. 72
6.5.5.2 file help-docs upload .................................................................................................... 73
6.5.5.3 license delete ............................................................................................................... 73
6.5.5.4 license install ................................................................................................................ 74
6.5.5.5 show licenses ............................................................................................................... 75
7 User Interfaces ..............................................................................................................................76
7.1 Command Line Interface (CLI) ................................................................................................ 76
7.1.1 CLI Modes .......................................................................................................................... 76
7.1.2 Syntax Conventions ........................................................................................................... 77
7.1.3 Getting Help ....................................................................................................................... 78
7.1.4 Prompt and Response Conventions................................................................................... 79
3
7.1.5 Using the “no” Command Form ......................................................................................... 79
7.1.6 Parameter Key ................................................................................................................... 80
7.1.7 CLI Pipeline Operator Commands ..................................................................................... 82
7.1.7.1 CLI Filtration Options “include” and “exclude” .............................................................. 82
7.1.7.2 CLI Monitoring Option “watch” ..................................................................................... 83
7.1.7.3 CLI “json-print” Option .................................................................................................. 84
7.1.7.4 CLI Shortcuts................................................................................................................ 85
7.2 Secure Shell (SSH) ................................................................................................................. 87
7.2.1 Adding a Host and Providing an SSH Key ......................................................................... 87
7.2.2 Retrieving Return Codes When Executing Remote Commands........................................ 87
7.3 Web Interface Overview .......................................................................................................... 88
7.3.1 Changing Default Password .............................................................................................. 88
7.3.2 About Web UI ..................................................................................................................... 89
7.3.3 Setup Menu ........................................................................................................................ 90
7.3.4 System Menu ..................................................................................................................... 92
7.3.5 Security Menu .................................................................................................................... 92
7.3.6 Ports Menu ......................................................................................................................... 93
7.3.7 Status Menu ....................................................................................................................... 93
7.3.8 ETH Mgmt Menu ................................................................................................................ 94
7.3.9 IP Route Menu.................................................................................................................... 95
7.4 UI Commands ......................................................................................................................... 96
7.4.1 CLI Session ........................................................................................................................ 96
7.4.1.1 cli clear-history ............................................................................................................. 97
7.4.1.2 cli default ...................................................................................................................... 97
7.4.1.3 cli max-sessions ........................................................................................................... 99
7.4.1.4 cli session..................................................................................................................... 99
7.4.1.5 terminal....................................................................................................................... 101
7.4.1.6 terminal sysrq enable ................................................................................................. 102
7.4.1.7 show cli....................................................................................................................... 102
7.4.1.8 show cli max-sessions................................................................................................ 103
7.4.1.9 show cli num-sessions ............................................................................................... 104
7.4.2 Banner .............................................................................................................................. 104
7.4.2.1 banner login................................................................................................................ 104
7.4.2.2 banner login-local ....................................................................................................... 105
7.4.2.3 banner login-remote ................................................................................................... 106
7.4.2.4 banner logout ............................................................................................................. 106
7.4.2.5 banner logout-local..................................................................................................... 107
7.4.2.6 banner logout-remote ................................................................................................. 107
4
7.4.2.7 banner motd ............................................................................................................... 108
7.4.2.8 show banner............................................................................................................... 108
7.4.3 SSH .................................................................................................................................. 109
7.4.3.1 ssh server enable ....................................................................................................... 109
7.4.3.2 ssh server host-key .....................................................................................................110
7.4.3.3 ssh server listen .......................................................................................................... 111
7.4.3.4 ssh server login attempts ............................................................................................ 111
7.4.3.5 ssh server login timeout ..............................................................................................112
7.4.3.6 ssh server login record-period.....................................................................................113
7.4.3.7 ssh server min-version ................................................................................................113
7.4.3.8 ssh server ports...........................................................................................................114
7.4.3.9 ssh server security strict..............................................................................................114
7.4.3.10 ssh server security strict..............................................................................................114
7.4.3.11 ssh server x11-forwarding ...........................................................................................115
7.4.3.12 ssh client global...........................................................................................................116
7.4.3.13 ssh client user .............................................................................................................117
7.4.3.14 slogin ...........................................................................................................................118
7.4.3.15 show ssh client ............................................................................................................118
7.4.3.16 show ssh server ..........................................................................................................119
7.4.3.17 show ssh server host-keys ......................................................................................... 120
7.4.3.18 show ssh server login record-period .......................................................................... 121
7.4.4 Remote Login ................................................................................................................... 122
7.4.4.1 telnet........................................................................................................................... 122
7.4.4.2 telnet-server enable.................................................................................................... 122
7.4.4.3 show telnet-server ...................................................................................................... 123
7.4.5 Web Interface ................................................................................................................... 123
7.4.5.1 web auto-logout.......................................................................................................... 123
7.4.5.2 web cache-enable ...................................................................................................... 124
7.4.5.3 web client cert-verify................................................................................................... 124
7.4.5.4 web client ca-list ......................................................................................................... 125
7.4.5.5 web enable ................................................................................................................. 126
7.4.5.6 web http ...................................................................................................................... 126
7.4.5.7 web httpd .................................................................................................................... 127
7.4.5.8 web https .................................................................................................................... 128
7.4.5.9 web https ssl renegotiation enable ............................................................................. 129
7.4.5.10 web https ssl secure-cookie enable ........................................................................... 130
7.4.5.11 web proxy auth authtype ............................................................................................ 130
7.4.5.12 web proxy auth basic.................................................................................................. 131
5
7.4.5.13 web session timeout................................................................................................... 132
7.4.5.14 web session renewal .................................................................................................. 132
7.4.5.15 show web .................................................................................................................. 133
8 System Management ..................................................................................................................135
8.1 Management Interfaces......................................................................................................... 135
8.1.1 Configuring Management Interfaces with Static IP Addresses.........................................135
8.1.2 Configuring IPv6 Address on the Management Interface................................................. 135
8.1.3 Dynamic Host Configuration Protocol (DHCP)................................................................. 136
8.1.4 Default Gateway............................................................................................................... 136
8.1.5 In-Band Management....................................................................................................... 136
8.1.6 Configuring Hostname via DHCP (DHCP Client Option 12) ............................................ 137
8.1.7 Management VRF ........................................................................................................... 138
8.1.8 Management Interface Commands .................................................................................. 139
8.1.8.1 Interface ..................................................................................................................... 140
8.1.8.2 Hostname Resolution ................................................................................................. 156
8.1.8.3 Routing ....................................................................................................................... 160
8.1.8.4 Network to Media Resolution (ARP & NDP)............................................................... 164
8.1.8.5 DHCP ......................................................................................................................... 169
8.1.8.6 General IPv6 .............................................................................................................. 171
8.1.8.7 IP Diagnostic Tools ..................................................................................................... 171
8.2 Chassis Management............................................................................................................ 175
8.2.1 System Health Monitor ..................................................................................................... 175
8.2.1.1 Re-Notification on Errors ............................................................................................ 175
8.2.1.2 System Health Monitor Alerts Scenarios .................................................................... 175
8.2.2 Power Management ......................................................................................................... 177
8.2.2.1 Width Reduction Power Saving.................................................................................. 177
8.2.3 Monitoring Environmental Conditions............................................................................... 178
8.2.4 USB Access...................................................................................................................... 180
8.2.5 Unit Identification LED...................................................................................................... 180
8.2.6 System Reboot................................................................................................................. 181
8.2.7 Viewing Active Events ...................................................................................................... 181
8.2.8 Chassis Management Commands ................................................................................... 182
8.2.9 Chassis Management Commands ................................................................................... 183
8.2.9.1 Chassis Management................................................................................................. 183
8.3 Management Source IP Address........................................................................................... 207
8.3.1 ntp source-interface.......................................................................................................... 207
8.3.2 Commands ....................................................................................................................... 208
8.3.2.1 ssh server listen ......................................................................................................... 208
6
8.3.2.2 ssh client global source-interface .............................................................................. 208
8.3.2.3 ip ftp source-interface ................................................................................................ 209
8.3.2.4 ip tftp source-interface ............................................................................................... 210
8.3.2.5 ip scp source-interface .............................................................................................. 210
8.3.2.6 ip sftp source-interface ...............................................................................................211
8.3.2.7 ip traceroute source-interface .................................................................................... 212
8.3.2.8 logging source-interface ............................................................................................. 212
8.3.2.9 tacacs-server source-interface .................................................................................. 213
8.3.2.10 ip icmp source-interface ............................................................................................ 214
8.3.2.11 ntp source-interface ................................................................................................... 214
8.3.2.12 snmp-server source-interface..................................................................................... 215
8.3.2.13 show ip ftp source-interface ...................................................................................... 216
8.3.2.14 show ip tftp source-interface ..................................................................................... 217
8.3.2.15 show ntp source-interface ......................................................................................... 217
8.3.2.16 show logging source-interface ................................................................................... 218
8.3.2.17 show tacacs source-interface .................................................................................... 219
8.3.2.18 show ip icmp source-interface ................................................................................... 220
8.3.2.19 show ip traceroute source-interface .......................................................................... 221
8.3.2.20 show ssh client source-interface ............................................................................... 222
8.3.2.21 show ip scp source-interface ..................................................................................... 223
8.3.2.22 show ip sftp source-interface ..................................................................................... 224
8.3.2.23 show snmp source-interface ...................................................................................... 225
8.4 Upgrade/Downgrade Process ............................................................................................... 226
8.4.1 Important Pre-OS Upgrade Notes .................................................................................... 226
8.4.2 Upgrading Operating System Software............................................................................ 227
8.4.3 Upgrading HA Groups ...................................................................................................... 230
8.4.4 Upgrading MLAG-STP Setup ........................................................................................... 231
8.4.5 Deleting Unused Images .................................................................................................. 231
8.4.6 Downgrading OS Software............................................................................................... 232
8.4.6.1 Downloading Image.................................................................................................... 233
8.4.6.2 Downgrading Image ................................................................................................... 233
8.4.6.3 Switching to Partition with Older Software Version .................................................... 235
8.4.7 Upgrading System Firmware............................................................................................ 235
8.4.7.1 After Updating Software ............................................................................................. 235
8.4.7.2 Importing Firmware and Changing the Default Firmware .......................................... 236
8.4.8 Software Management Commands.................................................................................. 236
8.4.8.1 image boot.................................................................................................................. 237
8.4.8.2 boot next..................................................................................................................... 237
7
8.4.8.3 boot system ................................................................................................................ 238
8.4.8.4 image default-chip-fw ................................................................................................. 239
8.4.8.5 image delete............................................................................................................... 239
8.4.8.6 image fetch................................................................................................................. 240
8.4.8.7 image install ............................................................................................................... 241
8.4.8.8 image move................................................................................................................ 242
8.4.8.9 image options ............................................................................................................. 243
8.4.8.10 show bootvar .............................................................................................................. 244
8.4.8.11 show images .............................................................................................................. 245
8.5 Configuration Management ................................................................................................... 246
8.5.1 Saving a Configuration File .............................................................................................. 246
8.5.2 Loading a Configuration File ............................................................................................ 246
8.5.3 Managing Configuration Files........................................................................................... 246
8.5.3.1 BIN Configuration Files .............................................................................................. 247
8.5.3.2 Text Configuration Files.............................................................................................. 247
8.5.4 Automated Periodic Configuration File Backup................................................................ 248
8.5.4.1 Automated Backup ..................................................................................................... 248
8.5.4.2 Automated Periodic Backup ....................................................................................... 249
8.5.5 Configuration Management Commands........................................................................... 249
8.5.5.1 File System................................................................................................................. 250
8.5.5.2 Configuration Files ..................................................................................................... 260
8.6 Virtual Machine...................................................................................................................... 278
8.6.1 Configuring Virtual Machine ............................................................................................. 278
8.6.2 Virtual Machine Commands ............................................................................................. 280
8.6.2.1 virtual-machine enable ............................................................................................... 280
8.6.2.2 virtual-machine host ................................................................................................... 281
8.6.2.3 arch ............................................................................................................................ 282
8.6.2.4 comment..................................................................................................................... 282
8.6.2.5 console ....................................................................................................................... 283
8.6.2.6 install .......................................................................................................................... 284
8.6.2.7 install-from-usb........................................................................................................... 285
8.6.2.8 interface...................................................................................................................... 286
8.6.2.9 memory ...................................................................................................................... 287
8.6.2.10 power.......................................................................................................................... 287
8.6.2.11 storage create ............................................................................................................ 288
8.6.2.12 storage device ............................................................................................................ 289
8.6.2.13 vcpus .......................................................................................................................... 290
8.6.2.14 virtual-machine volume fetch url................................................................................. 291
8
8.6.2.15 virt volume file ............................................................................................................ 292
8.6.2.16 show virtual-machine configured................................................................................ 292
8.6.2.17 show virtual-machine host.......................................................................................... 293
8.6.2.18 show virtual-machine host configured ........................................................................ 294
8.6.2.19 show virtual-machine host detail ................................................................................ 296
8.6.2.20 show virtual-machine install ....................................................................................... 298
8.6.2.21 show virtual-machine interface................................................................................... 298
8.6.2.22 show virtual-machine storage..................................................................................... 299
8.7 Resource Scale ..................................................................................................................... 300
8.7.1 Resource Scale Commands............................................................................................. 300
8.7.1.1 show system resource table....................................................................................... 300
9 System Synchronization..............................................................................................................302
9.1 NTP and Clock ...................................................................................................................... 302
9.1.1 NTP Authenticate ............................................................................................................. 302
9.1.2 NTP Authentication Key ................................................................................................... 302
9.1.3 NTP Commands ............................................................................................................... 302
9.1.3.1 clock set ..................................................................................................................... 303
9.1.3.2 clock timezone............................................................................................................ 304
9.1.3.3 ntp ............................................................................................................................. 304
9.1.3.4 ntpdate ....................................................................................................................... 305
9.1.3.5 ntp authenticate.......................................................................................................... 306
9.1.3.6 ntp authentication-key ................................................................................................ 307
9.1.3.7 ntp peer disable.......................................................................................................... 307
9.1.3.8 ntp peer keyID ............................................................................................................ 308
9.1.3.9 ntp peer version.......................................................................................................... 309
9.1.3.10 ntp server disable ....................................................................................................... 310
9.1.3.11 ntp server keyID ......................................................................................................... 310
9.1.3.12 ntp server-role disable.................................................................................................311
9.1.3.13 ntp server trusted-enable ........................................................................................... 312
9.1.3.14 ntp server version....................................................................................................... 312
9.1.3.15 ntp trusted-key............................................................................................................ 313
9.1.3.16 show clock.................................................................................................................. 314
9.1.3.17 show ntp .................................................................................................................... 314
9.1.3.18 show ntp configured ................................................................................................... 316
9.1.3.19 show ntp keys............................................................................................................. 318
9.2 Precision Time Protocol (PTP) .............................................................................................. 318
9.2.1 PTP Principles .................................................................................................................. 319
9.2.2 Clock Types and Operation Modes .................................................................................. 320
9
9.2.3 PTP Domains ................................................................................................................... 321
9.2.3.1 Boundary Clock .......................................................................................................... 321
9.2.3.2 Configuring PTP ......................................................................................................... 322
9.2.4 Securing PTP Infrastructure ............................................................................................. 324
9.2.5 PTP Commands ............................................................................................................... 326
9.2.5.1 protocol ptp................................................................................................................. 326
9.2.5.2 ptp amt ....................................................................................................................... 327
9.2.5.3 ptp announce interval ................................................................................................. 328
9.2.5.4 ptp announce timeout................................................................................................. 328
9.2.5.5 ptp delay-req interval.................................................................................................. 329
9.2.5.6 ptp domain.................................................................................................................. 330
9.2.5.7 ptp enable................................................................................................................... 331
9.2.5.8 ptp enable forced-master ........................................................................................... 331
9.2.5.9 ptp enable ipv6 ........................................................................................................... 332
9.2.5.10 ptp mean-path-delay .................................................................................................. 333
9.2.5.11 ptp message-format ................................................................................................... 335
9.2.5.12 ptp offset-from-master ................................................................................................ 335
9.2.5.13 ptp priority................................................................................................................... 338
9.2.5.14 ptp sync interval ......................................................................................................... 338
9.2.5.15 ptp tll .......................................................................................................................... 339
9.2.5.16 clear ptp amt log......................................................................................................... 340
9.2.5.17 clear ptp forced-master log......................................................................................... 340
9.2.5.18 clear ptp interface counters ........................................................................................ 341
9.2.5.19 clear ptp vrf counters.................................................................................................. 342
9.2.5.20 ptp vrf enable.............................................................................................................. 342
9.2.5.21 show ptp ..................................................................................................................... 343
9.2.5.22 show ptp vrf ................................................................................................................ 344
9.2.5.23 show ptp vrf counters ................................................................................................. 346
9.2.5.24 show ptp amt .............................................................................................................. 348
9.2.5.25 show ptp interface port-channel ................................................................................. 348
9.2.5.26 show ptp interface port-channel counters .................................................................. 350
9.2.5.27 show ptp amt log ........................................................................................................ 352
9.2.5.28 show ptp clock............................................................................................................ 352
9.2.5.29 show ptp clock parent................................................................................................. 353
9.2.5.30 show ptp forced-master.............................................................................................. 354
9.2.5.31 show ptp ..................................................................................................................... 355
9.2.5.32 show ptp clock foreign-masters.................................................................................. 356
9.2.5.33 show ptp interface ethernet counters ......................................................................... 356
10
9.2.5.34 show ptp interface ...................................................................................................... 357
9.2.5.35 show ptp interface ethernet ........................................................................................ 359
9.2.5.36 show ptp interface vlan............................................................................................... 359
9.2.5.37 show ptp interface vlan ethernet ................................................................................ 360
9.2.5.38 show ptp interface vlan counters................................................................................ 361
9.2.5.39 show ptp interface vlan ethernet counters.................................................................. 362
9.2.5.40 show ptp time-property............................................................................................... 363
9.2.5.41 show ptp status .......................................................................................................... 364
9.2.5.42 PTP Debuggability Logging Examples ...................................................................... 366
9.3 Replace CRC with Timestamp .............................................................................................. 369
9.3.1 Main Functionality ............................................................................................................ 369
9.3.2 Setup Configuration.......................................................................................................... 370
9.3.3 Replace CRC with Timestamp Commands ...................................................................... 371
9.3.3.1 fcs ingress disable-check ........................................................................................... 372
9.3.3.2 fcs egress disable-recalculate .................................................................................... 372
9.3.3.3 system timestamp disable .......................................................................................... 373
10 Network Management Interfaces ................................................................................................375
10.1 SNMP .................................................................................................................................... 375
10.1.1 Standard MIBs.................................................................................................................. 375
10.1.2 Private MIBs ..................................................................................................................... 376
10.1.3 Proprietary Traps.............................................................................................................. 377
10.1.4 Configuring SNMP............................................................................................................ 378
10.1.5 Resetting SNMPv3 Engine ID .......................................................................................... 378
10.1.6 Configuring an SNMPv3 User .......................................................................................... 379
10.1.7 Configuring SNMP Notifications (Traps or Informs) ......................................................... 379
10.1.8 SNMP SET Operations..................................................................................................... 381
10.1.8.1 Enabling SNMP SET .................................................................................................. 381
10.1.8.2 Sending a Test Trap SET Request ............................................................................. 383
10.1.8.3 Setting Hostname with SNMP .................................................................................... 384
10.1.8.4 Power Cycle with SNMP ............................................................................................ 384
10.1.8.5 Changing Configuration with SNMP........................................................................... 384
10.1.8.6 Upgrading OS Software with SNMP........................................................................... 385
10.1.8.7 IF-MIB and Interface Information................................................................................ 385
10.2 JSON API .............................................................................................................................. 385
10.2.1 Authentication .................................................................................................................. 385
10.2.1.1 Authentication Example ............................................................................................. 386
10.2.1.2 Changing Initial Password Through JSON API ......................................................... 387
10.2.1.3 JSON API Logout ...................................................................................................... 388
11
10.2.2 Sending the Request........................................................................................................ 389
10.2.3 JSON Request Format ..................................................................................................... 389
10.2.3.1 JSON Execution Requests......................................................................................... 389
10.2.3.2 JSON Query Requests............................................................................................... 391
10.2.4 JSON Response Format .................................................................................................. 391
10.2.4.1 Single Command Response Format .......................................................................... 391
10.2.4.2 Multiple Command Response Format........................................................................ 392
10.2.4.3 Query Response Format ............................................................................................ 393
10.2.4.4 Asynchronous Response Format ............................................................................... 393
10.2.5 Supported Commands ..................................................................................................... 394
10.2.6 JSON Examples ............................................................................................................... 394
10.2.6.1 Synchronous Execution Request Example ................................................................ 394
10.2.6.2 Asynchronous Execution Request Example .............................................................. 395
10.2.6.3 Query Request Example ............................................................................................ 396
10.2.6.4 Error Response Example ........................................................................................... 397
10.2.7 JSON Request Using WebUI ........................................................................................... 399
10.2.7.1 To Execute a JSON Request...................................................................................... 399
10.2.7.2 To Query an Asynchronous JSON Request ............................................................... 400
10.3 Network Management Interface Commands......................................................................... 401
10.3.1 SNMP ............................................................................................................................... 402
10.3.1.1 snmp-server auto-refresh ........................................................................................... 402
10.3.1.2 snmp-server cache enable ......................................................................................... 403
10.3.1.3 snmp-server community ............................................................................................. 403
10.3.1.4 snmp-server contact................................................................................................... 404
10.3.1.5 snmp-server enable ................................................................................................... 404
10.3.1.6 snmp-server engineID reset ....................................................................................... 405
10.3.1.7 snmp-server enable mult-communities ...................................................................... 406
10.3.1.8 snmp-server enable notify .......................................................................................... 406
10.3.1.9 snmp-server enable set-permission ........................................................................... 407
10.3.1.10 snmp-server host disable ........................................................................................... 407
10.3.1.11 snmp-server host informs ......................................................................................... 408
10.3.1.12 snmp-server host traps .............................................................................................. 410
10.3.1.13 snmp-server listen ...................................................................................................... 412
10.3.1.14 snmp-server notify...................................................................................................... 413
10.3.1.15 snmp-server port ........................................................................................................ 414
10.3.1.16 snmp-server user ....................................................................................................... 414
10.3.1.17 show snmp ................................................................................................................ 416
10.3.1.18 show snmp auto-refresh............................................................................................. 418
12
10.3.1.19 show snmp engineID.................................................................................................. 418
10.3.1.20 show snmp set-permission......................................................................................... 419
10.3.1.21 show snmp user ......................................................................................................... 420
10.3.2 JSON API ......................................................................................................................... 421
10.3.2.1 json-gw enable ........................................................................................................... 421
10.3.2.2 json-gw synchronous-request-timeout ....................................................................... 421
10.3.2.3 show json-gw.............................................................................................................. 422
11 Virtualization ................................................................................................................................423
11.1 Limiting the Container’s Resources ...................................................................................... 423
11.1.1 Memory Resources Allocation Protocol............................................................................ 423
11.1.2 CPU Resource Allocation Protocol................................................................................... 423
11.2 Upgrade Ramifications .......................................................................................................... 424
11.2.1 Changing Docker Storage Driver ..................................................................................... 424
11.3 Docker Containers Commands ............................................................................................. 425
11.3.1 docker .............................................................................................................................. 425
11.3.2 docker login ...................................................................................................................... 426
11.3.3 docker logout.................................................................................................................... 426
11.3.4 commit .............................................................................................................................. 427
11.3.5 copy-sdk ........................................................................................................................... 428
11.3.6 remove image................................................................................................................... 428
11.3.7 exec .................................................................................................................................. 429
11.3.8 label .................................................................................................................................. 430
11.3.9 load................................................................................................................................... 430
11.3.10 pull .................................................................................................................................... 431
11.3.11 save .................................................................................................................................. 432
11.3.12 shutdown .......................................................................................................................... 432
11.3.13 start .................................................................................................................................. 433
11.3.14 image upload ................................................................................................................... 435
11.3.15 file image upload ............................................................................................................. 436
11.3.16 show docker ..................................................................................................................... 437
11.3.17 show docker containers.................................................................................................... 437
11.3.18 show docker images......................................................................................................... 439
11.3.19 show docker ps ................................................................................................................ 439
11.3.20 show docker labels........................................................................................................... 440
11.3.21 show docker login............................................................................................................. 441
11.3.22 show docker stats............................................................................................................. 441
12 Telemetry, Monitoring, and Debuggability ...................................................................................443
12.1 What Just Happened............................................................................................................. 443
13
12.1.1 Configure What Just Happened (WJH) Using CLI ........................................................... 443
12.1.1.1 WJH Commands ........................................................................................................ 445
12.1.1.2 Configure WJH Events ............................................................................................... 460
12.1.2 Configure WJH Using NEO .............................................................................................. 461
12.1.3 WJH Streaming and Integration with Telegraf, InfluxDB and Grafana (TIG) Stack ..........461
12.2 Logging.................................................................................................................................. 461
12.2.1 Monitor ............................................................................................................................. 461
12.2.2 Remote Logging ............................................................................................................... 461
12.2.3 Logging Protocol .............................................................................................................. 462
12.2.4 Logging Commands ......................................................................................................... 462
12.2.4.1 logging ........................................................................................................................ 462
12.2.4.2 logging port................................................................................................................. 463
12.2.4.3 logging trap................................................................................................................. 464
12.2.4.4 logging debug-files ..................................................................................................... 465
12.2.4.5 logging events enable ................................................................................................ 467
12.2.4.6 logging events error-threshold.................................................................................... 468
12.2.4.7 logging events interval................................................................................................ 469
12.2.4.8 logging events rate-limit ............................................................................................. 470
12.2.4.9 logging fields .............................................................................................................. 472
12.2.4.10 logging files delete...................................................................................................... 472
12.2.4.11 logging files rotation ................................................................................................... 473
12.2.4.12 logging files upload..................................................................................................... 474
12.2.4.13 logging filter include.................................................................................................... 475
12.2.4.14 logging filter exclude................................................................................................... 476
12.2.4.15 no logging filter ........................................................................................................... 476
12.2.4.16 logging format............................................................................................................. 477
12.2.4.17 logging level ............................................................................................................... 478
12.2.4.18 logging local override ................................................................................................. 479
12.2.4.19 logging monitor........................................................................................................... 480
12.2.4.20 logging protocol .......................................................................................................... 481
12.2.4.21 logging receive ........................................................................................................... 481
12.2.4.22 logging mac masking.................................................................................................. 482
12.2.4.23 show log ..................................................................................................................... 483
12.2.4.24 show logging .............................................................................................................. 484
12.2.4.25 show logging events................................................................................................... 486
12.2.4.26 show logging events source-counters ........................................................................ 488
12.2.4.27 show logging port ....................................................................................................... 489
12.3 Debugging ............................................................................................................................. 489
14
12.3.1 Debugging Commands..................................................................................................... 490
12.3.1.1 debug ethernet all....................................................................................................... 490
12.3.1.2 debug ethernet dcbx................................................................................................... 490
12.3.1.3 debug ethernet ip igmp-snooping .............................................................................. 491
12.3.1.4 debug ethernet ip interface......................................................................................... 493
12.3.1.5 debug ethernet lacp.................................................................................................... 495
12.3.1.6 debug ethernet lldp..................................................................................................... 496
12.3.1.7 debug ethernet port .................................................................................................... 497
12.3.1.8 debug ethernet qos .................................................................................................... 498
12.3.1.9 debug ethernet spanning-tree .................................................................................... 499
12.3.1.10 debug ethernet vlan.................................................................................................... 500
12.3.1.11 show debug ethernet.................................................................................................. 501
12.3.1.12 show log debug .......................................................................................................... 502
12.4 Link Diagnostic Per Port........................................................................................................ 504
12.4.1 Link Diagnostic Commands.............................................................................................. 504
12.4.1.1 show interfaces ethernet link-diagnostics................................................................... 504
12.5 Signal Degradation Monitoring .............................................................................................. 505
12.5.1 Effective-BER Monitoring ................................................................................................. 506
12.5.2 Configuring Signal Degradation Monitoring...................................................................... 506
12.5.3 Signal Degradation Monitoring Commands...................................................................... 506
12.5.3.1 signal-degrade............................................................................................................ 507
12.5.3.2 show interfaces ethernet signal-degrade ................................................................... 507
12.6 Event Notifications................................................................................................................. 508
12.6.1 Supported Event Notifications and MIB Mapping............................................................. 508
12.6.2 Terminal Notifications ....................................................................................................... 513
12.6.3 Email Notifications............................................................................................................ 513
12.6.4 Command Event Notifications .......................................................................................... 514
12.6.4.1 email autosupport enable ........................................................................................... 514
12.6.4.2 email autosupport event ............................................................................................. 515
12.6.4.3 email autosupport ssl mode ....................................................................................... 516
12.6.4.4 email autosupport ssl cert-verify................................................................................. 517
12.6.4.5 email autosupport ssl ca-list ....................................................................................... 517
12.6.4.6 email dead-letter......................................................................................................... 518
12.6.4.7 email domain .............................................................................................................. 519
12.6.4.8 email mailhub ............................................................................................................. 519
12.6.4.9 email autosupport mailhub ......................................................................................... 520
12.6.4.10 email autosupport recipient ....................................................................................... 520
12.6.4.11 email mailhub-port...................................................................................................... 521
15
12.6.4.12 email notify event ....................................................................................................... 522
12.6.4.13 email notify recipient................................................................................................... 524
12.6.4.14 email return-addr ........................................................................................................ 525
12.6.4.15 email return-host ........................................................................................................ 525
12.6.4.16 email send-test ........................................................................................................... 526
12.6.4.17 email ssl mode ........................................................................................................... 526
12.6.4.18 email ssl cert-verify..................................................................................................... 527
12.6.4.19 email ssl ca-list ........................................................................................................... 528
12.6.4.20 show email ................................................................................................................. 528
12.6.4.21 show email events...................................................................................................... 529
12.7 Port Mirroring......................................................................................................................... 532
12.7.1 Mirroring Sessions............................................................................................................ 532
12.7.1.1 Source Interface ......................................................................................................... 533
12.7.1.2 Destination Interface .................................................................................................. 534
12.7.1.3 Header Format ........................................................................................................... 534
12.7.1.4 Congestion Control..................................................................................................... 535
12.7.1.5 Truncation................................................................................................................... 535
12.7.2 Configuring Mirroring Sessions ........................................................................................ 536
12.7.3 Verifying Mirroring Sessions............................................................................................. 537
12.7.4 Port Mirroring Commands ................................................................................................ 538
12.7.4.1 monitor session .......................................................................................................... 538
12.7.4.2 destination interface ................................................................................................... 534
12.7.4.3 shutdown .................................................................................................................... 539
12.7.4.4 add source interface direction .................................................................................... 540
12.7.4.5 header-format............................................................................................................. 541
12.7.4.6 truncate ...................................................................................................................... 542
12.7.4.7 congestion .................................................................................................................. 543
12.7.4.8 show monitor session................................................................................................. 543
12.7.4.9 show monitor session summary ................................................................................. 544
12.8 sFlow ..................................................................................................................................... 545
12.8.1 Flow Samples................................................................................................................... 545
12.8.2 Statistical Samples ........................................................................................................... 545
12.8.3 sFlow Datagrams ............................................................................................................. 546
12.8.4 Sampled Interfaces .......................................................................................................... 546
12.8.5 Configuring sFlow............................................................................................................. 546
12.8.6 Verifying sFlow ................................................................................................................. 547
12.8.7 sFlow Commands............................................................................................................. 548
12.8.7.1 protocol sflow ............................................................................................................. 548
16
12.8.7.2 sflow enable (global) .................................................................................................. 549
12.8.7.3 sflow ........................................................................................................................... 549
12.8.7.4 sampling-rate.............................................................................................................. 550
12.8.7.5 max-sample-size ........................................................................................................ 550
12.8.7.6 counter-poll-interval.................................................................................................... 551
12.8.7.7 max-datagram-size..................................................................................................... 551
12.8.7.8 collector-ip .................................................................................................................. 552
12.8.7.9 agent-ip ...................................................................................................................... 552
12.8.7.10 clear counters............................................................................................................. 553
12.8.7.11 sflow enable (interface) .............................................................................................. 553
12.8.7.12 show sflow ................................................................................................................. 554
12.9 Buffer Histograms Monitoring................................................................................................ 555
12.9.1 Buffer Histograms and Thresholds Commands ............................................................... 556
12.9.1.1 protocol telemetry....................................................................................................... 556
12.9.1.2 telemetry shutdown ................................................................................................... 556
12.9.1.3 telemetry sampling log ............................................................................................... 557
12.9.1.4 telemetry sampling tc ................................................................................................. 557
12.9.1.5 telemetry threshold..................................................................................................... 558
12.9.1.6 telemetry threshold level ............................................................................................ 559
12.9.1.7 telemetry threshold log ............................................................................................... 559
12.9.1.8 telemetry threshold syslog.......................................................................................... 560
12.9.1.9 clear telemetry............................................................................................................ 561
12.9.1.10 clear telemetry threshold ............................................................................................ 561
12.9.1.11 stats export csv telemetry........................................................................................... 562
12.9.1.12 file stats telemetry delete............................................................................................ 563
12.9.1.13 file stats telemetry delete latest .................................................................................. 563
12.9.1.14 file stats telemetry delete all ....................................................................................... 564
12.9.1.15 file stats telemetry upload .......................................................................................... 564
12.9.1.16 file stats telemetry upload latest ................................................................................. 565
12.9.1.17 file stats telemetry upload all ...................................................................................... 566
12.9.1.18 show telemetry ........................................................................................................... 566
12.9.1.19 show telemetry sampling tc mcast ............................................................................. 567
12.9.1.20 show telemetry sampling tc mcast last....................................................................... 569
12.9.1.21 show telemetry sampling tc ucast .............................................................................. 570
12.9.1.22 show telemetry sampling tc ucast last........................................................................ 571
12.9.1.23 show telemetry threshold ........................................................................................... 572
12.9.1.24 show files stats telemetry ........................................................................................... 573
12.10 Statistics and Alarms ............................................................................................................. 574
17
12.10.1 Commands ....................................................................................................................... 574
12.10.1.1 stats alarm clear ......................................................................................................... 574
12.10.1.2 stats alarm enable ...................................................................................................... 575
12.10.1.3 stats alarm event-repeat............................................................................................. 576
12.10.1.4 stats alarm {rising | falling} ......................................................................................... 577
12.10.1.5 stats alarm rate-limit ................................................................................................... 578
12.10.1.6 stats chd clear ............................................................................................................ 579
12.10.1.7 stats chd enable ......................................................................................................... 580
12.10.1.8 stats chd compute time .............................................................................................. 581
12.10.1.9 stats export................................................................................................................. 582
12.10.1.10 stats sample clear ...................................................................................................... 583
12.10.1.11 stats sample enable ................................................................................................... 584
12.10.1.12 stats sample interval................................................................................................... 585
12.10.1.13 stats sample max-entries ........................................................................................... 586
12.10.1.14 stats clear-all .............................................................................................................. 587
12.10.1.15 show stats alarm ........................................................................................................ 587
12.10.1.16 show stats chd............................................................................................................ 588
12.10.1.17 show stats cpu............................................................................................................ 589
12.10.1.18 show stats sample...................................................................................................... 590
12.10.1.19 show stats sample data.............................................................................................. 591
12.11 Management Information Bases (MIBs)................................................................................ 593
12.11.1 Calculating of entPhysicalIndex in the Entity MIB ............................................................ 593
12.11.2 Examples.......................................................................................................................... 595
13 Automation Tools .........................................................................................................................596
13.1 Ansible................................................................................................................................... 596
13.1.1 Installing and Configuring Ansible on CentOS 7 .............................................................. 596
13.1.2 Creating Ansible Playbook ............................................................................................... 597
13.2 SALT...................................................................................................................................... 598
13.2.1 Installing SaltStack on CentOS 7 ..................................................................................... 598
13.2.2 Configuring Salt................................................................................................................ 599
13.2.3 Configuring the Salt-minion File ....................................................................................... 599
13.2.4 Configuring the Proxy....................................................................................................... 599
13.2.5 Creating the pillar Directory.............................................................................................. 600
13.2.6 Running Onyx Salt Commands on the Server ................................................................. 601
13.3 Puppet Agent......................................................................................................................... 601
13.3.1 Setting the Puppet Server ................................................................................................ 601
13.3.2 Accepting the Switch Request.......................................................................................... 602
13.3.2.1 Using CLI Commands ................................................................................................ 602
18
13.3.2.2 Accepting Certificate Requests in Puppet Server Console ........................................ 602
13.3.3 Installing Modules on the Puppet Server.......................................................................... 603
13.3.4 Writing Configuration Classes .......................................................................................... 603
13.3.5 Supported Configuration Capabilities............................................................................... 605
13.3.5.1 Interface Capabilities................................................................................................. 605
13.3.6 Supported Resources for Each Type ............................................................................... 605
13.3.7 Troubleshooting................................................................................................................ 605
13.3.7.1 Switch and Server Clocks are not Synchronized ....................................................... 605
13.3.7.2 Outdated or Invalid SSL Certificates Either on the Switch or the Server ................... 605
13.3.7.3 Communications Issue ............................................................................................... 605
13.3.8 Puppet Agent Commands ................................................................................................ 605
13.3.8.1 puppet-agent .............................................................................................................. 605
13.3.8.2 puppet-agent enable ................................................................................................. 606
13.3.8.3 master-hostname ....................................................................................................... 607
13.3.8.4 enable......................................................................................................................... 607
13.3.8.5 run-interval ................................................................................................................. 608
13.3.8.6 restart ......................................................................................................................... 608
13.3.8.7 show puppet-agent .................................................................................................... 609
13.3.8.8 show puppet-agent log ............................................................................................... 609
13.4 Scheduled Jobs......................................................................................................................611
13.4.1 Commands ....................................................................................................................... 612
13.4.1.1 job............................................................................................................................... 612
13.4.1.2 command.................................................................................................................... 612
13.4.1.3 comment..................................................................................................................... 613
13.4.1.4 enable......................................................................................................................... 614
13.4.1.5 execute ....................................................................................................................... 614
13.4.1.6 fail-continue ................................................................................................................ 615
13.4.1.7 name .......................................................................................................................... 615
13.4.1.8 schedule type ............................................................................................................. 616
13.4.1.9 schedule <recurrence type>....................................................................................... 617
13.4.1.10 show jobs ................................................................................................................... 618
14 User Management, Authentication, & Security............................................................................619
14.1 User Management & Security ............................................................................................... 619
14.1.1 User Accounts .................................................................................................................. 619
14.1.2 Authentication, Authorization, and Accounting (AAA) ...................................................... 619
14.1.3 User Re-authentication..................................................................................................... 620
14.1.4 RADIUS ............................................................................................................................ 620
14.1.5 TACACS+ ......................................................................................................................... 620
19
14.1.6 LDAP ............................................................................................................................... 620
14.1.7 System Secure Mode ....................................................................................................... 621
14.1.8 User Management and Security Commands ................................................................... 623
14.1.8.1 User Accounts ............................................................................................................ 624
14.1.8.2 AAA Methods.............................................................................................................. 631
14.1.8.3 RADIUS ...................................................................................................................... 642
14.1.8.4 TACACS+ ................................................................................................................... 646
14.1.8.5 LDAP .......................................................................................................................... 650
14.1.8.6 System Secure Mode ................................................................................................. 662
14.1.9 802.1x Protocol ................................................................................................................ 664
14.1.9.1 802.1x Operating Modes ............................................................................................ 664
14.1.9.2 Configuring 802.1x ..................................................................................................... 664
14.1.9.3 Dot1x Commands....................................................................................................... 666
14.2 Cryptographic (X.509, IPSec) and Encryption....................................................................... 677
14.2.1 System File Encryption..................................................................................................... 677
14.2.2 Cryptographic and Encryption Commands....................................................................... 678
14.2.2.1 crypto encrypt-data..................................................................................................... 678
14.2.2.2 crypto ipsec ike........................................................................................................... 679
14.2.2.3 crypto ipsec peer local................................................................................................ 680
14.2.2.4 crypto certificate ca-list............................................................................................... 681
14.2.2.5 crypto certificate default-cert ...................................................................................... 682
14.2.2.6 crypto certificate generation ....................................................................................... 683
14.2.2.7 crypto certificate name ............................................................................................... 685
14.2.2.8 crypto certificate system-self-signed .......................................................................... 687
14.2.2.9 show crypto certificate................................................................................................ 688
14.2.2.10 show crypto encrypt-data ........................................................................................... 689
14.2.2.11 show crypto ipsec....................................................................................................... 690
15 Quality of Service (QoS)..............................................................................................................692
15.1 QoS Classification ................................................................................................................. 692
15.1.1 Trust Levels ...................................................................................................................... 692
15.1.2 Switch Priority to IEEE Priority Mapping .......................................................................... 692
15.1.3 Default QoS Configuration ............................................................................................... 693
15.1.4 Control Protocols ............................................................................................................. 694
15.2 QoS Rewrite .......................................................................................................................... 694
15.2.1 Switch-priority to PCP,DEI Re-marking Mapping ............................................................. 695
15.2.2 Switch-priority to DSCP Re-marking Mapping ................................................................. 695
15.2.3 DSCP to Switch-priority in Router .................................................................................... 695
15.2.4 Default Configuration........................................................................................................ 695
20
15.3 Queuing and Scheduling (ETS) ............................................................................................ 695
15.3.1 Traffic Class...................................................................................................................... 696
15.3.2 Traffic Shapers ................................................................................................................. 696
15.3.2.1 Maximum Shapers ..................................................................................................... 696
15.3.2.2 Minimum Shapers ...................................................................................................... 696
15.3.3 Default Shaper Configuration ........................................................................................... 696
15.4 RED and ECN ....................................................................................................................... 697
15.5 QoS Commands.................................................................................................................... 697
15.6 QoS Commands.................................................................................................................... 698
15.6.1 QoS Classification ............................................................................................................ 698
15.6.1.1 vlan default priority ..................................................................................................... 698
15.6.1.2 vlan default dei ........................................................................................................... 699
15.6.1.3 qos trust...................................................................................................................... 700
15.6.1.4 qos default switch-priority........................................................................................... 700
15.6.1.5 qos map pcp dei ......................................................................................................... 701
15.6.1.6 qos map dscp ............................................................................................................. 702
15.6.1.7 show interfaces ethernet counters pfc prio................................................................. 703
15.6.1.8 show qos .................................................................................................................... 704
15.6.1.9 show qos interface ethernet ....................................................................................... 705
15.6.1.10 show qos interface mlag-port-channel ....................................................................... 707
15.6.1.11 show qos interface port-channel ................................................................................ 709
15.6.1.12 show qos interface l2-mapping....................................................................................711
15.6.1.13 show qos interface l3-mapping................................................................................... 712
15.6.1.14 show qos interface rewrite-mapping........................................................................... 713
15.6.1.15 show qos interface tc-mapping................................................................................... 714
15.6.1.16 show qos mapping ingress interface egress interface ............................................... 715
15.6.2 QoS Rewrite ..................................................................................................................... 717
15.6.2.1 qos rewrite pcp ........................................................................................................... 717
15.6.2.2 qos rewrite dscp ......................................................................................................... 717
15.6.2.3 qos rewrite map switch-priority pcp dei ...................................................................... 718
15.6.2.4 qos rewrite map switch-priority dscp .......................................................................... 719
15.6.2.5 qos ip rewrite pcp ....................................................................................................... 720
15.6.2.6 show qos ip rewrite..................................................................................................... 720
15.6.3 Queuing and Scheduling (ETS)........................................................................................ 721
15.6.3.1 bind switch-priority...................................................................................................... 721
15.6.3.2 bandwidth guaranteed................................................................................................ 722
15.6.3.3 bandwidth shape ....................................................................................................... 723
15.6.3.4 show dcb ets .............................................................................................................. 723
21
15.6.4 RED & ECN ...................................................................................................................... 725
15.6.4.1 traffic-class congestion-control................................................................................... 725
15.6.4.2 show interfaces ethernet congestion-control.............................................................. 726
15.7 Priority Flow Control (PFC) ................................................................................................... 727
15.7.1 Flow Control Threshold Configuration.............................................................................. 729
15.7.2 PFC Watchdog ................................................................................................................. 730
15.7.3 PFC Commands............................................................................................................... 730
15.7.3.1 dcb priority-flow-control enable .................................................................................. 730
15.7.3.2 dcb priority-flow-control priority .................................................................................. 731
15.7.3.3 dcb priority-flow-control mode .................................................................................... 732
15.7.3.4 pfc-wd ......................................................................................................................... 733
15.7.3.5 show dcb priority-flow-control..................................................................................... 734
15.7.3.6 show dcb priority-flow-control interface mlag-port-channel ........................................ 735
15.7.3.7 show interface pfc-wd................................................................................................. 735
15.8 Shared Buffers....................................................................................................................... 737
15.8.1 Traffic Pool Configuration ................................................................................................. 737
15.8.2 Lossless Traffic................................................................................................................. 737
15.8.2.1 Priority-flow-control..................................................................................................... 737
15.8.2.2 Flow Control (Global Pause) ...................................................................................... 738
15.8.3 Advanced Buffer Configuration ........................................................................................ 738
15.8.3.1 Packet Buffering Classification................................................................................... 738
15.8.3.2 Buffer Allocation ......................................................................................................... 739
15.8.3.3 Pools .......................................................................................................................... 739
15.8.3.4 Usage Counting.......................................................................................................... 740
15.8.3.5 Control Traffic Buffering.............................................................................................. 740
15.8.3.6 Default Configuration.................................................................................................. 740
15.8.3.7 Configuration Example ............................................................................................... 741
15.8.3.8 Exceptions to Legal Shared Buffer Configuration ...................................................... 742
15.8.4 Shared Buffer Commands ................................................................................................ 743
15.8.5 Shared Buffer Commands ................................................................................................ 743
15.8.5.1 traffic pool ................................................................................................................... 744
15.8.5.2 type............................................................................................................................. 744
15.8.5.3 map switch-priority ..................................................................................................... 745
15.8.5.4 type map switch-priority.............................................................................................. 746
15.8.5.5 memory percent ......................................................................................................... 746
15.8.5.6 advanced buffer management.................................................................................... 747
15.8.5.7 ingress-buffer.............................................................................................................. 748
15.8.5.8 egress-buffer .............................................................................................................. 748
22
15.8.5.9 reserved shared size .................................................................................................. 749
15.8.5.10 pool size type ............................................................................................................. 750
15.8.5.11 pool reserved shared.................................................................................................. 750
15.8.5.12 map pool type reserved.............................................................................................. 751
15.8.5.13 bind switch-priority...................................................................................................... 753
15.8.5.14 description .................................................................................................................. 753
15.8.5.15 pool mc-buffer............................................................................................................. 754
15.8.5.16 clear buffers pool mc-buffers max-usage ................................................................... 755
15.8.5.17 clear buffers interface ethernet max-usage................................................................ 755
15.8.5.18 clear buffers interface max-usage .............................................................................. 756
15.8.5.19 clear buffers pool max-usage ..................................................................................... 757
15.8.5.20 clear buffers pool max-usage ..................................................................................... 757
15.8.5.21 pool description .......................................................................................................... 758
15.8.5.22 cable-length................................................................................................................ 758
15.8.5.23 show buffers mode ..................................................................................................... 759
15.8.5.24 show buffers status .................................................................................................... 760
15.8.5.25 show buffers details.................................................................................................... 763
15.8.5.26 show buffers pools ..................................................................................................... 766
15.8.5.27 show buffers pools mc-buffers.................................................................................... 768
15.8.5.28 show traffic pool ......................................................................................................... 769
15.8.5.29 show traffic pool interface ethernet ............................................................................ 770
15.9 Storm Control ........................................................................................................................ 771
15.9.1 Storm Control Commands................................................................................................ 772
15.9.1.1 storm-control .............................................................................................................. 772
15.9.1.2 show storm-control ..................................................................................................... 773
15.10 Head-of-Queue Lifetime Limit ............................................................................................... 774
15.10.1 HoQ Commands............................................................................................................... 774
15.10.1.1 hll ................................................................................................................................ 774
15.11 Store-and-Forward ................................................................................................................ 775
15.11.1 Store-and-Forward Commands........................................................................................ 775
15.11.1.1 switchmode store-and-forward ................................................................................... 775
16 Ethernet Switching ......................................................................................................................777
16.1 Ethernet Interfaces ................................................................................................................ 777
16.1.1 Breakout Cables............................................................................................................... 777
16.1.1.1 Changing the Module Type to a Split Mode ............................................................... 778
16.1.1.2 Unsplitting a Split Port ................................................................................................ 779
16.1.2 56GbE Link Speed ........................................................................................................... 780
16.1.3 Transceiver Information.................................................................................................... 780
23
16.1.4 High Power Transceivers ................................................................................................. 780
16.1.5 Forward Error Correction.................................................................................................. 781
16.1.6 Port Recirculation ............................................................................................................. 781
16.1.7 Ethernet Interface Commands ......................................................................................... 782
16.1.7.1 interface ethernet ....................................................................................................... 782
16.1.7.2 boot-delay................................................................................................................... 783
16.1.7.3 default interface ethernet............................................................................................ 783
16.1.7.4 description .................................................................................................................. 784
16.1.7.5 fec-override ................................................................................................................ 785
16.1.7.6 flowcontrol .................................................................................................................. 785
16.1.7.7 ip address dhcp .......................................................................................................... 786
16.1.7.8 load-interval................................................................................................................ 787
16.1.7.9 module-type................................................................................................................ 787
16.1.7.10 mtu ............................................................................................................................ 788
16.1.7.11 recirculation ................................................................................................................ 789
16.1.7.12 no recirculation port interface ethernet....................................................................... 790
16.1.7.13 shutdown .................................................................................................................... 790
16.1.7.14 speed.......................................................................................................................... 791
16.1.7.15 clear counters............................................................................................................. 793
16.1.7.16 show interfaces counters............................................................................................ 794
16.1.7.17 show interfaces counters discard ............................................................................... 796
16.1.7.18 show interfaces ethernet ............................................................................................ 797
16.1.7.19 show interfaces ethernet counters tc.......................................................................... 801
16.1.7.20 show interfaces ethernet counters pg ........................................................................ 801
16.1.7.21 show interfaces ethernet description.......................................................................... 802
16.1.7.22 show interfaces ethernet rates ................................................................................... 803
16.1.7.23 show recirculation port ............................................................................................... 804
16.1.7.24 show interfaces ethernet status.................................................................................. 805
16.1.7.25 show interfaces ethernet transceiver.......................................................................... 806
16.1.7.26 show interfaces ethernet transceiver brief.................................................................. 807
16.1.7.27 show interfaces ethernet transceiver counters........................................................... 808
16.1.7.28 show interfaces ethernet transceiver counters details ............................................... 809
16.1.7.29 show interfaces ethernet transceiver diagnostics ...................................................... 810
16.1.7.30 show interfaces ethernet transceiver raw................................................................... 813
16.1.7.31 show interfaces status................................................................................................ 814
16.1.7.32 disable interface ethernet traffic-class congestion-control ......................................... 817
16.1.7.33 disable interface port-channel traffic-class congestion-control .................................. 817
16.1.7.34 disable interface mlag-port-channel traffic-class congestion-control ......................... 818
24
16.2 Interface Isolation .................................................................................................................. 819
16.2.1 Configuring Isolated Interfaces......................................................................................... 819
16.2.2 Interface Isolation Commands.......................................................................................... 821
16.2.2.1 protocol isolation-group .............................................................................................. 821
16.2.2.2 isolation-group............................................................................................................ 821
16.2.2.3 shutdown .................................................................................................................... 822
16.2.2.4 vlan ............................................................................................................................. 823
16.2.2.5 isolation-group mode.................................................................................................. 823
16.2.2.6 show isolation-group .................................................................................................. 824
16.3 Link Aggregation Group (LAG) .............................................................................................. 824
16.3.1 Configuring Static LAG..................................................................................................... 825
16.3.2 Configuring Link Aggregation Control Protocol (LACP) ................................................... 825
16.3.3 LAG Commands............................................................................................................... 826
16.3.3.1 interface port-channel................................................................................................. 826
16.3.3.2 lacp ............................................................................................................................. 827
16.3.3.3 lacp system-priority .................................................................................................... 827
16.3.3.4 lacp (interface)............................................................................................................ 828
16.3.3.5 port-channel load-balance ethernet............................................................................ 829
16.3.3.6 channel-group ............................................................................................................ 831
16.3.3.7 lacp-individual enable................................................................................................. 832
16.3.3.8 ip address dhcp .......................................................................................................... 833
16.3.3.9 show lacp counters..................................................................................................... 833
16.3.3.10 show lacp interfaces ethernet..................................................................................... 834
16.3.3.11 show lacp interfaces neighbor.................................................................................... 835
16.3.3.12 show lacp ................................................................................................................... 838
16.3.3.13 show lacp interfaces system-identifier........................................................................ 838
16.3.3.14 show interfaces port-channel ..................................................................................... 839
16.3.3.15 show interfaces port-channel counters....................................................................... 841
16.3.3.16 show interfaces port-channel compatibility-parameters ............................................. 842
16.3.3.17 show interfaces port-channel load-balance................................................................ 844
16.3.3.18 show interfaces port-channel summary...................................................................... 844
16.4 Link Layer Discovery Protocol (LLDP) .................................................................................. 845
16.4.1 Configuring LLDP ............................................................................................................. 845
16.4.2 DCBX ............................................................................................................................... 846
16.4.3 LLDP Commands ............................................................................................................. 846
16.4.3.1 lldp .............................................................................................................................. 846
16.4.3.2 lldp reinit ..................................................................................................................... 847
16.4.3.3 lldp timer ..................................................................................................................... 848
25
16.4.3.4 lldp tx-delay ............................................................................................................... 848
16.4.3.5 lldp tx-hold-multiplier .................................................................................................. 849
16.4.3.6 lldp (interface)............................................................................................................. 849
16.4.3.7 lldp tlv-select............................................................................................................... 850
16.4.3.8 lldp med-tlv-select ...................................................................................................... 851
16.4.3.9 dcb application-priority ............................................................................................... 852
16.4.3.10 clear lldp counters ...................................................................................................... 853
16.4.3.11 show lldp local ............................................................................................................ 853
16.4.3.12 show lldp interfaces.................................................................................................... 854
16.4.3.13 show lldp remote ........................................................................................................ 855
16.4.3.14 show lldp statistics...................................................................................................... 856
16.4.3.15 show lldp statistics global ........................................................................................... 858
16.4.3.16 show lldp timers.......................................................................................................... 858
16.4.3.17 show dcb application-priority ...................................................................................... 859
16.5 VLANs ................................................................................................................................... 859
16.5.1 Configuring Access Mode and Assigning Port VLAN ID (PVID).......................................860
16.5.2 Configuring Hybrid Mode and Assigning Port VLAN ID (PVID)........................................860
16.5.3 Configuring Trunk Mode VLAN Membership.................................................................... 861
16.5.4 Configuring Hybrid Mode VLAN Membership .................................................................. 861
16.5.5 VLAN Commands............................................................................................................. 862
16.5.5.1 vlan ............................................................................................................................. 862
16.5.5.2 name .......................................................................................................................... 863
16.5.5.3 show vlan ................................................................................................................... 863
16.5.5.4 switchport mode ......................................................................................................... 865
16.5.5.5 switchport dot1q-tunnel qos-mode ............................................................................. 866
16.5.5.6 switchport access ....................................................................................................... 867
16.5.5.7 switchport {hybrid, trunk} allowed-vlan ....................................................................... 868
16.5.5.8 switchport voice.......................................................................................................... 869
16.5.5.9 show interfaces switchport ......................................................................................... 870
16.6 Voice VLAN ........................................................................................................................... 870
16.6.1 Configuring Voice VLAN................................................................................................... 871
16.6.2 Limitations ........................................................................................................................ 874
16.7 Spanning Tree Protocol......................................................................................................... 875
16.7.1 Port Priority and Cost ....................................................................................................... 875
16.7.2 Port Type .......................................................................................................................... 875
16.7.3 BPDU Filter ...................................................................................................................... 876
16.7.4 BPDU Guard .................................................................................................................... 876
16.7.4.1 Logging Example In Case of a BPDU Guard Event .................................................. 876
26
16.7.5 Loop Guard ...................................................................................................................... 876
16.7.6 Root Guard....................................................................................................................... 877
16.7.7 MSTP ............................................................................................................................... 877
16.7.8 RPVST ............................................................................................................................. 877
16.7.8.1 RPVST and VLAN Limitations .................................................................................... 878
16.7.8.2 RPVST and RSTP Interoperability ............................................................................. 879
16.7.9 STP Commands ............................................................................................................... 879
16.7.9.1 spanning-tree ............................................................................................................. 879
16.7.9.2 spanning-tree mode ................................................................................................... 880
16.7.9.3 spanning-tree (timers) ................................................................................................ 880
16.7.9.4 spanning-tree port type (default global)...................................................................... 881
16.7.9.5 spanning-tree priority.................................................................................................. 882
16.7.9.6 spanning-tree port-priority .......................................................................................... 883
16.7.9.7 spanning-tree cost...................................................................................................... 883
16.7.9.8 spanning-tree port type .............................................................................................. 884
16.7.9.9 spanning-tree guard ................................................................................................... 885
16.7.9.10 spanning-tree bpdufilter.............................................................................................. 886
16.7.9.11 clear spanning-tree counters...................................................................................... 887
16.7.9.12 spanning-tree mst max-hops...................................................................................... 887
16.7.9.13 spanning-tree mst priority........................................................................................... 888
16.7.9.14 spanning-tree mst vlan ............................................................................................... 888
16.7.9.15 spanning-tree mst revision ......................................................................................... 889
16.7.9.16 spanning-tree mst name............................................................................................. 890
16.7.9.17 spanning-tree mst root ............................................................................................... 890
16.7.9.18 spanning-tree mst port-priority ................................................................................... 891
16.7.9.19 spanning-tree mst cost ............................................................................................... 892
16.7.9.20 spanning-tree vlan forward-time................................................................................. 892
16.7.9.21 spanning-tree vlan hello-time ..................................................................................... 893
16.7.9.22 spanning-tree vlan max-age....................................................................................... 894
16.7.9.23 spanning-tree vlan priority .......................................................................................... 894
16.7.9.24 show spanning-tree .................................................................................................... 895
16.7.9.25 show spanning-tree detail .......................................................................................... 896
16.7.9.26 show spanning-tree interface ..................................................................................... 897
16.7.9.27 show spanning-tree mst ............................................................................................. 898
16.7.9.28 show spanning-tree root............................................................................................. 899
16.7.9.29 show spanning-tree vlan ............................................................................................ 900
16.7.9.30 show spanning-tree vlan topo-change-history ........................................................... 901
16.7.9.31 show spanning-tree mst topo-change-history ............................................................ 902
27
16.7.9.32 show spanning-tree topo-change-history ................................................................... 903
16.8 MAC Address Table ............................................................................................................... 903
16.8.1 Configuring Unicast Static MAC Address ......................................................................... 903
16.8.2 MAC Learning Considerations ......................................................................................... 904
16.8.3 MAC Address Table Commands ...................................................................................... 904
16.8.3.1 mac-address-table aging-time.................................................................................... 904
16.8.3.2 mac-address-table static ............................................................................................ 905
16.8.3.3 mac-learning disable .................................................................................................. 906
16.8.3.4 clear mac-address-table dynamic .............................................................................. 907
16.8.3.5 show mac-address-table ............................................................................................ 907
16.8.3.6 show mac-address-table aging-time .......................................................................... 908
16.8.3.7 show mac-address-table interface ............................................................................. 909
16.8.3.8 show mac-address-table interface nve....................................................................... 910
16.8.3.9 show mac-address-table summary .............................................................................911
16.9 MLAG .....................................................................................................................................911
16.9.1 MLAG Keepalive and Failover.......................................................................................... 914
16.9.2 Unicast and Multicast Sync .............................................................................................. 914
16.9.3 MLAG Port Sync............................................................................................................... 914
16.9.4 MLAG Virtual System-MAC .............................................................................................. 914
16.9.5 Upgrading MLAG Pair ...................................................................................................... 914
16.9.6 Interoperability with MLAG .............................................................................................. 915
16.9.6.1 MLAG Interoperability with L2 Protocols .................................................................... 915
16.9.6.2 MLAG Interoperability with L3 Protocols .................................................................... 916
16.9.7 Configuring MLAG............................................................................................................ 916
16.9.7.1 Configuring L2 MLAG................................................................................................. 917
16.9.7.2 Verifying MLAG Configuration .................................................................................... 919
16.9.7.3 Enabling L3 Forwarding with User VRF ..................................................................... 921
16.9.8 MLAG Commands............................................................................................................ 921
16.9.9 MLAG Commands............................................................................................................ 921
16.9.9.1 protocol mlag.............................................................................................................. 922
16.9.9.2 mlag............................................................................................................................ 922
16.9.9.3 shutdown .................................................................................................................... 923
16.9.9.4 interface mlag-port-channel........................................................................................ 923
16.9.9.5 ipl ................................................................................................................................ 924
16.9.9.6 ipl peer-address.......................................................................................................... 925
16.9.9.7 keep-alive-interval ...................................................................................................... 925
16.9.9.8 mlag-channel-group mode ......................................................................................... 926
16.9.9.9 mlag-vip ...................................................................................................................... 927
28
16.9.9.10 reload-delay................................................................................................................ 928
16.9.9.11 system-mac ................................................................................................................ 928
16.9.9.12 upgrade-timeout ......................................................................................................... 929
16.9.9.13 show mlag .................................................................................................................. 929
16.9.9.14 show mlag-vip ............................................................................................................ 931
16.9.9.15 show interfaces mlag-port-channel ............................................................................ 932
16.9.9.16 show interfaces mlag-port-channel counters.............................................................. 935
16.9.9.17 show interfaces mlag-port-channel summary............................................................. 936
16.9.9.18 show mlag statistics ................................................................................................... 938
16.10 Link State Tracking................................................................................................................ 939
16.10.1 Configuring Link State Tracking ....................................................................................... 939
16.10.2 Link State Tracking Commands ....................................................................................... 940
16.10.2.1 link type ...................................................................................................................... 940
16.10.2.2 link state tracking group ............................................................................................. 941
16.10.2.3 link state tracking vlan ................................................................................................ 942
16.10.2.4 show link state tracking .............................................................................................. 942
16.11 QinQ ...................................................................................................................................... 943
16.11.1 QinQ Operation Modes .................................................................................................... 943
16.11.2 Configuring QinQ.............................................................................................................. 944
16.11.3 QinQ Commands.............................................................................................................. 946
16.11.3.1 switchport dot1q-tunnel qos-mode ............................................................................. 946
16.12 Access Control List (ACL) ..................................................................................................... 946
16.12.1 Configuring ACL ............................................................................................................... 947
16.12.2 ACL Actions ...................................................................................................................... 947
16.12.3 ACL Logging..................................................................................................................... 948
16.12.4 ACL Capability Summary ................................................................................................ 948
16.12.5 ACL Commands ............................................................................................................... 952
16.12.6 ACL Commands ............................................................................................................... 952
16.12.6.1 {ipv4/ipv6/mac/ipv4-udk/mac-udk} access-list............................................................ 953
16.12.6.2 policer ......................................................................................................................... 954
16.12.6.3 bind-point rif................................................................................................................ 955
16.12.6.4 remark ........................................................................................................................ 956
16.12.6.5 shared-counter ........................................................................................................... 956
16.12.6.6 clear shared-counters................................................................................................. 957
16.12.6.7 clear counters............................................................................................................. 958
16.12.6.8 {ipv4/ipv6/mac/ipv4-udk/mac-udk} access-list clear counters .................................... 958
16.12.6.9 {ipv4/ipv6/mac/ipv4-udk/mac-udk} port access-group................................................ 959
16.12.6.10 deny/permit (MAC ACL rule)....................................................................................... 960
29
16.12.6.11 deny/permit (IPv4 ACL rule) ....................................................................................... 963
16.12.6.12 deny/permit (IPv4 TCP ACL rule) ............................................................................... 965
16.12.6.13 deny/permit (IPv4 TCP-UDP/UDP ACL rule).............................................................. 969
16.12.6.14 deny/permit (IPv4 ICMP ACL rule) ............................................................................. 972
16.12.6.15 deny/permit (IPv6 ACL rule) ....................................................................................... 974
16.12.6.16 deny/permit (IPv6 TCP ACL rule) ............................................................................... 977
16.12.6.17 deny/permit (IPv6 TCP-UDP/UDP ACL rule).............................................................. 980
16.12.6.18 deny/permit (IPv6 ICMPv6 ACL rule) ......................................................................... 982
16.12.6.19 deny/permit (MAC UDK ACL rule) .............................................................................. 985
16.12.6.20 deny/permit (IPv4 UDK ACL rule)............................................................................... 988
16.12.6.21 deny/permit (IPv4 TCP UDK ACL rule)....................................................................... 990
16.12.6.22 deny/permit (IPv4 TCP-UDP/UDP UDK ACL rule) ..................................................... 994
16.12.6.23 deny/permit (IPv4 ICMP UDK ACL rule)..................................................................... 997
16.12.6.24 port access-group (IPv4/IPv4 UDK/IPv6/MAC/MAC UDK) ...................................... 1000
16.12.6.25 access-list action ...................................................................................................... 1000
16.12.6.26 access-list log........................................................................................................... 1001
16.12.6.27 vlan-map................................................................................................................... 1002
16.12.6.28 vlan-pop.................................................................................................................... 1002
16.12.6.29 vlan-push.................................................................................................................. 1003
16.12.6.30 show ipv4 access-lists.............................................................................................. 1003
16.12.6.31 show ipv4-udk access-lists....................................................................................... 1004
16.12.6.32 show ipv6 access-lists.............................................................................................. 1006
16.12.6.33 show mac access-lists.............................................................................................. 1007
16.12.6.34 show mac access-lists summary.............................................................................. 1008
16.12.6.35 show mac-udk access-lists....................................................................................... 1008
16.12.6.36 show access-lists action........................................................................................... 1009
16.12.6.37 show mac-udk access-lists....................................................................................... 1010
16.12.6.38 show access-lists log config ......................................................................................1011
16.12.6.39 show access-lists policers (ipv4/ipv4-udk/ipv6/mac/mac-udk) ................................. 1012
16.12.6.40 show access-lists shared-counters (ipv4/ipv4-udk/ipv6/mac/mac-udk) ................... 1013
16.12.6.41 show access-lists summary...................................................................................... 1014
16.12.6.42 show access-lists log................................................................................................ 1014
16.12.6.43 show access-lists log config ..................................................................................... 1015
16.13 Control Plane Policing ......................................................................................................... 1016
16.13.1 IP Table Filtering............................................................................................................. 1016
16.13.1.1 Configuring IP Table Filtering ................................................................................... 1017
16.13.1.2 Modifying IP Table Filtering ...................................................................................... 1018
16.13.1.3 Rate-Limit Rule Configuration .................................................................................. 1019
30
16.13.2 Control Plane Policing Commands................................................................................. 1019
16.13.2.1 ip filter enable | ipv6 filter enable.............................................................................. 1019
16.13.2.2 ip filter chain policy | ipv6 filter chain policy.............................................................. 1020
16.13.2.3 ip filter chain rule target | ipv6 filter chain rule target................................................ 1020
16.13.2.4 ip filter options include-bridges................................................................................. 1023
16.13.2.5 show ip filter ............................................................................................................. 1023
16.13.2.6 show ip filter all......................................................................................................... 1024
16.13.2.7 show ip filter configured............................................................................................ 1025
16.13.2.8 show ipv6 filter.......................................................................................................... 1026
16.13.2.9 show ipv6 filter all ..................................................................................................... 1027
16.13.2.10 show ipv6 filter configured........................................................................................ 1028
16.14 User Defined Keys .............................................................................................................. 1029
16.14.1 Configuring UDK ............................................................................................................ 1029
16.14.2 UDK Commands ............................................................................................................ 1030
16.14.2.1 udk............................................................................................................................ 1030
16.14.2.2 match mode.............................................................................................................. 1031
16.14.2.3 extraction point ......................................................................................................... 1032
16.14.2.4 len............................................................................................................................. 1033
16.14.2.5 show udk .................................................................................................................. 1033
16.15 OpenFlow ............................................................................................................................ 1034
16.15.1 Flow Table ...................................................................................................................... 1035
16.15.2 OpenFlow 1.3 Workflow ................................................................................................. 1035
16.15.2.1 ACL Rule Tables (0-249) .......................................................................................... 1037
16.15.2.2 Router Table (251).................................................................................................... 1039
16.15.3 Configuring OpenFlow.................................................................................................... 1040
16.15.4 Configuring Flows Using CLI Commands ......................................................................1040
16.15.5 Configuring Secure Connection to OpenFlow ................................................................1041
16.15.6 OpenFlow Commands.................................................................................................... 1044
16.15.6.1 protocol openflow ..................................................................................................... 1045
16.15.6.2 openflow mode hybrid .............................................................................................. 1045
16.15.6.3 openflow add-flows................................................................................................... 1046
16.15.6.4 openflow del-flows.................................................................................................... 1049
16.15.6.5 openflow add-group.................................................................................................. 1049
16.15.6.6 openflow del-group................................................................................................... 1050
16.15.6.7 openflow mod-group................................................................................................. 1051
16.15.6.8 openflow add-meter.................................................................................................. 1052
16.15.6.9 openflow del-meter................................................................................................... 1052
16.15.6.10 openflow fail-mode secure ....................................................................................... 1053
31
16.15.6.11 openflow mod-meter................................................................................................. 1054
16.15.6.12 openflow re-apply flows............................................................................................ 1055
16.15.6.13 openflow re-apply groups ......................................................................................... 1055
16.15.6.14 openflow re-apply meters ......................................................................................... 1056
16.15.6.15 controller-ip............................................................................................................... 1056
16.15.6.16 datapath-id ............................................................................................................... 1057
16.15.6.17 openflow table match-keys....................................................................................... 1058
16.15.6.18 openflow acl table counter disable .......................................................................... 1059
16.15.6.19 show openflow.......................................................................................................... 1060
16.15.6.20 show openflow flows ................................................................................................ 1061
16.15.6.21 show openflow flows ethernet-names ...................................................................... 1062
16.15.6.22 show openflow groups.............................................................................................. 1064
16.15.6.23 show openflow groups ethernet-names ................................................................... 1064
16.15.6.24 show openflow meters.............................................................................................. 1065
16.15.6.25 show openflow flows table........................................................................................ 1066
16.15.6.26 show openflow flows cookie ..................................................................................... 1066
16.15.6.27 show openflow table match-keys ............................................................................. 1067
16.15.6.28 show openflow table match-keys supported ............................................................ 1068
17 VXLAN.......................................................................................................................................1069
17.1 Configuring VXLAN ............................................................................................................. 1069
17.2 VMware Network Virtualization and Security Platform (NSX) Configuration....................... 1071
17.2.1 Hardware Topology ........................................................................................................ 1071
17.2.2 Switch Configuration ...................................................................................................... 1072
17.2.3 Adding the Switch to NSX .............................................................................................. 1075
17.2.4 Mapping a Logical Switch to a Physical Switch Port ......................................................1075
17.3 RoCE Over VXLAN ............................................................................................................. 1076
17.3.1 RoCEv2 Using PFC and ECN ........................................................................................ 1076
17.3.2 RoCEv1 Using PFC........................................................................................................ 1077
17.4 VXLAN Commands ............................................................................................................. 1078
17.5 VXLAN Commands ............................................................................................................. 1078
17.5.1 protocol nve.................................................................................................................... 1079
17.5.2 interface nve................................................................................................................... 1079
17.5.3 nve bridge....................................................................................................................... 1080
17.5.4 nve controller bgp........................................................................................................... 1080
17.5.5 nve fdb flood bridge address .......................................................................................... 1081
17.5.6 nve fdb flood load-balance ............................................................................................. 1081
17.5.7 nve fdb learning remote.................................................................................................. 1082
17.5.8 nve mode only ................................................................................................................ 1082
32
17.5.9 nve neigh-suppression ................................................................................................... 1083
17.5.10 nve vlan bridge ............................................................................................................... 1083
17.5.11 nve vlan neigh-suppression............................................................................................ 1084
17.5.12 nve vni vlan .................................................................................................................... 1085
17.5.13 interface nve auto-vlan-map .......................................................................................... 1085
17.5.14 interface nve disable nve vni .......................................................................................... 1086
17.5.15 vxlan mlag-tunnel-ip ....................................................................................................... 1087
17.5.16 vxlan source interface loopback ..................................................................................... 1087
17.5.17 shutdown ........................................................................................................................ 1088
17.5.18 clear mac-address-table nve .......................................................................................... 1088
17.5.19 clear nve counters .......................................................................................................... 1089
17.5.20 show interfaces nve........................................................................................................ 1089
17.5.21 show interfaces nve detail .............................................................................................. 1090
17.5.22 show interfaces nve counters......................................................................................... 1091
17.5.23 show interfaces counters vlan ........................................................................................ 1092
17.5.24 show interfaces nve flood............................................................................................... 1093
17.5.25 show interfaces nve mac-address-table......................................................................... 1093
17.5.26 show interfaces nve mac-address-table local learned unicast.......................................1094
17.5.27 show interfaces nve mac-address-table remote configured multicast ...........................1095
17.5.28 show interfaces nve peers.............................................................................................. 1096
17.5.29 ovs ovsdb server ............................................................................................................ 1097
17.5.30 ovs ovsdb manager remote............................................................................................ 1097
17.5.31 ovs ovsdb server listen................................................................................................... 1098
17.5.32 ovs logging level............................................................................................................. 1099
17.5.33 show ovs ........................................................................................................................ 1099
18 Ethernet VPN (EVPN) ............................................................................................................... 1101
18.1 Overview ..............................................................................................................................1101
18.2 Example of How To Configure EVPN ...................................................................................1102
18.2.1 Layer 2 Configuration, MLAG, and VLANs..................................................................... 1102
18.2.2 Layer 3 Configuration ..................................................................................................... 1103
18.2.3 BGP and EVPN Configuration........................................................................................ 1105
18.2.4 Spine Configuration........................................................................................................ 1106
18.3 Traffic Behavior During Failures ...........................................................................................1107
18.4 EVPN Troubleshooting .........................................................................................................1109
18.4.1 show interface nve 1 ...................................................................................................... 1109
18.4.2 show interface nve 1 detail ............................................................................................ 1109
18.4.3 show ip bgp evpn summary............................................................................................ 1109
18.4.4 show ip bgp evpn ........................................................................................................... 1110
33
18.4.5 show ip bgp evpn vni 10060............................................................................................1111
18.4.6 show ip bgp evpn with multiple filters ..............................................................................1111
18.4.7 show mac-address-table ................................................................................................ 1112
18.4.8 show ip arp ..................................................................................................................... 1113
18.5 EVPN Data Center Interconnect (DCI).................................................................................1114
18.5.1 Layer 2 DCI Connection ................................................................................................. 1114
18.5.2 Layer 3 Routes WAN...................................................................................................... 1114
18.6 EVPN Centralized L3 Gateway ...........................................................................................1114
18.6.1 Configuration Example of EVPN Centralized Gateway.................................................. 1115
18.6.2 Configuration Example of MLAG EVPN Centralized Gateway ...................................... 1117
18.7 EVPN Logging Examples ....................................................................................................1119
18.7.1 EVPN MAC Mobility Logs............................................................................................... 1119
19 IP Routing.................................................................................................................................. 1121
19.1 IP Routing Overview.............................................................................................................1121
19.1.1 IP Interfaces ................................................................................................................... 1121
19.1.1.1 VLAN Interfaces ........................................................................................................1121
19.1.1.2 Loopback Interfaces ..................................................................................................1122
19.1.1.3 Router Port Interfaces ...............................................................................................1122
19.1.1.4 Configuring a VLAN Interface....................................................................................1122
19.1.1.5 Configuring a Loopback Interface .............................................................................1123
19.1.1.6 Configuring a Router Port Interface...........................................................................1124
19.1.2 Equal Cost Multi-Path Routing (ECMP) ......................................................................... 1126
19.1.2.1 Hash Functions .........................................................................................................1127
19.1.2.2 ECMP Consistent Hashing ........................................................................................1127
19.1.2.3 Virtual Routing and Forwarding.................................................................................1130
19.1.3 ARP Neighbor Discovery Responder ............................................................................. 1131
19.1.3.1 Configuring ARP Responder .....................................................................................1131
19.1.4 Policy Based Routing (PBR) ......................................................................................... 1132
19.1.5 General IP Routing Commands ..................................................................................... 1132
19.1.5.1 ip l3 ...........................................................................................................................1134
19.1.5.2 vrf definition ..............................................................................................................1134
19.1.5.3 routing-context vrf......................................................................................................1135
19.1.5.4 ip routing....................................................................................................................1136
19.1.5.5 description .................................................................................................................1136
19.1.5.6 rd ...............................................................................................................................1137
19.1.5.7 vrf forwarding.............................................................................................................1138
19.1.5.8 clear ip routing counters ............................................................................................1138
19.1.5.9 show ip routing ..........................................................................................................1139
34
19.1.5.10 show ip routing counters ...........................................................................................1140
19.1.5.11 show routing-context vrf ............................................................................................1140
19.1.5.12 show vrf .....................................................................................................................1141
19.1.5.13 IP Interface ................................................................................................................1142
19.1.5.14 Interface VLAN ..........................................................................................................1145
19.1.5.15 Loopback Interface....................................................................................................1173
19.1.5.16 Routing and ECMP....................................................................................................1177
19.1.5.17 Network to Media Resolution (ARP)..........................................................................1191
19.1.5.18 IP Diagnostic Tools ....................................................................................................1195
19.1.5.19 QoS ...........................................................................................................................1199
19.1.5.20 PBR ......................................................................................................................... 1200
19.1.6 IPv6 ................................................................................................................................ 1210
19.1.6.1 Features that Support IPv6 .......................................................................................1211
19.1.6.2 Neighbor Discovery Protocol.....................................................................................1211
19.1.6.3 Configuring IPv6........................................................................................................1211
19.1.6.4 IPv6 Commands....................................................................................................... 1214
19.2 OSPF................................................................................................................................... 1238
19.2.1 Router ID ........................................................................................................................ 1238
19.2.2 ECMP ............................................................................................................................. 1238
19.2.3 Configuring OSPF .......................................................................................................... 1239
19.2.4 OSPF Commands .......................................................................................................... 1242
19.2.4.1 protocol ospf............................................................................................................. 1243
19.2.4.2 router ospf ................................................................................................................ 1243
19.2.4.3 router-id .................................................................................................................... 1244
19.2.4.4 shutdown .................................................................................................................. 1245
19.2.4.5 auto-cost reference-bandwidth................................................................................. 1246
19.2.4.6 distance .................................................................................................................... 1246
19.2.4.7 redistribute................................................................................................................ 1247
19.2.4.8 timers throttle spf...................................................................................................... 1248
19.2.4.9 area default-cost....................................................................................................... 1248
19.2.4.10 area range ................................................................................................................ 1249
19.2.4.11 area stub .................................................................................................................. 1250
19.2.4.12 area nssa.................................................................................................................. 1251
19.2.4.13 no area ..................................................................................................................... 1252
19.2.4.14 default-information originate..................................................................................... 1252
19.2.4.15 summary-address..................................................................................................... 1253
19.2.4.16 ip ospf cost ............................................................................................................... 1254
19.2.4.17 ip ospf dead-interval ................................................................................................. 1254
35
19.2.4.18 ip ospf hello-interval ................................................................................................. 1255
19.2.4.19 ip ospf priority ........................................................................................................... 1256
19.2.4.20 ip ospf network ......................................................................................................... 1256
19.2.4.21 ip ospf retransmit-interval ......................................................................................... 1257
19.2.4.22 ip ospf passive-interface........................................................................................... 1258
19.2.4.23 ip ospf transmit-delay ............................................................................................... 1258
19.2.4.24 ip ospf shutdown ...................................................................................................... 1259
19.2.4.25 ip ospf authentication ............................................................................................... 1260
19.2.4.26 ip ospf authentication-key......................................................................................... 1260
19.2.4.27 ip ospf message-digest-key...................................................................................... 1261
19.2.4.28 ip ospf area............................................................................................................... 1262
19.2.4.29 show ip ospf ............................................................................................................. 1262
19.2.4.30 show ip ospf border-routers...................................................................................... 1264
19.2.4.31 show ip ospf database.............................................................................................. 1264
19.2.4.32 show ip ospf interface............................................................................................... 1266
19.2.4.33 show ip ospf neighbors............................................................................................. 1267
19.2.4.34 show ip ospf request-list........................................................................................... 1269
19.2.4.35 show ip ospf retransmission-list ............................................................................... 1270
19.2.4.36 show ip ospf summary-address................................................................................ 1271
19.3 BGP ..................................................................................................................................... 1271
19.3.1 State Machine ................................................................................................................ 1272
19.3.2 Default Address Family .................................................................................................. 1272
19.3.3 Default Route Originate.................................................................................................. 1272
19.3.4 Peer Groups and Update Groups................................................................................... 1272
19.3.5 Configuring BGP ............................................................................................................ 1272
19.3.6 Verifying BGP ................................................................................................................. 1274
19.3.7 Ethernet Virtual Private Network .................................................................................... 1274
19.3.8 BGP Unnumbered .......................................................................................................... 1275
19.3.9 Configuring BGP Unnumbered ...................................................................................... 1276
19.3.10 BGP Commands ............................................................................................................ 1278
19.3.11 BGP Commands ............................................................................................................ 1278
19.3.11.1 Config ....................................................................................................................... 1279
19.3.11.2 Config Router ........................................................................................................... 1282
19.3.11.3 Show ........................................................................................................................ 1338
19.3.11.4 IP AS-Path Access-List............................................................................................. 1368
19.3.11.5 IP Community-List .................................................................................................... 1370
19.3.12 BGP Monitoring Protocol ................................................................................................ 1372
19.3.12.1 BMP Commands ...................................................................................................... 1372
36
19.4 Bidirectional Forwarding Detection (BFD) Infrastructure..................................................... 1376
19.4.1 Session Establishment ................................................................................................... 1376
19.4.2 Interaction with Protocols ............................................................................................... 1376
19.4.3 BFD Commands............................................................................................................. 1377
19.5 Policy Rules......................................................................................................................... 1385
19.5.1 Route Map...................................................................................................................... 1385
19.5.2 Route Map Commands .................................................................................................. 1385
19.5.2.1 route-map ................................................................................................................. 1386
19.5.2.2 continue <sequence-number>.................................................................................. 1387
19.5.2.3 abort ......................................................................................................................... 1387
19.5.2.4 match as-number ..................................................................................................... 1388
19.5.2.5 match as-path........................................................................................................... 1389
19.5.2.6 match community-list................................................................................................ 1390
19.5.2.7 match ip/ipv6 address .............................................................................................. 1390
19.5.2.8 match ip next-hop..................................................................................................... 1391
19.5.2.9 match metric............................................................................................................. 1392
19.5.2.10 set as-path prepend ................................................................................................. 1393
19.5.2.11 set community additive............................................................................................. 1393
19.5.2.12 set community none ................................................................................................. 1394
19.5.2.13 set community delete ............................................................................................... 1394
19.5.2.14 set community-list..................................................................................................... 1395
19.5.2.15 set community-list additive ....................................................................................... 1396
19.5.2.16 set community-list delete.......................................................................................... 1396
19.5.2.17 set ip next-hop.......................................................................................................... 1397
19.5.2.18 set local-preference.................................................................................................. 1398
19.5.2.19 set metric .................................................................................................................. 1398
19.5.2.20 set origin ................................................................................................................... 1399
19.5.2.21 set weight ................................................................................................................. 1400
19.5.2.22 show route-map........................................................................................................ 1400
19.5.2.23 IP Prefix-List ............................................................................................................. 1401
19.5.2.24 IP Prefix-List Commands.......................................................................................... 1402
19.6 VRRP .................................................................................................................................. 1406
19.6.1 Load Balancing............................................................................................................... 1407
19.6.2 Configuring VRRP .......................................................................................................... 1407
19.6.2.1 Preconditions............................................................................................................ 1407
19.6.2.2 Configuring VRRP .................................................................................................... 1409
19.6.2.3 Verifying VRRP......................................................................................................... 1410
19.6.3 VRRP Commands .......................................................................................................... 1411
37
19.6.3.1 protocol vrrp ............................................................................................................. 1412
19.6.3.2 clear vrrp statistics.................................................................................................... 1412
19.6.3.3 vrrp ........................................................................................................................... 1413
19.6.3.4 address..................................................................................................................... 1413
19.6.3.5 shutdown .................................................................................................................. 1414
19.6.3.6 priority....................................................................................................................... 1415
19.6.3.7 preempt .................................................................................................................... 1416
19.6.3.8 authentication text .................................................................................................... 1416
19.6.3.9 advertisement-interval .............................................................................................. 1417
19.6.3.10 show vrrp .................................................................................................................. 1417
19.6.3.11 show vrrp detail ........................................................................................................ 1418
19.6.3.12 show vrrp statistics ................................................................................................... 1419
19.7 MAGP .................................................................................................................................. 1420
19.7.1 Configuring MAGP ......................................................................................................... 1421
19.7.1.1 Prerequisites ............................................................................................................ 1421
19.7.1.2 Configuring MAGP ................................................................................................... 1421
19.7.1.3 Verifying MAGP ........................................................................................................ 1422
19.7.2 MAGP Commands ......................................................................................................... 1423
19.7.2.1 protocol magp........................................................................................................... 1423
19.7.2.2 magp ........................................................................................................................ 1424
19.7.2.3 shutdown .................................................................................................................. 1424
19.7.2.4 ip virtual-router address............................................................................................ 1425
19.7.2.5 ip virtual-router mac-address.................................................................................... 1426
19.7.2.6 ip virtual-router mac-address <address>.................................................................. 1426
19.7.2.7 show magp ............................................................................................................... 1427
19.7.2.8 show magp interface vlan......................................................................................... 1428
19.8 DHCP Relay ........................................................................................................................ 1429
19.8.1 DHCP-R Virtual Routing and Forwarding (VRF) Auto-Helper ........................................1429
19.8.2 Upstream and Downstream Interfaces........................................................................... 1429
19.8.3 DHCP Relay Commands................................................................................................ 1430
19.8.3.1 ip dhcp relay ............................................................................................................. 1430
19.8.3.2 address..................................................................................................................... 1431
19.8.3.3 always-on ................................................................................................................. 1432
19.8.3.4 information option..................................................................................................... 1432
19.8.3.5 vrf ............................................................................................................................. 1433
19.8.3.6 port ........................................................................................................................... 1434
19.8.3.7 use-secondary-ip...................................................................................................... 1434
19.8.3.8 vrf-auto-helper .......................................................................................................... 1435
38
19.8.3.9 ip dhcp relay instance (config interface)................................................................... 1436
19.8.3.10 clear ip dhcp relay counters ..................................................................................... 1437
19.8.3.11 ip dhcp relay information option circuit-id ................................................................. 1438
19.8.3.12 ipv6 dhcp relay instance........................................................................................... 1438
19.8.3.13 ipv6 dhcp relay instance (global server)................................................................... 1439
19.8.3.14 ipv6 dhcp relay instance address (destination address on interface) ...................... 1440
19.8.3.15 ipv6 dhcp relay instance interface-id option ............................................................. 1441
19.8.3.16 ipv6 dhcp relay instance vrf...................................................................................... 1441
19.8.3.17 ipv6 dhcp relay instance port.................................................................................... 1442
19.8.3.18 ipv6 dhcp relay instance interface-id option ............................................................. 1443
19.8.3.19 ipv6 dhcp relay instance use-secondary-ip .............................................................. 1443
19.8.3.20 clear ipv6 dhcp relay counters.................................................................................. 1444
19.8.3.21 show ip dhcp relay.................................................................................................... 1445
19.8.3.22 show ip dhcp relay counters..................................................................................... 1446
19.8.3.23 show ipv6 dhcp relay................................................................................................ 1447
19.8.3.24 show ipv6 dhcp relay counters ................................................................................. 1448
20 RDMA Over Converged Ethernet (RoCE) .................................................................................1450
20.1 RoCE Overview................................................................................................................... 1450
20.1.1 Definitions/Abbreviation.................................................................................................. 1450
20.2 Configuring RoCE ............................................................................................................... 1451
20.3 RoCE Commands ............................................................................................................... 1452
20.4 RoCE Commands ............................................................................................................... 1452
20.4.1 roce ................................................................................................................................ 1453
20.4.2 show roce ....................................................................................................................... 1454
20.4.3 show interfaces ethernet 1/1 counters roce ...................................................................1457
20.4.4 clear roce interface ethernet 1/1..................................................................................... 1458
21 Multicast (IGMP and PIM) .........................................................................................................1460
21.1 Basic PIM-SM...................................................................................................................... 1460
21.2 Source-Specific Multicast (SSM)......................................................................................... 1460
21.3 Bidirectional PIM ................................................................................................................ 1461
21.4 PIM Load-Sharing .............................................................................................................. 1461
21.4.1 Rendezvous Point Load-Sharing.................................................................................... 1462
21.4.2 Next Hop Load-Sharing.................................................................................................. 1462
21.5 Bootstrap Router ................................................................................................................. 1462
21.6 Configuring Multicast........................................................................................................... 1462
21.6.1 Configuring IGMP........................................................................................................... 1463
21.6.2 Verifying IGMP ............................................................................................................... 1463
21.6.3 Configuring PIM.............................................................................................................. 1465
39
21.7 IGMP and PIM Commands ................................................................................................. 1466
21.8 IGMP and PIM Commands ................................................................................................. 1466
21.8.1 PIM ................................................................................................................................. 1467
21.8.1.1 protocol pim.............................................................................................................. 1467
21.8.1.2 ip pim sg-expiry-timer ............................................................................................... 1468
21.8.1.3 ip pim rp-address...................................................................................................... 1469
21.8.1.4 ip pim bsr-candidate ................................................................................................. 1470
21.8.1.5 ip pim register-source............................................................................................... 1471
21.8.1.6 ip pim rp-candidate................................................................................................... 1472
21.8.1.7 ip pim sparse-mode.................................................................................................. 1474
21.8.1.8 ip pim dr-priority........................................................................................................ 1475
21.8.1.9 ip pim hello-interval .................................................................................................. 1475
21.8.1.10 ip pim join-prune-interval .......................................................................................... 1476
21.8.1.11 ip pim ssm range ...................................................................................................... 1477
21.8.1.12 ip pim multipath next-hop ......................................................................................... 1478
21.8.1.13 ip pim multipath rp .................................................................................................... 1478
21.8.1.14 clear ip pim counters ................................................................................................ 1479
21.8.1.15 show ip pim protocol................................................................................................. 1480
21.8.1.16 show ip pim bsr ........................................................................................................ 1481
21.8.1.17 show ip pim interface................................................................................................ 1482
21.8.1.18 show ip pim interface brief........................................................................................ 1484
21.8.1.19 show ip pim neighbor ............................................................................................... 1485
21.8.1.20 show ip pim rp .......................................................................................................... 1486
21.8.1.21 show ip pim rp-hash ................................................................................................. 1487
21.8.1.22 show ip pim rp-candidate ......................................................................................... 1488
21.8.1.23 show ip pim ssm range............................................................................................. 1489
21.8.1.24 show ip pim upstream joins ...................................................................................... 1490
21.8.2 PIM Bidir ......................................................................................................................... 1491
21.8.2.1 ip pim bidir shutdown................................................................................................ 1491
21.8.2.2 ip pim df-robustness ................................................................................................. 1493
21.8.2.3 ip pim df-backoff-interval .......................................................................................... 1494
21.8.2.4 ip pim df-offer-interval............................................................................................... 1495
21.8.2.5 show ip pim interface df............................................................................................ 1495
21.8.3 Multicast ......................................................................................................................... 1497
21.8.3.1 ip multicast-routing ................................................................................................... 1497
21.8.3.2 ip mroute .................................................................................................................. 1498
21.8.3.3 ip multicast ttl-threshold............................................................................................ 1499
21.8.3.4 clear ip mroute.......................................................................................................... 1499
40
21.8.3.5 show ip mroute ......................................................................................................... 1500
21.8.3.6 show ip mroute summary ......................................................................................... 1503
21.8.4 IGMP .............................................................................................................................. 1505
21.8.4.1 ip igmp immediate-leave .......................................................................................... 1505
21.8.4.2 ip igmp last-member-query-response-time............................................................... 1505
21.8.4.3 ip igmp startup-query-count...................................................................................... 1506
21.8.4.4 ip igmp startup-query-interval................................................................................... 1507
21.8.4.5 ip igmp query-interval ............................................................................................... 1507
21.8.4.6 ip igmp query-max-response-time............................................................................ 1508
21.8.4.7 ip igmp robustness-variable ..................................................................................... 1508
21.8.4.8 ip igmp static-oif ....................................................................................................... 1509
21.8.4.9 clear ip igmp groups ................................................................................................. 1510
21.8.4.10 show ip igmp groups .................................................................................................1511
21.8.4.11 show ip igmp interface.............................................................................................. 1512
21.8.4.12 show ip igmp interface brief...................................................................................... 1515
21.9 IGMP Snooping ................................................................................................................... 1516
21.9.1 Configuring IGMP Snooping........................................................................................... 1516
21.9.2 Defining a Multicast Router Port on a VLAN ..................................................................1517
21.9.3 IGMP Snooping Querier ................................................................................................. 1519
21.9.4 IGMP Snooping Querier Guard ..................................................................................... 1519
21.9.5 IGMP Snooping Commands........................................................................................... 1520
21.9.5.1 ip igmp snooping (admin) ......................................................................................... 1521
21.9.5.2 ip igmp snooping (config) ......................................................................................... 1521
21.9.5.3 ip igmp snooping fast-leave...................................................................................... 1523
21.9.5.4 ip igmp snooping mrouter......................................................................................... 1524
21.9.5.5 ip igmp snooping static-group .................................................................................. 1524
21.9.5.6 ip igmp snooping querier .......................................................................................... 1525
21.9.5.7 ip igmp snooping querier-guard ............................................................................... 1526
21.9.5.8 ip igmp snooping querier address ............................................................................ 1526
21.9.5.9 igmp snooping querier query-interval ....................................................................... 1527
21.9.5.10 ip igmp snooping profile .......................................................................................... 1528
21.9.5.11 ip igmp snooping filter profile ................................................................................... 1529
21.9.5.12 ip igmp snooping max-groups .................................................................................. 1530
21.9.5.13 ip igmp version ......................................................................................................... 1532
21.9.5.14 clear ip igmp snooping counters............................................................................... 1532
21.9.5.15 clear ip igmp snooping filter .................................................................................... 1533
21.9.5.16 show ip igmp snooping............................................................................................. 1534
21.9.5.17 show ip igmp snooping groups................................................................................. 1534
41
21.9.5.18 show ip igmp snooping interfaces ............................................................................ 1536
21.9.5.19 show ip igmp snooping membership ........................................................................ 1537
21.9.5.20 show ip igmp snooping mrouter ............................................................................... 1537
21.9.5.21 show ip igmp snooping querier................................................................................. 1538
21.9.5.22 show ip igmp snooping querier-guard ...................................................................... 1539
21.9.5.23 show ip igmp snooping querier counters.................................................................. 1540
21.9.5.24 show ip igmp snooping statistics .............................................................................. 1541
21.9.5.25 show ip igmp snooping vlan ..................................................................................... 1542
21.9.5.26 show ip igmp snooping profile ................................................................................ 1542
21.9.5.27 show ip igmp snooping filter ................................................................................... 1544
22 Appendixes................................................................................................................................1547
22.1 Appendix: Ethernet Storage Fabric (ESF)........................................................................... 1547
22.1.1 ESF Configuration using Ansible.................................................................................... 1547
22.1.2 ESF Configuration Using CLI ......................................................................................... 1548
22.1.2.1 Switch Configuration ................................................................................................ 1548
22.1.2.2 IPL Configuration...................................................................................................... 1549
22.1.2.3 MAGP Configuration ................................................................................................ 1549
22.1.2.4 MLAG Interface Configuration.................................................................................. 1551
22.1.2.5 MLAG VIP Configuration .......................................................................................... 1553
22.1.2.6 Server Configuration ................................................................................................ 1553
22.1.3 ESF Maintenance, Monitoring and Troubleshooting ......................................................1554
22.1.3.1 MLAG Upgrade Procedure....................................................................................... 1554
22.1.3.2 Monitoring and Troubleshooting ............................................................................... 1554
22.1.4 ESF Setup Examples ..................................................................................................... 1565
22.1.4.1 Single Rack with Two Switches Connected in MLAG .............................................. 1566
22.1.4.2 Scale-out Common Deployments............................................................................. 1567
22.2 Appendix: Enhancing System Security According to NIST SP 800-131A ........................... 1567
22.2.1 Web Certificate ............................................................................................................... 1568
22.2.2 SNMP ............................................................................................................................. 1569
22.2.3 HTTPS............................................................................................................................ 1569
22.2.4 Code Signing.................................................................................................................. 1571
22.2.5 SSH ................................................................................................................................ 1571
22.2.6 LDAP .............................................................................................................................. 1571
22.3 Appendix: Show Commands Not Supported By JSON API ................................................ 1572
22.4 Appendix: What Just Happened (WJH) Events................................................................... 1575
23 Support and Other Resources...................................................................................................1579
23.1 Accessing Hewlett Packard Enterprise Support.................................................................. 1579
23.1.1 Information to Collect ..................................................................................................... 1579
42
23.2 Accessing Updates.............................................................................................................. 1579
23.3 Customer Self Repair .......................................................................................................... 1579
23.3.1 Remote Support ............................................................................................................. 1579
23.3.2 Remote Support and Proactive Care Information ..........................................................1580
23.3.3 Proactive Care Customer Information ............................................................................ 1580
23.4 Warranty Information ........................................................................................................... 1580
23.4.1 Additional Warranty Information ..................................................................................... 1580
23.5 Regulatory Information ........................................................................................................ 1580
23.5.1 Additional Regulatory Information .................................................................................. 1580
23.6 Documentation Feedback ................................................................................................... 1580
23.7 General Websites ................................................................................................................ 1581
24 Document Revision History .......................................................................................................1582
43
Welcome to Onyx Documentation
Onyx® operating system enables the management and configuration of HPE M-Series system platforms.
Onyx provides a full suite of management options, including support for SNMPv1, 2, 3, and web user interface
(WebUI). In addition, it incorporates a familiar industry-standard CLI, which enables administrators to easily configure
and manage the system.
These pages provide information about the scope, organization, and command line interface of Onyx as well as
configuration examples.
44
1 Intended Audience
These pages are intended for network administrators who are responsible for configuring and managing HPE M-Series'
switch platforms.
45
2 Related Documentation
The following table lists the documents referenced in this User Manual.
System Hardware User Manual This document contains hardware descriptions, LED
assignments, and hardware specifications, among other things
Switch Product Release Notes Please look up the relevant switch system/series release note file
Virtual Modular Switch Reference Guide This reference architecture provides general information
concerning L2 and L3 Virtual Modular Switch (VMS)
configuration and design
46
3 Revision History
A list of the changes made to this document are provided in Document Revision History.
47
4 Glossary
Term Description
• Authentication—verifies user credentials (username and password)
• Authorization—grants or refuses privileges to a user/client for accessing specific services
• Accounting—tracks network resources consumption by users
ARP Address Resolution Protocol. A protocol that translates IP addresses into MAC addresses for
communication over a local area network (LAN).
CLI Command Line Interface. A user interface in which you type commands at the prompt.
DCBX Should be Data Center Bridging eXchange—an extension of Link Layer Data Protocol to
discover DCB compliant peers and exchange configuration information
DHCP The Dynamic Host Configuration Protocol (DHCP) is an automatic configuration protocol used
on IP networks.
DNS Domain Name System. A hierarchical naming system for devices in a computer network.
ETS Enhanced Transmission Selection provides a common management framework for assignment
of bandwidth to traffic classes.
FTP/TFTP/sFTP File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host
to another over a TCP-based network, such as the Internet.
Gateway A network node that interfaces with both InfiniBand and Ethernet, using different network
protocols.
HA High Availability. A system design protocol that provides redundancy of system components,
thus enables overcoming single or multiple failures in minimal downtime.
Host A computer platform executing an Operating System which may control one or more network
adapters
48
Term Description
LACP Link Aggregation Control Protocol (LACP) provides a method to control the bundling of
several physical ports together to form a single logical channel. LACP allows a network device
to negotiate an automatic bundling of links by sending LACP packets to the peer (directly
connected device that also implements LACP).
LDAP The Lightweight Directory Access Protocol is an industry standard application protocol for
accessing and maintaining distributed directory information services over an IP network.
LLDP Link Layer Discovery Protocol. A vendor neutral link layer protocol used by network devices to
advertise their identify, capabilities and for neighbor discovery.
MAC A Media Access Control address (MAC address) is a unique identifier assigned to network
interfaces for communications on the physical network segment. MAC addresses are used for
numerous network technologies and most IEEE 802 network technologies including Ethernet.
MTU Maximum Transfer Unit. The maximum size of a packet payload (not including headers) that
can be sent /received from a port.
Network A hardware device that allows for communication between computers in a network.
Adapter
NTP Network Time Protocol. A protocol for synchronizing computer clocks in a network.
PFC/FC Priority Based Flow Control applies pause functionality to traffic classes OR classes of service
on the Ethernet link.
PTP IEEE-1588 Precision Time Protocol. A high-accuracy time transfer protocol for synchronizing computer
clocks in a network.
RADIUS Remote Authentication Dial In User Service. A networking protocol that enables AAA
centralized management for computers to connect and use a network service.
RDMA Remote Direct Memory Access. Accessing memory in a remote side without involvement of the
remote CPU.
RoCE RDMA over Converged Ethernet. A network protocol that leverages Remote Direct Memory
Access (RDMA) capabilities to accelerate communications between applications hosted on
clusters of servers and storage arrays.
RSTP Rapid Spanning Tree Protocol. A spanning-tree protocol used to prevent loops in bridge
configurations. RSTP is not aware of VLANs and blocks ports at the physical level.
SCP Secure Copy or SCP is a means of securely transferring computer files between a local and a
remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol.
SNMP Simple Network Management Protocol. A network protocol for the management of a network
and the monitoring of network devices and their functions.
49
Term Description
SSH Secure Shell. A protocol (program) for securely logging in to and running programs on remote
machines across a network. The program authenticates access to the remote machine and
encrypts the transferred information through the connection.
TACACS+ Terminal Access Controller Access-Control System Plus. A networking protocol that enables
access to a network of devices via one or more centralized servers. TACACS+ provides separate
AAA services.
50
5 Feature Overview
Security • SSH
• Telnet
• RADIUS
• TACACS+
51
5.2 Ethernet Features
Feature Detail
52
Layer 3 Feature Set • 64 VRFs
• IPv4 & IPv6 Routing inc Route maps:
• BGP4, OSPFv2
• PIM-SM & PIM-SSM (inc PIM-SM over MLAG)
• BFD (BGP, OSPF, static routes)
• VRRP
• MAGP
• DHCPv4/v6 Relay
• Router Port, int Vlan, NULL Interface for Routing
• ECMP, 64-way
• IGMPv2/v3 Snooping Querier
53
Monitoring & Telemetry • What Just Happened (WJH)
• sFlow
• Real time queue depth histograms & thresholds
• Port mirroring (SPAN & ERSPAN)
• Enhanced Link & Phy Monitoring
• BER degradation monitor
• Enhanced health mechanism
• 3rd party integration (Splunk, etc.)
Security • USA Department of Defense certification—UC APL
• System secure mode—FIPS 140-2 compliance
• Storm Control
• Access Control Lists (ACLs L2-L4 & user defined)
• 802.1X—Port Based Network Access Control
• SSH server strict mode—NIST 800-181A
• CoPP (IP filter)
• Port isolation
54
6 Getting Started
The procedures described in this page assume that you have already installed and powered on your switch according to
the instructions in the Hardware Installation Guide, which was shipped with the product.
Due to California Senate Bill No. 327, starting from software version 3.8.2000, Admin and Monitor passwords
will need to be typed in manually—no automatic passwords will be created by default.
When the reset button is held for 15 seconds, the management module is reset and the password is deleted.
You will then be able to enter without a password and make a new password for the user admin.
Any account created with admin privileges can change all passwords of other user accounts, including other
user accounts with admin privileges.
DHCP is enabled by default over the MGT port. Therefore, if you have configured your DHCP server
and connected an RJ-45 cable to the MGT port, simply log in using the designated IP address.
2. Configure a serial terminal with the settings described below.
This step may be skipped if the DHCP option is used and an IP is already configured for the MGT port.
Parameter Setting
Data bits 8
Stop bits 1
Parity None
3. The boot menu is prompted.
55
Onyx Boot Menu:
1: <image #1>
2: <image #2>
u: USB menu (if USB device is connected) (password required)
c: Command prompt (password required)
Choice:
Select “0” to boot with software version installed on partition #1.
Select “1” to boot with software version installed on partition #2.
The boot menu features a countdown timer. It is recommended to allow the timer to run out by not selecting any
of the options.
4. Login as admin and use admin as password. If the machine is still initializing, you might not be able to access
the CLI until initialization completes. As an indication that initialization is ongoing, a countdown of the number
of remaining modules to be configured is displayed in the following format: “<no. of modules> Modules are
being configured”.
5. Go through the Switch Management configuration wizard.
IP configuration by DHCP:
Do you want to use the wizard for You must perform this configuration the first time
initial configuration? yes you operate the switch or after resetting the switch
to the factory defaults. Type “y” and then press
<Enter>.
Step 1: Hostname? [switch-1] If you wish to accept the default hostname, then
press <Enter>. Otherwise, type a different hostname
and press <Enter>.
Step 2: Use DHCP on mgmt0 Perform this step to obtain an IP address for the
interface? [yes] switch. (mgmt0 is the management port of the
switch.)
- If you wish the DHCP server to assign the IP
address, type “yes” and press <Enter>.
If you type “no” (no DHCP), then you will be asked
whether you wish to use the “zeroconf”
configuration or not. If you enter “yes” (yes
Zeroconf), the session will continue as shown in the
"IP zeroconf configuration" table.
If you enter “no” (no Zeroconf), then you need to
enter a static IP, and the session will continue as
shown in the "Static IP configuration" table.
56
Wizard Session Display (Example) Comments
Step 3: Enable IPv6 [yes] Perform this step to enable IPv6 on management
ports.
If you wish to enable IPv6, type “yes” and press
<Enter>.
If you enter “no” (no IPv6), then you will
automatically be referred to Step 5.
Step 4: Enable IPv6 autoconfig Perform this step to enable StateLess address
(SLAAC) on mgmt0 interface autoconfig on external management port.
If you wish to enable it, type “yes” and press
<Enter>.
If you wish to disable it, enter “no”.
Step 5: Use DHCPv6 on mgmt0 Perform this step to enable DHCPv6 on the
interface? [yes] MGMT0 interface.
Step 6: Update time? Perform this step to change the time configured.
Press enter to leave the current time.
If you wish to enable it, type “yes” and press
<Enter>.
If you wish to disable it, enter “no”.
Step 8: Admin password (Must be To avoid illegal access to the machine, please type a
typed)? <new_password> password and then press <Enter>.
Step 9: Confirm admin password? Confirm the password by re-entering it. Note that
<new_password> password characters are not printed.
57
Wizard Session Display (Example) Comments
Step 10: Monitor password (Must be To avoid illegal access to the machine, please type a
typed)? <new_password> password and then press <Enter>.
Step 11: Confirm monitor password? Confirm the password by re-entering it. Note that
<new_password> password characters are not printed.
You have entered the following The wizard displays a summary of your choices and
information: then asks you to confirm the choices or to re-edit
Hostname: <switch name> them.
Use DHCP on mgmt0 interface: yes
Enable IPv6: yes Either press <Enter> to save changes and exit, or
Enable IPv6 autoconfig (SLAAC) on enter the configuration step number that you wish
mgmt0 interface: yes to return to.
Enable DHCPv6 on mgmt0 interface:
no To run the command “configuration jump-start”
Update time: <current time> you must be in Config mode.
Enable password hardening: yes
Admin password (Enter to leave
unchanged): (CHANGED)
To change an answer, enter the step
number to return to.
Otherwise hit <enter> to save
changes and exit.
Choice: <Enter>
Configuration changes saved.
To return to the wizard from the
CLI, enter the “configuration jump-
start” command
from configuration mode. Launching
CLI...
<switch name> [standalone: master]
>
Static IP configuration:
58
Wizard Session Display (Example)
Hostname: switch-112126
Use DHCP on mgmt0 interface: no
Use zeroconf on mgmt0 interface: no
Primary IP address: 192.168.10.4
Netmask: 255.255.255.0
Default gateway: 192.168.10.1
Primary DNS server:
Domain name:
Enable IPv6: yes
Enable IPv6 autoconfig (SLAAC) on mgmt0 interface: no
Update time: yyyy/mm/dd hh:mm:ss
Enable password hardening: yes
Admin password (Enter to leave unchanged): (unchanged)
Choice:
To return to the wizard from the CLI, enter the “configuration jump-
start” command from configure mode. Launching CLI...
<hostname>[standalone: master] >
IP zeroconf configuration:
59
Wizard Session Display (Example)
Hostname: switch-112126
Use DHCP on mgmt0 interface: no
Use zeroconf on mgmt0 interface: yes
Default gateway: 192.168.10.1
Primary DNS server:
Domain name:
Enable IPv6: yes
Enable IPv6 autoconfig (SLAAC) on mgmt0 interface: yes
Update time: yyyy/mm/dd hh:mm:ss
Enable password hardening: yes
Admin password (Enter to leave unchanged): (unchanged)
Choice:
To return to the wizard from the CLI, enter the “configuration jump-
start”
command from configure mode. Launching CLI...
<hostname> [standalone: master] >
6. Check the mgmt0 interface configuration before attempting a remote (for example, SSH) connection to the
switch. Specifically, verify the existence of an IP address.
60
switch # show interfaces mgmt0
Interface mgmt0 status:
Comment :
Admin up : yes
Link up : yes
DHCP running : yes
IP address : 10.12.67.34
Netmask : 255.255.0.0
IPv6 enabled : yes
Autoconf enabled: no
Autoconf route : yes
Autoconf privacy: no
DHCPv6 running : no
IPv6 addresses : 1
IPv6 address:
fe80::268a:7ff:fe53:3d8e/64
Speed : 1000Mb/s (auto)
Duplex : full (auto)
Interface type : ethernet
Interface source: physical
MTU : 1500
HW address : 00:02:C9:11:A1:B2
Rx:
11700449 bytes
55753 packets
0 mcast packets
0 discards
0 errors
0 overruns
0 frame
Tx:
5139846 bytes
28452 packets
0 discards
0 errors
0 overruns
0 carrier
0 collisions
1000 queue len
61
6.1.2 Rerunning the Wizard
To rerun the wizard:
1. Enter Config mode. Run:
WebUI access is enabled by default. To disable web access, run the command “no web http enable” or
“no web https enable” on the CLI.
1. Set up an Ethernet connection between the switch and a local network machine using a standard RJ-45
connector.
2. Open a web browser that is Firefox, Chrome, Internet Explorer, or Safari.
62
Make sure the screen resolution is set to 1024*768 or higher.
3. Type the IP address of the switch or its DNS name in the following format: https://<switch_IP_address>.
4. Log into the switch (default user name is admin, password admin).
5. Read and accept the EULA, if prompted.
The prompt will only occur if the switch has never been accessed through the CLI before.
6. The Welcome popup appears. After reading through the content, click OK to continue.
To reach the OS documentation, click on the links under the Documentation heading.
The link under What’s New takes leads to the Changes and New Features section of the switch OS Release
Notes. You may also tick the box to not show this popup again. To see this window again, click “Product
Documents” on the upper right corner of the WebUI.
7. A default status summary is displayed.
63
The user-defined docker image can be used by customers to run their own applications in a sandbox on their
platform. They can therefore also be used for automating initial configuration.
The item value can be empty, but the comma shall not be omitted.
To have DHCP server discern the proper files based on switch-specific information, the OS must provide identifying
information for the server to classify the switches. In addition, the OS attaches option 43 (vendor-specific information)
and option 60 (vendor class identifier) in DHCPv4 requests and option 17 (vendor-opts) in DHCPv6. Option 60 is set as
string “Mellanox” and options 17 and 43 contain the following Mellanox-specific sub-options:
• System Model
• Chassis Part Number
• Chassis Serial Number
• Management MAC
• System Profile
• Onyx® Release Version
The corresponding subtypes respectively are defined as:
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_MODEL 1
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_PARTNUM 2
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_SERIAL 3
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_MAC 4
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_PROFILE 5
DHCP_VENDOR_ENCAPSULATED_SUBOPTION_TLV_TYPE_RELEASE 6
Upon receiving such DHCP requests from a client, the server should be able to map the switch-specific information to
the target file URLs according to predefined rules.
Once the OS receives the URLs from the DHCP server, it executes ZTP as follows:
If the software image URL is not specified, this step is skipped. Otherwise:
a. Perform disk space cleanup if necessary and fetch the image if it does not exist locally
b. Resolve the image version:
c. If it is already installed on active partition, proceed to step 2
d. If it is installed on a standby partition, switch partition and reboot
e. If it is not installed locally, install it and switch to the new image and then reboot
64
f. If a reboot occurs, ZTP performs step 1 again and no image upgrade will occur
If configuration file URL is not specified, skip this step. Otherwise:
a. Fetch the configuration file
b. Apply the configuration file
Skip these steps if a docker image file URL is not specified. Otherwise:
a. Fetch the docker image file
b. Load the docker image
c. Clean up the docker images with the same name and different tag.
d. Start the container based on the image
e. Remove the downloaded docker image file
While performing file transfer via HTTP, the same information as DHCP option 43 is expected to be carried in
a HTTP GET request. This switch software supports the following proprietary HTTP headers:
• MlnxSysProfile
• MlnxMgmtMac
• MlnxSerialNumber
• MlnxModelName
• MlnxPartNumber
• MlnxReleaseVersion
If some sort of failure occurs, the switch waits a random number of seconds between 1 and 20 and reattempts the
operation. The switch attempts this up to 10 times.
ZTP progress is printed to terminals including console and active SSH sessions.
host master {
hardware ethernet E4:1D:2D:5B:72:80;
fixed-address 3.1.2.13;
option tftp-server-name "scp://<user>:<password>@3.1.3.100/ztp/,scp://
<user>:<password>@3.1.3.100/ztp/,scp://
<user>:<password>@3.1.3.100/ztp/";
option bootfile-name "image-X86_64-3.6.4612.img, switch-1.conf,
ubuntu.img.gz";
}
65
6.4.4 DHCPv6 Configuration Example
The following is a DHCPv6 configuration example:
host master {
......
option dhcp6.bootfile-url "scp://<user>:<password>@[2000::1]/ztp/image-
X86_64-
3.6.4612.img, scp://<user>:<password>@[2000::1]/
ztp/
switch.conf, scp://<user>:<password>@[2000::1]/ztp/
ubuntu.img.gz";
}
no zero-touch suppress-write
no zero-touch suppress-write
Default Enabled
History 3.6.5000
Notes When ZTP is active, “configuration write” is suppressed because it may interfere
with ZTP operation. Therefore, after running “no zero-touch suppress-write” if
“configuration write” is performed, then ZTP is disabled as a consequence of the
database save.
66
zero-touch abort
zero-touch abort
Default Enabled
History 3.6.5000
Notes
show zero-touch
show zero-touch
Default N/A
67
History 3.6.5000
Notes
6.5 Licenses
The software package can be extended with premium features. Installing a license allows you to access the specified
premium features
This section is relevant only to switch systems with an internal management capability.
68
Upgrade Licenses OPN Valid on Product Description
3. Install the license using the key. Run:
4. Display the installed license(s) using the following command. Run:
Make sure that the “Valid” and “Active” fields both indicate “yes”.
5. Save the configuration to complete the license installation. Run:
If you do not save the installation session, you will lose the license at the next system start up.
69
2. Click the Setup tab and then Licensing on the left side navigation pane.
3. Enter your license key(s) in the text box. If you have more than one license, please enter each license in a
separate line. Click “Add Licenses” after entering the last license key to install them.
If you wish to add another license key in the future, you can simply enter it in the text box and click
“Add Licenses” to install it.
70
If you do not save the installation session, you will lose the installed licenses at the next system boot.
To obtain the switch’s chassis serial number:
1. Login to the switch.
2. Retrieve the switch’s chassis serial number using the command “show inventory”.
3. Once you receive the license key, you can install the license as described in the previous pages.
71
• ZTP and OS Upgrade
• DHCPv4 Configuration Example
• DHCPv6 Configuration Example
• ZTP Commands
• no zero-touch suppress-write
• zero-touch abort
• show zero-touch
• Licenses
• Installing OS License via CLI
• Installing OS License via Web
• Autopass License Support
• Retrieving a Lost License Key
• License Commands
• file eula upload
• file help-docs upload
• license delete
• license install
• show licenses
Uploads the
Default N/A
Configuration config
Mode
History 3.4.1100
72
Related license
Commands
Notes N/A
Default N/A
History 3.4.1100
Onyx_User_Manual_v3_6_6000_for_HPE_Ethernet.pdf <scp://
username[:password]@hostname/path/filename>
Related Commands
Notes
73
Syntax Description N/A
Default N/A
History 3.4.1100
Notes Before deleting a license from a switch which is configured to a system profile other than
its default, the user must first disable all interfaces and then return the switch to its default
system profile.
license install<license-number>
Default N/A
History 3.4.1100
Notes
74
6.5.5.5 show licenses
show licenses
Default N/A
Configuration config
Mode
History 3.4.1100
75
7 User Interfaces
The following pages provide information on the interfaces available for users to manage and validate the status of
their switch system.
Standard When the CLI is launched, it begins in Standard mode. This is the most restrictive mode
and only has commands to query a restricted set of state information. Users cannot take
any actions that directly affect the system, nor can they change any configuration.
Enable The "enable" command moves the user to Enable mode. This mode offers commands to
view all state information and take actions like rebooting the system, but it does not
allow any configurations to be changed. Its commands are a superset of those in
Standard mode.
config The "configure terminal" command moves the user from Enable mode to Config mode.
Config mode is allowed only for user accounts with the “admin” role (or capabilities).
This mode has a full unrestricted set of commands to view anything, take any action, and
change any configuration. Its commands are a superset of those in Enable mode. To
return to Enable mode, enter the command "exit" or "no configure".
Note that moving directly between Standard and Config mode is not possible.
config interface Configuration mode for management interface mgmt0, mgmt1, and loopback
management
76
Configuration Mode Description
"no" parameter When the "no" form of the command is used, the command is erased from the running-
config and reverts to either the default or inherited value. Note that if used on a string
(e.g., password), that value is either removed unless it can be inherited. If used on a
boolean value, it is FALSE unless it has either a default or an inherited value. See
example in "Using the “no” Command Form" section.
“disable” parameter When the "disable" form of the command is used, it creates an entry in running-config
that prevents inheritance and reverts to the default system settings. If used on a string
(e.g., password), that value is removed (it cannot be inherited). If used on a boolean
value, the value is set to FALSE (it cannot be inherited).
[ ] Square Indicate optional parameters. Only one parameter out of the [destination-ip |
brackets parameters listed with in the brackets can be used—the user cannot destination-port |
have a combination of the parameters unless stated otherwise. destination-mac]
{ } Braces Indicate alternatives or variables that are required for the parameter in [mode {active | on |
square brackets. passive}]
Do not use the angled or square brackets, vertical bar, or braces in command lines. This guide uses these
symbols only to show the different entry types.
77
7.1.3 Getting Help
Context-sensitive help may be requested at any time by pressing “?” in the command line. This will show a list of
choices for the word that is currently selected or, if nothing has been typed yet, will show a list of top-level commands.
For example, typing "?" in the command line in Standard mode, will provide a link of the following available
commands.
switch > ?
cli Configure CLI shell options
enable Enter enable mode
exit Log out of the CLI
help View description of the interactive help system
no Negate or clear certain configuration options
show Display system configuration or statistics
slogin Log into another system securely using ssh
switch Configure switch on system
telnet Log into another system using telnet
terminal Set terminal parameters
traceroute Trace the route packets take to a destination
switch >
Typing a legal string and then pressing “?” without a space character before it, will provide either a description of the
command that was typed so far or the possible command/parameter completions. Typing “?” after a space character and
“<cr>” is shown, means that, so far, a complete command has been typed. Pressing Enter (carriage return) will execute
the command.
Try the following, to get started:
?
show ?
show c?
show clock?
show clock ?
show interfaces ? (from enable mode)
Enter “help” to view a description of the interactive help system.
Note also that the CLI supports command and/or parameter tab-completions and their shortened forms. For example,
you can enter “en” instead of the “enable” command, or “cli cl” instead of “cli clear-history”. In case of ambiguity (in
case more than one completion option is available), press Tabs twice to obtain the disambiguation options. Thus, to
learn which commands start with the letter “c”, type “c” and click twice on the Tab key to get the following:
switch # c<tab>
clear cli configure
switch # c
This signifies that there are three commands that start with the letter “c”: "clear", "cli", and "configure".
78
7.1.4 Prompt and Response Conventions
The prompt always begins with the hostname of the system. What follows depends on what command mode the user is
in. To demonstrate by example, assuming the machine name is “switch”, the prompts for each of the modes are:
The following session shows how to move between command modes:
Commands entered do not print any response and simply show the command prompt after pressing <Enter>.
If an error is encountered while executing a command, the response will begin with “%”, followed by a description of
the error.
79
// 1. Display the current CLI session options
switch (config) # show cli
CLI current session settings:
Maximum line size: 8192
Terminal width: 157 columns
Terminal length: 60 rows
Terminal type: xterm
Auto-logout: 15 minutes
Paging: enabled
Progress tracking: enabled
Prefix modes: enabled
...
// 2. Disable auto-logout
switch (config) # no cli session auto-logout
// 3. Display the new CLI session options
switch (config) # show cli
CLI current session settings:
Maximum line size: 8192
Terminal width: 157 columns
Terminal length: 60 rows
Terminal type: xterm
Auto-logout: disabled
Paging: enabled
Progress tracking: enabled
Prefix modes: enabled
...
// 4. Re-enable auto-logout after 15 minutes
switch (config) # cli session auto-logout 15
// 5. Display the final CLI session options
switch (config) # show cli
CLI current session settings:
Maximum line size: 8192
Terminal width: 157 columns
Terminal length: 60 rows
Terminal type: xterm
Auto-logout: 15 minutes
Paging: enabled
Progress tracking: enabled
Prefix modes: enabled
...
Parameter Description
<hostname> A hostname (e.g., “switch-1”)
80
Parameter Description
<ifname> An interface name (e.g., “mgmt0”, “mgmt1”, “lo” (loopback), and so forth).
<log level> A syslog logging severity level. Possible values, from least to most severe, are as follows:
“debug”, “info”, “notice”, “warning”, “error”, “crit”, “alert”, “emerg”.
<GUID> Globally unique identifier. A number that uniquely identifies a device or component.
<MAC A MAC address. The segments may be 8 bits or 16 bits at a time, and may be delimited by “:” or
address> “.” (e.g., “11:22:33:44:55:66”, “1122:3344:5566”, “11.22.33.44.55.66”, or “1122.3344.5566”).
<netmask> A netmask (e.g., “255.255.255.0”) or mask length prefixed with a slash (e.g., “/24”). Both
examples express the same information in different formats.
<network An IPv4 network prefix specifying a network. Used in conjunction with a netmask to determine
prefix> which bits are significant. e.g., “192.168.0.0”.
<regular An extended regular expression as defined by the “grep” in the main page. (The value provided
expression> here is passed on to “grep -E”.)
<node id> ID of a node belonging to a cluster. This is a numerical value greater than zero.
<TCP port> A TCP port number in the full allowable range [0...65535].
81
Parameter Description
<URL> A normal URL, using any protocol that wget supports, including HTTP, HTTPS, FTP, SFTP, and
TFTP or a pseudo-URL specifying an scp file transfer. The scp pseudo-URL format is scp://
username:password@hostname/path/filename.
Note that the path is an absolute path. Paths relative to the user's home directory are not currently
supported. Because the implementation of FTP does not support authentication, use SCP or SFTP
for that.
Note also that omitting “:password” part, may require entering the password in a follow-up
prompt, where it can be typed in securely (without the characters being echoed). This prompt will
occur if the “cli default prompt empty-password” setting is true; otherwise, the CLI will assume
that no password is desired. Including the “:” character, will be taken as an explicit declaration
that the password is empty and no prompt will appear.
The filtering parameters are separated from the show command they filter by a pipe character (“|”). Quotation marks
may be used to include or exclude a string including space, and multiple filters can be used simultaneously as shown in
the example below.
Example:
82
switch (config) # show asic-version | include SPC
MGMT SPC 13.1601.3150
switch (config) # show module | exclude PS
======================
Module Status
======================
MGMT ready
FAN1 ready
FAN2 ready
switch (config) # show interfaces | include "Eth|discard pac"
Eth1/1
0 discard packets
0 discard packets
Eth1/2
0 discard packets
0 discard packets
Eth1/3
0 discard packets
0 discard packets
Eth1/4
0 discard packets
0 discard packets
switch (config) # show interfaces | include "Tx" next 5 | exclude broad
Tx
0 packets
0 unicast packets
0 multicast packets
0 bytes
--
Running this command displays a show-command output that is updated at a time interval specified by the “interval”
parameter (2 seconds is the default).
The “diff” parameter highlights the differences between each iteration of the command.
For example running the command “show power | watch diff interval 1” yields something similar to the following:
83
-----------------------------------------------------------------------
Module Device Sensor Power Voltage Current Feed Status
[Watts] [Watts] [Amp]
-----------------------------------------------------------------------
PS1 power-mon input 85.00 230.00 0.38 AC OK
PS2 power-mon - - - - - FAIL
Total power used : 85.00 Watts
Total power capacity : 460.00 Watts
Total power available : 375.00 Watts
Maximum consumed power of all turned on modules: 46.00 Watts
With the highlighted black blocks indicating the change that has occurred between one iteration of the command from
one second to the next.
To exit “watch” mode, press Ctrl+C.
The “watch” option may be used in conjunction with the “include” and “exclude” options as follows:
Example:
It is possible to count the number of lines in an output of a “show” command by using the following command:
Example:
84
Running the command displays an output of the “show” command in JSON syntax structure instead of its regular
format. See the following as an example:
The “json-print” option cannot be used together with filtering (“include” and “exclude”) and/or monitoring (“watch”).
For more information on JSON usage, please refer to “JSON API”.
Ctrl-d If cursor is in the middle of the line, delete one character forward
If cursor is at the end of the line, show autocomplete options for current word or word
fragment
If cursor at an empty line, same as Esc
85
Key Combination Description
Ctrl-l Clear screen and show line at the top of terminal window
Ctrl-y Retrieve (“yank”) last item deleted
86
7.2 Secure Shell (SSH)
To add entries to the global known-hosts configuration file and its SSH value, do the following.
1. Change to Config mode.
2. Add an entry to the global known-hosts configuration file and its SSH value.
RSA2 and a DSA2 host keys are generated by default. The RSA2 key can be used as SSH server and
client, while DSA2 key can only be used as SSH client.
When the switch is a server, use RSA key to connect to the
Onyx device.
When the switch is a client (e.g., downloading image or uploading logs), RSA key is recommended.
DSA key is only for legacy devices and has been deprecated by OpenSSH starting with the 7.0 release.
87
2. Add the flag "-h" after "cli" to notify the system to halt on failure and pass through the exit code.
The maximum allowed number of WebUI session is 225. Trying to open new sessions beyond this limitation is
rejected.
88
3. Only after successfully changing the admin password (this must be done first), change the monitor password. If
the password is not changed, all pages (besides the logout page) will be locked.
4. After successfully changing the monitor password, the home page may be accessed and the system may be
used.
5. Click on the home page link or wait 5 seconds until the countdown reaches 0 and the page is redirected
automatically.
Warning: Entering the monitor user before the default password is changed will block the system (all pages
besides the logout page will be blocked).
89
Make sure to save your changes before switching between menus or submenus. Click the “Save” button to the
right of “Save Changes?”.
Interfaces Obtains the status of, configures, or disables interfaces to the fabric. Thus,
you can: set or clear the IP address and netmask of an interface; enable
DHCP to dynamically assign the IP address and netmask; and set interface
attributes such as MTU, speed, duplex, etc.
Routing Configures, removes or displays the default gateway, and the static and
dynamic routes
90
Submenu Title Description
Login Messages Edits the login messages: Message of the Day (MOTD), Remote Login
message, and Local Login message
Address Resolution Adds static and dynamic ARP entries, and clears the dynamic ARP cache
SNMP Configures SNMP attributes, SNMP admin user, and trap sinks
Email Alerts Configures the destination of email alerts and the recipients to be notified
XML gateway Provides an XML request-response protocol to get and set hardware
management information
Logging Sets up system log files, remote log sinks, and log formats
Date and Time Configures the date, time, and time zone of the switch system
91
Submenu Title Description
Modules Displays a graphic illustration of the system modules. By moving the mouse
over the ports in the front view, a pop-up caption is displayed to indicate the
status of the port. The port state (active/down) is differentiated by a color
scheme (green for active, gray/black for down). By moving the mouse over the
rear view, a pop-up caption is displayed to indicate the leaf part information.
Inventory Displays a table with the following information about the system modules:
module name, type, serial number, ordering part number and ASIC firmware
version
Power Management Displays a table with the following information about the system power
supplies: power supply name, power, voltage level, current consumption, and
status. A total power summary table is also displayed providing the power
used, the power capacity, and the power available.
OS Upgrade Displays the installed OS images (and the active partition), uploads a new
image, and installs a new image
Reboot Reboots the system. Make sure that you save your configuration prior to
clicking reboot.
92
Submenu Title Description
Summary Displays general information about the switch system and the OS
image, including current date and time, hostname, uptime of system,
system memory, CPU load averages, etc.
93
Submenu Title Description
Profile and Capabilities Displays general information about the switch system capabilities such
as the enabled profiles (e.g IB/ETH) and their corresponding values
What Just Happened Displays and configures What Just Happened packet drop reasons
Temperature Provides a graphical display of the switch module sensors’ temperature
levels over time (1 hour). It is possible to display either the temperature
level of one module’s sensor or the temperature levels of all the module
sensors’ together.
Fans Provides a graphical display of fan speeds over time (1 hour). The
display is per fan unit within a fan module.
CPU Load Provides a graphical display of the management CPU load over time (1
hour)
Logs Displays the system log messages. It is possible to display either the
currently saved system log or a continuous system log.
Alerts Displays a list of the recent health alerts and enables the user to
configure health settings
94
Submenu Title Description
MAC Table Configures static mac addresses in the switch, and displays the
MAC address table
Link Aggregation Configures and monitors aggregated Ethernet links (LAG) and
configures LACP
BGP IPv4 Displays the Border Gateway Protocol (BGP) IPv4 information
BGP IPv6 Displays the Border Gateway Protocol (BGP) IPv6 information
IP Route Configures, removes, and displays the routing table for router
interfaces
Address Resolution Displays the address resolution (ARP) table for router interfaces
95
7.4 UI Commands
• CLI Session
• cli clear-history
• cli default
• cli max-sessions
• cli session
• terminal
• terminal sysrq enable
• show cli
• show cli max-sessions
• show cli num-sessions
• Banner
• banner login
• banner login-local
• banner login-remote
• banner logout
• banner logout-local
• banner logout-remote
• banner motd
• show banner
• SSH
• ssh server enable
• ssh server host-key
• ssh server listen
• ssh server login attempts
• ssh server login timeout
• ssh server login record-period
• ssh server min-version
• ssh server ports
• ssh server security strict
• ssh server security strict
• ssh server x11-forwarding
• ssh client global
• ssh client user
• slogin
• show ssh client
• show ssh server
• show ssh server host-keys
• show ssh server login record-period
• Remote Login
• telnet
• telnet-server enable
• show telnet-server
• Web Interface
• web auto-logout
• web cache-enable
• web client cert-verify
• web client ca-list
• web enable
• web http
96
• web httpd
• web https
• web https ssl renegotiation enable
• web https ssl secure-cookie enable
• web proxy auth authtype
• web proxy auth basic
• web session timeout
• web session renewal
• show web
This section displays all the relevant commands used to manage CLI session terminal.
cli clear-history
Default N/A
History 3.1.0000
Notes
97
Syntax Description auto-logout Configures keyboard inactivity timeout for automatic logout. Range is
0-35791 minutes. Setting the value to 0 or using the no form of the
command disables the auto-logout.
Default N/A
History 3.1.0000
Notes
98
7.4.1.3 cli max-sessions
Default 30 sessions
History 3.5.0200
Notes
cli session {auto-logout <minutes> | paging enable | prefix-modes enable | progress enable
| terminal {length <size> | resize | type <terminal-type> | width} | x-display full <display>}
no cli session {auto-logout | paging enable | prefix-modes enable | progress enable |
terminal type | x-display}
Syntax Description minutes Configures keyboard inactivity timeout for automatic logout.
Range: 0-35791 minutes
Setting the value to 0 or using the no form of the command disables
the auto logout.
99
prefix-modes Configures the prefix modes feature of CLI and enables prefix modes
enable for current session.
terminal length Sets the number of lines for the current terminal.
Range: 5-999
terminal resize Resizes the CLI terminal settings (to match the actual terminal
window).
• ansi
• console
• dumb
• linux
• unknown
• vt52
• vt100
• vt102
• vt220
• xterm
Default N/A
History 3.1.0000
100
Notes The "minutes" attribute can be configured from the CLI shell only.
7.4.1.5 terminal
terminal {length <number of lines> | resize | type <terminal type> | width <number of
characters>}
no terminal type
Syntax Description length Sets the number of lines for this terminal.
Range: 5-999
resize Resizes the CLI terminal settings (to match with real terminal).
Default N/A
History 3.1.0000
Notes
101
7.4.1.6 terminal sysrq enable
Default Enabled
History 3.4.3000
Notes
show cli
Default N/A
History 3.1.0000
102
Example switch (config) # show cli
CLI current session settings:
Maximum line size: 8192
Terminal width: 171 columns
Terminal length: 38 rows
Terminal type: xterm
X display setting: (none)
Auto-logout: disabled
Paging: enabled
Progress tracking: enabled
Prefix modes: disabled
Notes
Default N/A
History 3.5.0200
103
Related Commands
Notes
Default N/A
History 3.5.0200
Related Commands
Notes
7.4.2 Banner
104
Configuration Mode Any command mode
History 3.5.0200
Notes If more than one word is used (there is a space) quotation marks should be added (i.e.,
“xxxx xxxx”).
Default ""
History 3.1.0000
105
7.4.2.3 banner login-remote
Default ""
History 3.1.0000
Sets system logout banner (for both local and remote logins).
The no form of the command resets the banner to its default value.
Default ""
History 3.1.0000
106
Notes If more than one word is used (there is a space) quotation marks should be added (i.e.,
“xxxx xxxx”).
Default ""
History 3.5.0200
Default ""
History 3.5.0200
107
Related Commands show banner
History 3.1.0000
Notes • If more than one word is used (there is a space) quotation marks should be added (i.e.,
“xxxx xxxx”).
• To insert a multi-line MotD, hit Ctrl-V (escape sequence) followed by Ctrl-J (new line
sequence). The symbol “^J” should appear. Then, whatever is typed after it becomes
the new line of the MotD. Remember to also include the string between quotation
marks.
show banner
108
Default N/A
History 3.1.0000
Banners:
Message of the Day (MOTD):
HPE Switch
Login:
HPE Switch Management
Logout:
Goodbye
Related Commands banner login banner login-local banner login-remote banner logout banner logout-local
banner logout-remote banner motd
Notes
7.4.3 SSH
History 3.1.0000
109
Notes Disabling SSH server does not terminate existing SSH sessions, it only prevents new ones
from being established.
private-key Sets new private-key for the host keys of the specified type.
public-key Sets new public-key for the host keys of the specified type.
generate Generates new RSA and DSA host keys for SSH.
History 3.1.0000
Notes RSA2 and a DSA2 host keys are generated by default. The RSA2 key can be used as SSH
server and client, while DSA2 key can only be used as SSH client.
When the switch is a server, use RSA key to connect to the Onyx device.
When the switch is a client (e.g. downloading image or uploading logs), RSA key is
recommended. DSA key is only for legacy devices and has been deprecated by OpenSSH
starting with the 7.0 release.
110
7.4.3.3 ssh server listen
Enables the listen interface restricted list for SSH. If enabled, and at least one non-DHCP
interface is specified in the list, the SSH connections are only accepted on those specified
interfaces.
The no form of the command disables the listen interface restricted list for SSH. When
disabled, SSH connections are not accepted on any interface.
Syntax Description enable Enables SSH interface restrictions on access to this system.
interface Adds interface to SSH server access restriction list. Possible interfaces
are “lo”, and “mgmt0”.
History 3.1.0000
Notes
interface Adds interface to SSH server access restriction list. Possible interfaces
are “lo”, and “mgmt0”.
Default 6 attempts
111
History 3.1.0000
Notes • The number configured with this command will be relevant only if it is equal or
smaller than the number of password prompts
• Be aware that the "aaa authentication attempts lockout max-fail" default is 5, and the
user might be locked before this command will have an affect. Both numbers need to
be configured
History 3.5.0200
Notes
112
7.4.3.6 ssh server login record-period
Configures the amount of days for counting the number of successful logins.
The no form of the command disabled this function.
Default Disabled
History 3.9.0300
Related Commands show ssh server login record-period show ssh server
Notes
Sets the minimum version of the SSH protocol that the server supports.
The no form of the command resets the minimum version of SSH protocol supported.
Default 2
History 3.1.0000
113
Notes
Default 22
History 3.1.0000
Default N/A
History 3.3.5060
3.6.4000
114
Example switch (config) # ssh server security strict
Notes The following ciphers are disabled for SSH when strict security is enabled:
• aes256-cbc
• aes192-cbc
• aes128-cbc
• [email protected]
• 3des-cbc
Default N/A
History 3.1.0000
Notes
115
Default Disabled
History 3.1.0000
Related Commands
Notes
Syntax Description host-key- Sets SSH client configuration to control how host key checking is
check performed. This parameter may be set in 3 ways.
<policy> • If set to “no” it always permits connection, and accepts any new or
changed host keys without checking
• If set to “ask” it prompts user to accept new host keys, but does not
permit a connection if there was already a known host entry that does
not match the one presented by the host
• If set to “yes” it only permits connection if a matching host key is
already in the known hosts file
Default host-key-check – ask, no keys are configured by default
Configuration config
Mode
History 3.1.0000
Notes
116
7.4.3.13 ssh client user
ssh client user <username> {authorized-key sshv2 <public key> | identity <key type>
{generate | private-key [<private key>] | public-key [<public key>]} | known-host
<known host> remove}
no ssh client user admin {authorized-key sshv2 <public key ID> | identity <key type>}
Adds an entry to the global known-hosts configuration file, either by generating new key,
or by adding manually a public or private key.
The no form of the command removes a public key from the specified user's authorized
key list, or changes the key type.
Syntax Description username The specified user must be a valid account on the system. Possible
values for this parameter are “admin”, “monitor”, “xmladmin”,
and “xmluser”.
authorized-key Adds the specified key to the list of authorized SSHv2 RSA or
sshv2 <public DSA public keys for this user account. These keys can be used to
key> log into the user's account.
identity <key Sets certain SSH client identity settings for a user, dsa2 or rsa2.
type>
private-key Sets private key SSH client identity settings for the user.
public-key Sets public key SSH client identity settings for the user.
History 3.1.0000
Notes If a key is being pasted from a cut buffer and was displayed with a paging program, it is
likely that newline characters have been inserted, even if the output was not long enough
to require paging. One can specify “no cli session paging enable” before running the
“show” command to prevent the newlines from being inserted.
117
7.4.3.14 slogin
Invokes the SSH client. The user is returned to the CLI when SSH finishes.
Syntax Description slogin options usage: slogin [-1246AaCfgkNnqsTtVvXxY] [-b bind_address] [-c
cipher_spec] [-D port] [-e escape_char] [-F configfile] [-i identity_file]
[-L port:host:hostport] [-l login_name] [-m mac_spec] [-o option] [-p
port] [-R port:host:hostport] [user@]hostname [command]
Default N/A
History 3.1.0000
Related Commands
Notes
Default N/A
History 3.1.0000
118
Example switch (config) # show ssh client
SSH client Strict Hostkey Checking: ask
SSH Global Known Hosts:
Entry 1: 72.30.2.2
Finger Print: 1e:b7:8b:ec:ab:35:98:be:
6b:d6:12:c2:18:72:12:d6
No SSH user identities configured.
No SSH authorized keys configured.
Related Commands
Notes
Default N/A
History 3.1.0000
3.9.0300 Updated example—removed RSA v1 and added SSH server login
record-period
119
Example switch (config) # show ssh server
SSH server configuration:
SSH server enabled: yes
Server security strict mode: no
Minimum protocol version: 2
TCP forwarding enabled: yes
X11 forwarding enabled: no
SSH login timeout: 120
SSH login max attempts: 6
SSH server login record-period: 1
SSH server ports: 22
Interface listen enabled: yes
Listen Interfaces:
No interface configured.
Host Key Finger Prints and Key Lengths:
RSA v2 host key:
SHA256:gVu6qLW1ZifEp8wRer2jkvILZMGNl6VCYU3HqC1INC8 (2048)
DSA v2 host key: SHA256:JnldTEla20ZF/
c5LdIqo9251DzO742k3hFCQh3Jt4ZA (1024)
Related Commands
Notes
Default N/A
History 3.1.0000
3.9.0300 Updated example—removed RSA v1
120
Example switch (config) # show ssh server host-keys
SSH server configuration:
SSH server enabled: yes
Server security strict mode: no
Minimum protocol version: 2
TCP forwarding enabled: yes
X11 forwarding enabled: no
SSH login timeout: 120
SSH login max attempts: 6
SSH server ports: 22
Host Keys:
RSA v2 host key: "kebo-2100-1 ssh-rsa AAAAB3Nza<...>KE5"
DSA v2 host key: "kebo-2100-1 ssh-dss AAAAB3Nza<...>/s="
Notes
Displays the amount of days for counting the number of successful logins.(Default: 30
days)
Default Disabled
History 3.9.0300
121
Related Commands ssh server login record-period
Notes
7.4.4.1 telnet
telnet
Default N/A
History 3.1.0000
telnet>
Notes
telnet-server enable
no telnet-server enable
History 3.1.0000
122
Related Commands telnet-server
show telnet-server
Notes
show telnet-server
Default N/A
History 3.1.0000
Notes
Default 60 minutes
123
History 3.1.0000
Notes The no form of the command does not automatically log users out due to inactivity.
web cache-enable
no web cache-enable
Default Enabled
History 3.4.1100
Notes
Default N/A
124
Configuration Mode config
History 3.2.3000
Related Commands
Notes
Default default-ca-list
History 3.2.3000
Related Commands
Notes
125
7.4.5.5 web enable
Syntax Description
vrf name—Describes VRF name for web daemon. If the VRF parameter is not specified,
the "default" VRF will be used implicitly
force—Restarts web with passed VRF context even if it was already enabled using other
VRF
Default enable
History 3.1.0000
3.8.1000—Added note
3.9.2000—Added VRF option
126
Syntax Description enable Enables HTTP access to the web-based management console.
History 3.1.0000
Enables the listen interface restricted list for HTTP and HTTPS.
The no form of the command disables the HTTP server listen ability.
Syntax Description enable Enables Web interface restrictions on access to this system.
interface Adds interface to Web server access restriction list (i.e., mgmt0,
<ifName> mgmt1).
127
History 3.1.0000
Notes If enabled, and if at least one of the interfaces listed is eligible to be a listen interface,
then HTTP/HTTPS requests will only be accepted on those interfaces. Otherwise, HTTP/
HTTPS requests are accepted on any interface.
web https {certificate {regenerate | name | default-cert} | enable | port <port number> | ssl
ciphers {all | TLS | TLS1.2}}
no web https {enable | port <port number>}
128
Default • HTTPS is enabled
• Default port is 443
History 3.1.0000
3.4.0000 Added “ssl ciphers” parameter
3.4.0010 Added TLS parameter to “ssl ciphers”
History 3.6.8008
129
Related Commands show web
web enable
Notes
Default Enabled
History 3.6.8008
Notes
• none - no authentication
• basic - HTTP basic authentication
130
Default Basic authentication settings
History 3.1.0000
Notes
Syntax Description password Sets plaintext password for HTTP basic authentication with web proxy
username Sets username for HTTP basic authentication with web proxy
Default N/A
History 3.1.0000
Notes
131
7.4.5.13 web session timeout
Default 2 hr 30 min
History 3.1.0000
Related Commands
Notes
Default 30 min
History 3.1.0000
132
Related Commands
Notes
show web
Default N/A
History 3.6.6000
3.6.8008—Updated example3.9.2000—Updated example, adding VRP field
133
Example switch (config) # show web
Web User Interface:
Web interface enabled: yes
Notes
134
8 System Management
The following pages provide information on configuring general management features on the switch system.
• Management Interfaces
• Chassis Management
• Management Source IP Address
• Upgrade/Downgrade Process
• Configuration Management
• Virtual Machine
• Resource Scale
2. Disable setting IP addresses using the DHCP using the following command:
3. Define your interfaces statically using the following command:
135
switch (config) # show interfaces mgmt0 brief
If a user connects through SSH, runs the wizard and turns off DHCP, the connection is immediately terminated
as the management interface loses its IP address.
136
2. Create a VLAN interface. Run:
3. Configure L3 attributes on the newly created VLAN interface. Run:
4. (Optional) Verify in-band management configuration. Run:
To disable fetching hostname from DHCP server, run:
137
Getting the hostname through DHCP is enable by default and will change the switch hostname if the hostname
is not set by the user. Therefore, if a switch is part of an HA cluster the user would need to make sure the HA
master has the same HA node names as the DHCP server.
snmp-agent Single instance in any VRF
ntp Single instance in any VRF
dns Single instance in any VRF
tacacs Single instance in any VRF
radius
Puppet Single instance in any VRF
sFlow Single instance in any VRF
138
Service Run by VRF Once mgmt VRF is Created
docker Single instance in any VRF
User VRF will have routing functions and its primary purpose is to perform routing of user traffic.
Default VRF is used to run some non-management system functions and can also be used to serve as a global routing
instance for multi-VRF traffic.
When a service is moved from VRF to VRF, its configuration is removed.
• Interface
• interface
• ip address
• ip default-gateway
• alias
• mtu
• duplex
• speed
• dhcp
• dhcp hostname
• shutdown
• zeroconf
• comment
• ipv6 enable
• ipv6 address
• ipv6 dhcp primary-intf
• ipv6 dhcp stateless
• ipv6 dhcp client enable
• ipv6 dhcp client renew
• show interfaces mgmt0
• show interfaces mgmt0 brief
• show interfaces mgmt0 configured
• Hostname Resolution
• hostname
• ip name-server
• ip domain-list
• ip/ipv6 host
• ip/ipv6 map-hostname
• show hosts
• Routing
• IP route
• ipv6 default-gateway
• show ip/ipv6 route
• show ipv6 default-gateway
• Network to Media Resolution (ARP & NDP)
• ip arp
139
• ip arp timeout
• show ip arp
• ipv6 neighbor
• clear ipv6 neighbors
• show ipv6 neighbors
• DHCP
• ip dhcp
• show ip dhcp
• General IPv6
• ipv6 enable
• IP Diagnostic Tools
• ping
• traceroute
• tcpdump
8.1.8.1 Interface
8.1.8.1.1 interface
interface {mgmt0 | mgmt1 | lo | vlan<id>}
lo Loopback interface
Default N/A
History 3.1.0000
140
Notes
8.1.8.1.2 ip address
Default 0.0.0.0/0
History 3.1.0000
Notes If DHCP is enabled on the specified interface, then the DHCP IP assignment will hold
until DHCP is disabled
8.1.8.1.3 ip default-gateway
141
Default N/A
History 3.1.0000
Related Commands
Notes
8.1.8.1.4 alias
Adds an additional IP address to the specified interface. The secondary address will
appear in the output of “show interface” under the data of the primary interface along
with the alias.
The no form of the command removes the secondary address to the specified interface.
Syntax Description index A number that is to be aliased to (associated with) the secondary IP.
Default N/A
History 3.1.0000
142
Related Commands show interfaces <ifname>
Notes • If DHCP is enabled on the specified interface, then the DHCP IP assignment will hold
until DHCP is disabled
• More than one additional IP address can be added to the interface
8.1.8.1.5 mtu
mtu <bytes>
no mtu <bytes>
Default 1500
History 3.6.3004
Notes
8.1.8.1.6 duplex
duplex <duplex>
no duplex
143
Syntax Description duplex Sets the duplex mode of the interface. The following are the possible
values:
Default auto
History 3.1.0000
Notes • Setting the duplex to “auto” also sets the speed to “auto”
• Setting the duplex to one of the settings “half” or “full” also sets the speed to a
manual setting which is determined by querying the interface to find out its current
auto-detected state
8.1.8.1.7 speed
speed <speed>
no speed
Syntax Description speed Sets the speed of the interface. The following are the possible values:
• 10 - fixed to 10Mbps
• 100 - fixed to 1000Mbps
• 1000 - fixed to 1000Mbps
• auto - auto speed sensing (10/100/1000Mbps)
Default auto
History 3.1.0000
144
Example switch (config interface mgmt0)# speed auto
Notes • Setting the speed to “auto” also sets the duplex to “auto”
• Setting the speed to one of the manual settings (generally “10”, “100”, or “1000”)
also sets the duplex to a manual setting which is determined by querying the
interface to find out its current auto-detected state
8.1.8.1.8 dhcp
dhcp [renew]
no dhcp
Syntax Description renew Forces a renewal of the IP address. A restart on the DHCP client for the
specified interface will be issued.
Default Could be enabled or disabled (per part number) manufactured with 3.2.0500
History 3.1.0000
Notes • When enabling DHCP, the IP address and netmask are received via DHCP hence, the
static IP address configuration is ignored
• Enabling DHCP disables zeroconf and vice versa
• Setting a static IP address and netmask does not disable DHCP. DHCP is disabled
using the “no” form of this command, or by enabling zeroconf.
• When static IP is configured, DHCP will not run.
145
8.1.8.1.9 dhcp hostname
dhcp hostname
no dhcp hostname
Default Enabled
History 3.5.1000
Notes • If a hostname is configured manually by the user, that configuration would override
the “dhcp hostname” configuration
• After upgrading to version 3.5.1000 when a default hostname is not configured, the
DHCP server assigns the new hostname for your machine
• These commands do not work on in-band interfaces
8.1.8.1.10 shutdown
shutdown
no shutdown
Default no shutdown
146
History 3.1.0000
Notes
8.1.8.1.11 zeroconf
zeroconf
no zeroconf
Default no zeroconf
History 3.1.0000
8.1.8.1.12 comment
comment <comment>
no comment
147
Syntax Description comment A free-form string that has no semantics other than being displayed
when the interface records are listed.
Default no comment
History 3.1.0000
Related Commands
Notes
ipv6 enable
no ipv6 enable
History 3.1.0000
148
Notes • The interface identifier is a 64-bit long modified EUI-64, which is based on the
MAC address of the interface
• If IPv6 is enabled on an interface, the system will automatically add a link-local
address to the interface. Link-local addresses can only be used to communicate with
other hosts on the same link, and packets with link-local addresses are never
forwarded by a router.
• A link-local address, which may not be removed, is required for proper IPv6
operation. The link-local addresses start with “fe80::”, and are combined with the
interface identifier to form the complete address.
Configures IPv6 address and netmask to this interface, static or autoconfig options are
possible.
The no form of the command removes the given IPv6 address and netmask or disables the
autoconfig options.
Syntax Description IPv6 address/ Configures a static IPv6 address and netmask.
netmask
Format example: 2001:db8:1234::5678/64.
autoconfig Enables IPv6 stateless address auto configuration (SLAAC) for this
interface. An address will be automatically added to the interface based
on an IPv6 prefix learned from router advertisements, combined with
an interface identifier.
autoconfig Enables default learning routes. The default route will be discovered
default automatically, if the autoconfig is enabled.
History 3.1.0000
149
Related Commands ipv6 enable
show interface <ifname>
• lo
• mgmt0
• mgmt1
Default N/A
History 3.1.0000
Notes
150
Syntax Description N/A
Default N/A
History 3.1.0000
Notes • This command only gets DNS configuration, not an IPv6 address
• The no form of the command requests all information, including an IPv6 address
History 3.7.11xx
151
Notes When static IP is configured, DHCP will not run.
ipv6 dhcp client renew
Default N/A
History 3.7.11xx
Notes
show interface mgmt0
Default N/A
History 3.1.0000
152
3.9.1900 Updated example—added new output option of "no (Static IP is
configured)"
IPv6 address:
1::1/64
fe80::7efe:90ff:fe65:dea8/64
Speed : UNKNOWN
Duplex : full
Interface type : ethernet
Interface source: bridge
Bonding master : vrf_vrf-default
MTU : 1500
HW address : 7C:FE:90:65:DE:A8
Rx:
13840892 bytes
58605 packets
0 mcast packets
2 discards
0 errors
0 overruns
0 frame
Tx:
3796 bytes
38 packets
0 discards
0 errors
0 overruns
0 carrier
0 collisions
1000 queue len
Related Commands
Notes
153
8.1.8.1.20 show interfaces mgmt0 brief
Default N/A
History 3.1.0000
IPv6 address:
fe80::268a:7ff:fe53:3d8e/64
Related Commands
Notes
154
8.1.8.1.21 show interfaces mgmt0 configured
Default N/A
History 3.1.0000
3.5.1000 Updated example with “DHCP Hostname”
Related Commands
Notes
155
8.1.8.2 Hostname Resolution
8.1.8.2.1 hostname
hostname <hostname>
no hostname
History 3.1.0000
3.6.3004 Added support for the character “.”
Notes • Hostname may contain letters, numbers, periods (‘.’), and hyphens (‘-’), in any
combination
• Hostname may be 1-63 characters long
• Hostname may not begin with a hyphen
• Hostname may not contain other characters, such as “%”, “_” etc.
• Hostname may not be set to one of the valid logging commands (i.e. debug-files,
fields, files, format, level, local, monitor, receive, trap)
• Changing the hostname stamps a new HTTPS certificate
8.1.8.2.2 ip name-server
156
Syntax Description IPv4/IPv6 IPv4 or IPv6 address.
address
History 3.1.0000
Notes
8.1.8.2.3 ip domain-list
ip domain-list <domain-name>
no ip domain-list <domain-name>
History 3.1.0000
Notes
157
8.1.8.2.4 ip/ipv6 host
History 3.1.0000
Notes
Maps between the currently-configured hostname and the loopback address 127.0.0.1.
The no form of the command clears the mapping.
158
History 3.1.0000
Notes • If no mapping is configured, a mapping between the hostname and the IPv4
loopback address 127.0.0.1 will be added
• The no form of the command maps the hostname to the IPv6 loopback address if
there is no statically configured mapping from the hostname to an IPv6 address
(disabled by default)
• Static host mappings are preferred over DNS results. As a result, with this option set,
you will not be able to look up your hostname on your configured DNS server; but
without it set, some problems may arise if your hostname cannot be looked up in
DNS.
show hosts
Default N/A
History 3.1.0000
159
Example switch (config)# show hosts
Hostname: switch1
Name servers:
10.7.77.192 dynamic (DHCP on mgmt0)
10.7.77.135 dynamic (DHCP on mgmt0)
10.198.0.169 dynamic (DHCP on mgmt0)
(*) 10.211.0.124 dynamic (DHCP on mgmt0)
Domain names:
mtl.labs.mlnx dynamic (DHCP on mgmt0)
Related Commands
Notes
8.1.8.3 Routing
8.1.8.3.1 IP route
160
netmask IPv4 netmask formats are:
• /24
• 255.255.255.0
IPv6 netmask format is:
nexthop- The IPv4 or IPv6 address of the next hop router for this route
address
vrf-name—VRF session name
Default N/A
History 3.1.00003.9.2000—Added VRF option
Notes
Default N/A
161
Configuration Mode config
History 3.1.0000
Notes • The configured default gateway will not be used if DHCP is enabled
• In order to configure ipv4 default-gateway use ‘ip route’ command.
Syntax Description static Filters the table with the static route entries
Default N/A
History 3.1.0000
Example
162
switch (config)# show ip route
Related ip route
Commands
Notes
Syntax Description static Displays the static configuration of the default gateway
Default N/A
History 3.1.0000
163
Example switch (config)# show ipv6 default-gateway
Active default gateways:
172.30.0.1 (interface: mgmt0)
switch (config)# show ipv6 default-gateway static
Configured default gateway: 10.10.10.10
Notes The configured IPv4 default gateway will not be used if DHCP is enable
8.1.8.4.1 ip arp
Default N/A
History 3.2.0500
Notes
164
8.1.8.4.2 ip arp timeout
ip arp [vrf <vrf-name>] time out <timeout-value>
no ip arp [vrf <vrf-name>] timeout
Syntax Description timeout-value Time (in seconds) that an entry remains in the ARP cache
Range: 60-28800
History 3.2.0230
show ip arp
Notes • This value is used as the default ARP timeout whenever a new IP interface is created
• The time interval after which each ARP entry becomes stale may actually vary from
50-150% of the configured value
Syntax Description interface type Filters the table according to a specific interface (i.e. mgmt0)
165
count Shows ARP statistics
Default N/A
History 3.3.3000
Example
Related Commands
Notes
166
Default N/A
History 3.1.0000
Notes • ARP is used only with IPv4. In IPv6 networks, Neighbor Discovery Protocol (NDP)
is used similarly.
• Use The no form of the command to remove static entries. Dynamic entries can be
cleared via the “clear ipv6 neighbors” command.
clear ipv6 neighbors{ethernet <port> | vlan <vlan-id> | port-channel <id> | vrf <vrf-id>}
[<ip-addr>]
Default N/A
History 3.1.0000
167
Related Commands ipv6 neighbor
show ipv6 neighbor
arp
Notes • Clearing Neighbor Discovery Protocol (NDP) cache removes only the dynamic
entries learned and not the static entries configured
• Use the no form of the command to remove static entries
Syntax Description static Filters only the table of the static entries.
Default N/A
History 3.1.0000
Example
Notes
168
8.1.8.5 DHCP
8.1.8.5.1 ip dhcp
Syntax Description yield-to-static Does not allow you to install a default gateway from DHCP if there is
already a statically configured one.
Default Disabled
History 3.1.0000
169
8.1.8.5.2 show ip dhcp
show ip dhcp
Default N/A
History 3.1.0000
Notes
170
8.1.8.6 General IPv6
ipv6 enable
no ipv6 enable
Configuration config
Mode
History 3.1.0000
Notes
8.1.8.7.1 ping
ping [-LRUbdfnqrvVaA] [-c count] [-i interval] [-w deadline] [-p pattern] [-s
packetsize] [-t ttl] [-I interface or address] [-M mtu discovery hint] [-S sndbuf] [-T
timestamp option ] [-Q tos ] [hop1 ...] destination
171
Syntax Description Linux Ping https://www.lifewire.com/uses-of-command-ping-2201076
options
Default N/A
History 3.1.0000
Notes
8.1.8.7.2 traceroute
traceroute [-46dFITUnrAV] [-f first_ttl] [-g gate,...] [-i device] [-m max_ttl] [-N
squeries] [-p port] [-t tos] [-l flow_label] [-w waittime] [-q nqueries] [-s src_addr] [-z
sendwait] host [packetlen]
-6 Uses IPv6
172
-T Uses TCP SYN for tracerouting
-m Sets the max number of hops (max TTL to be reached). Default is 30.
-t Sets the TOS (IPv4 type of service) or TC (IPv6 traffic class) value
for outgoing packets
-z Sets minimal time interval between probes (default is 0). If the value
is more than 10, then it specifies a number in milliseconds, else it is a
number of seconds (float point values allowed too).
Default N/A
History 3.1.0000
173
Example
Notes
8.1.8.7.3 tcpdump
tcpdump [-aAdDeflLnNOpqRStuUvxX] [-c count] [-C file_size] [-E algo:secret] [-F file]
[-i interface] [-M secret] [-r file] [-s snaplen] [-T type] [-w file] [-W filecount] [-y
datalinktype] [-Z user] [-D list possible interfaces] [expression]
Invokes standard binary, passing command line parameters straight through. Runs in
foreground, printing packets as they arrive, until the user hits Ctrl+C.
Default N/A
History 3.1.0000
174
Related Commands
Notes
Additionally, it monitors:
• AC power to the PSUs
• DC power out from the PSUs
• Chassis failures
175
Alert Message Scenario Notification Recovery Action Recovery Message
Indicator
<fan_name> A chassis fan speed is Email, fan LED and Check the fan and “<fan_name> has
speed is below below minimal system status LED replace it if required been restored to its
minimal range threshold (15% of set red, log alert, normal state”
maximum speed) SNMP.
<fan_name> is A chassis fan is not Email, fan LED and Check fan “<fan_name> has
unresponsive responsive on the system status LED connectivity and been restored to its
switch system set red, log alert, replace it if required normal state”
SNMP
<fan_name> is A chassis fan is Email, fan LED and Insert a fan unit “<fan_name> has
not present missing system status LED been restored to its
set red, log alert, normal state”
SNMP
Insufficient Insufficient number Email, fan LED and Plug in additional “The system
number of of working fans in the system status LED fans or change faulty currently has
working fans in system set red, log alert, fans sufficient number of
the system SNMP working fans”
Power Supply The power supply Email, power Check the power “Power Supply
<ps_number> voltage is out of supply LED and connection of the PS <ps_number>
voltage is out of range. system status LED voltage is in range”
range set red, log alert,
SNMP
Power supply A power supply unit Email, power Check chassis fans “Power supply
<ps_number> temperature is higher supply LED and connections. On <ps_number>
temperature is too than the maximum system status LED switch systems, temperature is back
hot threshold of 70 set red, log alert, check system fan to normal”
Celsius on the switch SNMP connections.
system
Power Supply A power supply is Email, system status Connect power cable “Power supply has
<number> is malfunctioning or and power supply or replace been removed” or
unresponsive disconnected LED set red, log malfunctioning PS “PS has been
alert, SNMP restored to its
normal state”
176
Alert Message Scenario Notification Recovery Action Recovery Message
Indicator
When “show interfaces” is used, a port’s speed appears unchanged even when only one lane is active.
177
Switch-A Configuration Switch-B Configuration Behavior
2. Display measured voltage levels of power supplies. Run:
178
switch (config) # show voltage
-------------------------------------------------------------------------------
-----------------
Module Power Meter Reg Expected Actual
Status High Low
Voltage Voltage
Range Range
-------------------------------------------------------------------------------
-----------------
MGMT acdc-monitor1 DDR3 0.675V 0.68 0.67 OK
0.78 0.57
MGMT acdc-monitor1 CPU 0.9V 0.78 0.78 OK
0.89 0.66
MGMT acdc-monitor1 SYS 3.3V 3.30 3.34 OK
3.79 2.80
MGMT acdc-monitor1 CPU 1.8V 1.80 1.79 OK
2.07 1.53
MGMT acdc-monitor1 CPU/PCH 1.05V 1.05 1.05 OK
1.21 0.89
MGMT acdc-monitor1 CPU 1.05V 1.05 1.05 OK
1.21 0.89
MGMT acdc-monitor1 DDR3 1.35V 1.35 1.35 OK
1.55 1.15
MGMT acdc-monitor1 USB 5V 5.00 5.04 OK
5.75 4.25
MGMT acdc-monitor1 1.05V LAN 1.50 1.50 OK
1.72 1.27
MGMT ASICVoltMonitor1 Asic 1.2V 1.20 1.21 OK
1.38 1.02
MGMT ASICVoltMonitor1 Asic 3.3V 3.30 3.32 OK
3.79 2.80
MGMT ASICVoltMonitor2 Vcore SPC 0.95 0.96 OK
1.09 0.81
MGMT acdc-monitor2 1.8V Switch SPC 1.80 1.82 OK
2.07 1.53
PS1 power-mon N/A 0.00 0.00
FAIL 0.00 0.00
PS2 power-mon vout 12V 12.00 11.98 OK
13.80 10.20
3. Display the fan speed and status. Run:
4. Display the voltage current and status of each module in the system. Run:
179
switch (config) # show power consumers
------------------------------------------------------------------
Module Device Sensor Power Voltage Current Status
[Watts] [Volts] [Amp]
------------------------------------------------------------------
PS1 power-mon input 37.50 12.02 3.19 OK
MGMT acdc-monitor2 input - - - OK
Total power used : 37.50 Watts
scp://username:password@hostname/var/mnt/usb1/<file name>
While username and password are the admin username and password and hostname is the IP of the switch.
Examples:
• To fetch an image from a USB device, run the command:
• To save log file (my-logfile) to a USB device under the name “test_logfile” using the command “logging files”,
run:
• To safely remove the USB and to flush the cache, after writing (log files, for example) to a USB, use the “usb
eject” command:
To verify the LED status, run:
180
switch (config) # show leds
Module LED Status
--------------------------------------------------------------------------
MGMT UID Blue
To deactivate the UID LED on a switch system, run:
Ethernet Family
Invalid Ethertype Packet has an unknown Ethertype (0x05DC < ethertype <
0x600)
IP Routing Family
Ingress Router interface is disabled Ingress packet has been dropped because incoming L3
interface is admin down
Mismatched IP (UC DIP over MC/BC Mac) Packet MAC is multicast/broadcast but destination IP is
unicast
181
Invalid IP (DIP=loopback) Destination IP is loopback IP
Egress Router interface is disabled Egress packet has been dropped because outgoing L3
interface is admin/oper is down
Tunnel Family
182
8.2.9 Chassis Management Commands
• Chassis Management
• clear counters
• clear system hardware events
• health
• led uid
• power enable
• system profile
• usb eject
• show asic-version
• show bios
• show cpld
• show fan
• show health-report
• show inventory
• show leds
• show memory
• show module
• show power
• show power consumers
• show protocols
• show resources
• show system capabilities
• show system hardware events
• show system mac
• show system profile
• show system profile detailed
• show system type
• show temperature
• show version
• show version concise
• show voltage
183
Default N/A
History 3.2.3000
Related Commands
Notes The command also clears storm-control counters
clear system hardware events
Default N/A
History 3.6.6000
Notes
184
8.2.9.1.3 health
Syntax Description max-report- Sets the length of the health report (number of line entries)
len <length> Range: 10-2048
Default max-report-len: 50
re-notif-cntr:
History 3.1.0000
Notes
Syntax Description module Specifies the module whose UID LED to configure
185
Default N/A
Configuration config
Mode
History 3.6.1002
3.6.2002
Related Commands
Notes
History 3.1.0000
Notes • It is recommended to run this command prior to extracting a module from the switch
system, else errors are printed in the log
186
8.2.9.1.6 system profile
system profile {eth-default | eth-ipv6-max | eth-ipv4-mc-max} [force]
Default eth-default
History 3.6.6000
Notes
usb eject
Default N/A
187
History 3.1.0000
Related Commands
show asic-version
Default N/A
History 3.1.0000
Example
switch (config) # show asic-version
==================================================
Module Device Version
==================================================
MGMT SPC 15.0200.0092
Related Commands
Notes
188
8.2.9.1.9 show bios
show bios
Default N/A
History 3.3.4150
Related Commands
Notes
show cpld
Default N/A
History 3.1.0000
189
Example switch (config) # show cpld
=====================================
Name Type Version
=====================================
Cpld1 CPLD_TOR 4
Cpld2 CPLD_PORT1 2
Cpld3 CPLD_PORT2 2
Cpld4 CPLD_MEZZ 3
Related Commands
Notes
show fan
Default N/A
History 3.1.0000
Example
switch (config) # show fan
-----------------------------------------------------
Module Device Fan Speed Status
(RPM)
-----------------------------------------------------
FAN1 FAN F1 9305.00 OK
FAN2 FAN F1 8823.00 OK
FAN3 FAN F1 9057.00 OK
FAN4 FAN F1 9369.00 OK
PS1 FAN F1 10288.00 OK
PS2 FAN - - NOT PRESENT
Related Commands
190
Notes
show health-report
Default N/A
History 3.1.0000
Notes
show inventory
191
Default N/A
History 3.1.0000
Example
-----------------------------------------------------------------------
Module Part Number Serial Number Asic Rev. HW Rev.
-----------------------------------------------------------------------
CHASSIS MSN2100-CB2F MT1752X06330 N/A B3
MGMT MSN2100-CB2F MT1752X06330 1 B3
Related Commands
Notes
Syntax Description module Specifies the module whose LED status to display
Default N/A
192
History 3.6.1002
Example
switch (config) # show leds
Module LED Status
--------------------------------------------
MGMT STATUS Green
MGMT FAN1 Green
MGMT FAN2 Green
MGMT FAN3 Green
MGMT FAN4 Green
MGMT PS_STATUS Green
MGMT PS1 Green
MGMT PS2 Green
MGMT UID Blue
Related Commands
Notes
show memory
Default N/A
History 3.1.0000
Example
193
switch (config) # show memory
-----------------------------------------------------------------------
Memory Space Total Used Free Used+B/C Free-B/C
-----------------------------------------------------------------------
Physical 15848 MB 2849 MB 12999 MB 3854 MB 11994 MB
Swap 0 MB 0 MB 0 MB
Related Commands
Notes
show module
Default N/A
History 3.1.0000
3.3.0000 Added “Is Fatal” column
194
Example switch (config) # show module
======================
Module Status
======================
MGMT ready
FAN1 ready
FAN2 ready
PS1 ready
PS2 not-present
Related Commands
Notes The Status column may have one of the following values: error, fatal, not-present,
powered-off, powered-on, ready.
show power
Default N/A
History 3.1.0000
Example
195
switch (config) # show power
-----------------------------------------------------------------------------
-----
Module Device Sensor Power Voltage Current Capacity Feed
Status
[Watts] [Volts] [Amp] [Watts]
-----------------------------------------------------------------------------
-----
PS1 power-mon input 32.25 12.11 1.26 800.00 DC OK
PS2 power-mon input 46.56 12.13 2.33 800.00 DC OK
Related Commands
Notes
Default N/A
History 3.1.0000
Example
196
switch (config) # show power consumers
-------------------------------------------------------------------------
Module Device Sensor Power Voltage Current Status
[Watts] [Volts] [Amp]
-------------------------------------------------------------------------
MGMT CURR_MONITOR 12V 52.96 11.71 4.52 OK
Related Commands
Notes
show protocols
Default N/A
History 3.2.3000
197
Example
switch (config) # show protocols
Ethernet enabled
spanning-tree rst
lacp disabled
lldp disabled
igmp-snooping disabled
ets enabled
priority-flow-control disabled
sflow disabled
openflow disabled
mlag disabled
dot1x disabled
isolation-group disabled
IP routing disabled
bgp disabled
pim disabled
vrrp disabled
ospf disabled
magp disabled
dhcp-relay disabled
Related Commands
Notes
show resources
Default N/A
History 3.1.0000
198
Example switch (config) # show resources
Total Used Free
Physical 2027 MB 761 MB 1266 MB
Swap 0 MB 0 MB 0 MB
Number of CPUs: 1
CPU load averages: 0.11 / 0.23 / 0.23
CPU 1
Utilization: 5%
Peak Utilization Last Hour: 19% at 2012/02/15 13:26:19
Avg. Utilization Last Hour: 7%
Related Commands
Notes
Default N/A
History 3.1.0000
Example
switch (config) # show system capabilities
Ethernet: Supported, L2, L3
Ethernet Max licensed speed: 100Gb
199
Related Commands show system profile
Notes
Syntax Description family-name Displays all active events per event family:
• ethernet
• tunnel
• ip
Default N/A
History 3.6.6000
Tunnel:
Related Commands
Notes
200
8.2.9.1.23 show system mac
Default N/A
History 3.1.0000
Notes
show system profile
Default N/A
History 3.2.0000
201
Example
switch (config) # show system profile
Profile: eth-default
Notes
Default N/A
History 3.6.6000
Profile: eth-default
-----------------------------------------------
Parameter Guaranteed Max Value
-----------------------------------------------
FDB size 102400
IPMC-L2 lists 10240
IPMC-L3 lists 10240
IPv4 MC/IGMP routes 10240
IPv4 neighbors 51200
IPv6 neighbors 8192
IPv4 routes 100000
IPv6 shorts 51200
IPv6 routes 21504
VRF 64
RIF 999
202
Related Commands system profile
Notes
Default N/A
History 3.5.1000
Example
switch (config) # show system type
SN2100
Related Commands
Notes
show temperature
Default N/A
203
History 3.1.0000
Example
switch (config) # show temperature
---------------------------------------------------------
Module Component Reg CurTemp Status
(Celsius)
---------------------------------------------------------
MGMT SPC T1 43.00 OK
MGMT Ports AMB temp T1 31.00 OK
MGMT Board AMB temp T1 30.00 OK
MGMT CPU Core Sensor T1 23.00 OK
MGMT CPU Core Sensor T2 23.00 OK
MGMT CPU Core Sensor T3 24.00 OK
MGMT CPU Core Sensor T4 24.00 OK
Related Commands
Notes
show version
Default N/A
History 3.1.0000
204
Example
switch (config) # show version
Product name: Onyx
Product release: 3.6.4006
Build ID: #1-dev
Build date: 2017-07-03 16:17:39
Target arch: x86_64
Target hw: x86_64
Built by: mlx@a25f8aaaec03
Version summary: X86_64 3.6.4006 2017-07-03 16:17:39
x86_64
Related Commands
Notes
Displays concise version information for the currently running system image.
Default N/A
History 3.1.0000
205
Related Commands
Notes
show voltage
Default N/A
History 3.1.0000
Example
206
switch (config) # show voltage
=============================================================================
===============
Module Power Meter Reg Expected Actual Status
High Low
Voltage Voltage
Range Range
=============================================================================
===============
MGMT BOARD_MONITOR USB 5V sensor 5.00 5.15 OK
5.55 4.45
MGMT BOARD_MONITOR Asic I/O sensor 2.27 2.11 OK
2.55 1.99
MGMT BOARD_MONITOR 1.8V sensor 1.80 1.79 OK
2.03 1.57
MGMT BOARD_MONITOR SYS 3.3V sensor 3.30 3.28 OK
3.68 2.92
MGMT BOARD_MONITOR CPU 0.9V sensor 0.90 0.93 OK
1.04 0.76
MGMT BOARD_MONITOR 1.2V sensor 1.20 1.19 OK
1.37 1.03
MGMT CPU_BOARD_MONITOR 12V sensor 12.00 11.67 OK
13.25 10.75
MGMT CPU_BOARD_MONITOR 12V sensor 2.50 2.46 OK
2.80 2.20
MGMT CPU_BOARD_MONITOR 2.5V sensor 3.30 3.26 OK
3.68 2.92
MGMT CPU_BOARD_MONITOR SYS 3.3V sensor 3.30 3.24 OK
3.68 2.92
MGMT CPU_BOARD_MONITOR SYS 3.3V sensor 1.80 1.79 OK
2.03 1.57
MGMT CPU_BOARD_MONITOR 1.8V sensor 1.20 1.24 OK
1.37 1.03
Related Commands
Notes
207
• NTP
• Syslog
• TACACS
• SSH, SSHD, SCP
• Ping
• Traceroute
• SNMP
8.3.2 Commands
Default N/A
History 3.7.1002
Related Commands
Notes
Configures the source interface that binds the SSH client to a specific address used by
the slogin command.
208
Default N/A
History 3.7.1002
Related Commands
Notes The <interface> must be in the <vrf-name>. Source-interface could be configured in any
VRF that the configured service is enabled in.
Default N/A
History 3.7.1002
Related Commands
Notes The <interface> must be in the <vrf-name>. The source-interface can be configured for
each existing VRF.
209
8.3.2.4 ip tftp source-interface
Default N/A
History 3.7.1002
Related Commands
Notes The <interface> must be in the <vrf-name>. The source-interface can be configured for
each existing VRF.
Default N/A
210
Configuration Mode config
History 3.8.1000
Related Commands
Notes The <interface> must be in the <vrf-name>. The source-interface can be configured for
each existing VRF.
Default N/A
History 3.8.1000
Related Commands
Notes The <interface> must be in the <vrf-name>. The source-interface can be configured for
each existing VRF.
211
8.3.2.7 ip traceroute source-interface
Default N/A
History 3.8.1000
Related Commands
Notes The <interface> must be in the <vrf-name>. The source-interface can be configured for
each existing VRF.
Configures the source interface for sending the log messages to remote servers.
The no form of the command disables the logging source interface protocol.
Default N/A
212
History 3.7.1002
Related Commands
Notes • Source interface is supported only for logging host using UDP and not supported for
TCP
• Changes in runtime in the dns regarding a logging host (changes of relation between
hostname and ip) are not handled, logging source ip may stop working
• The <interface> must be in the <vrf-name>. Source-interface could be configured in
any VRF that the configured service is enabled in.
tacacs-server [vrf <vrf-name>] source-interface <interface>
no tacacs-server [vrf <vrf-name>] source-interface <interface>
Default N/A
History 3.7.1002
Related Commands
Notes The <interface> must be in the <vrf-name>. Source-interface must be in the same VRF
that the configured service is enabled in.
213
8.3.2.10 ip icmp source-interface
Configures the source interface for icmp protocol (for ping requests).
The no form of the command disables the icmp source interface protocol.
Default N/A
History 3.7.1002
Related Commands
Notes <interface> must be in the <vrf-name>. Source-interface can be configured for each
existing VRF.
Configures the source interface for ntp protocol. This interface will be used for user
requested and periodic ntp synchronization.
The no form of the command disables the ntp source interface protocol.
Default N/A
214
History 3.7.1002
Related Commands
Notes • This command sets source IP for NTPD and NTP date
• The <interface> must be in the <vrf-name>. Source-interface must be in the same
VRF that the configured service is enabled in.
Configures the source interface for sending SNMP traps and informs.
The no form of the command disables the snmp-server source interface protocol.
Default N/A
History 3.8.1000
Notes The <interface> must be in the <vrf-name>. Source-interface could be configured in any
VRF that the configured service is enabled in.
215
8.3.2.13 show ip ftp source-interface
Syntax Description vrf-name Describes VRF that will be affected by this command. If "vrf"
parameter is not specified, the "default" VRF will be used implicitly.
Default N/A
History 3.7.1002
Related Commands
Notes
216
8.3.2.14 show ip tftp source-interface
Syntax Description vrf-name Describes VRF that will be affected by this command. If "vrf"
parameter is not specified, the "default" VRF will be used implicitly.
Default N/A
History 3.9.2000
Example:
show ip tftp vrf all source-interface
Related Commands
Notes
Syntax Description vrf-name Describes VRF that will be affected by this command. If "vrf"
parameter is not specified, the "default" VRF will be used implicitly.
217
Default N/A
History 3.7.1002
Related Commands
Notes
Syntax Description vrf-name Describes VRF that will be affected by this command. If "vrf"
parameter is not specified, the "default" VRF will be used
implicitly.
Default N/A
218
History 3.7.1002
Related Commands
Notes
Syntax Description vrf-name Describes VRF that will be affected by this command. If "vrf"
parameter is not specified, the "default" VRF will be used
implicitly.
Default N/A
History 3.7.1002
219
Example switch (config)# show tacacs source-interface
Source IP for tacacs client:
Configured: loopback3
Current : loopback3
IPv4-addr : 1.3.5.7
IPv6-addr : none
Related Commands
Notes
Syntax Description vrf-name Describes VRF that will be affected by this command. If "vrf"
parameter is not specified, the "default" VRF will be used implicitly.
Default N/A
History 3.7.1002
220
Example switch (config)# show icmp source-interface
Source IP for ping client:
Configured: none
Current : none
IPv4-addr : none
IPv6-addr : none
Related Commands
Notes
Syntax Description vrf-name VRF that will be affected by this command. If "vrf" parameter is
not specified, the "default" VRF will be used implicitly.
Default N/A
History 3.7.1002
221
Example switch (config)# show traceroute source-interface
Source IP for traceroute client:
Configured: none
Current : none
IPv4-addr : none
IPv6-addr : none
Related Commands
Notes
Syntax Description vrf-name Describes VRF that will be affected by this command. If "vrf" parameter
is not specified, the "default" VRF will be used implicitly.
Default N/A
History 3.7.1002
222
Example switch (config)# show ssh client source-interface
Source IP for ssh client:
Configured: loopback1
Current : loopback1
IPv4-addr : 1.1.1.1
IPv6-addr : none
Related Commands
Notes
Syntax Description vrf-name Describes VRF that will be affected by this command. If "vrf"
parameter is not specified, the "default" VRF will be used implicitly.
Default N/A
History 3.7.1002
223
Example switch (config)# show ip scp source-interface
Source IP for scp client:
Configured: none
Current : none
IPv4-addr : none
IPv6-addr : none
Related Commands
Notes
show ip sftp [vrf {<vrf-name>|all}] source-interface
Syntax Description vrf-name Describes VRF that will be affected by this command. If "vrf"
parameter is not specified, the "default" VRF will be used implicitly.
Default N/A
History 3.7.1002
224
Example switch (config)# show ip sftp source-interface
Source IP for sftp client:
Configured: none
Current : none
IPv4-addr : none
IPv6-addr : none
Related Commands
Notes
Displays the source interface for sending SNMP traps and informs.
Syntax Description vrf-name Describes VRF that will be affected by this command. If "vrf"
parameter is not specified, the "default" VRF will be used
implicitly.
Default N/A
History 3.8.1000
225
Example switch (config)# show snmp source-interface
Source IP for snmp server:
Configured: loopback7
Current : loopback7
IPv4-addr : 5.5.5.5
IPv6-addr : none
Notes
226
MLAG
cluster, please refer to “Upgrading HA Groups”
• When upgrading from a version older than 3.6.3130 with an MLAG cluster, "show mlag" output appears as
"UP" and "Peering" state instead of "Upgrade" on both MLAG VIP clusters—the upgrade process will not be
affected
• Interfaces with global pause are not mapped to a lossless pool after upgrade from versions earlier than 3.6.5000
• You have to read and accept the End-User License Agreement (EULA) after image upgrade in case the EULA is
modified. The EULA link is only available upon first login to CLI
• Linux docker container names are limited to 180 characters. Upgrading to this version removes containers which
do not comply with this limitation and prints the following warning to the log: “Removed configuration of
container: <container name>, container name is limited to 180 characters”
227
3. Delete the image listed under “Images available to be installed” prior to fetching the new image. Use the
command “image delete” for this purpose.
When deleting an image, it is recommended to delete the file, but not the partition, so as to not
overload system resources.
5. Display the available images again and verify that the new image now appears under “Images available to be
installed”.
To recover from image corruption (e.g., due to power interruption), there are two installed images on
the system. See the commands “image boot next” and “image boot location” for more information.
228
6. Install the new image.
8. Run “show images” to review your images.
229
9. Save current configuration.
After software reboot, the software upgrade will also automatically upgrade the firmware version.
When performing an upgrade from the WebUI, make sure that the image being upgraded to is not
already located in the system (i.e., fetched from the CLI).
230
In situations of heavy CPU load or noisy network, it is possible that another node assumes the role of
cluster master before all standby nodes have rejoined the group. If this happens, you may stop waiting
and proceed directly to step 4.
When slave upgrade is complete and the master is still in the lower version, MACs are not learned by
the slave switch system (except for traffic flood) until master switch upgrade is complete.
3. Perform the upgrade according to steps 1-10 in "Upgrading Operating System Software".
4. Enable STP – this step may lead to traffic loss while the STP state is converging. Run:
Procedure 2:
1. Shutdown all ports on the MLAG slave.
2. Save configuration. Run:
231
switch (config) # show images
Installed images:
Partition 1:
X86_64 3.6.4110-12 2017-07-26 06:54:12 x86_64
Partition 2:
X86_64 3.6.4006 2017-07-03 16:17:39 x86_64
Last boot partition: 1
Next boot partition: 1
Images available to be installed:
webimage.tbz
X86_64 3.6.4110-12 2017-07-26 06:54:12 x86_64
Serve image files via HTTP/HTTPS: no
No image install currently in progress.
Boot manager password is set.
Image signing: trusted signature always required
Admin require signed images: yes
Settings for next boot only:
Fallback reboot on configuration failure: yes (default)
switch (config) #
When deleting an image, it is recommended to delete the file, but not the partition, so as to not
overload system resources.
Prior to downgrading software, please make sure the following prerequisites are me.
1. Log in to the switch via the CLI using the console port.
2. Backup configuration by following these steps.
a. Disable paging of CLI output.
232
8.4.6.1 Downloading Image
1. Log in to your system to obtain its product number.
2. Log in to HPE Supportand download the relevant Onyx version to your system type.
3. Log in to your system via the CLI.
4. Change to Config mode.
5. Delete all previous images from the Images available to be installed prior to fetching the new image.
6. Fetch the desired software image.
The procedure described below assumes that booting and running is done from Partition 1 and the downgrade
procedure is performed on Partition 2.
3. Display all image files on the system.
233
4. Install the fetched image.
5. Display all image files on the system.
There are two installed images on the system. Therefore, if one of the images gets corrupted (due to
power interruption, for example), in the next reboot the image will go up from the second partition.
If you are downgrading to an older software version which has never been run yet on the switch, use
the following command sequence as well.
7. Reload.
234
8.4.6.3 Switching to Partition with Older Software Version
The system saves a backup configuration file when upgrading from an older software version to a newer one. If the
system returns to the older software partition, it uses this backup configuration file.
All configuration changes done with the new software are lost when returning to the older software version.
There are 2 instances where the backup configuration file does not exist:
• The user has run “reset factory” command, which clears all configuration files in the system
• The user has run “configuration switch-to” to a configuration file with different name then the backup file
Note that the configuration file becomes empty if the system is downgraded to a software version which has
never been installed yet.
To allow switching partition to the older software version for the 2 aforementioned cases only, follow the steps below.
1. Run the following command.
If a firmware update takes place, then the login process is delayed a few minutes.
235
To verify that the firmware update was successful, log into your switch and run the command “show asic-version” (can
be run in any mode). This command lists all of the switch modules along with their firmware versions. Make sure that
all the firmware versions are the same and match the default firmware version. If the firmware update failed for one or
more modules, then the following warning is displayed.
Some subsystems are not updated with a default firmware.
If you detect a mismatch in firmware version for one or more modules of the switch system, please contact
your assigned field application engineer.
2. Save the configuration. Run:
• image boot
• boot next
• boot system
• image default-chip-fw
• image delete
• image fetch
• image install
• image move
• image options
• show bootvar
• show images
236
8.4.8.1 image boot
Specifies the default location where the system should be booted from.
Syntax Description location-ID Specifies the default destination location. There can be up to 2 images
on the system. The possible values are 1 or 2.
next Sets the boot location to be the next once after the one currently booted
from, thus avoiding a cycle through all the available locations.
Default N/A
History 3.1.0000
Example
switch (config) # image boot location 2
Notes
Sets the default setting for next boot. Normally, if the system fails to apply the
configuration on startup (after attempting upgrades or downgrades, as appropriate), it will
reboot to the other partition as a fallback.
The no form of the command tells the system not to do that, only for the next boot.
Default N/A
History 3.2.0506
237
Example
switch (config) # boot next fallback-reboot enable
Notes • Normally, if the system fails to apply the configuration on startup (after attempting
upgrades or downgrades, as appropriate) it reboots to the other partition as a fallback.
• The no form of this command tells the system not to do that only for the next boot. In
other words, this setting is not persistent and goes back to being enabled
automatically after each boot.
• When downgrading to an older software version which has never been run yet on a
system, the “fallback reboot” always happens, unless the command “no boot next
fallback-reboot enable” is used. However, this also happens when the older software
version has been run before, but the configuration file has been switched since
upgrading. In general, a downgrade only works (without having the fallback reboot
forcibly disabled) if the process can find a snapshot of the configuration file (by the
same name as the currently active one) which was taken before upgrading from the
older software version. If that is not found, a fallback reboot is performed in
preference to falling back to the initial database because the latter generally involves a
loss of network connectivity, and avoiding that is of paramount importance.
• 1—installs to location 1
• 2—installs to location 2
next Boots system from next location after one currently booted
Default N/A
History 3.2.0506
Example
switch (config) # boot system location 2
238
Related Commands show images
Notes
Default N/A
History 3.1.0000
Notes
Default N/A
History 3.1.0000
239
Example
switch (config) # image delete <filename>.img
Notes
URL HTTP, HTTPS, FTP, TFTP, SCP and SFTP are supported
Example: scp://username[:password]@hostname/path/filename
Default N/A
History 3.1.0000
3.9.2000—Added VRF option
Example
240
switch (config) # image fetch scp://<username>@192.168.10.125/var/www/html/
<image_name>
Password ******
100.0%[############################################################]
switch (config) #
Other options:
Notes • Please delete the previously available image, prior to fetching the new image
• The path to the file in the case of TFTP depends on the server configuration. Therefore,
it may not be an absolute path but a relative one.
• See “Upgrading Operating System Software” page
prog-options • “no-track” overrides CLI default and does not track the installation
progress
• “track” overrides CLI default and tracks the installation progress
Default N/A
241
Configuration Mode config
History 3.1.0000
Example
switch (config) # image install X86_64 3.6.5000 2017-07-26
06:54:12 x86_64
Step 1 of 4: Verify Image
100.0%
[############################################################
####]
Step 2 of 4: Uncompress Image
100.0%
[############################################################
####]
Step 3 of 4: Create Filesystems
100.0%
[############################################################
####]
Step 4 of 4: Extract Image
100.0%
[############################################################
####]
switch (config) #
Notes • The image cannot be installed on the “active” location (the one which is currently
being booted)
• On a two-location system, the location is chosen automatically if no location is
specified
Default N/A
242
History 3.1.0000
Example
switch (config) # image move image1.img image2.img
Notes
Syntax Description serve all Specifies that the image files present on this appliance should be made
available for HTTP and/or HTTPS download
Default N/A
History 3.1.0000
Example
switch (config) # image options serve all
Notes The parameter “serve all” affects not only the files currently present, but also any files that
are later downloaded. It only applies to image files, not the installed images, which are not
themselves in a downloadable format.
After running “serve all” the URLs where the images will be available are:
• http://<HOSTNAME>/system_images/<FILENAME>
• https://<HOSTNAME>/system_images/<FILENAME>
243
8.4.8.10 show bootvar
show bootvar
Default N/A
History 3.1.0000
Example
switch (config)# show bootvar
Installed images:
Partition 1:
X86_64 3.6.4110-12 2017-07-26 06:54:12 x86_64
Partition 2:
X86_64 3.6.4006 2017-07-03 16:17:39 x86_64
Related Commands
Notes
244
8.4.8.11 show images
show images
Default N/A
History 3.1.0000
Example
switch (config)# show images
Installed images:
Partition 1:
Partition 2:
webimage.tbz
X86_64 3.6.4071-12 2017-07-26 06:54:12 x86_64
245
Notes
• To save the configuration to a user-specified file without making the new file the active configuration file, run:
• To save the configuration to a user-specified file and make the new file the active configuration file, run:
• To display the available configuration files and the active file, run:
switch >
switch > enable
switch # configure terminal
switch (config) # configuration switch-to myconfig
switch (config) #
246
8.5.3.1 BIN Configuration Files
BIN configuration files are not human readable. Additionally, these files are encrypted and contain integrity verification
preventing them from being edited and used.
• To create a new BIN configuration file, do the following:
A newly created BIN configuration file is always empty and is not created from the running-config.
• To upload a BIN configuration file to an external file server, do the following:
• To fetch a BIN configuration file, do the following:
• To see the available configuration files, do the following:
• To load a BIN configuration file, do the following:
A binary configuration file uploaded from the switch is encrypted and has integrity verification. If the file is
modified in any manner, the fetch to the switch fails.
247
switch (config) # configuration text generate active running save my-filename
A newly created text configuration file is always created from the running-config.
• To apply a text-based configuration file, do the following:
Applying a text-based configuration file to an existing/running data port configuration may result in
unpredictable behavior. It is therefore suggested to first clear the configuration by applying a specific
configuration file (following the procedure in "BIN Configuration File") or by resetting the switch
back to factory default.
• To upload a text-based configuration file to an external file server, do the following:
• To fetch a text-based configuration file from an external file server to a
switch, do the following:
When applying a text-based configuration file, the configuration is appended to the existing
configuration. Only new or changed configuration is added. Reboot is not required.
248
switch (config)# configuration auto-upload remote-url “scp://root:password@my-
server/path/to/upload/to”
• To check the remote URL set, run the following:
This will upload the active configuration file on every “configuration write."
This will disable the feature. It will not upload the active configuration file after each “configuration write."
• File System
• debug generate dump
• file debug-dump
• file stats
• file tcpdump
249
• reload
• reset factory
• configuration new factory
• configuration new factory keep-docker
• show files debug-dump
• show files stats
• show files system
• show files tcpdump
• Configuration Files
• configuration audit
• configuration auto-upload
• configuration copy
• configuration delete
• configuration fetch
• configuration jump-start
• configuration merge
• configuration move
• configuration new
• configuration switch-to
• configuration text fetch
• configuration text file
• configuration text generate
• configuration upload
• configuration write
• write
• show configuration
• show configuration auto-upload
• show running-config
• show running-config interface
Default N/A
History 3.1.0000
Example
switch (config) # debug generate dump
Generated dump sysdump-switch-112104-201140526-091707.tgz
250
Related Commands file debug-dump
Notes The dump can then be manipulated using the “file debug-dump...” commands.
file debug-dump {delete {<filename> | all | latest} | email {<filename> | latest} | upload
{<filename> | latest | all [vrf <vrf-name>]} <URL>}
• latest—emails the latest debug file to a pre-configured
recipients
• latest—uploads the latest debug file to a remote host
vrf-name—Describes VRF context that should be used for this transfer. If not specified, the
“default” VRF is used.
URL The URL to the remote host. Supported URL formats: HTTP,
HTTPS, FTP, TFTP, SCP and SFTP.
Example: scp://username[:password]@hostname/path/filename
Default N/A
Configuration config
Mode
History 3.1.0000
3.3.4000 Added “all” and “latest” options
251
Example switch (config) # file debug-dump email sysdump-
switch-112104-20114052-091707.tgz
upload Uploads a stats report file. Supported URL formats: HTTP, HTTPS,
<filename> FTP, TFTP, SCP and SFTP.
<URL> Example: scp://username[:password]@hostname/path/filename
vrf-name—Describes VRF context that should be used for this transfer. If not specified,
the “default” VRF is used.
Default N/A
History 3.1.00003.9.2000—Added VRF option
Example
switch (config) # file stats move memory-1.csv memory-2.csv
252
Related Commands show files stats
show files stats <filename>
Notes
upload Uploads the specified tcpdump output file to the specified URL.
<filename> Supported URL formats: HTTP, HTTPS, FTP, TFTP, SCP and SFTP.
<URL> Example: scp://username[:password]@hostname/path/filename.
vrf-name—Describes VRF context that should be used for this transfer. If not specified,
the “default” VRF is used.
Default N/A
History
3.1.0000
3.9.2000—Added VRF option
Example
switch (config) # file tcmpdump delete my-tcpdump-file.txt
Notes
253
8.5.5.1.5 reload
Syntax Description force Forces an immediate reboot of the system even if the system is busy.
immediate
Default N/A
History 3.1.0000
Example
switch (config) # reload
Configuration has been modified; save first? [yes] yes
Configuration changes saved.
...
Notes
254
Syntax Description keep-all-config Preserves all configuration files including licenses. Removes the logs,
stats, images, snapshots, history, and known hosts.
The user is prompted for confirmation before honoring this command,
unless confirmation is disabled with the command: “no cli default
prompt confirm-reset”.
keep-config- Reset to the factory defaults of the current RoCE config group: no-roce,
group lossless, lossy or semi-lossless.
keep-docker Preserves all current docker configurations, but deletes the content of
clear-label the given docker storage label. (Note that only the content of the label
folder will be deleted. The label itself will remain intact.)
<label name>
Default N/A
History 3.1.0000
3.4.0000 Added notes and “keep-virt-vols” parameter
255
Example switch (config) # reset factory
Warning - confirming will cause system reboot.
Type 'YES' to confirm reset: YES
Resetting and rebooting the system -- please wait...
...
Notes • Effects of parameter “keep-all-config”: Licenses—not deleted; profile—no
change; configuration—unchanged; management IP—unchanged
• Effects of parameter “keep-basic”: Licenses—not deleted; profile—reset;
configuration—reset; management IP—reset
• Effects of parameter “keep-virt-vols”: Licenses—deleted; profile—reset; configuration
—reset; management IP—deleted
• Confirming the command causes system reboot
Default N/A
History 3.7.1102
Example
switch (config) # no configuration new my_file factory
Notes
256
8.5.5.1.8 configuration new factory keep-docker
Creates new file with only factory defaults except docker current configuration.
Default N/A
History 3.7.1102
Notes
Syntax Description filename Displays a summary of the contents of a particular debug dump file.
Default N/A
History 3.1.0000
257
Example
switch (config) # show files debug-dump sysdump-
switch-20170731-161038.tgz
==================================================
System information:
Hostname: switch
Version: X86_64 3.6.4006 2017-07-03 16:17:39 x86_64
Current time: 2017-07-31 16:10:38
System uptime: 19d 18h 20m 12s
==================================================
==================================================
Output of 'uname -a':
==================================================
Notes
Syntax Description filename Display the contents of a particular statistics report file.
Default N/A
History 3.1.0000
Example
switch (config) # show files stats
memory-201140524-111745.csv
258
Related Commands file stats
Notes
Default N/A
History 3.1.0000
Example
switch (config) # show files stats
memory-201140524-111745.csv
Related Commands
Notes
Default N/A
259
History 3.1.0000
Example
switch (config) # show files stats
test
dump3
Related Commands
Notes
Syntax Description max- Set maximum number of audit messages to log per change.
changes
Default 1000
History 3.1.0000
Example
switch (config) # configuration audit max-changes 100
Notes
260
8.5.5.2.2 configuration auto-upload
Default N/A
History 3.9.0500
Example
switch (config) #configuration auto-upload remote-url
“scp://root:[email protected]/tmp/conf1”
Notes If this feature is set, after every configuration write it will upload the active configuration
file to the configured remote URL.
Default N/A
261
Configuration Mode config
History 3.1.0000
Example
switch (config) # configuration copy initial.bak example
Related Commands
Notes • This command does not affect the current running configuration
• The active configuration file may not be the target of a copy. However, it may be the
source of a copy in which case the original remains active.
Default N/A
History 3.1.0000
Example
switch (config) # configuration delete example
Notes • This command does not affect the current running configuration
• The active configuration file may not be deleted
262
8.5.5.2.5 configuration fetch
Syntax Description URL Supported formats: HTTP, HTTPS, FTP, TFTP, SCP and SFTP.
Example: scp://username[:password]@hostname/path/filename
Default N/A
History 3.1.0000
Example
switch (config) # configuration fetch scp://
root:[email protected]/tmp/conf1
Notes • The downloaded file should not override the active configuration file, using the
<name> parameter
• If no name is specified for a configuration fetch, it is given the same name as it had on
the server
• No configuration file may have the name “active”
configuration jump-start
Default N/A
263
History 3.1.0000
Example
switch (config) # configuration jump-start
Mellanox configuration wizard
Step 1: Hostname? [switch-3cc29c]
Step 2: Use DHCP on mgmt0 interface? y
Step 3: Admin password (Enter to leave unchanged)?
You have entered the following information:
1. Hostname: switch-3cc29c
2. Use DHCP on mgmt0 interface: yes
3. Enable IPv6: yes
4. Enable IPv6 autoconfig (SLAAC) on mgmt0 interface: yes
53. Admin password (Enter to leave unchanged): (unchanged)
To change an answer, enter the step number to return to.
Otherwise hit <enter> to save changes and exit.
Choice:
Configuration changes saved.
Notes • The wizard is automatically invoked whenever the CLI is launched when the active
configuration file is fresh (i.e. not modified from its initial contents)
Merges the “shared configuration” from one configuration file into the running
configuration.
Default N/A
History 3.1.0000
264
Example
switch (config) # configuration merge new-config-file
Related Commands
Default N/A
History 3.1.0000
Example
switch (config) # show configuration files
example1 initial initial.bak initial.prev
switch (config) # configuration move example1 example2
switch (config) # show configuration files
example2 initial initial.bak initial.prev
Notes • This command does not affect the current running configuration
• The active configuration file may not be the target of a move
265
8.5.5.2.9 configuration new
Creates a new configuration file under the specified name. The parameters specify what
configuration, if any, to carry forward from the current running configuration.
History 3.1.0000
Example
switch (config) # show configuration files
initial initial.bak initial.prev
switch (config) # configuration new example2
switch (config) # show configuration files
example2 initial initial.bak initial.prev
Notes • This command does not affect the current running configuration
• The active configuration file may not be the target of a move
Loads the configuration from the specified file and makes it the active configuration file.
266
Default N/A
History 3.1.0000
3.6.1002 | Added “no-reboot” option
Example
switch (config) # show configuration files
initial (active)
newcon
initial.prev
initial.bak
switch (config) # configuration switch-to newcon no-reboot
switch (config) # show configuration files
initial
newcon (active)
initial.prev
initial.bak
Notes • The current running configuration is lost and not automatically saved to the previous
active configuration file
• When running the command without the “no-reboot” parameter, the user is prompted
to OK a reboot. If the answer is “yes”, the configuration is replaced and the system is
rebooted immediately
Fetches a text configuration file (list of CLI commands) from a specified URL.
Syntax Description apply Applies the file to the running configuration (i.e. executes the
commands in it). This option has the following parameters:
• discard—does not keep downloaded configuration text file after
applying it to the system
• fail-continue—if applying commands, continues execution even if
one of them fails
• overwrite—if saving the file and the filename already exists,
replaces the old file
• verbose—displays all commands being executed and their output
instead of just those that get errors
267
filename Specifies filename for saving downloaded text file.
overwrite Downloads the file and saves it using the same name it had on the
server. This option has the following parameters:
Default N/A
History 3.2.1000
Example
switch (config) # configuration text fetch scp://
username[:password]@hostname/path/filename
Related Commands
Notes
verbose Displays all commands being executed and their output, instead of just
those that get errors.
268
delete Deletes the file.
upload Supported types are HTTP, HTTPS, FTP, TFTP, SCP and SFTP.
<URL> For example: scp://username[:password]@hostname/path/filename
Default N/A
History 3.1.0000
3.9.0300 | Added ability to apply reboot
Example
switch (config) # configuration text file my-config-file
delete
Notes
269
save Saves new file to local persistent storage.
upload Supported types are HTTP, HTTPS, FTP, TFTP, SCP and SFTP.
<URL> For example: scp://username[:password]@hostname/path/filename.
Default N/A
History 3.1.0000
Example
switch (config) # configuration text generate file
initial.prev save example
Notes
configuration upload {timestamp} {active | <name>} <URL or scp or sftp://
username:password@hostname[:port]/path/filename>
Default N/A
History 3.1.0000
3.9.0500 | Added timestamp option
270
Example
switch (config) # configuration upload active scp://
root:[email protected]/tmp/conf1
Notes No configuration file may have the name “active” or “timestamp”.
to <filename> Saves the running configuration to a new file under a different name
and makes it the active file.
no-switch Saves the running configuration to this file but keep the current one
active.
Default N/A
History 3.1.0000
Example
switch (config) # configuration write
Notes
271
8.5.5.2.16 write
Syntax Description memory Saves running configuration to the active configuration file. It is the
same as “configuration write”.
local Saves the running configuration only on the local node. It is the same
as “configuration write local”.
Default N/A
History 3.1.0000
272
Example
switch (config) # write terminal
##
## Running database "initial"
## Generated at 20114/05/27 10:05:16 +0000
## Hostname: switch
##
##
## Network interface configuration
##
interface mgmt0 comment ""
interface mgmt0 create
interface mgmt0 dhcp
interface mgmt0 display
interface mgmt0 duplex auto
interface mgmt0 mtu 1500
no interface mgmt0 shutdown
interface mgmt0 speed auto
no interface mgmt0 zeroconf
##
## Local user account configuration
##
username a** capability admin
no username a** disable
username a** disable password
......
Notes
Displays a list of CLI commands that will bring the state of a fresh system up to match the
current persistent state of this system.
273
running Displays commands to recreate current running configuration. Same as
the command “show configuration” except that it applies to the
currently running configuration, rather than the current persisted
configuration.
Default N/A
History 3.1.0000
3.3.5006 | Removed “running full” and “full” parameters
Example
switch (config) # show configuration
##
## Active saved database "newcon"
## Generated at 20114/05/25 10:18:52 +0000
## Hostname: switch-3cc29c
##
##
## Network interface configuration
##
interface mgmt0 comment ""
interface mgmt0 create
interface mgmt0 dhcp
interface mgmt0 display
interface mgmt0 duplex auto
interface mgmt0 mtu 1500
no interface mgmt0 shutdown
interface mgmt0 speed auto
no interface mgmt0 zeroconf
Related Commands
Notes
274
Syntax Description N/A
Default N/A
History 3.9.0500
Example
switch (config) # show configuration auto-upload
Auto-upload settings:
Enabled: yes
Remote url: scp://[email protected]/tmp/conf1
Password : ******
Notes If this feature is set. After every configuration write, it will upload the active
configuration file to the configured remote URL.
Syntax Description expanded Displays commands in expanded format without compressing ranges.
diff Displays delta between saved config file (active by default) and
running-config.
config_file_nam Displays delta between the specified saved config file and running-
e config.
Default N/A
275
History 3.1.0000
3.3.4402 Removed “full” parameter
3.8.1000 Added support to show diff between running-config and saved config
files (active file saved by default)
Example
Only in running-config:
+ interface port-channel 1
+ interface ethernet 1/31-1/33 speed 10G force
+ interface port-channel 1 description lag
Only in saved configuration file:
- ip route vrf default 169.254.22.0/24 169.254.2.100
Common configuration but in different order in saved configuration file and
running-config:
<<None>>
Related Commands
Notes • + <string> : <string> exists only in running-config, but not in the saved filename (or
active config file if no <filename> is specified)
• - <string> : <string> does not exist in running-config, but exists in the saved filename
(or active config file if no <filename> is specified)
• ! <string> : <string> exists in both running-config and the saved filename, but it is out
of order. This should not impact the user, but may impact scripts or applications that
are parsing the output of the command
show running-config interface [mgmt0 | mgmt1 | lo <loopback_id> | ethernet <slot>/
<port>[/<subport>] | port-channel <lag-id> | mlag-port-channel <mlag-id> | nve <nve-id> |
vlan <vlan-id>]
276
Syntax Description loopback_id Loopback interface ID.
Range: 0-31
Default N/A
History 3.8.1000
277
Example switch (config) # show running-config interface mgmt0
interface mgmt0 comment mgmt if
switch (config) # show running-config interface mgmt1
interface mgmt1 comment mgmt if
switch (config) # show running-config interface lo 1
interface loopback 1
interface loopback 1 ip address 1.1.10.10/32 primary
switch (config) # show running-config interface ethernet
1/32
interface ethernet 1/32 speed 10G force
switch (config) # show running-config interface port-channel
1
interface port-channel 1
interface port-channel 1 description lag
switch (config) # show running-config interface mlag-port-
channel 1
interface mlag-port-channel 1
interface mlag-port-channel 1 description mlag
switch (config) # show running-config interface nve 1
interface nve 1
interface nve 1 nve fdb learning remote
interface nve 1 nve fdb flood load-balance
switch (config) # show running-config interface vlan 100
interface vlan 100
interface vlan 100 ip address 169.254.1.101/24 primary
interface vlan 100 ip address 169.254.11.101/24
Related Commands
Notes
278
The example below installs Ubuntu 14 and defines 3GB storage with 512MB memory (default) using the first
core of the switch system (default) through mgmt0 interface (default) with an auto-generated MAC (default).
2. Create a VM.
switch (config virtual-machine host my-vm) # storage create disk size-max 3000
100.0% [#################################################################]
Created empty virtual disk volume 'vdisk001.img' in pool 'default'
Device attached to drive number 1.
switch (config virtual-machine host my-vm) #
7. Switch to a different terminal, and run the following command to connect VNC viewer to the VM:
279
$ vncviewer -via admin@<switch IP> 127.0.0.1:0
...
HPE Onyx Switch Management
Password: ************
8. Continue VM installation from the VNC prompt.
To perform a VM installation from a USB stick:
1. Insert the USB stick (supplied) to the USB port of your switch system.
2. Decide on a name for the VM (e.g., “my_vm”).
3. Decide on the network configuration of the VM.
• Use DHCP or alternately use static IP definitions
• Assign a MAC address or alternately use the default MAC address
4. Launch the full installation of the VM with the network definitions of your choice.
virtual-machine enable
no virtual-machine enable
280
Syntax Description N/A
History 3.4.0000
Related Commands
Notes
Default N/A
History 3.4.0000
Related Commands
Notes
281
8.6.2.3 arch
arch {i386 | x86_64}
Default x86_64
History 3.4.0000
Notes
8.6.2.4 comment
comment <string>
no comment
Default N/A
History 3.4.0000
282
Example switch (config virtual-machine host my-vm)# comment
“example VM”
Notes To configure a multi-word string, the string must be placed within quotation marks
8.6.2.5 console
Syntax Description connect Connects to the text console unless specified otherwise:
History 3.4.0000
283
Notes • To exit the text console press Ctrl-6 (or Ctrl-Shift-6)
• If the guest OS is not configured to receive input from a serial console (ttyS0), the
VM console becomes unresponsive when connected to.
• To view the graphical console, X display must be enabled. There are two options to
activate it, the command “vncviewer -via admin@<switchIP> 127.0.0.1:<VNC
display num>” (which is run from an external Linux host) and the command “ssh
server x11-forwarding enable” (which is run from within the switch and requires that
you log out and log back in again using ssh -X ). The latter command weakens the
switch security, therefore, it is recommended to opt for the second option. The VNC
display num parameter may be procured by running the command “show virtual-
machine <vm-name> detail”.
8.6.2.6 install
Installs an operating system onto this VM (temporarily attach a CD and boot from it).
connect-console Connects to the console during installation. The types may be:
<console-type>
• text – text console
• graphics – graphical console
Default N/A
284
Configuration Mode config virtual machine host
History 3.4.0000
Notes The default pool from which the system installs the ISO image is the /var/ partition in the
switch
8.6.2.7 install-from-usb
Note that a space is required between the IP address and the netmask
length
default- The IP address of the default gateway to configure for the installed
gateway VM
Default N/A
History 3.6.2002
285
Example switch (config virtual-machine host my-vm)# install-from-
usb
100.0%
[##########################################################
####]
VM host my-vm MAC is: aa:bb:cc:dd:ee:ff
switch (config virtual-machine host my-vm)#
Notes USB stick supplied must be inserted into the USB port of the switch system prior to
running this command
8.6.2.8 interface
interface <id> {bridge <bridge> | macaddr <mac> | model <model> | name <name>}
Default N/A
History 3.4.0000
286
Example switch (config virtual-machine host my-vm)# interface 1
model virtio
Notes
8.6.2.9 memory
memory <MB>
Default 512MB
History 3.4.0000
8.6.2.10 power
Syntax Description cycle Powers the VM down and then on again immediately
287
connect-console Connects to the console after power-on. The types may be:
<console-type>
• text – text console
• graphics – graphical console
on Powers on VM
Default N/A
History 3.4.0000
Notes
storage create disk [drive-number <number> | file <filename> | mode {read-only | read-
write} | pool <pool-name> | size-max <MB>]
Creates a new storage device for the VM, with an automatically assigned name.
Syntax Description create disk Creates a new virtual disk image for this VM.
288
pool <pool- Specifies storage pool in which to create new volume.
name>
Default N/A
History 3.4.0000
Notes
storage device [bus ide] drive-number <number> [mode {read-only | read-write}] source
{[pool <pool-name>] file <filename>}
no storage device [bus ide] drive-number <id>
Modifies existing storage device, or create a new one with a specific name.
The no form of the command removes a storage device from the VM.
Syntax Description device Modifies existing storage device, or creates a new one with a specific
name.
289
source Specifies where the data for this volume resides
Default N/A
History 3.4.0000
Notes
8.6.2.13 vcpus
Default N/A
290
History 3.4.0000
Related Commands
Notes
virt volume fetch url <download-url> [filename <filename> | pool <pool-name> filename
<filename>]
Default N/A
History 3.4.0000
Related Commands
Notes
291
8.6.2.15 virt volume file
virt volume file <name> {create disk size-max <MB> | move {new-name <new-name> |
pool <pool-name> new-name <new-name>} | upload <upload-url>}
no virt volume file <volume-name>
Default N/A
History 3.4.0000
Related Commands
Notes
show virtual-machine configured
292
Syntax Description N/A
Default N/A
History 3.4.0000
Related Commands
Notes
show virtual-machine host [<vm-name>]
Default N/A
History 3.4.0000
293
Example switch (config) # show virtual-machine host my-vm
VM 'my-vm'
Status :shut off
Architecture :x86_64
VCPU used :0 sec
Number of VCPUs :1
Boot order :hd, cdrom
Memory size :512 MB
Consoles :text, graphics
Storage:
IDE bus, drive 1: default/vdisk002.img (3000 MB
capacity)
Interfaces:
1: on bridge 'mgmt0' address unknown
(MAC 52:54:00:A4:45:AE)
Related Commands
Notes If the command is run in the middle of an installation, the following banner appears:
show virtual-machine host <vm-name> configured [detail]
Default N/A
History 3.4.0000
Example
294
switch (config) # show virtual-machine host my-vm configured
VM 'my-vm'
Auto-power :on
Architecture :x86_64
Boot order :hd, cdrom
Number of VCPUs :1
Consoles: text, graphics
Memory size :512 MB
Storage:
IDE bus, drive 1: default/vdisk002.img (3000 MB capacity)
Interfaces:
Interface 1:
on bridge 'mgmt0'(MAC 52:5400A4:45:AE)
VM 'my-vm'
UUID :0a177a99-f780-5951-877a-bd660e12e5db
Text console :enabled
Graphics console :enabled
Auto-power :last
Boot order :hd, cdrom
Architecture :x86_64
Memory size :512 MB
Features :ACPI, APIC
Number of VCPUs :1
State of individual VCPUs: No VCPUs pinned
Storage:
IDE bus, drive 1
Source pool: default
Source file: vdisk001.img (3000 MB capacity)
Mode: read-write
Interfaces:
Interface 1
Name: vif1
MAC address: 52:54:00:2F:89:69
Model: realtek-8139
Bound to: bridge 'mgmt0'
Related Commands
Notes
295
8.6.2.19 show virtual-machine host detail
show virtual-machine host <vm-name> detail
Default N/A
History 3.4.0000
Example
296
switch (config) # show virtual-machine host my-vm detail
VM 'my-vm'
Status :shut off
UUID :c4c587fc-c394-5112-9cb2-8102b2ae861a
Text console :enabled
Device :N/A
Graphics console :enabled
VNC display num :N/A
Boot order :hd, cdrom
Architecture :x86_64
Memory size :512 MB
Features :ACPI, APIC
Number of VCPUs :1
State of individual VCPUs unavailable when VM is powered off
Storage:
IDE bus, drive 1
Source pool: default
Source file: vdisk001.img (3000 MB capacity)
Mode: read-write
Device type: disk
Read requests: N/A
Read bytes: N/A
Write requests: N/A
Write bytes: N/A
Interfaces:
Interface 1
Name: vif2
MAC address: 52:54:00:A8:BA:F3
Model: realtek-8139
Bound to: bridge 'mgmt0'
IP address:
RX bytes: 0
TX bytes: 0
RX packets: 0
TX packets: 0
RX errors: 0
TX errors: 0
RX drop: 0
TX drop: 0
Related Commands
Notes
297
8.6.2.20 show virtual-machine install
Default N/A
History 3.4.0000
Previous install:
Completed : 2018/09/12 14:08:45.041
Install status: FAILED
Failure reason: canceled by user
Related Commands
Notes
show virtual-machine host <vm-name> interface [brief | configure]
298
Default N/A
History 3.4.0000
Example
Interface 1
Name: vif1
MAC address: 52:54:00:2F:89:69
Model: realtek-8139
Bound to: bridge 'mgmt0'
IP address:
Counters:
RX bytes: 0 TX bytes: 0
RX packets: 0 TX packets: 0
RX errors: 0 TX errors: 0
RX drop: 0 TX drop: 0
Related Commands
Notes
Default N/A
History 3.4.0000
299
Example switch (config) # show virtual-machine host my-vm storage
Storage for VM 'my-vm'
IDE bus, drive 1
Source pool: default
Source file: vdisk001.img (3000 MB capacity)
Mode: read-write
Device type: disk
Read requests: N/A
Read bytes: N/A
Write requests: N/A
Write bytes: N/A
Related Commands
Notes
Syntax Description table-id Displays information for a specific in-use resource table
Default N/A
History 3.5.1000
300
Example switch (config) # show system resource table
--------------------------------------
Table-Id In-Use
--------------------------------------
acl 0
ipv4-uc 1
ipv4-mc 0
ipv4-neigh 0
ipv6-uc 0
ipv6-mc 0
ipv6-neigh 0
Related Commands
Notes
301
9 System Synchronization
The following pages provide information on NTP and PTP functionalities.
• NTP Authenticate
• NTP Authentication Key
302
• NTP Commands
• clock set
• clock timezone
• ntp
• ntpdate
• ntp authenticate
• ntp authentication-key
• ntp peer disable
• ntp peer keyID
• ntp peer version
• ntp server disable
• ntp server keyID
• ntp server-role disable
• ntp server trusted-enable
• ntp server version
• ntp trusted-key
• show clock
• show ntp
• show ntp configured
• show ntp keys
yyyy/mm/dd Date
Default N/A
History 3.1.0000
Example
switch (config) # clock set 23:23:23 2010/08/19
303
9.1.3.2 clock timezone
Sets the system time zone. The time zone may be specified in one of three ways:
• A nearby city whose time zone rules to follow. The system has a large list of cities
which can be displayed by the help and completion system. They are organized
hierarchically because there are too many of them to display in a flat list. A given
city may be required to be specified in two, three, or four words, depending on the
city
• An offset from UTC. This will be in the form UTC-offset UTC, UTC-offset
UTC+<0-14>, UTC-offset UTC-<1-12>
• UTC (Universal Time, which is almost identical to GMT), and this is the default
time zone
The no form of the command resets time zone to its default (GMT).
Syntax Description zone-word Possible forms this could take include: continent, city, continent,
country, city, continent, region, country, city, ocean, and/or
island.
Default GMT
History 3.1.0000
Example
switch (config) # clock timezone America North
United_States Other New_York
Notes
9.1.3.3 ntp
ntp { {[vrf <vrf-name>] { disable | enable [force]}} | {peer | server} <IP address>
[version <number> | disable]}
no ntp { {[vrf <vrf-name>] {disable | enable}} | {peer | server} <IP address> [version
<number> | disable]}
Configures NTP.
The no form of the command negates NTP options.
304
Syntax Description disable Disables NTP.
vrf name—Describes the VRF name for NTP daemon. If the VRF parameter is not
specified, the "default" VRF will be used implicitly
force—This option will restart ntp with passed VRF context even if it was already
enabled using other VRF.
History
3.1.0000
3.9.2000—Added VRF option
Example
switch (config) # no ntp peer 192.168.10.24 disable
Related Commands
9.1.3.4 ntpdate
ntpdate <ip-address>
305
Syntax Description ip-address IP address of SNTP server.
Default N/A
History 3.1.0000
Example
switch (config) # ntpdate 192.168.10.10
26 Feb 17:25:40 ntpdate[15206]: adjust time server
192.168.10.10 offset -0.000092 sec
Related Commands
Notes This is a one-time operation and does not cause the clock to be kept in sync on an
ongoing basis. It will generate an error if SNTP is enabled since the socket it requires
will already be in use.
ntp authenticate
no ntp authenticate
Default Disabled
History 3.5.0200
Example
switch (config) # ntp authenticate
Related Commands
Notes
306
9.1.3.6 ntp authentication-key
Syntax Description key-id Specifies a key ID, whether existing or a new one to be added.
Range: 1-65534
Default Disabled
History 3.5.0200
Example
switch (config) # ntp authentication-key 123 md5 examplepass
switch (config) # ntp authentication-key 1234 sha1
Password: **
Confirm: **
Related Commands
Notes If a password is not entered, a prompt appears requiring that a password is introduced.
Syntax Description ip-address IP address of the peer.IPv4, IPv6 and hostname (FQDN) are
acceptable.
Default Disabled
307
Configuration Mode config
History 3.5.0200
3.6.4000—Added hostname as option for ip-address, and added note
Example
switch (config) # ntp peer 10.10.10.10 disable
Related Commands
Notes • IP addresses must be in IPv4 format (e.g., '192.168.0.1') or IPv6 format with scope
zone ID for IPv6 link-local addresses (e.g., '2001:db8:701f::8f9' or 'fe80::21c:
23f:ec1:4fb%7'.)
• The length of a hostname is limited to 255 characters. Each label (node delimited by
a dot in the hostname) is limited to 63 characters and may contain letters, numbers
and hyphens ('-'), but may not begin with a hyphen.
Syntax Description ip-address IP address of the peer.IPv4, IPv6 and hostname (FQDN) are
acceptable.
Default Disabled
History 3.5.0200
3.6.4000—Added hostname as option for ip-address, and added note
Example
switch (config) # ntp peer 10.10.10.10 keyID 120
Related Commands
308
Notes • IP addresses must be in IPv4 format (e.g., '192.168.0.1') or IPv6 format with scope
zone ID for IPv6 link-local addresses (e.g., '2001:db8:701f::8f9' or 'fe80::21c:
23f:ec1:4fb%7'.)
• The length of a hostname is limited to 255 characters. Each label (node delimited by
a dot in the hostname) is limited to 63 characters and may contain letters, numbers
and hyphens ('-'), but may not begin with a hyphen.
Syntax Description ip-address IP address of the peer.IPv4, IPv6 and hostname (FQDN) are
acceptable.
Default 4
History 3.5.0200
3.6.4000—Added hostname as option for ip-address, and added note
Example
switch (config) # ntp peer 10.10.10.10 version 4
Related Commands
Notes • IP addresses must be in IPv4 format (e.g., '192.168.0.1') or IPv6 format with scope
zone ID for IPv6 link-local addresses (e.g., '2001:db8:701f::8f9' or 'fe80::21c:
23f:ec1:4fb%7')
• The length of a hostname is limited to 255 characters. Each label (node delimited by
a dot in the hostname) is limited to 63 characters and may contain letters, numbers
and hyphens ('-'), but may not begin with a hyphen.
309
9.1.3.10 ntp server disable
Syntax Description ip-address IP address of the peer.IPv4, IPv6 and hostname (FQDN) are
acceptable.
Default Disabled
History 3.5.5000
3.6.4000—Added hostname as option for ip-address, and added note
Example
switch (config) # ntp server 10.10.10.10 disable
Related Commands
Notes • IP addresses must be in IPv4 format (e.g., '192.168.0.1') or IPv6 format with scope
zone ID for IPv6 link-local addresses (e.g., '2001:db8:701f::8f9' or 'fe80::21c:
23f:ec1:4fb%7'.)
• The length of a hostname is limited to 255 characters. Each label (node delimited by
a dot in the hostname) is limited to 63 characters and may contain letters, numbers
and hyphens ('-'), but may not begin with a hyphen.
Syntax Description ip-address IP address of the peer.IPv4, IPv6 and hostname (FQDN) are
acceptable.
310
Default Disabled
History 3.5.0200
3.6.4000—Added hostname as option for ip-address, and added note
Example
switch (config) # ntp server 10.10.10.10 keyID 120
Related Commands
Notes • IP addresses must be in IPv4 format (e.g., '192.168.0.1') or IPv6 format with scope
zone ID for IPv6 link-local addresses (e.g., '2001:db8:701f::8f9' or 'fe80::21c:
23f:ec1:4fb%7'.)
• The length of a hostname is limited to 255 characters. Each label (node delimited by
a dot in the hostname) is limited to 63 characters and may contain letters, numbers
and hyphens ('-'), but may not begin with a hyphen.
Default N/A
History 3.8.2100
Role Admin
Example
switch (config) # ntp server-role disable
311
Notes This command is configurable.
Trusts this NTP server; if authentication is configured this will additionally force all time
updates to only use trusted servers.
The no form of the command removes trust from this NTP server.
Syntax Description ip-address IP address of the peer.IPv4, IPv6 and hostname (FQDN) are acceptable.
Default N/A
History 3.6.2002
3.6.4000—Added hostname as option for ip-address, and added note
Example
switch (config) # ntp server 10.10.10.10 trusted-enable
Related Commands
Notes • IP addresses must be in IPv4 format (e.g., '192.168.0.1') or IPv6 format with scope
zone ID for IPv6 link-local addresses (e.g., '2001:db8:701f::8f9' or 'fe80::21c:
23f:ec1:4fb%7'.)
• The length of a hostname is limited to 255 characters. Each label (node delimited by
a dot in the hostname) is limited to 63 characters and may contain letters, numbers
and hyphens ('-'), but may not begin with a hyphen.
• NTP trusted servers can be used as a mitigation for Sybil attacks which is a
vulnerability caused by NTP peers sharing the same NTP key base. This mitigation
adds the concept of trusted servers which if enabled in conjunction with NTP
authentication ensures that time information will only be obtained from trusted
servers.
312
Syntax Description ip-address IP address of the peer.IPv4, IPv6 and hostname (FQDN) are acceptable.
Default 4
History 3.5.0200
3.6.4000—Added hostname as option for ip-address, and added note
Example
switch (config) # ntp server 10.10.10.10 version 4
Related Commands
Notes • IP addresses must be in IPv4 format (e.g., '192.168.0.1') or IPv6 format with scope
zone ID for IPv6 link-local addresses (e.g., '2001:db8:701f::8f9' or 'fe80::21c:
23f:ec1:4fb%7')
• The length of a hostname is limited to 255 characters. Each label (node delimited by a
dot in the hostname) is limited to 63 characters and may contain letters, numbers and
hyphens ('-'), but may not begin with a hyphen
Default Disabled
History 3.5.0200
313
Example
switch (config) # ntp trusted-key 1,3,5
switch (config) # ntp trusted-key 1-5
Related Commands
Notes Keys may be separated with commas without any space, or they may be set as a range
using a hyphen.
show clock
Default N/A
History 3.1.0000
3.6.6000—Updated example
Example
switch (config)# show clock
Time: 02:48:41
Date: 2018/1/1
Time zone: UTC (Etc/UTC)
UTC offset: same as UTC
Related Commands
Notes
show ntp
314
Syntax Description N/A
Default N/A
History 3.1.0000
3.5.0200—Updated example
3.6.6000—Updated example
3.9.2000—Updated example
Example
switch (config)# show ntp
Clock is synchronized:
Reference: 10.7.7.134
Offset : -0.038 ms
Related Commands
Notes
315
9.1.3.18 show ntp configured
316
show ntp configured
Default N/A
History 3.1.0000
3.6.6102—Updated example
Example
Related Commands
317
Notes
Default N/A
History 3.5.0200
Example
switch (config) # show ntp keys
NTP Key 1
Trusted: yes
Encryption Type: MD5
NTP Key 2
Trusted: yes
Encryption Type: MD5
NTP Key 3
Trusted: yes
Encryption Type: MD5
NTP Key 4
Trusted: yes
Encryption Type: md5
Related Commands
Notes
Synchronizing network applications require their wall clock time to be aligned precisely with a reference time source (to
the order of micro seconds or less). To achieve such accuracy, the application needs the support of networking HW
(switch and adapter card), to provide the means to stamp time-sensitive packets. It also requires a time synchronization
318
protocol which would make use of the HW time stamping to adjust its wall clock time to an accurate clock in the
network.
319
Message Type Hex Value Class
Sync 0 Event
Follow-up 8 General
Delay_Req 1 Event
Delay_Resp 9 General
Pdelay_Req 2 Event
Pdelay_Resp 3 Event
Announce B General
Signaling C General
Management D General
320
9.2.3 PTP Domains
A domain consists of one or more PTP devices communicating with each other. PTP domain defines the scope of PTP
message communication, state, operations, data sets, and timescale.
Each BC acts as a slave towards the GMC and as GMC to its local slaves. Although adding a BC device introduces
accuracy degradation as explained above, it becomes mandatory when the number of slaves on a single MC exceeds
few thousand devices.
Another use of BC is to bridge between networks. When running PTP over native Ethernet packets, to create larger PTP
domains, there is a need to bridge between the broadcast domains. This is done by BC switches.
Default PTP Profile Attributes (SMPTE 2059-2)
321
Name Range Default
2. Configure the router interface. Run:
3. Add the primary IP address. Run:
4. Enable PTP on the interface. Run:
To verify the PTP configuration:
322
switch (config) # show ptp
PTP mode : Boundary Clock
Message format : Mixed
Acceptable Master Table : Enabled
Domain : 127
Clock identity : 7C:FE:90:FF:FE:FA:21:88
GMC identity : 7C:FE:90:FF:FE:FA:21:88
Number of master ports : 1
Slave port interface : N/A
2. Add the VLANs. Run:
For trunked interfaces, run:
4. Enable PTP on the VLAN interface. Run:
5. Enable PTP on the interface. Run:
To verify the PTP configuration:
323
switch (config) # show ptp
PTP mode : Boundary Clock
Message format : Mixed
Acceptable Master Table : Enabled
Domain : 127
Clock identity : 7C:FE:90:FF:FE:FA:21:88
GMC identity : 7C:FE:90:FF:FE:FA:21:88
Number of master ports : 2
Slave port interface : N/A
To verify the Acceptable Master Table configuration:
Clock Identities:
E4:1D:2D:FF:FE:44:23:B7
E4:1D:2D:FF:FE:46:13:88
To enable Forced Master on a router interface:
To verify PTP configuration:
324
switch (config) # show ptp
PTP mode : Boundary Clock
Message format : Mixed
Acceptable Master Table : Enabled
Domain : 127
Clock identity : 7C:FE:90:FF:FE:FA:21:88
GMC identity : 7C:FE:90:FF:FE:FA:21:88
Number of master ports : 1
Slave port interface : N/A
2. Enable Forced Master on the interface. Run:
To verify PTP configuration:
Forced Master is indicated as “yes” only if enabled on the interface and the corresponding VLAN interface.
325
9.2.5 PTP Commands
• protocol ptp
• ptp amt
• ptp announce interval
• ptp announce timeout
• ptp delay-req interval
• ptp domain
• ptp enable
• ptp enable forced-master
• ptp enable ipv6
• ptp mean-path-delay
• ptp message-format
• ptp offset-from-master
• ptp priority
• ptp sync interval
• ptp tll
• clear ptp amt log
• clear ptp forced-master log
• clear ptp interface counters
• clear ptp vrf counters
• ptp vrf enable
• show ptp
• show ptp vrf
• show ptp vrf counters
• show ptp amt
• show ptp interface port-channel
• show ptp interface port-channel counters
• show ptp amt log
• show ptp clock
• show ptp clock parent
• show ptp forced-master
• show ptp
• show ptp clock foreign-masters
• show ptp interface ethernet counters
• show ptp interface
• show ptp interface ethernet
• show ptp interface vlan
• show ptp interface vlan ethernet
• show ptp interface vlan counters
• show ptp interface vlan ethernet counters
• show ptp time-property
• show ptp status
• PTP Debuggability Logging Examples
• Change of the State of Particular PTP Port
• Change of Grandmaster Clock
protocol ptp
326
Syntax Description N/A
Default N/A
History 3.6.4110
Related Commands
Notes
Default N/A
History 3.6.8100
Notes
327
9.2.5.3 ptp announce interval
Default N/A
History 3.6.4110
3.6.8008 Added “interface vlan” configuration mode
Notes
ptp announce timeout <timeout>
Default N/A
328
Configuration Mode config interface port-channel
config interface ethernet
config interface vlan
History 3.6.4110
3.6.8008 Added “interface vlan” configuration mode
Notes
Default: 0
Default N/A
History 3.6.4110
3.6.8008 Added “interface vlan” configuration mode
329
3.9.0600 Updated example and added note
Notes IEEE 1588 defines delay-request as an offset from Sync Interval (logSyncInt). A value of
0 therefore matches the defined logSyncInt value.
Example: logSyncInt = -3, delay-req = 0 implies delay-req message rate is -3
Default 127
History 3.6.4110
Notes
330
9.2.5.7 ptp enable
ptp enable
no ptp enable
History 3.6.4
110
3.6.8 Added “config interface vlan” configuration mode
008
3.6.8 Added “config interface port-channel” configuration mode
100
Notes
331
Syntax Description N/A
History 3.6.8100
Notes
Configures PTP on the ethernet interface and enables the forced-master and support of
IPv6 with a specified scope.
The no form of the command removes the support from the interface.
History 3.8.2000
332
Related Commands show ptp
Notes When configuring PTP IPv6, the "global" multicast scope is the default.
Enables logging of the mean path delay value if it exceeds the specified threshold.
Disables logging of the mean path delay value if it exceeds the specified threshold.
Default Enabled
History 3.8.2100
333
Logging Examples Example of ptp mean-path-delay 10:
334
Related Commands show ptp clock
show ptp status
show log
Notes If the mean path delay exceeds the threshold, the following ptp4l log message will
appear: “Oct 11 19:04:41 arc-switch142 ptp4l: [242.721] PTP slave port Eth1/10 High
Mean Path Delay 65536 (ns)”
Default mixed
History 3.6.8008
Related Commands
Notes
Enables logging of the offset from master value if it exceeds the specified threshold.
Syntax values [-1000000000; -10] [10; 1000000000]. Default [-100000; -10] [10; 100000]
Description
335
Default Enabled
Configuration config
Mode
History 3.8.2100
336
Logging Example of ptp offset-from-master -10 10:
Example
Nov 11 16:09:54 arc-switch142 ptp4l: [2593.020] port 1:
Interface Eth1/10 state changed from MASTER to UNCALIBRATED on
RS_SLAVE
Nov 11 16:09:54 arc-switch142 ptp4l: [2593.269] port 1:
Interface Eth1/10 state changed from UNCALIBRATED to SLAVE on
MASTER_CLOCK_SELECTED
Nov 11 16:10:03 arc-switch142 ptp4l: [2601.897] PTP slave port
Eth1/10 High offset from Master -11 (ns)
Nov 11 16:10:03 arc-switch142 ptp4l: [2602.022] PTP slave port
Eth1/10 High offset from Master -14 (ns)
Nov 11 16:10:03 arc-switch142 ptp4l: [2602.272] PTP slave port
Eth1/10 High offset from Master -11 (ns)
Nov 11 16:10:03 arc-switch142 ptp4l: [2602.397] PTP slave port
Eth1/10 High offset from Master -13 (ns)
Nov 11 16:10:14 arc-switch142 ptp4l: [2613.526] PTP slave port
Eth1/10 High offset from Master -11 (ns)
Nov 11 16:10:21 arc-switch142 ptp4l: [2620.279] PTP slave port
Eth1/10 High offset from Master 12 (ns)
Nov 11 16:10:21 arc-switch142 ptp4l: [2620.529] PTP slave port
Eth1/10 High offset from Master 12 (ns)
Nov 11 16:10:28 arc-switch142 ptp4l: [2627.656] PTP slave port
Eth1/10 High offset from Master -11 (ns)
Nov 11 16:10:29 arc-switch142 ptp4l: [2627.907] PTP slave port
Eth1/10 High offset from Master -11 (ns)
Nov 11 16:10:52 arc-switch142 ptp4l: [2650.790] PTP slave port
Eth1/10 High offset from Master -13 (ns)
Nov 11 16:11:01 arc-switch142 ptp4l: [2660.419] PTP slave port
Eth1/10 High offset from Master 11 (ns)
Nov 11 16:11:13 arc-switch142 ptp4l: [2672.548] PTP slave port
Eth1/10 High offset from Master -13 (ns)
Nov 11 16:11:17 arc-switch142 ptp4l: [2676.674] PTP slave port
Eth1/10 High offset from Master 11 (ns)
Nov 11 16:11:21 arc-switch142 ptp4l: [2680.676] PTP slave port
Eth1/10 High offset from Master 11 (ns)
Nov 11 16:11:24 arc-switch142 ptp4l: [2683.552] PTP slave port
Eth1/10 High offset from Master -11 (ns)
Nov 11 16:11:28 arc-switch142 ptp4l: [2687.553] PTP slave port
Eth1/10 High offset from Master -11 (ns)
Nov 11 16:11:34 arc-switch142 ptp4l: [2692.930] PTP slave port
Eth1/10 High offset from Master -11 (ns)
Nov 11 16:11:44 arc-switch142 ptp4l: [2703.059] PTP slave port
Eth1/10 High offset from Master 12 (ns)
Nov 11 16:11:44 arc-switch142 ptp4l: [2703.309] PTP slave port
Eth1/10 High offset from Master 11 (ns)
Nov 11 16:11:50 arc-switch142 ptp4l: [2709.561] PTP slave port
Eth1/10 High offset from Master -11 (ns)
Nov 11 16:11:55 arc-switch142 ptp4l: [2713.937] PTP slave port
Eth1/10 High offset from Master -13 (ns)
Nov 11 16:11:55 arc-switch142 ptp4l: [2714.062] PTP slave port
Eth1/10 High offset from Master -15 (ns)
Nov 11 16:11:55 arc-switch142 ptp4l: [2714.312] PTP slave port
Eth1/10 High offset from Master -14 (ns)
Nov 11 16:11:55 arc-switch142 ptp4l: [2714.438] PTP slave port
Eth1/10 High offset from Master -11 (ns)
337
Related show log
Commands show ptp clock
show ptp status
Notes If the mean path delay exceeds the threshold, the following ptp4l log message will appear: “Oct
11 19:04:41 arc-switch142 ptp4l: [242.721] PTP slave port Eth1/10 High offset from Master
36766720739 (ns)”
Default 128
History 3.6.4110
Notes
Default N/A
338
Configuration Mode config interface port-channel
config interface ethernet
config interface vlan
History 3.6.4110
3.6.8008 Added “interface vlan” configuration mode
Notes
Sets the TTL value of the PTP messages.
The no form of the command sets the PTP UDP TTL value back to its default value of 1.
History 3.9.2000
339
Example switch (config) # ptp ttl 10
switch (config) # show ptp
PTP mode : Boundary Clock
Message format : Mixed
Acceptable Master Table : Disabled
Domain : 127
TTL : 10
Notes
Default N/A
History 3.6.8100
Notes
340
Default N/A
History 3.6.8100
Notes
Default N/A
History 3.6.8008
341
Notes
Default N/A
History 3.7.1000
Notes This command clears interface statistics on all PTP enabled interfaces in a specific PTP
enabled VRF.
Default N/A
History 3.7.1000
342
Example switch (config) # ptp vrf cust1 enable forced-master
show ptp
Default N/A
History 3.6.4110
343
Example switch (config) # show ptp
PTP mode : Boundary Clock
Message format : Mixed
Acceptable Master Table : Disabled
Domain : 127
TTL : 10
Clock identity : 7C:FE:90:FF:FE:FA:23:88
GMC identity : 7C:FE:90:FF:FE:FA:23:88
Number of master ports : 0
Slave port interface : N/A
------------------------------------------------------------
--------
Port Po VLAN VRF Transport State
Forced Master
------------------------------------------------------------
--------
Eth1/1 N/A N/A default IPv4 SLAVE no
Related Commands
Notes
Default N/A
History 3.7.1000
344
Example switch (config) # show ptp vrf
Interface name: Eth1/1
Channel group ID: N/A
VRF: cust1
IP Address: 1.1.1.1
Port Clock identity: E4:1D:2D:FF:FE:44:65:C8
PTP Port number: 1
PTP operational state: UP
PTP interface state: MASTER
Forced Master: no
Delay request interval(log mean): 0
Announce receipt time out: 3
Announce interval(log mean): -2
Sync interval(log mean): -3
Delay Mechanism: End to End
Transport protocol: UDP IPv4
IPv6 Multicast scope ID: N/A
Related Commands
Notes Displays ptp state of all PTP-enabled interfaces in all PTP-enabled VRFs.
345
9.2.5.23 show ptp vrf counters
Default N/A
History 3.7.1000
346
Example switch (config) # show ptp vrf cust1 counters
VRF: cust1
Eth1/1
RX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
0 Management message count
TX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
0 Management message count
0 Forwarded Management message count
Eth1/2
RX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
0 Management message count
TX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
0 Management message count
0 Forwarded Management message count
347
Related Commands
Notes Display ptp counters of all PTP enabled interfaces in specific PTP enabled VRF.
Default N/A
History 3.6.8100
Notes
Default N/A
348
History 3.7.1000
VRF: default
IP Address: 1111:0:0:0:0:0:0:0/64
Port Clock identity: EC:0D:9A:FF:FE:
60:37:C8
PTP Port number: 1
PTP interface state: MASTER
PTP operational state: UP
Forced Master: no
Delay request interval(log mean): 0
Announce receipt time out: 3
Announce interval(log mean): -2
Sync interval(log mean): -5
Delay Mechanism: End to End
Transport protocol: UDP IPv6
IPv6 Multicast scope ID: Global (0xE)
VRF: default
IP Address: 1111:0:0:0:0:0:0:0/64
Port Clock identity: EC:0D:9A:FF:FE:
60:37:C8
PTP Port number: 1
PTP interface state: MASTER
PTP operational state: UP
Forced Master: no
Delay request interval(log mean): 0
Announce receipt time out: 3
Announce interval(log mean): -2
Sync interval(log mean): -5
Delay Mechanism: End to End
Transport protocol: UDP IPv6
IPv6 Multicast scope ID: Global (0xE)
Related Commands
Notes
349
9.2.5.26 show ptp interface port-channel counters
Default N/A
History 3.7.1000
350
Example switch (config) # show ptp interface port-channel 3 counters
Eth1/10
RX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
0 Management message count
TX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
1 Management message count
0 Forwarded Management message count
Eth1/11 (Po 3)
RX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
0 Management message count
TX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
2 Management message count
0 Forwarded Management message count
Related Commands
351
Notes
Default N/A
History 3.6.8100
Example
-----------------------------------------------------------------------------
--
Clock Identity Interface VLAN IP Address Last Occurrence
-----------------------------------------------------------------------------
--
04:1D:2D:FF:FE:A5:F3:94 Eth1/2 N/A 192.168.66.7 2018/07/17
19:44:09
03:1D:2D:FF:FE:A5:F3:94 Eth1/2 N/A 192.168.66.7 2018/07/17
19:44:09
Notes
352
Syntax Description N/A
Default N/A
History 3.6.4110
...
Related Commands
Notes
Default N/A
History 3.6.4110
353
3.8.2100 Updated example
GMC
GMC Identity: EC:46:70:FF:FE:0C:E4:82
Related Commands
Notes
Default N/A
History 3.6.8100
354
Related Commands show ptp
Notes
Default N/A
History 3.6.4110
Related Commands
355
Notes
Default N/A
History 3.8.2100
------------------------------------------------------------
--
Interface Clock-ID P1 P2 CC CA OSLV SR
GM
------------------------------------------------------------
--
Eth1/15 EC:46:70:FF:FE:0C:E4:82 128 128 6 33 13563 0 Y
Eth1/13 00:80:EA:FF:FE:D0:25:AA 128 1 6 33 20061 0 N
Notes
356
Default N/A
History 3.6.4110
TX
74188 Sync message count
17 Delay request message count
0 PDelay request message count
0 PDelay response message count
74188 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
37117 Announce message count
0 Signaling message count
57 Management message count
...
Related Commands
Notes
Displays PTP configuration and operation data for all PTP-enabled interfaces.
357
Syntax Description N/A
Default N/A
History 3.8.2000
358
Notes
Displays PTP configuration and operation data for the ethernet interface.
Default N/A
History 3.8.2000
Related Commands
Notes
359
Syntax Description vid VLAN ID
Default N/A
History 3.6.8008
Related Commands
Notes
Displays PTP configuration and operation data for specified VLAN member interface for a
specified Ethernet port.
360
Default N/A
History 3.6.8008
Related Commands
Notes
Default N/A
History 3.6.8008
361
Example switch (config) # show ptp interface vlan 3 counters
Eth1/3 (VLAN 3)
RX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signalling message count
0 Management message count
TX
19851 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
19851 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
9928 Announce message count
0 Signalling message count
2 Management message count
0 Forwarded Management message count
Related Commands
Notes
Default N/A
362
History 3.6.8008
TX
0 Sync message count
0 Delay request message count
0 PDelay request message count
0 PDelay response message count
0 Follow Up message count
0 Delay response message count
0 PDelay response follow Up message count
0 Announce message count
0 Signaling message count
0 Management message count
Related Commands
Notes
Displays PTP time-property parameters (time source, current utc offset etc).
Default N/A
History 3.8.2100
363
Example switch (config) # show ptp time-property
Related Commands
Notes
Displays the last 100 entries for Offset from Master and Mean Path Delay values.
Default N/A
History 3.8.2100
364
Example switch (config) # show ptp status
Related Commands
Notes
365
9.2.5.42 PTP Debuggability Logging Examples
Nov 11 15:33:09 arc-switch142 ptp4l: [351.341] PTP [Debuggability]: PTP Grandmaster clock has changed from
000000.0000.000000 to ec0d9a.fffe.603848
Nov 11 15:33:09 arc-switch142 ptp4l: [351.341] port 0: hybrid_e2e only works with E2E
Nov 11 15:33:09 arc-switch142 ptp4l: [351.342] port 1: Interface Eth1/10 state changed from INITIALIZING to
LISTENING on INIT_COMPLETE
Nov 11 15:33:09 arc-switch142 ptp4l: [351.342] port 0: Interface state changed from INITIALIZING to
LISTENING on INIT_COMPLETE
Nov 11 15:33:09 arc-switch142 ptp4l: [351.342] port 1: link down
Nov 11 15:33:09 arc-switch142 ptp4l: [351.342] port 1: Interface Eth1/10 state changed from LISTENING to
FAULTY on FAULT_DETECTED (FT_UNSPECIFIED)
Nov 11 15:33:09 arc-switch142 ptp4l: [351.343] selected local clock ec0d9a.fffe.603848 as best master
Nov 11 15:33:09 arc-switch142 ptp4l: [351.343] assuming the grand master role
Nov 11 15:33:09 arc-switch142 ptp4l: [351.343] PTP [Debuggability]: PTP Grandmaster clock has changed from
ec0d9a.fffe.603848 to ec0d9a.fffe.603848
Nov 11 15:33:09 arc-switch142 pm[4868]: [pm.NOTICE]: Launched phc2sys (PTP phc2sys daemon) with pid 7870
Nov 11 15:33:09 arc-switch142 ptp4l: [351.455] port 1: link up
Nov 11 15:33:09 arc-switch142 ptp4l: [351.456] port 1: Interface Eth1/10 state changed from FAULTY to
LISTENING on INIT_COMPLETE
Nov 11 15:33:10 arc-switch142 ptp4l: [352.295] PTP [Debuggability]: Matched Announce interval on Eth1/10.
Configured -2, Received -2
Nov 11 15:33:10 arc-switch142 ptp4l: [352.295] port 1: new foreign master ec0d9a.fffe.6037c8-1
Nov 11 15:33:10 arc-switch142 ptp4l: [352.402] port 1: Interface Eth1/10 state changed from LISTENING to
MASTER on ANNOUNCE_RECEIPT_TIMEOUT_EXPIRES
Nov 11 15:33:10 arc-switch142 ptp4l: [352.402] selected local clock ec0d9a.fffe.603848 as best master
Nov 11 15:33:10 arc-switch142 ptp4l: [352.402] assuming the grand master role
Nov 11 15:33:10 arc-switch142 ptp4l: [352.402] PTP [Debuggability]: PTP Grandmaster clock has changed from
ec0d9a.fffe.603848 to ec0d9a.fffe.603848
Nov 11 15:33:10 arc-switch142 ptp4l: [352.419] PTP [Debuggability]: Matched Sync interval on Eth1/10.
Configured -3, Received -3
Nov 11 15:33:11 arc-switch142 ptp4l: [352.795] selected best master clock ec0d9a.fffe.6037c8
Nov 11 15:33:11 arc-switch142 ptp4l: [352.795] PTP [Debuggability]: PTP Grandmaster clock has changed from
ec0d9a.fffe.603848 to ec0d9a.fffe.6037c8
Nov 11 15:33:11 arc-switch142 ptp4l: [352.795] port 1: Interface Eth1/10 state changed from MASTER to
UNCALIBRATED on RS_SLAVE
Nov 11 15:33:11 arc-switch142 ptp4l: [353.044] PTP slave port Eth1/10 High offset from Master 635155 (ns)
Nov 11 15:33:11 arc-switch142 ptp4l: [353.169] PTP slave port Eth1/10 High offset from Master 635353 (ns)
Nov 11 15:33:11 arc-switch142 ptp4l: [353.294] port 1: Interface Eth1/10 state changed from UNCALIBRATED to
SLAVE on MASTER_CLOCK_SELECTED
366
9.2.5.42.2 Change of Grandmaster Clock
Nov 11 15:33:09 arc-switch142 ptp4l: [351.341] PTP [Debuggability]: PTP Grandmaster clock has changed from
000000.0000.000000 to ec0d9a.fffe.603848
Nov 11 15:33:09 arc-switch142 ptp4l: [351.341] port 0: hybrid_e2e only works with E2E
Nov 11 15:33:09 arc-switch142 ptp4l: [351.342] port 1: Interface Eth1/10 state changed from INITIALIZING to
LISTENING on INIT_COMPLETE
Nov 11 15:33:09 arc-switch142 ptp4l: [351.342] port 0: Interface state changed from INITIALIZING to
LISTENING on INIT_COMPLETE
Nov 11 15:33:09 arc-switch142 ptp4l: [351.342] port 1: link down
Nov 11 15:33:09 arc-switch142 ptp4l: [351.342] port 1: Interface Eth1/10 state changed from LISTENING to
FAULTY on FAULT_DETECTED (FT_UNSPECIFIED)
Nov 11 15:33:09 arc-switch142 ptp4l: [351.343] selected local clock ec0d9a.fffe.603848 as best master
Nov 11 15:33:09 arc-switch142 ptp4l: [351.343] assuming the grand master role
Nov 11 15:33:09 arc-switch142 ptp4l: [351.343] PTP [Debuggability]: PTP Grandmaster clock has changed from
ec0d9a.fffe.603848 to ec0d9a.fffe.603848
Nov 11 15:33:09 arc-switch142 pm[4868]: [pm.NOTICE]: Launched phc2sys (PTP phc2sys daemon) with pid 7870
Nov 11 15:33:09 arc-switch142 ptp4l: [351.455] port 1: link up
Nov 11 15:33:09 arc-switch142 ptp4l: [351.456] port 1: Interface Eth1/10 state changed from FAULTY to
LISTENING on INIT_COMPLETE
Nov 11 15:33:10 arc-switch142 ptp4l: [352.295] PTP [Debuggability]: Matched Announce interval on Eth1/10.
Configured -2, Received -2
Nov 11 15:33:10 arc-switch142 ptp4l: [352.295] port 1: new foreign master ec0d9a.fffe.6037c8-1
Nov 11 15:33:10 arc-switch142 ptp4l: [352.402] port 1: Interface Eth1/10 state changed from LISTENING to
MASTER on ANNOUNCE_RECEIPT_TIMEOUT_EXPIRES
Nov 11 15:33:10 arc-switch142 ptp4l: [352.402] selected local clock ec0d9a.fffe.603848 as best master
Nov 11 15:33:10 arc-switch142 ptp4l: [352.402] assuming the grand master role
Nov 11 15:33:10 arc-switch142 ptp4l: [352.402] PTP [Debuggability]: PTP Grandmaster clock has changed from
ec0d9a.fffe.603848 to ec0d9a.fffe.603848
Nov 11 15:33:10 arc-switch142 ptp4l: [352.419] PTP [Debuggability]: Matched Sync interval on Eth1/10.
Configured -3, Received -3
Nov 11 15:33:11 arc-switch142 ptp4l: [352.795] selected best master clock ec0d9a.fffe.6037c8
Nov 11 15:33:11 arc-switch142 ptp4l: [352.795] PTP [Debuggability]: PTP Grandmaster clock has changed from
ec0d9a.fffe.603848 to ec0d9a.fffe.6037c8
Nov 11 15:33:11 arc-switch142 ptp4l: [352.795] port 1: Interface Eth1/10 state changed from MASTER to
UNCALIBRATED on RS_SLAVE
Nov 11 15:33:11 arc-switch142 ptp4l: [353.044] PTP slave port Eth1/10 High offset from Master 635155 (ns)
Nov 11 15:33:11 arc-switch142 ptp4l: [353.169] PTP slave port Eth1/10 High offset from Master 635353 (ns)
Nov 11 15:33:11 arc-switch142 ptp4l: [353.294] port 1: Interface Eth1/10 state changed from UNCALIBRATED to
SLAVE on MASTER_CLOCK_SELECTED
Announce Interval Mismatch Notification
367
Nov 11 15:41:10 arc-switch142 ptp4l: [869.220] PTP [Debuggability]: PTP Grandmaster clock has changed from
000000.0000.000000 to ec0d9a.fffe.603848
Nov 11 15:41:10 arc-switch142 ptp4l: [869.221] port 0: hybrid_e2e only works with E2E
Nov 11 15:41:10 arc-switch142 ptp4l: [869.221] port 1: Interface Eth1/10 state changed from INITIALIZING to
LISTENING on INIT_COMPLETE
Nov 11 15:41:10 arc-switch142 ptp4l: [869.221] port 0: Interface state changed from INITIALIZING to
LISTENING on INIT_COMPLETE
Nov 11 15:41:10 arc-switch142 pm[4868]: [pm.NOTICE]: Launched phc2sys (PTP phc2sys daemon) with pid 8918
Nov 11 15:41:10 arc-switch142 ptp4l: [869.284] PTP [Debuggability]: Matched Sync interval on Eth1/10.
Configured -3, Received -3
Nov 11 15:41:10 arc-switch142 ptp4l: [869.284] PTP [Debuggability]: Mismatch Announce interval on Eth1/10.
Configured -1, Received -3
Nov 11 15:41:10 arc-switch142 ptp4l: [869.284] port 1: new foreign master ec0d9a.fffe.6037c8-1
Nov 11 15:41:10 arc-switch142 ptp4l: [869.534] selected best master clock ec0d9a.fffe.6037c8
Nov 11 15:41:10 arc-switch142 ptp4l: [869.534] PTP [Debuggability]: PTP Grandmaster clock has changed from
ec0d9a.fffe.603848 to ec0d9a.fffe.6037c8
Nov 11 15:41:10 arc-switch142 ptp4l: [869.534] port 1: Interface Eth1/10 state changed from LISTENING to
UNCALIBRATED on RS_SLAVE
Nov 11 15:41:11 arc-switch142 ptp4l: [869.909] port 1: Interface Eth1/10 state changed from UNCALIBRATED to
SLAVE on MASTER_CLOCK_SELECTED
Nov 11 15:42:34 arc-switch142 ptp4l: [953.018] PTP [Debuggability]: Matched Announce interval on Eth1/10.
Configured -1, Received -1
Sync Interval Mismatch Notification
368
Nov 11 16:05:34 arc-switch142 ptp4l: [2332.929] PTP [Debuggability]: PTP Grandmaster clock has changed from
ec0d9a.fffe.603848 to ec0d9a.fffe.6037c8
Nov 11 16:05:34 arc-switch142 ptp4l: [2332.929] port 1: Interface Eth1/10 state changed from MASTER to
UNCALIBRATED on RS_SLAVE
Nov 11 16:05:34 arc-switch142 ptp4l: [2333.053] PTP [Debuggability]: Mismatch Sync interval on Eth1/10.
Configured -3, Received -2
Nov 11 16:05:34 arc-switch142 ptp4l: [2333.303] port 1: Interface Eth1/10 state changed from UNCALIBRATED
to SLAVE on MASTER_CLOCK_SELECTED
Nov 11 16:06:14 arc-switch142 ptp4l: [2372.799] port 1: Interface Eth1/10 state changed from SLAVE to MASTER
on ANNOUNCE_RECEIPT_TIMEOUT_EXPIRES
Nov 11 16:06:14 arc-switch142 ptp4l: [2372.799] selected local clock ec0d9a.fffe.603848 as best master
Nov 11 16:06:14 arc-switch142 ptp4l: [2372.799] assuming the grand master role
Nov 11 16:06:14 arc-switch142 ptp4l: [2372.799] PTP [Debuggability]: PTP Grandmaster clock has changed from
ec0d9a.fffe.6037c8 to ec0d9a.fffe.603848
Nov 11 16:06:14 arc-switch142 ptp4l: [2372.943] selected best master clock ec0d9a.fffe.6037c8
Nov 11 16:06:14 arc-switch142 ptp4l: [2372.943] PTP [Debuggability]: PTP Grandmaster clock has changed from
ec0d9a.fffe.603848 to ec0d9a.fffe.6037c8
Nov 11 16:06:14 arc-switch142 ptp4l: [2372.943] port 1: Interface Eth1/10 state changed from MASTER to
UNCALIBRATED on RS_SLAVE
Nov 11 16:06:14 arc-switch142 ptp4l: [2373.317] PTP [Debuggability]: Mismatch Sync interval on Eth1/10.
Configured -3, Received -1
Nov 11 16:06:15 arc-switch142 ptp4l: [2373.817] port 1: Interface Eth1/10 state changed from UNCALIBRATED
to SLAVE on MASTER_CLOCK_SELECTED
Nov 11 16:06:33 arc-switch142 ptp4l: [2392.739] port 1: Interface Eth1/10 state changed from SLAVE to MASTER
on ANNOUNCE_RECEIPT_TIMEOUT_EXPIRES
Nov 11 16:06:33 arc-switch142 ptp4l: [2392.739] selected local clock ec0d9a.fffe.603848 as best master
Nov 11 16:06:33 arc-switch142 ptp4l: [2392.739] assuming the grand master role
Nov 11 16:06:33 arc-switch142 ptp4l: [2392.739] PTP [Debuggability]: PTP Grandmaster clock has changed from
ec0d9a.fffe.6037c8 to ec0d9a.fffe.603848
Nov 11 16:06:34 arc-switch142 ptp4l: [2392.978] PTP [Debuggability]: Matched Sync interval on Eth1/10.
Configured -3, Received -3
Nov 11 16:06:34 arc-switch142 ptp4l: [2392.979] selected best master clock ec0d9a.fffe.6037c8
Nov 11 16:06:34 arc-switch142 ptp4l: [2392.979] PTP [Debuggability]: PTP Grandmaster clock has changed from
ec0d9a.fffe.603848 to ec0d9a.fffe.6037c8
Replacing CRC field with a timestamp is only supported on Spectrum-2 and Spectrum-3 systems.
In some applications, it is important to know the exact time when a packet arrived at the switch in order to analyze
networkwide application behavior. In order to achieve this capability, it is possible to mark the packet that leaves the
switch with a timestamp that shows when this packet arrived.
One of the use cases is a mirroring setup when an original packet is forwarded by the system, but its mirrored copy is
sent to a collector for analysis together with a timestamp that will help analyzer to rebuild the sequence of events in the
network.
369
• Disabling recalculation of the CRC on the egress port
• Disabling replacement of the FCS (Frame Check Sequence) field in the packet with a timestamp globally
CRC checking operation is enabled by default and is performed for incoming packets. Disabling CRC checking is
required in cases when we want the packet which has timestamp instead of FCS field to traverse the switch through the
ingress port. Otherwise (when CRC checking is enabled), it will be dropped as the packet that has bad CRC value.
CRC recalculation operation is done on the outgoing packets by default. Disabling CRC recalculation is required in
cases when we want the packet to pass through the egress port and preserve the timestamp in the FCS field. Otherwise
(when CRC recalculation is enabled), the packet’s FCS field will be overwritten by actual CRC value during the
recalculation process.
A timestamp that is placed into FCS field in the packet can be obtained from the following time sources according to
priority:
• NTP (if running)
• Local clock
The timestamp identifies a time when the packet is entered into the system. It is presented in UTC format and
overwrites 26 bits of the FCS field as follows:
• 24 bits in nanoseconds [29:6]
• 2 bits in seconds [31:30]
Replacing the FCS field with a timestamp is enabled globally in ONYX by default. Despite this, packets will still leave
the switch without the timestamp – it will be overwritten on the egress port during recalculation process (unless the
CRC recalculation is disabled by the user).
The first switch is collecting timestamp – the timestamp will be set when a packet entered the system through the
ingress port. In order to preserve the timestamp, the CRC recalculation should be disabled on the egress port.
The packet with a timestamp should pass through the second switch transparently. For this purpose, both CRC check
and recalculation must be disabled on the ingress and egress ports accordingly.
370
2. Enter config mode. Run:
• Main Functionality
• Setup Configuration
• Replace CRC with Timestamp Commands
• fcs ingress disable-check
• fcs egress disable-recalculate
• system timestamp disable
371
9.3.3.1 fcs ingress disable-check
Disables checking of the CRC value in the ingress packets received on the interface.
The “no” form of the command enables checking of the CRC value.
History 3.9.1000
Notes Disable CRC check cannot be configured on the LAG or MLAG ethernet members
alone.
Disables recalculation of the CRC value in the egress packets being sent from the
interface.
The “no” form of the command enables recalculation of the CRC value.
372
Configuration Mode config interface ethernet
config interface port-channel
config interface mlag-port-channel
History 3.9.1000
Notes Disable CRC recalculate cannot be configured on the LAG or MLAG ethernet members
alone.
Disables replacement of the CRC/FCS field in the packet with a timestamp in the
system.
The "no" form of the command enables replacement of the CRC/FCS field with a
timestamp.
Default Enabled
History 3.9.1000
373
Notes Timestamping is enabled in the system by default. Despite this, packets will still leave
the switch without the timestamp—it will be overwritten on the egress port during
recalculation process.
374
10 Network Management Interfaces
10.1 SNMP
Simple Network Management Protocol (SNMP), is a network protocol for the management of a network and the
monitoring of network devices and their functions. SNMP supports asynchronous event (trap) notifications and queries.
Onyx supports:
• SNMP versions v1, v2c and v3
• SNMP trap notifications
• Standard MIBs
• Mellanox private MIBs
MIB Standard
INET-ADDRESS-MIB RFC-4001
SNMPV2-CONF
IANAifType-MIB
IANA-ADDRESS-FAMILY-NUMBERS-MIB
The following table presents the supported chassis and switch MIBs:
375
10.1.2 Private MIBs
MIB Description
376
10.1.3 Proprietary Traps
The following private traps are supported by the Onyx MELLANOX-EFM-MIB:
internalBusError N/A
cpuUtilHigh N/A
diskSpaceLow Clean images and sysDump files using the commands “image
delete” and “file debug-dump delete”.
lowPowerRecover N/A
insufficientFansRecover N/A
insufficientPowerRecover N/A
377
For additional information refer to MELLANOX-EFM-MIB.
The only MELLANOX-POWER-CYCLE trap supported is mellanoxPowerCyclePlannedReload.
2. Make sure no SNMP trap host is configured. Run:
3. Make sure no SNMP users are configured. Run:
378
switch (config) # no snmp-server user <username> v3
Procedure:
1. Check existing engine ID:
switch (config) # snmp-server user [role] v3 prompt auth <hash type> priv
<privacy type>
Where:
• user role—admin
• auth type—md5 or sha or sha224 or sha256 or sha384 or sha512
• priv type—des or aes-128 or 3des or aes-192 or aes-256 or aes-192-cfb or aes-256-cfb
2. Enter authentication password and its confirmation.
3. Enter privacy password and its confirmation:
switch (config) # snmp-server user admin v3 prompt auth md5 priv des
Auth password: ********
Confirm: ********
Privacy password: ********
Confirm: ********
To retrieve the system table, run the following SNMP command:
379
switch (config) # snmp-server enable
switch (config) # snmp-server enable notify
2. Configure SNMP host with the desired arguments (IP Address, SNMP version, authentication methods). More
than one host can be configured. Each host may have different attributes. Run:
3. Verify the SNMP host configuration. Run:
4. Configure the desired event to be sent via SNMP. Run:
5. Verify the list of traps and informs being sent to out of the system. Run:
380
switch (config) # show snmp events
Events for which traps will be sent:
asic-chip-down: ASIC (Chip) Down
cpu-util-high: CPU utilization has risen too high
disk-space-low: Filesystem free space has fallen too low
health-module-status: Health module Status
insufficient-fans: Insufficient amount of fans in system
insufficient-fans-recover: Insufficient amount of fans in system recovered
insufficient-power: Insufficient power supply
interface-down: An interface's link state has changed to down
interface-up: An interface's link state has changed to up
internal-bus-error: Internal bus (I2C) Error
liveness-failure: A process in the system was detected as hung
low-power: Low power supply
low-power-recover: Low power supply Recover
new_root: local bridge became a root bridge
paging-high: Paging activity has risen too high
power-redundancy-mismatch: Power redundancy mismatch
process-crash: A process in the system has crashed
process-exit: A process in the system unexpectedly exited
snmp-authtrap: An SNMP v3 request has failed authentication
topology_change: local bridge triggered a topology change
unexpected-shutdown: Unexpected system shutdown
3. Make sure SNMP communities are enabled (they are enabled by default). Make sure “(DISABLED)” does not
appear beside “Read-only communities” / “Read-write communities”. Run:
381
switch (config) # show snmp
SNMP enabled : yes
SNMP port : 161
System contact :
System location:
Read-only communities:
public
Read-write communities:
my-community-name
Interface listen enabled: yes
Listen Interfaces:
Interface: mgmt0
switch (config) # show snmp
No Listen Interfaces.
switch (config) # snmp-server user myuser v3 auth sha <password1> priv aes-128
<password2>
It is possible to use other configuration options not specified in the example above. Please refer to the
command “snmp-server user” for more information.
2. Make sure the username is enabled for SET access and has admin capability level. Run:
The OS supports the OIDs for SET operation listed in the following table which are expanded upon in the following
subsections.
382
OID Name OID
mellanoxConfigDBCmdFilename 1.3.6.1.4.1.33049.12.1.1.2.2.0
mellanoxConfigDBCmdStatus 1.3.6.1.4.1.33049.12.1.1.2.4.0
mellanoxConfigDBCmdStatusString 1.3.6.1.4.1.33049.12.1.1.2.5.0
mellanoxConfigDBCmdUri 1.3.6.1.4.1.33049.12.1.1.2.1.0
mellanoxPowerCycleCmdStatus 1.3.6.1.4.1.33049.10.1.1.2.2.0
mellanoxPowerCycleCmdStatusString 1.3.6.1.4.1.33049.10.1.1.2.3.0
mellanoxSWUpdateCmdUri 1.3.6.1.4.1.33049.11.1.1.2.2.0
mellanoxSWUpdateCmdExecute 1.3.6.1.4.1.33049.11.1.1.2.3.0
mellanoxSWUpdateCmdStatus 1.3.6.1.4.1.33049.11.1.1.2.4.0
mellanoxSWUpdateCmdStatusString 1.3.6.1.4.1.33049.11.1.1.2.5.0
mellanoxSWActivePartition 1.3.6.1.4.1.33049.11.1.1.3.0.0
mellanoxSWNextBootPartition 1.3.6.1.4.1.33049.11.1.1.4.0.0
383
10.1.8.3 Setting Hostname with SNMP
The OS supports setting system hostname using an SNMP SET request as described in SNMPv2-MIB (sysName, OID:
1.3.6.1.2.1.1.5.0).
The restrictions on setting a hostname via CLI also apply to setting a hostname through SNMP. Refer to the
command “hostname” for more information.
384
• BinaryDelete—deletes a binary based configuration file
• TextDelete—deletes a text based configuration file
10.2.1 Authentication
The JSON API protocol runs over HTTP/HTTPS and uses the existing web authentication mechanism.
In order to access the system via HTTP/HTTPS, an HTTP/HTTPS client is needed to send POST requests to the
system.
385
HTTPS access to the web-based management console needs to be enabled using the command “web https
enable” to allow POST requests.
The HTTPS client must first be authenticated by sending a POST request to the following URL:
https://<ip-address>/admin/launch?script=rh&template=json-request&action=json-login
The POST request content should contain the following data (may also be saved as a file) in a JSON format:
{
"username": "<user name>",
"password": "<user password>"
}
After a successful login, a session ID (cookie) is returned to be used for other HTTPS requests in the system.
{
"username": "admin",
"password": "admin"
}
Run the following from your server’s shell to create a login session ID in the file: cookiejar.
Upon a successful login, you will receive a reply similar to the following:
{
"status": "OK",
"status_message": "Successfully logged-in"
}
The session ID can now be used in all other JSON HTTPS requests to the system.
If authentication fails, the following message is received:
{
"status": "ERROR",
"status_message": "<Invalid username or password | Please provide username and
password>"
}
386
You may also log in and execute commands in the same JSON request. In this case, the JSON file must be in the
following format:
{
"username": "<user name>",
"password": "<user password>",
"commands | cmd": ["<cli command 1>", "<cli command 2>"] | "<cli command>",
"execution_type": "sync | async"
}
For example:
{
"username": "admin",
"password": "admin",
"cmd": "show fan"
}
If login is successful, the JSON API response appears. Otherwise, login failure response is presented.
{
"username": "admin",
"password": "admin",
"initial_admin_password": "admin",
"initial_monitor_password": "monitor"
}
Expected Outputs
• Admin and Monitor passwords cannot be changed because they have already been changed:
{
"status": "ERROR",
"status_message": " ‘admin’ password was already set & ‘monitor’ password was
already set"
}
387
{
"status_message": " <‘admin’ password was updated successfully> & <‘monitor’
password was updated successfully> "
}
{
"status": "OK",
"status_message": "’admin’ password was updated successfully & ‘monitor’
password was updated successfully"
}
• One of the passwords of either Admin or Monitor was changed, while the other remained the same:
{
"status": "<ERROR|OK>",
"status_message": " < Initial password for the ‘admin’ password was already set
| ‘admin’ password was updated successfully> "
}
• When the payload does not have initial passwords, check change-password nodes to see if there is no updated
password return in this JSON payload:
{
"status": "ERROR",
"status_message": “Please set the default password for ‘admin’ account by using
initial password parameters”
}
When there is no issue with the login, flow will proceed without needing this step.
388
1. Performs a POST operation on URL (the request should contain the session cookie):
[switch_ip]/script=rh&template=json-request&action=json-logout
2. The switch will remove the session and return the following JSON in the response text (in case of error, content
will be relevant to the error):
{
"status": "OK",
"status_message": "Successfully logged-out"
}
3. Make sure there is no cookie. A request with an invalid cookie will respond that the cookie is invalid.
Logout Example
To logout, use the “curl” tool.
{
"cmd": "<CLI command to execute>"
}
Example:
389
{
"cmd": "show interfaces ethernet 1/1"
}
Multiple command execution request format:
{
"commands":["<CLI cmd 1>", "<CLI cmd 2>", … , <CLI cmd n>]
}
Example:
{
"commands":
[
"show interfaces ethernet 1/1",
"show interfaces ethernet 1/2"
]
}
In case of a multiple command request, the execution of the commands is done in the order they appear in the execution
list. Note that the execution of a multiple command request will be stopped upon first failure. That is, in case the
execution of one of the commands fails, none of the remaining commands will be executed.
"execution_type":"<async|sync>"
Example:
{
"execution_type":"async",
"cmd": "show interfaces ethernet 1/1"
}
390
10.2.3.2 JSON Query Requests
JSON Query requests are HTTPS GET requests that contain a job ID parameter. Using a query request, the user can get
information on the current execution state of an ongoing request or the execution results of a completed request. To send
a query request, the user should add the following parameters to the JSON URL:
job_id=<job number>
Example:
https://<switch-ip-address>/admin/launch?script=json&job_id=<job number>
See “JSON Examples” for more examples.
Set commands normally do not return any data or output. If a set command does return an output, it will be
displayed in the “status_message” field.
{
"executed_command": "<CLI command that was executed>",
"status" = "<OK|ERROR>",
"status_message" = "<information on the status received>",
"data" = {the information that was asked for in the request}
}
• executed_command—the CLI command that was executed in the request
• status—the result of the request execution:
• “OK” if the execution is successful
• “ERROR” in case of a problem with the execution
• The value type of this key is “string”.
• data—a JSON object containing the information requested. Returns an empty string if there is no data.
• status message—additional information on the received status. May be empty. The value type of this key is
“string”.
Example:
391
{
“executed_command”: “show interfaces ethernet 1/1
"status": "OK",
"status_message": "",
"data":
{
"speed": "40GbE",
"admin_state": "up"
}
}
See “JSON Examples” for more examples.
{
"results": [
{
"executed_command": "<…>",
"status": "<OK|ERROR|ABORTED>",
"status_message": "<…>",
"data": {…}
},
{
"executed_command": "<…>",
"status": "<OK|ERROR|ABORTED>",
"status_message": "<…>",
"data": {…}
},
…
{
"executed_command": "<…>",
"status": "<OK|ERROR|ABORTED>",
"status_message": "<…>",
"data": {…}
}
]
}
Example:
392
{
"results": [
{
"executed_command": "show interfaces ethernet 1/1",
"status": "OK",
"status_message": ""
"data": {"speed":"40GbE", "admin_state":"up"}
},
{
"executed_command": "show interfaces ethernet 1/100",
"status": "ERROR",
"status_message": "wrong interfaces name",
"data": ""
},
{
"executed_command": "show interfaces ethernet 1/2",
"status": "ABORTED",
"status_message": "",
"data": ""
}
]
}
See “JSON Examples” for more examples.
{
"executed_command": "show interfaces ethernet 1/1",
"status": "PENDING",
"status_message": "",
"data":""
}
393
{
"executed_command": ""
"status": "OK"
"status_message": ""
"data": ""
"job_id": "2754930426"
}
Interactive commands are commands which require user interaction to complete (e.g. type “yes” to
confirm). These commands are not supported by the JSON API.
Send the request:
When the system finishes processing the request, the user will receive a response similar to the following:
{
"status": "OK",
"executed_command": "show system profile",
"status_message": "",
"data": {
"Profile": "eth",
"Adaptive Routing": "yes",
"Number of SWIDs": "1"
}
}
394
10.2.6.1.2 Multiple Commands
This example sends a request to change an interface description and then queries for its status.
Request (save it to a file named req.json):
Send the request:
When the system finishes processing the request, the user will receive a response similar to the following:
{
"results": [
{
"status": "OK",
"executed_command": "interfaces ethernet 1/1 description test
description",
"status_message": "",
"data": ""
},
{
"status": "OK",
"executed_command": "show interfaces ethernet 1/1 status",
"status_message": "",
"data": {
"ETH1/1": [
{
"Negotiation": "Auto",
"Operational state" : "Down"
"Speed": "Unknown",
}
]
}
}
]
}
395
{"execution_type":"async",
"commands": ["interfaces ethernet 1/1 description test description",
"show interfaces ethernet 1/1 status"]}
Send the request:
{
"executed_command": "",
"status": "OK",
"status_message": "",
"data": "",
"job_id": "91329386"
}
If the system is still processing the request, the user receives a response similar to the following:
{
"executed_command": " interfaces ethernet 1/1 description test description ",
"status": "PENDING",
"status_message": "",
"data": ""
}
If the system is done processing the request, the user receives a response similar to the following:
396
{
"results": [
{
"status": "OK",
"executed_command": "interfaces ethernet 1/1 description test
description",
"status_message": "",
"data": ""
},
{
"status": "OK",
"executed_command": "show interfaces ethernet 1/1 status",
"status_message": "",
"data": {
"ETH1/1": [
{
"Negotiation": "Auto",
"Operational state" : "Down"
"Speed": "Unknown",
}
]
}
}
]
}
Send the request:
Error response:
397
{
"status": "ERROR",
"executed_command": "",
"status_message": "Handle request failed. Reason:\nIllegal JSON structure found
in given JSON data.\nExpecting , delimiter: line 1 column 95 (char 94)",
"data": ""
}
{
"execution_type": "sync",
"commands": [ "interfaces ethernet 1/1 speed 25.0 Gbps",
"interfaces ethernet 1/200 speed 25.0 Gbps",
"interfaces ethernet 1/3 speed 25.0 Gbps"]
}
Send the request:
Error response:
398
{
"results": [
{
"status": "OK",
"executed_command": "interfaces ethernet 1/1 speed 25.0 Gbps ",
"status_message": "",
"data": ""
},
{
"status": "ERROR",
"executed_command": "interfaces ethernet 1/200 speed 25.0 Gbps",
"status_message": "% 1st Interface does not exist",
"data": ""
},
{
"status": "ABORTED",
"executed_command": "interfaces ethernet 1/3 speed 25.0 Gbps",
"status_message": "",
"data": ""
}
]
}
This section is displayed only if JSON API is enabled using the command “json-gw enable”.
399
10.2.7.2 To Query an Asynchronous JSON Request
1. Choose “Query asynchronous job status”.
2. Type the job ID in the “Job ID” text box.
3. Press “Query Status”.
The JSON response is then shown in the “JSON Response” box below.
The HTTPS method (HTTPS GET in this instance) and the URL used to send the request will be displayed next to the
“HTTPS Method” and “URL” field respectively.
400
10.3 Network Management Interface Commands
• SNMP
• snmp-server auto-refresh
• snmp-server cache enable
• snmp-server community
• snmp-server contact
• snmp-server enable
• snmp-server engineID reset
• snmp-server enable mult-communities
• snmp-server enable notify
• snmp-server enable set-permission
• snmp-server host disable
• snmp-server host informs
• snmp-server host traps
• snmp-server listen
• snmp-server notify
• snmp-server port
• snmp-server user
• show snmp
• show snmp auto-refresh
• show snmp engineID
• show snmp set-permission
• show snmp user
• JSON API
• json-gw enable
• json-gw synchronous-request-timeout
• show json-gw
401
10.3.1 SNMP
Default Enabled
Interval—60 seconds
History 3.2.3000
3.4.1100 Added “time” parameter and updated notes
Notes • When configuring an interval lower than 60 seconds, the following warning message
appears asking for confirmation: “Warning: this configuration may increase CPU
utilization, Type 'YES' to confirm: YES
• When disabling SNMP auto-refresh, information is retrieved no more than once
every 60 seconds just like SNMP tables that do not have an auto-refresh mechanism
402
10.3.1.2 snmp-server cache enable
Default Enabled
History 3.7.0000
Default Read-only community: “public”
Read-write community: “”
403
History 3.1.0000
Notes • If neither the “ro” or the “rw” parameters are specified, the read-only community is
set as the default community
• If the read-only community is specified, only queries can be performed
• If the read-write community is specified, both queries and sets can be performed
Default “”
History 3.1.0000
Notes
404
Syntax Description vrf name—Describes VRF name for snmp-server. If "vrf" parameter is not specified, the
"default" VRF will be used
force—Restarts SNMP server with previous VRF context even if it was already enabled
in using other VRF.
History 3.1.0000
3.9.2000—Added VRF option
snmp-server engineID reset
History 3.6.6102
405
Notes Changing system profile or performing “reset factory...” causes the engine ID to change
to the new node-unique one.
History 3.1.0000
Notes
406
History 3.1.0000
Notes SNMP traps are only sent if there are trap sinks configured with the “snmp-server
host...” command, and if these trap sinks are themselves enabled.
Default SNMP MIBs are all given permission for SET requests by default
History 3.6.3004
Notes
407
Syntax Description ip-address IPv4 or IPv6 address
Default N/A
History 3.1.0000
Notes
snmp-server host [vrf <vrf-name>] <ip-address> informs [<community> | port <port> | version 2c
| version 3 {engineID <engineID> | user <name> {auth <hash-type> <auth-
password> [priv <privacy-type> [<priv-password>]] | encrypted auth ... | prompt auth ...}}]
Send SNMP v2c informs to this host with the default trap community.
The no form of the commands removes a host from which SNMP traps should be sent.
408
Syntax vrf-name—Describes the VRF name for NTP daemon. If the VRF parameter is not specified, the
Description "default" VRF will be used implicitly.
hash- • MD5
type • SHA
privacy- • aes-128—uses AES-128 encryption for privacy
type • des—uses DES encryption for privacy
priv- Plaintext password to use for privacy. If not specified, then auth-password is used.
passwor
d
409
prompt Configure SNMPv3 security parameters specifying passwords securely in follow-up
prompts rather than on the command line.
Default community—public
UDP port—162
version—3
Configuration config
Mode
History 3.2.1050
3.9.2000—Added VRF option
Notes Multiple snmp-hosts can be configured in different VRF`s at the same time.
snmp-server host [vrf <vrf-name>] <ip-address> traps [<community> | port <port> | version
{1 | 2c} | version 3 {user <name> {auth <hash-type> <auth-password> [priv <privacy-type>
[<priv-password>]] | encrypted auth ... | prompt auth ...}}]
no snmp-server host <ip-address> traps port
Send SNMP v2c traps to this host with the default trap community.
The no form of the commands removes a host from which SNMP traps should be sent.
410
Syntax Description vrf-name—Describes the VRF name for NTP daemon. If the VRF parameter is not specified,
the "default" VRF will be used implicitly.
hash-type • MD5
• SHA
privacy-type • aes-128—uses AES-128 encryption for privacy
• des—uses DES encryption for privacy
priv- Plaintext password to use for privacy. If not specified, then auth-password
password is used.
vrf-name—Describes VRF name for snmp-server. If "vrf" parameter is not specified, the
"default" VRF will be used
411
Default community—public
UDP port—162
version—3
Configuration config
Mode
History 3.1.0000
3.9.2000—Added VRF option
Notes Multiple snmp-hosts can be configured in different VRF`s at the same time.
Syntax Description enable Enables SNMP interface restrictions on access to this system
ifName Adds an interface to the “listen” list for SNMP server. For example:
“mgmt0”, “mgmt1”
Default N/A
History 3.1.0000
412
Related Commands show snmp
Notes If enabled, and if at least one of the interfaces listed is eligible to be a listen interface,
then SNMP requests will only be accepted on those interfaces. Otherwise, SNMP requests
are accepted on any interface.
snmp-server notify {community <community> | event <event name> | port <port> | send-
test}
no snmp-server notify {community | event <event name> | port}
Syntax Description community Sets the default community for traps sent to hosts which do not have a
custom community string set
History 3.1.0000
413
Notes • This setting is only meaningful if traps are enabled, though the list of hosts may still
be edited if traps are disabled
• Refer to Mellanox MIB file for the list of supported traps
Default 161
History 3.1.0000
Notes
414
auth Configures SNMPv3 security parameters, specifying passwords in
plaintext on the command line (note: passwords are always stored
encrypted).
Available hash-type options are: <md5|sha|sha224|sha256|sha384|
sha512>.
History 3.1.0000
3.7.0000
415
Notes • The username chosen here may be anything that is valid as a local UNIX username
(alphanumeric, plus '-', '_', and '.'), but these usernames are unrelated to, and
independent of, local user accounts. That is, they need not have the same capability
level as a local user account of the same name. Note that these usernames should not
be longer than 31 characters, or they will not work.
• The hash algorithm specified is used both to create digests of the authentication and
privacy passwords for storage in configuration, and also in HMAC form for the
authentication protocol itself
• There are three variants of the command, which branch out after the “v3” keyword.
If “auth” is used next, the passwords are specified in plaintext on the command line.
If “encrypted” is used next, the passwords are specified encrypted (hashed) on the
command line. If “prompt-pass” is used, the passwords are not specified on the
command line the user is prompted for them when the command is executing. If
“priv” is not specified, only the auth password is prompted for. If “priv” is specified,
the privacy password is prompted for; entering an empty string for this prompt will
result in using the same password specified for authentication.
• AES privacy type encryption using the newest algorithm, which means we use aes-
blumenthal. For more information see http://www.snmp.com/eso/
esoConsortiumMIB.txt.
• No more than 30 SNMPv3 users are allowed in the database
show snmp [events | host]
Default N/A
History 3.1.0000
3.6.8008—Updated example
3.9.2000—Updated example, adding VRF option
416
Example switch (config) # show snmp
SNMP enabled : no
SNMP port : 161
System contact : Test
System location: Boston
Read-only communities:
public
Read-write communities:
good
Listen Interfaces:
Interface: mgmt0
Notification sinks:
20.20.20.20:
Enabled : yes
Port : 162 (default)
Notification type: SNMP v2c trap
Community : public (default)
VRF : other
10.10.10.10:
Enabled : yes
Port : 162 (default)
Notification type: SNMP v2c inform
Community : public (default)
VRF : default
Notes
417
10.3.1.18 show snmp auto-refresh
Default N/A
History 3.1.0000
Auto-Refreshed tables:
ifTable
ifXTable
mellanoxIfVPITable
Notes
show snmp engineID
418
Default N/A
History 3.6.6102
Notes
show snmp set-permission
Default N/A
History 3.6.3004
419
Notes
show snmp user
Default N/A
History 3.1.0000
Notes
420
10.3.2 JSON API
json-gw enable
no json-gw enable
History 3.6.3004
Notes
Syntax Description timeout-value Define a timeout value for synchronous JSON requests
Range: 0-4294967295
421
History 3.6.3004
Notes
show json-gw
Default N/A
History 3.6.3004
Notes
422
11 Virtualization
Onyx
allows the user to run their own applications on a Linux docker image embedded in the switch software. The container
is a pure application sandbox with resource isolation of both memory and compute from the system code/NOS.
Docker container implementation in the OS enhances its VM support to provide a new set of capabilities:
• Network traffic access
Docker containers are implemented in the OS in the same name-space as the network devices allowing the
software to send and receive packets from the switch ports by opening a standard Linux socket over the network
devices and using an IP address assigned to the device via the legacy management interface (e.g., JSON over
HTTP).
It is recommended to assign a unique port number to the Linux socket to prevent ambiguity of
applications between the container and the OS.
The container implementation does not limit the container developer from calling the SDK to set
parameters. However this is strongly discouraged as it may cause unexpected system behavior where
the OS and the container application manage the same resources.
• Query the Linux tables provisioned by OS such as neighbor cache, routing tables, L3 interfaces attributes etc.
switch (config) # docker start imagename latestver containername init memory 25 label
newlabel privileged sdk network docker usb-mount
423
docker start imagename latestver containername init cpus 0.2 label new_label
privileged sdk network
After an upgrade operation there is a need to rerun copy-sdk command (in case in use).
424
11.3 Docker Containers Commands
11.3.1 docker
Syntax Description
vrf name—Describes docker daemon VRF context, impacts fetching images and running
containers. If "vrf" parameter is not specified, the "default" VRF will be used.
force—Restarts docker using past VRF context even if it was already enabled in other
VRF context.
Default N/A
History 3.6.2940
3.9.2000—Added VRF option
Related Commands
Notes Only one configured instance of docker can be in the system. Moving docker between
VRFs leads to restarting the docker daemon and a loss of running, cached containers and
images. Pulled image can be preserved with the command "docker save".
425
11.3.2
docker login
cleartext password There are 2 options to enter password using the above
command:
1. In command—cleartext
2. Using interactive shell—entering all needed input
except the password will prompt the user to provide a
password which will not be visible while typing.
(masked by *)
Default N/A
History 3.9.1600
Notes
426
Default N/A
History 3.9.1600
Related Commands
Notes • There is no need to provide username as only a single user can be connected to a
specific server in any given time
11.3.4 commit
Syntax Description container- Name of the running container to commit (limited to 180 characters)
name
Default N/A
History 3.6.2940
427
Related Commands
Notes
11.3.5 copy-sdk
copy-sdk
The command provides access to the switch SDK APIs giving applications running on
docker access to the switch hardware.
Default N/A
History 3.6.4110
Related Commands
remove image <image-name> <image-version>
428
image- Version of the new image to be deleted
version
Default N/A
History 3.6.3520
3.6.2940
Notes
11.3.7 exec
exec <container-name> <program-executable>
Syntax Description container- Name of the running container to commit (limited to 180 characters)
name
Default N/A
History 3.6.3520
3.6.2940
429
Related Commands docker
Notes
11.3.8 label
Default N/A
History 3.6.4110
Related Commands
Notes
11.3.9 load
load <image-name>
Default N/A
430
History 3.6.2940
Notes
11.3.10 pull
pull <image-name>[:<version>]
Default N/A
History 3.6.2940
Notes
431
11.3.11 save
save <image-name> <image-version> <filename>
Default N/A
History 3.6.2940
Notes After the file is created, the filename gets appended a *.gz suffix.
11.3.12 shutdown
shutdown
no shutdown
432
Syntax Description N/A
Default N/A
History 3.6.2940
Notes
11.3.13 start
433
starting-point • init – persistent, start the container after boot, when system
initialization is done
• data-path-ready – persistent, start the container after boot, when
data-path is ready to be configured
• now – start the container now, this is not persistent
• now-and-data-path-ready – starts the container now and after boot,
when data-path is ready to be configured
• now-and-init – starts the container now and after boot, when system
configuration is done
cpus Sets how much of the available CPU resources a container can use (e.g.,
“cpus 1.5” guarantees at most one and a half of the available CPUs for
the container).
memory Sets the maximum amount of memory the container can use in MB.
The minimum amount of memory to configure is 4MB.
host-trust Allows SSH operation from within the container to localhost without the
need to supply password.
Default N/A
History 3.6.2940
3.6.3520 Added “privileged” parameter
3.6.8008 Added the options “now-and-data-path-ready” and “now-and-init”, new
character limitation for container-name, and updated the description of
the parameter “memory”
3.7.0000—Added “ptp-ready” option
434
3.9.2000 Added host-trust option which adds support for SSH operation from
within the container to localhost without the need to supply
password (when activating host-trust without supplying user, user admin
will be used).
Notes • The no form of the command removes the container if it is not persistent.
• If trust is set and username is not given, user admin will be chosen by default.
vrf-name—Describes VRF context that should be used for this transfer. If not specified, the
“default” VRF is used.
upload_url FTP, TFTP, SCP and SFTP are supported (e.g., scp://
username[:password]@hostname-or-ip/path/filename)
Default N/A
History 3.6.2940
3.9.2000—Added VRF option
435
Related Commands
Notes
vrf-name—Describes VRF context that should be used for this transfer. If not specified, the
“default” VRF is used.
upload_url FTP, TFTP, SCP and SFTP are supported (e.g., scp://
username[:password]@hostname/path/filename)
Default N/A
Configuration config
Mode
History 3.6.2940
3.9.2000—Added VRF option
Related Commands
Notes
436
11.3.16 show docker
Default N/A
History 3.9.2000
Related Commands
Dockers state: enabled
Notes
Default N/A
History 3.6.8008
437
3.9.2000 Updated example, adding host-trust option
cont_example:
image : busybox
version : latest
status : running
start point : data-path-ready
cpu limit : 0.2
memory limit: 10m
labels : -
privileges : network, sdk
usb mount : enabled
host trust : admin
another_container:
image : busybox
version : latest
status : -
start point : init
cpu limit : 0.2
memory limit: 10m
labels : my_label
privileges : network, sdk
usb mount : disabled
host trust : admin
cont_example:
image : busybox
version : latest
status : running
start point : data-path-ready
cpu limit : 0.2
memory limit: 10m
labels : -
privileges : network, sdk
usb mount : enabled
host trust : admin
Related Commands
Notes • If a container is already started, the status field displays its current status
• If a container is configured to run on the next boot, the start point field displays
when it will start
• If there is a mismatch between the configuration of a running container and its next-
boot configuration, two entries for the container are shown with both of the
configurations
438
11.3.18 show docker images
show docker images
Default N/A
History 3.6.3520
Example
-------------------------------------------------------------
Image Version Created Size
-------------------------------------------------------------
ubuntu latest Less than a secon 117MB
d ago
ubuntu-sdk v1 41 seconds ago 215MB
Related Commands
Notes
show docker ps
Default N/A
439
Configuration Mode Any command mode
History 3.6.3520
Example
-----------------------------------------------------------------------------
----
Container Image:Version Created Status
-----------------------------------------------------------------------------
----
my_ubuntu_app ubuntu:latest 56 seconds ago Up 50
seconds
Related Commands
Notes This command is available only after Linux dockers are enabled (“no
dockers shutdown”)
show docker labels
Default N/A
History 3.6.4110
440
Example switch (config) # show docker labels
Storage label : label_name1
configured containers list : cont_name2
active containers list : cont_name1
Related Commands
Notes
Default N/A
History 3.9.1600
Servers:
https://index.docker.io/v1/
nvcr.io
Notes
show docker stats [<name>]
441
Syntax Description name Docker whose stats to display
Default N/A
History 3.6.8008
Example
Related Commands
Notes This command is available only after Linux dockers are enabled (“no
dockers shutdown”)
442
12 Telemetry, Monitoring, and Debuggability
• What Just Happened
• Logging
• Debugging
• Link Diagnostic Per Port
• Signal Degradation Monitoring
• Event Notifications
• Port Mirroring
• sFlow
• Buffer Histograms Monitoring
• Statistics and Alarms
• Management Information Bases (MIBs)
WJH is only supported through CLI, WebUI, or using NEO, but not in parallel.
By Default, What Just Happened® is enabled on Onyx®. If it is disabled, use the following command to enable it:
In Spectrum systems, in order to enable buffer drop monitoring, one interface must be enabled as a
recirculation port. For more information see Ethernet Interface Commands section.
To disable WJH via CLI use the “no” form of the command:
443
switch (config) # no what-just-happened <all | acl | forwarding | layer-1 | buffer>
enable
To display the WJH buffer of dropped packets use the "show what-just-happened" with/without options (detailed in the
commands section).
Dropped packet events' display may have a delay of to up to 30 seconds due to a predefined hardware polling
interval.
To display the WJH aggregation record, use the "show what-just-happened aggregated" with options (detailed in the
commands section).
Note that due to hardware polling timing issues, it may be possible to observe dropped packet events that
occurred shortly before the clear command was executed.
To automatically generate a WJH PCAP file as a result of discards, the following configuration is required. The value of
<sec> determines how often the system checks whether a pcap should be generated. For example, if you enter a value
of 300, up to 5 minutes may elapse between the discarding of packets and the creation of the pcap file.
To see what pcap files have been generated, issue the following command:
WJH Wireshark dissector enables Wireshark users to analyze WJH pcap files. It displays the packets' added
metadata. You may log into the WebUI and click the "Download Wireshark Plugin" button in the Status →
What Just Happened page in order to download the Wireshark plugin file. After downloading the file, place it
in the Wireshark application in Windows under %APPDATA%\Wireshark\plugins.
444
12.1.1.1 WJH Commands
12.1.1.1.1 what-just-happened
forwarding Drop group containing L2, L3, port and tunnel related drops
Default Enabled
History 3.7.1000
445
3.9.1000 Updated note
3.9.2000 Updated example and notes, adding support for WJH event suppression
by the severity for each drop group.
Notes • In Spectrum systems, in order to enable buffer drop monitoring, one interface must be
enabled as a recirculation port. In Spectrum-2 systems, it is sufficient to configure
what-just-happened buffer enable. In both cases, the enabling configuration reduces
by 1 the number of monitor sessions that can be configured. It will fail if the
maximum number of monitor sessions are already configured.
• Layer-1 drop group do not support severities
• Disabling and enabling the WJH or any drop group will not affect the severity
configuration
forwarding Drop group containing L2, L3, port and tunnel related drops
Default Enabled
History 3.8.1000
446
Example switch (config) # what-just-happened auto-export forwarding
enable
Notes If auto-export is disabled for acl, forwarding or buffer, dropped packets in those groups do
not count towards the threshold for generating a pcap, as defined in the 'logging events
what-just-happened-packets' commands.
clear what-just-happened <all | acl | forwarding | layer-1 | buffer>
forwarding Drop group containing L2, L3, port and tunnel related drops
Default N/A
History 3.7.1000
Related Commands
447
Notes Clear WJH intends to clear all the events already seen by the user, but will not clear
events in the hardware that were not yet read by WJH-lib. As such, it is possible that WJH
events observed after using the clear command, actually entered before clearing the
command but that were not yet shown to the user.
12.1.1.1.4
clear what-just-happened pcap-files
History 3.8.2000
Role Admin
448
12.1.1.1.5
snmp-server notify event what-just-happened
Enables sending SNMP traps for what-just-happened last events, sets the interval in which
traps will be issued, and limits the maximum number of issued traps per interval.
The no form of the command disables sending SNMP traps for what-just-happened last
events.
Default Disabled
History 3.9.2000
Notes • In case SNMP traps for what-just-happened are enabled while using the CLI, a
notification will appear informing that SNMP is running in parallel and of the what-
just-happened buffer clearing
• this command is only relevant for "aggregated" What-Just-Happened events
show what-just-happened [all | acl | forwarding | buffer | layer-1 | max-packets <1-1024 per group/
1-4096 for all> | export <file-name> | no-metadata]
449
Syntax acl Access-list drops
Descriptio
n forwa Drop group containing L2, L3, port and tunnel related drops
rding
max- Limit number of packets to dump: <1-1024> for forwarding/acl/buffer/layer-1, <1-4096> for
packe all
ts
Default: 1024 per group, 4096 for all
no- Do not add metadata to the pcap file (applicable only with 'export' attribute set)
meta
data
Default N/A
History 3.7.0
000
3.9.0 Added layer-1 and buffer drops. PCAP file will not be created by default and updated
500 example
450
3.9.0 Updated ACL example
900
Example
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
-----
# Timestamp sPort dPort VLAN sMAC
dMAC EthType Src IP:Port Dst IP:Port IP
Proto Drop Group Severity Drop Reason - Recommended
Action
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
-----
1 2020/03/31 16:19:51.075 Eth1/3 N/A 12 BA:1B:25:11:22:31
24:8A:07:CA:CD:C8 IPv4 10.10.10.0:6857 10.10.20.1:767
TCP Forwarding Warning Blackhole route - Validate routing table for
this
(phonebook)
destination IP
...
Example (acl)
451
switch (config) # show-what-just-happened acl
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
-------------------------------------------------------------------
# Timestamp sPort dPort VLAN sMAC
dMAC EthType Src IP:Port Dst IP:Port IP Proto
Drop Group Severity Drop Reason - Recommended Action
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
-------------------------------------------------------------------
1 2020/05/07 12:25:02.600 Eth1/3 N/A N/A BA:1B:25:0A:0A:0B
BA:1B:25:0B:0F:01 LPBK N/A:N/A N/A:N/A N/A
Access-list Notice user-access-list - Validate ACL configuration
Rules Info
-----------------------------------------------------------------------------
-------------------------------------
# Table Name
Rule
-----------------------------------------------------------------------------
-------------------------------------
1 user-access-list seq-number 11 deny BA:1B:
25:0A:0A:0B mask FF:FF:FF:FF:FF:FF any
Exception list:
Buffer group is enabled but not operational. Please configure port
recirculation.
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
------------------------------
# Timestamp sPort dPort VLAN sMAC dMAC
EthType Src IP:Port Dst IP:Port IP Proto Drop Group Severity Drop Reason -
Recommended Action
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
------------------------------
1 2020/02/20 11:03:17.465 Eth1/3 N/A N/A BA:1B:25:0A:0A:0A BA:1B:25:0B:
0B:0B LPBK N/A:N/A N/A:N/A N/A Access-list Notice
mac-acl - Validate ACL configuration
Example (Layer-1)
452
switch (config) # show what-just-happened layer-1
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
------------
# Timestamp sPort dPort VLAN sMAC dMAC EthType Src IP:Port
Dst IP:Port IP Proto Drop Group Severity Drop Reason - Recommended Action
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
------------
information
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
---------------------------------------------------
# Timestamp sPort dPort VLAN sMAC dMAC
EthType Src IP:Port Dst IP:Port IP Proto Drop Group
Severity Drop Reason - Recommended Action
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
---------------------------------------------------
1 2020/01/26 10:44:29.810 Eth1/1 N/A 10 BA:1B:25:11:22:31 24:8A:
07:CA:CD:C8 IPv4 10.10.10.0:54401 10.10.20.1:80 (http) TCP
ACL Info Openflow Table 1 - Check Openflow Rule
2 2020/01/26 11:44:29.810 Eth1/2 N/A 20 EE:2B:85:61:22:31
11:2E:FF:CA:CD:D3 IPv4 20.20.20.0:10001 10.10.20.1:80 (http) TCP
ACL Info mac-acl - Check ACL Rule
Rules Info
----------------------------------------------------------------------
# Table Name Rule
----------------------------------------------------------------------
1 Openflow Table 1 ip,ip_dst=10.10.20.1/32,priority=77
2 mac-acl seq-number 10 deny EE:2B:
85:61:22:31 mask FF:FF:FF:FF:FF:FF any
453
switch (config) # show what-just-happened buffer
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
---------------------------------------------------------------------------
# Timestamp sPort dPort VLAN sMAC
dMAC EthType Src IP:Port Dst IP:Port IP
Proto Drop Group Severity Drop Reason - Recommended
Action
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
---------------------------------------------------------------------------
1 2020/10/05 12:23:12.464 Eth1/4 Eth1/2 N/A 98:03:9B:82:BF:7A
B8:59:9F:A6:69:88 IPv4 10.1.2.2:50876 10.1.1.2:2221
(null) Buffer Notice Port TC Congestion Threshold Crossed -
Monitor
(rockwell-
csp1) network congesti
2 2020/10/05 12:23:12.459 Eth1/4 Eth1/2 N/A 98:03:9B:82:BF:7A
B8:59:9F:A6:69:88 IPv4 10.1.2.2:50876 10.1.1.2:2221
(null) Buffer Notice Port TC Congestion Threshold Crossed -
Monitor
(rockwell-
csp1) network congestion
3 2020/10/05 12:23:12.448 Eth1/4 Eth1/2 N/A 98:03:9B:82:BF:7A
B8:59:9F:A6:69:88 IPv4 10.1.2.2:50876 10.1.1.2:2221
(null) Buffer Notice Port TC Congestion Threshold Crossed -
Monitor
(rockwell-
csp1) network congestion
Buffer Info:
-----------------------------------------------------------------------------
------------------------------
# TC Id TC Usage [KB] Latency [nanoseconds] TC Watermark [KB]
Latency Watermark [nanoseconds]
-----------------------------------------------------------------------------
------------------------------
1 1 2896 N/A N/A
N/A
2 1 2960 N/A N/A
N/A
3 1 2920 N/A N/A
N/A
454
Notes • By default, pcap file will not be created, if "export" is not specified. Pcap file names will be
“wjh_user_[date].pcap” if no user-defined name is entered, and “[user defined
name]_[date].pcap” if provided
• In Spectrum systems, in order to see buffer drops, one interface must be configured as a
recirculation port
• "max-num" and "last-read" are reserved and cannot be used as filenames
• For display of ACL drops, lines indexes in "Rules Info" table match the indexes in the main table
• To display buffer drops, lines indexes in "Buffer Info" table should match the indexes in the main
table
acl Display aggregated record on access list related reasons. Max-num is 64.
buffer Max: 64
Default N/A
History 3.9.0300
3.9.2000 Updated example of show what-just-happened aggregated buffer
Example (Layer-1)
455
switch (config) # show what-just-happened aggregated layer-1
-----------------------------------------------------------------------------
----------------------
Port State Down Reason - Recommended Action State Change Symbol Error
FCS Error
-----------------------------------------------------------------------------
----------------------
Eth1/4 Down Port admin down - Validate port 1 0 0
configuration
Example (acl)
Rules Info
-----------------------------------------------------------------------------
-------------------------------------
# Table Name
Rule
-----------------------------------------------------------------------------
-------------------------------------
1 mac-acl seq-number 10 deny BA:1B:
25:0A:0A:0A mask FF:FF:FF:FF:FF:FF any
Example (forwarding)
456
switch (config) # show what-just-happened aggregated forwarding
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
------------------
# sPort VLAN sMAC dMAC EthType Src IP:Port
Dst IP:Port IP Proto Count Severity Drop Reason - Recommended Action
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
------------------
1 Eth1/2 N/A 24:8A:07:97:32:E2 33:33:00:00:00:16 IPv6 [fe80::268a:
7ff:fe97:32e2]:N/A [ff02::16]:N/A N/A 2 Notice Ingress spanning
tree filter- Expected behavior
Example (buffer)
Related
Commands
457
Notes • For display of ACL drops, lines indexes in "Rules Info" table match the indexes in the
main table
• To display buffer drops, lines indexes in "Buffer Info" table should match the indexes in
the main table
Default N/A
History 3.8.2000
Role Admin
Severities:
N: Notice
W: Warning
E: Error
-----------------------------------------------------------
-------------------------
Drop group Admin status Enabled Severities Operational
status Auto-export status
-----------------------------------------------------------
-------------------------
Forwarding Enable W, E Enable
Enable
Access-list Enable All Enable
Enable
Buffer Enable N Enable
Enable
Layer-1 Enable All Enable
N/A
458
Related Commands
Notes
12.1.1.1.9
show snmp events what-just-happened
Default N/A
History 3.9.2000
Notes
459
12.1.1.2 Configure WJH Events
Default Disabled
History 3.9.0900
Notes
Default N/A
History 3.9.0900
460
Related Commands switchmode exceptions sip-equals-dip
Notes
12.1.3 WJH Streaming and Integration with Telegraf, InfluxDB and Grafana (TIG) Stack
For further information refer to WJH Streaming and Integration with Telegraf, InfluxDB and Grafana (TIG) Stack in the
Telemetry Agent User Manual.
12.2 Logging
12.2.1 Monitor
To print logging events to the terminal, set the modules or events you wish to print to the terminal. For example, run: o–
These commands print system events in severity “notice”, and “sx-sdk” module notifications in severity “warning” to
the screen. For example, in case of interface-down event, the following gets printed to the screen:
switch (config) #
Wed Jul 10 11:30:42 2013: Interface IB1/17 changed state to DOWN
Wed Jul 10 11:30:43 2013: Interface IB1/18 changed state to DOWN
461
switch (config) # logging <IP address/hostname> filter <"include"/"exclude">
<regex>
4. Set the minimum severity of the log level to info.
12.2.4.1 logging
Syntax Description
vrf-name—VRF to be affected. If "vrf-name" parameter is not specified, "default" VRF
will be used.
Default N/A
History 3.1.1000
3.9.2000—Added VRF option
462
Role admin
Related Commands
Notes This command is configurable. If “configuration write” is executed, the remote host will
still receive messages after reload. It is possible to have multiple logging hosts in
different VRFs.
History 3.6.2002
3.8.1000—Updated command syntax
3.9.2000—Added VRF option
463
Example switch (config) # logging 10.0.0.1 port 105
logging [vrf <vrf-name>] <syslog IPv4 address/IPv6 address/hostname> [trap {<log-
level> | override class <class> priority <log-level>}]
no logging [vrf <vrf-name>] <syslog IPv4 address/IPv6 address/hostname> [trap {<log-
level> | override class <class> priority <log-level>}]
Enables (by setting the syslog IPv4 address/IPv6 address/hostname) sending logging
messages, with ability to filter the logging messages according to their classes.
The no form of the command stops sending messages to the remote syslog server.
Syntax Description syslog IPv4 syslog IPv4 address/IPv6 address/hostname of the remote syslog server
address/IPv6 Hostname is limited to 64 characters
address/
hostname
log-level • none—disables the logging locally and remotely
• 0 - emerg—system is unusable (emergency)
• 1 - alert—alert notification, action must be taken immediately
• 2 - crit—critical condition
• 3 - err—error condition
• 4 - warning—warning condition
• 5 - notice—normal, but significant condition
• 6 - info—informational condition
• 7 - debug—debug level messages
class Sets or removes a per-class override on the logging level. All classes
which do not have an override set will use the global logging level set
with “logging local <log level>”. Classes that do have an override will
do as the override specifies. If “none” is specified for the log level, the
software will not log anything from this class. Classes available:
• iss-modules—protocol stack
• mgmt-back—system management back-end
• mgmt-core—system management core
• mgmt-front—system management front-end
• mlx-daemons—management daemons
• sx-sdk—switch SDK
464
vrf-name VRF to be affected. If "vrf-name" parameter is not specified, "default"
VRF will be used.
History 3.6.2002
3.8.1000—Updated command syntax
3.9.2000—Added VRF option
logging debug-files {delete {current | oldest} | rotation {criteria | force | max-num} | update
{<number> | current} | upload <log-file> <upload URL>}
no logging debug-files rotation criteria
465
rotation Configures automatic rotation of debug-logging files.
{criteria
{frequency • criteria—sets how the system decides when to rotate debug files
{daily | weekly • frequency—rotate log files on a fixed time-based schedule
| monthly} | • size—rotate log files when they pass a size threshold in
size <size> | megabytes
size-pct • size-pct—rotate logs when they surpass a specified
<percentage>} | percentage of disk
force | max- • forces—forces an immediate rotation of the log files
num} • max-num—specifies the maximum number of old log files to keep
upload URL Supported formats: HTTP, HTTPS, FTP, TFTP, SCP and SFTP (e.g.:
scp://username[:password]@hostname/path/filename)
Default N/A
History 3.3.4150
Related Commands
Notes
466
12.2.4.5 logging events enable
Default N/A
Configuration config
Mode
History 3.6.6000
Related
Commands
Notes Increase in the enabled events groups will generate a log message
of the form:
Jan 8 14:15:24 switch statsd[4404]: [statsd.NOTICE]: (StatsLog)
Interface Eth1/9: 398 0598 packets dropped due to Rx invalid tag
discards packets
Jan 8 14:15:24 switch statsd[4404]: [statsd.NOTICE]: (StatsLog)
Interface Eth1/9: 398 0599 packets dropped due to Rx discard
packets by vlan filter
Jan 8 14:42:44 switch statsd[4404]: [statsd.NOTICE]: (StatsLog)
cpu-rate-limiter DISCARD_LAYERS_2_3: 7767087 packets dropped by
CPU rate-limiter
467
12.2.4.6 logging events error-threshold
Configures number of events after which the system begins to generate events to the log
file.
The no form of the command resets this parameter to its default value.
Syntax Description cpu-rate- Sets threshold for CPU rate limiter related events
limiters Default: 1 event
events Number of events after which the system begins to generate events to the
log file. Range: 0-4294967295.
Default N/A
History 3.6.6000
Related Commands
468
Notes The command configures number of events after which the system begins to generate events
to the log file, if that number of events occurs within the interval defined by the logging
events interval command. In the case of what-just-happened-packets, number of events
refers to the number of dropped packets due to reasons for which auto-export pcap
generation is enabled.
interfaces | protocols |
what-just-happened-
packets Default:cpu-rate-limiters—10 seconds
interfaces—5 minutes
protocols—1 minute
what-just-happened-packets - 10 minutes
• cpu-rate-limiters—5-3600
• interfaces—10-3600
• protocols—10-3600
• what-just-happened-packets—10-3600
Default N/A
History 3.6.6000
469
3.9.0900 Added what-just-happened-packets option
Related Commands
Notes In the case of what-just-happened-packets, a pcap file will be generated if the threshold
number of dropped packets is exceeded during this interval
Configures the number of allowed events per time window and that window’s duration.
The no form of the command resets these parameters to their default values.
470
Default For “interfaces” For “protocols” For “cpu-rate- For “what-just-happened-
limiters” packets”
Short window: Short window: Short window:
event count—5 event count—10 Short window: event count—3
window duration window duration— event count—10 window duration—1 hour
—1 hour 1 hour window duration
—1 hour Medium window:
Medium window: Medium window: event count—15
event count—50 event count—100 Medium window duration—1 day
window duration window duration— window:
—1 day 1 day event count— Long window:
200 event count—50
Long window: Long window: window duration window duration—7 days
event count—350 event count—600 —1 day
window duration window duration—
—7 days 7 days Long window:
event count—
1200
window duration
—7 days
Configuration config
Mode
History 3.6.6000
Related Commands
Notes • The goal of this command is to restrict the number of events in the log, or, in the case of
what-just-happened-packets, the number of pcap files generated. To achieve this end, it
is possible to specify the allowed number (parameter “count”) of messages per period of
time (parameter “window”)
• In the case of what-just-happened-packets, the configured logging events rate-limit
configures is the maximum number of pcap files that may be generated in each time
window
471
12.2.4.9 logging fields
Specifies whether to include an additional field in each log message that shows the
number of seconds since the Epoch or not.
The no form of the command disallows including an additional field in each log message
that shows the number of seconds since the Epoch.
Syntax Description enable Specifies whether to include an additional field in each log message
that shows the number of seconds since the Epoch or not.
w-digit The whole-digits parameter controls the number of digits to the left of
the decimal point. Truncation is done from the left. Except for the year,
all of these digits are redundant with syslog's own date and time.
Possible values: 1, 6, or all.
Default Disabled
History 3.1.0000
Notes This is independent of the standard syslog date and time at the beginning of each message
in the format of “July 15 18:00:00”. Aside from indicating the year at full precision, its
main purpose is to provide subsecond precision.
472
Syntax Description current Deletes current log file
Default CLI commands and audit message are set to notice logging level
History 3.1.0000
Notes
logging files rotation {criteria {frequency <freq> | size <size-mb>| size-pct <size-
percentage>} | force | max-number <number-of-files>}
no logging files rotation criteria
Syntax Description freq Sets rotation criteria according to time. Possible options are:
• Daily
• Weekly
• Monthly
473
force Forces an immediate rotation of the log files. This does not affect the
schedule of auto-rotation if it was done based on time: the next
automatic rotation will still occur at the same time for which it was
previously scheduled. Naturally, if the auto-rotation was based on
size, this will delay it somewhat as it reduces the size of the active log
file to zero.
number-of-files The number of log files will be kept. If the number of log files ever
exceeds this number (either at rotation time, or when this setting is
lowered), the system will delete as many files as necessary to bring it
down to this number, starting with the oldest.
Default 10 files are kept by default with rotation criteria of 5% of the log partition size
History 3.1.0000
Notes
file-number An archived log file. The archived log file will have the name
“messages<n>.gz” (while “n” is the file number) if you do not specify a
new name for it in the upload URL. The file will be compressed with
gzip.
474
url Uploads URL path. Supported formats: FTP, TFTP, SCP, and SFTP. For
example: scp://username[:password]@hostname/path/filename.
Default 10 files are kept by default with rotation criteria of 5% of the log partition size
History 3.1.0000
Notes
Sends only log messages that match the input regex to a remote host specified by its IP or
hostname.
Default N/A
History 3.8.2000
Role admin
no logging
475
Notes This command is configurable. If “configuration write” is executed, the remote host will
still receive filtered messages after reload.
Sends only log messages that do not match the input regex to a remote host specified by
its IP or hostname.
Default N/A
History 3.8.2000
Role admin
no logging
Notes This command is configurable. If “configuration write” is executed, the remote host will
still receive filtered messages after reload.
no logging <IP address\hostname> filter
Default N/A
476
Configuration Mode config
History 3.8.2000
Role admin
no logging
Notes This command is configurable. If “configuration write” is executed, the remote host will
still receive filtered messages after reload.
hostname Specifies the firewall hostname that should be associated with each
message logged in WELF format. If no firewall name is set, the
hostname is used by default. Hostname is limited to 64 characters.
Default standard
History 3.1.0000
477
Related Commands show logging
Notes
Sets the severity level at which CLI commands or the management audit message that the
user executes are logged. This includes auditing of both configuration changes and
actions.
Syntax Description cli commands Sets the severity level at which CLI commands which the user executes
are logged
audit mgmt Sets the severity level at which all network management audit
messages are logged
log-level • none—disables the logging locally and remotely
• 0 - emerg—system is unusable (emergency)
• 1 - alert—alert notification, action must be taken immediately
• 2 - crit—critical condition
• 3 - err—error condition
• 4 - warning—warning condition
• 5 - notice—normal, but significant condition
• 6 - info—informational condition
• 7 - debug—debug level messages
Default CLI commands and audit message are set to notice logging level
History 3.1.0000
Notes
478
12.2.4.18 logging local override
Syntax Description override Enables class-specific overrides to the local log level.
class Sets or removes a per-class override on the logging level. All classes
which do not have an override set will use the global logging level set
with “logging local <log level>”. Classes that do have an override will
do as the override specifies. If “none” is specified for the log level, the
software will not log anything from this class.
Classes available:
• debug-module—debug module functionality
• protocol-stack—protocol stack modules functionality
• mgmt-back—system management back-end components
• mgmt-core—system management core
• mgmt-front—system management front-end components
• mlx-daemons—management daemons
• sx-sdk—switch SDK
log-level • none—disables the logging locally and remotely
• 0 - emerg—system is unusable (emergency)
• 1 - alert—alert notification, action must be taken immediately
• 2 - crit—critical condition
• 3 - err—error condition
• 4 - warning—warning condition
• 5 - notice—normal, but significant condition
• 6 - info—informational condition
• 7 - debug—debug level messages
History 3.1.0000
479
Example switch (config) # logging local override class mgmt-front
priority warning
Notes
priority-level • none
• emerg
• alert
• crit
• err
• warming
• notice
• info
• debug
History 3.3.4000
Related Commands
480
Notes
Sends log messages to specified host with the chosen protocol (TCP or UDP).
The no form of the command sets the protocol for sending log messages to a remote host
to the default (UDP).
Default UDP
History 3.8.2100
Role Admin
Related Commands
Notes This command is configurable, so if “configuration write” is executed then after reboot
the remote host will still receive messages with the configured protocol.
logging receive
no logging receive
481
Syntax Description N/A
History 3.1.0000
Default Enabled
History 3.9.0900
482
Notes If enabled, the first 2 bytes of MAC address output log will be masked. For example,
00:12:34:56:78:9A will be displayed as **:**:34:56:78:9A.
Syntax Description continues Displays the last few lines of the current log file and then continues to
display new lines as they come in until the user hits Ctrl+C, similar to
LINUX “tail” utility
<file-number> Displays an archived log file, where the number may range from 1 up
to the number of archived log files available
Default N/A
History 3.1.0000
Example
483
switch (config) # show log matching "Executing|Action"
Notes • When using a regular expression containing | (OR), the expression should be
surrounded by quotes (“<expression>”), otherwise it is parsed as filter (PIPE)
command
• The command’s output has many of the options as the Linux “less” command. These
options allow navigating the log file and perform searches. To see help for different
option press “h” after running the “show log” command.
show logging
Default N/A
History 3.1.0000
484
3.9.0900 Updated example
Role Admin
1.2.2.3:
log level : notice
Remote port: 33
Notes
485
12.2.4.25 show logging events
Default N/A
History 3.6.6000
486
Example switch (config) # show logging events
cpu-rate-limiters:
Admin mode : yes
Interval : 10 seconds
Error threshold: 1
interfaces:
Admin mode : no
Interval : 5 minutes
Error threshold: 10
protocols:
Admin mode : no
Interval : 1 minute
Error threshold: 2
487
what-just-happened-packets:
Admin mode : no
Interval : 1 minute
Error threshold: 2
Related Commands
Notes
Default N/A
History 3.6.6000
interfaces:
Counters: Rx discard packets, Rx error packets, Rx fcs
errors, Rx undersize packets, Rx oversize packets, Rx unknown
control opcode, Rx symbol errors, Rx discard packets by Storm
Control, Tx discard packets, Tx error packets, Tx hoq discard
packets
488
Related Commands logging event enable
Notes
Default N/A
History 3.1.0000
Notes
12.3 Debugging
To use the debugging logs feature:
1. Enable debugging. Run:
489
switch (config) # debug ethernet all
2. Display the debug level set. Run:
3. Display the logs. Run:
Default N/A
History 3.3.4150
Notes
debug ethernet dcbx {all | management | fail-all | control-panel | tlv}
490
Syntax Description all Enables all traces
Default N/A
History 3.3.4150
Notes
491
group-info Group information messages
Default N/A
History 3.3.4150
3.9.2100 Added support for IGMP snooping filtering option (filter and max-
groups options)
Notes
492
12.3.1.4 debug ethernet ip interface
493
debug ethernet ip interface {all | arp-packet-dump | buffer | enet-packet-dump | error | fail-
all | filter | trace-error | trace-event}
no debug ethernet ip interface {all | arp-packet-dump | buffer | enet-packet-dump | error |
fail-all | filter | trace-error | trace-event}
Default N/A
History 3.3.4150
494
Notes
debug ethernet lacp {all | all-resource | data-path | fail-all | init-shut | management |
memory | packet}
no debug ethernet lacp {all | all-resources | data-path | fail-all | init-shut | management |
memory | packet}
Default N/A
History 3.3.4150
495
Notes
496
neigh-updt Neighbor update traces
Default N/A
History 3.3.4150
Notes
Default N/A
History 3.3.4150
Notes
497
12.3.1.8 debug ethernet qos
Default N/A
History 3.3.4150
498
Notes
debug ethernet spanning-tree {all | error | event | filters | init-shut | management | memory |
packet | port-info-state-machine | port-receive-state-machine | port-role-selection-state-
machine | port-transit-state-machine | port-transmit-state-machine | protocol-migration-
state-machine | timers}
no debug ethernet spanning-tree {all | error | event | filters | init-shut | management |
memory | packet | port-info-state-machine | port-receive-state-machine | port-role-selection-
state-machine | port-transit-state-machine | port-transmit-state-machine | protocol-
migration-state-machine | timers}
499
port-transit- Port transition messages
state-machine
Default N/A
History 3.3.4150
Notes
fwd Forward
priority Priority
500
filters Lower layer traces
Default N/A
History 3.3.4150
Notes
show debug ethernet {dcbx | ip {arp | dhcp-relay | igmp-snooping | interface | ospf} | lacp |
lldp | port | qos | spanning-tree | vlan}
Syntax Description dcbx Displays the trace level for spanning tree
• arp
• dhcp-relay
• igmp-snooping
• interface
• ospf
501
spanning-tree Displays the trace level for spanning tree
Default N/A
History 3.3.4150
Notes
show log debug [continuous | files | matching | not]
Syntax Description continuous Displays new event log messages as they arrive
502
matching Displays event debug logs that match a given regular expression
not Displays event debug logs that do not meet certain criteria
Default N/A
History 3.3.4150
Example
Related Commands
503
Notes
Default N/A
History 3.6.4006
504
3.6.4110 Updated command input
Related Commands
Notes
505
The system continuously monitors the link BER and compares it to BER limits, when limits are crossed the system can
generate an event indicating that link quality is degraded to the network operator that can take preemptive actions or
even disable the low quality link.
When Forward Error Correction (FEC) is enabled a network operator can choose to monitor an amount of corrected
errors by using the pre-FEC mode, or the amount of errors which the FEC failed to correct (uncorrectable errors) by
using the post-FEC mode, when FEC is used then every error detected by the PHY will be monitored.
When link is disabled the system will keep it in shutdown state until the port is explicitly enabled (Explicitly running
“shutdown” and then “no shutdown” commands for that port).
a. (Optional) Enable SNMP notifications on signal degradation events. Run:
Signal degradation snmp event comes only when there is an alarm alert of BER limit cross that is being sent
only once. There is no SNMP alarm in case of cross down back to normal threshold, nor in the second time in a
row the BER is crossed above again. In order to get another alarm on BER limit cross, it is needed to shutdown
the interface and enable it again.
Please refer to “Email Notifications” for a general explanation on how to enable email notifications for specific
events.
506
12.5.3.1 signal-degrade
signal-degrade [no-shutdown]
no signal-degrade [no-shutdown]
Default Disabled
History 3.6.4110
Notes
Default N/A
History 3.6.4110
Example
507
switch (config) # show interfaces ethernet signal-degrade
-----------------------------------------------------------------------------
-------------
Interface Admin state Monitoring Action FEC
type
-----------------------------------------------------------------------------
-------------
Eth1/1 Enabled Disabled Shutdown no-
fec/post-fec
Eth1/2 Enabled Disabled Shutdown no-
fec/post-fec
Eth1/3 Enabled Disabled Shutdown no-
fec/post-fec
Eth1/4 Enabled Disabled Shutdown no-
fec/post-fec
Eth1/5 Enabled Disabled Shutdown no-
fec/post-fec
...
Related Commands
Notes
508
Event Name Event Description MIB OID Comments
509
Event Name Event Description MIB OID Comments
510
Event Name Event Description MIB OID Comments
511
Event Name Event Description MIB OID Comments
512
12.6.2 Terminal Notifications
To print events to the terminal, set the events you wish to print to the terminal. Run:
This command prints system events in the severity “notice” to the screen. For example, in case of interface-down event,
the following gets printed to the screen.
switch (config) #
Wed Jul 10 11:30:42 2013: Interface IB1/17 changed state to DOWN
Wed Jul 10 11:30:43 2013: Interface IB1/18 changed state to DOWN
switch (config) #
2. Add your email address for notifications. Run:
3. Configure the system to send notifications for a specific event. Run:
4. Show the list of events for which an email is sent. Run:
5. Have the system send you a test email. Run:
513
switch (config) # email send-test
The last command should generate the following email:
-----Original Message-----
From: Admin User [mailto:do-not-reply@switch.]
Sent: Sunday, May 01, 2011 11:17 AM
To: <name>
Subject: System event on switch: Test email for event notification
==== System information:
Hostname: switch
Version: <version> 2011-05-01 14:56:31
...
Date: 2011/05/01 08:17:29
Uptime: 17h 8m 28.060s
This is a test email.
==== Done.
Default N/A
History 3.2.3000
Related Commands
Notes
514
12.6.4.2 email autosupport event
Default N/A
History 3.2.3000
515
Example switch (config) # email autosupport event process-crash
Related Commands
Notes
Syntax Description none Does not use TLS to secure auto-support email.
tls Uses TLS over the default server port to secure auto-support email and
does not send an email if TLS fails.
tls-none Attempts TLS over the default server port to secure auto-support
email, and falls back on plaintext if this fails.
Default tls-none
History 3.2.3000
Related Commands
Notes
516
12.6.4.4 email autosupport ssl cert-verify
Default N/A
History 3.2.3000
Related Commands
Notes
Default default_ca_list
History 3.2.3000
517
Example switch (config) # email autosupport ssl ca-list
default_ca_list
Related Commands
Notes
History 3.1.0000
Notes
518
12.6.4.7 email domain
Sets the domain name from which the emails appear to come (provided that the return
address is not already fully-qualified). This is used in conjunction with the system
hostname to form the full name of the host from which the email appears to come.
The no form of the command clears email domain override.
History 3.1.0000
Notes
Default N/A
History 3.1.0000
519
Example switch (config) # email mailhub 10.0.8.11
Notes
Sets the mail relay to be used for sending autosupport notification emails.
The no form of the command clears the mail relay to be used for sending autosupport
notification emails.
Default N/A
History 3.7.1000
Notes
520
Default N/A
History 3.7.1000
Notes
Default 25
History 3.1.0000
Notes
521
12.6.4.12 email notify event
522
email notify event <event>
no email notify event <event>
523
Configuration Mode config
History 3.1.0000
Notes This does not affect auto-support emails. Auto-support can be disabled overall, but if it is
enabled, all auto-support events are sent as emails.
Adds an email address from the list of addresses to which to send email notifications of
events.
The no form of the command removes an email address from the list of addresses to
which to send email notifications of events.
Default N/A
History 3.1.0000
524
Notes
Sets the username or fully-qualified return address from which email notifications are
sent.
• If the string provided contains an “@” character, it is considered to be fully-qualified
and used as-is.
• Otherwise, it is considered to be just the username, and we append
“@<hostname>.<domain>”. The default is “do-not-reply”, but this can be changed
to “admin” or whatnot in case something along the line does not like fictitious
addresses.
The no form of the command resets this attribute to its default.
Default N/A
History 3.1.0000
Notes
email return-host
no email return-host
525
Default No return host
History 3.1.0000
Notes This only takes effect if the return address does not contain an “@” character
email send-test
History 3.1.0000
Notes
526
Syntax Description none No security mode, operates in plaintext
tls Attempts to use TLS on the regular mailhub port, with STARTTLS. If
this fails, it gives up.
tls-none Attempts to use TLS on the regular mailhub port, with STARTTLS. If
this fails, it falls back on plaintext.
Default default-cert
History 3.2.3000
Notes
Default N/A
History 3.2.3000
527
Related Commands show email
Specifies the list of supplemental certificates of authority (CA) from the certificate
configuration database that is to be used for verification of server certificates when
sending email using TLS, if any.
The no form of the command uses no list of supplemental certificates.
Default default-ca-list
History 3.2.3000
Notes This command has no impact unless TLS is used, and certificate verification is enabled.
show email
Displays email configuration or events for which email should be sent upon.
528
Syntax Description N/A
Default N/A
History 3.1.0000
Autosupport emails
Enabled: no
Recipient:
Mail hub:
Security mode: tls-none
Verify server cert: yes
Supplemental CA list: default-ca-list
Related Commands
Notes
529
Syntax Description N/A
Default N/A
History 3.1.0000
530
Example switch (config) # show email events
Failure events for which emails will be sent:
expected-shutdown: Expected system shutdown
process-crash: A process in the system has crashed
unexpected-shutdown: Unexpected system shutdown
531
Related Commands
Notes
There is no limitation on the number of mirroring sources and more than a single source can be mapped to a single
analyzer destination.
532
A mirroring session is a monitoring configuration mode that has the following parameters:
Ingress and egress traffic flows of a specific source interface can be mapped to two different sessions.
533
12.7.1.1.1 LAG
The source interface can be a physical interface or a LAG.
Port mirroring can be configured on a LAG interface but not on a LAG member. When a port is added to a mirrored
LAG it inherits the LAG’s mirror configuration. However, if port mirroring configuration is set on a port, that
configuration must be removed prior to adding the port to a LAG interface.
When a port is removed from a LAG, the mirror property is switched off for that port.
12.7.1.2.1 LAG
The destination interface cannot be a member of LAG when the header format is local.
534
if the analyzer system is indirectly connected to the destination interface, there are two options for switching the
mirrored data to the analyzer system:
• A VLAN tag may be added to the Ethernet header of the mirrored traffic
• An Ethernet header can be added with include a new destination address and VLAN tag
It must be taken into account that adding headers increases packet size.
12.7.1.5 Truncation
When enabled, the system can truncate the mirrored packets into smaller 64-byte packets (default) which is enough to
capture the packets’ L2 and L3 headers.
The size of the original mirrored packet (before adding the encapsulation headers, and including the 4 bytes
frame check sequence (FCs)) is truncated to 64 bytes.
535
12.7.2 Configuring Mirroring Sessions
The following figure presents two network scenarios with direct and remote connectivity to the analyzer equipment.
Direct connectivity is when the analyzer is connected to the analyzer port of the switch. In this case there is no need for
adding an L2 header to the mirrored traffic. Remote connectivity is when the analyzer is indirectly connected to the
analyzer port of the switch. In this situation, adding an L2 header may be necessary depending on the network’s setup.
This command enters a monitor session configuration mode. Upon first implementation the command
also creates the session.
switch (config monitor session 1) # add source interface ethernet 1/1 direction
both
4. (Optional) Set header format. Run:
For remote connectivity use the header formats “add-vlan” or “add-ethernet-header”. For local
connectivity, use “local”.
536
5. (Optional) Truncate the mirrored traffic to 64-byte packets. Run:
6. (Optional) Set congestion control. Run:
The default for this command is to drop excessive frames. The “pause-excessive-frames” parameter
uses flow control to regulate the traffic from the source interfaces.
If the parameter “pause-excessive-frame” is selected, make sure that flow control is enabled on all
source interfaces on the ingress direction of the monitoring session using the command “flowcontrol”
in the interface configuration mode.
7. Enable the session. Run:
To verify the attributes of running mirroring sessions:
537
switch (config) # show monitor session summary
Flags: i ingress, e egress, b both
-------------------------------------------------------------
Session Admin Status Mode Destination Source
-------------------------------------------------------------
1 Enable Up add-eth eth1/2 eth1/1(b)
2 Disable Down add-vlan eth1/2 eth1/8(i), po1(e)
3 Enable Up add-eth eth1/5 eth1/18(e)
7 Disable Down local
Creates session and enters monitor session configuration mode upon using this command
for the first time.
The no form of the command deletes the session.
Default N/A
History 3.3.3500
Notes • On Spectrum systems, the maximum number of monitor sessions that can be
configured is 2 if a recirculation port is configured, and 3 if not.
• On Spectrum-2 systems, the maximum number of monitor sessions that can be
configured is 7 if what-just-happened buffer is enabled, and 8 if not.
538
12.7.4.2 destination interface
Syntax Description interface Sets the interface type and number (e.g. ethernet 1/2)
force Eliminates the need to shutdown the port prior to the operation
History 3.3.3500
Related Commands
Notes • Port cannot be used as destination port in monitor session when storm-control is
configured on port
• Force command cannot remove storm-control configuration. Error output:
“Configuration error, storm control is configured on port”.
• When removing an interface from a monitor session it gains the default attributes of
Ethernet ports
12.7.4.3 shutdown
shutdown
no shutdown
539
Syntax Description interface Sets the interface type and number (e.g. ethernet 1/2)
force Eliminates the need to shutdown the port prior to the operation
Default Disabled
History 3.3.3500
Related Commands
Notes
Syntax Description interface Sets the interface type and number (e.g. ethernet 1/2)
direction Configures the direction of the mirrored traffic. The options are as
follows:
Default N/A
540
Configuration Mode config monitor session
History 3.3.3500
Related Commands
Notes • If mirroring is configured in one direction (e.g. ingress) on an interface and then is
configured in the other direction (e.g. egress), then the ultimate setting is “both”
• Only ingress traffic mirroring is supported
12.7.4.5 header-format
Default no-change
vlan 1
priority 0
traffic-class 0
541
Configuration config monitor session
Mode
History 3.3.3500
Related
Commands
Notes If add-ethernet-header is used, the source MAC address is the one of the outgoing Ethernet port.
12.7.4.6 truncate
truncate
no truncate
Default no truncate
History 3.3.3500
Related Commands
542
Notes • This command applies for all sessions on the same analyzer port
• The size of the original mirrored packet (before adding the encapsulation headers, and
including the 4 bytes frame check sequence (FCs)) is truncated to 64 bytes
12.7.4.7 congestion
Sets the system’s behavior when congested.
The no form of the command disables truncation.
Default drop-excessive-frames
History 3.3.3500
Related Commands
Notes This command applies for all sessions on the same analyzer port
Default N/A
543
History 3.3.3500
Source interfaces
--------------------
Interface Direction
--------------------
eth1/1 both
Related Commands
Notes
show monitor session summary
Default N/A
History 3.3.3500
Example
-------------------------------------------------------------
Session Admin Status Mode Destination Source
-------------------------------------------------------------
1 Disable Down local N/A eth1/1(b)
2 Disable Down add-vlan eth1/2 eth1/8(i)
544
Related Commands
Notes
12.8 sFlow
sFlow (ver. 5) is a procedure for statistical monitoring of traffic in networks.Onyx supports an sFlow sampling
mechanism (agent), which includes collecting traffic samples and data from counters. The sFlow datagrams are then
sent to a central collector.
The sampling mechanism must ensure that any packet going into the system has an equal chance of being sampled,
irrespective of the flow to which it belongs. The sampling mechanism provides the collector with periodical information
on the amount (and load) of traffic per interface by loading the counter samples into sFlow datagrams.
The sFlow packets are encapsulated and sent in UDP over IP. The UDP port number that is used is the standard 6343 by
default.
545
Counter Description
Total packets The number of packets that pass through sFlow-enabled ports
Number of flow samples The number of packets that are captured by the sampling
mechanism
Number of datagrams The number of datagrams that were sent to the collector
4. Set the central collector’s IP.
546
switch (config sflow) # agent-ip 20.20.20.20
This means that one every 16000 packet gets collected for sampling.
9. (Optional) Set the maximum size of the datagrams sent to the central collector.
10. Enable the sFlow agent on the desired interfaces.
547
switch (config)# show sflow
sflow protocol: enabled
sflow: enabled
sampling-rate: 16000
max-sampled-size: 156
counter-poll-interval: 19
max-datagram-size: 1500
collector-ip: 10.10.10.10
collector-port: 6343
agent-ip: 20.20.20.20
ingress ports:
Interfaces:
Ethernet: eth1/1
Port-channel: po1
Statistics:
Total Samples: 2000
Number of flow samples: 1200
Estimated Number of flow discarded: 0
Number of statistic samples: 800
Number of datagrams: 300
protocol sflow
no protocol sflow
Default Disabled
History 3.3.3500
Related Commands
Notes
548
12.8.7.2 sflow enable (global)
sflow enable
no sflow enable
Default Disabled
History 3.3.3500
Related Commands
Notes
12.8.7.3 sflow
sflow
Default N/A
History 3.3.3500
Related Commands
Notes
549
12.8.7.4 sampling-rate
sampling-rate <rate>
no sampling-rate
Syntax Description rate Configures the number of packets passed before selecting one for
sampling
Range: 4000-16777215
“0” disables sampling
Default N/A
History 3.3.3500
Related Commands
Notes
12.8.7.5 max-sample-size
max-sample-size <packet-size>
no max-sample-size
Default N/A
History 3.3.3500
Related Commands
550
12.8.7.6 counter-poll-interval
counter-poll-interval <seconds>
no counter-poll-interval
Default 20 seconds
History 3.3.3500
Related Commands
Notes
12.8.7.7 max-datagram-size
max-datagram-size <packet-size>
no max-datagram-size
Syntax Description packet-size The packet size of the packet being sent to the collector
Range: 200-9216 bytes
History 3.3.3500
Related Commands
Notes This packet contains the data sample as well as the statistical counter data
551
12.8.7.8 collector-ip
Configures the collector’s IP.
The no form of the command resets the parameters to their default values.
History 3.3.3500
Related Commands
Notes
12.8.7.9 agent-ip
ip-address The sFlow agent’s IP address (i.e. the source IP of the packet)
552
Default ip-address: 0.0.0.0
History 3.3.3500
3.3.5200 Updated “interface” parameters
Related Commands
clear counters
Default N/A
History 3.3.3500
Related Commands
Notes
sflow enable
no sflow enable
553
Default disable
no view-port-channel member
History 3.3.3500
Related Commands
Notes
show sflow
Default N/A
History 3.3.3500
554
Example switch (config)# show sflow
sflow protocol: enabled
sflow: enabled
VRF name: mgmt
sampling-rate: 16000
max-sample-size: 128
counter-poll-interval: 20
max-datagram-size: 1400
ip-agent: 0.0.0.0
ingress ports:
Interfaces:
Ethernet eth1/2 eth1/1
Statistics:
Total Samples: 0
Number of flow samples: 0
Estimated Number of flow discarded: 0
Number of flow statistics samples: 0
Number of datagrams: 0
Related Commands
Notes
555
12.9.1 Buffer Histograms and Thresholds Commands
Unhides telemetry config CLIs. The no form of the command hides telemetry config
CLIs.
Default Hidden
History 3.6.3004
Related Commands
Notes
telemetry shutdown
no telemetry shutdown
Disables the telemetry protocol, threshold detection, and histogram fetching for all
sampling enabled interfaces without changing any internal configuration.
The no form of the command enables telemetry protocol.
Default Disabled
History 3.6.3004
556
Related Commands protocol telemetry
Notes
History 3.6.3004
Notes
Enables multicast sampling (histogram fetching) on a traffic class for a particular Ethernet
interface.
The no form of the command disables multicast sampling on a TC for a particular
Ethernet interface.
557
ucast Unicast traffic
Default N/A
History 3.6.3004
Related Commands
Notes
Default Disabled
History 3.6.5000
Related Commands
558
Notes
Syntax Description level For Spectrum-based For Spectrum-2 and Spectrum-3-based systems:
systems: Range: 144-1,000,000
Range: 96-1,000,000 Level is set in bytes and in increments of 144
Level is set in bytes
and in increments of
96
Default 69984
History 3.6.5000
Related Commands
Notes
559
Syntax Description N/A
Default Disabled
History 3.6.4006
Related Commands
Notes
The command sets threshold events logging rate on per hour basis.
The no form of the command sets the logging rate back to default.
Default 100
History 3.6.4006
Related Commands
Notes
560
12.9.1.9 clear telemetry
clear telemetry {threshold | sampling} [interface <type> <port-id>] [tc <0-7> [ucast |
mcast]]
tc Traffic class
Default N/A
History 3.6.5000
Related Commands
Notes
clear telemetry threshold [interface <type> <if>]
561
Default N/A
History 3.6.6105
Example
switch (config) # clear telemetry threshold interface
ethernet 1/34-1/36
Related Commands
Notes
Default N/A
History 3.6.3004
562
Related Commands
Notes
Deletes the given .csv file created by “stats export” command to user directory.
Default N/A
History 3.6.3004
Related Commands
Notes
Default N/A
563
History 3.8.1000
Notes
Default N/A
History 3.8.1000
Notes
Uploads .csv file created by “stats export” command to user directory.
564
Default N/A
Configuration config
Mode
History 3.6.3004
3.9.2000—Added VRF option
Related Commands
Notes
Syntax Description file stats telemetry upload latest [vrf <vrf-name>] <upload-url>
Default N/A
History 3.8.1000
3.9.2000—Added VRF option
565
Related Commands file stats telemetry upload <file_name>
file stats telemetry upload all
Notes
Default N/A
History 3.8.1000
3.9.2000—Added VRF option
Notes
show telemetry
566
Syntax Description N/A
Default N/A
History 3.6.4000
Example
-----------------------------------------------------------------------------
------------------------
Interface TC Sampling Threshold
Level (bytes)
-----------------------------------------------------------------------------
------------------------
Eth1/1 N/A Disabled Disabled
N/A
Eth1/2 N/A Disabled Disabled
N/A
Eth1/3 N/A Disabled Disabled
N/A
Eth1/4 N/A Disabled Disabled
N/A
Eth1/5 N/A Disabled Disabled
N/A
Related Commands
Notes
show telemetry sampling <slot>/<port>[/<subport>] tc <tc_id> mcast
Displays fetched multicast histogram details for a given tc_id of the Ethernet interface.
567
Syntax Description slot/port Ethernet port number
Default N/A
History 3.6.3004
Example
-----------------------------------------------------------------------------
------------------------------------------------------------
Telemetry histogram: Eth1/2 traffic-class 3 - mcast
Time Bin sizes (nsec buffer was
occupied in bytes range)
-----------------------------------------------------------------------------
------------------------------------------------------------
01/16/17 2976< 27552 52128 76704 101280
125856 150432 175008 199584 199584>
04:09:07.79936 1000000000 0 0 0 0
0 0 0 0 0
04:09:08.80096 1000000000 0 0 0 0
0 0 0 0 0
04:09:09.80355 1000000000 0 0 0 0
0 0 0 0 0
04:09:10.80518 1000000000 0 0 0 0
0 0 0 0 0
04:09:11.80682 1000000000 0 0 0 0
0 0 0 0 0
Related Commands
Notes
568
12.9.1.20 show telemetry sampling tc mcast last
Displays last num of fetched multicast histogram details for the given tc_id of the ethernet
interface.
Default N/A
History 3.6.3004
Example
-----------------------------------------------------------------------------
-------------------------------------------------------------------------
Telemetry histogram: Eth1/2 traffic-class 3 - mcast
Time Bin sizes (nsec
buffer was occupied in bytes range)
-----------------------------------------------------------------------------
-------------------------------------------------------------------------
01/16/17 2976< 27552 52128 76704
101280 125856 150432 175008 199584 199584>
04:23:38.28864 1000000000 0 0 0
0 0 0 0 0 0
04:23:39.28977 1000000000 0 0 0
0 0 0 0 0 0
04:23:40.29111 1000000000 0 0 0
0 0 0 0 0 0
04:23:41.29259 1000000000 0 0 0
0 0 0 0 0 0
569
Related
Commands
Notes If the requested entries are more than what the DB contains, it prints the amount in the table.
Displays fetched unicast histogram details for a given TC ID of the Ethernet interface.
Default N/A
History 3.6.3004
Example
-----------------------------------------------------------------------------
-------------------------------------------------------------------------
Telemetry histogram: Eth1/2 traffic-class 6 - ucast
Time Bin sizes (nsec
buffer was occupied in bytes range)
-----------------------------------------------------------------------------
-------------------------------------------------------------------------
01/13/17 2976< 27552 52128 76704
101280 125856 150432 175008 199584 199584>
08:18:09.67745 1000000000 0 0 0
0 0 0 0 0 0
08:18:10.67850 1000000000 0 0 0
0 0 0 0 0 0
08:18:11.67953 1000000000 0 0 0
0 0 0 0 0 0
570
Related
Commands
Notes
Displays last number of fetched unicast histogram details for the given traffic class ID of
the Ethernet interface.
Default N/A
History 3.6.3004
Example
Related Commands
Notes If the requested entries are more than what the DB contains, it prints the amount in the
table.
571
12.9.1.23 show telemetry threshold
show telemetry threshold [interface <type> <port-id>] [tc <0-7> [ucast | mcast]]
Displays threshold data for either all interfaces or single interface or per interface per
traffic class.
tc Traffic class
Default N/A
History 3.6.5000
Example
572
switch (config) # show telemetry threshold 1/10-1/13
-----------------------------------------------------------------------------
-------------------
Event-id Date Time Port TC Level Duration(100
usec) Repeated
-----------------------------------------------------------------------------
-------------------
1 09/21/17 10:11:48 Eth 1/10 0 100 102497.61
1
2 09/21/17 10:12:06 Eth 1/10 3 100 85714.76
1
Related Commands
Notes The command supports displaying up to 1000 threshold events. As a result, if more than
1000 thresholds configured in total, some interfaces may not be displayed. Therefore, to
query thresholds for a specific interface, please use the command “show telemetry
threshold interface <type> <id>”.
Displays all files created by the command “stats export csv telemetry”.
Default N/A
573
History 3.6.3004
Notes
12.10.1 Commands
574
Default N/A
History 3.1.0000
Notes
History 3.1.0000
575
Notes
single Does not repeat events: only sends one event whenever the alarm
changes state.
Default single
History 3.1.0000
Notes
576
12.10.1.4 stats alarm {rising | falling}
falling Configures alarm for when the statistic falls too low
rising Configures alarm for when the statistic rises too high
History 3.1.0000
577
Notes Not all alarms support all four thresholds.
stats alarm <alarm ID> rate-limit {count <count-type> <count> | reset | window
<window-type> <duration>}
reset Set the count and window durations to default values for this alarm
History 3.1.0000
Notes
578
12.10.1.6 stats chd clear
• eth_day
• eth_hour
• eth_ip_day
• eth_ip_hour
Default N/A
History 3.1.0000
Notes
579
12.10.1.7 stats chd enable
• eth_day
• eth_hour
Default Enabled
History 3.1.0000
Notes
580
12.10.1.8 stats chd compute time
stats chd <CHD ID> compute time {interval | range} <number of seconds>
• eth_day
• eth_hour
History 3.1.0000
581
Related Commands show stats chd
Notes
Syntax Description sample-id Sample name for which report file should be generated.
• congested
• cpu_util – CPU utilization: milliseconds of time spent
• disk_device_io – storage device I/O statistics
• disk_io – operating system aggregate disk I/O: KB/sec
• fan – fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization: bytes
• memory – system memory utilization: bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• interface-ethernet – Ethernet counters statistics: counter units
• interface-mlag-port-channel – MLAG counters statistics: counter
units
• interface-port-channel – LAG counters statistics: counter units
• eth
Default N/A
History 3.7.1102
582
Notes
• congested
• cpu_util – CPU utilization: milliseconds of time spent
• disk_device_io – storage device I/O statistics
• disk_io – operating system aggregate disk I/O: KB/sec
• fan - Fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization: bytes
• memory – system memory utilization: bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• interface-ethernet – Ethernet counters statistics: counter units
• interface-mlag-port-channel – MLAG counters statistics: counter
units
• interface-port-channel – LAG counters statistics: counter units
• eth
• eth-abs
• eth_ip
Default N/A
History 3.1.0000
Notes
583
12.10.1.11 stats sample enable
• congested
• cpu_util – CPU utilization: milliseconds of time spent
• disk_device_io – storage device I/O statistics
• disk_io – operating system aggregate disk I/O: KB/sec
• fan – fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization: bytes
• memory – system memory utilization: bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• interface-ethernet – Ethernet counters statistics: counter units
• interface-mlag-port-channel – MLAG counters statistics: counter
units
• interface-port-channel – LAG counters statistics: counter units
• eth
Default Enabled
History 3.1.0000
Notes
584
12.10.1.12 stats sample interval
Syntax Description sample-id Sample name for which report file should be generated.
• congested
• cpu_util – CPU utilization: milliseconds of time spent
• disk_device_io – storage device I/O statistics
• disk_io – operating system aggregate disk I/O: KB/sec
• fan – fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization: bytes
• memory – system memory utilization: bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• interface-ethernet – Ethernet counters statistics: counter units
• interface-mlag-port-channel – MLAG counters statistics: counter
units
• interface-port-channel – LAG counters statistics: counter units
• eth
History 3.7.1102
Notes
585
12.10.1.13 stats sample max-entries
Syntax Description sample-id Sample name for which report file should be generated.
• congested
• cpu_util – CPU utilization: milliseconds of time spent
• disk_device_io – storage device I/O statistics
• disk_io – operating system aggregate disk I/O: KB/sec
• fan – fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization: bytes
• memory – system memory utilization: bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• interface-ethernet – Ethernet counters statistics: counter units
• interface-mlag-port-channel – MLAG counters statistics: counter
units
• interface-port-channel – LAG counters statistics: counter units
• eth
Default Default “interface” samples is 100 records
History 3.7.1102
586
Notes • Setting a new value will delete all sample history.
• History does not persist after reboot.
stats clear-all
Clears data for all samples, CHDs, and status for all alarms.
Default N/A
History 3.1.0000
Notes
587
Default N/A
History 3.1.0000
Notes
Default N/A
588
Configuration Mode Any command mode
History 3.1.0000
Notes
Default N/A
History 3.1.0000
CPU 0
Utilization: 6%
Peak Utilization Last Hour: 16% at 2012/02/28 08:47:32
Avg. Utilization Last Hour: 8%
589
Related Commands
Notes
Syntax Description sample-id Sample name for which report file should be generated.
• congested
• cpu_util – CPU utilization: milliseconds of time spent
• disk_device_io – storage device I/O statistics
• disk_io – operating system aggregate disk I/O: KB/sec
• fan – fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization: bytes
• memory – system memory utilization: bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• interface-ethernet – Ethernet counters statistics: counter units
• interface-mlag-port-channel – MLAG counters statistics: counter
units
• interface-port-channel – LAG counters statistics: counter units
• eth
Default N/A
History 3.1.0000
Related Commands
590
Notes
Syntax Description sample-id Sample name for which report file should be generated.
• congested
• cpu_util – CPU utilization: milliseconds of time spent
• disk_device_io – storage device I/O statistics
• disk_io – operating system aggregate disk I/O: KB/sec
• fan – fan speed
• fs_mnt_bytes – filesystem usage: bytes
• fs_mnt_inodes – filesystem usage: inodes
• interface – network interface statistics
• intf_util – network interface utilization: bytes
• memory – system memory utilization: bytes
• paging – paging activity: page faults
• power – power supply usage
• power-consumption
• temperature – modules temperature
• interface-ethernet – Ethernet counters statistics: counter units
• interface-mlag-port-channel – MLAG counters statistics: counter
units
• interface-port-channel – LAG counters statistics: counter units
• eth
interface Allows limiting output to a particular interface’s counters
Default N/A
591
Configuration Mode Any command mode
History 3.7.1102
Example
Related Commands
592
Notes • Filtering keyword depends on chosen <sample-id>. For convenience, “interface”
samples such as “interface-ethernet”, “interface-port-channel” and “interface-mlag-
port-channel” have interface related keywords for choosing a counters group.
• Notice that this is a history of counters. Autocompletion and output can contain
information for groups (interfaces) that is not present anymore in the system, and
vice versa. If counters are not sampled, they will not appear in the output.
• Output of collected information is implemented only for the following samples:
• interface-port-channel
• interface-ethernet
• interface-mlag-port-channel
• memory
• paging
• power
1 2 3 4 5 6 7 8 9
Spectrum-2 systems and above use the following index schema for port modules and port module sensors:
1 2 3 4 5 6 7 8 9 10
593
Mod. Type Port Module Identifier Port module Sensor
ID index
TX sensors in range
1..39
RX sensors in range
41..79
Spectrum systems use the following index schema for port modules and port module sensors:
1 2 3 4 5 6 7 8 9
Number Description
1 Chassis
2 Management
3 Spine
4 Leaf
5 Fan
6 Power supply
7 BBU
8 x86 CPU
594
Number Description
9 Port module
Physical entities—10 digits representation
1 Port module
12.11.2 Examples
• entPhysicalIndex with value 401191311
• 9 digits representation.
• Layer 1 is “401”—“4” indicates a leaf (see module type breakdown table) and “01” indicates leaf at
index #1 (i.e., leaf 01)
• Layer 2 is “1913”—this is the identifier for one of the QSFP-ASIC in the system
• Layer 3 is “11”—this is the identifier for temperature sensor #1
• The description for this physical entity (appears in entPhysicalDescr column of the MIB) would be: L01/
QSFP-ASIC-1/T1
• entPhysicalIndex with value 501020021
• 9 digits representation.
• Layer 1 is “501”—“5” indicates a fan (see module type breakdown table) and “01” indicates fan at index
#1 (i.e., fan 01)
• Layer 2 is “0200”—this is the identifier for general fan in the system
• Layer 3 is “21”—this is the identifier for fan sensor #1
• The description for this physical entity (appears in entPhysicalDescr column of the MIB) would be:
FAN1/FAN/F1
• For entPhysicalIndex with value 1000012700
• 10 digits representation.
• Layer 1 is “1”—port module (see module type breakdown table).
• Layer 2 is “127”—port identifier
• Layer 3 is “00”—no sensors for this port module
• For entPhysicalIndex with value 1000012742
• 10 digits representation.
• Layer 1 is “1”—port module (see module type breakdown table).
• Layer 2 is “127”—port identifier
• Layer 3 is “42”—sensor in the range 41..79 indicts an RX sensor
595
13 Automation Tools
Deploying, provisioning, operating and configuring data center networks is still a largely manual and time-consuming
process that is susceptible to human error. Its automation greatly enhances agility, accelerates deployment, increases
reliability and improves the performance of critical business applications, and at the bottom line it saves on operational
expenditure.
The datacenter is an ecosystem composed of computer servers and storage and networking equipment, while each of
these components is managed by a separate team using separate tools. Nowadays it is possible to increase efficiency by
allowing IT departments to break down barriers, automate processes and better divide resources across the entire
datacenter. Network automation enables IT departments to be more responsive to various, real-time business
requirements, and more service-centric in their approach to delivering value.
Additionally, it enables a more efficient method to easily change server configuration and apply it to all affected
elements of the infrastructure (e.g. when a new virtual machine is spun up, its corresponding VLAN should be
configured automatically).
The transition to automated operation is vital to the data center in each of the following aspects:
• Provisioning and deployment: Instead of a time-consuming manual staging process, new switches enable
automatic downloading of the correct image and configuration as soon as they are installed on the rack and
booted, automating set-up, configuration and the provisioning process.
• Management and operations: Once the network is up and running, adjustments can be programmed to occur
automatically, using analytics to deliver current, consistent and accurate information.
• Orchestration: The network must be synched with all other elements of the data center. When a server or storage
configuration is changed, it often requires corresponding changes in the network, which need to take place
immediately and automatically.
To enable data center orchestration, switches should:
• Support orchestration tools such as OpenStack and CloudStack
• Support SDN solutions from a variety of vendors, such as Juniper’s Contrail Networking product
• Support IT automation solutions, such as Puppet or Chef, so the network can be managed in concert with
the overall data center infrastructure
The below sections provide detailed guideline on how to use two of the main automation tools (Ansible and SALT
stack), enabling higher automation in an Onyx-based data center.
13.1 Ansible
Ansible works by configuring client machines from a computer with Ansible components installed and configured. It
communicates over normal SSH channels to retrieve information from remote machines, issue commands, and copy
files. Therefore, an Ansible system does not require any additional software to be installed on the client computers. Any
server that has an SSH port exposed can be brought under Ansible's configuration umbrella, regardless of what stage it
is at in its life cycle.
Ansible takes on a modular approach, making it easy to extend to use the functionalities of the main system to deal with
specific scenarios. Modules can be written in any language and communicate in standard JSON. Configuration files are
mainly written in the YAML data serialization format due to its expressive nature and its similarity to popular markup
languages. Ansible can interact with clients through either command line tools or through its configuration scripts called
Playbooks.
For a list of Ansible’s supported modules, please refer toOnyx modules page on Ansible.com and the modules location
themselves.
596
sudo yum install epel-release
2. Install Ansible:
vi /etc/ansible/hosts
Keep output file for future more complex Ansible configuration scenarios.
d. Add switch information to the following configuration file, based on the following examples:
i. EX1: switch132; ansible_host=10.209.37.249; ansible_user=admin; ansible_ssh_pass=admin
ii. EX2: switch131; ansible_host=l-csi-2700-l05; ansible_user=admin; ansible_ssh_pass=admin
touch <file_name>.yml
Playbook example:
hosts: switch132
gather_facts: no
connection: network_cli
become: yes
become_method: enable
vars:
ansible_network_os: onyx
tasks:
onyx_vlan:
vlan_id: 20
name: test-vlan
where:
hosts List of switches required for running this yml file on
597
tasks List of required tasks
Full module variables explanation, and examples of playbooks can be created for each module of Onyx
modules supported by Ansible.
All Onyx-supported modules in Ansible are available in the following link: https://docs.ansible.com/ansible/
devel/modules/list_of_network_modules.html#onyx.
The Onyx modules are available in the following path: lib/ansible/modules/network/onyx, where any module
can be run in order to see the structure of the playbook.
13.2 SALT
Salt is a different approach to infrastructure management, founded on the idea that high-speed communication with
large numbers of systems can open new capabilities. This approach makes Salt a powerful multitasking system that can
solve many specific problems in an infrastructure.
The backbone of Salt is the remote execution engine, which creates a high-speed, secure and bi-directional
communication net for groups of systems. On top of this communication system, Salt provides an extremely fast,
flexible, and easy-to-use configuration management system called Salt States.
For a list of Salt’s Napalm supported modules, please refer to the NAPALM-Onyx github repository.
598
13.2.2 Configuring Salt
1. Open the /etc/salt/master file.
2. Replace #interface: 0.0.0.0 with interface: <machine_ip>.
3. Replace #hash_type: md5 with hash_type: sha256.
4. Find file_roots and pillar_rootsand and add the following lines below them:
599
2. Find the below attributes and fill them out as shown below:
mkdir -r /etc/salt/pillar
proxy:
proxytype: napalm
driver: [DRIVER]
host: [HOSTNAME]
username: [USERNAME]
passwd: [PASSWORD]
Example:
proxy:
proxytype: napalm
driver: onyx_ssh
host: 10.209.37.247
username: admin
passwd: admin
propt_name: switch20
ssh_args:‘-0 PubkeyAuthentication=no’
600
systemctl stop salt-minion
systemctl stop salt-master
systemctl stop salt-proxy@<switch_name>
systemctl start salt-master
systemctl start salt-minion
systemctl start salt-proxy@<switch_name>
2. Run any command on the switch using net.cli (example: using “show version”):
601
switch (config) # puppet-agent master-hostname
<please_type_your_hostname_DNS_here>
2. Enable the Puppet agent.
3. (Optional) Verify there are no errors in the Puppet agent log.
2. Sign the certificate request if the cert_name parameter (e.g. switch1.domain) is in the list.
3. Verify the request is removed from the Puppet certification list.
602
13.3.3 Installing Modules on the Puppet Server
Mellanox uses netdev-stdlib types and provides a package of Mellanox providers for those types which have to be
installed at the Puppet server prior to the first Puppet configuration run (before configuring resources on the Mellanox
switch).
To install those modules, run the following commands in the Puppet server:
If a module is already installed, please use the command “puppet module upgrade <module_name>” or
“puppet module install <module_name> --force” instead of “puppet module install <module_name>” to
reinstall the modules.
import "netdev_vlan_example"
import "netdev_l2_vlan_example"
import "netdev_lag_example"
node 'switch-6375dc.mtr.labs.mlnx'{
netdev_device { $hostname: }
include vlan_example # Asserts a class vlan_example in one of the files
include l2_interface_example
include lag_example
}
If you have a puppet console, you may assign classes of configuration in the following way:
• Add the relevant classes (using the console add class button on the “nodes” page).
• Assign the classes to the relevant nodes/groups in the puppet server console (in the console node/
group page -> edit -> Classes).
2. Update VLAN.
Manifest example (located in “/etc/puppetlabs/puppet/manifests/netdev_vlan_example.pp”).
603
class vlan_example{
$vlans = {
'Vlan244' => {vlan_id => 244, ensure => present},
'Vlan245' => {vlan_id => 245, ensure => present},
}
create_resources( netdev_vlan, $vlans )
}
class vlans_ensure_example{
$vlans = {
'Vlan347' => {vlan_id => 347, ensure => present},
'Vlan348' => {vlan_id => 348, ensure => present},
'Vlan349' => {vlan_id => 349, ensure => present},
}
create_resources( netdev_vlan, $vlans )
}
class l2_interface_example{
include vlans_ensure_example #class to Ensure VLANs before assigning
$l2_interfaces = {
'ethernet 1/3' => {ensure => absent, vlan_tagging => disable}, #default
'ethernet 1/4' => {ensure => present, vlan_tagging => enable,
tagged_vlans => [Vlan348,Vlan347], untagged_vlan => Vlan349} #hybrid
}
create_resources( netdev_l2_interface, $l2_interfaces )
}
4. Update LAG.
Manifest example (located in “/etc/puppetlabs/puppet/manifests/netdev_lag_example.pp”).
class lag_example{
$lags = {
'port-channel 101' => {ensure => present,
links => ['ethernet 1/12', 'ethernet 1/13'], lacp => active},
'port-channel 102' => {ensure => present,
links => ['ethernet 1/6','ethernet 1/5'], lacp => disabled},
}
create_resources( netdev_lag, $lags )
}
604
You may add classes to ensure that all assigned links are with the same layer 1 and layer 2
configurations (similarly to the way we did in update l2_interface section with vlans_ensure_example
class).
13.3.7 Troubleshooting
This section presents common issues that may prevent the switch from connecting to the puppet server.
13.3.7.2 Outdated or Invalid SSL Certificates Either on the Switch or the Server
This can be fixed on the switch using the CLI command “puppet-agent clear-certificates” (requires “puppet-agent
restart” to take effect).
On the server it can be fixed by running “puppet cert clean <switch_fqdn>” (FQDN is the Fully Qualified Domain
Name which consists of a hostname and a domain suffix).
13.3.8.1 puppet-agent
puppet-agent
605
Default N/A
History 3.3.4200
Related Commands
Notes
Default PUPPET is enabled by default
History 3.9.2000
Related Commands
Notes If VRF management exists, PUPPET will be enabled on VRF management. If VRF
management not does not exist, PUPPET will be enabled on VRF default.
606
13.3.8.3 master-hostname
master-hostname <hostname>
no master-hostname
Default puppet
History 3.3.4200
Related Commands
Notes
13.3.8.4 enable
enable
no enable
Default Disabled
History 3.3.4200
Related Commands
Notes
607
13.3.8.5 run-interval
run-interval <time>
Configures the time interval in which the puppet agent reports to the puppet server.
Default 30m
History 3.3.4302
Notes
13.3.8.6 restart
puppet-agent restart
Default N/A
History 3.3.4200
Related Commands
Notes
608
13.3.8.7 show puppet-agent
show puppet-agent
Default N/A
History 3.3.4200
3.3.4302—Updated example
3.7.0000—Updated example
3.9.2000—Updated example, adding "VRF name" field
Example
Related Commands
Notes
show puppet-agent log [[not] [matching | continuous] <string> | files [[not] matching]
<string>]
Displays the Puppet agent’s log file.
609
not Displays Puppet agent log that do not meet a certain string
Default N/A
History 3.3.4200
Example
610
switch (config puppet-agent) # show puppet-agent log
Mon Nov 04 11:52:42 +0000 2013 Puppet (notice): Starting Puppet client
version 3.2.3
Mon Nov 04 11:52:44 +0000 2013 Puppet (warning): Unable to fetch my node
definition, but the agent run will continue:
Mon Nov 04 11:52:44 +0000 2013 Puppet (warning): Could not intern from pson:
source '"#<Puppet::Node:0x7f' not in PSON!
Mon Nov 04 11:53:21 +0000 2013 /Netdev_vlan[Vlan104]/ensure (notice): created
Mon Nov 04 11:53:22 +0000 2013 /Netdev_vlan[Vlan101]/ensure (notice): created
Mon Nov 04 11:53:23 +0000 2013 /Netdev_vlan[Vlan102]/ensure (notice): created
Mon Nov 04 11:53:24 +0000 2013 /Netdev_vlan[Vlan103]/ensure (notice): created
Mon Nov 04 11:53:40 +0000 2013 /Netdev_l2_interface[ethernet 1/6]/
untagged_vlan (notice): untagged_vlan changed 'default' to 'Vlan103'
Mon Nov 04 11:53:43 +0000 2013 /Netdev_l2_interface[ethernet 1/7]/
untagged_vlan (notice): untagged_vlan changed 'default' to 'Vlan103'
Mon Nov 04 11:53:48 +0000 2013 /Netdev_vlan[Vlan100]/ensure (notice): created
Mon Nov 04 11:53:48 +0000 2013 /Netdev_l2_interface[ethernet 1/5]/
vlan_tagging (notice): vlan_tagging changed 'enable' to 'disable'
Mon Nov 04 11:53:48 +0000 2013 /Netdev_l2_interface[ethernet 1/5]/
tagged_vlans (notice): tagged_vlans changed '[]' to
'[Vlan100,Vlan101,Vlan102]'
Mon Nov 04 11:53:51 +0000 2013 /Netdev_l2_interface[ethernet 1/1]/
tagged_vlans (notice): tagged_vlans changed '[]' to '[Vlan101,Vlan104]'
Mon Nov 04 11:53:51 +0000 2013 /Netdev_l2_interface[ethernet 1/1]/
untagged_vlan (notice): untagged_vlan changed 'default' to 'Vlan100'
Mon Nov 04 11:53:54 +0000 2013 /Netdev_l2_interface[ethernet 1/3]/
tagged_vlans (notice): tagged_vlans changed '[]' to '[Vlan101,Vlan104]'
Mon Nov 04 11:53:54 +0000 2013 /Netdev_l2_interface[ethernet 1/3]/
untagged_vlan (notice): untagged_vlan changed 'default' to 'Vlan100'
Mon Nov 04 11:53:58 +0000 2013 /Netdev_l2_interface[ethernet 1/4]/
vlan_tagging (notice): vlan_tagging changed 'enable' to 'disable'
Mon Nov 04 11:53:58 +0000 2013 /Netdev_l2_interface[ethernet 1/4]/
tagged_vlans (notice): tagged_vlans changed '[]' to
'[Vlan100,Vlan101,Vlan102]'
Mon Nov 04 11:54:03 +0000 2013 /Netdev_l2_interface[ethernet 1/2]/
tagged_vlans (notice): tagged_vlans changed '[]' to '[Vlan101,Vlan104]'
Mon Nov 04 11:54:03 +0000 2013 /Netdev_l2_interface[ethernet 1/2]/
untagged_vlan (notice): untagged_vlan changed 'default' to 'Vlan100'
Mon Nov 04 11:54:06 +0000 2013 Puppet (notice): Finished catalog run in 47.90
seconds
Related Commands
Notes
611
13.4.1 Commands
13.4.1.1 job
Creates a job.
The no form of the command deletes the job.
Default N/A
History 3.1.0000
Example
switch (config) # job 100
switch (config job 100) #
13.4.1.2 command
Syntax Description sequence # An integer that controls the order the command is executed relative to
other commands in this job. The commands are executed in an
ascending order.
612
Default N/A
History 3.1.0000
Example
switch (config job 100) # command 10 “show images"
Notes • The command must be defined with inverted commas (“”)
• The command must be added as it was executed from the “config” mode. For
example, in order to change the interface description you need to add the command:
“interface <type> <number> description my-description”.
13.4.1.3 comment
comment <comment>
no comment
Default N/A
History 3.1.0000
Example
switch (config job 100) # comment Job_for_example
Notes
613
13.4.1.4 enable
enable
no enable
Default N/A
History 3.1.0000
Example
switch (config job 100) # enable
Notes If a job is disabled, it will not be executed automatically according to its schedule; nor
can it be executed manually.
13.4.1.5 execute
execute
Default N/A
History 3.1.0000
Example
switch (config job 100) # execute
614
Notes • The job timer (if set) is not canceled and the job state is not changed: i.e. the time of
the next automatic execution is not affected
• The job will not be run if not currently enabled
13.4.1.6 fail-continue
fail-continue
no fail-continue
Default A job will halt execution as soon as any of its commands fails
History 3.1.0000
Example
switch (config job 100) # fail-continue
Notes
13.4.1.7 name
Default N/A
615
Configuration Mode config job
History 3.1.0000
Example
switch (config job 100) # name my-job
Notes
Sets the type of schedule the job will automatically execute on.
The no form of the command resets the schedule type to its default.
Default once
History 3.1.0000
Example
switch (config job 100) # schedule type once
616
Notes A schedule type is essentially a structure for specifying one or more future dates and times
for a job to execute.
Sets the type of schedule the job will automatically execute on.
The no form of the command resets the schedule type to its default.
Default once
History 3.1.0000
Example
switch (config job 100) # schedule monthly interval 10
Notes A schedule type is essentially a structure for specifying one or more future dates and times
for a job to execute.
617
13.4.1.10 show jobs
show jobs [<job-id>]
Displays configuration and state (including results of last execution, if any exist) of
existing jobs.
Default N/A
History 3.1.0000
Example
switch (config) # show jobs 10
Job 10:
Status: inactive
Enabled: yes
Continue on failure: no
Schedule Type: once
Time and date: 1970/01/01 00:00:00 +0000
Last Exec Time: Thu 2012/04/05 13:11:42 +0000
Next Exec Time: N/A
Commands:
Command 10: show terminal
Last Output:
Related Commands
Notes
618
14 User Management, Authentication, & Security
• User Management & Security
• Cryptographic (X.509, IPSec) and Encryption
admin admin
monitor monitor
• Authorization—following the authentication, a user must gain authorization for performing certain tasks. After
logging into a system, for instance, the user may try to issue commands. The authorization process determines
whether the user has the authority to issue such commands. Simply put, authorization is the process of enforcing
policies: determining what types or qualities of activities, resources, or services a user is permitted. Usually,
authorization occurs within the context of authentication. Once you have authenticated a user, they may be
authorized for different types of access or activity.
• Accounting—the last level is accounting, which measures the resources a user consumes during access. This
includes the amount of system time or the amount of data a user has sent and/or received during a session.
Accounting is carried out by logging of session statistics and usage information, and is used for authorization
control, billing, trend analysis, resource utilization, and capacity planning activities.
Authentication, authorization, and accounting services are often provided by a dedicated AAA server, a program that
performs these functions. Network access servers interface with AAA servers using the Remote Authentication Dial-In
User Service (RADIUS) protocol.
619
14.1.3 User Re-authentication
Re-authentication prevents users from accessing resources or perform tasks for which they do not have authorization. If
credential information (e.g., AAA server information like IP address, key, port number, and so forth) that has been
previously used to authenticate a user is modified, that user gets immediately logged out and then asked to re-
authenticate.
14.1.4 RADIUS
RADIUS (Remote Authentication Dial-In User Service), widely used in network environments, is a client/server
protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in
users and authorize their access to the requested system or service. It is commonly used for embedded network devices
such as routers, modem servers, switches and so on. RADIUS is currently the de-facto standard for remote
authentication. It is prevalent in both new and legacy systems.
It is used for several reasons:
• RADIUS facilitates centralized user administration
• RADIUS consistently provides some level of protection against an active attacker
14.1.5 TACACS+
TACACS (Terminal Access Controller Access Control System), widely used in network environments, is a client/server
protocol that enables remote access servers to communicate with a central server to authenticate dial-in users and
authorize their access to the requested system or service. It is commonly used for providing NAS (Network Access
Security). NAS ensures secure access from remotely connected users. TACACS implements the TACACS Client and
provides the AAA (Authentication, Authorization, and Accounting) functionalities.
TACACS is used for several reasons:
• Facilitates centralized user administration
• Uses TCP for transport to ensure reliable delivery
• Supports inbound authentication, outbound authentication and change password request for the authentication
service
• Provides some level of protection against an active attacker
14.1.6 LDAP
LDAP (Lightweight Directory Access Protocol) is an authentication protocol that allows a remote access server to
forward a user's log-on password to an authentication server to determine whether access can be allowed to a given
system. LDAP is based on a client/server model. The switch acts as a client to the LDAP server. A remote user (the
remote administrator) interacts only with the switch, not with the back-end server and database.
LDAP authentication consists of the following components:
• A protocol with a frame format that utilizes TCP over IP
• A centralized server that stores all the user authorization information
• A client: in this case, the switch
Each entry in the LDAP server is referenced by its Distinguished Name (DN). The DN consists of the user-account
name concatenated with the LDAP domain name. The following is an example DN where the the user-account name is
John:
uid=John,ou=people,dc=domain,dc=com
620
LDAP supports user membership in groups. If remote user is a member of admin or monitor group, it will be logged
with admin or monitor capabilities respectively.
Supported group names for mapping are as follows:
• admin
• monitor
Supported group types (objectClass) on LDAP server side are as follows:
• groupOfNames
• posixGroup
Note that if system fails to load in secure mode it is loaded in non-secure mode.
Prerequisites:
1. Disable SNMPv1 and v2.
switch (config) # snmp-server user <username> v3 auth sha <password1> priv aes-128
<password2>
621
switch (config) # ssh server security strict
If a necessary prerequisite is not fulfilled the system does not activate secure mode and issues an advisory
message accordingly.
622
To deactivate secure mode, do the following:
• User Accounts
• username
• show usernames
• show users
• show whoami
• password
• show password hardening
• AAA Methods
• aaa accounting
• aaa authentication login
• aaa authentication attempts fail-delay
• aaa authentication attempts track
• aaa authentication attempts lockout
• aaa authentication attempts class-override
• aaa authentication attempts reset
• clear aaa authentication attempts
• aaa authorization
• show aaa
• show aaa authentication attempts
• RADIUS
• radius-server
• radius-server enable
• radius-server host
• show radius
• TACACS+
• tacacs-server
• tacacs-server enable
• tacacs-server host
• show tacacs
• LDAP
• ldap enable
• ldap base-dn
• ldap bind-dn/bind-password
• ldap group-attribute/group-dn
• ldap host
• ldap hostname-check enable
• ldap login-attribute
623
• ldap port
• ldap referrals
• ldap scope
• ldap ssl
• ldap timeout
• ldap version
• show ldap
• show ldap crl
• System Secure Mode
• system secure-mode enable
• show system secure-mode
14.1.8.1.1 username
Syntax Description username Specifies a username and creates a user account. New users are created
initially with admin privileges but is disabled.
• a-z
• A-Z
• 0-9
• period (.), underscore (_), hyphen (-)
Any single character or combination of characters from the above is
allowed except for a period "." in a single form.
624
name Full name of the user.
nopassword The next login of the user will not require password.
0|7 • 0—specifies a login password in cleartext
• 7—specifies a login password in encrypted text
password Specifies a password for the user in string form. If [0 | 7] was not
specified then the password is in cleartext.
• admin
• monitor
History
3.1.0000
3.6.2002 Added “disconnect” parameter
Example
switch (config) # username monitor full-name smith
625
Notes • To enable a user account, just set a password on it (or use the command “username
<user> nopassword” to enable it with no password required for login)
• Removing a user account does not terminate any current sessions that user has open;
it just prevents new sessions from being established
• Encrypted password is useful for the command “show configuration”, since the
cleartext password cannot be recovered after it is set
• The command "username <user> password <password>" or "username <user>
password 0 <password>" are not security and will leave clear text in user's terminal
(log and command history will be treated as sensitive information without clear text
password). They are recommended to be replaced as "username <user> password" or
"username <user> password" commands.
show usernames
Default N/A
History
3.1.0000
Example
626
Related Commands username
show users
Notes
show users [history]
Displays logged in users and related information such as idle time and what host they
have connected from.
Default N/A
History 3.1.0000
Example
Notes
627
14.1.8.1.4 show whoami
show whoami
Default N/A
History 3.1.0000
Example
switch (config) # show whoami
Current user: admin
Capabilities: admin
Notes
14.1.8.1.5 password
password [age expiration <days> | age warning <days> | history < length > | length
minimal <length> | length maximal < length > | username-password-match enable |
complexity-class <char class> | hardening enable]
Syntax Description age expiration Specifies validity period of any password configured.
<days> Range: 0-365 days (0=password will not expire)
Default: 365 days
age warning Specifies how many days before expiration a warning message
<days> should be printed while logging in.
Range: 0-30 days (0 indicates that a warning message will not be
printed)
Default: 15 days
628
history < length Specifies how many passwords are saved per user. New password
> will be compared to previous passwords and will not be allowed if it
is the same as an old one.
Default: 5 passwords
Default: 8 characters
Default: 64 characters
Default: lower-upper-digit
hardening enable Enable password restrictions. If enabled, all the above will be
checked upon every new password that is being configured.
Password that does not meet the requirements will be rejected.
Default Enabled. After upgrade, the feature will be disabled by default.
History 3.9.2000
629
Related Commands show password hardening
Notes
Default N/A
History 3.9.2000
Example
switch (config) # show password hardening
Password settings:
Password hardening : enabled
Min password length : 8 (characters)
Max password length : 64 (characters)
Character class : Lowercase, uppercase and
digits
Password history length : 5
Different username and password: yes
Password aging : enabled
Expiration warning message : 15 (days)
Password age : 365 (days)
630
14.1.8.2 AAA Methods
Default N/A
History 3.1.0000
Example
switch (config) # aaa accounting changes default stop-only
tacacs+
631
14.1.8.2.2 aaa authentication login
aaa authentication login default <auth method> [<auth method> [<auth method> [<auth
method> [<auth method>]]]]
no aaa authentication login
Default local
History 3.1.0000
3.7.1102—Updated notes
Example
switch (config) # aaa authentication login default local
radius tacacs+ ldap
Notes The order in which the methods are specified is the order in which the authentication is
attempted. It is recommended that “local” is one of the methods selected.
Configures delay for a specific period of time after every authentication failure.
The no form of the command resets the fail-delay to its default value.
Default 0
632
Configuration Mode config
History 3.5.0200
Example
switch (config) # aaa authentication attempts fail-delay 1
Related Commands
Notes
Syntax Description downcase Does not convert all usernames to lowercase (for authentication
failure tracking purposes only).
Default N/A
History 3.5.0200
Example
switch (config) # aaa authentication attempts track enable
Related Commands
633
Notes • This is required for the lockout functionality described below, but can also be used
on its own for informational purposes.
• Disabling tracking does not clear any records of past authentication failures, or the
locks in the database. However, it does prevent any updates to this database from
being made: no new failures are recorded. It also disables lockout, preventing new
lockouts from being recorded and existing lockouts from being enforced.
Syntax Description enable Enables locking out of user accounts based on authentication failures.
This both suspends enforcement of any existing lockouts, and
prevents any new lockouts from being recorded. If lockouts are later
re-enabled, any lockouts that had been recorded previously resume
being enforced; but accounts which have passed the max-fail limit in
the meantime are NOT automatically locked at this time. They would
be permitted one more attempt, and then locked, because of how the
locking is done: lockouts are applied after an authentication failure, if
the user has surpassed the threshold at that time.
Lockouts only work if tracking is enabled. Enabling lockouts
automatically enables tracking. Disabling tracking automatically
disables lockouts.
634
unlock-time Enables the auto-unlock of an account after a specified number of
seconds if a user account is locked due to authentication failures,
counting from the last valid login attempt.
Unlike the “max-fail” setting, this does take effect immediately for all
accounts.
If both unlock-time and lock-time are set, the unlock-time must be
greater than the lock-time.
Careful with disabling the unlock-time, particularly if you have max-
fail set to something, and have not overridden the behavior for the
admin (i.e. they are subject to lockouts also). If the admin account
gets locked out, and there are no other administrators who can aid,
the user may be forced to boot single-user and use the
pam_tallybyname command-line utility to unlock your account
manually. Even if one is careful not to incur this many authentication
failures, it makes the system more subject to DOS attacks.
Default N/A
History 3.2.3000
Example
switch (config) # aaa authentication attempts lockout
enable
Related Commands
Notes
Overrides the global settings for tracking and lockouts for a type of account.
The no form of the command removes this override and lets the admin be handled
according to the global settings.
635
Syntax Description admin Overrides the global settings for tracking and lockouts for the admin
account. This applies only to the single account with the username
“admin”. It does not apply to any other users with administrative
privileges.
no-lockout Prevents the admin user from being locked out though authentication
failure history is still tracked (if tracking is enabled overall).
unknown Overrides the global settings for tracking and lockouts for unknown
accounts. The “unknown” class here contains the following categories:
hash-username Applies a hash function to the username and stores the hashed result in
lieu of the original
no-track Does not track authentication for such users (which of course also
implies no-lockout)
Default N/A
History 3.2.3000
Example
switch (config) # aaa authentication attempts class-override
admin no-lockout
Related Commands
Notes
636
Syntax Description all Applies function to all users
no-clear- Leaves the history of login failures but unlocks the account
history
no-unlock Leaves the account locked but clears the history of login failures
Default N/A
History 3.2.3000
Example
switch (config) # aaa authentication attempts reset user
admin all
Related Commands
Notes
637
Default N/A
History 3.2.3000
Example
switch (config) # aaa authentication attempts reset user
admin no-clear-history
Related Commands
Notes
Syntax Description username Specifies what local account the authenticated user will be logged on as
when a user is authenticated (via RADIUS or TACACS+ or LDAP)
and does not have a local account. If the username is local, this
mapping is ignored.
order Sets the user mapping behavior when authenticating users via RADIUS
<policy> or TACACS+ or LDAP to one of three choices. The order determines
how the remote user mapping behaves. If the authenticated username is
valid locally, no mapping is performed. The setting has the following
three possible behaviors:
• local-only—maps all remote users to the user specified by the
command “aaa authorization map default-user <user name>”. Any
vendor attributes received by an authentication server are ignored.
• remote-first—if a local-user mapping attribute is returned and it is
a valid local username, it maps the authenticated user to the local
user specified in the attribute. Otherwise, it uses the user specified
by the default-user command.
• remote-only—maps a remote authenticated user if the
authentication server sends a local-user mapping attribute. If the
attribute does not specify a valid local user, no further mapping is
tried.
638
fallback Sets the authenticating fallback behavior via RADIUS or TACACS+ or
LDAP. This option attempts to authenticate username through the next
authentication method listed in case of an error.
• server-err—performs fallback if an error occurs while connecting
to remote AAA server (e.g., server is down, not responding, and so
forth)
Default Default user—admin
Map order—remote-first
Order fallback—server-err
History 3.1.0000
3.7.1000—Added “fallback” parameter
3.7.1000—Updated syntax
Example
switch (config) # aaa authorization map default-user admin
Notes • If, for example, the user is locally defined to have admin permission, but in a remote
server such as RADIUS the user is authenticated as monitor and the order is remote-
first, then the user is given monitor permissions.
• The user must be careful when disabling AAA authorization map fallback server-err,
because if the remote server stops working then the user may lock themselves out.
Onyx
639
14.1.8.2.10 show aaa
show aaa
Default N/A
History 3.1.0000
3.7.0020—Example updated
Example
switch (config) # show aaa
AAA authorization:
Default User: admin
Map Order: remote-first
Fallback on server-err: yes
Authentication method(s):
local
Accounting method(s):
tacacs+
Notes
640
Syntax Description authentication Displays configuration and history of authentication failures.
attempts
status user Displays status of authentication failure tracking and lockouts for
specific user.
Default N/A
History 3.2.1000
3.5.0200—Updated example
Example
641
Related Commands
Notes
14.1.8.3 RADIUS
14.1.8.3.1 radius-server
Syntax Description secret Sets a secret key (shared hidden text string), known to the system and to
the RADIUS server.
History 3.1.0000
Example
switch (config) # radius-server retransmit 3
Notes Each RADIUS server can override those global parameters using the command “radius-
server host”.
642
14.1.8.3.2 radius-server enable
Enables RADIUS in VRF.
The no form of the command disables RADIUS in a specified VRF.
force Enables RADIUS in the specified VRF and sets all relevant RADIUS
option to default
History 3.9.2000
Example
Notes If VRF management exists, RADIUS will be enabled on VRF management. If VRF
management not does not exist, RADIUS will be enabled on VRF default.
radius-server host <IP address> [enable | auth-port <port> | key <secret> | prompt-key |
retransmit <retries> | timeout <seconds>| cipher <none | eap-peap> ]
no radius-server host <IP address> [auth-port | enable | cipher]
643
port RADIUS server UDP port number
History 3.1.0000
3.8.1000—Updated command description, syntax description & example
Example
switch (config) # radius-server host fe80::202:b3ff:fe1e:
8329
switch (config) # radius-server host 40.40.40.40
Notes • RADIUS servers are tried in the order they are configured
• If you do not specify a parameter for this configured RADIUS server, the
configuration will be taken from the global RADIUS server configuration. Refer to the
command “radius-server”.
644
14.1.8.3.4 show radius
show radius
Default N/A
History 3.1.0000
3.6.6000—Updated example
3.8.1000—Updated command description, syntax description & example
3.9.2000—Updated example , adding the "administratively" and "VRF name" fields
Example
switch (config) # show radius
RADIUS defaults:
administratively: enabled
VRF name: : mgmt
Key : ********
Timeout : 3
Retransmit : 1
RADIUS servers:
1.1.1.1:1812 :
Enabled : yes
Key : ********
Timeout : 3 (default)
Retransmit : 1 (default)
Cipher : none
40.40.40.40:1812:
Enabled : yes
Key : ********
Timeout : 3 (default)
Retransmit : 1 (default)
645
Notes
14.1.8.4 TACACS+
14.1.8.4.1 tacacs-server
Syntax Description secret Set a secret key (shared hidden text string), known to the system and to
the TACACS+ server.
History 3.1.0000
Example
switch (config) # tacacs-server retransmit 3
Notes Each TACACS+ server can override those global parameters using the command “tacacs-
server host”.
646
14.1.8.4.2 tacacs-server enable
Default TACACS is enabled by default
History 3.9.2000
Related Commands
Notes If VRF management exists, TACACS will be enabled on VRF management. If VRF
management not does not exist, TACACS will be enabled on VRF default.
tacacs-server host <IP address> {enable | auth-port <port> | auth-type <type> | key
<secret> | prompt-key | retransmit <retries> | timeout <seconds>}
no tacacs-server host <IP address> {enable | auth-port}
647
port TACACS+ server UDP port number.
• ASCII
• PAP (Password Authentication Protocol)
secret Sets a secret key (shared hidden text string), known to the system and
to the TACACS+ server.
prompt-key Prompts for key, rather than entering key on command line.
History 3.1.0000
Example
switch (config) # tacacs-server host 40.40.40.40
648
Notes • TACACS+ servers are tried in the order they are configured
• A PAP auth-type similar to an ASCII login, except that the username and password
arrive at the network access server in a PAP protocol packet instead of being typed in
by the user, so the user is not prompted
• If the user does not specify a parameter for this configured TACACS+ server, the
configuration will be taken from the global TACACS+ server configuration. Refer to
the command “tacacs-server”.
show tacacs
Default N/A
History 3.1.0000
3.6.6000—Updated example
3.9.2000—Updated example , adding the "administratively" and "VRF name" fields
Example
switch (config) # show tacacs
TACACS+ defaults:
administratively: enabled
VRF name: : mgmt
Key : ********
Timeout : 3
Retransmit : 1
TACACS+ servers:
1.1.1.1:49:
Enabled : yes
Auth Type : pap
Key : ********
Timeout : 3 (default)
Retransmit: 1 (default)
649
Notes
14.1.8.5 LDAP
Enables LDAP in VRF.
The no form of the command disables LDAP in a specified VRF.
Syntax Description force Enables LDAP in the specified VRF while setting all relevant LDAP
options to default.
History 3.9.2000
Related Commands
Notes If VRF mgmt exists, LDAP will be enabled on VRF mgmt. If there is no VRF mgmt,
LDAP will be enabled on the "default" VRF.
Sets the base distinguished name (location) of the user information in the schema of the
LDAP server.
The no form of the command resets the attribute to its default values.
650
Syntax Description string A case-sensitive string that specifies the location in the LDAP hierarchy
where the server should begin searching when it receives an
authorization request.
For example: “ou=users,dc=example,dc=com”, with no spaces.
Where:
• ou—Organizational unit
• dc—Domain component
• cn—Common name
• sn—Surname
Default ou=users,dc=example,dc=com
History 3.1.0000
Notes
Gives the distinguished name or password to bind to on the LDAP server. This can be left
empty for anonymous login (the default).
The no form of the command resets the attribute to its default values.
Syntax Description string A case-sensitive string that specifies distinguished name or password to
bind to on the LDAP server.
Default “”
651
History 3.1.0000
Notes For anonymous login, bind-dn and bind-password should be empty strings “”.
Sets the distinguished name or attribute name of a group on the LDAP server.
The no form of the command resets the attribute to its default values.
History 3.1.0000
652
Related Commands show ldap
Notes • The user’s distinguished name must be listed as one of the values of this attribute, or
the user will not be authorized to log in
• After login authentication, if the group-dn is set, a user must be a member of this
group or the user will not be authorized to log in. If the group is not set (“”—the
default) no authorization checks are done.
History 3.1.0000
Notes • The system will select the LDAP host to try according to its order
• New servers are by default added at the end of the list of servers
653
14.1.8.5.6 ldap hostname-check enable
History 3.6.8008
Notes
Sets the attribute name which contains the login name of the user.
The no form of the command resets this attribute to its default.
uid LDAP login name is taken from the user login username.
Default sAMAccountName
654
Configuration Mode config
History 3.1.0000
Notes
Sets the TCP port on the LDAP server to connect to for authentication.
The no form of the command resets this attribute to its default value.
Default 389
History 3.1.0000
Notes
655
14.1.8.5.9 ldap referrals
ldap referrals
no ldap referrals
History 3.1.0000
Notes Referral is the process by which an LDAP server, instead of returning a result, will return a
referral (a reference) to another LDAP server which may contain further information.
Specifies the extent of the search in the LDAP hierarchy that the server should make when
it receives an authorization request.
The no form of the command resets the attribute to its default value.
Default subtree
656
History 3.1.0000
Notes
ldap ssl {ca-list <options> | cert-verify | ciphers {all | TLS1.2} | crl-check {enable | file
fetch all [vrf <vrf-name>] <path>} | mode <mode> | port <port-number>}
no ldap ssl {cert-verify | ciphers | crl-check enable | mode | port}
Syntax Description options This command specifies the list of supplemental certificates of authority
(CAs) from the certificate configuration database that is to be used by
LDAP for authentication of servers when in TLS or SSL mode.
The options are:
• default-ca-list—uses default supplemental CA certificate list
• none—no supplemental list, uses the built-in one only
CA certificates are ignored if “ldap ssl mode” is not configured as either
“tls” or “ssl”, or if “no ldap ssl cert-verify” is configured.
The default-ca-list is empty in the factory default configuration. Use the
command: “crypto certificate ca-list default-ca-list name” to add trusted
certificates to that list.
The “default-ca-list” option requires LDAP to consult the system’s
configured global default CA-list for supplemental certificates.
657
crl-check file Fetches CRL from remote server. CRL must be a valid PEM file unless
fetch a proper message shown. Supported formats: SCP, HTTP, HTTPS, FTP,
and FTPS.
mode Sets the security mode for connections to the LDAP server.
• none—requests no encryption for the LDAP connection
• ssl—the SSL-port configuration is used, an SSL connection is made
before LDAP requests are sent (LDAP over SSL)
• start-tls—the normal LDAP port is used, an LDAP connection is
initiated, and then TLS is started on this existing connection
port-number Sets the port on the LDAP server to connect to for authentication when
the SSL security mode is enabled (LDAP over SSL)
Default cert-verify—enabled
mode—none (LDAP SSL is not activated)
port-number—636
ciphers—all
History 3.1.0000
3.4.0000 Added “ssl ciphers” parameter and Updated example
3.6.8008 Added the parameter “crl-check”
100.0%
[###########################################################
##########]
658
Notes • If available, the TLS mode is recommended, as it is standardized, and may also be of
higher security
• The port number is used only for SSL mode. If the security mode selected is TLS, the
LDAP port number is used.
Sets a global communication timeout in seconds for all LDAP servers to specify the extent
of the search in the LDAP hierarchy that the server should make when it receives an
authorization request.
The no form of the command resets the attribute to its default value.
Syntax Description timeout-bind Sets the global LDAP bind timeout for all LDAP servers.
timeout- Sets the global LDAP search timeout for all LDAP servers.
search
Default 5 seconds
History 3.1.0000
Notes
659
14.1.8.5.13 ldap version
Default 3
History 3.1.0000
Notes
show ldap
Default N/A
History 3.1.0000
660
3.4.0000 Updated example
Notes
show ldap crl
Default N/A
History 3.6.8008
661
Example switch (config) # show ldap crl
-----BEGIN CERTIFICATE-----
MIIDVzCSd......
-----END CERTIFICATE-----
Notes
Default Disabled
Configuration config
Mode
History 3.5.0200
662
Related Commands user <username> password <password>
ssh server min-version
ssh server security strict
snmp-server user
no neighbor <ip-address> password
ntp server disable
ntp server keyID
router bgp neighbor password
router bgp peer-group password
Notes Before enabling secure mode, the command performs the following configuration checks:
show system secure-mode
Default N/A
History 3.4.2300
663
Notes • “Secure mode configuration” describes the user configuration
• “Secure mode enabled” describes the system state
The 802.1x (dot1x) standard describes a way to authenticate hosts (or supplicants) and to allow connection only to a list
of allowed hosts pre-configured on an authentication server. The authentication is performed by the switch
(authenticator) which negotiates the authentication with a RADIUS server (authentication server). This allows to block
traffic from non-authenticated sources.
The 802.1x protocol defines the following roles:
• Supplicant – the host. It provides the authentication credentials to the authenticator and awaits approval.
• Authenticator – the device that connects the supplicant to the network, and checks the authentication with the
authentication server. The authenticator is also in charge of blocking and isolating of new client till authenticated
and allowing communication once the client has passed the authentication. The switch acts as an authenticator.
• Authentication server – a RADIUS server which can authenticate the user.
The 802.1x is available only on access physical ports. It is not available on LAG and MLAG ports.
Management interfaces cannot be configured as 802.1x port access entity (PAE) authenticators.
An exception to this is multicast and broadcast traffic which do get transmitted over the interface once
authenticated and are exposed to an unauthorized supplicant if it exists.
• Multi-host mode – allows connection of multiple hosts over a single port. Only the first supplicant is
authenticated. Subsequent hosts have network access without the need to authenticate.
664
switch (config) # protocol dot1x
switch (config interface ethernet 1/1) # show dot1x interfaces ethernet 1/1
Eth1/1
PAE Status: Enabled
Configured host mode: Multi-host
Configured port-control: Auto
Authentication status: Unauthorized
Re-Authentication: Disabled
Re-Authentication period (sec): -
Tx wait period (sec): 30
Quiet period (sec): 60
Max request retry: 2
Last EAPOL RX source MAC: 00:00:00:00:00:00
665
14.1.9.3 Dot1x Commands
protocol dot1x
no protocol dot1x
Default Disabled
History 3.4.2008
Related Commands
Notes
dot1x clear-statistics
Default N/A
History 3.4.2008
Related Commands
666
Notes
Default Disabled
History 3.4.2008
Related Commands
Notes
Default single-host
667
Configuration Mode config interface ethernet
History 3.4.2008
3.4.2300 Added “single-host” option
Related Commands
Notes
Syntax Description auto The authenticator uses PAE authentication services to allow or block
the port traffic
Default Force-authorized
History 3.4.2008
668
Related Commands
Notes
dot1x radius-server host <IP address> [enable | auth-port <port> | key <password> |
prompt-key | retransmit <retries> | timeout <seconds>]
no dot1x radius-server host <IP address> enable
Syntax Description auth-port Sets 802.1x RADIUS port to use with this server
Range: 1-65535
History 3.4.2008
669
Related Commands
Notes • The no form of the various parameters resets them to their default values as
indicated in the Default section above
• It is possible to configure up to 5 RADIUS servers
• It is possible to configure only 1 authentication port per RADIUS server IP
dot1x reauthenticate
no dot1x reauthenticate
Default Disabled
History 3.4.2008
Related Commands
Notes
dot1x system-auth-control
no dot1x system-auth-control
670
Default Disabled
History 3.4.2008
Related Commands
Notes
History 3.4.2008
Related Commands
Notes
671
14.1.9.3.10 dot1x timeout quiet-period
Configures the number of seconds that the authenticator remains quiet following a failed
authentication exchange with the supplicant.
The no form of the command resets the parameter to its default.
Default 60 seconds
History 3.4.2008
Related Commands
Notes
Configures the maximum number of seconds that the authenticator waits for supplicant
response of EAP-request/identify frame before retransmitting the request.
The no form of the command resets the parameter to its default.
Default 30 seconds
672
History 3.4.2008
Related Commands
Notes
Configures the maximum amount of retries for the authenticator to communicate with the
supplicant over EAP.
The no form of the command resets the parameter to its default.
Default 2
History 3.4.2008
Related Commands
Notes
show dot1x
673
Syntax Description N/A
Default N/A
History 3.4.2008
Example
---------------------------------------------------------------------
Port Pae Host-mode Port-control Status
---------------------------------------------------------------------
Eth1/1 Enabled multi-host auto unauthorized
Eth1/2 Disabled multi-host force-authorized down
Eth1/3 Disabled multi-host force-authorized down
Eth1/4 Disabled multi-host force-authorized down
Eth1/5 Disabled multi-host force-authorized down
Eth1/6 Disabled multi-host force-authorized down
Eth1/7 Disabled multi-host force-authorized down
Eth1/8 Disabled multi-host force-authorized down
Eth1/9 Disabled multi-host force-authorized down
...
Related Commands
Notes
Default N/A
674
History 3.4.2008
Eth1/2
PAE Status: Enabled
Configured host mode: Multi-host
Configured port-control: Auto
Authentication status: Unauthorized
Re-Authentication: Enabled
Re-Authentication period (sec): 3600
Tx wait period (sec): 30
Quiet period (sec): 60
Max request retry: 2
Last EAPOL RX source MAC: 00:00:00:00:00:00
Related Commands
Notes
Default N/A
History 3.4.2008
Example
675
switch (config)# show dot1x interfaces ethernet 1/2 statistics
Eth1/2
EAPOL frames received: 3
EAPOL frames transmitted: 2
EAPOL Start frames received: 1
EAPOL Logoff frames received: 0
EAP Response-ID frames received: 2
EAP Response frames received: 0
EAP Request-ID frames transmitted: 2
EAP Request frames transmitted: 0
Invalid EAPOL frames received: 0
EAP length error frames received: 0
Last EAPOL frame version: 1
Last EAPOL frame source: 00:1A:A0:02:E9:8E
Related Commands
Notes
Default N/A
History 3.4.2008
Related Commands
676
Notes
***IMPORTANT***
Encryption and decryption perform “reset factory keep-config” on the switch system once configured.
This means that sysdumps, logs, and images are deleted.
The key may be saved locally as well by using the parameter “local” instead of “usb” but that
configuration is less secure.
Once encryption is enabled, reverting back to an older version while encrypted is not possible. The
command “no crypto encrypt-data” must be run before attempting to downgrade to an older OS
version.
677
If encryption is enabled, upgrading to a new OS version maintains the encryption configuration.
• local—stores the key locally
• usb—stores the key on a USB device
Default N/A
History 3.6.1002
Example
678
Notes • It is recommended to store the encryption password on a USB device rather than
locally
• Enabling encryption may slightly slow system performance
• If the key is stored on the USB, it must be plugged into the switch in order for the
switch to boot. After the switch has booted, the USB key is no longer required and,
for security purposes, it is recommended to remove it after running “usb eject”. The
USB key may be needed again if the switch is rebooted or if the switch needs to be
decrypted.
crypto ipsec ike {clear sa [peer {any | <IPv4 or IPv6 address>} local <IPv4 or IPv6
address>] | restart}
peer Clears security associations for the specified IKE peer (remote peers
are affected)
• all—clears security associations for all IKE peerings with a
specific local address (remote peers are affected)
• IPv4 or IPv6 address—clears security associations for specific
IKE peering with a specific local address (remote peers are
affected)
IPv4 or IPv6 Clears security associations for the specified IKE peering (remote peer
address is affected)
local Clear security associations for the specified/all IKE peering (remote
peer is affected)
restart Restarts the IKE (ISAKMP) daemon (clears all IKE state, peers may
be affected)
Default N/A
History 3.2.3000
679
Example switch (config)# crypto ipsec ike restart
Notes
crypto ipsec peer <IPv4 or IPv6 address> local <IPv4 or IPv6 address> {enable | keying
{ike [auth {hmac-md5 | hmac-sha1 | hmac-sha256 | null} | dh-group | disable | encrypt |
exchange-mode | lifetime | local | mode | peer-identity | pfs-group | preshared-key |
prompt-preshared-key | transform-set] | manual [auth | disable | encrypt | local-spi | mode |
remote-spi]}}
• auth—configures the authentication algorithm for IPSec peering
• dh-group—configures the phase1 Diffie-Hellman group proposed
for secure IKE key exchange
• disable—configures this IPSec peering administratively disabled
• encrypt—configures the encryption algorithm for IPSec peering
• exchange-mode—configures the IKE key exchange mode to
propose for peering
• lifetime—configures the SA lifetime to propose for this IPSec
peering
• local-identity—configures the ISAKMP payload identification
value to send as local endpoint's identity
• mode—configures the peering mode for this IPSec peering
• peer-identity—configures the identification value to match
against the peer's ISAKMP payload identification
• pfs-group—configures the phase2 PFS (Perfect Forwarding
Secrecy) group to propose for Diffie-Hellman exchange for this
IPSec peering
• preshared-key—configures the IKE pre-shared key for the IPSec
peering
• prompt-preshared-key—prompts for the pre-shared key, rather
than entering it on the command line
• transform-set—configures transform proposal parameters
680
keying Configures key management for this IPSec peering.
• auth—configures the authentication algorithm for this IPSec
peering
• disable—configures this IPSec peering administratively disabled
• encrypt—configures the encryption algorithm for this IPSec
peering
• local-spi—configures the local SPI for this manual IPSec peering
• mode—configures the peering mode for this IPSec peering
• remote-spi—configures the remote SPI for this manual IPSec
peering
Default N/A
History 3.2.3000
Notes
Default N/A
681
History 3.2.3000
Notes • Two certificates with the same subject and issuer fields cannot both be placed onto
the CA list
• The no form of the command does not delete the certificate from the certificate
database
• Unless specified otherwise, applications that use CA certificates will still consult the
well-known certificate bundle before looking at the default-ca-list
Designates the named certificate as the global default certificate role for authentication of
this system to clients.
The no form of the command reverts the default-cert name to “system-self-signed” (the
“cert-name” value is optional and ignored).
Default N/A
History 3.2.3000
Notes • A certificate must already be defined before it can be configured in the default-cert
role
• If the named default-cert is deleted from the database, the default-cert automatically
becomes reconfigured to the factory default, the “system-self-signed” certificate
682
14.2.2.6 crypto certificate generation
683
crypto certificate generation default {country-code | days-valid > | ca-valid <true/false> |
email-addr | hash-algorithm {sha1 | sha256} | key-size-bits | locality | org-unit |
organization | state-or-prov}
Syntax Description country-code Configures the default certificate value for country code with a two-
alphanumeric-character code or -- for none.
key-size-bits Configures the default certificate value for private key size (private
key length in bits—at least 1024, but 2048 is strongly recommended)
organization Configures the default certificate value for the organization name
ca-valid {true | Configures the default certificate CA Basic Constraints flag set to
false} TRUE/FALSE
History 3.2.1000
3.3.4350 Added “hash-algorithm” parameter
684
3.6.4000 Added “days-valid” parameter
Notes
685
generate self- Generates certificates. This option has the following parameters
signed which may be entered sequentially in any order:
• comment—specifies a certificate comment (free string)
• common-name—specifies the common name of the issuer and
subject (e.g. a domain name)
• country-code—specifies the country codwo-alphanumeric-
character country code, or “--” for none)
• days-valid—specifies the number of days the certificate is valid
• email-addr—specifies the email address
• hash-algorithm—specifies the hashing function used for
signature algorithm.
Default value is SHA256.
• key-size-bits—specifies the size of the private key in bits
(private key length in bits - at least 1024 but 2048 is strongly
recommended)
• locality—specifies the locality name
• org-unit—specifies the organizational unit name
• organization—specifies the organization name
• serial-num—specifies the serial number for the certificate (a
lower-case hexadecimal serial number prefixed with “0x”)
• state-or-prov—specifies the state or province name
• ca-valid—Specifies certificate CA Basic Constraints flag set to
TRUE/FALSE
Default N/A
History 3.2.3000
3.3.4402 Added “hash-algorithm” parameter
686
3.6.4000 Added “hash-algorithm” parameter
Notes
Syntax Description days-valid Specifies the number of days the certificate is valid
Default N/A
History 3.2.1000
Notes
687
14.2.2.9 show crypto certificate
Syntax Description ca-list Displays the list of supplemental certificates configured for the
global default system CA certificate role
Default N/A
History 3.2.1000
Example
688
switch (config) # show crypto certificate
Validity:
Starts: 2012/12/02 13:45:05
Expires: 2013/12/02 13:45:05
Subject:
Common Name: IBM-DEV-Bay4
Country: IS
State or Province:
Locality:
Organization:
Organizational Unit:
E-mail Address:
Issuer:
Common Name: IBM-DEV-Bay4
Country: IS
State or Province:
Locality:
Organization:
Organizational Unit:
E-mail Address:
X509 Extensions:
Basic Constraints:
CA: TRUE
Related Commands
Notes
show encrypt-data
Default N/A
689
Configuration Mode config
History 3.6.1002
Related Commands
Notes
Default N/A
History 3.2.1000
690
Example switch (config)# show crypto ipsec
IPSec Summary
-------------
Crypto IKE is using pluto (Openswan) daemon.
Daemon process state is stopped.
Related Commands
Notes
691
15 Quality of Service (QoS)
non-IP/MPLS Untagged Port Default Port Default Port Default Port Default
Default switch-priority is configured as trust L2.
692
15.1.3 Default QoS Configuration
PCP to switch-priority 0 0
PCP to switch-priority 1 1
PCP to switch-priority 2 2
PCP to switch-priority 3 3
PCP to switch-priority 4 4
PCP to switch-priority 5 5
PCP to switch-priority 6 6
PCP to switch-priority 7 7
693
Parameter Range Configuration
PTP Interface VLAN: Switch Priority 7
694
The configuration for preserving the values or rewriting them is set per ingress port. The configuration of the new
values is set per egress port and is based on the mapping from the switch-priority.
In addition, the packets that pass the router module in the switch can be configured to change the “rewrite enable”
configuration as well as the switch-priority.
695
15.3.1 Traffic Class
The switch-priority of the packet assigns it to a specific traffic class (TClass). The TClass of the packet determines the
packet path in the queuing structure. There are 8 TCs supported by the system.
Switch-priority to TC 0 0
Switch-priority to TC 1 1
Switch-priority to TC 2 2
Switch-priority to TC 3 3
Switch-priority to TC 4 4
Switch-priority to TC 5 5
Switch-priority to TC 6 6
Switch-priority to TC 7 7
696
15.4 RED and ECN
Random early detection (RED) is a mechanism that randomly drops packets before the switch buffer fills up in case of
congestion. Explicit congestion notification (ECN) is used for congestion control protocols (TCP and RoCE CC –
DCQCN) to handle congestion before packets are dropped. RED and ECN can be configured separately or concurrently
per traffic class.
Relative RED/ECN is supported on TC queues. This allows the thresholds of the drop/mark actions to behave relatively
to the dynamic thresholds configured for the shared buffer.
RED/ECN drop profiles are defined according to 2 parameters as shown in the following figure:
• Minimum – a threshold that defines the average queue length below which the packets are not dropped/marked
• Maximum – a threshold that defines the average queue length above which the packets are always dropped/
marked
It is possible to configure the minimum and maximum thresholds to have the same value which would represent a step
function from “drop none” to “drop all”.
RED/ECN is only supported for unicast traffic classes.
697
• Shared Buffers
• Storm Control
• Head-of-Queue Lifetime Limit
• Store-and-Forward
• QoS Classification
• vlan default priority
• vlan default dei
• qos trust
• qos default switch-priority
• qos map pcp dei
• qos map dscp
• show interfaces ethernet counters pfc prio
• show qos
• show qos interface ethernet
• show qos interface mlag-port-channel
• show qos interface port-channel
• show qos interface l2-mapping
• show qos interface l3-mapping
• show qos interface rewrite-mapping
• show qos interface tc-mapping
• show qos mapping ingress interface egress interface
• QoS Rewrite
• qos rewrite pcp
• qos rewrite dscp
• qos rewrite map switch-priority pcp dei
• qos rewrite map switch-priority dscp
• qos ip rewrite pcp
• show qos ip rewrite
• Queuing and Scheduling (ETS)
• bind switch-priority
• bandwidth guaranteed
• bandwidth shape
• show dcb ets
• RED & ECN
• traffic-class congestion-control
• show interfaces ethernet congestion-control
698
Syntax Description priority Range: 0-7
Default 0
History 3.6.1002
Related Commands
Notes
Default 0
History 3.6.1002
Related Commands
699
Notes
Default L2
History 3.6.1002
Related Commands
Notes Please see the table presenting packet classification rules for more information
Configures default switch-priority for the interface when “port” trust mode is active, or
for non-IP and untagged packets in other trust modes.
The no form of the command resets the value to its default.
Default 0
700
Configuration Mode config interface ethernet
config interface port-channel
config interface mlag-port-channel
History 3.6.1002
Notes
Configures interface PCP, DEI to switch-priority mapping for IP/MPLS and non-IP/
MPLS tagged packets in “L2” trust mode and for non-IP/MPLS tagged packets in “both”
trust mode.
The no form of the command resets the value to its default.
History 3.6.1002
701
Example switch (config interface ethernet 1/1) # qos map pcp 5 dei 1
to switch-priority 7
Notes
Configures interface DSCP to switch-priority mapping in “L3” or “both” trust mode.
The no form of the command resets the value to its default.
16-23 → 2
24-31 → 3
32-39 → 4
40-47 → 5
48-55 → 6
56-63 → 7
History 3.6.1002
702
Related Commands qos trust
Notes
show interfaces ethernet [<slot/port> | <slot/port>-<slot/port>] counters pfc prio
<priority>
Displays priority flow control counters for the specified interface and priority.
Default N/A
History 3.6.3004
Eth1/1:
PFC 1:
Rx:
0 pause packets
0 pause duration
Tx:
0 pause packets
0 pause duration
Eth1/2:
PFC 1:
Rx:
0 pause packets
0 pause duration
Tx:
0 pause packets
0 pause duration
Related Commands
703
Notes From version 3.9.1000 and up, the "slot/port" attribute is optional. If nothing is selected,
information for all ports will be displayed
show qos
Default N/A
History 3.6.1002
Example
704
switch (config) # show qos
Eth1/1:
Trust mode : L2
Default switch-priority: 0
Default PCP : 0
Default DEI : 0
PCP,DEI rewrite : disabled
IP PCP;DEI rewrite : enable
DSCP rewrite : disabled
-----------------------------------------
switch-priority PCP(DEI) DSCP TC
-----------------------------------------
0 0(0) 0 0
1 1(0) 8 1
2 2(0) 16 2
3 3(0) 24 3
4 4(0) 32 4
5 5(0) 40 5
6 6(0) 48 6
7 7(0) 56 7
...
Related Commands
Notes
705
Syntax Description N/A
Default N/A
History 3.6.5000
Example
706
switch (config)# show qos interface ethernet 1/1
Eth1/1:
Trust mode : L2
Default switch-priority: 0
Default PCP : 0
Default DEI : 0
PCP,DEI rewrite : disabled
IP PCP;DEI rewrite : enable
DSCP rewrite : disabled
-----------------------------------------
switch-priority PCP(DEI) DSCP TC
-----------------------------------------
0 0(0) 0 0
1 1(0) 8 1
2 2(0) 16 2
3 3(0) 24 3
4 4(0) 32 4
5 5(0) 40 5
6 6(0) 48 6
7 7(0) 56 7
Related Commands
Notes
show qos interface mlag-port-channel <port-id>
707
Syntax Description N/A
Default N/A
History 3.6.5000
Example
708
switch (config)# show qos interface mlag-port-channel 1
Mpo1
Trust mode: L2
Default switch-priority: 0
Default PCP: 0
Default DEI: 0
PCP,DEI rewrite: disabled
IP PCP;DEI rewrite: enable
DSCP rewrite: disabled
Related Commands
Notes
709
Syntax Description N/A
Default N/A
History 3.6.5000
Example
710
switch (config)# show qos interface port-channel 1
Po1:
Trust mode : L2
Default switch-priority: 0
Default PCP : 0
Default DEI : 0
PCP,DEI rewrite : disabled
IP PCP;DEI rewrite : enable
DSCP rewrite : disabled
-----------------------------------------
switch-priority PCP(DEI) DSCP TC
-----------------------------------------
0 0(0) 0 0
1 1(0) 8 1
2 2(0) 16 2
3 3(0) 24 3
4 4(0) 32 4
5 5(0) 40 5
6 6(0) 48 6
7 7(0) 56 7
Related Commands
Notes
711
Syntax Description type Ethernet, port-channel, or mlag-port-channel
Default N/A
History 3.6.5000
Related Commands
Notes
Default N/A
History 3.6.5000
712
Example switch (config)# show qos interface ethernet 1/9 l3-mapping
Related Commands
Notes
Displays the rewrite mapping of switch priority to PCP, DEI and DSCP table.
Default N/A
History 3.6.5000
713
Example switch (config)# show qos interface ethernet 1/1 rewrite-
mapping
Related Commands
Notes
Default N/A
History 3.6.5000
714
Example switch (config)# show qos interface ethernet 1/9 tc-mapping
Switch Priority to TC mapping:
-----------------------
Switch Priority TC
-----------------------
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
Related Commands
Notes
show qos mapping ingress interface <type> <port-id> egress interface <type> <port-id>
Default N/A
History 3.6.5000
Example
715
switch (config)# show qos mapping ingress interface ethernet 1/8 egress
interface ethernet 1/9
-----------------------------------------
switch-priority PCP(DEI) DSCP TC
-----------------------------------------
0 0(0) 0 0
1 1(0) 8 1
2 2(0) 16 2
3 3(0) 24 3
4 4(0) 32 4
5 5(0) 40 5
6 6(0) 48 6
7 7(0) 56 7
Related Commands
Notes
716
15.6.2 QoS Rewrite
Default Disabled
History 3.6.1002
Related Commands
Notes
Default Disabled
717
Configuration Mode config interface ethernet
config interface port-channel
config interface mlag-port-channel
History 3.6.1002
Related Commands
Notes
dei Value: 0
718
History 3.6.1002
Related Commands
Notes
History 3.6.1002
719
Related Commands
Notes
Enables or preserves the rewrite of PCP, DEI of routed packets in egress interface.
The no form of the command resets the value to their defaults.
enable PCP,DEI are rewritten based on the mapping configured on the egress
port
Default Enable
History 3.6.1002
Related Commands
Notes
Displays configuration of the rewrite of PCP, DEI of routed packets in egress interface
720
Default N/A
History 3.6.6000
Notes
• When run in the interface configuration mode: Resets to default the binding of all
switch-priorities from all traffic classes
• When run in the interface’s traffic class: Negates the binding of a specific switch-
priority from a specific traffic class
721
Configuration Mode config interface ethernet
config interface ethernet traffic-class
config interface port-channel
config interface port-channel traffic-class
config interface mlag-port-channel
config interface mlag-port-channel traffic class
History 3.6.1002
Related Commands
Default 0
History 3.6.1002
Related Commands
722
Notes • Context is egress interface traffic class
• Bandwidth guaranteed rate determines the bandwidth guaranteed by the switch for
outbound traffic assigned to this traffic class on this interface
• Bandwidth is in granularity of 0.2G
History 3.6.1002
Related Commands
723
Syntax Description N/A
Default N/A
History 3.6.1002
Flags:
S.Mode: Scheduling Mode [Strict/WRR]
D: -
W: Weight
Bw.Sh: Bandwidth Shaper
Bw.Gr: Bandwidth Guaranteed
Related Commands
Notes
724
15.6.4 RED & ECN
both Enables both RED and ECN marking for traffic class queue.
Default Disabled
History 3.5.1000
725
Example
2100:
switch (config) # interface ethernet 1/4 traffic-class 3 congestion-control
ecn minimum-absolute 12 maximum-absolute ?
12 - 12111 KBs value
3700:
switch (config) # interface ethernet 1/1 traffic-class 4 congestion-control
ecn minimum-absolute ?
3 - 30703 KBs value
2700:
switch (config) # interface ethernet 1/1 traffic-class 3 congestion-control
ecn minimum-absolute ?
3 - 10863 KBs value
2410:
switch (config) # interface ethernet 1/1 traffic-class 1 congestion-control
ecn minimum-absolute ?
3 - 8991
Related Commands
Notes
Default N/A
726
Configuration Mode Any command mode
History 3.5.1000
Related Commands
Notes
727
Priority Flow Control (PFC) provides an enhancement to the existing pause mechanism in Ethernet. The current
Ethernet pause option stops all traffic on a link. PFC creates eight separate virtual links on the physical link and allows
any of these links to be paused and restarted independently, enabling the network to create a no-drop class of service for
an individual virtual link.
PFC offers the following features:
• Provides per-priority enabling or disabling of flow control
• Transmits PFC-PAUSE frames when the receive threshold for a particular traffic class is reached
• Provides the management capability for an administrator to configure the flow control properties on each port of
the switch
• Keeps flow control disabled for all priorities on all ports by default
• Allows an administrator to enable or disable flow control per port and per priority level
• Supports flow control only on physical ports, not on logical interfaces such as tunnels or interfaces defined by
sharing a physical port in multiple virtual switch contexts
• Uses the configured threshold values to set up the queue buffer spaces accordingly in the data-path
• Provides hardware abstraction layer call-outs for the following:
• Enabling or disabling of flow control on each port for each priority
• Configuring the queue depth for each priority on each port
• Provides trace logs for execution upon error conditions and for any event notifications from the hardware or
data-path. These trace logs are a useful aid in troubleshooting.
• Allows the administrator to configure the minimum and maximum threshold values for flow control. These
configurations are applied globally on all ports and priorities.
Priority Based Flow Control (PFC) provides an enhancement to the existing pause flow control mechanism as described
in 802.1x.
To enable PFC globally,
2. Choose the priority you want to enable.
728
switch (config) # dcb priority-flow-control 5 enable
When working with lossless traffic, the receiving side sends a pause frame (Xoff) to the transmitting side before the
buffer is filled. When the buffer empties, the receiving side sends an un-pause frame (Xon) to the transmitting side.
When working with global flow control mode only, a single PG shall be used and Xoff and Xon shall be set on
this PG. When working with priority flow control, Xoff and Xon shall be set on each lossless PG.
729
15.7.2 PFC Watchdog
Lossless networks with PFC enabled provide strong packet delivery guarantees. However, lossless networks introduce a
new fault scenario where a queue of an end-port (e.g. the port of a host connected to the network) may not be able to
receive any traffic from the network and keeps sending pause frames towards the switch. Since lossless switch paths do
not drop packets but decline receiving more packets when their buffers fill up, if the end-port queue is stuck for a long
time, the buffers fill up not only for the target switch, but also on all switches with problematic port queues in the traffic
forwarding path. This leads to endless PFC pause frames, also called a PFC storm, being observed on all switch ports
along the path to the traffic source.
PFC watchdog prevents congestion from spreading in such a case. When switches detect this situation on any TC queue,
all the packets in the queue are flushed and new packets destined to the same queue are dropped as well until PFC
storming is relieved.
For lossless networks with global flow control configured, we will face the same issue of global pause storm. To resolve
this, global-flow-control-watchdog mode is supported.
Enables PFC globally on the switch. It is also possible to assign specific interface behavior
in dcb priority-flow-control mode.
The disable form of the command globally disables PFC on the switch when RoCE mode
is set to lossless/semi-lossless.
The no form of the command sets global PFC to the default value. See “Default” section
below.
History 3.1.0000
730
3.9.0500 Updated the description of the "disable" form of the command and
added a note
Notes • This command asks the user to approve traffic loss because some interfaces with DCB
mode activated might get shut down.
• The disable command is valid only for roce lossless/semi-lossless modes. For
explicitly disabling PFC on other scenarios, please set the interface PFC mode to 'off'
for all required ports.
History 3.1.0000
731
3.9.0500 Added note
Notes When RoCE mode is set to lossless/semi-lossless, the no form of the command is not
applicable. For explicitly disabling PFC, set the interface PFC mode to 'off' for all required
ports.
Syntax Description force Configures the PFC admin mode as on or auto with no confirmation
needed if the port is admin enabled
Default auto – PFC mode is established by traffic pool configuration (not a directly configurable
mode)
History 3.1.0000
3.6.6000 Added “force” parameter
3.6.6102 Added “mode” parameter
732
3.6.7100 Updated “mode” parameter description
Notes • For the “force” parameter, the no form of the command disables priority-flow-control
without the preceding confirmation prompt
• For mode value “auto”, if a lossless traffic pool is configured, PFC is enabled for this
port. Otherwise, PFC is disabled.
15.7.3.4 pfc-wd
pfc-wd
no pfc-wd
Default Disabled
History 3.6.6000
Notes When a user enables both "flowcontrol receive on" and "pfc-wd" on specific port,
global-flow-control-watchdog
mode is activated. If only "pfc-wd" is enabled, then the PFC-watchdog mode is
activated.
733
15.7.3.5 show dcb priority-flow-control
Default N/A
History 3.1.0000
PFC enabled
Priority Enabled List : 0
Priority Disabled List : 1 2 3 4 5 6 7
TC Lossless
--- ----------
0 N
1 Y
2 Y
3 N
Related Commands
Notes
734
15.7.3.6 show dcb priority-flow-control interface mlag-port-channel
Displays DCB priority flow control configuration and status for MPO interfaces.
Default N/A
History 3.1.0000
PFC: disabled
Priority Enabled List:
Priority Disabled List: 0 1 2 3 4 5 6 7
Related Commands
Notes
735
Syntax Description type Interface type:
• ethernet
• port-channel
• mlag-port-channel
id Interface ID
Default N/A
History 3.6.6000
switch (config) #
Notes When PFC-watchdog mode is activated, display "per-priority" in "PFC-WD mode".
While global flow control watchdog activated, display "global". Otherwise, display "n/a".
736
15.8 Shared Buffers
All successfully received packets by a switch are stored on internal memory from the time they are received until the
time they are transmitted. The packet buffer is fully shared between all physical ports and is hence called a shared
buffer. Buffer configuration is applied in order to provide lossless services and to ensure fairness between the ports and
priorities.
The buffer mechanism allows defining reserved memory allocation and limiting the usage of memory based on
incoming/outgoing ports and priority of the packet. In addition, the buffer can be divided into static pools, each for a
specific set of priorities. Buffer configuration mechanism allows fair enforcement from both ingress and egress sides.
The standard configuration mode allows a simple and concise configuration manner by hiding direct buffer access from
user, and collecting all the required configuration settings into “traffic pools”. Users that wish to gain full control of
entire buffers set can do so by enabling advanced buffer configuration.
15.8.2.1 Priority-flow-control
Enabling lossless traffic flow requires relevant switch-priority (see Packet Classification) to be mapped to a traffic pool
type “Lossless”. This could be applied through one of the following methods:
• Create a new custom lossless traffic pool, and map the switch-priority to the newly created traffic pool. In this
case, PFC configuration is automatic. For example:
• Enabling DCB PFC over the said switch-priority along with enabling DCB PFC globally. This will result in
mapping of the priority to the lossless-default traffic pool which is reserved merely for this purpose. In addition
it is required to enable DCB PFC for the relevant interfaces as well.
737
When setting lossless traffic configuration, it is strongly recommended to stick with one of the upper modes rather than
a combination of them.
738
• MC.SP – multicast traffic which is classified per specific switch-priority. Counting occurs on egress side prior to
packet duplication.
• ePort.mc – multicast traffic which is going to be transmitted on a specific port
15.8.3.3 Pools
Shared buffer space can be statically divided among multiple pools on the ingress side (iPools) and the egress side
(ePools). Each buffer is a region that is mapped to a specific pool.
Each pool has the following parameters:
• Size – the total size which is shared among the regions allocated to that pool. The pool’s size binds the amount
of cumulative shared usage of the regions that are mapped to the pool. The size can be set to infinite value, in
which case occupancy of this pool will not be taken into consideration upon admittance of the packet.
The pool size does not include the reserved sizes of regions.
• Mode – working mode
• Static – each region has a static maximum threshold defined in bytes. The user sets the maximum shared
quota for this buffer from a specific pool by providing a percentage out of the bounded pool size. If the
size is set to infinite, shared quota for mapped buffers gets set in bytes.
• Dynamic – each region has a dynamic maximal threshold defined as alpha (α) which is the ratio between
the current region usage and the pool’s free space (equal to the pool usage subtracted from pool size):
739
• α accepts the following values 0, 1/128, 1/64, …1/2,1,2,…,64, infinity
• Buffer acceptance condition is: region_usage < α*free pool space
The port region is counted against the pool to which the PG/TC region of the packet is mapped.
740
Buffer Reserved Shared Pool Comment
[%/α/Byte]
741
switch (config) # advanced buffer management force
# Pool configuration
switch (config) # pool iPool1 size 13680063 type dynamic
switch (config) # pool ePool1 size inf type static
# Ingress buffer configuration
switch (config) # interface ethernet 1/1 ingress-buffer iPort pool iPool1 reserved
10k shared alpha 1
switch (config) # interface ethernet 1/1 ingress-buffer iPort.pg1 bind switch-priorit
y 1
switch (config) # interface ethernet 1/1 ingress-buffer iPort.pg1 map pool iPool1
type lossless reserved 85k xoff 20k xon 20k shared alpha 1
switch (config) # interface ethernet 1/1 egress-buffer ePort pool ePool1 reserved 0
shared size inf
switch (config) # interface ethernet 1/1 egress-buffer ePort.tc1 map pool ePool1
reserved 0 shared size inf
switch (config) # interface ethernet 1/1 egress-buffer ePort.mc reserved 0 shared
size inf
# Egress buffer configuration
switch (config) # interface ethernet 1/5 ingress-buffer iPort pool iPool1 reserved
10k shared alpha 1
switch (config) # interface ethernet 1/5 ingress-buffer iPort.pg1 bind switch-priorit
y 1
switch (config) # interface ethernet 1/5 ingress-buffer iPort.pg1 map pool iPool1
type lossless reserved 85k xoff 20k xon 20k shared alpha 1
switch (config) # interface ethernet 1/5 egress-buffer ePort pool ePool1 reserved 0
shared size inf
switch (config) # interface ethernet 1/5 egress-buffer ePort.tc1 map pool ePool1
reserved 0 shared size inf
switch (config) # interface ethernet 1/5 egress-buffer ePort.mc reserved 0 shared
size inf
# MC buffer configuration
switch (config) # pool ePool1 mc-buffer mc.sp1 reserved 0 shared size inf
# PFC configuration
switch (config) # dcb priority-flow-control enable force
switch (config) # dcb priority-flow-control priority 1 enable
switch (config) # interface ethernet 1/1 dcb priority-flow-control mode on
switch (config) # interface ethernet 1/5 dcb priority-flow-control mode on
742
As opposed to the previous scenarios, here the traffic pool is created as lossless, but pause packet
generation is disabled. In these cases, the user expects traffic not to have drops, but it can be dropped.
• Per interface scenarios:
• <if-id> TC X is mapped to more than one traffic pool, or TCs X,X+1 are mapped to more than one traffic
pool.
In these scenarios, traffic class buffers share the same switch priority and are mapped to two different
traffic pool. In this cases, with different traffic pool configuration, behavior of traffic is not determined.
• <if-id> switch priority X is lossless but neither PFC nor FC is not enabled on this interface, or Switch
priorities X-1,X are lossless but neither PFC nor FC is enabled on this interface.
In these scenarios, the user has created a lossless traffic pool and expects that traffic would not be
dropped, but pause packet generation (PFC and FC) is disabled on the interface. In these cases, traffic
can be dropped.
• <if-id> has FC enabled, but default priority 0 is not mapped to lossless traffic pool and FC may not be
functional.
In this scenario, global pause packet (FC) generation is enabled on the interface, but default switch
priority (traffic arriving to the switch without priority tagging is assigned the default switch priority) is
not in lossless traffic pool. In this case, traffic cam be dropped.
• <if-id> has insufficient headroom allocation to fulfill configuration derived requirements (MTU, speed,
cable-length).
In this scenario, combination of MTU, speed, cable-length, and amount of lossless traffic pools
consumes all free headroom memory. In this case, not all required buffers are configured correctly and
traffic can be dropped.
• traffic pool
• type
• map switch-priority
• type map switch-priority
• memory percent
• advanced buffer management
• ingress-buffer
• egress-buffer
• reserved shared size
• pool size type
• pool reserved shared
• map pool type reserved
• bind switch-priority
• description
• pool mc-buffer
• clear buffers pool mc-buffers max-usage
• clear buffers interface ethernet max-usage
• clear buffers interface max-usage
• clear buffers pool max-usage
• clear buffers pool max-usage
• pool description
• cable-length
• show buffers mode
• show buffers status
• show buffers details
743
• show buffers pools
• show buffers pools mc-buffers
• show traffic pool
• show traffic pool interface ethernet
Creates a traffic pool and enters the traffic pool context on prefix mode enabled.
The no form of the command deletes a traffic pool.
Default N/A
History 3.6.5000
Related Commands
Notes
15.8.5.2 type
type <type>
no type <type>
744
Default Lossy
History 3.6.5000
Related Commands
Notes When using “traffic pool <name> type <type>”, if the traffic pool does not exist then it is
created.
Default N/A
History 3.6.5000
Related Commands
Notes When using “traffic pool <name> map switch-priority <list-of-priorities>”, if the traffic
pool does not exist then it is created.
745
15.8.5.4 type map switch-priority
History 3.6.5000
Related Commands
Notes When using “traffic pool <name> type <type> map switch-priority <priority>”, if the
traffic pool does not exist the it is created.
Sets traffic pool size in percentage out of entire shared buffer memory.
The no form of the command resets this parameter to its default.
Default Auto
746
Configuration Mode config pool
History 3.6.5000
Related Commands
Notes • Setting “auto” value ensures fair memory division between all traffic pools with
“auto” size
• Over-subscription of more than 100% is allowed but not recommended, and causes an
exception to be displayed in the “Exceptions list” in “show traffic pool” command
output. See section “Exceptions to Legal Shared Buffer Configuration” for more
details.
Default Disabled
History 3.6.5000
Related Commands
747
Notes When moving advanced buffer management from disable to enable, buffer/PFC
configuration returns all shared buffer configuration to default.
15.8.5.7 ingress-buffer
ingress-buffer <buffer-name>
no ingress-buffer <buffer-name>
Default N/A
History 3.6.1002
Related Commands
Notes iPort.pg9 is reserved for control traffic and hence cannot be edited
15.8.5.8 egress-buffer
egress-buffer <buffer-name>
no egress-buffer <buffer-name>
Default N/A
748
Configuration Mode config interface ethernet
History 3.6.1002
Related Commands
Notes ePort.tc16 is reserved for control traffic and hence cannot be edited
History 3.6.5000
Related Commands
749
Notes • ePort.tc16 is reserved for control traffic and hence cannot be edited
• It is possible to use “K” and “M” to define shared size
Creates pool.
The no form of the command deletes pool.
size Size of pool in bytes, or “inf” for infinite
History 3.6.5000
Related Commands
Notes It is possible to use “K” for kilobytes and “M” for megabytes to define pool size.
750
reserved Amount of reserved memory for the buffer in bytes
History 3.6.1002
Related Commands
Notes
map [pool <pool name> type <type> [xoff <xoff-value> xon <xon value>] reserved <reserved
size> shared <shared units> <shared size>]
Maps iPort.pg buffer to a given pool and sets its reserved and shared sizes.
The no form of the command resets buffer to default pool mapping and configuration.
751
shared size The amount of shared memory for this buffer
• In alpha mode, alpha can have the following values: 0, 1/128, 1/64 ... 1, 2,
4, ... 64, inf
• In max mode, the shared size is defined as a percentage of the pool size
• In size mode, the shared size is defined in bytes or infinite
Shared size depends on type and size of the given pool:
History 3.6.1002
Related
Commands
Notes • Xon and Xoff values are in KB and valid only for “lossless” type
• It is possible to use “K” and “M” quantifiers to set reserved size
752
15.8.5.13 bind switch-priority
History 3.6.1002
Related Commands
Notes
15.8.5.14 description
description <description>
no description
Default “”
History 3.6.1002
753
Example switch (config interface ethernet 1/1 ingress-buffer
iPort.pg1)# description example
Related Commands
Notes
pool <pool-name> mc-buffer <buffer> reserved <reserved> shared <shared units> <shared-
size>
no pool <pool-name> mc-buffer
Maps MC-buffer to specified egress pool and sets its reserved and shared sizes.
The no form of the command resets the values to their default.
Syntax Description mc-buffer Buffer can have the values mc.sp0, mc.sp1...mc.sp7
Default N/A
History 3.6.1002
3.6.5000 Added “size” parameter and note
Related Commands
754
Notes • The qualifiers “K” and “M” may be used to set reserved and shared size
• The units alpha, max, size is presented to the user according to the pool type “static”,
“dynamic” and “size”:
• Alpha when pool type is dynamic and size is defined in bytes
• Max when pool type is static and size is defined in bytes
• Size when pool type is static and size is infinite
Clears max-usage statistics for MC.SP (multicast switch priority, mc.sp0 – mc.sp7) shared
buffers.
Default N/A
History 3.8.1000
Related Commands
Notes
Default N/A
755
Configuration config
Mode
History 3.6.1002
Related Commands
Notes
Default N/A
Configuration config
Mode
History 3.6.1002
Related Commands
Notes
756
15.8.5.19 clear buffers pool max-usage
Default N/A
History 3.6.1002
Related Commands
Notes
Default N/A
History 3.6.1002
757
Example switch (config) # clear buffers pool max-usage
Related Commands
Notes
Default “”
History 3.6.1002
Related Commands
Notes
15.8.5.22 cable-length
cable-length [<meters>]
758
Syntax Description meters Cable length in meters
Range: 5-100,000
Default N/A
History 3.6.5000
Notes • The user may use the quantifier “K” to indicate kilometers (e.g. “cable-length 5K”)
• This command is used to calculate the required buffer to sustain the delay caused by the
cable length
show buffers mode
Default N/A
History 3.6.5000
Related Commands
Notes
759
15.8.5.24 show buffers status
Default N/A
History 3.6.1002
760
Example ----------------------------------------------------------------
------------------------------------------------------
----------------------------------------------------------------
------------------------------------------------------
761
Eth1/1 iPort.pg5 iPool0 0 alpha 0
0 0 0 0
762
Eth1/1 ePort.tc5 ePool0 1.0K alpha 8
0 0 n/a n/a
Related
Commands
Notes Resv/Hdrm Usage/MaxUsage counters specify the usage of reserved buffer set for lossless PG
buffers, and of headroom buffer set to fixed 20KB for lossy PG buffers.
Default N/A
History 3.6.1002
Flags:
Y: Lossy
L: Lossless
S: Static
D: Dynamic
763
Shared size is in percent/Bytes for static pool and in
alphas for dynamic pool
Interface Eth1/1:
--------------------------------------------------------------
----------------------------
Buffer Resv Xoff Xon Shared
Pool Description
[Byte] [Byte] [Byte] [%/a/Byte]
--------------------------------------------------------------
----------------------------
iPort.iPool0(Y) 10.0K - - alpha 8
iPool0(D)
iPort.iPool1(Y) 0 - - alpha 0
iPool1(D)
iPort.iPool2(Y) 0 - - alpha 0
iPool2(D)
iPort.iPool3(Y) 0 - - alpha 0
iPool3(D)
iPort.iPool4(Y) 0 - - alpha 0
iPool4(D)
iPort.iPool5(Y) 0 - - alpha 0
iPool5(D)
iPort.iPool6(Y) 0 - - alpha 0
iPool6(D)
iPort.iPool7(Y) 0 - - alpha 0
iPool7(D)
iPort.iPoolCtrl(Y) 0 - - alpha 8
iPoolCtrl(D)
iPort.pg0(Y) 0 - - alpha 8
iPool0(D)
iPort.pg1(Y) 0 - - alpha 0
iPool0(D)
iPort.pg2(Y) 0 - - alpha 0
iPool0(D)
iPort.pg3(Y) 0 - - alpha 0
iPool0(D)
iPort.pg4(Y) 0 - - alpha 0
iPool0(D)
iPort.pg5(Y) 0 - - alpha 0
iPool0(D)
iPort.pg6(Y) 0 - - alpha 0
iPool0(D)
iPort.pg7(Y) 0 - - alpha 0
iPool0(D)
iPort.pg9(Y) 10.0K - - alpha 8
iPoolCtrl(D)
ePort.ePool0 10.0K - - alpha 8
ePool0(D)
ePort.ePool1 0 - - alpha 0
ePool1(D)
ePort.ePool2 0 - - alpha 0
ePool2(D)
764
ePort.ePool3 0 - - alpha 0
ePool3(D)
ePort.ePool4 0 - - alpha 0
ePool4(D)
ePort.ePool5 0 - - alpha 0
ePool5(D)
ePort.ePool6 0 - - alpha 0
ePool6(D)
ePort.ePool7 0 - - alpha 0
ePool7(D)
ePort.mc 10.0K - - 90.0K
ePool15(S)
ePort.ePoolCtrl 0 - - alpha 8
ePoolCtrl(D)
ePort.tc0 1.0K - - alpha 8
ePool0(D)
ePort.tc1 1.0K - - alpha 8
ePool0(D)
ePort.tc2 1.0K - - alpha 8
ePool0(D)
ePort.tc3 1.0K - - alpha 8
ePool0(D)
ePort.tc4 1.0K - - alpha 8
ePool0(D)
ePort.tc5 1.0K - - alpha 8
ePool0(D)
ePort.tc6 1.0K - - alpha 8
ePool0(D)
ePort.tc7 1.0K - - alpha 8
ePool0(D)
ePort.tc16 1.0K - - alpha 8
ePoolCtrl(D)
Related Commands
Notes
765
15.8.5.26 show buffers pools
Default N/A
History 3.6.1002
766
Example switch (config)# show buffers pools
Flags: S - Static, D - Dynamic
--------------------------------------------------------------
---------
Pool Direction Size Usage MaxUsage
Description
[Byte] [Byte] [Byte]
--------------------------------------------------------------
---------
iPool0 ingress(D) 13.2M 0 576 Lossy-
default
iPool1 ingress(D) 0 0 0
iPool2 ingress(D) 0 0 0
iPool3 ingress(D) 0 0 0
iPool4 ingress(D) 0 0 0
iPool5 ingress(D) 0 0 0
iPool6 ingress(D) 0 0 0
iPool7 ingress(D) 0 0 0
iPoolCtrl ingress(D) 256.0K 0 0
Control
ePool0 egress(D) 13.2M 0 0
Default
ePool1 egress(D) 0 0 0
ePool2 egress(D) 0 0 0
ePool3 egress(D) 10.0K 0 0
ePool4 egress(D) 0 0 0
ePool5 egress(D) 0 0 0
ePool6 egress(D) 0 0 0
ePool7 egress(D) 0 0 0
ePool15 egress(S) inf 0 0
Multicast
ePoolCtrl egress(D) 256.0K 0 0
Control
Related Commands
Notes When advanced buffer management is disabled, the “Description” field specifies the e/
iPool’s relevant traffic pool name.
767
15.8.5.27 show buffers pools mc-buffers
show buffers pools [<pool-name>] mc-buffers
Default N/A
History 3.6.5000
Related
Commands
Notes
768
15.8.5.28 show traffic pool
Syntax N/A
Description
Default N/A
History 3.6.5000
---------------------------------------------------------------
--------------------------------
Traffic Type Memory Switch
Memory actual Usage Max Usage
Pool [%] Priorities
[Bytes] [KB] [Bytes]
---------------------------------------------------------------
--------------------------------
lossless-default (RO) lossless auto 0
0 0
lossy-default lossy auto 0, 1, 2, 3, 13.7M
0 0
4, 5, 6, 7
Exception list:
N/A
Related
Commands
Notes • Omission of traffic pool name displays information about all existing traffic pools
• The “Exception list” section displays messages to indicate unrecommended configuration.
See section “Exceptions to Legal Shared Buffer Configuration” for more details.
769
15.8.5.29 show traffic pool interface ethernet
Displays state and configuration information for the buffers on a given port related to a given
traffic pool.
Default N/A
History 3.6.5000
770
Example switch (config)# show traffic pool lossy-default interface
ethernet 1/1
------------------------------------------------------
Switch-priority Ingress buffer Egress buffer
------------------------------------------------------
0 iPort.pg0 ePort.tc0
1 iPort.pg0 ePort.tc1
2 iPort.pg0 ePort.tc2
3 iPort.pg0 ePort.tc3
4 iPort.pg0 ePort.tc4
5 iPort.pg0 ePort.tc5
6 iPort.pg0 ePort.tc6
7 iPort.pg0 ePort.tc7
--------------------------------------------------------------
-----------
Name Memory percent Size (bytes) Usage (bytes)
Max Usage
--------------------------------------------------------------
----------
lossy-default auto 34.9M 0
0
--------------------------------------------------------------
---------------------------------
Ingress buffer Headroom size (bytes) Xon (bytes) Xoff (bytes)
Headroom Usage Headroom Max Usage
--------------------------------------------------------------
---------------------------------
iPort.pg0 20.0K N/A N/A
0 0
--------------------------------------------------------
Direction Pool Usage (bytes) Pool Max Usage (bytes)
--------------------------------------------------------
Ingress 0 0
Egress 0 0
Exception list:
N/A
Related Commands
Notes The “Exception list” section displays messages to indicate unrecommended configuration.
See section “Exceptions to Legal Shared Buffer Configuration” for more details.
771
Storm control utilizes a bandwidth-based method to measure traffic where packets exceeding the percentage level
specified by the user are dropped.
Users are able to monitor broadcast, unknown unicast, and unregistered multicast traffic while supporting different
thresholds for each type or monitor a summary of all the previously mentioned traffic with one threshold.
15.9.1.1 storm-control
level <level> | Storm control per traffic type may be configured with different
{ bits <bits> | thresholds:
bytes <bytes> |
packets • Level – specifies threshold value in percentages from interface
<packets> [k|m| speed
g]} • Bits – specifies threshold value in bits per second. Must be
specified with multiplier k, m, or g. Possible ranges: [1k...999k]
[1m...999m][1g...200g].
• Bytes – specifies threshold value in bytes per second. May be
specified with multiplier k, m, or g. Possible ranges: [128...999]
[1k...999k][1m...999m][1g...25g].
• Packets – specifies threshold value in packets per second. May
be specified with multiplier k, m, or g. Possible ranges: [1...999]
[1k...999k][1m...999m][1g...2g].
History 3.6.4006
772
3.6.4110 Updated command syntax, default and configuration mode
3.6.6000 Added “config interface mlag port channel” configuration mode
Related Commands
Notes • The parameter “all” and other configurations are mutually exclusive
• Storm control can be configured on a LAG but cannot be configured on LAG
members
• Storm control cannot be configured on router ports
• Storm control cannot be configured on a destination port in a monitoring session
• Units are in 10^n. The parameter “k” equals 1000 and not 1024.
The command displays the configuration levels and dropped packets for each traffic
type.
Default N/A
History 3.6.4006
773
3.7.1000 Updated example
Interface Eth1/8:
Broadcast : 10%
Broadcast packets dropped : 0
Unreg-Mcast : N/A
Unreg-Mcast packets dropped : N/A
Unkn-Ucast : N/A
Unkn-Ucast packets dropped : N/A
All traffic types : N/A
All traffic types packets dropped: N/A
Related Commands
Notes
15.10.1.1 hll
hll <max-time>
no hll
Default 512ms
774
Configuration Mode config interface ethernet
config interface port-channel
config interface mlag-port-channel
History 3.6.5000
Related Commands
Notes
15.11 Store-and-Forward
Store-and-Forward is used to describe a functionality where a switch receives a complete packet, stores it, and only then
forwards it.
since the switch make forwarding decisions based on the destination address which is at the header of the packet, the
switch can make the forwarding decision before receiving the complete packet, this process is called cut-through, the
switch forwards part of the packet before receiving the complete packet.
Cut-through allows lower latency and saves buffer space, but if an error occurred in the packet while utilizing cut-
through, the packet will be forwarded with an error, alternatively, utilizing store-and-forward allows the switch to drop
erroneous packets.
The standard implementation of forwarding mode is for the entire switch; either all ports on a switch are in store-and-
forward mode or all ports on a switch are in cut-through mode. HPE implements forwarding mode per egress port,
which is a more flexible method and vital in cases where a switch is connected to both a storage device and a compute
server among other setups.
switchmode store-and-forward
no switchmode store-and-forward
disable switchmode store-and-forward
Default N/A
775
Configuration Mode config
config interface ethernet
config interface port-channel
config interface mlag-port-channel
History 3.6.3640
Related Commands
Notes
776
16 Ethernet Switching
The following pages provide information on configuring Ethernet (L2) protocols and features.
• Ethernet Interfaces
• Interface Isolation
• Link Aggregation Group (LAG)
• Link Layer Discovery Protocol (LLDP)
• VLANs
• Voice VLAN
• Spanning Tree Protocol
• MAC Address Table
• MLAG
• Link State Tracking
• QinQ
• Access Control List (ACL)
• Control Plane Policing
• User Defined Keys
• OpenFlow
To use 100GbE QSFP interfaces as 25/10GbE (via QSA adapter), the speed must be manually set with the
command “speed 25000” or “speed 10000” respectively under the interface configuration mode.
The breakout cable is a unique HPEcapability, where a single physical quad-lane QSFP
It maximizes the flexibility of the end user to use HPE M-series Switch with a combination of different interfaces
according to the specific requirements of its network. Certain ports cannot be split at all, and there are ports that can be
split into 2 ports only (for more information please refer to your Switch Hardware User Manual). Splitting a port
changes the notation of that port from x/y to x/y/z with “x/y” indicating the previous notation of the port prior to the
split and “z” indicating the number of the resulting sub-physical port (1,2 or 1,2,3,4). Each sub-physical port is then
handled as an individual port. For example, splitting port 10 into 4 lanes gives the following new ports: 1/10/1, 1/10/2,
1/10/3, 1/10/4.
777
A qsfp-split-4 operation results in blocking a quad-lane port in addition to the one being split. A set of hardware
restrictions determine which of the ports can be split.
Specific ports can be split by using a QSFP 1X4 breakout cable to split one single-lane port into 4 lanes (4 SFP+
connectors). These 4 lanes then go one lane to each of the 4 SFP+ connectors.
When splitting an interface’s traffic into 4 data streams (four lanes), one of the other ports on the switch is disabled
(unmapped).
To see the exact splitting options available per system, refer to each specific system’s hardware user manual (Cabling
chapter) located on the company website.
To split an interface:
1. Shut down all the ports related to the interface. Run:
• In case of qsfp-split-2, shut down the current interface only
• In case of qsfp-split-4, shut down the current interface and the other interface according switch system’s
specifications.
778
switch (config) # interface ethernet 1/3
switch (config interface ethernet 1/3) # shutdown
switch (config interface ethernet 1/3) # exit
switch (config) # interface ethernet 1/4
switch (config interface ethernet 1/4) # shutdown
2. Split
the ports as desired.
Run:
3. The following warning will be displayed:
The <ports> field in the warning refers to the affected ports from splitting port <inf> in the applied command.
Please beware that in some products splitting a port into a specific type prevents you from accessing
the splittable port and an additional one. For example, splitting a port 3 into qsfp-4 on SN2700, makes
ports 3 and 4 inaccessible.
2. From the first member of the split (1/4/1), change the module-type back to QSFP. Run:
The module-type can be changed only from the first member of the split and not from the interface
which has been split.
779
The following interfaces will be unmapped: 1/4/1 1/4/2 1/4/3 1/4/4.
3. Type “YES” when prompted with “Type 'YES' to confirm unsplit.”
780
Transceiver Switch OPN Supported Ports
SN2700M 1, 2, 31, 32
If a high power transceiver (e.g. LR4) is inserted to a port that does not support it, the link does not go up, and the
following warning message is displayed: “Warning: High power transceiver is not supported” when the command
“show interfaces ethernet” is run.
200GbE KP4 (enhanced RS FEC)
100/50/25GbE RS FEC
40/10/1GbE No FEC
781
requires configuring one of the ports as a recirculation port. In this case, the operating system will use this port to get
buffer dropped packets from all the other ports and present them to the user.
• interface ethernet
• boot-delay
• default interface ethernet
• description
• fec-override
• flowcontrol
• ip address dhcp
• load-interval
• module-type
• mtu
• recirculation
• no recirculation port interface ethernet
• shutdown
• speed
• clear counters
• show interfaces counters
• show interfaces counters discard
• show interfaces ethernet
• show interfaces ethernet counters tc
• show interfaces ethernet counters pg
• show interfaces ethernet description
• show interfaces ethernet rates
• show recirculation port
• show interfaces ethernet status
• show interfaces ethernet transceiver
• show interfaces ethernet transceiver brief
• show interfaces ethernet transceiver counters
• show interfaces ethernet transceiver counters details
• show interfaces ethernet transceiver diagnostics
• show interfaces ethernet transceiver raw
• show interfaces status
• disable interface ethernet traffic-class congestion-control
• disable interface port-channel traffic-class congestion-control
• disable interface mlag-port-channel traffic-class congestion-control
Default N/A
782
Configuration Mode config
History 3.1.0000
Related Commands
Notes
16.1.7.2 boot-delay
boot-delay [<time>]
no boot-delay
Default 0 seconds
History 3.6.2002
Notes • This command delays the interface from boot time of the interface
• Configuration save and system reboot is required for the configuration to take effect
783
Default N/A
History 3.9.1000
Notes If one of the following configurations exist on the port, the command will be blocked and
an informative message will appear.
1. Port is a BGP update source port (when the IP of the port is taken and used as a
source IP for BGP routing updates and for TCP connection establishment with
neighbor or peer-group).
2. Port is a PIM update source port (when the IP of the port is taken and used as source
IP in PIM communications).
3. Port is an IP PIM rp-candidate.
4. Port is an IP PIM bsr-candidate.
5. Port is a member in LAG router port.
6. Port is a member in LAG in NVE mode.
16.1.7.4 description
description <string>
no description
Default ""
History 3.1.0000
Notes
784
16.1.7.5 fec-override
force
History 3.5.0000
Notes Use this command with caution. There is no limitation in configuring non-standard FEC.
It may cause the link to malfunction.
16.1.7.6 flowcontrol
Enables or disables IEEE 802.3x link-level flow control per direction for the specified
interface.
off | on • on – enables IEEE 802.3x link-level flow control for the specified
interface on receive or send
• off – disables IEEE 802.3x link-level flow control for the specified
interface on receive or send
785
force Forces configuration without the need to toggle the interface
History 3.1.0000
Notes To configure global pause please see section “Flowcontrol (Global pause)”.
ip address dhcp
no ip address dhcp
Default Disabled
History 3.4.2008
Notes
786
16.1.7.8 load-interval
load-interval <time>
no load-interval
History 3.3.0000
Notes This interval is used for the ingress rate and egress rate counters
16.1.7.9 module-type
Splits the interface to two or four separate interfaces, or merges them back to a single
interface (QSFP).
The no form of the command resets the interface to its default configuration (non-split)
force Force the split operation without asking for user confirmation.
Default non-split
787
Configuration Mode config interface ethernet
History 3.1.1400
16.1.7.10 mtu
mtu <frame-size>
Configures the Maximum Transmission Unit (MTU) frame size for the interface.
788
Default 9216 bytes
History 3.1.0000
Notes Switches that perform upgrade to version 3.9.2000, existing interfaces will stay with MTU
1500 (or any other value that was configured). Newly created interfaces (created by split/
unsplit operation) will be created with MTU 9216 (the new default). The configured and
displayed MTU represents the L3 MTU (being used in IP interfaces). The L2 MTU (being
used in physical interfaces) is automatically configured as L3 MTU + 22 Bytes.
16.1.7.11 recirculation
recirculation [force]
no recirculation
Default Disabled
History 3.9.0300
789
Example switch (config interface ethernet 1/1) # recirculation force
Notes This command reduces by 1 the number of monitor sessions that can be configured. It will
fail if the maximum number of monitor sessions are already configured.
Default N/A
History 3.9.0300
Notes
16.1.7.13 shutdown
shutdown
no shutdown
790
Default Interface is enabled
History 3.1.0000
Notes
16.1.7.14 speed
791
Syntax Description value The following speeds are available:
• 1G or 1000—1GbE
• 10G or 10000—10GbE
• 25G or 25000—25GbE
• 40G or 40000—40GbE
• 50G or 50000—50GbE (This speed refers to the speed 50Gx2. See
below)
• 50Gx1—Port runs at 50Gbps using 1 lane for transmitting (50G
PAM4: 1 lane * 50 Gbps)
• 50Gx2—Port runs at 50Gbps using 2 lanes for transmitting (50G
NRZ: 2 lane * 25 Gbps)
• 50GxAuto—Port runs at 50Gbps with auto-select lane count
• 56G or 56000—56GbE
• 100G or 100000—100GbE (This speed refers to the speed 100Gx4.
See below)
• 100Gx2—Port runs at 100Gbps using 2 lanes for transmitting
(100G PAM4: 2 lanes * 50 Gbps)
• 100Gx4—Port runs at 100Gbps using 4 lanes for transmitting
(100G NRZ: 4 lanes * 25 Gpbs)
• 100GxAuto—Port runs at 100Gbps with auto-select lane count
• 200G or 200000—200GbE (This speed refers to the speed 200Gx4.
See below)
• 200Gx4—Port runs at 200Gbps using 4 lanes for transmitting
(200G PAM4: 4 lanes * 50 Gbps)
auto—auto-negotiates link speed (not supported on MPO or LAG
interfaces)
no-autoneg Disallows auto negotiation link speed on the interface (not supported on
MPO or LAG interfaces)
Default Depends on the port module type (see the “Notes” section below)
History 3.1.0000
3.5.0000 Added 25GbE, 50GbE, and 100GbE speeds and updated notes
792
3.6.6000 Added no-autoneg parameter
Notes
• The default speed of an interface depends on its speed capabilities.
• It is not possible to set the speed on a LAG or MPO interface
• Not all interfaces support all speed options
• It is not possible to set “auto” speed along with specific speeds
• A port with more than one speed advertised or a port configured to “auto” speed
cannot be added to LAG
• To change the speed of a LAG interface:
a. Remove Ethernet ports from LAG.
b. Shutdown ports.
c. Reconfigure port speed.
d. Re-enable ports.
e. Re-add ports to LAG interface.
• Speed configuration with lane count affects the Spectrum-2 and Spectrum-3 systems
only.
clear counters
Default N/A
793
Configuration Mode config interface ethernet
config interface port-channel
config interface mlag-port-channel
History 3.1.0000
Default N/A
History 3.1.0000
3.6.1002 Added “error packets” counter to Tx
3.9.1000 Added ability to use a range of ports and added "ECN marked packets"
counter
794
3.8.1300 Added note
Eth1/1:
Rx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 packets of 64 bytes
0 packets of 65-127 bytes
0 packets of 128-255 bytes
0 packets of 256-511 bytes
0 packets of 512-1023 bytes
0 packets of 1024-1518 bytes
0 packets Jumbo
0 discard packets
0 error packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
0 discard packets by storm control
Tx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 hoq discard packets
0 pause packets
0 pause duration
0 ECN marked packets
Eth1/2:
...
Related Commands
795
Notes
• Spectrum® based systems display queue depth for TC0-TC7
Default N/A
History 3.6.6102
796
Example switch (config) # show interfaces ethernet 1/24 counters
discard
Interface Eth1/24:
Rx:
0 discard packets
0 error packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
0 discard packets by storm control
0 general discard packets
0 policy discard packets
0 invalid tag packets
0 discard packets by vlan filter
Tx:
1154059970 discard packets
0 error packets
0 hoq discard packets
0 oversize packets
0 policy discard packets
0 SLL discard packets
11500 no buffer discard mc packets
0 discard packets by vlan filter
0 discard packets by stp filter
0 discard packets by loopback
filter
Related Commands
Notes • Discard Packets counter refers to discards due to insufficient buffer in both RX and
TX.
• The "id" attribute is optional. If nothing is selected, information for all ports will be
displayed
show interfaces ethernet <inf> [cable-length | capabilities | congestion-control | counters |
description | link-diagnostics | pfc-wd | signal-degrade | status | switchport | transceiver]
797
capabilities Display specific interfaces capabilities information
Default N/A
History 3.1.0000
3.6.1002 Added “error packets” counter to Tx, “Last change in operational
status”, and “Isolation group” to output
3.6.2002 Added “boot delay” parameters to output
3.6.3640 Added support for “forwarding mode”
3.6.4110 Updated Example with “Forwarding mode”
3.6.6000 Added output line for “auto-negotiation”
798
3.6.8100 Updated example
Eth1/1:
799
Telemetry sampling: Disabled TCs: N/A
Telemetry threshold: Disabled TCs: N/A
Telemetry threshold level: N/A
Rx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
0 discard packets by storm control
Tx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 hoq discard packets
Related Commands
Notes • If a high power transceiver (e.g. LR4) is inserted to a port that does not support it, the
link does not go up, and the following warning message is displayed: “Warning: High
power transceiver is not supported” when running the command “show interfaces
ethernet” is run. For more information, please refer to “High Power Transceivers”.
• “Operational Fec” appears as N/A while port is DOWN, and as no-fec/fc-fec/rs-fec
while port is UP
• As of version 3.9.1000, the "inf" attribute is optional. If nothing is selected,
information for all ports will be displayed
• The speed with lane count information refers to the Spectrum-2 and Spectrum-3
systems only.
800
16.1.7.19 show interfaces ethernet counters tc
Displays traffic class counters for the specified interface and priority.
Default N/A
History 3.6.3004
Eth1/1:
TC 3
0 packets
0 bytes
0 queue depth
0 unicast no buffer discard
0 WRED discard
Eth1/2:
TC 3
0 packets
0 bytes
0 queue depth
0 unicast no buffer discard
0 WRED discard
Related Commands
Displays priority group counters for the specified interface and priority.
801
priority Valid priority values: 0-7 or all
Default N/A
History 3.6.3004
Eth1/1:
PG 0:
0 packets
0 bytes
0 queue depth
0 no buffer discard
0 shared buffer discard
Eth1/2:
PG 0:
0 packets
0 bytes
0 queue depth
0 no buffer discard
0 shared buffer discard
Related Commands
Displays the admin status and protocol status for the specified interface.
Default N/A
History 3.1.0000
802
3.4.1100 Updated example
Example
switch (config) # show interfaces ethernet description
-----------------------------------------------------------
----------------------------
Interface Admin Operational Switchport
Speed Description
state state mode
-----------------------------------------------------------
----------------------------
Eth1/20 Enabled Up hybrid
10G -
Eth1/21 Enabled Up hybrid
100Gx4 (auto) -
Eth1/22 Enabled Up hybrid
100Gx4 (auto) -
-----------------------------------------------------------
----------------------------
Interface Admin Operational Switchport
Speed Description
state state mode
-----------------------------------------------------------
----------------------------
Eth1/20 Enabled Up hybrid
50Gx2 -
Related Commands
Notes The speed with lane count information refers to the Spectrum-2 and Spectrum-3 systems
only.
803
Syntax Description transfer-rate- • bytes – displays interface transfer rates in B/s dynamically (while
unit converting to K/M/G if needed)
• KB – displays interface transfer rate in Kb/s
• MB – displays interface transfer rate in Mb/s
• GB – displays interface transfer rate in Gb/s
• bits – displays interface transfer rates in b/s dynamically (while
converting to K/M/G if needed)
• Kb – displays interface transfer rate in Kb/s
• Mb – displays interface transfer rate in Mb/s
• Gb – displays interface transfer rate in Gb/s
• If no parameter is entered, transfer rate is displayed in bits
Default N/A
History 3.6.2002
3.7.0000 Added new rates to “transfer-rate-unit”
Port egress
ingress
avg rate (KB/s) pkts/sec avg
rate (KB/s) pkts/sec
--------- ---------------- --------
--------------- --------
Eth1/1 0 0
0.032 1
Eth1/2 0 0
0.032 1
Eth1/3 0 0
0 0
...
Related Commands
Notes
804
Syntax Description N/A
Default N/A
History 3.9.0300
Notes
Displays the status, speed and negotiation mode of the specified interface.
Default N/A
History 3.1.0000
805
Example
switch (config) # show interfaces ethernet status
Related Commands
Notes The speed with lane count information refers to the Spectrum-2 and Spectrum-3 systems
only.
Default N/A
History 3.1.0000
806
Related Commands switch (config) # show interfaces ethernet 1/1 transceiver
Port 1/1 state
identifier : QSFP+
cable/module type : Optical cable/module
ethernet speed and type: 40GBASE - SR4
vendor : Mellanox
cable_length : 50 m
part number : MC2210411-SR4
revision : A1
serial number : TT1151-00006
Notes • For a full list of the supported cables and transceivers, please refer to http://
www.hpe.com/support/hpesc
• If a high power transceiver (e.g. LR4) is used, it will be indicated in the field “cable/
module type”
Default N/A
History 3.6.6102
807
Example switch (config) # show interfaces ethernet 1/1 transceiver
brief
show interfaces ethernet transceiver brief
-------------------------------------------------------------
---------------------------
Interface Identifier Vendor PN
SN Rev
-------------------------------------------------------------
---------------------------
Eth1/1
Related Commands
Notes • For a full list of the supported cables and transceivers, please refer to http://
www.hpe.com/support/hpesc
• If a high power transceiver (e.g. LR4) is used, it will be indicated in the field “cable/
module type”
Default N/A
History 3.6.1002
808
Example switch (config) # show interfaces ethernet 1/1 transceiver
counters
Rx
phy received bits 17725862707200
phy symbol errors 0
phy corrected bits 0
Related Commands
Notes • The counter “phy received bits” provides information on the total amount of traffic
received and can be used to estimate the ratio of error traffic
• The counter “phy symbol errors” provides information on the error traffic that was not
corrected because the FEC algorithm could not do it or because FEC was not active on
this interface
• The counter “phy corrected bits” provides the number of corrected bits by the active
FEC mode (RS/FC)
Default N/A
History 3.6.1002
809
Example switch (config) # show interfaces ethernet 1/1 transceiver
counters details
Phy counters
Symbol errors 0
Sync headers errors 0
Edpl/bip errors lane0 0
Edpl/bip errors lane1 0
Edpl/bip errors lane2 0
Edpl/bip errors lane3 0
FC corrected blocks lane0 0
FC corrected blocks lane1 0
FC corrected blocks lane2 0
FC corrected blocks lane3 0
FC uncorrectable blocks lane0 0
FC uncorrectable blocks lane1 0
FC uncorrectable blocks lane2 0
FC uncorrectable blocks lane3 0
RS corrected blocks 0
RS uncorrectable blocks 0
RS no errors blocks 0
RS single error blocks 0
RS corrected symbols total 0
RS corrected symbols lane0 0
RS corrected symbols lane1 0
RS corrected symbols lane2 0
RS corrected symbols lane3 0
Link down events 0
Successful recovery events 0
Time since last clear 3545366
Related Commands
Notes The number of lanes displayed depends on interface splitter ratio (4-way-split – each split
has only 1 lane; 2-way-split – each split has 2 lanes)
Displays cable channel monitoring and diagnostics info for this interface. Tx and Rx power
are reported in mW and dBm units.
Default N/A
810
History 3.6.2002
811
Example switch (config) # show interfaces ethernet 1/5 transceiver
diagnostics
Related Commands
812
Notes This example is for a QSFP transceiver
Default N/A
History 3.6.1002
Example
813
switch (config) # show interfaces ethernet 1/7 transceiver raw
Related Commands
Notes
show interfaces status
Default N/A
814
History 3.6.4006
3.9.0300 Updated example—added MTU column
Example
-----------------------------------------------------------------------------
-------------------
Port Operational state Admin Speed
MTU Description
-----------------------------------------------------------------------------
-------------------
mgmt0 Up Enabled 1000Mb/s (auto)
1500 -
Eth1/1 Down Disabled Unknown
1500 -
Eth1/2 Up Enabled 40G
1500 -
Eth1/3 Up Enabled 40G
1500 -
Eth1/4 Up Enabled 40G
1500 -
Eth1/5 Up Enabled 40G
1500 -
Eth1/6 Up Enabled 10G
1500 -
Eth1/7 Up Enabled 10G
1500 -
Eth1/8 Up Enabled 10G
1500 -
Eth1/9 Up Enabled 10G
1500 -
Eth1/10 Up Enabled 100Gx4
1500 -
Eth1/11 Up Enabled 100Gx4
1500 -
Eth1/12 Up Enabled 100Gx4
1500 -
Eth1/13 Up Enabled 100Gx4
1500 -
Eth1/14 Down Disabled Unknown
1500 -
Eth1/15 Up Enabled 100Gx4
1500 -
Eth1/16 Up Enabled 100Gx4
1500 -
Eth1/17 Down Disabled Unknown
1500 -
Eth1/18 Down Disabled Unknown
815
1500 -
Eth1/19 Down Disabled Unknown
1500 -
Eth1/20 Down Disabled Unknown
1500 -
Eth1/21/1 Up Enabled 10G
1500 -
Eth1/21/2 Up Enabled 10G
1500 -
Eth1/21/3 Up Enabled 10G
1500 -
Eth1/21/4 Up Enabled 10G
1500 -
Eth1/22 Down Disabled Unknown
1500 -
Eth1/23 Up Enabled 10G
1500 -
Eth1/24 Up Enabled 10G
1500 -
Eth1/25 Down Disabled Unknown
1500 -
Eth1/26 Down Disabled Unknown
1500 -
Eth1/27 Down Disabled Unknown
1500 -
Eth1/28 Down Disabled Unknown
1500 -
Eth1/29 Down Disabled Unknown
1500 -
Eth1/30 Down Disabled Unknown
1500 -
Eth1/31 Down Disabled Unknown
1500 -
Eth1/32 Down Disabled Unknown
1500 -
Related Commands
Note • If a high power transceiver (e.g. LR4) is inserted to a port that does not support it,
the link does not go up, and the following warning message is displayed: “Warning:
High power transceiver is not supported” when running the command “show
interfaces ethernet” is run. For more information, please refer to “High Power
Transceivers”.
• The speed with lane count information refers to the Spectrum-2 and Spectrum-3
systems only.
816
16.1.7.32 disable interface ethernet traffic-class congestion-control
Default N/A
History 3.8.2000
Role admin
Notes The “no interface ethernet <inf> traffic-class <tc> congestion-control” command returns
configuration on the port to its default value.
tc Traffic class.
Range 0-7
Default N/A
817
Configuration Mode config
History 3.8.2000
Role admin
Notes The “no interface port-channel <inf> traffic-class <tc> congestion-control” command
returns configuration on the port to its default value.
tc Traffic class.
Range 0-7
Default N/A
History 3.8.2000
Role admin
818
Related Commands show interfaces mlag-port-channel 1/1 congestion-control
Notes The “no interface mlag-port-channel <inf> traffic-class <tc> congestion-control”
command returns configuration on the port to a default value.
1. Create the VLANs to be used.
2. Unlock isolation interface protocol.
3. Create isolation Group A.
4. Assign VLANs 2 and 3 to isolation Group A.
819
switch (config isolation-group GroupA) # vlan 2-3
switch (config isolation-group GroupA) # exit
5. Create isolation Group B.
6. Assign VLANs 4 and 5 to isolation Group B.
7. Set Ethernet interfaces 1-3 to access for VLAN 3.
8. Isolate Ethernet interfaces 1 and 2 and set Ethernet interfaces 3 as privileged.
9. Enable isolation Group A.
10. Set Ethernet interfaces 4-6 to trunk.
11. Isolate Ethernet interfaces 4 and 5 and set Ethernet interfaces 6 as privileged.
12. Enable isolation Group B.
13. Verify configuration.
820
switch (config) # show isolation-group
Isolation group: GroupA
State: Enabled
VLANs: 2, 3
Privileged port: Eth1/3
Isolated ports: Eth1/1, Eth1/2
Isolation group: GroupB
State: Enabled
VLANs: 4, 5
Privileged port: Eth1/6
Isolated ports: Eth1/4, Eth1/5
protocol isolation-group
no protocol isolation-group
Default Disabled
History 3.6.1002
16.2.2.2 isolation-group
isolation-group <name>
no isolation-group <name>
821
Syntax Description N/A
Default N/A
History 3.6.1002
Notes • The no form of this command deletes the isolation group, removes its attached
ports, and the VLANs from the group
• Up to 64 isolation groups can be created
16.2.2.3 shutdown
shutdown
no shutdown
Default Disabled
History 3.6.1002
Notes Enabling isolation groups fails if there are VLANs with ports both inside and outside
the group
822
16.2.2.4 vlan
vlan <vid>
no vlan <vid>
Default N/A
History 3.6.1002
Notes • Enabling isolation groups fails if there are VLANs with ports both inside and
outside the group
• The VLAN must be created before running this command
• All interfaces in the VLAN must be attached to only this isolation group
• The VLAN added cannot have a respective VLAN interface
Default N/A
History 3.6.1002
823
Example switch (config interface ethernet 1/2) # isolation-group
mygroup mode privileged
Notes
show isolation-group <name>
Default N/A
History 3.6.1002
Related Commands
Notes
824
To equally send traffic on all LAG links, the switch uses a hash function which can use a set of attributes as key to the
hash function.
As many as 32 physical ports can be aggregated on a single LAG.
2. Change back to config mode.
3. Add a physical port to the LAG.
If the physical port is operationally up, this port becomes an active member of the aggregation.
Consequently, it becomes able to convey traffic.
2. Change back to config mode.
Or:
825
switch (config interface ethernet 1/4) # channel-group 1 mode passive
Creates a LAG and enters the LAG configuration mode. There is an option to create a
range of LAG interfaces.
The no form of the command deletes the LAG, or range of LAGs.
Default N/A
History 3.1.1400
Notes • If a LAG is also an IPL, attempting to delete it without first deleting the IPL is
rejected by the management
• LAGs have forwarding mode in accordance with the global configuration
826
16.3.3.2 lacp
lacp
no lacp
History 3.1.1400
Related Commands
Notes
Default 32768
History 3.1.1400
827
Related Commands show lacp interfaces port-channel
Notes Each device that runs LACP has an LACP system priority value. A value between 1 and
65535 can be configured. LACP uses the system priority with the MAC address to form
the system ID. When setting the priority, a higher number means a lower priority.
Configures the LACP interface parameters.
The no form of the command sets the LACP interface configuration to default.
Syntax Description rate fast Sets LACP PDUs on the port to be in fast (1 second) or slow rate (30
seconds)
Default rate—slow (30 seconds)
port-priority—32768
History 3.1.1400
Related Commands
Notes Configuring LACP rate (fast or slow) will configure the peer port to send (fast or slow),
it does not make any affect on the local port LACP rate.
828
16.3.3.5 port-channel load-balance ethernet
Configures the port-channel load balancing distribution function method, with symmetric
hashing enabled or not.
The no form of the command sets the distribution function method to default, or disabling
symmetric hashing.
829
Default source-destination-mac, source-destination-ip, source-destination-port, l3-protocol, l2-
protocol, flow-label
History 3.1.1400
830
Notes • As of 3.8.2100, the default value of port-channel load-balance has been changed from
"source-destination-mac" to "source-destination-mac, source-destination-ip, source-
destination-port, l3-protocol, l2-protocol, flow-label". This occurs only upon fresh
installations or after "reset factory". Upgrading users will retain the old load
balancing value and show running-config will indicate this.
• Several load balance methods can be configured (refer to the example)
• "ingress-port" and "symmetric" cannot both be set at the same time. The command
will be rejected under the following conditions:
• 1) "ingress-port" and "symmetric" both appear in the same command.
• 2) "ingress-port" is requested while "symmetric" is in force from a previous
command. It needs to be cancelled first with "no port-channel load-balance
ethernet symmetric".
• 3)"symmetric" is requested BY ITSELF while "ingress-port" is in force from a
previous command. If "symmetric" is part of a larger list that does not include
"ingress-port", the meaning is to exclude "ingress-port" and the command will
be accepted.
• When symmetric is set without other methods: only symmetric hashing can be set
while other methods remain unchanged
• When symmetric is set together with other methods: symmetric hashing is set in
parallel with other methods
• When other methods are set without symmetric: other methods are set, while
symmetric hashing remains unchanged
16.3.3.6 channel-group
mode on Static assignment the port to LAG. LACP will not be enabled on this
port.
mode active/ Dynamic assignment of the port to LAG. LACP will be enabled in
passive either passive or active mode.
Default N/A
History 3.1.1400
831
3.4.0008 Added a note
Default N/A
832
History 3.4.1100
Related Commands
Notes If a switch is connected via LAG to a host without LACP capability, running this
command on that LAG allows a member port (with the lowest numerical priority value),
acting as an individual, to communicate with the host
ip address dhcp
no ip address dhcp
Enables DHCP on this LAG interface.
The no form of the command disables DHCP on this LAG interface.
Default Disabled
History 3.4.2008
Notes
833
Syntax Description N/A
Default N/A
History 3.1.1400
Example
Port-channel 5:
-----------------------------------------------------------------------------
------
LACPDUs Marker Marker Marker Rsp Marker Rsp LACPDUs LACPDUs Illegal
Unknown
Port Sent Recv Sent Recv Sent Recv
-----------------------------------------------------------------------------
------
1/12 0 0 0 0 0 0 0
0
1/11 0 0 0 0 0 0 0
0
1/10 0 0 0 0 0 0 0
0
Notes
834
Default N/A
History 3.1.1400
Example
Related Commands
Notes
show lacp interfaces neighbor
Default N/A
835
History 3.1.1400
Example
836
switch (config) # show lacp interfaces neighbor
Flags:
A - Device is in Active mode
P - Device is in Passive mode
Port 1/4
----------
Partner System ID : 00:00:00:00:00:00
Flags : A
LACP Partner Port Priority : 0
LACP Partner Oper Key : 0
LACP Partner Port State : 0x0
Port 1/49
----------
Partner System ID : 00:02:c9:fa:c4:c0
Flags : A
LACP Partner Port Priority : 255
LACP Partner Oper Key : 33
LACP Partner Port State : 0xbc
Port 1/51
----------
Partner System ID : f4:52:14:10:d8:f1
Flags : A
LACP Partner Port Priority : 255
LACP Partner Oper Key : 33
LACP Partner Port State : 0xbc
Related Commands
Notes
837
16.3.3.12 show lacp
show lacp
Default N/A
History 3.4.0000
Related Commands
Notes
show lacp interfaces {mlag-port-channel | port-channel} <instance> system-identifier
Default N/A
History 3.4.0000
838
Related Commands
Notes
Default N/A
History 3.3.4000
3.6.1002 Added “error packets” counter to Tx
Example
839
switch (config) # show interfaces port-channel 10
Po10:
Admin state : Enabled
Operational state : Down
Description : N/A
Mac address : N/A
MTU : 1500 bytes (Maximum packet size 1522 bytes)
lacp-individual mode: Disabled
Flow-control : receive off send off
Actual speed : N/A
Width reduction mode: Not supported
Switchport mode : access
MAC learning mode : Enabled
Forwarding mode : inherited cut-through
FCS Ingress : Enabled CRC check
FCS Egress : Disabled CRC recalculate
FCS Timestamping : Enabled
Rx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
0 discard packets by storm control
Tx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 hoq discard packets
840
Related Commands
Notes
Default N/A
History 3.6.1002
841
Example switch (config) # show interfaces port-channel 2-3 counters
Po2:
Rx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 packets of 64 bytes
0 packets of 65-127 bytes
0 packets of 128-255 bytes
0 packets of 256-511 bytes
0 packets of 512-1023 bytes
0 packets of 1024-1518 bytes
0 packets Jumbo
0 error packets
0 discard packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
Tx
1000000 packets
0 unicast packets
1000000 multicast packets
0 broadcast packets
1505000000 bytes
1000000 error packets
0 discard packets
0 pause packets
0 ECN marked packets
Po3:
...
Related Commands
842
Syntax Description N/A
Default N/A
History 3.3.4000
3.6.3640 Added “forwarding mode” as compatibility parameter to output
Compatibility-parameters:
* Port-mode
* Speed
* MTU
* Forwarding mode
* Flow Control
* Access VLAN
* Allowed VLAN list
* Flowcontrol & PFC
* Channel-group mode
* QoS parameters
* MAC learning disable
Related Commands
Notes
843
16.3.3.17 show interfaces port-channel load-balance
show interfaces port-channel load-balance
Default N/A
History 3.3.4000
source-destination-mac
Notes
Default N/A
History 3.1.1400
844
Example
-----------------------------------------------------------------------
Group Port- Type Member Ports
Channel
-----------------------------------------------------------------------
1 Po2(U) LACP Eth1/58(D) Eth1/59(I) Eth1/60(S)
2 Po5(D) LACP Eth1/1(S) Eth1/33(I)
3 Po10(U) LACP Eth1/49(P) Eth1/50(P) Eth1/51(S) Eth1/52(S)
Related Commands
Notes
845
switch (config) # show lldp local
LLDP is Enabled
Local global configuration
Chassis sub type: macAddress (4)
Chassis id: 00:11:22:33:44:55
System Name: "switch-111111"
System Description: my-system-description
Supported capabilities: B
Supported capabilities enabled: B
16.4.2 DCBX
Data Center Bridging (DCB) is an enabler for running the Ethernet network with lossless connectivity using priority-
based flow control and enhanced transmission selection. DCBX (exchange) complements the DCB implementation by
offering a dynamic protocol that communicates DCB attributes between peering endpoint. Onyx supports two versions
of DCBX TLVs running on top of LLDP:
• DCBX IEEE
• DCBX CEE
By default DCBX IEEE is enabled when LLDP is enabled. LLDP is enabled by default.
16.4.3.1 lldp
lldp
no lldp
846
Default Enabled
History 3.2.0300
Notes
Sets the delay in seconds from enabling the LLDP on the port until re-initialization will
be attempted.
The no form of the command sets the parameter to default.
Default 2
History 3.2.0300
Notes
847
16.4.3.3 lldp timer
Default 30
History 3.2.0300
Notes
Default 2
History 3.2.0300
848
Example switch (config)# lldp tx-delay 10
Notes The recommended value for the tx-delay is set by the following formula: 1 <= lldp tx-
delay <= (0.25 * lldp timer)
Default 2
History 3.2.0300
Notes The actual time-to-live value used in LLDP frames, can be expressed by the following
formula: TTL = min(65535, (lldpMessageTxInterval * lldpMessageTxHoldMultiplier)).
For example, if the value of lldpMessageTxInterval is 30, and the value of
lldpMessageTxHoldMultiplier is 4, then the value 120 is encoded in the TTL field in
the LLDP header.
849
Syntax Description med-tlv-select Enables LLDP media TLVs.
History 3.2.0300
850
sys-capabilities LLDP system capabilities TLV
Default all
History 3.2.0300
3.3.0000 Added “none” parameter
3.3.4302 Added “dcbx” parameter
3.3.4402 Added “dcbx-cee” parameter
Notes The management address is chosen according to the following criteria where 1 takes
priority over 2, and 2 takes priority over 3:
851
media- Enables Media Capabilities TLV
capabilities
Default Disabled
History 3.6.1002
Notes
protocol Protocol field in hexadecimal notation (e.g. ‘0x8906’ for FCoE,
‘0x8914’ for FIP)
852
History 3.3.4200
Notes
Default N/A
History 3.6.4006
Related Commands
Notes
853
Default N/A
History 3.2.0300
LLDP is Enabled
Related Commands
Notes
Default N/A
854
History 3.2.0300
Example
Related Commands
Notes
Displays LLDP remote information (remote device id, remote port id, remote system
name).
Default N/A
855
Configuration Mode Any command mode
History 3.6.3004
Example
Related Commands
Notes
Default N/A
856
Configuration Mode Any command mode
History 3.2.0300
Example
Related Commands
Notes
857
16.4.3.15 show lldp statistics global
show lldp statistics global
Default N/A
History 3.2.0300
Related Commands
Notes
show lldp timers
Default N/A
History 3.2.0300
858
Example switch (config)# show lldp timers
msg-tx-interval :30
tx-delay :2
tx-hold :4
tx-reinit-delay :2
Related Commands
Notes
show dcb application-priority
Default N/A
History 3.3.4200
Related Commands
Notes
16.5 VLANs
A Virtual Local Area Network (VLAN) is an L2 segment of the network which defines a broadcast domain and is
identified by a tag added to all Ethernet frames running within the domain. This tag is called a VLAN ID (VID) and can
be assigned a value of 1-4094.
Each port can have a switch mode of either:
859
• Access – access port is a port connected to a host. It can accept only untagged frames, and assigns them a default
configured VLAN (Port VLAN ID). On egress, traffic sent from the access port is untagged.
• Access-dcb – receives ingress untagged traffic but sends egress priority tag (VLAN ID = 0)
• Hybrid – hybrid port is a port connected to either switches or hosts. It can receive both tagged and untagged
frames and assigns untagged frames a default configured VLAN (Port VLAN ID). It receives tagged frames with
VLANs of which the port is a member (these VLANs’ names are allowed). On egress, traffic of allowed VLANs
sent from the Hybrid port is sent tagged, while traffic sent with PVID is untagged.
• Trunk – trunk port is a port connecting 2 switches. It accepts only tagged frames with VLANs of which the port
is a member. On egress, traffic sent from the Trunk port is tagged. By default, a Trunk port is, automatically, a
member on all current VLANs.
4. From within the interface context, configure the interface mode to Access.
5. From within the interface context, configure the Access VLAN membership.
2. Change back to config mode.
860
switch (config) # interface ethernet 1/22
switch (config interface ethernet 1/22) #
4. From within the interface context, configure the interface mode to Access.
5. From within the interface context, configure the Access VLAN membership.
4. From within the interface context, configure the interface mode to Trunk.
861
switch (config) # interface ethernet 1/35
switch (config interface ethernet 1/35) #
4. From within the interface context, configure the interface mode to Hybrid.
5. From within the interface context, configure the allowed VLAN membership.
16.5.5.1 vlan
History 3.1.1400
862
Notes Interfaces are not added automatically to VLAN unless configured with trunk or hybrid
mode with “all” option turned on.
16.5.5.2 name
name <vlan-name>
no name
History 3.1.1400
show vlan [id <vlan-id>]
Default N/A
863
History 3.1.1400
Notes
864
16.5.5.4 switchport mode
Syntax Description access Untagged port. 802.1q tagged traffic are filtered. Egress traffic is
untagged.
dot1q-tunnel Allows both tagged and untagged ingress Ethernet packets. Egress
packets are tagged with a second VLAN (802.1Q) header.
hybrid Both 802.1q tagged and untagged traffic is allowed on the port.
Default access
History 3.1.1400
865
Related Commands show vlan
show interfaces switchport
switchport access vlan
switchport [trunk | hybrid] allowed-vlan
switchport dot1q-tunnel qos-mode
vlan
Notes Switchport mode may be configured for a range of interfaces (interface <inf-type> <id-
range> switchport mode <type>)
Assigns QoS to the service provider’s traffic.
The no form of the command resets the parameter value to its default.
uniform Gives the service provider’s traffic the same QoS as the customer’s
traffic
Default pipe
History 3.4.3000
Role admin
866
Notes
Default 1
History 3.1.1400
867
Note • This command is not applicable for interfaces with port mode trunk
• Only one option (“access”, “access-dcb” or “hybrid”) is possible to configure on the
port, depending on the switchport mode of the port
• Access VLAN ID may be configured to a range of interfaces ( interface <inf-type>
<id-range> switchport access vlan <vlan-ID>)
• This command is not applicable for interfaces with port mode trunk
• In hybrid mode, access vlan is optional. Alternatively, use “access none” in order to
disable access vlan. In this case, all incoming untagged traffic will be dropped.
switchport {hybrid, trunk} allowed-vlan {<vlan> | add <vlan> | remove <vlan> all |
except <vlan> | none}
Default N/A
History 3.1.1400
868
Related Commands show vlan
show interfaces switchport
switchport access vlan
switchport mode
vlan
Note • This command is not applicable for interfaces with port mode access or access-dcb
• In order for the parameter “hybrid” or “trunk” to be available, the switchport mode
on the interface must be configured to either hybrid or trunk respectively
Default Disabled
History 3.6.1002
Note
869
16.5.5.9 show interfaces switchport
• ethernet <slot/port>
• port-channel <lag-id>
• mlag-port-channel <id>
Default N/A
History 3.1.1400
Example
-------------------------------------------------------------------
Interface Mode Access vlan Allowed vlans
-------------------------------------------------------------------
Eth1/1 access 1
Eth1/2 access 1
Eth1/6 access 1
Notes This command can accept an explicit interface or interface range (displays information
only for available interfaces)
870
differentiation. Therefore it is in the administrator’s interest to provide different QoS to the voice traffic and the data
traffic by placing the voice traffic on a different VLAN from the data traffic.
This can be achieved by configuring a voice VLAN on the desired switch port using LLDP-MED TLVs. Media
Endpoint Discovery (MED) TLVs allow the switch to apply certain policies by informing the remote media device to
configure itself using different TLV.
In this use-case scenario we employ the use of the network policy TLV, which is defined as per TIA-TR41. The network
policy TLV can be used to inform a specific VLAN to use for an application stream.
The OS allows the user to configure the VLAN for voice traffic. In the following figure, the user configures a voice
VLAN of 25 and the switch port has a PVID of 50. Therefore all the voice traffic is switched onto VLAN 25 and the
untagged packets from the terminal are switched into VLAN 50.
871
To verify LLDP-MED TLV configuration, run the following:
872
1. Create a VLAN.
4. (Optional) Change the PVID of the port so that untagged packets go to a different VLAN than the default.
873
switch (config)# show interface switchport
Interface Mode Access vlan Allowed vlans
-------------------------------------------------------------------------------
--
Eth1/1 access 1
Eth1/2 access 1
Eth1/3 access 1
Eth1/4 hybrid 300 200
Eth1/5 access 1
...
switch (config)# show lldp interface ethernet 1/4
TLV flags:
PD: port-description, SN: sys-name, SD: sys-description, SC: sys-capabilities,
MA: management-address
ETS-C: ETS-Configuration, ETS-R: ETS-Recommendation, AP: Application Priority,
PFC: Priority Flow Control
CEE: Converged Enhanced Ethernet DCBX version
MED-CAP: Media Capabilities
MED-NWP: MED-Network Policy
Interface Receive Transmit TLVs
-------------------------------------------------------------------------------
---------
Eth1/4 Enabled Enabled PD, SN, SD, SC, MA, PFC, AP, ETS-C, ETS-R, MED-
CAP, MED-NWP
switch (config)# show lldp interface ethernet 1/4 med-cap
Media Capabilities:
LLDP-MED Capab : Yes
Network Policy : Yes
Location Id : No
Ext Power MDI-PSE: No
Ext Power MDI-PD : No
Network Policy:
Application Type : 1 (Voice)
VLAN Id : 200
L2 Priority : 0
DSCP Value : 0
To remove voice VLAN and LLDP-MED TLV, take the following steps:
1. Remove the voice VLAN from the interface.
16.6.2 Limitations
1. LLDP MED cannot be enabled on a router port interface and vice versa (i.e. a port that has LLDP MED enabled
cannot be configured as a router port interface).
874
2. LLDP MED cannot be enabled on a LAG and vice versa (i.e. a port that has LLDP MED enabled cannot be
configured as a LAG).
3. If switchport is in trunk, dot1q-tunnel, or dcbx-access, configuring either the TLV or Voice VLAN gives a
warning message.
It is recommended to configure the port type for all ports connected to hosts as edge ports.
• normal – is assumed to be connected to a switch, thus it tries to be converged by the RSTP learning/forwarding.
However, if it does not receive any BPDUs, it is operationally moved to be edge.
• network – is assumed to be connected only to a switch or bridge.
Each of these configuration options is mutually exclusive.
Port type is configured using the command spanning-tree port type. It may be applied globally on the switch (Config)
level, which configures all switch interfaces. Another option is to configure ports individually by entering the interface’s
configuration mode.
875
• Global configuration:
• Interface configuration:
The loop guard configuration is only allowed on “network” and “normal” port types.
876
If loop guard is enabled and the port does not receive BPDUs, the port is put into an inconsistent state (blocking) until
the port starts to receive BPDUs again. A port in the inconsistent state does not transmit BPDUs. If BPDUs are received
again, loop guard alters its inconsistent state condition. STP converges to a stable topology without the failed link or
bridge after loop guard isolates the failure.
Disabling loop guard moves all loop-inconsistent ports to listening state.
To configure loop guard use the following command:
16.7.7 MSTP
Spanning Tree Protocol (STP) is a mandatory protocol to run on L2 Ethernet networks to eliminate network loops and
the resulting broadcast storm caused by these loops. Multiple STP (MSTP) enables the virtualization of the L2 domain
into several VLANs, each governed by a separate instance of a spanning tree which results in a network with higher
utilization of physical links while still keeping the loop free topology on a logical level.
Up to 64 MSTP instances can be configured on a switch.
16.7.8 RPVST
Rapid Per-VLAN Spanning Tree (RPVST) flavor of the STP provides finer-grained traffic by paving a spanning-tree
instance per each configured VLAN. Like MSTP, it allows a better utilization of the network links comparing to RSTP.
The following figure exhibits a typical RPVST network configuration to get a better utilization on the inter-switch trunk
ports.
877
16.7.8.1 RPVST and VLAN Limitations
When the STP of the switch is set to RPVST, spanning tree is set on each of the configured VLANs in the system by
default. To enable the spanning tree mode, the command “spanning-tree” must be run.
Each VLAN runs an STP state machine and an RPVST instance. There is a global limitation on the number of active
state machines that can operate in Onyx. Enforcement of this limitation is done through the maximum number of
VLANs allowed in the system (128).
The state machine takes attributes like forward time, hello time, max age and priority, etc.
When configuring priority on a VLAN in RPVST, the operational priority given to the VLAN is a summation
of what the user configured and the value of the VLAN itself. For example, running “spanning-tree vlan 10
priority 32768” yields a priority of 32778 for VLAN 10.
878
16.7.8.2 RPVST and RSTP Interoperability
RPVST domains can be interconnected by a standard 802.1Q domain that runs RSTP protocol. While the RSTP domain
builds a single common instance spanning tree, the RPVST domains at the edge continue to build a tree per VLAN
while exchanging tagged RPVST multicast BPDUs.
(This exchange may happen on untagged RPVST BPDUs as well.) The switch devices that are in the boundary between
the RPVST and the RSTP domains should be configured as RPVST mode.
When set to RPVST mode, the switch continues to run the common instance spanning tree (CIST) state machine on
VLAN 1 by exchanging IEEE BPDUs with the legacy RSTP switches.
To successfully connect RSTP and RPVST domains, the system administrator must align the native VLAN
configuration across all network switches, or in other words, the internal identification of untagged packets to VLAN.
16.7.9.1 spanning-tree
spanning-tree
no spanning-tree
879
History 3.1.0000
Notes
Default rst
History 3.3.4150
Example
880
Syntax Description forward-time Controls how fast a port changes its spanning tree state from Blocking
state to Forwarding state
Parameter range: 4-30 seconds
hello-time Determines how often the switch broadcasts its hello message to other
switches when it is the root of the spanning tree
Parameter range: 1-2 seconds
max-age Sets the maximum age allowed for the Spanning Tree Protocol
information learnt from the network on any port before it is discarded
Parameter range: 6-40 seconds
History 3.1.0000
Notes The following formula applies on the spanning tree timers: 2*(ForwardTime
-1)>=MaxAgeTime >= 2*(Hello Time + 1)
881
network Assumes all ports are connected to switches and bridges
normal The port type (edge or network) determines according to the spanning
tree operational mode
Default normal
History 3.1.0000
Notes
Syntax Description bridge-priority Sets the bridge priority for the spanning tree
Value must be in increments of 4096, starting from 0 (accepted values:
0, 4096, 8192, 12288, 16384, 20480, 24576, 28672, 32768, 36864,
40960, 45056, 49152, 53248, 57344, 61440)
Default 32786
History 3.1.0000
882
Related Commands show spanning-tree
Notes
Default 128
History 3.1.0000
Notes
883
Syntax Description port cost Sets the spanning tree cost of an interface.
Range: 0-200000000
• 1Gb/s 20000
• 10Gb/s 2000
• 40Gb/s 500
• 50Gb/s 400
• 100Gb/s 200
History 3.1.0000
Notes • LAG default cost is calculated by dividing the port speed by the number of active
links in UP state. For example: if there were 4 links in the LAG out of which only two
are in UP state, assuming the port speed is 10Gbps, the LAG cost will be 2000/2 =
1000.
• When configuring the cost for a LAG, the cost will be fixed to this configuration, no
matter what the number of active links (UP state) in the LAG is
• Unstable network may cause the LAG cost to change dynamically assuming the cost
parameter is not configured for anything else other than default
884
normal The port type (edge or network) determines according to the spanning
tree operational mode.
Default Globally defined by the command “spanning-tree port type <port-type> default”.
History 3.1.0000
Notes
885
root Enables root-guard on the interface.
If root-guard is enabled on the interface, the interface will never be
selected as root port.
History 3.1.0000
Notes
Configures spanning-tree BPDU filter on the interface. The interface will ignore any
BPDU that it receives and will not send PDBUs, The STP state on the port will move to
the forwarding state.
The no form of the command returns the configuration to default.
886
History 3.1.0000
Notes This command can be used when the switch is connected to hosts
Default N/A
History 3.1.0000
Notes
Specifies the max hop value inserts into BPDUs that sent out as the root bridge.
The no form of the command sets the parameter to its default value.
Default 20
History 3.3.4150
887
Example switch (config) # spanning-tree mst max-hops 20
Notes • The max hop setting determines the number of bridges in an MST region that a BPDU
can traverse before it is discarded
• This command is available when global STP mode is set to MST
Configures the specified instance’s priority number.
The no form of the command sets the parameter to its default value.
Default 32768
History 3.3.4150
Notes • The bridge priority is the four most significant digits of the bridge ID, which is used by
spanning tree algorithms to select the root bridge and choose among redundant links.
Bridge ID numbers range from 0-65535 (16 bits); bridges with smaller bridge IDs are
elected over other bridges.
• This command is available when global STP mode is set to MST
888
Syntax Description mst-instance MST instance
Range: 1-64
Default N/A
Configuration config
Mode
History 3.3.4150
Notes This command is available when global STP mode is set to MST
Default 0
Configuration config
Mode
History 3.3.4150
Notes • The revision number is one of three parameters, along with the MST name and VLAN-
to-instance map, that identify the switch’s MST region
• This command is available when global STP mode is set to MST
889
16.7.9.16 spanning-tree mst name
Default N/A
Configuration config
Mode
History 3.3.4150
Notes • The name is one of three parameters, along with the MST revision number and VLAN-
to-instance map, that identifies the switch’s MST region
• This command is available when global STP mode is set to MST
Changes the bridge priority for the specified MST instance to the following values:
• Primary – 8192
• Secondary – 16384
The no form of the command sets the parameter to its default value.
role Possible values: “primary” or “secondary”
Default primary
Configuration config
Mode
History 3.3.4150
890
3.7.1000 Updated example
Notes • The root command is a way to automate a system configuration while ‘playing’ with the
priority field. The priority field granularity may be too explicit for some users in case
you wish to have 2 levels of priority (primary and secondary). So by default all the
switches get the same priority and while using the root option you can get the role of
master and backup by setting the priority field to a predefined value.
• This command is available when global STP mode is set to MST
Default rst
History 3.3.4150
Notes This command is available when global STP mode is set to MST
891
16.7.9.19 spanning-tree mst cost
History 3.3.4150
Notes This command is available when global STP mode is set to MST
Configures how fast an interface changes its spanning tree state from Blocking to
Forwarding.
The no form of the command resets the parameter value to its default.
Default 15 seconds
892
Configuration Mode config
History 3.4.1100
Notes • The following formula applies on the spanning tree timers: 2*(ForwardTime
-1)>=MaxAgeTime >= 2*(Hello Time + 1)
• This command is available when global STP mode is set to RPVST
Configures how often the switch broadcasts its hello message to other switches when it is
the root of the spanning tree.
The no form of the command resets the parameter value to its default.
Default 2 seconds
History 3.4.1100
Notes • The following formula applies on the spanning tree timers: 2*(ForwardTime
-1)>=MaxAgeTime >= 2*(Hello Time + 1)
• This command is available when global STP mode is set to RPVST
893
16.7.9.22 spanning-tree vlan max-age
Sets the maximum age allowed for the Spanning Tree Protocol information learned from the
network on any port before it is discarded.
The no form of the command resets the parameter value to its default.
Default 20 seconds
History 3.4.1100
Notes
Default 32768
894
History 3.4.1100
Notes
show spanning-tree
Default N/A
History 3.1.0000
Example
895
switch (config) # show spanning-tree
Switch : ethernet-default
Spanning tree protocol rst : enabled
Spanning tree force version: 2
Root ID:
Priority: 32768
Address : 7c:fe:90:ff:2c:40
Bridge ID:
Priority : 32768
Address : 7c:fe:90:ff:2c:40
Hello Time (sec) : 2
Max Age (sec) : 20
Forward Delay (sec): 15
L: Loop Inconsistent
R: Root Inconsistent
G: BPDU Guard Inconsistent
-----------------------------------------------------------------------
Interface Role Sts Cost Prio Type
-----------------------------------------------------------------------
Eth1/7 Designated Discarding 200 128 normal
Eth1/8 Disabled Discarding(G) 200 128 edge
Notes • MLAG spanning-tree cost is always equal to the cost of there being 2 member ports in
the MLAG (even if one of the member ports fails or a new port is added)
• If a port is in BPDU Guard inconsistent mode, the interface status will move to "down
(suspended)".
Default N/A
896
Configuration Mode Any command mode
History 3.1.0000
Example
Notes
show spanning-tree interface {ethernet <slot>/<port> | port-channel <port-channel> | mlag-
port-channel <mlag-port-channel>
Default N/A
History 3.3.4150
897
Example switch (config) # show spanning-tree 1/2
Eth1/2 is Disabled Discarding
Port path cost 500, Port priority 128, Port
Identifier 128.5
Designated root has priority 0, address unknown
Designated bridge has priority 0, address unknown
Designated port id 0.0, designated path cost 0
Number of transitions to forwarding state: 0
Port type: normal
PortFast is: off
Bpdu filter: disabled
Bpdu guard: disabled
Loop guard: disabled
Root guard: disabled
Link type: point-to-point
BPDU: sent: 0 received: 0
Notes
Default N/A
898
History 3.3.4150
Example
MST0:
vlans mapped: 1-1023,1025-2047,2049-3071,3073-4094
L: Loop Inconsistent
R: Root Inconsistent
G: BPDU Guard Inconsistent
-----------------------------------------------------------------------
Interface Role Sts Cost Prio Type
-----------------------------------------------------------------------
Eth1/7 Designated Discarding 200 128.7 normal
Eth1/8 Disabled Discarding(G) 200 128.8 edge
Notes
Default N/A
History 3.3.4150
Example
899
switch (config) # show spanning-tree root
Instance Priority MAC addr Root Cost Hello Time Max Age
FWD Dly Root Port
------- ------ -------- --------- ---------- --------
------- ---------
MST0 32768 00:02:c9:71:ed:40 500 2 20 15
Eth1/20
MST1 32768 00:02:c9:71:f0:c0 0 2 20 15
-
MST2 0 00:02:c9:71:f0:c0 0 2 20 15
-
MST3 32768 00:02:c9:71:f0:c0 0 2 20 15
-
Notes
Default N/A
900
History 3.4.1100
Example
Switch ethernet-default
Spanning tree protocol is enabled
Bridge is executing the rpvst compatible Spanning Tree Protocol
Vlan 1:
Bridge Identifier priority: 32769
Bridge Identifier address: e4:1d:2d:3d:5e:c0
Configured hello time: 2, max age 20, forward delay 15
Current root: priority 32769, address e4:1d:2d:3d:5e:c0
Number of topology changes: 0, last change occurred 00:00:00 ago
Last TCN received from: N/A
Timers: hold 6 hello 2, max age 20, forward delay 15
Default port type: normal
Default bpdu filter: disabled
Default bpdu guard: disabled
Notes
Default N/A
History 3.6.4110
901
Example switch (config) # show spanning-tree vlan 50 topo-change-
history
Vlan 50
-------------------------------------
Interface Date Time
-------------------------------------
Eth1/49 07/18/17 04:39:58
Eth1/49 07/18/17 04:39:55
Eth1/49 07/18/17 04:38:11
Eth1/49 07/18/17 04:38:09
Notes
Default N/A
History 3.6.4110
Instance 5
-------------------------------------
Interface Date Time
-------------------------------------
Eth1/49 07/18/17 04:43:51
Eth1/49 07/18/17 04:43:33
902
Notes
Default N/A
History 3.6.4110
-------------------------------------
Interface Date Time
-------------------------------------
Eth1/49 07/27/17 09:39:38
Eth1/35 07/27/17 09:35:42
Eth1/35 07/27/17 09:35:40
Eth1/35 07/27/17 09:35:08
Eth1/35 07/27/17 09:35:06
Eth1/35 07/27/17 09:32:05
Eth1/35 07/27/17 09:32:03
Eth1/35 07/27/17 09:31:42
Eth1/35 07/27/17 09:31:40
Notes
903
mac-address-table static unicast <destination mac address> vlan <vlan identifier(1-40
94)> interface ethernet <slot>/<port>
For example:
Sets the maximum age of a dynamically learnt entry in the MAC address table.
The no form of the command resets the aging time of the MAC address table to its
default.
904
Syntax Description age 10-1000000 seconds
Default 300
History 3.1.0600
Notes
History 3.1.0600
905
Example switch (config) # mac-address-table static
aa:aa:aa:aa:aa:aa vlan 1 interface ethernet 1/7
Notes The no form of the command will not clear a dynamic MAC address. Dynamic MAC
addresses are cleared using the “clear mac-address-table dynamic” command.
mac-learning disable
no mac-learning disable
Default Enabled
History 3.1.0600
Related Commands
Notes • When adding a port to a LAG, the port needs to be aligned with the LAG’s
configuration
• When removing a port from a LAG, the port remains in whichever configuration the
LAG is in
• Disabling MAC learning is not supported on a local analyzer port.
• Disabling MAC learning is not supported on an IPL LAG.
906
16.8.3.4 clear mac-address-table dynamic
Default N/A
History 3.1.0600
Notes This command does not clear the MAC addresses learned on the mgmt0 port. Static
entries are deleted using the “no mac-address-table static” command.
Displays the static and dynamic unicast and multicast MAC addresses for the switch.
Various of filter options available.
907
unicast Filters the table to a unicast addresses only.
Default N/A
History 3.1.0600
Switch ethernet-default
Notes
908
Default N/A
History 3.1.0600
Notes MAC addresses learned on the mgmt0 is not shown by this command.
Default N/A
History 3.6.4006
909
Example switch (config) # show mac-address-table
---------------------------------------------------
Vlan Mac Address Type Port
---------------------------------------------------
1 E4:1D:2D:37:11:22 Static Eth1/1
1 E4:1D:2D:37:3E:11 Static Po5
Number of unicast: 2
Number of multicast: 0
Number of unicast: 1
Number of multicast: 0
Notes
Default N/A
History 3.8.1000
910
Example switch (config) # show mac-address-table interface nve 1
-----------------------------------------------------
Vlan Mac Address Type Port\Next Hop
-----------------------------------------------------
60 E4:1D:2D:37:11:22 Dynamic
Number of unicast(local): 1
Number of NVE: 1
show mac-address-table summary
Default N/A
History 3.6.2002
Notes
16.9 MLAG
911
A link aggregation group (LAG) is used for extending the bandwidth from a single link to multiple links and provide
redundancy in case of link failure. Extending the implementation of the LAG to more than a single device provides yet
another level of redundancy that extends from the link level to the node level. This extrapolation of the LAG from
single to multiple switches is referred to as multi-chassis link aggregation (MLAG). MLAG is supported on Ethernet
blades’ internal as well as external ports.
Each switch configuration is independent and it is user responsibility to make sure to configure both switches
similarly pertaining MLAG (e.g. MLAG port-channel VLAN membership, static MAC, ACL, etc).
A peered device (host or switch) connecting to switches running an MLAG runs a standard LAG and is unaware of the
fact that the LAG connects to two separate switches.
The MLAG switches share an inter-peer link (IPL) between them for carrying control messages in a steady state or data
packages in failure scenarios. Thus, the bandwidth of the IPL should be defined accordingly. The IPL itself can be a
LAG and may be constructed of links of any supported speed. In such a case, PFC must be configured on this IPL. The
figure in section ”Configuring MLAG” illustrates this. The IPL serves the following purposes:
• MLAG protocol control – keepalive messages, MAC sync, MLAG port sync, etc.
• MLAG port failure – serves redundancy in case of a fallen link on one of the MLAG switches
• Layer-3 failure – serves redundancy in case of a failed connection between the MLAG switches and the rest of
the L3 network should there be one
The IPL VLAN interface must be used only for MLAG protocol and must not be used by any other interfaces
(e.g. LAG, Ethernet).
Ports 21 and 22 are dedicated IPL ports for MLAG protocol on the SH2200 switch system.
912
• Keepalive
• Unicast and multicast sync
• MLAG port sync
When positioned at the top of rack (ToR) and connecting with a Layer-3 uplink, the MLAG pair acts as the L3 border
for the hosts connected to it. To allow default gateway redundancy, both MLAG switches should be addressed by the
host via the same default gateway address.
MLAG uses an IP address (VIP) that points to all MLAG member nodes.
When running MLAG as L2/L3 border point, an MAGP VIP must be deployed as the default GW for MLAG port-
channels (MPOs).
When MLAG is connected through a Layer-2 based uplink, there is no need to apply default gateway
redundancy towards hosts since this function is implemented on the L2/L3 border points of the network. For
more information, refer to the “MAGP” page.
The two peer switches need to carry the exact same configuration of the MLAG attributes for guaranteeing proper
functionality of the MLAG.
Ensuring that both switches are configured identically is the responsibility of the user and is not monitored by
the OS.
All nodes in an MLAG must be of the same CPU type (e.g. x86), switch type, and must all have the same OS
version installed.
When working with MLAG, the maximum number of MAC addresses is limited to 88K. Without it, there is no
limitation.
When transitioning from standalone into a group or vice versa, a few seconds are required for the node state to
stabilize. During that time, group feature commands (e.g. MLAG commands) should not be executed. To run
group features, wait for the CLI prompt to turn into [standalone:master], [<group>:master] or
[<group>:standby] instead of [standalone:*unknown*] or [<group>:*unknown*].
Each MLAG VIP group must be configured with a different unicast IP address. If not, MLAG behavior is
inconsistent.
In a scenario where there is no IP communication between the MGMT ports of the MLAG switches (for
example when one MGMT port is disconnected), the following CLI prompt is displayed: <hostname>[<mlag
cluster name>:unknown]#. This does not reflect the MLAG state, but only the state of the cluster.
913
It is recommended to configure IPL interface VLAN MTU to 9K.
MLAG master/slave roles take effect in fault scenarios such as split-brain, peer faults, and during software
upgrades.
The MLAG pair of switches periodically exchanges a keepalive message on a user configurable interval. If the
keepalive message fails to arrive for three consecutive intervals the switches break into two standalone switches. In such
a case, the remaining active switch begins to act as a standalone switch and assumes that its previously peering MLAG
switch has failed.
To avoid a scenario where failure on the IPL causes both MLAG peers to assume that their peer has failed, a safety
mechanism is maintained based on UDP packets running via the management plane which alerts both MLAG switches
that its peer is alive. In such case where keepalive packets are not received the slave shuts down its MLAG interfaces
and the master becomes a standalone switch in order to avoid misalignment in MLAG configuration.
914
When two tiers of MLAG pairs are used, each pair should be upgraded sequentially and not in parallel to
prevent traffic loops.
Protocol Description
Static MAC addresses Static MAC address are not synced between MLAG peers
LACP MPO supports all LACP modes (passive/active), but it is not a must. If
used, their configuration must be identical on each peer.
Spanning-tree protocol MPO spanning-tree configuration must be identical in both switches, and
other local ports’ spanning-tree configuration must be done when those
ports are down.
IGMP snooping IGMP snooping must be activated globally on both peers. IGMP snooping
attributes on the MPO must have identical configuration.
sFlow Supported
LLDP All attributes of a the MPO must be configured identically on both peers.
915
Protocol Description
PTP Not supported over MLAG IPL (not supported over LAG in general)
916
16.9.7.1 Configuring L2 MLAG
Prerequisites:
1. Enable IP routing. Run:
3. Enable QoS on the switch to avoid congestion on the IPL port. Run:
917
7. Configure MTU to 9K. Run:
The IPL IP address should not be part of the management network, it could be any IP address and
subnet that is not in use in the network. This address is not advertised outside the switch.
On SwitchA, run:
On SwitchB, run:
9. Map the VLAN interface to be used on the IPL and set the peer IP address (the IP address of the IPL port on the
second switch) of the IPL peer port. IPL peer ports must be configured on the same netmask.
On SwitchA, run:
On SwitchB, run:
10. (Optional) Configure a virtual IP (VIP) for the MLAG. MLAG VIP is important for retrieving peer information.
If you have a mgmt0 interface, the IP address should be within the subnet of the management interface.
Do not use mgmt1. The management network is used for keepalive messages between the switches.
The MLAG domain must be unique name for each MLAG domain. In case you have more than one
pair of MLAG switches on the same network, each domain (consist of two switches) should be
configured with different name.
On SwitchA, run:
On SwitchB, run:
11. (Optional) Configure a virtual system MAC for the MLAG. Run:
918
Creating an MLAG interface:
1. Create an MLAG interface for the host. Run:
Enabling MLAG:
1. Enable MLAG. Run:
When running MLAG as L2/L3 border point, MAGP VIP must be deployed as the default GW for
MPOs. For more information, refer to “MAGP”.
919
SX2 [master] (config)# show mlag
Admin status: Enabled
Operational status: Up
Reload-delay: 1 sec
Keepalive-interval: 30 sec
Upgrade-timeout: 60 min
System-mac: 00:00:5E:00:01:5D
MLAG Ports Configuration Summary:
Configured: 1
Disabled: 0
Enabled: 1
MLAG Ports Status Summary:
Inactive: 0
Active-partial: 0
Active-full: 1
MLAG IPLs Summary:
ID Group Vlan Operational Local Peer Up Time
Toggle Counter
Port-Channel Interface State IP address IP address
-------------------------------------------------------------------------------
---------------
1 Po1 1 Up 10.10.10.1 10.10.10.2 0 days
00:00:09 5
Peers state Summary:
System-id State Hostname
-----------------------------------
F4:52:14:2D:9B:88 Up <SX2>
F4:52:14:2D:9B:08 Up SX1
2. Examine the MLAG summary table. Run:
------------------------------------------------------------------------------
Group Type Local Peer
Port-Channel Ports Ports
(D/U/P/S) (D/P/S/I) (D/P/S/I)
------------------------------------------------------------------------------
1 Mpo2(U) Static Eth1/2(P) Eth1/2(P)
3. Examine the MLAG statistics. Run:
920
switch [my-vip: master] (config)# show mlag statistics
IPL 1:
Rx Heartbeat : 516
Tx Heartbeat : 516
Rx IGMP tunnel : 0
Tx IGMP tunnel : 0
RX XSTP tunnel : 0
TX XSTP tunnel : 0
RX mlag-notification : 0
TX mlag-notification : 0
Rx port-notification : 0
Tx port-notification : 0
Rx FDB sync : 0
Tx FDB sync : 0
RX LACP manager : 1
TX LACP manager : 0
• MLAG Commands
• protocol mlag
• mlag
• shutdown
• interface mlag-port-channel
• ipl
• ipl peer-address
• keep-alive-interval
• mlag-channel-group mode
• mlag-vip
• reload-delay
• system-mac
• upgrade-timeout
• show mlag
• show mlag-vip
• show interfaces mlag-port-channel
• show interfaces mlag-port-channel counters
• show interfaces mlag-port-channel summary
• show mlag statistics
921
16.9.9.1 protocol mlag
protocol mlag
no protocol mlag
History 3.3.4500
Related Commands
16.9.9.2 mlag
mlag
Default N/A
History 3.3.4500
922
Example switch (config) # mlag
Notes
16.9.9.3 shutdown
shutdown
no shutdown
Disables MLAG.
The no form of the command enables MLAG.
Default Disabled
History 3.3.4500
923
Default N/A
History 3.3.4500
16.9.9.5 ipl
ipl <ipl-id>
no ipl <ipl-id>
Default no ipl
History 3.3.4500
Notes • If a LAG is set as IPL, only the commands “no shutdown”, “no ipl” and “no interface
port-channel” become applicable
• A LAG interface set as IPL must have default LAG configuration, otherwise the set
is rejected. Force option can be used
924
16.9.9.6 ipl peer-address
Maps a VLAN interface to be used for an IPL LAG and sets the peer IP address of the
IPL peer port.
The no form of the command deletes a peer IPL LAG and unbinds this VLAN interface
from the IPL function.
Default N/A
History 3.3.4500
Notes • The subnet mask is the same subnet mask of the VLAN interface
• This VLAN interface should be used for IPL only
16.9.9.7 keep-alive-interval
keep-alive-interval <value>
no keep-alive-interval
Configures the interval during which keep-alive messages are issued between the
MLAG switches.
The no form of the command resets this parameter to its default value.
Default 1 second
925
Configuration Mode config mlag
History 3.3.4500
Default N/A
History 3.3.4500
926
Notes
16.9.9.9 mlag-vip
Default N/A
History 3.3.4500
Related Commands
Notes • This command is supported only by IPv4 address scheme. For management networks
that are IPv6-only, the mlag-vip cannot be configured.
• This IP address must be configured in one of the MLAG switches and must be in the
box management subnet
• Other switches in the MLAG must join the same domain name
927
16.9.9.10 reload-delay
reload-delay <value>
no reload-delay
Specifies the amount of time that MLAG ports are disabled after system reboot.
The no form of the command resets this parameter to its default value.
Default 30 seconds
History 3.3.4500
Related Commands
Notes • This interval allows the switch to learn the IPL topology to identify the master and
sync the MAC address before opening the MLAG ports
• This parameter must be similar in all MLAG peers
16.9.9.11 system-mac
system-mac <virtual-mac>
no system-mac <virtual-mac>
Default Default is calculated according to the MLAG-VIP name, using the base MAC as VRRP
MAC prefix (00:00:5E:00:01:xx) with the suffix hashed from the mlag-vip name 0...255.
928
History 3.4.2008
Related Commands
Notes This parameter must be configured the same in all MLAG peers
16.9.9.12 upgrade-timeout
upgrade-timeout <time>
no upgrade-timeout
Configures the time period during which an MLAG slave keeps its ports active while in
upgrading state.
The no form of the command resets the parameter value to its default.
Default 60
History 3.4.2008
Related Commands
Notes This parameter must be configured the same in all MLAG peers
show mlag
929
Syntax Description N/A
Default N/A
History 3.3.4500
3.4.2008 Updated example with system MAC and upgrade timeout
Example
930
SX2 (config)# show mlag
Inactive: 0
Active-partial: 0
Active-full: 1
Related Commands
Notes If run in the middle of an upgrade, the following message will appear in the output:
show mlag-vip
931
Default N/A
History 3.3.4500
------------------------------------------------------------
--
Hostname VIP-State IP Address
------------------------------------------------------------
--
SwitchA master 10.10.10.1
SwitchB standby 10.10.10.2
Related Commands
Notes
show interfaces mlag-port-channel [<if-number>]
Default N/A
932
History 3.3.4500
3.6.1002 Added “error packets” counter to Tx
3.6.6000 Added “forwarding mode” to output
Example
933
switch (config)# show interfaces mlag-port-channel 11
Mpo11:
Admin state : Disabled
Operational state : Down
Description : N/A
Mac address : N/A
MTU : 1500 bytes (Maximum packet size 1522 bytes)
lacp-individual mode: Disabled
Flow-control : receive off send off
Actual speed : N/A
Width reduction mode: Not supported
Switchport mode : access
MAC learning mode : Enabled
Forwarding mode : inherited cut-through
FCS Ingress : Enabled CRC check
FCS Egress : Enabled CRC recalculate
FCS Timestamping : Enabled
Rx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
0 discard packets by storm control
Tx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 hoq discard packets
934
Related Commands
Notes
Default N/A
History 3.6.1002
935
Example switch (config)# show interfaces mlag-port-channel 2-3
counters
Mpo2:
Rx
12 packets
0 unicast packets
12 multicast packets
0 broadcast packets
2700 bytes
0 packets of 64 bytes
0 packets of 65-127 bytes
12 packets of 128-255 bytes
0 packets of 256-511 bytes
0 packets of 512-1023 bytes
0 packets of 1024-1518 bytes
0 packets Jumbo
0 error packets
0 discard packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
Tx
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
152100000000 bytes
100000000 error packets
0 discard packets
0 pause packets
0 ECN marked packets
Mpo3:
...
Related Commands
show interfaces mlag-port-channel summary
936
Syntax Description N/A
Default N/A
History 3.3.4500
Port Flags:
D: Down
P: Up in port-channel (members)
S: Suspend in port-channel (members)
I: Individual
------------------------------------------------------------
---------
Group Type Local Peer
Port-Channel Ports
Ports
(D/U/P/S) (D/P/S/I) (D/
P/S/I)
------------------------------------------------------------
---------
1 Mpo61(D) LACP Eth1/4(I)
Eth1/3(S)
Related Commands
937
Notes • If a cluster is not available, the column “Peer Ports” shows “N/A”. If the cluster is
available but is not configured on the peer, the “Peer Ports” column shows nothing.
• If the system happens to be busy, peer ports may be unavailable and the following
prompt may appear in the output: “System busy and partial information is presented –
please try again later”
• The “I” flag indicates an interface which is part of a LAG and in individual state
• The “S” flag indicates an interface which is part of a LAG and in suspended state
show mlag statistics
Default N/A
History 3.3.4500
Related Commands
938
Notes
939
switch-1 (config) # interface ethernet 1/1 link state tracking group group1
switch-1 (config) # interface ethernet 1/2 link state tracking group group1
To verify Link State Tracking configuration, run:
Configures an interface’s link direction.
The no form of the command deletes the interface’s link direction configuration.
940
Default N/A
History 3.7.1000
Creates a link state tracking group if one does not exist, and if applied to a specific
interface, then it adds that interface to the group.
The no form of the command deletes a link state tracking group, and if applied to a
specific interface, then it removes that interface from the group.
Default N/A
Configuration Mode config config interface ethernet config interface port-channel config interface mlag-port-
channel
History 3.7.1000
941
16.10.2.3 link state tracking vlan
Creates a VLAN link state tracking group. All VLAN members are automatically added
into this group.
The no form of the command deletes a VLAN link state tracking group.
Default N/A
History 3.7.1000
Syntax Description group Displays link state tracking per tracking group
Default N/A
History 3.7.1000
Example
942
switch (config)# show link state tracking
-----------------------------------------------------------------------------
----------
Group Port Type Interface Admin Status
Operational Status
-----------------------------------------------------------------------------
----------
Vlan 100 Upstream Eth1/54 Enabled Down
Vlan 100 Downstream Eth1/1 Enabled Down (by
tracking)
Vlan 100 Unassigned Eth1/2 Enabled Up
Vlan 101 Upstream Eth1/54 Enabled Down
Vlan 101 Downstream Eth1/1 Enabled Down (by
tracking)
Vlan 101 Unassigned Eth1/2 Enabled Up
group1 Downstream Eth1/1 Enabled Down (by
tracking)
16.11 QinQ
A QinQ VLAN tunnel enables a service provider (SP) to segregate the traffic of different customers in their
infrastructure, while still giving the customer a full range of VLANs for their internal use by adding a second 802.1Q
VLAN tag to an already tagged frame.
So let us assume for example that an SP exists which needs to offer L2 connectivity to two corporations, “X” and “Y”,
that have campuses located in both “A”, “B”. All campuses run Ethernet LANs, and the customers intend to connect
through the SP’s L2 VPN network so that their campuses are in the same LAN (L2 network). Hence, it would be
desirable for “X”, “Y” to have a single LAN each in both “A”, “B” which could easily exceed the VLAN limit of 4096
of the 802.1Q specification.
C-VLAN is the VLAN tag assigned to the ingress traffic of a QinQ-enabled interface.
S-VLAN is the VLAN tag assigned to the egress traffic of a QinQ-enabled interface.
943
The S-VLAN tag is added regardless of whether the traffic is tagged or untagged. Traffic coming out from this
port, has the S-VLAN stripped from it.
4. Change its port VLAN ID (PVID). This configures the S-VLAN. Run:
944
switch (config interface port-channel 100) # show interface port-channel 100
Po100
Admin state: Enabled
Operational state: Up
Description: N\A
Mac address: 00:00:00:00:00:00
MTU: 1500 bytes(Maximum packet size 1522 bytes)
lacp-individual mode: Disabled
Flow-control: receive off send off
Actual speed: 1 X 40 Gbps
Width reduction mode: disabled
Switchport mode: dot1q-tunnel
QoS mode: uniform
MAC learning mode: Enabled
Last clearing of "show interface" counters : Never
60 seconds ingress rate: 0 bits/sec, 0 bytes/sec, 0 packets/sec
60 seconds egress rate: 0 bits/sec, 0 bytes/sec, 0 packets/sec
Rx
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 error packets
0 discard packets
Tx
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
6. Verify the configuration. Run:
945
16.11.3 QinQ Commands
Assigns QoS to the service provider’s traffic.
The no form of the command resets the parameter value to its default.
uniform Gives the service provider’s traffic QoS 0
Default pipe
History 3.4.3000
Notes
946
16.12.1 Configuring ACL
ACL is configured by the user and is applied to a port once the ACL search engine matches search criteria with a
received packet.
To configure ACL:
1. Create a MAC / IPv4 ACL (access-list) entity. Run:
947
Create an action profile and add vlan mapping action:
switch (config)# access-list action my-action
switch (config access-list action my-action)# vlan-map 20
switch (config access-list action my-action)# exit
Create an access list and bind rules:
switch (config)# mac access-list my-list
switch (config mac access-list my-list)# permit any any action my-action
switch (config mac access-list my-list)# exit
Bind an access-list to a port:
switch (config)# interface ethernet 1/1
switch (config interface ethernet 1/1)# mac access-list my-list
Only packets traversing the switch are logged. Packets that are passed to the CPU are not.
948
ACL Policy Protocol Keys Actions Supported Interfaces
Table (Ingress Bind Point
Only)
949
ACL Policy Protocol Keys Actions Supported Interfaces
Table (Ingress Bind Point
Only)
950
ACL Policy Protocol Keys Actions Supported Interfaces
Table (Ingress Bind Point
Only)
951
ACL Policy Protocol Keys Actions Supported Interfaces
Table (Ingress Bind Point
Only)
*The maximum number of rules that can be configured per ACL type depends on the system resources utilized
by the existing configuration. In order to reach the maximum number of rules, as defined in the table above,
disable IP routing.
• ACL Commands
• {ipv4/ipv6/mac/ipv4-udk/mac-udk} access-list
• policer
• bind-point rif
• remark
• shared-counter
• clear shared-counters
• clear counters
• {ipv4/ipv6/mac/ipv4-udk/mac-udk} access-list clear counters
• {ipv4/ipv6/mac/ipv4-udk/mac-udk} port access-group
• deny/permit (MAC ACL rule)
• deny/permit (IPv4 ACL rule)
• deny/permit (IPv4 TCP ACL rule)
• deny/permit (IPv4 TCP-UDP/UDP ACL rule)
• deny/permit (IPv4 ICMP ACL rule)
• deny/permit (IPv6 ACL rule)
• deny/permit (IPv6 TCP ACL rule)
952
• deny/permit (IPv6 TCP-UDP/UDP ACL rule)
• deny/permit (IPv6 ICMPv6 ACL rule)
• deny/permit (MAC UDK ACL rule)
• deny/permit (IPv4 UDK ACL rule)
• deny/permit (IPv4 TCP UDK ACL rule)
• deny/permit (IPv4 TCP-UDP/UDP UDK ACL rule)
• deny/permit (IPv4 ICMP UDK ACL rule)
• port access-group (IPv4/IPv4 UDK/IPv6/MAC/MAC UDK)
• access-list action
• access-list log
• vlan-map
• vlan-pop
• vlan-push
• show ipv4 access-lists
• show ipv4-udk access-lists
• show ipv6 access-lists
• show mac access-lists
• show mac access-lists summary
• show mac-udk access-lists
• show access-lists action
• show mac-udk access-lists
• show access-lists log config
• show access-lists policers (ipv4/ipv4-udk/ipv6/mac/mac-udk)
• show access-lists shared-counters (ipv4/ipv4-udk/ipv6/mac/mac-udk)
• show access-lists summary
• show access-lists log
• show access-lists log config
History 3.1.1400
953
Example switch (config)# mac access-list my-mac-list
switch (config mac access-list my-mac-list)#
16.12.6.2 policer
Syntax Description rate_value Policer rate value (of the bits, bytes, or packets)
Default is bits
k, m, g Rate/burst value units: kilo, mega, or giga—not mandatory.
Default Disabled
954
Configuration Mode config mac access-list
config ipv4 access-list
config ipv6 access-list
config ipv4-udk access-list
config mac-udk access-list
History 3.6.5000
Notes • This ACL policer is shared when this table is bound to two or more ports.
• The policer configuration will always be displayed in bytes
bind-point rif
no bind-point rif
Changes the ACL table bind point from L2 port mode to L3 port.
The no form of the command resets this parameter to its default.
Default L2 port
History 3.6.5000
955
Notes • The bind point may only be changed when an ACL table is empty (no rules) and
unbound
• This command is used to attach ACLs to interface VLANs only
16.12.6.4 remark
Default N/A
History 3.6.5000
Notes • The remark rule has a sequence number like standard rules and it can be displayed
when showing all rules of ACL table
• This rule has no effect on traffic and it is only for management purposes
16.12.6.5 shared-counter
shared-counter <counter-name>
no shared-counter <counter-name>
956
Default N/A
History 3.6.5000
Notes • When creating a new shared counter, it is created only in the scope of the ACL table
it has been initially created on and cannot be shared across multiple ACL tables
• A shared counter cannot be deleted when attached to rules
clear shared-counters [<counter-name>]
Default N/A
History 3.6.5000
957
Related Commands ipv4/ipv6/mac/ipv4-udk/mac-udk access-list
shared-counter
Notes
clear counters [<seq-number>]
Resets all counters (including shared counters) in ACL table or a specific counter.
Syntax Description seq-number The sequence number of the rule whose counter to reset
Default N/A
History 3.6.5000
Notes
Resets all counters (including shared counters) on all ACL tables of the same type.
Default N/A
958
Configuration Mode config mac access-list
config ipv4 access-list
config ipv6 access-list
config ipv4-udk access-list
config mac-udk access-list
History 3.6.5000
Notes
History 3.1.1400
959
Example switch (config interface ethernet 1/1) # mac port access-
group my-list
Notes The access control list should be defined prior to the binding action
Syntax sequence- Optional parameter to set a specific sequence number for the rule
Description number Range: 1-65535
<source- Sets source MAC and optionally sets a mask for that MAC. The “any” option
mac> will cause the rule not to check the source MAC.
mask
<mac_mas
k> | any
<dest- Sets destination MAC and optionally sets a mask for that MAC. The “any”
mac> option will cause the rule not to check the destination MAC.
mask
<mac_mas
k> | any
protocol Sets the Ethertype field value from the MAC address
Range: 0x0000-0xffff
960
vlan Sets the VLAN ID field
<vlan_id> Range: 1-4094
961
tc Mapping of matched traffic to TC
<tc_value> Range: 0-7
History 3.1.1400
Notes • VLAN and VLAN group cannot be used in the same command
• It is possible to attach the rule to a unique policer, or to create a policer only for the rule
• The policer configuration will always be displayed in bytes
• This ACL policer is shared when this table is bound to two or more ports.
962
16.12.6.11 deny/permit (IPv4 ACL rule)
Syntax sequence- Optional parameter to set a specific sequence number for the rule
Description number Range: 1-65535
{any | Sets source IP and optionally sets a mask for that IP address. The “any” option
<source- causes the rule to not check the source IP. Range: 0-255.
ip> mask
<ip>}
{any | Sets destination IP and optionally sets a mask for that IP. The “any” option
<destinati causes the rule to not check the destination IP.
on-ip>
mask
<ip>}
963
ttl Time to live ACL filter
Range: 0-3
History 3.1.1400
964
3.3.4302 Updated syntax description of mask <ip> parameter
Notes • User cannot attach a shared counter defined on a different ACL table
• The parameter shared-counter must be defined before attaching it to the scope of the ACL
table
• It is possible to attach the rule to a unique policer, or to create a policer only for the rule
• The policer configuration will always be displayed in bytes
• This ACL policer is shared when this table is bound to two or more ports.
[seq-number <sequence-number>] {deny | permit} tcp {<source-ip> mask <ip> | any} {<dest-
ip> mask <ip> | any} [src-port <src-port> | eq-source <src-port> | src-port-range <from> <to>]
[dest-port <dest-port> | eq-destination <dest-port> | dest-port-range <from> <to>] [action
<action-id>] [established | [ack {0 | 1}] [urg {0 | 1}] [rst {0 | 1}] [syn {0 | 1}] [fin {0 | 1}] [psh
{0 | 1}] [ns {0 | 1}] [ece {0 | 1}] [cwr {0 | 1}]] [log] [counter | shared-counter <name>] [ecn
<val>] [ttl <val>] [dscp <val>] [policer {<name> | [bytes | packets] rate <rate_value> [k | m |
g] [burst <burst_value> [k | m | g]]}
no <sequence-number>
Syntax sequence- Optional parameter to set a specific sequence number for the rule
Description number Range: 1-65535
965
permit Allow matching traffic to pass
<source- Sets source IP and optionally sets a mask for that IP address. The “any” option
ip> mask will cause the rule not to check the source IP.
<ip> | any
<dest-ip> Sets destination IP and optionally sets a mask for that IP. The “any” option will
mask <ip> cause the rule not to check the destination IP.
| any
establishe Matches flows which are in established state (“ack” or “rst” flags are set)
d
966
log Enables the log option
967
tc Mapping of matched traffic to TC
<tc_value Range: 0-7
>
History 3.1.1400
3.6.6000 Added ECN, TTL, DSCP, policer, and extra flag parameters
Example switch (config ipv4 access-list my-list)# permit tcp any any
src-port 200 dest-port-range 200 400 established
switch (config ipv4 access-list my-list)# permit tcp any any ns
0 policer packets rate 1 k burst 2050
968
16.12.6.13 deny/permit (IPv4 TCP-UDP/UDP ACL rule)
Syntax Description sequence- Optional parameter to set a specific sequence number for the rule
number Range: 1-65535
<source-ip> Sets source IP and optionally sets a mask for that IP address. The “any”
mask <ip> | option will cause the rule not to check the source IP.
any
<dest-ip> Sets destination IP and optionally sets a mask for that IP. The “any”
mask <ip> | option will cause the rule not to check the destination IP.
any
969
eq-destination TCP-UDP/UDP destination port number
<dest-port> Range: 0-65535
970
burst Sets burst to policer.
If no burst is configured, the default value for type “packets” is 100 and
for “bytes” is 10000.
For bits there is no default burst. Min value: 2000 bytes.
History 3.1.1400
Notes • It is possible to attach the rule to a unique policer, or to create a policer only for the
rule
• The policer configuration will always be displayed in bytes
• This ACL policer is shared when this table is bound to two or more ports.
971
16.12.6.14 deny/permit (IPv4 ICMP ACL rule)
Syntax Description sequence- Optional parameter to set a specific sequence number for the rule
number Range: 1-65535
<source-ip> Sets source IP and optionally sets a mask for that IP address. The “any”
mask <ip> | option will cause the rule not to check the source IP.
any
<dest-ip> Sets destination IP and optionally sets a mask for that IP. The “any”
mask <ip> | option will cause the rule not to check the destination IP.
any
972
dscp DSCP ACL filter. Value: 0-63.
History 3.1.1400
973
3.6.5000 Updated command syntax
Notes • ICMP code must be specified in conjunction with an ICMP type. If ICMP type is
specified but no ICMP code is specified, the rule matches all ICMP packets of the
given type
• If no ICMP type or code are specified, the rule matches all ICMP packets from the
specified source/destination address
• It is possible to attach the rule to a unique policer, or to create a policer only for the
rule
• The policer configuration will always be displayed in bytes
• This ACL policer is shared when this table is bound to two or more ports.
Syntax Description sequence- Optional parameter to set a specific sequence number for the rule
number Range: 1-65535
<src-ipv6>/ Sets source IP and optionally sets a mask for that IP address. The
<mask-len> | parameter “any” ignores the source IP.
any
974
<dest-ipv6>/ Sets destination IP and optionally sets a mask for that IP. The parameter
<mask-len> | “any” ignores the destination IP.
any
975
switch- Mapping of matched traffic to switch-priority
priority Range: 0-7
<switch-
priority_value
>
History 3.6.5000
Related Commands
976
16.12.6.16 deny/permit (IPv6 TCP ACL rule)
Syntax Description sequence- Optional parameter to set a specific sequence number for the rule
number Range: 1-65535
<source- Sets source IP and optionally sets a mask for that IP address. The “any”
ipv6> / option will cause the rule not to check the source IP.
<mask-len> |
any
<dest-ipv6> / Sets destination IP and optionally sets a mask for that IP. The “any”
<mask-len> | option will cause the rule not to check the destination IP.
any
977
action Action needs to be defined before attaching to rule
established Matches flows which are in established state (“ack” or “rst” flags are
set)
978
burst Sets burst to policer.
If no burst is configured, the default value for type “packets” is 100
and for “bytes” is 10000.
For bits there is no default burst. Min value: 2000 bytes.
History 3.6.5000
Related Commands
979
16.12.6.17 deny/permit (IPv6 TCP-UDP/UDP ACL rule)
Syntax Description sequence- Optional parameter to set a specific sequence number for the rule
number Range: 1-65535
<source- Sets source IP and optionally sets a mask for that IP address. The “any”
ipv6> / option will cause the rule not to check the source IP.
<mask-len> |
any
<dest-ipv6> / Sets destination IP and optionally sets a mask for that IP. The “any”
<mask-len> | option will cause the rule not to check the destination IP.
any
980
action Action needs to be defined before attaching to rule
981
switch- Mapping of matched traffic to switch-priority
priority Range: 0-7
<switch-
priority_value
>
History 3.6.5000
Related Commands
982
Syntax Description sequence- Optional parameter to set a specific sequence number for the rule
number Range: 1-65535
<source- Sets source IP and optionally sets a mask for that IP address. The “any”
ipv6> / option will cause the rule not to check the source IP.
<mask-len> |
any
<dest- Sets destination IP and optionally sets a mask for that IP. The “any”
ipv6> / option will cause the rule not to check the destination IP.
<mask-len> |
any
983
policer Attaches shared policer to a rule
History 3.6.5000
984
Example switch (config ipv6 access-list my-list) # permit icmpv6
any any eq-code 10 eq-type 155
Related Commands
Syntax Description sequence- Optional parameter to set a specific sequence number for the rule
number Range: 1-65535
<source- Sets source MAC and optionally sets a mask for that MAC. The “any”
mac> mask option will cause the rule not to check the source MAC.
<mac-mask>
| any
<dest-mac> Sets destination MAC and optionally sets a mask for that MAC. The
mask <mac- “any” option will cause the rule not to check the destination MAC.
mask> | any
protocol Sets the Ethertype filed value from the MAC address
Range: 0x0000-0xffff
985
cos Sets the COS (priority bit) field
Range: 0-7
udk UDK name must be set by user before the rule configuration
986
burst Sets burst to policer.
If no burst is configured, the default value for type “packets” is 100
and for “bytes” is 10000.
For bits there is no default burst. Min value: 2000 bytes.
History 3.6.5000
Related Commands
Notes • User cannot attach a shared counter defined on a different ACL table
• The parameter shared-counter must be defined before attaching it to the scope of the
ACL table
• UDK fields must come at the end of the rule configuration
• The default mask is 0xff-0xffffffff (depends on value length)
• UDK cannot be deleted while it is attached to a rule
• 1-4 UDKs per rule may be configured
• Values and masks of the UDK can be decimal or hexadecimal
• It is possible to attach the rule to a unique policer, or to create a policer only for the
rule
• The policer configuration will always be displayed in bytes
• This ACL policer is shared when this table is bound to two or more ports.
987
16.12.6.20 deny/permit (IPv4 UDK ACL rule)
Syntax Description sequence- Optional parameter to set a specific sequence number for the rule
number Range: 1-65535
{any | Sets source IP and optionally sets a mask for that IP address. The
<source-ip> “any” option causes the rule to not check the source IP. Range: 0-255.
mask <ip>}
{any | Sets destination IP and optionally sets a mask for that IP. The “any”
<destination- option causes the rule to not check the destination IP.
ip> mask
<ip>}
udk UDK name must be set by user before the rule configuration
988
mask Mask for the UDK value
989
Configuration Mode config ipv4 acl
History 3.6.5000
Notes • User cannot attach a shared counter defined on a different ACL table
• The parameter shared-counter must be defined before attaching it to the scope of the
ACL table
• UDK fields must come at the end of the rule configuration
• The default mask is 0xff-0xffffffff (depends on value length)
• UDK cannot be deleted while it is attached to a rule
• 1-4 UDKs per rule may be configured
• Values and masks of the UDK can be decimal or hexadecimal
• It is possible to attach the rule to a unique policer, or to create a policer only for the
rule
• The policer configuration will always be displayed in bytes
• This ACL policer is shared when this table is bound to two or more ports.
Syntax Description sequence- Optional parameter to set a specific sequence number for the rule
number Range: 1-65535
990
deny Drop all matching traffic
<source-ip> Sets source IP and optionally sets a mask for that IP address. The “any”
[mask <ip>] option will cause the rule not to check the source IP.
| any
<dest-ip> Sets destination IP and optionally sets a mask for that IP. The “any” option
[mask <ip>] will cause the rule not to check the destination IP.
| any
established Matches flows which are in established state (“ack” or “rst” flags are set)
991
log Enables the log option
udk UDK name must be set by user before the rule configuration
992
burst Sets burst to policer.
If no burst is configured, the default value for type “packets” is 100 and for
“bytes” is 10000.
For bits there is no default burst. Min value: 2000 bytes.
History 3.6.5000
Example switch (config ipv4 access-list my-list)# permit tcp any any
src-port 200 dest-port-range 200 400 established
Notes • UDK fields must come at the end of the rule configuration
• The default mask is 0xff-0xffffffff (depends on value length)
• UDK cannot be deleted while it is attached to a rule
• 1-4 UDKs per rule may be configured
• It is possible to attach the rule to a unique policer, or to create a policer only for the rule
• The policer configuration will always be displayed in bytes
• This ACL policer is shared when this table is bound to two or more ports.
993
16.12.6.22 deny/permit (IPv4 TCP-UDP/UDP UDK ACL rule)
Syntax Description sequence- Optional parameter to set a specific sequence number for the rule
number Range: 1-65535
<source-ip> Sets source IP and optionally sets a mask for that IP address. The “any”
mask <ip> | option will cause the rule not to check the source IP.
any
<dest-ip> Sets destination IP and optionally sets a mask for that IP. The “any”
mask <ip> | option will cause the rule not to check the destination IP.
any
994
eq- TCP-UDP/UDP destination port number
destination Range: 0-65535
<dest-port>
udk UDK name must be set by user before the rule configuration
995
rate Policer rate value
Range: 100-1000000000000
History 3.6.5000
996
Notes • UDK fields must come at the end of the rule configuration
• The default mask is 0xff-0xffffffff (depends on value length)
• UDK cannot be deleted while it is attached to a rule
• 1-4 UDKs per rule may be configured
• It is possible to attach the rule to a unique policer, or to create a policer only for the
rule
• The policer configuration will always be displayed in bytes
• This ACL policer is shared when this table is bound to two or more ports.
Syntax Description sequence- Optional parameter to set a specific sequence number for the rule
number Range: 1-65535
<source-ip> Sets source IP and optionally sets a mask for that IP address. The
mask <ip> | “any” option will cause the rule not to check the source IP.
any
<dest-ip> Sets destination IP and optionally sets a mask for that IP. The “any”
mask <ip> | option will cause the rule not to check the destination IP.
any
997
counter Attaches a unique counter to rule
udk UDK name must be set by user before the rule configuration
998
switch- Mapping of matched traffic to switch-priority
priority Range: 0-7
<switch-
priority_value
>
History 3.6.5000
Notes • ICMP code must be specified in conjunction with an ICMP type. If ICMP type is
specified but no ICMP code is specified, the rule matches all ICMP packets of the
given type.
• If no ICMP type or code are specified, the rule matches all ICMP packets from the
specified source/destination address.
• UDK fields must come at the end of the rule configuration
• The default mask is 0xff-0xffffffff (depends on value length)
• UDK cannot be deleted while it is attached to a rule
• 1-4 UDKs per rule may be configured
• It is possible to attach the rule to a unique policer, or to create a policer only for the
rule
• The policer configuration will always be displayed in bytes
• This ACL policer is shared when this table is bound to two or more ports.
999
16.12.6.24 port access-group (IPv4/IPv4 UDK/IPv6/MAC/MAC UDK)
Default N/A
History 3.6.5000
Notes • Only ACL tables with bind-point set to RIF can be attached to a VLAN interface
• Interface VLAN must be configured before binding operation
Creates access-list action profile and entering the action profile configuration mode.
The no form of the command deletes the action profile.
Default N/A
1000
History 3.2.0230
Related Commands
Notes
Default N/A
History 3.6.5000
Related Commands
1001
Notes • The packet number in syslog configuration must not be greater than the maximal
packets number in memory
• When configuring interval, the interval will restart resulting in a log dump to syslog
and memory clear
16.12.6.27 vlan-map
vlan-map <vid>
no vlan-map
Adds action to map a new VLAN to the packet (in the ingress port or VLAN).
The no form of the command removes the action to map a new VLAN.
Default N/A
History 3.2.0230
Related Commands
Notes
16.12.6.28 vlan-pop
vlan-pop
Default N/A
1002
History 3.4.3000
Related Commands
Notes
16.12.6.29 vlan-push
vlan-push <vid>
Default N/A
History 3.4.3000
Related Commands
Notes
1003
Default N/A
History 3.1.1400
Example
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
-------------------------------------------------
seq-number p/d protocol s-ipv4 d-ipv4 sport/
type end-sport dport/code end-dport tcp-control action counter
Packets ttl ecn dscp policer log
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
-------------------------------------------------
10 permit ip any any any
none any none N/A none N/A N/
A none none none none NO
20 permit ip any any any
none any none N/A none N/A N/
A none none none YES NO
Notes
1004
Syntax Description access-list-name ACL name
Default N/A
History 3.6.5000
Example
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
--------------------------------------------------------------------------
seq-number p/d protocol s-ipv4 d-ipv4 sport/type
end-sport dport/code end-dport tcp-control action counter
Packets udk ttl ecn dscp policer log
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
--------------------------------------------------------------------------
7 permit tcp any any any
none any none any none N/A N/
A none none none none NO
8 deny tcp 1.1.1.1/32 any any
none any none -U +F none N/A N/
A aaa value 5 none none none none NO
10 permit tcp 1.1.1.1/32 2.2.2.2/32 any
none any none +P-R none N/A N/
A bbb value 6 mask 0x8 none none none none NO
Notes
1005
16.12.6.32 show ipv6 access-lists
Default N/A
History 3.6.5000
Example
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
-------------------------------------------------
seq-number p/d protocol s-ipv6 d-ipv6 sport/
type end-sport dport/code end-dport tcp-control action counter
Packets ttl ecn dscp policer log
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
-------------------------------------------------
10 permit ip any any any
none any none N/A none N/A N/
A 33 none none none YES
20 permit ip any any any
none any none N/A none N/A N/
A none none none none NO
30 permit ip any any any
none any none N/A none N/A N/
A none none none none NO
1006
Notes
Default N/A
History 3.1.1400
Example
-----------------------------------------------------------------------------
---------------------------------------------------------------------
seq-number p/d smac dmac protocol cos
vlan vlan-mask action counter Packets policer log
-----------------------------------------------------------------------------
---------------------------------------------------------------------
10 permit any any any any
any N/A none N/A N/A roe NO
{ipv4/ipv4-udk/ipv6/mac/mac-udk} access-list
1007
Notes
Default N/A
History 3.6.8100
Example
-----------------------------------------------------------------------------
-----------
Table type Table Name Bind Point Total entries Bound to
interfaces
-----------------------------------------------------------------------------
-----------
mac mac1 port 1 Eth1/16
Notes
1008
Default N/A
History 3.6.5000
Example
-----------------------------------------------------------------------------
-----------------------------------------------------
seq-number p/d smac dmac protocol cos vlan vlan-mask
action counter Packets udk policer log
-----------------------------------------------------------------------------
----------------------------------------------------
10 permit any any any any any N/A
none N/A 0 YES NO
20 permit any any any any any N/A
none N/A N/A none NO
Notes
Syntax Description action- Filter the table according to the action profile name
profile-name
1009
Default N/A
History 3.2.0230
Related Commands
Notes
Default N/A
History 3.6.5000
Example
1010
switch (config) # show mac-udk access-lists my-list
-----------------------------------------------------------------------------
---------------------------------------------------
seq-number p/d smac dmac protocol cos vlan vlan-mask
action counter Packets udk policer log
-----------------------------------------------------------------------------
---------------------------------------------------
10 permit any any any any any N/A
none N/A 0 YES NO
20 permit any any any any any N/A
none N/A N/A none NO
Notes
Syntax Description action-profile- Filter the table according to the action profile name
name
Default N/A
History 3.2.0230
1011
Example switch (config)# show access-lists log config
Related Commands
Notes
Default N/A
History 3.6.5000
Example
-----------------------------------------------------------------
Name Type Rate Burst Sequence Number
-----------------------------------------------------------------
pol packets 1000 200 50,60,70
rom packets 1000 200 80
N/A bytes 12345 20000 40
1012
Related Commands
Notes
Default N/A
History 3.6.5000
Example
-------------------------------------------------
counter packets total Rules rule IDs
-------------------------------------------------
cnt1 0 3 20 30 40
cnt2 0 2 50 60
cnt3 0 1 70
Related Commands
Notes • For each configured shared counter it also displays the counter value (packets), the
number of rules attached to this counter and the rule IDs
• Up to 5 rule IDs are displayed even though there is no limitation on how many rules
can be attached to a counter
1013
16.12.6.41 show access-lists summary
Displays the summary of number of rules per ACL, and the interfaces attached.
Default N/A
History 3.1.1400
Example
-----------------------------------------------------------------------------
------
Table type Table Name Bind type Total entries Bound to
interfaces
-----------------------------------------------------------------------------
------
mac aaa port 0 Mpo55
ipv4 ddd port 1 Eth1/3, Po1
ipv4 ggg rif 0 VlanIf555
ipv6 table1 port 9 Eth1/9
Related Commands
Notes
1014
Default N/A
History 3.6.5000
Example
Related Commands
Notes
1015
Syntax Description N/A
Default N/A
History 3.6.5000
Related Commands
Notes
1016
Once a match was found, the rule action is executed. If no match is found, the default policy of the chain shall apply.
2. Append filtering rules to the list or set a specific rule number, select a target, and (optional) any additional filter
conditions. For example, run:
switch (config)# ip filter chain input rule append tail target rate-limit 2
protocol udp
switch (config)# ip filter chain input rule set 2 target drop protocol icmp in-
intf mgmt1
switch (config)# ip filter chain output rule append tail target drop protocol
icmp
3. Enable IP table filtering. Run:
4. Verify IP table filtering configuration. Run:
1017
switch (config) # show ip filter configured
Packet filtering for IPv4: enabled
IPv4 configuration:
Chain 'input' Policy 'accept':
Rule 1:
Target : rate-limit 2 pps
Protocol : udp
Source : all
Destination : all
Interface : all
State : any
Other Filter: -
Rule 2:
Target : drop
Protocol : icmp
Source : all
Destination : all
Interface : mgmt1 (ingress)
State : any
Other Filter: -
Chain 'output' Policy 'accept':
Rule 1:
Target : drop
Protocol : icmp
Source : all
Destination : all
Interface : all
State : any
Other Filter: -
switch (config) # ip filter chain input rule modify 3 target reject-with icmp6-adm-
prohibited source-addr 10::0 /126
1018
switch (config) # ip filter chain input rule 2 set target drop protocol tcp dest-port
22 in-intf mgmt1
Rate-limit is implemented with an average rate and a burst-limit. Rate values are specified in pps and take a
range from 1-1000 pps. For rate values in the range 1-100, the burst value is set equal to the rate value. For
rate values in the range 101-1000, the burst limit is set to 100.
Enables IP filtering.
The no form of the command disables IP filtering.
Default Disabled
History 3.5.1000
Related Commands
Notes It is recommended to run this command only after configuring all of the IP table filter
parameters.
1019
16.13.2.2 ip filter chain policy | ipv6 filter chain policy
Configures default policy for a specific chain (if no rule matches this default policy action
shall apply).
The no form of the command resets default policy for a specific chain.
Syntax Description chain_name Selects a chain for which to add or modify a filter:
History 3.5.1000
Related Commands
Notes
16.13.2.3 ip filter chain rule target | ipv6 filter chain rule target
{ip | ipv6} filter chain <chain_name> rule <oper> target <target> [<param>]
no {ip | ipv6} filter chain <chain_name> rule {<number> | all}
1020
rule • append tail – appends operation to the bottom of operation list
• insert <oper_num> – inserts operation at specified position (existing
operation at that position moves back in the list)
• modify <oper_num> – modifies existing operation at specified position.
Only the parameters specified in this invocation are altered; everything
else is left untouched.
• move <oper_num1> to <oper_num2> – moves one operation to another
place in the operation list
• set <oper_num> – sets operation at specified position (overwrites
existing)
target • accept – allows the packets that match the rule into the management
plane
• drop – drops packets that match the rule
• rate-limit – allows with rate limiting in packets per sec (PPS)
• reject-with – drops the packet and replies with an ICMP error message
param • comment <text> – specifies description string for this rule (60 chars
max)
• dest-addr <ip> – IP matching a specific destination address or address
range. A specific IPv4 address can be provided or an entire subnet by
giving an address along with netmask in dot notation or as a CIDR
notation (e.g.
/24).
• not-dest-addr <ip> – IP not matching a specific destination address
range
• dest-port <port(s)> – matching a specific destination port or port range
• not-dest-port <port(s)> – port not matching a specific destination port or
port range
• dup-delete – deletes any preexisting duplicates of this rule
• in-intf – interface matching a specific inbound interface
• not-in-intf <if_name> – interface not matching a specific inbound
interface
• out-intf <if_name> – matches a specific outbound interface
• not-out-intf <if_name> – interface not matching a specific outbound
interface
1021
param4 • protocol <if_name> – matches a specific protocol
(cont.) • tcp
• udp
• icmp
• all
• not-protocol <protocol> – does not match a specific protocol
• tcp
• udp
• icmp
• all
• source-addr <ip> – matches a specific source address range
• not-source-addr <ip> – does not match a specific source address range
• source-port <port(s)> – matches a specific source port or port range
• not-source-port <port(s)> – does not match a specific source port or port
range
• state – matches packets in a particular state. Possible values:
• established – packet associated with an established connection which
has seen traffic in both directions
• related – packet that starts a new connection but is related to an existing
connection
• new – packet that starts a new, unrelated connection
• A combination can be entered separated by commas
Default N/A
Configuration config
Mode
History 3.5.1000
Example switch (config) # ipv6 filter enable chain input rule append
tail target drop state related protocol all dup-delete
Related
Commands
Notes • The source and destination ports may each be either a single number, or a range specified
as “<low>-<high>”. For example: “10-20” would specify ports 10 through 20 (inclusive).
• The port parameter only works in conjunction with TCP and UDP
• Setting a “positive” rule removes any corresponding “not-” rules, and vice-versa
• The “state” parameter is a classification of the packet relative to existing connections
• If TCP or UDP are selected for the “protocol” parameter, source and/or destination ports
may be specified. If ICMP is selected, these options are either ignored, or an error is
produced.
1022
16.13.2.4 ip filter options include-bridges
{ip | ipv6} filter options include-bridges
no {ip | ipv6} filter options include-bridges
Default Disabled
History 3.5.1000
Related Commands
Notes
show ip filter
Default N/A
History 3.6.6000
1023
Example switch (config) # show ip filter
Related Commands
Notes
Default N/A
History 3.6.6000
1024
Example Destination : 1.1.1.0/24
Interface : all
State : any
Other Filter: -
Related Commands
Notes
Default N/A
History 3.6.6000
1025
Example switch (config) # show ip filter configured
IPv4 configuration:
Chain 'input' Policy 'accept':
Rule 1:
Target : accept
Protocol : all
Source : all
Destination : 1.1.1.0/24
Interface : all
State : any
Other Filter: -
Related Commands
Notes
Default N/A
History 3.6.6000
1026
Example switch (config) # show ipv6 filter
Related Commands
Notes
Default N/A
History 3.6.6000
1027
Example switch (config) # show ipv6 filter all
Related Commands
Notes
Default N/A
History 3.6.6000
1028
Example switch (config) # show ipv6 filter configured
IPv6 configuration:
Chain 'input' Policy 'accept':
Rule 1:
Target : accept
Protocol : all
Source : all
Destination : 1.1.1.0/24
Interface : all
State : any
Other Filter: -
Related Commands
Notes
An extraction point may be defined for each packet type in a UDK. For each extraction point, an offset (from the
beginning of the extraction) is defined.
To be able to modify a UDK after attaching it to an ACL rule, it is first necessary to un-match the UDK from the ACL,
and then change the match mode of the UDK to none using the command “no udk match mode”.
Defining a UDK affects the throughput for packets equal or smaller than 128 bytes.
1029
switch (config) # udk ipv4_udk
switch (config udk ipv4_udk) # exit
2. Set user defined key ipv4_udk to match on IPV4 header in offset 4 bytes from start of header. Run:
switch (config) # udk ipv4_udk extraction point mode l3 packet type ipv4
extraction point start-of-header offset 4
3. Set the len (in bytes) of the field to match on. Run:
4. Set the user defined key to work with access list. Run:
6. Set new rule on the access list table with the previously defined user defined key to match 0x1234. Run:
16.14.2.1 udk
udk <udk-name>
no udk <udk-name>
udk-name String
Syntax Description
Default N/A
1030
Configuration Mode config
History 3.6.5000
Related Commands
Notes Defining UDK affects the throughput for packets equal or smaller than 128 bytes.
• acl
• all
• ecmp
Default None
History 3.6.5000
Notes
1031
16.14.2.3 extraction point
extraction point mode <mode> [packet type <type> [extraction point <point> [offset
<offset>]]]
• l2
• l3
• l4
packet type Sets user defined key packet type. Possible values:
• For L2: l2
• For L3: arp; ipv4; ipv6
• For L4: udp
extraction Sets user defined key extraction point. Possible values for:
point
• l2: l2-ether-type; start-of-header
• arp: start-of-header
• ipv4; ipv6: start-of-header; start-of-payload
• udp: start-of-payload
Default Mode: l3
Default extraction point per packet type:
L2: start-of-header
ARP; IPv4; IPv6: start-of-header
UDP: start-of-payload
Offset: 0
History 3.6.5000
1032
Notes
16.14.2.4 len
len <length>
Default 4
History 3.6.5000
Notes
show udk [<udk-name>]
Default N/A
History 3.6.5000
1033
Example switch (config)# show udk
Notes
16.15 OpenFlow
Onyx supports OpenFlow 1.3. OpenFlow is a network protocol that facilitates direct communication between network
systems via Ethernet. Software Defined Networks (SDN) allows a centralist management of network equipment.
OpenFlow allows the SDN controller to manage SDN equipment. The OpenFlow protocol allows communication
between the OpenFlow controller and OpenFlow agent.
OpenFlow is useful to manage switches and allow applications running on the OpenFlow controller to have access to
the switch’s data path and provide functionality such as flow steering, security enhancement, traffic monitoring and
more.
The OpenFlow controller communicates with the OpenFlow switch over secured channel using OpenFlow protocol.
An OpenFlow switch contains a flow table which contains flows inserted by the OpenFlow controller. And the
OpenFlow switch performs packet lookup and forwarding according to those rules.
OpenFlow switch implementation is based on the hybrid model, allowing the coexistence of an OpenFlow pipeline and
a normal pipeline. In this model, a packet is forwarded according to OpenFlow configuration, if such configuration is
matched with the packet parameters, otherwise the packet is handled by the normal (regular forwarding/routing)
pipeline. Onyx allows configuring regular switch port and port-channel ports to be in hybrid mode (this is relevant to
regular switch ports, port-channel switch ports, regular router ports and port-channel router ports).
The OpenFlow specification defines:
“OpenFlow-hybrid switches support both OpenFlow operation and normal Ethernet switching operation, i.e.
traditional L2 Ethernet switching, VLAN isolation, L3 routing (IPv4 routing, IPv6 routing...), ACL and QoS processing.
Those switches must provide a classification mechanism outside of OpenFlow that routes traffic to either the
OpenFlow pipeline or the normal pipeline. For example, a switch may use the VLAN tag or input port of the packet to
decide whether to process the packet using one pipeline or the other, or it may direct all packets to the OpenFlow
pipeline.”
Utilizing the built-in capabilities of the hybrid switch/router is the main benefit of the hybrid mode. It increases network
performance and efficiency – faster processing of new flows as well as lower load on the controllers. The hybrid switch
processes non-OpenFlow data through its local management plane and achieve better efficiency and use of resources,
compared to the pure OpenFlow switch.
• Flow Table
• OpenFlow 1.3 Workflow
• Configuring OpenFlow
• Configuring Flows Using CLI Commands
1034
• Configuring Secure Connection to OpenFlow
• OpenFlow Commands
The OpenFlow (OF) pipeline is deployed in parallel to the usual Onyx® pipeline.
The ingress port must be deployed in hybrid mode so as to serve both the OF and normal Onyx pipeline.
1035
The ingress packet, which passes the VLAN and Spanning Tree filters and is a match to the user ACL table, either
progresses to the regular Onyx flow or the OpenFlow pipeline depending on the port coupling.
The following table presents a general summary of the capabilities of the OpenFlow 1.3 pipeline. They are also
described further on in the document.
1036
16.15.2.1 ACL Rule Tables (0-249)
An Access Control List (ACL) is a list of permissions attached to an object, to filter or match switches packets. When
the pattern is matched at the hardware lookup engine, a specified action (e.g. permit/deny) is applied. The rule fields
represent flow characteristics such as source and destination addresses, protocol and VLAN ID.
ACL support currently allows actions of permit or deny rules, and supports only ingress direction. ACL search pattern
can be taken from either L2 or L3 fields.
When match rule is set to match eth_type 9100, VLAN ID matching does not work.
• OXM_OF_VLAN_VID – matches VLAN ID
• OXM_OF_VLAN_PCP – matches priority level
• OXM_OF_IPV4_SRC – matches source IPv4 address
• OXM_OF_IPV4_DST – matches destination IPv4 address
• OXM_OF_IPV6_SRC – matches source IPv6 address
• OXM_OF_IPV6_DST – matches destination IPv6 address
• OXM_OF_IPV6_ND_TARGET
• OXM_OF_IP_PROTO – matches IP protocols (exact match or wildcard)
• OXM_OF_IP_DSCP – matches IP DSCP field (exact match or wildcard)
• OXM_OF_IP_ECN – matches network ECN (exact match or wildcard)
• OXM_OF_NW_TTL – matches network TTL (exact match or wildcard)
• OXM_OF_TCP_SRC – matches source TCP
• OXM_OF_TCP_DST – matches destination TCP
• OXM_OF_UDP_SRC – matches source UDP
• OXM_OF_UDP_DST – matches destination UDP
• OXM_OF_SCTP_SRC – matches source SCTP
• OXM_OF_SCTP_DST – matches destination SCTP
• OXM_OF_ICMPV4_TYPE – matches ICMP type
• OXM_OF_ICMPV4_CODE – matches ICMP code
• OXM_OF_ARP_OP – matches ARP OP code
• OXM_OF_ARP_SPA – matches sender protocol address
• OXM_OF_ARP_TPA – matches target protocol address
There is a default set of match keys configured. To see what it is, please run the command “show openflow table match-
keys” on your machine. To alter it, please use the command “openflow table match-keys”.
1037
• Matching source/destination IPv4 address encapsulated with MPLS labels (up to 6 MPLS labels can be skipped)
– ip_src_inner/ip_dst_inner is mapped to OXM_OF_IPV4_SRC, OXM_OF_IPV4_DST
• Table configuration:
The ignr_eth_type is needed to ignore the Ethertype of IP that is required by OpenFlow to set to as a prerequisite
to match on IP addresses.
• Rules:
The above matches IP address from 10.10.10.0/24 to 10.10.20.0/24 which have MPLS label 32 as the first label.
1038
• OXM_OF_ETH_DST – sets the destination MAC address of the packet
• OXM_OF_VLAN_VID – sets the VLAN ID of the packet
• OXM_OF_VLAN_PCP – sets the VLAN priority code point (PCP; 0-7)
• OXM_OF_IP_DSCP – sets IP DSCP
• OXM_OF_IP_ECN – sets network ECN
• NXM_NX_CT_NW_SRC* - sets the source IP address of the packet
• NXM_NX_CT_NW_DST* - sets the destination IP address of the packet
• NXM_NX_CT_TP_SRC* - sets the source L4 port of the packet
• NXM_NX_CT_TP_DST* - sets the destination L4 port of the packet
*Supported only on Spectrum-2 and Spectrum-3 systems.
1039
16.15.2.2.1 Supported Router Apply Actions
• OFPAT_OUTPUT – the packet is sent out to a port (may be controller port)
• OFPAT_DEC_NW_TTL – decrements network TTL
• OFPAT_SET_DMAC – OFPAT_SET_FIELD with OFPXMT_OFB_ETH_DST
• DROP – drops packet
When an output action is implemented, DEC_TTL and SET_DMAC must also be set.
1040
The above rule matches on SRC IP=192.168.0.1 and DEST IP=239.0.1.2 and the action is to output matching traffic to
interface Eth1/56.
For the “drop all” rule (use a lower priority than other match rules):
To delete a flow, run the command “del-flows” along with a flow’s reference number:
OpenFlow may be configured using one method at a time, so if an OpenFlow controller is configured then
switch CLI method cannot be used.
2. Import key of certificate. Run:
3. Designate “my-openflow” as the global default certificate for authentication of this system to clients. Run:
4. Import the CA certificate which signed for the controller. Run:
1041
switch (config) # # crypto certificate name rootCA public-cert pem "-----BEGIN
CERTIFICATE-----
> MIIDjzCCAnegAwIBAgIJALVou4mcQtxlMA0GCSqGSIb3DQEBCwUAMF4xCzAJBgNV
...
> +ZfQIOCFS8gY4BDq73W4ugr38mqIA8UXXAMPwgjCbk4NyOh0rJ1P6WT8fYzvunct
> -----END CERTIFICATE-----"
Successfully installed certificate with name 'rootCA'
5. Adds the “rootCA” to the default CA certificate list. Run:
6. Save configuration. Run:
7. Reboot the switch. Run:
8. Verify configuration. Run:
1042
switch (config) # show crypto certificate
Certificate with name 'system-self-signed'
Comment: system-generated self-signed certificate
Private Key: present
Serial Number: 0x543e2efc3a5ecdbe18b5b5e744598424
SHA-1 Fingerprint: 14e1d36035c7a5fea9f7f0f423572c9954cb9fac
Validity:
Starts: 2016/09/12 12:44:10
Expires: 2017/09/12 12:44:10
Subject:
Common Name: switch
Country: IS
State or Province: TBD
Locality: TBD
Organization: TBD
Organizational Unit: TBD
E-mail Address: TBD
Issuer:
Common Name: switch
Country: IS
State or Province: TBD
Locality: TBD
Organization: TBD
Organizational Unit: TBD
E-mail Address: TBD
Certificate with name 'my-openflow' (default-cert)
Private Key: present
Serial Number: 0xbd10f6ccbb18cd07
SHA-1 Fingerprint: 1e0e3302182ab56f2cbd3ca21722dec55299d670
Validity:
Starts: 2016/09/12 15:16:48
Expires: 2018/01/25 14:16:48
Subject:
Common Name: switch
Country: *
State or Province: Some-State
Locality: *
Organization: Mlnx
Organizational Unit: e2e
E-mail Address: [email protected]
Issuer:
Common Name: ca
Country: *
State or Province: Some-State
Locality: *
Organization: Mlnx
Organizational Unit: e2e
Certificate with name 'rootCA'
Private Key: not present
1043
Serial Number: 0xb568bb899c42dc65
SHA-1 Fingerprint: 9855536f6ee0177356ffbdc54ffe803bc83fb4c6
Validity:
Starts: 2016/09/08 10:34:23
Expires: 2019/06/29 10:34:23
Subject:
Common Name: ca
Country: *
State or Province: Some-State
Locality: *
Organization: Mlnx
Organizational Unit: e2e
Issuer:
Common Name: ca
Country: *
State or Province: Some-State
Locality: *
Organization: Mlnx
Organizational Unit: e2e
9. Configure secure controller IP connection. Run:
• protocol openflow
• openflow mode hybrid
• openflow add-flows
• openflow del-flows
• openflow add-group
• openflow del-group
• openflow mod-group
• openflow add-meter
• openflow del-meter
• openflow fail-mode secure
• openflow mod-meter
• openflow re-apply flows
• openflow re-apply groups
• openflow re-apply meters
• controller-ip
• datapath-id
• openflow table match-keys
• openflow acl table counter disable
• show openflow
• show openflow flows
• show openflow flows ethernet-names
• show openflow groups
• show openflow groups ethernet-names
• show openflow meters
• show openflow flows table
• show openflow flows cookie
1044
• show openflow table match-keys
• show openflow table match-keys supported
protocol openflow
no protocol openflow
History 3.3.4200
Related Commands
Notes
History 3.3.4200
1045
Example switch (config interface ethernet 1/1)# openflow mode
hybrid
switch (config interface port-channel 1)# openflow mode
hybrid
Notes It is possible to configure regular switch port and router ports as "hybrid". Port-channel
or router port-channel can also be configured as hybrid.
table-id Range:
• ACLs: 0-249
• FDB: 250
• Router: 251
History 3.6.4006
1046
Example
1047
switch (config)# openflow add-flows 1,
priority=10,in_port=Eth1/1,nw_src=192.168.0.1/32,nw_dst=239.0.1.2/32,actions=
output=Eth 1/11,Eth 1/22,Eth 1/33
1048
switch (config)# openflow add-flows 10 priority=10,in_port=ANY,actions=DROP
Related Commands
Notes If no flow-text is provided the command deletes the configured OpenFlow flows
Default N/A
History 3.6.4006
Related Commands
Notes If flow ID "all" is provided, the command deletes all configured OpenFlow flows
group- For a list of supported group types, see the group column in “OpenFlow 1.3 Pipeline
type Capabilities Summary Table”
1049
bucket Possible values:
parameter
• actions=output,...,output
• bucket_id=<id-number>
• watch_group=<group_id>
• watch_port=<port>
• weight=<value>
Default N/A
Configurati config
on Mode
History 3.6.4006
Related
Commands
More than one group in the action list of OpenFlow is not supported
Default N/A
1050
History 3.6.4006
Related Commands
Notes If group ID "all" is provided, the command deletes all configured OpenFlow groups.
Default N/A
Configurat config
ion Mode
History 3.6.4006
1051
Related openflow add-group
Command
s
meter-rule For a list of supported meters types, see the meter column in
“OpenFlow 1.3 Pipeline Capabilities Summary Table”
• type={type | drop}
• rate=<value>
• burst_size=<size>
Default N/A
Configuration config
Mode
History 3.6.4006
Related Commands
Notes
1052
Syntax Description meter-id Meter ID number
Default N/A
History 3.6.4006
Related Commands
Notes If meter ID "all" is provided, the command deletes all configured OpenFlow meters.
Enables the “fail secure mode” of the switch.
The no form of the command disables the “fail secure mode” of the switch.
Default Enabled
History 3.8.2100
Related Commands
1053
Notes In the case that a switch loses contact with all controllers as a result of echo request
timeouts, TLS session timeouts, or other disconnections, the switch should immediately
enter either “fail secure mode” or “fail standalone mode" (depending upon the switch
implementation and configuration). "Fail secure mode" only affects the switch behavior in
that packets and messages destined to go to the controllers are dropped. Flow entries
should continue to expire according to their timeouts in “fail secure mode." In “fail
standalone mode," the switch processes all packets using the OFPP_NORMAL reserved
port and the switch acts as a legacy Ethernet switch or router.
Note that the default fail-mode is "secure". There is no default rule with action normal for this mode. All
traffic will be affected, including protocols, until required rule is added or fail-mode is changed to
"standalone". If using controller, add required rule via controller in any fail-mode.
meter-rule For a list of supported meters types, see the meter column in
“OpenFlow 1.3 Pipeline Capabilities Summary Table”
Default N/A
History 3.6.4006
Related Commands
Notes
1054
16.15.6.12 openflow re-apply flows
Default N/A
History 3.6.4006
Related Commands
Notes
Default N/A
History 3.6.4006
Related Commands
1055
Notes
Default N/A
History 3.6.4006
Related Commands
Notes
16.15.6.15 controller-ip
Configures the OpenFlow controller’s IP & TCP port.
The command “no openflow controller-ip <ip-address>” deletes all OpenFlow controller
configurations related to its IP address.
The command “no openflow controller-ip <ip-address> tcp-port” deletes all the OpenFlow
controller configurations related to IP address, and any tcp-port except for TLS ones.
The command “no openflow controller-ip <ip-address> [tls] tcp-port <tcp-port>” deletes
the entry for the OpenFlow controller IP address, TLS (if applicable), and the TCP port
1056
Default TCP port 6633
History 3.6.1002
3.6.2002 Added “tls” parameter
Related Commands
Notes
16.15.6.16 datapath-id
datapath-id <value>
no datapath-id
Sets a specific identifier for the switch with which the controller is communicating.
The no form of the command resets the parameter to its default value.
Syntax Description value The most significant 16 bits of the agent data-path ID
Range: 0x0000-0xFFFF in hexa
Default 0x0000
History 3.3.4200
Related Commands
Notes
1057
16.15.6.17 openflow table match-keys
Syntax Description table_id OpenFlow table ID for adding/removing key values. Can be one ID or
range. Range: 0-249.
Default 0x0000
History 3.3.4200
Related Commands
1058
Notes • OpenFlow match rules are installed according to the
configured match keys
• New match keys are configured only when the table is empty
(i.e. does not contain any rules)
History 3.9.2000
Related Commands
1059
Notes
show openflow
Default N/A
History 3.3.4200
Example
Related Commands
Notes
1060
16.15.6.20 show openflow flows
Syntax N/A
Description
Default N/A
History 3.3.4302
Related
Commands
Notes
1061
16.15.6.21 show openflow flows ethernet-names
1062
show openflow flows <cookie | table> ethernet-names
Default N/A
History 3.6.4006
Example
Related Commands
1063
Notes
Default N/A
History 3.6.3004
Example
Related Commands
Notes
Displays all the configured OpenFlow groups with their interface names.
Default N/A
History 3.6.4006
Example
1064
switch (config) # show openflow groups
OFPST_GROUP_DESC reply (OF1.3) (xid=0x2):
group_id=4,type=all,bucket=actions=output:Eth1/13,output:123
group_id=1,type=select,bucket=actions=output:Eth1/7,output:Eth1/8,output:Eth1
/5,output:123,set_field:11:22:33:44:00:00->eth_dst
group_id=2,type=select,bucket=actions=output:Eth1/13
group_id=3,type=all,bucket=actions=output:Eth1/13,output:123,set_field:
11:22:33:44:00:00->eth_dst
Related Commands
Notes
Default N/A
History 3.6.3004
Related Commands
Notes
1065
16.15.6.25 show openflow flows table
Default N/A
History 3.6.3004
Example
Related Commands
Notes
Default N/A
History 3.6.3004
Example
1066
switch (config) # show openflow flows cookie 0x11
OFPST_FLOW reply (OF1.3) (xid=0x2):
cookie=0x11, duration=2.699s, table=0, n_packets=0, n_bytes=0, actions=NORMAL
switch (config) # show openflow flows cookie 0x22
OFPST_FLOW reply (OF1.3) (xid=0x2):
cookie=0x22, duration=3.970s, table=1, n_packets=0, n_bytes=0, in_port=127
actions=drop
Related Commands
Notes A cookie may be associated with a flow using the add-flows, and mod-flows
commands.
Syntax Description table_id OpenFlow table ID for adding/removing key values. Can be one ID
or range. Range: 0-249.
Default N/A
History 3.6.3004
Table:
2
Pending keys:
1067
Related Commands
Notes
Syntax Description table_id OpenFlow table ID for adding/removing key values. Can be one
ID or range. Range: 0-249.
Default N/A
History 3.6.3004
Related Commands
Notes
1068
17 VXLAN
Data centers are being increasingly consolidated and outsourced in an effort to improve the deployment time of
applications and reduce operational costs, and applications are constantly raising demand for compute, storage, and
network resource. Thus, in order to scale compute, storage, and network resources, physical resources are being
abstracted from their logical representation, in what is referred to as server, storage, and network virtualization.
Virtualization can be implemented in various layers of computer systems or networks.
Multi-tenant data centers are taking advantage of the benefits of server virtualization to provide a new kind of hosting—
a virtual hosted data center. Multi-tenant data centers are ones where individual tenants could belong to a different
company or a different department. To a tenant, virtual data centers are similar to their physical counterparts, consisting
of end-stations attached to a network, complete with services such as load balancers and firewalls. To tenant systems, a
virtual network looks like a normal network, except that the only end-stations connected to the virtual network are those
belonging to a tenant’s specific virtual network.
How a virtual network is implemented does not generally matter to the tenant; what matters is that the service provided
(Layer 2 (L2) or Layer 3 (L3)) has the right semantics, performance, etc. It could be implemented via a pure routed
network, a pure bridged network, or a combination of bridged and routed networks.
VXLAN (Virtual eXtensible Local Area Network) addresses the above requirements of the L2 and L3 data center
network infrastructure in the presence of virtual networks in a multi-tenant environment. It runs over the existing
networking infrastructure and provides a means to “stretch” an L2 network. Each overlay bridge is called a VXLAN
segment. Only machines within the same VXLAN segment can communicate with each other. Each VXLAN segment is
identified through a 24-bit segment ID called “VXLAN Network Identifier (VNI)”. A network endpoint which performs
a conversion from virtual to physical network and back is called VXLAN Tunnel End-Point or VTEP.
In virtual environments, it is typically required to use logical switches to forward traffic between different virtual
machines (VMs) on the same physical host, between virtual machines and the physical machines and between networks.
Virtual switch environments use an OVSDB management protocol for configuration and state discovery of the virtual
networks. OVSDB protocol allows programmable access to the database of virtual switch configuration.
1069
6. Configure interface on the VXLAN VLAN and configure an IP address for it. Run:
9. Create loopback interface to terminate the VXLAN tunnel. The IP address of the interface will be a VTEP
endpoint address, and needs to be reachable in the underlay network. Run:
11. Configure overlay-facing ports for NVE mode. Run:
For controller-less deployments, configure the bridging from the CLI directly:
1. Create bridges. Run:
1070
switch (config)# no interface nve 1 nve fdb flood load-balance
switch (config)# interface nve 1 nve fdb flood bridge 7777 address 1.2.3.5
switch (config)# interface nve 1 nve fdb flood bridge 7777 address 1.2.3.6
1071
17.2.2 Switch Configuration
1. Configure jumbo frames on ESXi and Database server facing interfaces. Run:
2. Create VLAN 3 to carry VXLAN traffic (if it does not exist yet). Run:
1072
switch (config)# ip routing vrf default
5. Create a loopback interface to communicate with VTEPs on the ESXi servers by routing through “interface vlan
3”. This interface will be the VTEP IP assigned to the switch. Run:
8. Configure the source of the NVE interface to be the loopback created above. Run:
9. Start the OVSDB server and connect it to the NSX Controllers. Run:
1073
switch (config)# ovs ovsdb server
switch (config)# ovs ovsdb manager remote ssl ip address 10.130.200.100
switch (config)# ovs ovsdb manager remote ssl ip address 10.144.200.101
switch (config)# ovs ovsdb manager remote ssl ip address 10.144.200.102
10. Configure the port facing the Database server as an NVE port. Run:
11. Get the switch certificate for later configuration in the NSX Manager. Run:
Copy the certificate starting with the line:
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
Make sure to include both of those lines.
12. In NSX Manager, go to “Service Definitions” → “Hardware Devices”.
13. Under “Replication Cluster” click Edit.
14. Add both of the ESXi servers to the replication cluster.
All hosts added to the replication cluster can replicate BUM (Broadcast, Unknown unicast and Multicast) traffic to other
ESXi servers.
When the switch needs to send BUM traffic to a virtual machine, it will select one of the hosts in the replication cluster
and send the traffic to it, the host will then replicate it to all other ESXi hosts.
It is recommended to add at least 2 ESXi servers to the replication cluster for redundancy.
1074
17.2.3 Adding the Switch to NSX
1. Under Hardware Devices click the + sign to add a new hardware device.
2. Fill in a name for the new hardware device.
3. Fill in the switch certificate we got earlier.
4. Click OK.
5. Wait until the new switch is showing as “UP” under the connectivity column, you may need to refresh vSphere
client a few times.
3. Click the “+” sign to add a new mapping instance.
4. Click Select under the port column and select port “eth3”, this corresponds to “ 1/3” we configured earlier as an
NVE port in the switch.
5. Under the VLAN column, set the VLAN that will map this logical switch to this specific switch port, you can
have multiple logical switches mapped to the same port on a different VLAN (for example to connect a firewall
appliance to logical switches). For “access” configuration (no VLAN is required on the host connected to the
physical switch port) use VLAN 1.
1075
6. Click OK.
DSCP is automatically driven from the original packet into the VXLAN header in Onyx.
• Configure the switch buffer to support lossless traffic.
1076
traffic pool roce type lossless
traffic pool roce memory percent 50.00
traffic pool roce map switch-priority 3
• Enable ECN.
1077
interface ethernet 1/15-1/16 qos trust L3
interface port-channel 1 qos trust L3
• Set Downlinks rewrite to DSCP. This will allow translation from PCP to DSCP in VXLAN.
• Set Uplinks and IPL rewrite to PCP. This will allow translation from DSCP to PCP.
• protocol nve
• interface nve
• nve bridge
• nve controller bgp
• nve fdb flood bridge address
• nve fdb flood load-balance
• nve fdb learning remote
• nve mode only
• nve neigh-suppression
• nve vlan bridge
• nve vlan neigh-suppression
• nve vni vlan
• interface nve auto-vlan-map
• interface nve disable nve vni
• vxlan mlag-tunnel-ip
• vxlan source interface loopback
• shutdown
• clear mac-address-table nve
• clear nve counters
• show interfaces nve
• show interfaces nve detail
• show interfaces nve counters
• show interfaces counters vlan
• show interfaces nve flood
• show interfaces nve mac-address-table
• show interfaces nve mac-address-table local learned unicast
• show interfaces nve mac-address-table remote configured multicast
1078
• show interfaces nve peers
• ovs ovsdb server
• ovs ovsdb manager remote
• ovs ovsdb server listen
• ovs logging level
• show ovs
protocol nve
no protocol nve
History 3.6.3004
Related Commands
Notes
Default N/A
History 3.6.3004
1079
Related Commands protocol nve
Notes
History 3.6.3212
Default Disabled
History 3.8.1000
1080
Notes If controller BGP is enabled, shutdown command is not supported.
ip-address IP address
Default N/A
History 3.6.3212
Example switch (config interface nve 1) # nve fdb flood bridge 7777
address 1.2.3.6
History 3.6.8008
1081
Example switch (config interface nve 1) # nve fdb flood load-
balance
Notes
History 3.6.8008
Notes
History 3.6.3004
1082
Related Commands protocol nve
Notes
nve neigh-suppression
no nve neigh-suppression
History 3.8.1000
Notes • If VLAN mapping is already configured, then the user might run "disable nve vlan
<vlan_id> neigh-suppression" to not use global configuration.
• BGP controller mode must be set prior to using this command
Default N/A
1083
History 3.6.6102
Default N/A
History 3.8.1000
nve neigh-suppression
Notes • BGP controller mode must be set prior to using this command
• VLAN-VNI mapping needs to be set prior to running this command
1084
17.5.12 nve vni vlan
vlan_id VLAN ID
Range: 1-4094
Default N/A
History 3.8.1000
Notes • BGP controller mode must be set prior to using this command
• For complete configuration, this VLAN needs to be created and a VXLAN source
loopback needs to be added
Performs automatic mapping of all existing VLANs that are not manually mapped to VNI
to a calculated VNI (Calculated VNI=base-number + VLAN).
The no form of the command disables automatic VLAN mapping.
1085
Syntax Description base-number Range: 1-16773120
Default: 100000
Default Disabled
History 3.8.2200
Notes • Base-number cannot be changed, user must unset auto-vlan-map and reconfigure it
with a different base number
• While auto-vlan-map is enabled, user cannot add manual mappings (only deletion of
a manual mapping is allowed)
• IPL VLAN will not be mapped to VNI.
Default Disabled
History 3.8.2200
1086
Example (config interface nve 1) # disable nve vni any vlan 5
Notes User can set/unset exclude VLANs while auto-vlan-map is enabled or disabled.
Default N/A
History 3.8.1000
Notes BGP controller mode must be set prior to running this command
1087
Default N/A
History 3.6.3004
Notes • The configured loopback interface becomes the VXLAN tunnel endpoint (VTEP)
• The configured loopback interface must be in the 'default ' VRF
17.5.17 shutdown
shutdown
no shutdown
Default N/A
History 3.6.6102
Notes
clear mac-address-table nve [remote]
1088
Default N/A
History 3.6.8008
Notes
Default N/A
History 3.6.3004
Notes The command “clear counters all” also clears NVE counters
show interfaces nve [<nve-id>]
1089
Default N/A
History 3.6.3004
Counters
1840 encapsulated (Tx) NVE packets
1970 decapsulated (Rx) NVE packets
0 dropped NVE-encapsulated packets
0 NVE-encapsulated packets with
errors
Related Commands
Notes
show interfaces nve [<nve-id>] detail
Default N/A
History 3.8.1000
1090
3.8.2200 Added “Mapping type” to show whether VLAN to VNI mapping was
done manually or by auto-vlan-map
-------------------------------------------------------
Vlan VNI Neigh Suppression Mapping Type
-------------------------------------------------------
6 60 Disabled Manual
7 70 Disabled Manual
8 80 Disabled Manual
9 90 Disabled Manual
Related Commands
Notes
Default N/A
History 3.6.3004
1091
Example switch (config) # show interface nve 1 counters
Related Commands
Notes
show interfaces nve <nve_id>counters vlan <vlan_value>
Default N/A
History 3.9.1000
switch (config) #
Notes
1092
17.5.24 show interfaces nve flood
.show interfaces nve <nve-id> flood [vni <vni-id>]
Displays remote VTEP endpoints configured for BUM (broadcast, unknown unicast,
multicast) flooding.
Default N/A
History 3.6.3004
Example
------------------------------------------------------
NVE Interface VLAN ID VNI ID Flood IP Addresses
------------------------------------------------------
1 6 60 192.168.1.2
1 7 70 193.168.1.1
193.168.1.2
Related Commands
Notes
1093
Syntax Description nve-id NVE ID
Range: 1-64
Default N/A
History 3.6.3004
Example
Related Commands
Notes
show interfaces nve <nve-id> mac-address-table local learned unicast [vni <vni-id>]
Default N/A
History 3.6.3004
Example
1094
switch (config) # show interface nve 1 mac-address-table local learned
unicast
Related Commands
Notes
show interfaces nve <nve-id> mac-address-table remote configured multicast [vni <vni-
id>]
Default N/A
History 3.6.3004
Example
Related Commands
Notes
1095
17.5.28 show interfaces nve peers
Default N/A
History 3.6.3004
3.8.2200 Added output of the command while running NVE BGP controller
mode
Example
--------------------------------------------------------
NVE Interface Logical Switch VNI ID Peer IP Address
--------------------------------------------------------
1 bridge 10080 1.1.1.1
1 bridge 10080 1.1.1.2
Related Commands
Notes
1096
17.5.29 ovs ovsdb server
Default N/A
History 3.6.3004
Related Commands
Notes OVSDB server runs when “protocol openflow” or “protocol nve” are enabled, even when
not enabled using this command
ovs ovsdb manager remote {tcp | ssl} ip-address <ip-address> port <tcp-port>
no ovs ovsdb manager remote {tcp | ssl} ip-address <ip-address> port <tcp-port>
Configures OVSDB to actively connect to a remote manager at a given IP address and TCP
port, using either TCP or SSL.
The no form of the command disconnects OVSDB from a remote manager.
Default N/A
1097
Configuration Mode config
History 3.6.3004
Notes
ovs ovsdb server listen {tcp | ssl} port <tcp-port> local ip-address <ip-address>
no ovs ovsdb server listen {tcp | ssl} port <tcp-port> local ip-address <ip-address>
Configures OVSDB to listen at a given port of an interface with a given (local) IP address.
The no form of the command disconnects OVSDB from a remote manager.
Default N/A
History 3.6.3004
Example switch (config) # ovs ovsdb server listen tcp port 20 local
ip-address 20.20.20.20
Notes
1098
17.5.32 ovs logging level
ovs {ovsdb | vswitchd | vtep} logging level {dbg | emer | err | info | off | warn}
Default N/A
History 3.8.1100
Related Commands
Notes
show ovs
Default N/A
Configuration config
Mode
History 3.8.1100
1099
Example switch (config) # show ovs
Logging level:
ovsdb : info
vswitchd: info
vtep : warn
Related Commands
Notes
1100
18 Ethernet VPN (EVPN)
18.1 Overview
Many data centers today are moving from legacy Layer 2 (L2) designs to modern Layer 3 (L3) web-scale IT
architectures. L3 designs simplify troubleshooting, provide clear upgrade strategies, support multi-vendor
environments, and dramatically reduce the size of failure domains.
General Data Center Network with EVPN
However, many applications and storage appliances still require layer 2 adjacency. VXLAN tunnels can satisfy this L2
adjacency requirement, and EVPN serves as a standard for scale-out L2 Ethernet fabrics. VXLAN can virtualize the
1101
data center network, enabling layer 2 segments to be extended over an IP core (the underlay). EVPN is the control plane
for modern VXLAN deployments, allowing VTEPs to discover each other via EVPN and exchange reachability
information such as MAC and IPs across racks.
ARP suppression is used to reduce the amount of broadcast packets crossing the extended L2 domain. BGP is the
underlay routing protocol serving as the transport layer for the overlay VXLAN.
1102
lacp
dcb priority-flow-control enable force
protocol mlag
interface port-channel 1
interface ethernet 1/1 channel-group 1 mode active
interface port-channel 1 dcb priority-flow-control mode on force
interface mlag-port-channel 7-8 no shutdown
interface ethernet 1/31 mlag-channel-group 7 mode active
interface ethernet 1/32 mlag-channel-group 8 mode active
vlan 4094
ip routing vrf default
interface vlan 4094
interface vlan 4094 ip address 10.10.10.1/30 primary
interface vlan 4094 mtu 9216
mlag-vip mlag-pair-1 ip 192.168.1.1 /24 force
interface port-channel 1 ipl 1
interface vlan 4094 ipl 1 peer-address 10.10.10.2
no mlag shutdown
Layer 2 Ports
• In our setup we use VLAN 6 as the native VLAN, and VLAN 10 as the Tagged VLAN.
• We use LACP Bond on our servers, and using them we set LACP on the Switch MPOs.
• PXE boot is required to set our MPOs to "lacp-individual enable"
1103
interface ethernet 1/28 no switchport force
interface ethernet 1/29 no switchport force
interface ethernet 1/28 mtu 9216 force
interface ethernet 1/29 mtu 9216 force
interface loopback 1
interface ethernet 1/28 ip address 100.100.100.1/30 primary
interface ethernet 1/29 ip address 100.100.100.5/30 primary
interface loopback 1 ip address 1.1.1.1/32 primary
protocol nve
interface nve 1
interface nve 1 vxlan source interface loopback 1
interface nve 1 nve controller bgp
interface nve 1 vxlan mlag-tunnel-ip 100.0.0.1
interface nve 1 nve vni 10010 vlan 10
interface nve 1 nve vni 10060 vlan 6
Note that "vxlan mlag-tunnel-ip" is used to configure MLAG with VXLAN. This way other VTEPs will see the MLAG
pair as a single entity (for this reason, the "mlag-tunnel-ip" setting should be unique per MLAG pair). As long as the
MLAG is up, both switches will use the same IP as the VTEP source. If MLAG state changes to Split Brain (IPL is
down but mgmt0 interface is up), the standby switch will use its local loopback for the advertisements; this will prevent
impacting traffic from stand-alone ports by the Split Brain scenario.
ARP Suppression
Traditional L2 network broadcast traffic generated by ARP requests overloads the network. Using ARP suppression with
VXLAN enables suppressing these messages at the leaf layer. Let's consider the example setup that is illustrated below.
1104
• The first time Server2 communicates, it sends an ARP request.
• Leaf2 learns its MAC and IP, and sends an EVPN update containing the IP and MAC on the corresponding
VNI4010.
• Leaf1 learns the IP and MAC of Server2 on VNI4010.
• When Server1 sends an ARP request to Server2, leaf1 replies to the ARP request as it has all of the details.
• The result is that broadcasts to all leafs that are part of VNI4010 are suppressed.
The examples below use eBGP. Nevertheless, iBGP can be used as well.
Now we will configure our L3 underlay using eBGP as the underlay protocol. The Autonomous System (AS) design
that we use as an example represents common designs of eBGP running over leaf/spine data centers. Specifically, each
of the leaf switches will be in a separate AS, and the spine layer will be in the same AS layer.
1105
BGP
protocol bgp
router bgp 65001 vrf default
router bgp 65001 vrf default bgp fast-external-fallover
router bgp 65001 vrf default maximum-paths 32
router bgp 65001 vrf default bestpath as-path multipath-relax force
router bgp 65001 vrf default neighbor 10.10.10.2 remote-as 65002
router bgp 65001 vrf default neighbor 100.100.100.1 remote-as 65000
router bgp 65001 vrf default neighbor 100.100.100.5 remote-as 65000
router bgp 65001 vrf default network 1.1.1.1 /32
router bgp 65001 vrf default network 100.0.0.1 /32
Note: It is necessary to advertise both the local loopback network and the mlag-tunnel-ip network.
EVPN Address Family
In the following code, we create a peer group that contains all of the EVPN configuration and attach it to our L3
interfaces.
1106
ip routing vrf default
interface ethernet 1/1-1/4 no switchport force
interface ethernet 1/1-1/4 mtu 9216 force
interface loopback 1
interface ethernet 1/1 ip address 100.100.100.2/30 primary
interface ethernet 1/2 ip address 100.100.100.6/30 primary
interface ethernet 1/3 ip address 100.100.100.10/30 primary
interface ethernet 1/4 ip address 100.100.100.14/30 primary
interface loopback 1 ip address 1.1.1.5/32 primary
protocol bgp
router bgp 65000 vrf default
router bgp 65000 vrf default bgp fast-external-fallover
router bgp 65000 vrf default maximum-paths 32
router bgp 65000 vrf default bestpath as-path multipath-relax force
router bgp 65000 vrf default neighbor 100.100.100.1 remote-as 65001
router bgp 65000 vrf default neighbor 100.100.100.5 remote-as 65002
router bgp 65000 vrf default neighbor 100.100.100.9 remote-as 65003
router bgp 65000 vrf default neighbor 100.100.100.13 remote-as 65004
router bgp 65000 vrf default neighbor evpn peer-group
router bgp 65000 vrf default neighbor evpn send-community
router bgp 65000 vrf default neighbor evpn send-community extended
router bgp 65000 vrf default address-family l2vpn-evpn neighbor evpn next-hop-
unchanged
router bgp 65000 vrf default address-family l2vpn-evpn neighbor evpn activate
router bgp 65000 vrf default neighbor 100.100.100.1 peer-group evpn
router bgp 65000 vrf default neighbor 100.100.100.5 peer-group evpn
router bgp 65000 vrf default neighbor 100.100.100.9 peer-group evpn
router bgp 65000 vrf default neighbor 100.100.100.13 peer-group evpn
router bgp 65000 vrf default network 1.1.1.5 /32
1107
Uplink Failure
To cover rare cases such as losing all of the uplinks on one of the MLAG peers, we enable BGP over the IPL. This way,
traffic coming from the servers towards that leaf can still be routed towards the remote servers.
Note: Traffic coming towards the servers connected to leaf4 from the spine will always be terminated on leaf4 and sent
directly to the servers without passing over the IPL.
1108
18.4 EVPN Troubleshooting
1109
VRF name : default
BGP router identifier : 1.1.1.1
local AS number : 101
BGP table version : 2176
Main routing table version: 2176
IPV4 Prefixes : 12
IPV6 Prefixes : 0
L2VPN EVPN Prefixes : 9
-------------------------------------------------------------------------------------
-----------------------------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/
Down State/PfxRcd
-------------------------------------------------------------------------------------
-----------------------------
10.10.10.2 4 102 2320 2539 2176 0 0 0:00:
46:52 ESTABLISHED/5
192.168.14.4 4 104 2112 3159 2176 0 0 0:00:
57:56 ESTABLISHED/4
1110
18.4.5 show ip bgp evpn vni 10060
Display the EVPN information for a specific VNI in detail.
1111
switch (config) # show ip bgp evpn vni 1000 route-type mac-ip
-------------------------------------------------------------------------------------
--------------------------------------------------
RD Type Data Next Hop
Metric LocPrf Weight Path
-------------------------------------------------------------------------------------
--------------------------------------------------
2.3.4.5:5 mac-ip 00:bb:cc:dd:ee:ff 2.3.4.5
0 100 0 ?
switch (config) # show ip bgp evpn vni 1000 route-type mac-ip detail
1 paths for mac-ip 00:bb:cc:dd:ee:ff Route Distinguisher: 2.3.4.5:5:
route:
next hop : 2.3.4.5
neighbor ip : 1.1.1.2
router id : 2.3.4.5
metric : 0
weight : 0
local pref : 100
origin : incomplete
Extended Community: 100:268436456(Route-Target-AS)
Extended Community: tunnelTypeVxlan(TunnelEncap)
flags : valid, best
esi : 00:00:00:00:00:00:00:00:00:00
vni : 1000
path :
ethernet tag id :
1112
-----------------------------------------------------------
Vlan Mac Address Type Port\Next Hop
-----------------------------------------------------------
10 00:00:01:11:22:33 Static 9.9.9.9(nve1)
10 00:00:01:55:A4:25 Static 1.1.1.1(nve1)
10 00:10:00:00:0A:67 Dynamic Eth1/10
10 00:10:44:03:51:01 Dynamic Eth1/10
10 00:10:88:06:A2:02 Dynamic Eth1/10
10 00:10:AA:07:0F:B1 Dynamic Eth1/10
30 00:10:00:00:05:29 Dynamic 1.1.1.1(nve1)
30 00:10:00:00:0A:52 Dynamic 1.1.1.1(nve1)
123 00:10:00:00:0A:5B Dynamic 9.9.9.9(nve1)
123 00:10:44:03:51:0E Dynamic 9.9.9.9(nve1)
123 00:10:88:06:A2:1C Dynamic 9.9.9.9(nve1)
Number of unicast(local): 4
Number of NVE: 7
1113
18.5
EVPN Data Center Interconnect (DCI)
Regular BGP/EVPN Configuration is required since the connection between the sites is L2 based.
As the WAN transport layer does not support the EVPN/BGP address family, a remote BGP/EVPN connection should
be set between each of the local leafs and the remote leafs. To allow this connection BGP should be set to multi-hop
mode.
1114
default gateway. The VTEP will perform a routing to the destination host together with VxLAN ingress and egress
bridging.
Run the following:
• The underlay
protocol bgp
router bgp 1 vrf default
router bgp 1 vrf default router-id 200.0.1.1 force
router bgp 1 vrf default neighbor 1.1.1.2 remote-as 1
router bgp 1 vrf default address-family l2vpn-evpn neighbor 1.1.1.2 send-
community
router bgp 1 vrf default address-family l2vpn-evpn neighbor 1.1.1.2 send-
community extended
router bgp 1 vrf default address-family l2vpn-evpn neighbor 1.1.1.2 next-
hop-unchanged
router bgp 1 vrf default address-family l2vpn-evpn neighbor 1.1.1.2 activate
router bgp 1 vrf default redistribute connected
router bgp 1 vrf default address-family l2vpn-evpn vni auto-create
• The overlay
vlan 10
interface vlan 10 ip address 192.168.1.1 /24
1115
VTEP1 switch (config) # show ip bgp evpn detail
1 paths for mac-ip b8:59:9f:a7:0f:88 192.168.1.1 Route Distinguisher: 200.0.1.1:10:
route:
next hop : 1.1.1.1
neighbor ip : 2.2.2.2
router id : 200.0.2.1
metric : 0
weight : 0
local pref : 100
origin : incomplete
Extended Community: 1:269205466(Route-Target-AS)
Extended Community: tunnelTypeVxlan(TunnelEncap)
Extended Community: defaultGateway
flags : valid, best
esi : 00:00:00:00:00:00:00:00:00:00
vni : 100010
path : 1
ethernet tag : 0
VTEP1 switch (config) # show ip arp
Flags:
G: EVPN Default GW
VRF Name default:
Total number of entries: 2
-------------------------------------------------------------------------------------
----------
Address Type Flags Hardware Address Interface
-------------------------------------------------------------------------------------
----------
192.168.1.1 Dynamic EVPN G B8:59:9F:A7:0F:88 vlan 10
1116
18.6.2 Configuration Example of MLAG EVPN Centralized Gateway
1117
ip routing vrf default
protocol nve
interface nve 1
interface nve 1 vxlan source interface loopback 1
interface nve 1 nve controller bgp
interface nve 1 vxlan mlag-tunnel-ip 5.5.5.5
interface nve 1 nve vni auto-vlan-map base 100000
interface mlag-port-channel 1 switchport access vlan 10
interface vlan 10 ip address 10.0.0.251/24 primary
interface vlan 4094 ip address 2.2.2.1/24 primary
protocol magp
interface vlan 10 magp 10
interface vlan 10 magp 10 ip virtual-router address 10.0.0.1
mlag-vip MLAG-1 ip 11.11.11.11 /24 force
interface port-channel 1 ipl 1
interface vlan 4094 ipl 1 peer-address 2.2.2.2
protocol bgp
router bgp 1 vrf default
router bgp 1 router-id 200.0.0.1 force
router bgp 1 neighbor 1.1.1.2 remote-as 1
router bgp 1 neighbor 2.2.2.2 remote-as 1
router bgp 1 address-family l2vpn-evpn neighbor 1.1.1.2 send-community
router bgp 1 address-family l2vpn-evpn neighbor 2.2.2.2 send-community
router bgp 1 address-family l2vpn-evpn neighbor 1.1.1.2 send-community ext
router bgp 1 address-family l2vpn-evpn neighbor 2.2.2.2 send-community ext
router bgp 1 address-family l2vpn-evpn neighbor 1.1.1.2 next-hop-unchanged
router bgp 1 address-family l2vpn-evpn neighbor 2.2.2.2 next-hop-unchanged
router bgp 1 redistribute connected
router bgp 1 address-family l2vpn-evpn vni auto-create
1118
ip routing vrf default
protocol nve
interface nve 1
interface nve 1 vxlan source interface loopback 1
interface nve 1 nve controller bgp
interface nve 1 vxlan mlag-tunnel-ip 5.5.5.5
interface nve 1 nve vni auto-vlan-map base 100000
interface mlag-port-channel 1 switchport access vlan 10
interface vlan 10 ip address 10.0.0.252/24 primary
interface vlan 4094 ip address 2.2.2.2/24 primary
protocol magp
interface vlan 10 magp 10
interface vlan 10 magp 10 ip virtual-router address 10.0.0.1
mlag-vip MLAG-1 ip 11.11.11.11 /24 force
interface port-channel 1 ipl 1
interface vlan 4094 ipl 1 peer-address 2.2.2.1
protocol bgp
router bgp 1 vrf default
router bgp 1 router-id 200.0.1.1 force
router bgp 1 neighbor 1.1.1.2 remote-as 1
router bgp 1 neighbor 2.2.2.1 remote-as 1
router bgp 1 address-family l2vpn-evpn neighbor 1.1.1.2 send-community
router bgp 1 address-family l2vpn-evpn neighbor 2.2.2.1 send-community
router bgp 1 address-family l2vpn-evpn neighbor 1.1.1.2 send-community ext
router bgp 1 address-family l2vpn-evpn neighbor 2.2.2.1 send-community ext
router bgp 1 address-family l2vpn-evpn neighbor 1.1.1.2 next-hop-unchanged
router bgp 1 address-family l2vpn-evpn neighbor 2.2.2.1 next-hop-unchanged
router bgp 1 redistribute connected
router bgp 1 address-family l2vpn-evpn vni auto-create
When detecting EVPN MAC duplication, the following message will appear:
A static MAC error is detected when a remote route is received for a MAC address for which a local existing route has
been marked as static. The local route being marked as static indicates that the MAC address is not expected to move. In
1119
this case, any remote route with this MAC address is an error. The static MAC error is cleared when all remote routes
for the MAC address are withdrawn or if the local route is no longer marked as static.
When receiving EVPN MAC mobility route for a static MAC address, the following message will appear:
[metad.WARNING]: EVPN MAC mobility route received for sticky MAC 24:8A:07:A0:B0:0D,
IP 2.2.2.2 and VLAN 6 from BGP neighbor 1.1.1.1
1120
19 IP Routing
The following pages provide information on configuring IP routing (L3) protocols and features.
• IP Routing Overview
• OSPF
• BGP
• Bidirectional Forwarding Detection (BFD) Infrastructure
• Policy Rules
• VRRP
• MAGP
• DHCP Relay
19.1.1 IP Interfaces
Onyx supports the following 3 types of IP interfaces:
• VLAN interface
• Loopback interface
• Router port interface
Onyx supports up to 999 IP interfaces.
Each IP interface can be configured with multiple IP addresses. The first address assigned to the interface automatically
becomes its primary address (only one primary address is supported per interface), and the rest are secondary addresses.
Secondary addresses are advertised via OSPF. No “HELLO” messages are sent on them and no adjacencies
are established on them either.
Primary addresses cannot be modified once assigned. To assign a different primary address, all addresses of the
interface must be removed and then reconfigured.
Up to 16 IPv4 (as well as IPv6) addresses are supported on each IP interface.
IPv4 link local IP addresses such as 169.254.x.x can be assigned to IP interfaces, thus allowing all routing,
forwarding functions and applications on top of the interfaces to function as the real IP addresses. Only unique
addresses from that range can be assigned to IP interface, same address assignment is not supported.
Since 169.254.101.101 is already used as BGP unnumbered neighbor address, it is recommended not to use this address
in the network if BGP unnumbered neighbor is to ever be enabled.
1121
• MTU
• Description
• Set of counters
3. There must be at least one interface in the operational state “UP”. Run:
5. Configure an IP address and a network mask to the interface. Run:
1122
switch (config interface vlan 10) # show interfaces vlan 10
Vlan 10:
Admin state : Enabled
Operational state: Down
Autostate : Enabled
Mac Address : 24:8A:07:F3:04:C8
DHCP client : Disabled
IPv4 address:
10.10.10.10/24 [primary]
Broadcast address:
10.10.10.255 [primary]
Arp responder: Disabled
MTU : 1500 bytes
Arp timeout : 1500 seconds
Icmp redirect: Enabled
Description : my-ip-interface
VRF : default
Counters : Disabled
3. Verify loopback interface configuration. Run:
1123
19.1.1.6 Configuring a Router Port Interface
1. Enter an Ethernet interface’s configuration context. Run:
4. Verify router port interface configuration. Run:
1124
switch (config interface ethernet 1/10)# show interfaces ethernet 1/10
Eth1/10:
Admin state : Enabled
Operational state : Down
Last change in operational status: Never
Boot delay time : 0 sec
Description : N/A
Mac address : 24:8A:07:F3:04:C8
MTU : 1500 bytes (Maximum packet size 1522
bytes)
Fec : auto
Flow-control : receive off send off
Supported speeds : 1G 10G 25G
Advertised speeds : 1G 10G 25G
Actual speed : Unknown
Auto-negotiation : Enabled
Width reduction mode : Unknown
DHCP client : Disabled
Autoconfig : Disabled
IPv4 address:
100.100.100.100/24 [primary]
Broadcast address:
100.100.100.255 [primary]
Arp responder: Disabled
Arp timeout : 1500 seconds
VRF : default
Forwarding mode: inherited cut-through
Telemetry sampling: Disabled TCs: N\A
Telemetry threshold: Disabled TCs: N\A
Telemetry threshold level: N\A
Last clearing of "show interface" counters: Never
60 seconds ingress rate : 0 bits/sec, 0 bytes/sec, 0
packets/sec
60 seconds egress rate : 0 bits/sec, 0 bytes/sec, 0
packets/sec
Rx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
1125
0 unknown control opcode
0 symbol errors
Tx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 hoq discard packets
The load balancing function of the ECMP is configured globally on the system.
Hash algorithm can be symmetric or asymmetric. In symmetric hash functions bidirectional flows between routes will
follow the same path, while in asymmetric hash functions, bidirectional traffic can follow different paths in both
directions.
The following load balancing types are supported:
• Source IP & Port – source IP (SIP) and source UDP/TCP port: If the packet is not UDP/TCP, only SIP is used for
the hash calculation. This is an asymmetric hash function.
• Destination IP & Port – destination IP (DIP) and destination UDP/TCP port: If the packet is not UDP/TCP, only
DIP is used for the hash calculation. This is an asymmetric hash function.
• Source and Destination IP & Port – destination and source IP, as well as destination and source UDP/TCP port:
If the packet is not UDP/TCP, only SIP/DIP are used for the hash calculation. This is a symmetric hash function.
• Traffic Class – Load balance based on the traffic class assigned to the packet. This is an asymmetric hash
function.
• All (default) – all above fields are part of the hash calculations. This is a symmetric hash function.
1126
19.1.2.1 Hash Functions
It is advised that LAG and ECMP hash function configuration over more than one hop is different. If the same hash
function is used over two hops, all the traffic sorted from one hop to following one will arrive already having the same
characteristics, which will render the next hash function useless. For example, configure load-balancing on the first hop
based on source IP while on the next hop based on destination IP.
1127
19.1.2.2.1 Remove Next Hops
Unlike the default IP load-sharing hashing, when consistent hashing is used, and a next hop needs to be removed, the
number of hash buckets does not change. All appearances of the deleted next hop are removed from the container and
replaced by the remaining next hops.
1128
19.1.2.2.2 Add Next Hops
When adding a new next hop, some of existing next hops should be removed from the hash, and the new next hop
should be located in one of the newly available places.The new next hops are not applied to HW immediately, but only
after a convergence time period.
1129
19.1.2.2.3 Supported Number of Containers
When the consistent hashing containers count exceeds the maximum number of containers, the operational state of
consistent hashing function will become “unstable” and the containers with the same next hop sets will be merged to
release more resources. Once more resources are available to deploy the containers, the operation state will become
“stable”.
In the unstable case which may result from lack of consistent hashing resources, the new route will be installed as a
non-consistent route, and a random next hop from its next hop set will be chosen as the actual next hop and installed in
hardware. The route will only be partially programed in hardware.
512 40 96
1024 20 48
1130
• Separate between management and user data
• Support customers with the same address space
• Support VPN
Multiple routing instances defined in the router can have different purposes and can be configured in different manners:
• Different IP interfaces can be attached to different VRFs (only one IP interface can be in a single VRF)
• Routing in VRF can be enabled or disabled
• Each VRF component can run its own routing protocol independently from other instances
• Differently configured IPv4 and IPv6 services
The first VRF in the system is created automatically and it is called “default” VRF. It cannot be deleted or configured.
Onyx supports up to 64 VRFs, 8 instances of BGP, and 8 instances of OSPF.
This functionality is provided for all ARP entries that are configured or provided on the interface: Static, dynamic, or
per protocol.
There is no need to enable IP routing in the system to enable ARP responder functionality.
If a user has multiple VRFs the interface can be created in any VRF. If IP routing is disabled the interface is created in
default VRF.
ARP responder can be enabled together with IP routing and given an interface which can be used in routing.
When IP routing on the interface is enabled, all entries that have been used by the responder become ARP entries for the
router and vice versa.
A user must avoid using ARP responder in broadcast networks—the system itself does not block it.
1131
1. Create IP interface. Run:
4. Create ACL to drop broadcast, and assign it to all relevant L2 interface (VLAN’s members). Run:
• ip l3
• vrf definition
• routing-context vrf
• ip routing
• description
• rd
• vrf forwarding
• clear ip routing counters
• show ip routing
• show ip routing counters
• show routing-context vrf
• show vrf
• IP Interface
• switchport
• encapsulation dot1q vlan
• interface ip enable
• Interface VLAN
1132
• interface vlan
• interface vlan no-autostate
• ip address
• counters
• description
• mtu
• shutdown
• clear counters
• ip icmp redirect
• show interfaces
• show interfaces vlan
• show ip interface
• show ip interface brief
• show interfaces configured
• show ip
• show ip interface mgmt0
• show ip interface port-channel
• show ip interface vrf
• show ip interface vrf vrf
• show ipv6 interface
• show ipv6 interface brief
• show ipv6
• show ipv6 interface loopback
• show ipv6 interface port-channel
• show ipv6 interface vlan
• show ipv6 interface vrf
• show ipv6 interface vrf brief
• Loopback Interface
• interface loopback
• interface vrf ip address alias
• ip address
• description
• show interfaces loopback
• Routing and ECMP
• ip route
• ip load-sharing
• show ip route
• show ip route vrf
• show ip route -a
• show ip route failed
• show ip route static
• show ip route static multicast-override
• show ip route summary
• show ip route interface
• show ip load-sharing
• Network to Media Resolution (ARP)
• ip arp
• ip arp responder
• ip arp timeout
• clear ip arp
• show ip arp
• IP Diagnostic Tools
• ping
• traceroute
• tcpdump
• QoS
• qos map dscp-to-pcp preserve-pcp
1133
• PBR
• nexthop-group direct
• nexthop-group direct nexthop interface
• nexthop-group recursive nexthop
• route-map
• route-map sequence match rule
• route-map sequence nexthop-group
• route-map sequence counter
• bind/unbind route-map on interface
• show nexthop-groups
• show route-maps
• route-map to interface bind
• show pbr general information
19.1.5.1 ip l3
ip l3 [force]
no ip l3 [force]
Default L3
History 3.4.1802
Related Commands
Note "no ip l3" command does not remove management VRF or management services that
are configured in it.
1134
force "force" option was added on VRF creation command to bypass user
confirmation for creating "mgmt" VRF
Default N/A
History 3.4.2008
Related Commands
In case of management VRF removal, the CLI will ask permission to remove
services that running in management VRF, save new configuration, and reboot the
switch. If "force" option was passed, no confirmation is needed.
After reboot, mgmt VRF will be removed and management interfaces will be
moved to "default" VRF. Also, clusterd, mDNS, OpenFlow API, and FTP/TELNET
servers will run in "default" VRF when started. Other services that were enabled in
management VRF will be disabled, except ones that are enabled by default (i.e.,
"ntp", "snmp-server", "tacacs-server", "radius-server", "ldap", "web", and so forth)
—they will be reset and enabled in "default" VRF. The logic of moving/shutting
down services from removed VRF could be applied for ALL user-defined VRF`s.
Default N/A
1135
Configuration Mode config
History 3.4.2008
Related Commands
Notes • If a routing-context is configured, the user does not have to explicitly specify the
VRF name parameter in this or any other VRF command
• If no routing-context is configured and the user does not specify the VRF name,
default VRF is used
19.1.5.4 ip routing
Default N/A
History 3.4.1802
Related Commands
19.1.5.5 description
description <description>
no description forceAdds description for the VRF.
The no form of the command removes the description of the VRF.
1136
force Forces deletion (no confirmation needed if configuration exists
inside the VRF)
Default N/A
History 3.4.2008
Related Commands
Notes
19.1.5.6 rd
Default N/A
History 3.4.2008
Related Commands
1137
19.1.5.7 vrf forwarding
Default N/A
History 3.4.2008
Related Commands
Notes
Default N/A
History 3.6.6102
1138
Related Commands
Notes
Default N/A
History 3.2.0230
Related Commands
Notes If no routing-context is specified, the “routing-context” VRF is automatically displayed.
1139
19.1.5.10 show ip routing counters
Default N/A
History 3.6.6102
Related Commands
Notes
Default N/A
History 3.4.2008
1140
Example switch (config) # show routing-context vrf
VRF active context: my-vrf
Related Commands
Notes
Default N/A
History 3.4.2008
1141
Example switch (config) # show vrf my-vrf
VRF Info:
Name: default
RD: NA
Description: NA
IP routing state: Enabled
IPv6 routing state: Disabled
IP multicast routing state: Enabled
Protocols: IPv4, PIM-SM
Interfaces: Eth1/1
Name: default
RD: NA
Description: NA
IP routing state: Enabled
IPv6 routing state: Disabled
IP multicast routing state: Enabled
Protocols: IPv4, PIM-BIDIR
Interfaces: Eth1/1
Related Commands
Notes If no routing-context is specified, the “routing-context” VRF is automatically displayed.
19.1.5.13 IP Interface
19.1.5.13.1 switchport
switchport [force]
no switchport [force]
Default N/A
1142
History 3.3.5200
Related Commands
Syntax Description vlan-id Enables L2 802.1Q encapsulation of traffic on a router port interface
in a VLAN
Default N/A
History 3.3.5200
1143
Related Commands
Notes
ifname interface id
Default Disabled
History 3.9.0300
Notes
1144
19.1.5.14 Interface VLAN
Creates a VLAN interface and enters the interface VLAN configuration mode.
The no form of the command deletes the VLAN interface.
Default N/A
History 3.2.0230
Notes • Make sure the VLAN was created, using the command “vlan <vlan-id>” in the global
configuration mode
• The VLAN must be assigned to one of the L2 interfaces. To do so, run the command
“swichport ...”
• At least one interface belong to that VLAN must be in UP state
Disables the VLAN interface autostate such that its operational state remains up as long
as its admin state is up, even if no port in the relevant VLAN egress-list is operationally
up.
The no form of the command enables this functionality.
Default N/A
1145
Configuration Mode config
History 3.6.4006
Notes
19.1.5.14.3 ip address
Enters user-defined IPv4 address for the interface. The no form of the command removes
the specified IPv4 address. If no address is specified, then all IPv4 addresses of this
interface are removed.
Default 0.0.0.0/0
History 3.2.0230
1146
19.1.5.14.4 counters
counters
no counters
Enables counters on the IP interface. The no form of the command disables counters
gathering on the IP interface.
Default Disabled
History 3.2.0230
Notes • Enabling counters for the router interface adds delay to the traffic stream
• There are maximum of 16 counter sets
19.1.5.14.5 description
description <string>
no description
Default “”
History 3.2.0230
1147
Notes
19.1.5.14.6 mtu
History 3.2.0230
Notes In switches that perform upgrade to version 3.9.2000, existing L3 interfaces will stay
with MTU 1500 (or any other value that was configured). Newly created interfaces will
be created with MTU 9216 (the new default).
19.1.5.14.7 shutdown
shutdown
no shutdown
Default Enabled
History 3.1.0000
1148
Example switch (config interface vlan 20) # shutdown
Notes
clear counters
Default N/A
History 3.2.0230
Notes
ip icmp redirect
no ip icmp redirect
Default Enabled
History 3.4.0010
1149
Example switch (config interface vlan 10) # no ip icmp redirect
Notes ICMP redirect transmits messages to hosts alerting them about the existence of more
efficient routes to a specific destination
Default N/A
History 3.2.3000
Example
1150
switch (config) # show interfaces
Interface lo status:
Comment :
Admin up : yes
Link up : yes
DHCP running : no
...
Interface mgmt0 status:
Comment :
Admin up : yes
Link up : yes
DHCP running : yes
...
Interface mgmt1 status:
Comment :
Admin up : yes
Link up : yes
DHCP running : yes (but no valid lease)
...
Eth1/1:
Admin state : Enabled
Operational state : Up
Last change in operational status: 0:22:11 ago (5 oper change)
Boot delay time : 0 sec
...
Notes ICMP redirect transmits messages to hosts alerting them about the existence of more
efficient routes to a specific destination
show interfaces vlan [<id>]
Default N/A
History 3.2.3000
1151
3.6.8008 Updated example
Vlan 100:
Admin state : Enabled
Operational state: Down
Autostate : Enabled
Mac Address : 24:8A:07:83:30:C8
DHCP client : Disabled
IPv4 address:
192.168.70.254/24 [primary]
192.168.80.254/24
Broadcast address:
192.168.70.255 [primary]
192.168.80.255
IPv6 address:
4000::1/64 [primary]
5000::1/64
Related Commands
Notes
Default N/A
1152
History 3.4.2008
Related Commands
Notes
1153
19.1.5.14.13 show ip interface brief
show ip interface <vrf vrf_name> brief
Default N/A
History 3.4.2008
Example
-----------------------------------------------------------------------------
--------------------
Interface Address/Mask Primary Admin-state Oper-state
MTU VRF
-----------------------------------------------------------------------------
--------------------
mgmt0 10.209.21.18/22 Enabled Up
1500 default
Loopback 1 1.1.1.1/32 primary
Enabled Up 1500 default
vrf-default 1.1.1.1/32 primary
Enabled Up 1500 default
Related Commands
Notes
1154
19.1.5.14.14 show interfaces configured
show interfaces [<type> <id>] configured
Syntax Description <type> <id> Specifies the interface for which to display data
Default N/A
History 3.4.2008
Related Commands
Notes
1155
19.1.5.14.15 show ip
Default N/A
History 3.4.2008
Example
Eth1/1:
Admin state : Enabled
Operational state : Up
Last change in operational status: 0:11:14 ago (5 oper change)
Boot delay time : 0 sec
Description : N/A
Mac address : 24:8A:07:83:30:C8
MTU : 1500 bytes (Maximum packet size 1522
bytes)
Fec : auto
Flow-control : receive off send off
Supported speeds : 1G 10G 25G
Advertised speeds : 1G 10G 25G
Actual speed : 25G (auto)
Auto-negotiation : Enabled
Width reduction mode : Unknown
DHCP client : Disabled
Autoconfig : Disabled
IPv4 address:
192.168.50.254/24 [primary]
192.168.60.254/24
Broadcast address:
192.168.50.255 [primary]
192.168.60.255
1156
IPv6 address:
2000::1/64 [primary]
3000::1/64
fe80::268a:7ff:fe83:30c8/64
Rx:
698 packets
0 unicast packets
0 multicast packets
698 broadcast packets
44672 bytes
0 discard packets
0 error packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
Tx:
1923 packets
0 unicast packets
1859 multicast packets
64 broadcast packets
142718 bytes
0 discard packets
0 error packets
0 hoq discard packets
Related Commands
Notes
1157
19.1.5.14.16 show ip interface mgmt0
Default N/A
History 3.4.2008
1158
Example switch (config) # show ip interface mgmt0
IPv6 address:
fe80::268a:7ff:fe53:3d8e/64
Rx:
1843422 bytes
25627 packets
0 mcast packets
0 discards
0 errors
0 overruns
0 frame
Tx:
236174 bytes
1897 packets
0 discards
0 errors
0 overruns
0 carrier
0 collisions
0 queue len
Related Commands
Notes
1159
19.1.5.14.17 show ip interface port-channel
Default N/A
History 3.4.2008
Example
1160
switch (config) # show ip interface port-channel 1
Po1:
Admin state : Enabled
Operational state : Down
Description : N/A
Mac address : 24:8A:07:83:30:C8
MTU : 1500 bytes (Maximum packet size 1522 bytes)
lacp-individual mode: Disabled
Flow-control : receive off send off
Actual speed : 25G (auto)
Auto-negotiation : N/A
Width reduction mode: Not supported
DHCP client : Disabled
Autoconfig : Disabled
IPv4 address:
192.168.100.254/24 [primary]
192.168.110.254/24
Broadcast address:
192.168.100.255 [primary]
192.168.110.255
IPv6 address:
6000::1/64 [primary]
7000::1/64
1161
Last clearing of "show interface" counters: Never
60 seconds ingress rate : 0 bits/sec, 0 bytes/sec, 0
packets/sec
60 seconds egress rate : 0 bits/sec, 0 bytes/sec, 0
packets/sec
Rx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 fcs errors
0 undersize packets
0 oversize packets
0 pause packets
0 unknown control opcode
0 symbol errors
Tx:
0 packets
0 unicast packets
0 multicast packets
0 broadcast packets
0 bytes
0 discard packets
0 error packets
0 hoq discard packets
Related Commands
Notes
show ip interface vrf {<vrf-name> | all | ethernet <slot>/<port> | loopback <id> | port-
channel <id> | vlan <vid>} [brief]
1162
loopback Displays loopback interface information per VRF
Default N/A
History 3.4.2008
Po1:
Admin state : Enabled
Operational state : Down
Description : N/A
Mac address : 24:8A:07:83:30:C8
MTU : 1500 bytes (Maximum packet size
1522 bytes)
lacp-individual mode: Disabled
Flow-control : receive off send off
Actual speed : 25G (auto)
Auto-negotiation : N/A
Width reduction mode: Not supported
DHCP client : Disabled
Autoconfig : Disabled
...
Related Commands
Notes If no routing-context is specified, the “routing-context” VRF is automatically displayed.
1163
19.1.5.14.19 show ip interface vrf vrf
Default N/A
History 3.9.0300
Notes
show ipv6 interface
Default N/A
History 3.6.8008
1164
Example switch (config) # show ipv6 interface
Eth1/1:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
2000::1/64 [primary]
3000::1/64
Po1:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
6000::1/64 [primary]
7000::1/64
vlan100:
VRF : default
Admin state: enabled
IPv6 : enabled
1165
IPv6 address:
4000::1/64 [primary]
5000::1/64
loopback1:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
2001::1/128 [primary]
2002::1/128
Related Commands
Notes
Default N/A
History 3.6.8008
Example
1166
switch (config) # show ipv6 interface brief
-----------------------------------------------------------------------------
--------------------------------------
Interface Address/Mask Primary Address-state
Admin-state Oper-state MTU VRF
-----------------------------------------------------------------------------
--------------------------------------
mgmt0 fe80::268a:7ff:fe53:3d8e/64 valid
Enabled Up 1500 default
mgmt1 fe80::268a:7ff:fe53:3d8f/64 valid
Enabled Up 1500 default
Eth1/1 2000::1/64 primary valid
Enabled Up 1500 default
Eth1/1 3000::1/64 valid
Eth1/1 fe80::268a:7ff:fe83:30c8/64 valid
Po1 6000::1/64 primary valid
Enabled Down 1500 default
Po1 7000::1/64 valid
vlan100 4000::1/64 primary valid
Enabled Down 1500 default
vlan100 5000::1/64 valid
loopback1 2001::1/128 primary valid
Enabled Up 1500 default
loopback1 2002::1/128 valid
loopback1 fe80::4c01:40ff:feb3:b753/64 valid
Related Commands
Notes
Default N/A
1167
History 3.6.8008
Eth1/1:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
2000::1/64 [primary]
3000::1/64
Related Commands
Notes
Default N/A
History 3.6.8008
1168
Example switch (config) # show ipv6 interface loopback 1
loopback1:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
2001::1/128 [primary]
2002::1/128
Related Commands
Notes
Default N/A
History 3.6.8008
1169
Example switch (config) # show ipv6 interface port-channel 1
Po1:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
6000::1/64 [primary]
7000::1/64
Related Commands
Notes
Default N/A
History 3.6.8008
1170
Example switch (config) # show ipv6 interface vlan 100
vlan100:
VRF : default
Admin state: enabled
IPv6 : enabled
IPv6 address:
4000::1/64 [primary]
5000::1/64
Related Commands
Notes
Default N/A
History 3.6.8008
1171
Example switch (config) # show ipv6 interface vrf default
Eth1/1:
VRF : default
Admin state: enabled
IPv6 : enabled
...
Po1:
VRF : default
Admin state: enabled
IPv6 : enabled
...
vlan100:
VRF : default
Admin state: enabled
IPv6 : enabled
...
loopback1:
VRF : default
Admin state: enabled
IPv6 : enabled
...
Related Commands
Notes
Default N/A
History 3.6.8008
Example
1172
switch (config) # show ipv6 interface vrf default brief
-----------------------------------------------------------------------------
------------------------------------
Interface Address/Mask Primary Address-state Admin-
state Oper-state MTU VRF
-----------------------------------------------------------------------------
------------------------------------
mgmt0 fe80::268a:7ff:fe53:3d8e/64 valid
Enabled Up 1500 default
mgmt1 fe80::268a:7ff:fe53:3d8f/64 valid
Enabled Up 1500 default
Eth1/1 2000::1/64 primary valid
Enabled Up 1500 default
Eth1/1 3000::1/64 valid
Eth1/1 fe80::268a:7ff:fe83:30c8/64 valid
Po1 6000::1/64 primary valid
Enabled Down 1500 default
Po1 7000::1/64 valid
vlan100 4000::1/64 primary valid
Enabled Down 1500 default
vlan100 5000::1/64 valid
loopback1 2001::1/128 primary valid
Enabled Up 1500 default
loopback1 2002::1/128 valid
loopback1 fe80::4c01:40ff:feb3:b753/64 valid
Related Commands
Notes
Default N/A
1173
History 3.2.3000
Related Commands
Default Disabled
History 3.9.0300
Notes
1174
19.1.5.15.3 ip address
Default 0.0.0.0/0
History 3.3.5006
19.1.5.15.4 description
description <string>
no description
1175
mask There are two possible ways to the mask:
Default “”
History 3.3.5006
Notes
Default N/A
History 3.2.3000
1176
Example switch (config) # show interfaces loopback 1
Loopback 1:
IPv4 address:
192.168.1.1/32 [primary]
192.168.2.1/32
Broadcast address:
192.168.1.1 [primary]
192.168.2.1
IPv6 address:
2001::1/128 [primary]
2002::1/128
fe80::4c01:40ff:feb3:b753/64
Notes
19.1.5.16.1 ip route
ip-prefix IP address
1177
null0 Sets a static drop-route
Default N/A
History 3.1.0000
Related Commands
Notes If no routing-context is specified, the “routing-context” VRF is automatically
configured.
19.1.5.16.2 ip load-sharing
1178
Syntax Description type • source-ip-port – source ip and TCP/UDP port
• destination-ip-port – destination ip and TCP/UDP port
• source-destination-ip-port – source & destination ip and TCP/UDP
port
• flow-label – flow label
• udk – user-defined keys
• all – all options
• consistent – consistent hashing mode
Default all
History 3.2.0230
Notes If no routing-context is specified, the “routing-context” VRF is automatically configured.
Syntax Description ip-address Performs longest prefix match (LPM) and displays best route
1179
<ip-address>/ Displays next hop for the specified network. If the network does not
<length> exist in routing table, it is not shown.
Note: It is the user’s responsibility to calculate the mask and enter it
correctly.
For example:
longer-prefixes Displays the routes to the specified destination and any routes to a
more specific destination. (Only available if both IP and mask are
specified.)
Default N/A
Example
1180
switch (config) # show ip route
Flags:
F: Failed to install in H/W
B: BFD protected (static route)
i: BFD session initializing (static route)
x: protecting BFD session failed (static route)
c: consistent hashing
p: partial programming in H/W
-----------------------------------------------------------------------------
------
Destination Mask Flag Gateway Interface
Source AD/M
-----------------------------------------------------------------------------
------
default 0.0.0.0 10.12.67.126 mgmt0 DHCP
1/1
10.12.67.0 255.255.255.128 0.0.0.0 mgmt0
direct 0/0
192.168.2.0 255.255.255.0 c 0.0.0.0 vlan1
direct 0/0
Notes • If no default route exists, then the message “Route not found” is printed
• Route next hop is BFD controlled, status is viewable when <all> is inserted in the
command, and it will be shown as follows:
• If route is removed from routing decision it will be marked as “Active”
• Protected next hops are marked with “B”
• BFD protected failed/non active neighbors are marked with “BF”
• If no routing-context is specified, the “routing-context” VRF is automatically
displayed
show ip route vrf {<vrf-name> | all}
Syntax Description all Displays routing tables for all VRF instances
Default N/A
1181
Configuration Mode Any command mode
History 3.4.2008
Example
1182
switch (config) # show ip route vrf default
Flags:
F: Failed to install in H/W
B: BFD protected (static route)
i: BFD session initializing (static route)
x: protecting BFD session failed (static route)
-----------------------------------------------------------------------------
------
Destination Mask Flag Gateway Interface
Source AD/M
-----------------------------------------------------------------------------
------
default 0.0.0.0 10.12.67.126 mgmt0 DHCP
1/1
10.12.67.0 255.255.255.128 0.0.0.0 mgmt0
direct 0/0
Flags:
F: Failed to install in H/W
B: BFD protected (static route)
i: BFD session initializing (static route)
x: protecting BFD session failed (static route)
-----------------------------------------------------------------------------
------
Destination Mask Flag Gateway Interface
Source AD/M
-----------------------------------------------------------------------------
------
80.80.80.0 255.255.255.0 20.20.20.2 vlan20
static 1/1
1183
Notes • If no default route exists, then the message “Route not found” is printed
• Route next hop is BFD controlled, status is viewable when <all> is inserted in the
command, and it will be shown as follows:
• If route is removed from routing decision it will be marked as “Active”
• Protected next hops are marked with “B”
• BFD protected failed/non active neighbors are marked with “BF”
• If no routing-context is specified, the “routing-context” VRF is automatically
displayed
• When using a network prefix, the user must calculate the host mask and enter
correctly. For example, “show ip route 10.10.10.0/24” is valid, but “ip route
10.10.10.10/24” is invalid.
Default N/A
History 3.4.0000
Example
1184
Notes • If no default route exists, then the message “Route not found” is printed
• Route next hop is BFD controlled, status is viewable when <all> is inserted in the
command, and it will be shown as follows:
• If route is removed from routing decision it will be marked as “Active”
• Protected next hops are marked with “B”
• BFD protected failed/non active neighbors are marked with “BF”
• If no routing-context is specified, the “routing-context” VRF is automatically
displayed
Default N/A
History 3.6.6000
Example
1185
switch (config) # show ip route failed
Flags:
F: Failed to install in H/W
B: BFD protected (static route)
i: BFD session initializing (static route)
x: protecting BFD session failed (static route)
-----------------------------------------------------------------------------
------
Destination Mask Flag Gateway Interface
Source AD/M
-----------------------------------------------------------------------------
------
20.20.20.0 255.255.255.0 f 0.0.0.0 vlan20
direct 0/0
80.80.80.0 255.255.255.0 f 20.20.20.2 vlan20
static 1/1
Notes • If no default route exists, then the message “Route not found” is printed
• Route next hop is BFD controlled, status is viewable when <all> is inserted in the
command, and it will be shown as follows:
• If route is removed from routing decision it will be marked as “Active”
• Protected next hops are marked with “B”
• BFD protected failed/non active neighbors are marked with “BF”
• If no routing-context is specified, the “routing-context” VRF is automatically
displayed
Default N/A
1186
Configuration Mode Any command mode
History 3.1.0000
Example
Flags:
F: Failed to install in H/W
B: BFD protected (static route)
i: BFD session initializing (static route)
x: protecting BFD session failed (static route)
-----------------------------------------------------------------------------
------
Destination Mask Flag Gateway Interface
Source AD/M
-----------------------------------------------------------------------------
------
80.80.80.0 255.255.255.0 20.20.20.2 vlan20
static 1/1
Notes • If no default route exists, then the message “Route not found” is printed
• Route next hop is BFD controlled, status is viewable when <all> is inserted in the
command, and it will be shown as follows:
• If route is removed from routing decision it will be marked as “Active”
• Protected next hops are marked with “B”
• BFD protected failed/non active neighbors are marked with “BF”
• If no routing-context is specified, the “routing-context” VRF is automatically
displayed
show ip route [vrf {all | <vrf-name>}] static multicast-override
Displays Reverse Path Forwarding (RPF) information for a specific IPv4 multicast
source configured via the command “ip mroute”.
1187
Syntax Description vrf-name Name of VRF
Default N/A
History 3.6.6000
Example
VRF "default":
----------------------------------------------------------------------
Destination Mask Gateway Route preference
----------------------------------------------------------------------
50.50.50.0 255.255.255.0 20.20.20.45 1
100.100.8.0 255.255.255.0 20.20.20.9 1
100.100.100.0 255.255.255.0 20.20.20.22 7
100.100.100.100 255.255.255.255 20.20.20.9 1
Related Commands
Notes
show ip route [vrf {<vrf-name> | all}] summary
Default N/A
1188
Configuration Mode Any command mode
History 3.1.0000
------------------------
Route Source Routes
------------------------
direct 3
static 0
ospf 0
bgp 0
DHCP 1
Total 4
Notes • If no default route exists, then the message “Route not found” is printed
• Route next hop is BFD controlled, status is viewable when <all> is inserted in the
command, and it will be shown as follows:
• If route is removed from routing decision it will be marked as “Active”
• Protected next hops are marked with “B”
• BFD protected failed/non active neighbors are marked with “BF”
• If no routing-context is specified, the “routing-context” VRF is automatically
displayed
Default N/A
1189
Configuration Mode Any command mode
Example
----------------------------------------------------------------------------
Address Type Hardware Address Interface
----------------------------------------------------------------------------
15.0.0.2 Static ETH DE:DE:BE:EF:DE:AD vlan 10
Notes
show ip load-sharing
Default N/A
History 3.4.2008
1190
Example (config) # show ip load-sharing
Load sharing: all
Type: static
Notes The command’s output is different for static & consistent hashing
19.1.5.17.1 ip arp
Default N/A
History 3.4.2008
1191
Related Commands
Notes If no routing-context is specified, the “routing-context” VRF is automatically configured.
ip arp responder
Default N/A
History 3.6.8008
Note
Syntax Description timeout-value Time that an entry remains in the ARP cache
Range: 240-28800 seconds
1192
Configuration Mode config interface ethernet
config interface port-channel
config interface vlan
History 3.2.0230
clear ip arp [vrf <vrf-name>] [interface <type> | <IP-address>]
Clears the dynamic ARP cache for the specific VRF session.
Default N/A
History 3.2.0230
1193
Related Commands ip arp
show ip arp
Notes If no routing-context is specified, the “routing-context” VRF is automatically configured.
show ip arp [vrf [<vrf-name> | all]] [interface <type> | count | timeout]
Syntax Description all Displays all ARP information for all VRF
Default N/A
History 3.3.3000
Example
1194
switch (config) # show ip arp
Flags:
G: EVPN Default GW
--------------------------------------------------------------------------------------
Address Type Flags Hardware Address Interface
--------------------------------------------------------------------------------------
10.209.0.1 Dynamic ETH 00:00:5E:00:01:01 mgmt0
10.209.1.53 Dynamic ETH 24:8A:07:B0:2D:10 mgmt0
6.6.6.6 Dynamic EVPN G 24:8A:07:CA:CD:48 vlan 6
192.168.10.1 Dynamic ETH 24:8A:07:CA:CD:48 eth 1/10
Notes If no routing-context is specified, the “routing-context” VRF is automatically displayed.
19.1.5.18.1 ping
ping [vrf <vrf-name>] [-LRUbdfnqrvVaA] [-c count] [-i interval] [-w deadline] [-p
pattern] [-s packetsize] [-t ttl] [-I interface or address] [-M mtu discovery hint] [-S sndbuf]
[-T timestamp option ] [-Q tos ] [hop1 ...] destination
Default N/A
1195
Configuration Mode config
History 3.1.0000
Example
Notes When using -I option use the interface name + interface number, for example “ping -I
vlan10”
19.1.5.18.2 traceroute
traceroute [vrf <vrf-name>] [-46dFITUnrAV] [-f first_ttl] [-g gate,...] [-i device] [-m
max_ttl] [-N squeries] [-p port] [-t tos] [-l flow_label] [-w waittime] [-q nqueries] [-s
src_addr] [-z sendwait] host [packetlen]
-4 Uses IPv4
-6 Uses IPv6
-F Sets DF (“do not fragment” bit) on
1196
-U Uses UDP datagram (default) for tracerouting
-t Sets the TOS (IPv4 type of service) or TC (IPv6 traffic class) value
for outgoing packets
Default N/A
History 3.1.0000
1197
Example
Related Commands
19.1.5.18.3 tcpdump
Invokes standard binary, passing command line parameters straight through. Runs in
foreground, printing packets as they arrive, until the user hits Ctrl+C.
Default N/A
History 3.1.0000
Example
1198
switch (config) # tcpdump
......
09:37:38.678812 IP 192.168.10.7.ssh > 192.168.10.1.54155: P
1494624:1494800(176) ack 625 win 90
<nop,nop,timestamp 5842763 858672398>
09:37:38.678860 IP 192.168.10.7.ssh > 192.168.10.1.54155: P
1494800:1495104(304) ack 625 win 90
<nop,nop,timestamp 5842763 858672398>
...
9141 packets captured
9142 packets received by filter
0 packets dropped by kernel
Related Commands
Notes • When using -i option use the interface name + interface number, for example
“tcpdump -i vlan10”
• For all flag options of this command refer to the linux ‘man page’ of tcp dump
19.1.5.19 QoS
Configures the router to copy PCP bits when transferring data from one subnet to another.
The no form of the command disables this ability.
Default Disabled
History 3.3.4000
Related Commands
Notes
1199
19.1.5.20 PBR
Creates direct or recursive nexthop-group and enter to the nexthop-group CLI context.
The no form of the command deletes the nexthop-group.
Default Disabled
History 3.9.2000
Notes Maximum number of created nexthop-groups is 1000. Name for the nexthop-group with
different IP family also should be different.
1200
19.1.5.20.2 nexthop-group direct nexthop interface
port-channel LAG
<ID>
Default Disabled
History 3.9.2000
Notes Maximum number of configured direct nexthops in one group is 128. One nexthop can be
configured only once in one nexthop-group.
1201
Syntax Description group_name Name of the desired nexthop-group
Default N/A
History 3.9.2000
19.1.5.20.4 route-map
Default N/A
1202
History 3.9.2000
Notes Maximum number of configured route-maps is 200. Name for the route-map with
different IP family also should be different.
<ip|ipv6> pbr route-map <map_name> seq <number> match {dest-addr <IP address/prefix
length>|source-addr <IP address/prefix length>|protocol <tcp|udp>|source-port <port>|dest-
port<port>|dscp <value>}
no <ip|ipv6> pbr route-map <map_name> seq <number> match
Create or modify sequence with new match rule. No form deletes match rule from the sequence.
Default N/A
Configuration config
Mode
History 3.9.2000
1203
Example switch (config) # ip pbr route-map r_ttt_v4 seq 3 match dest-addr
1.2.3.0/24 source-addr 4.5.6.0/24 dest-port 656 source-port 757
protocol tcp
Notes Match for source/destination IP address should be specified according to route-map IP family.
Maximum number of sequences is 2000 (totally in the system). Maximum number of IPv6
sequences is 2000. Sequence field can be omitted, in this case system with generate new
sequence number with index +10 for the last created. Currently DSCP value can be only
{0,1,2,3,4}.
Default N/A
Configuration config
Mode
History 3.9.2000
1204
Related show pbr route-map
Commands
Default N/A
Configuration config
Mode
History 3.9.2000
Notes
1205
Syntax map_name Name of the desired nexthop-group
Description
port- LAG
channel
<ID>
Default N/A
Configuration config
Mode
History 3.9.2000
Notes In one time one IPv4 and one IPv6 route-map can be bound on interface
Shows brief information about the all configured nexthop-groups. In case of specifying
nexthop-group name show details.
Default N/A
History 3.9.2000
1206
Example switch (config) # show ip pbr nexthop-group brief
Flags:
A: active
I: inactive
F: failed to install in H/W
-----------------------------------------------------------
--------------------------------
Name Type Flags
Notes
-----------------------------------------------------------
--------------------------------
n_ggg_v4 direct I Group
doesn't have active/resolved next-
hops
switch (config) # show ip pbr nexthop-group bbb
Flags:
A: active
I: inactive
F: failed to install in H/W
bbb:
Type : direct
Egress interface: vlan 4 (10.10.10.23)
Flags : A
Notes:
N/A
Related Commands
Notes In case of any misconfiguration field “Notes” will reflect it.
Shows brief information about the all configured route-maps. In case of specifying route-
map name show details.
Default N/A
1207
History 3.9.2000
Flags:
A: active
I: inactive
F: failed to install in H/W
------------------------------------------------------------
-------------------------------------
Name Total sequences
Active/Inactive Bound to interfaces
------------------------------------------------------------
-------------------------------------
r_ttt_v4 1
0/1
tests:
------------------------------------------------------------
--------
seq match counter nexthop-
group flags
------------------------------------------------------------
--------
1 protocol tcp 0
n_ggg_v4 A
Related Commands
Notes In case of any misconfiguration field “Notes” will reflect it.
1208
port-channel LAG
<ID>
Default N/A
History 3.9.2000
Vlan 3:
Admin state : Enabled
Operational state : Down
Autostate : Enabled
Mac Address : 7C:FE:90:F6:AA:08
DHCP client : Disabled
PBR route-map : r_ttt_v4
PBR route-map state: Active
…
Related Commands
Notes In case of any misconfiguration field “Notes” will reflect it.
1209
Syntax Description N/A
Default N/A
History 3.9.2000
Exceptions:
Nexthop-groups:
Nexthop-group n_ggg_v4 doesn't have active/resolved
next-hops
Route-maps:
Route-map r_ttt_v4 sequence 1 assigned nexthop-group is
not Active
Interfaces:
Interface vlan 3 assigned route-map is not Active
Related Commands
Notes Information about the total amount of configured nexthop-groups and route-maps
includes both IPv4 and IPv6 families and does not depend on the specified IP family in
CLI command.
19.1.6 IPv6
IP version 6 (IPv6) is a routing protocol which succeeds IPv4. With the expansion of the Internet and databases IPv6
addresses consist of 128 bits whose purpose is to allow networks to include a significantly higher number of nodes by
increasing the pool of available unique IP addresses. IPv6 packets alleviate overhead and allow for future
customizability.
1210
Textual representations of IPv6 addresses consist of 128 bits made up from eight 16-bit hexadecimal numbers separated
by colons. IPv6 addresses may be abbreviated as follows:
• You may omit leading zeros in each 16-bit sequence
• You may replace an entire sequence with a double colon if it equals zero
For example, these addresses represent the same IPv6 address:
• af23:0000:0000:0000:1284:037d:35ce:2401
• af23:0:0:0:1284:37d:35ce:2401
• af23::1284:37d:35ce:2401
IPv6 addresses typically denote a 64-bit network prefix and a 64-bit host address.
To configure Router1:
1. Enable IP routing. Run:
1211
switch (config)# ip routing
5. Configure IPv6 addresses for each one of the VLAN interfaces. Run:
7. Configure IPv6 unicast on port 8. Run:
To configure Router2:
1. Disable prefix mode on the CLI. Run:
3. Configure the switch ports to accept the VLANs of which they are part only. Run:
1212
switch (config)# interface ethernet 1/1 switchport access vlan 10 // port2
switch (config)# interface ethernet 1/2 switchport access vlan 50 // port8
switch (config)# interface ethernet 1/36 switchport access vlan 20 // port5
7. Configure IPv6 addresses for each one of the VLAN interfaces. Run:
Ping neighbor to verify IPv6 configuration:
1213
19.1.6.4 IPv6 Commands
ipv6 enable
no ipv6 enable
Default Unassigned
History 3.4.1100
Related Commands
Notes Assigning an IPv6 address to an interface also enables IPv6 processing on the interface.
1214
length Mask length for the associated address space
Range: 1-128
The mask length may be configured without a space (i.e. <ipv6-
address>/<length>)
Default N/A
History 3.4.1100
Related Commands
ipv6 nd managed-config-flag
no ipv6 nd managed-config-flag
History 3.4.1100
1215
3.6.4110 Updated configuration mode
Related Commands
Notes
Default 1000
History 3.4.1100
Related Commands
Notes
1216
19.1.6.4.5 ipv6 nd other-config-flag
ipv6 nd other-config-flag
no ipv6 nd other-config-flag
History 3.4.1100
Related Commands
Notes
1217
no-advertise Prevents advertising of the specified default prefix
no-autoconfig Indicates that the prefix cannot be used for stateless address
configuration
no-onlink Indicates that the prefix cannot be used for on-link determination
History 3.4.1100
Related Commands
1218
Syntax Description time Possible values:
infinite A value of all one bits (0xffffffff) and “infinite” represents infinity
Default If no lifetime period is configured on the interface, the default value is 1.5 times the
Router Advertisement (RA) interval set by the command “ipv6 nd ra interval”
History 3.4.1100
Related Commands
Notes • Using the RDNSS and DNSSL options, an IPv6 host can perform IPv6 address
network configuration and DNS information simultaneously, without using DHCPv6
for the DNS configuration
• A lifetime value set for an individual RDNSS overrides this value
• The lifetime value is the maximum amount of time after a route advertisement packet
is sent that the RDNSS referenced in the packet may be used for name resolution
Configures the IPv6 address of a Recursive DNS Server (RDNSS) to include in the
neighbor-discovery router advertisements (RAs).
The no form of the command removes the RDNSS from the configuration.
1219
lifetime Maximum lifetime value for the specified RDNSS entry. Possible
values:
infinite A value of all one bits (0xffffffff) and “infinite” represents infinity
Default If no lifetime period is configured on the interface, the default value is 1.5 times the
Router Advertisement (RA) interval set by the command “ipv6 nd ra interval”
History 3.4.1100
Related Commands
Notes • Including RDNSS information in RAs provides DNS server configuration for
connected IPv6 hosts without requiring DHCPv6
• Multiple servers can be configured on the interface by using the command repeatedly
• A lifetime value for the RDNSS can optionally be specified with this command, and
overrides any default value configured for the interface using the ipv6 nd ra dns-
servers lifetime command
1220
Syntax Description time Possible values:
infinite A value of all one bits (0xffffffff) and “infinite” represents infinity
Default If no lifetime period is configured on the interface, the default value is 1.5 times the
Router Advertisement (RA) interval set by the command “ipv6 nd ra interval”
History 3.4.1100
Related Commands
Notes The DNSSL contains the domain names of DNS suffixes for IPv6 hosts to append to
short, unqualified domain names for DNS queries
Syntax Description domain-name Domain suffix for IPv6 hosts to append to short unqualified domain
names for DNS queries
The suffix must contain only alphanumeric characters, “.” (periods),
“-” (hyphens), and must begin and end with an alphanumeric
character
1221
time Possible values:
infinite A value of all one bits (0xffffffff) and “infinite” represents infinity
Default If no lifetime period is configured on the interface, the default value is 1.5 times the
Router Advertisement (RA) interval set by the command “ipv6 nd ra interval”
History 3.4.1100
Role admin
Related Commands
Notes • The DNSSL contains the domain names of DNS suffixes for IPv6 hosts to append to
short, unqualified domain names for DNS queries
• Multiple DNS domain names can be added to the DNSSL by reusing the command
• A lifetime value for the DNSSL can optionally be specified with this command which
overrides any default value configured for the interface using the command “ipv6 nd
ra dns-suffixes lifetime”
1222
Syntax Description limit The hop-limit value to be included by attached hosts in outgoing
packets.
History 3.4.1100
Related Commands
Notes
Syntax Description time Maximum interval between successive IPv6 router advertisement
transmissions
Range: 4-1800 seconds
1223
Configuration Mode config interface vlan
config interface ethernet configured as a router port interface
config interface port-channel configured as a router port interface
History 3.4.1100
Related Commands
Router lifetime is associated with a router’s usefulness as default route, it does not apply
to information contained in other message fields or options. Options that need time limits
for their information include their own lifetime fields.
The no form of the command resets the parameter to its default value.
Syntax Description time The router lifetime specifies the period that the router can be
considered as a default router by RA recipients in seconds.
History 3.4.1100
1224
3.6.4110 Added support for IPv6
Related Commands
Notes
Default Suppressed
History 3.4.1100
Related Commands
1225
19.1.6.4.15 ipv6 nd ra suppress
Syntax Description all Configures the switch to suppress all RAs, including those responding
to a router solicitation.
History 3.4.1100
Related Commands
Notes
Sets the time period the switch includes in the reachable time field of outgoing
advertisements (RAs).
The no form of the command resets the parameter to its default value.
Syntax Description time In milliseconds; the reachable time defines the period that a node
assumes a neighbor is reachable after having received a reachability
confirmation. Values:
• 0 – unspecified by router
• 1 – 3600000 the period that a node assumes a neighbor is
reachable
1226
Default 0 (unspecified)
History 3.4.1100
Related Commands
Notes RAs that advertise zero seconds indicate that the router does not specify a reachable time
Sets the value the switch enters in the default router preference (DRP) field of router
advertisements (RAs) it sends.
The no form of the command resets the parameter to its default value.
Default Medium
History 3.4.1100
1227
Related Commands
Notes • IPv6 hosts maintain a default router list from which to select a router for traffic to
offlink destinations. The router’s address is then saved in the destination cache. The
neighbor discovery protocol (NDP) prefers routers that are reachable or probably
reachable over routers whose reachability is unknown or suspect. For reachable or
probably reachable routers, NDP can either select the same router every time or cycle
through the router list. DRP values specify a host’s preferred router.
• If router lifetime is zero, preference value must be medium
Syntax Description time In milliseconds; the time between retransmitted neighbor solicitation
messages. Possible values:
• 0 – unspecified
• Range – 1000-4294967295
Default 0 (unspecified)
History 3.4.1100
Related Commands
Notes
1228
19.1.6.4.19 ipv6 nd redirects
ipv6 nd redirects
no ipv6 nd redirects
Default Disabled
History 3.4.1100
Related Commands
Notes
Sets the number of consecutive neighbor solicitation messages sent for duplicate address
detection (DAD) validation.
The no form of the command resets the value to its default.
Default 1
1229
History 3.4.1100
Role admin
Related Commands
Notes
clear ipv6 neighbors {ethernet <slot> /<port> | port-channel <port-channel> | vlan <vlan-
id>} [<ipv6-addr>]
Default N/A
History 3.4.1100
Related Commands
1230
Notes • Commands that do not specify an IPv6 address remove all dynamic entries for the
listed interface
• Commands that do not specify an interface remove all dynamic entries
• General route:
ipv6 route [vrf <vrf-name>] {<ipv6-prefix> | <ipv6-address> /<length>} <next-hop-
ipv6-address> [<distance>]
• Local route:
ipv6 route [vrf <vrf-name>] {<ipv6-prefix> | <ipv6-address> /<length>}
ipv6 route
[<distance>]
• Drop route:
ipv6 route [vrf <vrf-name>] {<ipv6-prefix> | <ipv6-address> /<length>} null0
[<distance>]
• Delete route(s):
no ipv6 route [vrf <vrf-name>] {<ipv6-prefix> | <ipv6-address> /<length>} [<next-
hop-ipv6-address>]
Creates an IPv6 static route.
The no form of the command deletes static routes.
1231
History 3.4.1100
Related Commands
ipv6 routing
no ipv6 routing
Default Disabled
History 3.4.1100
Related Commands
Notes When routing is enabled, the switch attempts to deliver inbound packets to destination
addresses by forwarding them to interfaces or next hop addresses specified by the IPv6
routing table
1232
19.1.6.4.24 show ipv6 interfaces
Displays the status of specified routed interfaces that are configured for IPv6.
Syntax Description ethernet <port> Displays output pertaining to the specified Ethernet interface
Default N/A
History 3.6.4110
Example
1233
switch (config) # show ipv6 interface
Related Commands
Notes
show ipv6 interfaces [<type> <id>] brief
Syntax Description <type> <id> Specifies the interface for which to display data
Default N/A
History 3.6.4110
1234
3.6.8008 Updated Example
Example
-----------------------------------------------------------------------------
--------------------------------
Interface Address/Mask Primary Address-state Admin-state
Oper-state MTU VRF
-----------------------------------------------------------------------------
--------------------------------
mgmt0 fe80::784e/64 valid Enabled
Up 1500 default
Eth1/1 2001::1/64 primary valid Enabled
Down 1500 default
Eth1/1 2002::1/64 valid
Related Commands
Notes
Default N/A
History 3.6.4110
Related Commands
Notes
1235
19.1.6.4.27 show ipv6 neighbors
Syntax Description ethernet <port> Displays output pertaining to the specified Ethernet interface.
Default N/A
History 3.4.1100
Example
Related Commands
Notes
1236
Syntax Description ipv6-addr Filters routes by IPv6 address or prefix
summary Displays the current contents of the IPv6 routing table in summary
format
Default N/A
History 3.4.1100
Example
Flags:
F: Failed to install in H/W
B: BFD protected
i: BFD session initializing
x: protecting BFD session failed
Related Commands
1237
Note
19.2 OSPF
Open Shortest Path First (OSPF) is a link-state routing protocol for IP networks. It uses a link state routing algorithm
and falls into the group of interior routing protocols, operating within a single autonomous system (AS).
OSPF-speaking routers send Hello packets on all OSPF-enabled IP interfaces. If two routers sharing a common data
link agree on certain parameters specified in their respective Hello packets, they become neighbors.
Adjacencies, which can be thought of as virtual point-to-point links, are formed between some neighbors. OSPF defines
several network types and several router types. The establishment of an adjacency is determined by the types of routers
exchanging Hellos and the type of network over which the Hello packets are exchanged.
Each router sends link-state advertisements (LSAs) over all adjacencies. The LSAs describe all of the router’s links, or
interfaces, the router's neighbors, and the state of the links. These links might be to stub networks (those without another
router attached), to other OSPF routers, to networks in other areas, or to external networks (those learned from another
routing process). Because of the varying types of link-state information, OSPF defines multiple LSA types.
Each router receiving an LSA from a neighbor records the LSA in its link-state database and sends a copy of the LSA to
all of its other neighbors. By flooding LSAs throughout an area, all routers will build identical link-state databases.
When the databases are complete, each router uses the SPF algorithm to calculate a loop-free graph describing the
shortest (lowest cost) path to every known destination, with itself as the root.
When all link-state information has been flooded to all routers in an area, and neighbors have verified that their
databases are identical, it means the link-state databases have been synchronized and the route tables have been built.
Hello packets are exchanged between neighbors as keepalives, and LSAs are retransmitted. If the network topology is
stable, no other activity should occur.
19.2.1 Router ID
The router ID is a 32-bit number assigned to the router running the OSPF protocol. This number uniquely identifies the
router in the OSPF link-state database.
Router ID can be configured statically, however, if it is not configured, then the default election is as follows:
• If a loopback interface already exists, the router ID selects the highest loopback IP address assigned to a
loopback interface. Effective tunnel IP is considered as loopback address.
• Otherwise, the the highest IP address assigned to any other interface on the system is selected as router ID.
19.2.2 ECMP
Equal-cost multi-path (ECMP) routing is a routing strategy where next-hop packet forwarding to a single destination
can occur over multiple paths. The OSPF link-state routing algorithm can find multiple routes to the same destination,
all multiple routes are added to the routing table only if those routes are equal-cost routes.
In case there are several routes with different costs, only the route with the lowest cost is selected. In case there are
multiple routes with the same lowest cost, all of them are used (up to maximum of 64 ECMP routes).
ECMP is not configurable but is enabled by default for OSPF.
1238
19.2.3 Configuring OSPF
Prerequisites:
The following configuration example refers to Router 2 in the figure above The remainder of the routers in the
figure are configured similarly.
It is recommended to disable STP before enabling OSPF. Use the command “no spanning-tree”.
1239
5. Apply IP address to the VLAN interface. Run:
9. Enable the second interface. Run:
3. Associate the VLAN interfaces to the OSPF area. Area 0 is the backbone area. Run:
1240
switch (config) # show ip ospf
Routing Process 1 with ID 10.10.10.10 vrf-default
Stateful High Availability disabled
Graceful-restart is not supported
Supports only single TOS (TOS 0) route
Opaque LSA not supported
OSPF Admin State is enabled
Redistributing External Routes: Disabled
Administrative distance 110
Reference Bandwidth is 100Gb
Initial SPF schedule delay 1 msecs
SPF Hold time 10 msecs
Maximum paths to destination 64
Router is not originating router LSA with maximum metric
Condition: Always
Number of external LSAs 0, checksum sum 0
Number of opaque AS LSAs 0,checksum sum 0
Number of areas is 1, 1 normal, 0 stub, 0 nssa
Number of active areas is 1, 1 normal, 0 stub, 0 nssa
Area (0.0.0.0) (Active)
Interfaces in this area: 2 Active Interfaces: 2
Passive Interfaces: 0
SPF Calculation has run 5 times
This area is Normal area
Number of LSAs: 1, checksum sum 7700
2. Verify the OSPF neighbors status. Make sure that each neighbor reaches FULL state with its peer to enable it
take part in all dynamic routing changes in the network. Run:
3. Verify the OSPF interface configuration and status. Run:
1241
switch (config) # show ip ospf interface
Interface Vlan is 10 Enabled, line protocol is Down
IP address 10.10.10.2, Mask 255.255.0.0 [primary]
Process ID 1 VRF Default, Area 0.0.0.0
OSPF Interface Admin State is enabled
State DOWN, Network Type BROADCAST, Cost 1
Transmit delay 1 sec, Router Priority 1
No designated router on this network
No backup designated router on this network
Timer intervals (sec's): Hello 10, Dead 40, Wait 40, Retransmit 5
No authentication
Number of opaque link LSAs: 0, checksum sum 0
Interface Vlan is 20 Enabled, line protocol is Up
IP address 10.10.20.2, Mask 255.255.0.0 [primary]
Process ID 1 VRF Default, Area 0.0.0.0
OSPF Interface Admin State is enabled
State DESIGNATED ROUTER, Network Type BROADCAST, Cost 1
Transmit delay 1 sec, Router Priority 1
No designated router on this network
No backup designated router on this network
Timer intervals (sec's): Hello 10, Dead 40, Wait 40, Retransmit 5
No authentication
Number of opaque link LSAs: 0, checksum sum 0
• protocol ospf
• router ospf
• router-id
• shutdown
• auto-cost reference-bandwidth
• distance
• redistribute
• timers throttle spf
• area default-cost
• area range
• area stub
• area nssa
• no area
• default-information originate
• summary-address
• ip ospf cost
• ip ospf dead-interval
• ip ospf hello-interval
• ip ospf priority
• ip ospf network
• ip ospf retransmit-interval
• ip ospf passive-interface
• ip ospf transmit-delay
• ip ospf shutdown
• ip ospf authentication
• ip ospf authentication-key
1242
• ip ospf message-digest-key
• ip ospf area
• show ip ospf
• show ip ospf border-routers
• show ip ospf database
• show ip ospf interface
• show ip ospf neighbors
• show ip ospf request-list
• show ip ospf retransmission-list
• show ip ospf summary-address
protocol ospf
no protocol ospf
Enables Open Shortest Path First Protocol (OSPF), and unhides the related OSPF
commands.
The no form of the command deletes the OSPF configuration and hides the OSPF related
commands.
Default Disabled
History 3.3.3500
Notes
Creates an ospf instance in the specified VRF and enters the ospf configuration mode.
The default process ID is 1
If a VRF is not specified, the OSPF instance is created in the default VRF.
1243
Syntax Description process-id OSPF instance ID
Default Process ID – 1
VRF – active VRF routing-context
History 3.3.3500
Related Commands
19.2.4.3 router-id
router-id <ip-address>
no router-id
Default The router ID is a 32-bit number assigned to the router running the OSPF protocol. This
number uniquely identifies the router within an OSPF link-state database.
Router ID can be configured statically. However, if it is not configured, then the default
election is as follows:
• If a loopback interface already exists, the router ID takes the highest loopback IP
address assigned to a loopback interface
• Otherwise, the highest IP address is elected as router ID
1244
History 3.3.3500
Related Commands
Notes
19.2.4.4 shutdown
shutdown
no shutdown
History 3.3.3500
Related Commands
Note
1245
19.2.4.5 auto-cost reference-bandwidth
Default 100Gbps
History 3.3.3500
Related Commands
Notes
19.2.4.6 distance
distance <value>
no distance
Default 110
1246
Configuration Mode config ospf router
History 3.3.3500
Related Commands
Notes
19.2.4.7 redistribute
Enables importing routes from other routing protocols as well as any statically
configured routers into OSPF.
The no form of the command disables the importing of the routes.
History 3.6.3506
Related Commands
1247
Notes Routes from multiple protocols can be imported in parallel.
Syntax Description spf-delay The interval by which SPF calculations delayed after a topology
change reception
Range: 0-100 (milliseconds)
History 3.3.3500
Example switch (config router ospf)# timers throttle spf 100 1000
Related Commands
Notes
Specifies cost for the default summary route sent into an OSPF stub or not-so-stubby
area (NSSA).
The no form of the command sets the cost to the default value.
1248
cost The cost for the default summary route
Range: 1-16777215.
Default The summary route cost is based on the area border router that generated the summary
route
History 3.3.3500
Related Commands
Default Disabled
History 3.3.3500
1249
Example switch (config router ospf)# area 0 range 10.10.10.10 /24
Related Commands
Notes
no-summary Summary route will not be advertised into the stub area
History 3.3.3500
Related Commands
Note
1250
19.2.4.12 area nssa
no-summary Summary route will not be advertised into the NSSA area
History 3.3.3500
Related Commands
1251
19.2.4.13 no area
no area <area-id>
Default N/A
History 3.3.3500
Related Commands
Syntax Description always Default route is always advertised even if the default route is not in
the routing table
Default m-value – 1
m-type – 2
1252
Configuration Mode config ospf router
History 3.6.8008
Related Commands
Notes When default route origination is enabled, the router automatically becomes ASBR and
advertises a default route
19.2.4.15 summary-address
prefix Network prefix (in the format of /24 or 255.255.255.0, for example).
Default N/A
History 3.3.3500
Related Commands
1253
19.2.4.16 ip ospf cost
Syntax Description cost The Interface cost used by the OSPF. Range is 1-65535.
Default Reference_BW/Link_BW
History 3.3.3500
Related Commands
Notes
Configures the interval during which at least one Hello packet must be received from
a neighbor before the router declares that neighbor as down.
The no form of the command resets this parameter to its default.
Default 40 seconds
1254
Configuration Mode config interface vlan
config interface ethernet (configured as a router port interface)
config interface port-channel (configured as a router port interface)
History 3.3.3500
Related Commands
Notes The value must be the same for all nodes on the network.
Configures the interval between Hello packets that OSPF sends on the interface.
The no form of the command resets this parameter to default.
Default 10
History 3.3.3500
Related Commands
Notes The value must be the same for all nodes on the network.
1255
19.2.4.19 ip ospf priority
Syntax Description number The Interface priority used by the OSPF protocol
Range: 0-255
Default 1
History 3.3.3500
Related Commands
Notes • Use the “ip ospf priority” command to set the router priority, which determines the
designated router for this network. When two routers are attached to a network,
both attempt to become the designated router.
• The router with the higher router priority takes precedence. If there is a tie, the
router with the higher router ID takes precedence. A router with a router priority
set to zero cannot become the designated router or backup designated router.
• broadcast
• point-to-point
1256
Default Broadcast for VLAN interfaces
Point-to-point for router port interfaces
History 3.3.3500
Related Commands
Notes • The network type influences the behavior of the OSPF interface. An OSPF
network type is usually broadcast, which uses OSPF multicast capabilities. Under
this network type, a designated router and backup designated router are elected.
For point-to-point networks, there are only two neighbors and multicast is not
required.
• All routers on the same network must have the same network type
Configures the time between OSPF link-state advertisement (LSA) retransmissions for
adjacencies that belongs to the interface.
The no form of the command resets this parameter to its default.
Default 5
History 3.3.3500
1257
Example switch (config interface vlan 10)# ip ospf retransmit-
interval 10
Related Commands
Notes
ip ospf passive-interface
no ip ospf passive-interface
History 3.3.3500
Related Commands
Notes
Sets the estimated time required to send an OSPF link-state update packet.
The no form of the command resets this parameter to its default.
1258
Syntax Description seconds The transmit-delay interval in seconds
Range: 0-3600
Default 1
History 3.3.3500
Related Commands
Notes
ip ospf shutdown
no ip ospf shutdown
History 3.3.3500
Related Commands
1259
Notes
Default Disabled
History 3.3.3500
Related Commands
• 0 – unencrypted password
• 7 – MD5 key
1260
Default Unencrypted password
History 3.3.3500
Related Commands
Notes • When selecting an encrypted password “7”, the user must input a password
encrypted with an MD5 key
• When selecting an unencrypted password “0”, the user must input a cleartext
password. Then when examining the running-config, it exhibits the encrypted
password.
• 0 – Unencrypted password
• 7 – MD5 key
Default Unencrypted
1261
History 3.3.3500
Related Commands
Notes The user cannot delete the last key until authentication is disabled.
Configures OSPF area of this interface (and creates the area if non-existent).
The no form of the command removes the interface from the area.
Default N/A
History 3.3.3500
Related Commands
Notes
1262
Syntax Description process-id OSPF instance ID
Default Process ID – 1
VRF – active VRF routing-context
History 3.3.3500
Example
Related Commands
1263
Notes
Syntax Description vrf OSPF routing table entries to an Area Border Routers on specific
VRF
History 3.3.3500
Example
Related Commands
Notes
1264
area-id Filters the command per OSPF area ID
Range: 0-4294967295
Default Process ID – 1
VRF – active VRF routing-context
History 3.3.3500
Related Commands
1265
Notes
vlan <vlan-id> Displays OSPF interface configuration and status per VLAN
interface
Default Process ID – 1
VRF – active VRF routing-context
History 3.3.3500
Example
1266
switch (config) # show ip ospf interface 2 vrf myvrf
Related Commands
Notes
Syntax Description vlan-id Displays OSPF interface configuration and status per VLAN
interface
1267
Configuration Mode Any command mode
History 3.3.3500
Example
Related Commands
Notes BFD session state is displayed as: established, failed or not established. When BFD is
not defined in the command, it is not displayed in the output.
1268
19.2.4.34 show ip ospf request-list
Displays the OSPF list of all link-state advertisements (LSAs) requested by a router.
Syntax Description neighbor-id Filers the output per a specific OSPF neighbor
History 3.3.3500
Example
Related Commands
Notes
1269
19.2.4.35 show ip ospf retransmission-list
Displays the OSPF list of all link-state advertisements (LSAs) waiting to be resent to
neighbors.
Syntax Description neighbor-id Filers the output per a specific OSPF neighbor
Default vrf – active VRF routing-context
History 3.3.3500
Example
Related Commands
Notes
1270
19.2.4.36 show ip ospf summary-address
Syntax Description vrf <vrf-name> Display summary address and area range information on specific
VRF
Default vrf – active VRF routing-context
History 3.3.3500
Example
Related Commands
Notes
19.3 BGP
Border Gateway Protocol (BGP) is an exterior gateway protocol which is designed to transfer routing information
between routers. It maintains and propagates a table of routes which designates network reachability among
autonomous systems (ASs).
BGP neighbors, or peers, are routers configured manually to converse using the BGP protocol on top of a TCP session
on port 179. A BGP speaker periodically sends keep-alive messages to maintain the connection. Network reachability
includes such information as forwarding destinations (IPv4 or IPv6) together with a list of ASs that this information
traverses and other attributes, so it becomes possible to construct a graph of AS connectivity without routing loops. BGP
makes possible to apply policy rules to enforce connectivity graph.
1271
BGP routers communicate through TCP connection on port 179. Connection between BGP neighbors is configured
manually or can be established dynamically by configuring dynamic listen groups. When BGP runs between two peers
in the same AS, it is referred to as Internal BGP (iBGP, or Interior Border Gateway Protocol). When it runs between
separate ASs, it is called External BGP (eBGP, or Exterior Border Gateway Protocol). Both sides can initiate a
connection, after the initial connectivity is created, BGP state machine drives both sides to enter into ESTABLISHED
state where they can exchange UPDATE messages with reachability information.
Follow these steps for basic BGP configuration on two switches (Router 1 and Router 2):
1272
Prerequisites:
1. Enable IP routing functionality. Run:
Configure BGP:
1. Enable BGP. Run:
To run iBGP, the AS number of all remote neighbors should be identical to the local AS number of the
configured router.
1273
switch (config router bgp 100)# neighbor 10.10.10.2 remote-as 100
4. Configure BGP Router 2 neighbor. Run:
• Verify that the state of each BGP neighbor reached to ESTABLISHED state.
• If the neighbor is disabled (shutdown). The state of the neighbor will be IDLE.
• BGP incoming and outgoing messages should be incremented.
• The AS number of each neighbor is the correct one.
2. Check the status of the neighbors. Run:
You should be able to see running BGP counters and ESTABLISHED state per active neighbor.
1274
• MAC/IP advertisement route (route type 2) – advertises MAC and IP addresses of end-systems and their
mapping to broadcast domains (VXLAN VNIs and EVPN EVIs). It is used for unicast forwarding, ARP
suppression, and advertising default gateway in the EVPN network.
• Inclusive multicast Ethernet tag route (route type 3) – advertises EVPN bridge domain (EVI) and originating
router IP address. The EVPN network uses those addresses to instantiate forwarding plane for BUM (Broadcast,
unknown Unicast, unknown Multicast) traffic.
• IP prefix route (type 5) – advertises IP prefix, IP gateway, IP address, and HW encapsulation (VNI in the case of
VXLAN). This route is used to establish IP prefix LPM routing in the EVPN nodes.
Other route types (type 1 and 4) are used in multi-homing environments only.
RFC 7432 defines BGP attributes that should be used together with Layer-2 EVPN address family routes:
• PMSI tunnel attributes – used for inclusive multicast Ethernet tag route to define multicast type (head end
replication) and data path (VNI)
• MAC mobility extended community – used in MAC/IP routes to inform neighbors about MAC roaming events
• Default gateway – used by MAC/IP route to establish default gateway routes
• Route targets – used by all routes to import and export BGP Layer-2 VPN to forwarding and from plane
1275
BGP unnumbered uses 169.254.101.101 as the unnumbered nexthop. As such, while using BGP unnumbered,
do not use this address in your topology in the following usages:
1. The interface's IPv4 addresses
2. The prefix or nexthop of static routes
3. The ARP neighbor address
interface loopback 1
interface loopback 1 ip address 25.1.1.1/32 primary
interface vrf default ip address alias loopback1
4. Configure BGP
protocol bgp
router bgp 200 vrf default
1276
switch (config) # show ip bgp neighbors interface ethernet 1/2
BGP neighbor: ethernet 1/2 (fe80::268a:7ff:fe7b:8508), remote AS: 100, link:
external:
BGP version : 4
Configured hold time in seconds : 180
keepalive interval in seconds (configured) : 60
keepalive interval in seconds (established with peer): 60
Minimum holdtime from neighbor in seconds : 180
Peer group :
Neighbor configuration:
------------------------------------------------------------------------
Configuration IPV4 Unicast IPV6 Unicast L2VPN EVPN
------------------------------------------------------------------------
Configured AFI SAFI Enabled Disabled Disabled
Send Community Disabled Disabled Disabled
Send Extended Community Disabled Disabled Disabled
Route Reflection Disabled Disabled Disabled
Next Hop Unchanged Disabled Disabled Disabled
Extended next hop IPv4 Disabled Enabled Disabled
Neighbor capabilities:
Route Refresh : advertise and received
Enhanced Route Refresh : advertise and received
Soft Reconfiguration : Disabled
Graceful Restart Capability: advertise and received
Address family IPv4 Unicast: advertise and received
Address family IPv6 Unicast: n/a
Address family L2VPN EVPN : n/a
Extended next hop IPv4 : advertise and received
Message statistics:
InQ depth : 0
OutQ depth: 0
......
Connection Information:
Connections established : 1
Dropped : 0
Last Reset : 0:00:00:36
Last Drop Reason : 0 (0)
Maximum hops to external BGP neighbor: 1
Connection State : ESTABLISHED
Local host : fe80::268a:7ff:fe7b:8408
Local port : 43870
Foreign host : ethernet 1/2 (fe80::268a:7ff:fe7b:8508)
Remote port : 179
1277
19.3.10 BGP Commands
• BGP Commands
• BGP Monitoring Protocol
• Config
• protocol bgp
• clear ip bgp
• router bgp
• Config Router
• shutdown
• address-family
• aggregate-address
• bestpath as-path multipath-relax
• bgp default
• bgp fast-external-fallover
• bgp listen limit
• bgp listen range peer-group
• bgp redistribute-internal
• cluster-id
• client-to-client reflection
• distance
• graceful-restart stalepath-time
• maximum-paths
• neighbor
• neighbor activate
• neighbor advertisement-interval
• neighbor allowas-in
• neighbor default-originate
• neighbor description
• neighbor ebgp-multihop
• neighbor export-localpref
• neighbor fall-over bfd
• neighbor graceful-restart helper
• neighbor import-localpref
• neighbor local-as
• neighbor local-v6-addr
• neighbor maximum-prefix
• neighbor next-hop-peer
• neighbor next-hop-self
• neighbor next-hop-unchanged
• neighbor password
• neighbor no-password
• neighbor peer-group
• neighbor remote-as
• neighbor remove-private-as
• neighbor route-map
• neighbor no-route-map
• neighbor route-reflector-client
• neighbor send-community
• neighbor shutdown
• neighbor soft-reconfiguration
1278
• neighbor soft-reconfiguration inbound
• neighbor timers
• neighbor transport connection-mode passive
• neighbor update-source
• neighbor no-update-source
• neighbor weight
• network
• redistribute
• router-id
• route-map
• timers bgp
• vni
• vni rd
• vni route-target
• vni auto-create
• route-table prefix-list
• Show
• show {ip | ipv6} bgp
• show ip bgp address-family
• show ip bgp community
• show ip bgp evpn
• show ip bgp evpn summary
• show ip bgp exceptions
• show ip bgp neighbors
• show ip bgp neighbors advertised/received address-family
• show ip bgp neighbors received
• show ip bgp neighbors received detail
• show ip bgp paths
• show ip bgp peer-group
• show ip bgp summary
• show ip bgp update-group
• show ip bgp vrf summary
• IP AS-Path Access-List
• ip as-path access-list
• show ip as-path access-list
• IP Community-List
• ip community-list standard
• ip community-list expanded
• show ip community-list
19.3.11.1 Config
protocol bgp
no protocol bgp
1279
Default Disabled
History 3.3.5006
Notes
Clears BGP learned routes from the BGP table and resets the connection to the neighbor.
Syntax Description ip-address A BGP peer IP address. Only the specified neighbor is reset.
soft Clears BGP learned routes from the BGP table without resetting the
connection to the neighbor
Default N/A
1280
History 3.3.5006 First release
3.6.3004 Removed “out” parameter
Related Commands
Notes This command removes BGPv4 learned routes from the routing table, reads all routes
from designated peers, and sends routes to those peers as required.
Syntax Description as-number Autonomous system number: A unique number to be used to identify
the AS. The AS is a number which identifies the BGP router to other
routers and tags the routing information passed along.
Range: 1-4294967295
Default N/A
History 3.3.5006
1281
Example switch (config)# router bgp 100
switch (config router bgp 100)#
Notes
19.3.11.2.1 shutdown
shutdown
no shutdown
Default Enabled
History 3.3.5006
Related Commands
Notes
19.3.11.2.2 address-family
address-family <ipv4-unicast | ipv6-unicast | l2vpn-evpn>
1282
ipv6-unicast Enables IPv6 address family configuration mode
Default IPv4
History 3.6.4070
3.6.8100 Added “l2vpn-evpn” parameter
Related Commands
Notes
19.3.11.2.3 aggregate-address
attribute-map Assigns attribute values in set commands of the map’s permit clauses.
Deny clauses and match commands in permit clauses are ignored.
1283
Default Disabled
History 3.4.0000
Related Commands
Notes • Aggregate routes combine the characteristics of multiple routes into a single route
that the switch advertises
• Aggregation can reduce the amount of information that a BGP speaker is required to
store and transmit when advertising routes to other BGP speakers
• Aggregate routes are advertised only after they are redistributed
Default Disabled
History 3.3.5006
3.6.3004 Added “force” parameter
1284
Example switch (config router bgp 100)# bestpath as-path multipath-
relax
Notes • With this option disabled, only routes with exactly the same AS path as the best route
to a destination are considered for ECMP
• With this option enabled, all routes with similar length AS path as the best route are
considered for ECMP
Reverts protocol to initial state (IPv4 enabled), enabling setting address families as default
for peer or peer-group activation.
Disables setting address families as default for peer or peer-group activation.
Default N/A
History 3.6.4070
Related Commands
Notes This command can be used multiple times and each address family can be configured
separately.
1285
19.3.11.2.6 bgp fast-external-fallover
bgp fast-external-fallover
no bgp fast-external-fallover
Terminates eBGP sessions of any directly adjacent peer without waiting for the hold-down
timer to expire if the link used to reach the peer goes down.
The no form of the command waits for hold-down timer to expire before terminating eBGP
sessions.
History 3.4.0000
Notes Although this feature improves BGP conversion time, it may cause instability in your BGP
table due to a flapping interface.
Syntax Description maximum The maximum number of dynamic BGP peers to be allowed on the switch
Range: 1-128
Default 100
1286
History 3.4.0000
Example switch (config router bgp 100)# bgp listen limit 101
Related Commands
Notes
Identifies a range of IP addresses from which the switch will accept incoming dynamic
BGP peering requests.
After applying the no form of the command, the switch will no longer accept dynamic
peering requests on the range.
Default 100
History 3.4.0000
Related Commands
1287
Notes • To create a static peer group, use the command neighbor peer-group
• Neighbors in a dynamic peer group are configured as a group and cannot be configured
individually
• The no form of the command may take up to a few seconds to take effect if there are
many dynamic peers and/or a lot of routes. While the clean-up process is running,
creation of a new listen range that overlaps the deleted one will fail.
• If dynamic peer range is defined with an overlap to another defined range, the longest
remote address prefix take affect
bgp redistribute-internal
no bgp redistribute-internal
remote-as Remote peer’s number
<as-number>
Default Disabled
History 3.4.0000
Related Commands
Notes
1288
19.3.11.2.10 cluster-id
History 3.2.1000
3.6.3004 Added “force” parameter
Related Commands
Notes
client-to-client reflection
no client-to-client reflection
1289
Default client-to-client reflection is enabled
History 3.2.1000
Related Commands
Notes
19.3.11.2.12 distance
Default external: 20
internal: 200
local: 200
History 3.3.5006
1290
Related Commands
Notes • Routers use administrative distances to decide on a route when two protocols provide
routing information to the same destination
• Lower distance values correspond to higher reliability
• Routes are external when learned from an external autonomous system
• Routes are internal when learned from a peer in the local autonomous system
• Local routes are those networks listed with a network router configuration command,
often as back doors, for the router or for the networks being redistributed from another
process
• BGP routing tables do not include routes with a distance of 255
Configures the maximum time that stale routes from a restarting BGP neighbor are retained
after a BGP session is reestablished with that peer.
The no form of the command resets to the default value.
History 3.4.0000
Related Commands
Note
19.3.11.2.14 maximum-paths
maximum-paths [ibgp] <maximum-path>
Configures the maximum number of parallel eBGP/iBGP routes that the switch installs in
the routing table.
1291
Syntax Description ibgp Sets the configuration on the internal BGP
Default 1
History 3.3.5006
Related Commands
Notes • This command provides an ECMP parameter that controls the number of equal-cost
paths that the switch installs in the routing table for each destination
• The action is effective after BGP restart
• If the parameter “ibgp” is not used, the setting is applied on routes learned from peers
from other ASs
• If “ibgp” is used, the setting is applied to routes learned from peers of the same AS
19.3.11.2.15 neighbor
Configures a neighbor.
The no form of the command removes the neighbor, dropping the connection and all routes
if already connected.
Default Disabled
1292
Configuration Mode config
config router bgp
History 3.9.0500
Default N/A
History 3.6.4070
1293
3.6.4110 Added “disable” option to the command
3.6.8100 Added “config router bgp address-family” configuration mode
Related Commands
Notes There are 4 possible ways of using the “disable” prefix:
• After the “router bgp *”
switch (config) # router bgp 65001 disable address-family
l2vpn-evpn neighbor 192.168.3.2 activate
• After the “router bgp * address-family l2vpn-evpn”
switch (config) # router bgp 65001 address-family l2vpn-
evpn disable neighbor 192.168.3.2 activate
neighbor <ip-address | peer-group-name | ethernet | port-channel> advertisement-interval
<delay>
no neighbor <ip-address | peer-group-name | ethernet | port-channel> advertisement-
interval
Sets the minimum route advertisement interval (MRAI) between the sending of BGP
routing updates.
The no form of the command disables this function.
1294
peer-group- Peer group name
name
Default 30 seconds
History 3.4.0000
3.6.3004 Updated description of “delay” parameter
With address family—can be done only on peer group not on single neighbor:
Related
Commands
Notes When configuring an advertisement interval to a BGP session, this interval is implemented
per prefix route of that session. For example: If a session is configured with advertisement
interval of 100 seconds, when it first learns a new route it automatically sends an update on
this route. If it learns another route in the same prefix as the initial route, it waits for 100
seconds. But if it learns another route in a different prefix it immediately advertises that
route and does not wait another 100 seconds.
1295
19.3.11.2.18 neighbor allowas-in
neighbor <ip-address | peer-group-name | ethernet | port-channel> allowas-in [number]
no neighbor <ip-address | peer-group-name | ethernet | port-channel> allowas-in
number Number of switch’s (ASN) allowed in path
Range: 0-10; where “0” disables this function and prevents the system from
inheriting this parameter’s group configuration
Default N/A
History 3.4.0000
3.6.3004 Updated description of “number” parameter
1296
Notes Neighbors from the same AS as the router are considered as iBGP peers, and neighbors
from other ASs are considered eBGP peers.
neighbor <ip-address | peer-group | ethernet | port-channel> default-originate
[route_map_name]
no neighbor <ip-address | peer-group | ethernet | port-channel> default-originate
[route_map_name]
disable neighbor <ip-address | peer-group | ethernet | port-channel> default-originate
[route_map_name]
Default N/A
History 3.6.4070
3.6.4110 Added “disable” option to the command
1297
Example switch (config router bgp 100)# neighbor 10.10.10.1 default-
originate default-attr
Related
Commands
Notes
neighbor <ip-address | peer-group-name | ethernet | port-channel> description <string>
no neighbor <ip-address | peer-group-name | ethernet | port-channel> description
Default No description
History 3.3.5006
1298
Example switch (config router bgp 100)# neighbor 10.10.10.10
description The next door neighbor
Related Commands
Enables BGP to connect to external peers that are not directly connected to the switch.
The no form of the command resets the value to the default (TTL = 1).
ttl Time-to-live
Range: 1-255 hops; where “1” disables connecting to external peers
and prevents the system from inheriting this parameter’s group
configuration
Default ttl—1
History 3.3.5006
3.6.3004 Updated description of “ttl” parameter
1299
Related Commands ip routing
neighbor <ip-address> remote-as <as-number>
Notes The command does not establish the multi-hop if the only route to the peer is the default
route (0.0.0.0)
neighbor <ip-address | peer-group-name | ethernet | port-channel> export-localpref
<value>
no neighbor <ip-address | peer-group-name | ethernet | port-channel> export-localpref
Configures the local preference value sent to the specified peer or peer group.
The no form of the command resets the local preference to its default value.
Default 100
History 3.4.0000
3.6.3004 Updated description of “value” parameter
1300
Example switch (config router bgp 100)# neighbor 10.10.10.10
export-localpref 100
Related Commands
Notes
Default Enabled
History 3.6.4070
Related Commands
Notes The command “no neighbor <ip_address> fall-over bfd” affects traffic. BGP will restore
the connection based on Hello protocol.
1301
19.3.11.2.24 neighbor graceful-restart helper
Enables BGP graceful restart helper mode for the specified BGP neighbor or peer
group.
The no form of the command disables this parameter.
History 3.4.0000
Related Commands
Notes • When graceful restart helper mode is enabled, the switch retains routes from
neighbors capable of graceful restart while those neighbors are restarting BGP
• Individual neighbor configuration takes precedence over the global configuration
neighbor <ip-address | peer-group-name | ethernet | port-channel> import-localpref <value>
no neighbor <ip-address | peer-group-name | ethernet | port-channel> import-localpref
<value>
Configures the local preference value assigned to routes received from the specified peer or
peer group.
The no form of the command resets the local preference to its default value.
1302
value Preference value
Range: 0-2147483647; where “100” configures the default, and prevents
the system from inheriting this parameter’s group configuration
Default 100
History 3.4.0000
3.6.3004 Updated description of “value” parameter
Related Commands
Notes
neighbor <ip-address | peer-group-name | ethernet | port-channel> local-as <asn-id> [no-
prepend | no-prepend replace-as]
no neighbor <ip-address | peer-group-name | ethernet | port-channel> local-as
Enables the modification of the AS path attribute for routes received from an eBGP neighbor.
The no form of the command disables AS path modification for the specified peer or peer
group.
1303
peer-group- Peer group name
name
asn-id AS number that is sent instead of the actual AS of the switch. Range:
0-4294967295
no-prepend local-as number is not prepended to the routes received from external
neighbors
no-prepend Replaces the local-as (as configured with the IP address argument) in the AS
replace-as path attribute without pre-pending it to the routes received from external
neighbors.
Default N/A
History 3.4.0000
3.6.3004 Updated description of “as-id” parameter
1304
Related Commands ip routing
neighbor <ip-address> remote-as <as-number>
Notes • This function allows the switch to appear as a member of a different autonomous system
(AS) to external peers
• To disable peering with the neighbor run the command “clear ip bgp”
Specifies the switche’s next-hop value sent using IPv6 NLRI in IPv4 transport session.
The no form of the command removes next-hop value.
Default N/A
History 3.6.4070
Related Commands
Notes
1305
19.3.11.2.28 neighbor maximum-prefix
neighbor <ip-address | peer-group-name | ethernet | port-channel> maximum-prefix
<maximum> [warning-only]
no neighbor <ip-address | peer-group-name | ethernet | port-channel> maximum-prefix
Configures the number of BGP routes the switch accepts from a specified neighbor and
defines an action when the limit is exceeded.
The no form of the command removes the limitation.
maximum Number of BGP routes the switch accepts from a specified neighbor
Range: 1-2147483647; where “12000” configures the default, and
prevents the system from inheriting this parameter’s group
configuration
Default 12000
History 3.4.0000
3.6.3004 Updated description of “maximum” parameter
1306
Related Commands ip routing
neighbor <ip-address> remote-as <as-number>
Notes
neighbor <ip-address | peer-group-name | ethernet | port-channel> next-hop-peer [disable]
no neighbor <ip-address | peer-group-name | ethernet | port-channel> next-hop-peer
Configures the switch to replace the next-hop attribute in routes advertised to IBGP peers
with the address of the EBGP peer that advertised this route.
The no form of the command disables this function.
disable Disables this function and prevents the system from inheriting this
parameter’s group configuration
Default no next-hop-peer
History 3.3.5006
3.6.3004 Added “disable” parameter
1307
Example switch (config router bgp 100)# neighbor 10.10.10.10 next-
hop-peer
Related Commands
Notes This command overrides the next hop for all routes received from this neighbor or peer
group
neighbor <ip-address | peer-group-name | ethernet | port-channel> next-hop-self [disable]
no neighbor <ip-address | peer-group-name | ethernet | port-channel> next-hop-self
Configures the IP address of the router as the next hop address in routes advertises to the
specific neighbor.
The no form of the command resets this parameter to its default.
disable Disables this function and prevents the system from inheriting this
parameter’s group configuration
Default no next-hop-self
History 3.3.5006
1308
3.9.0300 Added support for unnumbered neighbors and Updated example
Notes • This function is used in networks where BGP neighbors do not directly access all other
neighbors on the same subnet.
• In the default state, the next hop is generated based on the IP address and the present
next hop in the route information.
neighbor <ip-address | peer group | ethernet | port-channel> next-hop-unchanged
no neighbor <ip-address | peer group | ethernet | port-channel> next-hop-unchanged
disable neighbor <ip-address | peer group | ethernet | port-channel> next-hop-unchanged
Enables preserving BGP next-hop when forwarding routes to this eBGP peer or all eBGP peers
in this address family.
The no form of the command removes configuration and enables inheritance of AFI SAFI
next-hop-unchanged configuration from a peer group if this neighbor is member in one.
The disable form of the command disables preserving BGP next-hop when forwarding routes
to this eBGP peer or all eBGP peers in this address family.
Default The next-hop of a route is preserved when advertising the route to an iBGP peer, but is
updated when advertising the route to an eBGP peer. Setting this to “true” overrides this
behavior and preserves the next-hop when routes are advertised to this eBGP peer.
History 3.6.8100
1309
3.9.0300 Added support for unnumbered neighbors and Updated example
Note There are 4 possible ways of using the “disable” prefix:
neighbor <ip-address | peer-group-name | ethernet | port-channel> password [<encryption>]
<string>
no neighbor <ip-address | peer-group-name | ethernet | port-channel> password
1310
string Up to 8 bytes in length
History 3.4.0000
Related Commands
1311
ethernet interface ethernet <ifname>
Default N/A
History 3.6.3004
Notes
1312
Default N/A
History 3.4.0000
Related Commands
Notes • Once a peer group is created, the group name can be used as a parameter in neighbor
configuration commands, and the configuration will be applied to all members of the
group
• Settings applied to an individual neighbor in the peer group override group settings
• A neighbor can only belong to one peer group, so issuing this command for a neighbor
that is already a member of another group removes it from that group
• When a neighbor is removed from a peer group, the neighbor does not retain the
configuration inherited from the peer group.
• Router BGP peer-group password cannot be set when enabling with secure mode
• A BGP group must be used by either a single listen range, or by a set of neighbors
sharing the same type (iBGP or eBGP)
• A group must already exist before a node is configured to use it
• Any configuration change on a group affects each of the peers inheriting this specific
parameter from the group only after undergoing admin state toggle
Configures a neighbor.
The no form of the command removes the neighbor, dropping the connection and all routes
if already connected.
1313
as-number The BGP peer as-number
Range: 1-65535
Default N/A
History 3.3.5006
Notes Neighbors from the same AS as the router are considered as iBGP peers, and neighbors
from other ASs are considered eBGP peers
neighbor <ip-address | peer-group-name | ethernet | port-channel> remove-private-as
[disable]
no neighbor <ip-address | peer-group-name | ethernet | port-channel> remove-private-as
Removes private autonomous system numbers from outbound routing updates for external
BGP (eBGP) neighbors.
The no form of the command preserves private AS numbers for the specified peer.
disable Preserves private AS numbers for the specified peer and prevents the
system from inheriting this parameter’s group configuration
1314
port-channel interface port-channel <ifname>
Default N/A
History 3.4.0000
Notes • This can only be used with external BGP (eBGP) peers
• If the update has only private AS numbers in the AS path, BGP removes these numbers
• If the AS path includes both private and public AS numbers, BGP does not remove the
private AS numbers. This situation is considered a configuration error
• If the AS path contains the AS number of the eBGP neighbor, BGP does not remove the
private AS number
• If the AS path contains confederations, BGP removes the private AS numbers only if
they come after the confederation portion of the AS path
1315
19.3.11.2.37 neighbor route-map
neighbor <ip-address | peer-group-name | ethernet | port-channel> route-map <route-map-
name> [in | out]
no neighbor <ip-address | peer-group-name | ethernet | port-channel> route-map [route-map-
name] [in | out]
disable neighbor <ip-address | peer-group-name | ethernet | port-channel> route-map [route-
map-name] [in | out]
Configures route-map export or import to the peer either for a specific address family or for all
(depending on the configuration context).
The no form of the command removes map-route configuration and enables inheritance. The
Onyx inheritance priority is as follows:
a. Peer AFI-SAFI
b. Peer
c. Peer Group AFI-SAFI
d. Peer Group
The “disable” form of the command resets the route-map configuration to the default and
disables inheritance.
in | out • in—sets route import to the peer for this AFI/SAFI
• out—sets route export to the peer for this AFI/SAFI
If no parameter is explicitly used, both in and out are configured.
Default N/A
History 3.3.5006
1316
3.3.5200 Updated notes and default
3.4.1100 Added “out” parameter
3.6.8100 Added “config router bgp address-family” configuration mode
Notes • There are 3 possible ways of using the “disable” prefix:
• At the beginning of the command
switch (config) # disable router bgp 65001 address-family l2vpn-evpn neighbor
192.168.3.2 route-map
• After the “router bgp *”
switch (config) # router bgp 65001 disable address-family l2vpn-evpn neighbor
192.168.3.2 route-map
• After the “router bgp * address-family l2vpn-evpn”
switch (config) # router bgp 65001 address-family l2vpn-evpn disable neighbor
192.168.3.2 route-map
• When inheritance is enabled (by default or when using the no form of the command), then
if there is no peer AFI SAFI route-map configuration, then Onyx checks whether a route-
map was at the peer level or not. If yes, then Onyx takes it. Otherwise, Onyx continues
looking to the peer group AFI SAFI, and then the peer group (if a peer is member of a peer
group).
• Only one inbound route-map can be applied to a given neighbor
• If a new route-map is applied to a neighbor, it replaces the previous route map
• Changing a route-map only takes effect on routes received or sent after the change
• A route-map must already exist before a node is configured to use it
1317
19.3.11.2.38 neighbor no-route-map
Unsets route-map for neighbor and prevents the system from inheriting this parameter’s
group configuration.
in | out • in—sets route import to the peer for this AFI/SAFI
• out—sets route export to the peer for this AFI/SAFI
If no parameter is explicitly used, both in and out are configured.
Default N/A
History 3.6.3004
1318
Notes BGP command "no-route-map" is deprecated and been replaced with the disable form of the
BGP neighbor route-map command.
neighbor <ip-address | peer-group | ethernet | port-channel> route-reflector-client
no neighbor <ip-address | peer-group | ethernet | port-channel> route-reflector-client
disable neighbor <ip-address | peer-group | ethernet | port-channel> route-reflector-client
Configures a given peer to be a reflector client of this router for this address-family.
The no form of the command removes configuration and enables inheritance of AFI/SAFI
route-reflector-client configuration from a peer group if this neighbor is member in one.
The disable form of the command removes a given peer from being a reflector client of this
router for this AFI/SAFI and disables configuration inheritance.
Default N/A
History 3.3.5006
3.6.3004 Added “disable” parameter
3.6.8100 Added “config router bgp address-family” configuration mode
1319
Example switch (config router bgp 100)# neighbor 10.10.10.10 route-
reflector-client
Related
Commands
Notes There are 4 possible ways of using the “disable” prefix:
neighbor <ip-address | peer group | ethernet | port-channel> send-community [extended]
no neighbor <ip-address | peer group | ethernet | port-channel> send-community [extended]
disable neighbor <ip-address | peer group | ethernet | port-channel> send-community
[extended]
Enables sending UPDATE messages to the peer containing BGP community attributes either
for this address family or all relevant address-families.
The no form of the command removes configuration and enables inheritance of send-
community attribute configuration.
The disable form of the command disables sending UPDATE messages containing BGP
community attributes.
extended Enables sending UPDATE messages to the peer for this address family
containing extended BGP community attributes
1320
port- interface port-channel <ifname>
channel
Default Enabled
History 3.4.0000
3.6.3004 Added “disable” parameter
3.6.8100 Added “config router bgp address-family” configuration mode
Related
Commands
Notes There are 4 possible ways of using the “disable” prefix:
1321
19.3.11.2.41 neighbor shutdown
neighbor <ip-address | peer-group-name | ethernet | port-channel> shutdown [disable]
no neighbor <ip-address | peer-group-name | ethernet | port-channel> shutdown
disable Enables BGP neighbor and prevents the system from inheriting this
parameter’s group configuration
Default Enabled
History 3.3.5006
Related
Commands
1322
Notes • Disabling a neighbor terminates all its active sessions and removes associated routing
information
• A group’s shutdown immediately impacts every peer in this group, making them inherit
this parameter
Default Enabled
History 3.6.4070
Related Commands
Notes
1323
19.3.11.2.43 neighbor soft-reconfiguration inbound
neighbor <ip-address | peer-group-name | ethernet | port-channel> soft-reconfiguration
inbound
no neighbor <ip-address | peer-group-name | ethernet | port-channel> soft-reconfiguration
inbound
Default N/A
History 3.6.8100
Related Commands
Notes This command is mandatory to show received EVPN for this neighbor
1324
19.3.11.2.44 neighbor timers
neighbor <ip-address | peer-group-name | ethernet | port-channel> timers <keep-alive> <hold-
time>
no neighbor <ip-address | peer-group-name | ethernet | port-channel> timers
hold-time The period the switch waits for a keepalive or update message before it
disables peering
Default keep-alive—60 seconds
hold-time—180 seconds
History 3.3.5006
1325
3.6.3004 Updated “hold-time” and “keep-alive” parameter’s syntax description
Notes Hold time must be at least 3 seconds and should be three times longer than the keep-alive
setting.
neighbor <ip-address | peer-group-name | ethernet | port-channel> transport connection-
mode passive [disable]
no neighbor <ip-address | peer-group-name | ethernet | port-channel> transport connection-
mode passive
Sets the TCP connection for the specified BGP neighbor or peer group to passive mode.
The no form of the command sets the specified BGP neighbor or peer group to active
connection mode.
disable Sets the specified BGP neighbor or peer group to active connection mode and
prevents the system from inheriting this parameter’s group configuration
1326
Configuration config router bgp
Mode
History 3.4.0000
3.6.3004 Added “disable” parameter
Related
Commands
Notes • When the peer’s transport connection mode is set to passive, it accepts TCP connections
for BGP, but does not initiate them
• BGP peers in active mode can both accept and initiate TCP connections for BGP
Configures the source-address for routing updates and to establish TCP connections with
peers.
The no form of the command disables configured source-address for routing updates and for
TCP connection establishment with a peer.
1327
vlan <vlan-id> VLAN interface
Range: 1-4094
History 3.3.5006
Related
Commands
Notes If BGP update-source on neighbor is configured, the given interface’s primary address is used
as the source address. If BGP update-source configured on a peer group, the primary address is
not guaranteed to be the source.
Disables configured source-address for routing updates and for TCP connection
establishment with a peer and prevents the system from inheriting this parameter’s group
configuration.
History 3.6.3004
1328
Example switch (config router bgp 100)# neighbor 10.10.10.2 no-
update-source
Related Commands
Notes
neighbor <ip-address | peer-group-name | ethernet | port-channel> weight <value>
no neighbor <ip-address | peer-group-name | ethernet | port-channel> weight
• Range: 0-65535
• Explicitly configuring a default value prevents the system from
inheriting this parameter’s group configuration
Default Value is 32768 for router-originated paths and 0 for routes received through BGP
History 3.4.0000
1329
3.9.0300 Added support for unnumbered neighbors and Updated example
Related Commands
Notes • Weight values set through route map commands have precedence over neighbor weight
command values
• Other attributes are used only when all paths to the prefix have the same weight
• A path’s BGP weight is also configurable through route maps
• When multiple paths to a destination prefix exist, the best-path selection algorithm
prefers the path with the highest weight
• Weight is the first parameter that the BGP best-path selection algorithm considers
19.3.11.2.49 network
Syntax ip_prefix_len A string that specific route map is assigned to the network.
Description gth
route-map- The name of a route-map which is used to set the route’s attributes when it is
name advertised.
Default N/A
History 3.3.5006
1330
3.6.4070
Related
Commands
Notes • The parameters “ip-prefix” and “length” specify the route destination
• The configuration zeros the host portion of the specified network address (e.g.
192.0.2.4/24 is stored as 192.0.2.0/24)
• Address family is identified by the network address itself and not by the configuration
command context
19.3.11.2.50 redistribute
[neighbor <peer_group>] redistribute {connected | static | ospf | ospf-internal | ospf-
external} [<route-map>]
no redistribute {connected | static | ospf}
Default No redistribution
1331
History 3.2.1000
3.6.4070
Related Commands
19.3.11.2.51 router-id
History 3.3.5006
3.6.3004 Added “force” parameter
Related Commands
1332
Notes The IP address configured identifies the BGP speaker. The command triggers an automatic
notification and session reset for the BGP neighbors.
19.3.11.2.52 route-map
Specifies a route map that will be applied in the given direction for specific address family.
The no form of the command removes this configuration.
Default N/A
History 3.6.4070
Related Commands
Notes
Syntax Description keep-alive Frequency with which keepalive messages are sent to its peer. Range:
1-3600 seconds. 0—no keep-alive messages are sent.
1333
hold Interval after not receiving a keepalive message that a peer is declared
dead. Range: 3-7200 seconds. 0—peer is held indefinitely regardless of
keep-alive messages.
Default Keepalive time—60 secs
Hold time—180 secs
History 3.3.5006
19.3.11.2.54 vni
vni <vni_value>
no vni <vni_value>
Default N/A
1334
Configuration config router bgp address-family l2vpn-evpn
Mode
History 3.8.1000
Notes This command is irrelevant when using the enabled auto-create mode.
19.3.11.2.55 vni rd
Default N/A
History 3.8.1000
Notes This command is irrelevant when using the enabled auto-create mode.
1335
19.3.11.2.56 vni route-target
Valid ranges:
Default N/A
History 3.8.1000
Notes This command is irrelevant when using the enabled auto-create mode.
vni auto-create
no vni auto-create
1336
Default N/A
History 3.8.1000
Configure RTM policy for IPv4 or IPv6 address-family and bind it with a prefix-list in
export direction from BGP RIB to routing table or import in the reverse direction.
The no forms of the command removed the RTM policy for IPv4 or IPv6 address-family.
Default N/A
History 3.8.2100
1337
Example switch (config) # router bgp 1 address-family ipv4-unicast
switch (config router bgp 1 address-family ipv4-unicast) #
route-table prefix-list kuku import
switch (config router bgp 1 address-family ipv4-unicast) #
route-table prefix-list kuku export
switch (config router bgp 1 address-family ipv4-unicast) #
exit
switch (config) # show ip bgp address-family ipv4-unicast
19.3.11.3 Show
Syntax Description
Default
1338
Configuration Mode
History
Example
1339
Output 1:
Status codes:
s: suppressed
d: damped
h: history
*: valid
>: best
i: internal
r: RIB-failure
S: Stale
m: multipath
b: backup-path
x: best-external
Origin codes:
i: IGP
e: EGP
?: incomplete
-------------------------------------------------------------------------
Network Next Hop Status Metric LocPrf Weight Path
-------------------------------------------------------------------------
192.168.100.0/24 0.0.0.0 *> 0 100 32768 i
Output 2:
mtbc-baidu-01-2410 [standalone: master] (config) # show ip bgp BGP table version: 65 Loca
Related Commands
Notes
1340
active Displays active neighbors in that address family (configured, active
or dynamic)
Default N/A
History 3.6.4070
3.7.1000 Added “l2vpn-evpn” parameter and Updated example
3.8.2100 Added RTM import/export policy
Example
1341
Example output 1:
Neighbors:
-----------------------------------------------------------------------------
----------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down
State/PfxRcd
-----------------------------------------------------------------------------
----------
1.1.1.1 4 65002 0 1 6 0 0 Never
ACTIVE/0
Total peer-groups : 1
Peer Group : peer
Total dynamic ranges : 0
Auto-Create VNI : Disable
-----------------------------------------------------------------------------
------
VNI Vlan Route Distinguisher Route Target
-----------------------------------------------------------------------------
------
1000 5 1.2.3.4:3 None
1342
Example output 2:
switch (config) # show ip bgp address-family ipv4-unicast detail
Address family : IPv4
Maximum Path : 0/0
Redistribute :
Total Neighbors: 1
Neighbors:
-----------------------------------------------------------------------------
----------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down
State/PfxRcd
-----------------------------------------------------------------------------
----------
3.3.3.3 4 200 0 0 1 0 0 Never
IDLE/0
Total peer-groups : 1
Peer Group : basim_ipv4
Total dynamic ranges: 0
Address family configuration:
Next hop unchanged: Enable
Example output 3:
Related Commands
Notes
show ip bgp [vrf <vrf-name>] community <comm1> <comm2> ... <commn> [exact]
[detail]
Displays information about the BGP routes (RIB) filtered according to communities.
1343
Default N/A
History 3.4.0000
Example
Notes
1344
19.3.11.3.4 show ip bgp evpn
show ip bgp [vrf <vrf-name>] [neighbors <ip | peer-group | ethernet | port-channel> [received
| advertised]] evpn [route-type <type> | community {<aa:nn> | <number>} | extcommunity
route-target {<aa:id> | <aa.bb:id> | <ip:id>} | extcommunity router-mac <mac-address> | vni
<value> | rd <rd>] [detail]
Displays BGP EVPN routes received from all neighbors in specified VRF or the VRF
currently under context.
• auto-discovery—Ethernet Auto-discovery Route
• mac-ip—MAC/IP Advertisement Route
• imet—Inclusive Multicast Ethernet Tag Route
• ethernet-segment—Ethernet Segment Route
• ip-prefix—IP Prefix Route
community <aa:nn>—community number
<number>—community number
1345
rd Filters by route target
• <aa:id>—Route Target (asplain)
• <aa.bb:id>—Route Target (asdot)
• <ip:id>—Rout Target (IP)
Default N/A
History 3.6.8100
3.9.0300 Adding vni attribute to "show ip bgp evpn detail" for imet routes and added
example
3.9.1000 Added ability to select several attributes for filtering output routes
Example
-----------------------------------------------------------------------------
----------------------------------------------------------
RD Type Data Next
Hop Metric LocPrf Weight Path
-----------------------------------------------------------------------------
----------------------------------------------------------
2.3.4.5:5 mac-ip 00:bb:cc:dd:ee:ff
2.3.4.5 0 100 0 ?
2.3.4.5:6 mac-ip 00:aa:bb:cc:dd:ee
2.3.4.5 0 100 0 ?
1.2.3.4:5 imet 1.2.3.4
1.2.3.4 0 100 0 ?
1.2.3.4:6 imet 1.2.3.4
1.2.3.4 0 100 0 ?
2.3.4.5:5 imet 2.3.4.5
2.3.4.5 0 100 0 ?
2.3.4.5:6 imet 2.3.4.5
2.3.4.5 0 100 0 ?
1346
switch (config) # show ip bgp evpn vni 1000
-----------------------------------------------------------------------------
----------------------------------------------------------
RD Type Data Next
Hop Metric LocPrf Weight Path
-----------------------------------------------------------------------------
----------------------------------------------------------
2.3.4.5:5 mac-ip 00:bb:cc:dd:ee:ff
2.3.4.5 0 100 0 ?
1.2.3.4:5 imet 1.2.3.4
1.2.3.4 0 100 0 ?
2.3.4.5:5 imet 2.3.4.5
2.3.4.5 0 100 0 ?
-----------------------------------------------------------------------------
----------------------------------------------------------
RD Type Data Next
Hop Metric LocPrf Weight Path
-----------------------------------------------------------------------------
----------------------------------------------------------
2.3.4.5:5 mac-ip 00:bb:cc:dd:ee:ff
2.3.4.5 0 100 0 ?
switch (config) # show ip bgp evpn vni 1000 route-type mac-ip detail
Related Commands
Notes
1347
19.3.11.3.5 show ip bgp evpn summary
show ip bgp [vrf <vrf>] evpn summary
Displays some basic statistics about BGP per VRF only for neighbors who support
L2EVPN AF.
Default N/A
History 3.6.8100
Example
-----------------------------------------------------------------------------
-----------------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down
State/PfxRcd
-----------------------------------------------------------------------------
-----------------
192.168.3.2 4 65002 25 29 2 0 0
0:00:11:10 ESTABLISHED/1
192.168.5.2 4 65003 24 28 2 0 0
0:00:11:17 ESTABLISHED/0
Related Commands
Notes
1348
19.3.11.3.6 show ip bgp exceptions
Default N/A
History 3.9.0300
Notes
1349
ifname Interface number (Ethernet or port-channel number)
Default N/A
History 3.3.5200
3.8.2200 Updated xample to reflect the new "Enhanced Route Refresh" display
Example
1350
Output 1:
Neighbor configuration:
------------------------------------------------------------------------
Configuration IPV4 Unicast IPV6 Unicast L2VPN EVPN
------------------------------------------------------------------------
Configured AFI SAFI Enabled Disabled Enabled
Send Community Enabled Enabled Enabled
Send Extended Community Enabled Enabled Enabled
Route Reflection Disabled Disabled Disabled
Next Hop Unchanged Disabled Disabled Enabled
Extended next hop IPv4 Disabled Disabled Disabled
Neighbor capabilities:
Route Refresh : advertise and received
Enhanced Route Refresh : advertise and received
Soft Reconfiguration : Disabled
Graceful Restart Capability: advertise and received
Address family IPv4 Unicast: advertise and received
Address family IPv6 Unicast: n/a
Address family L2VPN EVPN : advertise and received
Extended next hop IPv4 : n/a
Message statistics:
InQ depth : 0
OutQ depth: 0
----------------------------------------------
Parameter Sent Rcvd
----------------------------------------------
Opens 1 1
Notification 0 0
Updates 4 4
Keepalives 9 9
Refreshes 0 0
Total 14 14
1351
IPV4 Unicast:
----------------------------------------------
Prefix activity Sent Rcvd
----------------------------------------------
Prefixes Current 1 1
Prefixes Total 1 1
Implicit Withdraw 0 0
Explicit Withdraw 0 0
Used as bestpath n/a 1
Used as multipath n/a n/a
--------------------------------------------------------
Local Policy Denied Prefixes Outbound Inbound
--------------------------------------------------------
Total 2 0
L2VPN EVPN:
----------------------------------------------
Prefix activity Sent Rcvd
----------------------------------------------
Prefixes Current 1 1
Prefixes Total 1 1
Implicit Withdraw 0 0
Explicit Withdraw 0 0
Used as bestpath n/a 1
Used as multipath n/a n/a
--------------------------------------------------------
Local Policy Denied Prefixes Outbound Inbound
--------------------------------------------------------
Total 2 0
Connection Information:
Connections established : 1
Dropped : 0
Last Reset : 0:00:06:59
Last Drop Reason : 6 (2)
Maximum hops to external BGP neighbor: 255
Connection State : ESTABLISHED
Local host : 192.168.1.1
Local port : 56794
Foreign host : 192.168.10.2
Remote port : 179
Output 2:
1352
BGP neighbor: ethernet 1/1, remote AS: 65002, link: external:
BGP version : 4
Configured hold time in seconds : 180
keepalive interval in seconds : 60
Minimum holdtime from neighbor in seconds: 90
Peer group :
Neighbor configuration:
------------------------------------------------------------------------
Configuration IPV4 Unicast IPV6 Unicast L2VPN EVPN
------------------------------------------------------------------------
Configured AFI SAFI Enabled Disabled Enabled
Send Community Disabled Disabled Disabled
Send Extended Community Disabled Disabled Disabled
Route Reflection Disabled Disabled Disabled
Next Hop Unchanged Disabled Disabled Disabled
Neighbor capabilities:
Route Refresh : advertise and received
Enhanced Route Refresh : advertise and received
1353
Soft Reconfiguration : Disabled
Graceful Restart Capability: advertise
Address family IPv4 Unicast: advertise and received
Address family IPv6 Unicast: n/a
Address family L2VPN EVPN : advertise and received
Message statistics:
InQ depth : 0
OutQ depth: 0
-------------------------------------------
Parameter Sent Rcvd
-------------------------------------------
Opens 1 1
Notification 0 0
Updates 3 2
Keepalives 12 11
Refreshes 0 0
Total 16 14
L2VPN EVPN:
----------------------------------------------
Prefix activity Sent Rcvd
----------------------------------------------
Prefixes Current 2 2
Prefixes Total 2 2
Implicit Withdraw 0 0
Explicit Withdraw 0 0
Used as bestpath n/a 2
Used as multipath n/a n/a
--------------------------------------------------------
Local Policy Denied Prefixes Outbound Inbound
--------------------------------------------------------
Total 0 0
Connection Information:
Connections established : 4
Dropped : 1
Last Reset : 0:00:03:22
Last Drop Reason : 6 (2)
Maximum hops to external BGP neighbor: 255
Connection State : ESTABLISHED
Local host : 192.168.2.1
Local port : 179
Foreign host : 192.168.2.2
Local Port : 50394
Output 3:
1354
switch (config) # show ip bgp neighbors
Related Commands
Notes
Default N/A
History 3.8.2200
1355
Example Output 1:
Status codes:
s: suppressed
d: damped
h: history
*: valid
>: best
i: internal
r: RIB-failure
S: Stale
m: multipath
b: backup-path
x: best-external
Origin codes:
i: IGP
e: EGP
?: incomplete
--------------------------------------------------
Network Next Hop Status Metric LocPrf Weight Path
--------------------------------------------------
192.168.1.1/32 192.168.7.1 i* 0 100 32768 i
Output 2:
switch (config) # show ip bgp neighbors interface ethernet
1/17 advertised ipv4-unicast
...
------------------------------------------------------------
---------------------------------------
Network Next Hop Status Metric
LocPrf Weight Path
------------------------------------------------------------
---------------------------------------
17.1.1.0/24 Eth1/17 * 0
0 32768 300 ?
...
Related Commands
1356
Notes • In order to use received option, user must first configure soft-reconfiguration-inboud
as follows:
switch (config) # router bgp 100 neighbor 192.168.7.2 soft-reconfiguration inbound
• Received option "shows BGP routes" shows all received routes before applying
policies
• Advertised option shows BGP routes after applying policies.
longer- Displays the routes to the specified destination and any routes to a
prefixes more specific destination (only available if both IP and mask are
specified)
Default N/A
History 3.3.5200
Example
1357
Output 1:
Status codes:
s: suppressed
d: damped
h: history
*: valid
>: best
i: internal
r: RIB-failure
S: Stale
m: multipath
b: backup-path
x: best-external
Origin codes:
i: IGP
e: EGP
?: incomplete
--------------------------------------------------------------------
Network Next Hop Status Metric LocPrf Weight Path
--------------------------------------------------------------------
94.0.0.0/24 192.168.3.2 *> 0 100 0 100 i
Output 2:
switch (config) # show ip bgp neighbors interface ethernet 1/17 received
Related Commands
Notes
1358
19.3.11.3.10 show ip bgp neighbors received detail
Syntax Description ip-address Neighbor IP address. Provide optionally to display routes received
from specified neighbor.
mask Mask length. Displays routes received from specified neighbor filtered
by the specified network.
Default N/A
History 3.3.5200
Example
1359
switch (config)# show ip bgp 192.168.100.0 /24 longer-prefixes detail
Local Connected:
Origin : IGP
metric : 0
localpref : 100
weight : 32768
Attributes: valid, best
switch (config)# show ip bgp 192.168.100.0 /24 detail
Local connected:
0.0.0.0 from 0.0.0.0 (192.168.100.11):
Origin : IGP
metric : 0
localpref : 100
weight : 32768
Attributes: valid, sourced, best
Related Commands
Notes
show ip bgp paths [vrf <vrf-name>] [ipv4 | ipv6]
Displays summary of all AS paths and for prefixes for specific address family.
Default N/A
History 3.3.5200
1360
Example switch (config) # show ip bgp paths
Refcount Metric Path
1 0 4 50 100
1 0 2 50 100
1 0 4 40
1 0 12 50 100
1 0 2
1 0 2 20
Related Commands
Notes
Displays information about peer groups and configuration, filtered per address family.
Default N/A
History 3.4.0000
Example
1361
switch (config) # show ip bgp peer-group peerGrp1
Name : peerGrp1
Hold time : 180
Keep-alive : 60
Max prefix : 100000
Weight : 0
Export local preferences: 100
Import local preferences: 100
Status Down : no
EBGP Multihop : 1
Next Hop Self : no
Soft Reconfiguration : no
Next Hop Peer : no
Remove Private AS : no
Transport Mode : no
Password : no
Local AS : 0
No Prepend : no
Replace AS : no
Soft Reconfiguration : Disabled
------------------------------------------------------------------------
Configuration IPV4 Unicast IPV6 Unicast L2VPN EVPN
------------------------------------------------------------------------
Configured AFI SAFI Disabled Disabled Disabled
Send Community Disabled Disabled Disabled
Send Extended Community Disabled Disabled Disabled
Route Reflection Disabled Disabled Disabled
Next Hop Unchanged Disabled Disabled Disabled
-----------------------------------------------------------------------------
-------------------------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ
Up/Down State/PfxRcd
-----------------------------------------------------------------------------
-------------------------
192.168.2.2 4 65001 355 413 7 0 0
0:00:00:26 ESTABLISHED/2
Related Commands
Notes
1362
Syntax Description N/A
Default N/A
History 3.3.5200
Example
1363
Output 1:
switch (config) # show ip bgp summary
-----------------------------------------------------------------------------
------------------
Neighbor V AS MsgRcvd MsgSent InQ OutQ Up/Down State/PfxRcd
-----------------------------------------------------------------------------
------------------
Output 2:
switch (config) # show ip bgp vrf default summary
-----------------------------------------------------------------------------
-------------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down
State/PfxRcd
-----------------------------------------------------------------------------
-------------
Eth1/17 4 23 378 377 31 0 0 0:05:05:14
ESTABLISHED/6
17.1.1.23 4 23 79 80 31 0 0 0:01:04:34
ESTABLISHED/4
2323::1 4 100 0 0 31 0 0 Never
IDLE/0
Related Commands
Notes
1364
19.3.11.3.14 show ip bgp update-group
show ip bgp update-group <neighbor ip address | ethernet | port-channel>
Default N/A
History 3.6.4070
Example
1365
switch (config)# show ip bgp update-group 192.168.2.2
-----------------------------------------------------------------------------
-----------------------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ
Up/Down State/PfxRcd
-----------------------------------------------------------------------------
-----------------------
192.168.2.2 4 65001 368 428 7 0 0
0:00:06:30 ESTABLISHED/2
Update-group : 5
BGP version : 4
Address Family : IPv4 Unicast
Minimum time between advertisements runs in seconds: 30
Has 1 members:
192.168.2.2
Update-group : 6
BGP version : 4
Address Family : L2VPN EVPN
Minimum time between advertisements runs in seconds: 30
Has 1 members:
192.168.2.2
-----------------------------------------------------------------------------
-------------------------------------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ
Up/Down State/PfxRcd
-----------------------------------------------------------------------------
-------------------------------------
Eth1/1 4 100 6 7 1 0 0
0:00:03:23 ESTABLISHED/0
1366
Related Commands
Notes
show ip bgp vrf {<vrf-name> | all} summary
Default N/A
History 3.6.6000
Example
1367
switch (config)# show ip bgp summary
-----------------------------------------------------------------------------
---------------
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down
State/PfxRcd
-----------------------------------------------------------------------------
---------------
1.1.1.1 4 65002 25 29 3 0 0 0:00:10:38
ESTABLISHED/2
1.1.1.5 4 100 0 0 3 0 0 Never
IDLE/0
Related Commands
Notes
ip as-path access-list <list-name> {permit | deny} <reg-exp> [any | egp | igp | incomplete]
no ip as-path access-list <list-name>
1368
any Any route type
incomplete Routes marked as “Incomplete”
Default N/A
History 3.4.0000
Related Commands
Notes If access list_name does not exist, this command creates it. If it already exists, this
command appends statements to the list.
Default N/A
History 3.4.0000
1369
Related Commands
Notes
19.3.11.5 IP Community-List
Default N/A
History 3.4.0000
Related Commands
1370
Notes A BGP community access list filters route maps that are configured as BGP communities.
The command uses regular expressions to name the communities specified by the list.
Default N/A
History 3.4.0000
Related Commands
Notes A BGP community access list filters route maps that are configured as BGP communities.
The command uses regular expressions to name the communities specified by the list.
1371
Syntax Description community- An optional parameter to display only the specified list
list-name
Default N/A
History 3.4.0000
Related Commands
Notes A BGP community access list filters route maps that are configured as BGP communities.
The command uses regular expressions to name the communities specified by the list.
BGP monitoring protocol (BMP) is defined in RFC 7854, and is used to monitor BGP sessions. BMP is used to
exchange BGP speaker status with a BMP collector. Usually, this speaker installs a number of BGP sessions with peers
and one (or more) BMP sessions with a collector. The BGP speaker updates the BMP server with the data received from
its protocol, concerning changes in its peer sessions, and periodically sends out BGP statistics.
protocol bmp
no protocol bmp
Enables BMP.
The no form of the command disables BMP.
Default N/A
History 3.7.1100
1372
Example switch (config)# protocol bmp
Related Commands
Notes • BMP commands are not executed when protocol BMP is disabled
• Running protocol BMP when “no ip l3” is configured is not possible
Default N/A
History 3.7.1100
Related Commands
Notes
1373
Default N/A
History 3.7.1100
Related Commands
Notes
Default N/A
History 3.7.1100
Related Commands
1374
19.3.12.1.5 ip bmp server address port
ip bmp [vrf <vrf name>] server <id> address <address> port <port>
no ip bmp [vrf <vrf name>] server <id> address <address> port <port>
Default N/A
History 3.7.1100
Related Commands
Notes It is not possible to update a server’s address while the server is active
Default N/A
History 3.7.1100
1375
Example
Related Commands
Note If no server ID is supplied, the command displays BMP configurations for all configured
BMP servers under a VRF
1376
• Single hop session traverse between two adjacent IP neighbors. BFD control packet should be encapsulated in
UDP with DPORT = 3784. SPORT should be in range 49152 to 65535. Same SPORT must be used for all
control BFD packets for given session and is unique between different sessions. TTL value is 255.
• Multi-hop sessions traverse between to remote ip neighbors. Control packets are encapsulated in UDP with
DPORT = 4784.
If different protocols want to establish a BFD session with the same remote system for same data plane – they should
share BFD session.
IPv4 and IPv6 data protocols have different BFD sessions.
In OSPF Protocol neighbor discovery protocol establishes single hop BFD sessions. For OSPF when session fails – it
tears down OSPF neighbor.
BFD session is established to BGP neighbor (single hop or multiple hop).
Single hop BFD session can be established for static route next hop.
protocol bfd
protocol bfd
no protocol bfd
Syntax N/A
Description
Default N/A
History 3.6.4070
Related
Commands
Notes The command returns an error if BFD is enabled in clients already running on the system (static
routes or BGP of OSPF)
1377
bfd shutdown
Syntax N/A
Description
Default N/A
History 3.6.4070
Related
Commands
Notes • The command “no ip bfd shutdown” or BFD interval parameters modification are affect
traffic for all protocols; OSPF, BGP, static routes. The dynamic protocols (OSPF and BGP)
restore the connection based on Hello protocol.
• For static routes, please execute “no ip route static bfd <ip address>”
bfd interval
1378
Syntax Description transmit-rate Transfer time between two consecutive BFD
messages, the actual time is negotiated between
two systems
Range: 50-60000 (msec)
History 3.6.4070
Related Commands
Notes The command is executed in the active VRF if a VRF is not specified
ip ospf bfd
ip ospf bfd
no ip ospf bfd
Enables BFD on the given interface for all OSPF neighbors on a number of
active sessions.
The no form of the command disables BFD on all OSPF neighbors.
1379
Default N/A
History 3.6.4070
3.6.4110 Added “no” form of the
command
Related Commands
Notes The command “ip ospf bfd” affects traffic, OSPF restores the connection
based on Hello protocol
ip route bfd
Default N/A
1380
History 3.6.4070
Related Commands
Notes When a session fails, all static routes pointing to the specified gateway
are removed from the routing decision
show ip route [vrf [<vrf-name> | all]] static
Syntax Description all Displays routing tables for all VRF instances
History 3.6.4070
1381
Notes If no routing-context is specified, the “routing-context” VRF is automatically
displayed
Default N/A
History 3.6.4110
Example
1382
switch (config) # show ip bgp neighbors 1000::1040
1383
BGP neighbor: 1000::1040, remote AS: 100, link: external
BGP version: 4, remote router ID: 2.1.1.1
BGP State: ESTABLISHED
Last read: 0:00:09:28, last write: 0:00:09:28, hold time is: 180, keepalive
interval in seconds: 60
BFD State: Up
Configured hold time in seconds: 180, keepalive interval in seconds: 60
Minimum holdtime from neighbor in seconds: 180
Neighbor capabilities:
Route refresh: advertise and received
Graceful Restart Capability: advertise and received
Address family IPv4 Unicast: advertise and received
Address family IPv6 Unicast: n/a
Message statistics:
InQ depth is: 0
OutQ depth is: 0
---- -----
Sent Rcvd
---- -----
Opens: 1 1
Notifications: 0 0
Updates: 4 4
Keepalives: 1587 1593
Route Refresh: 0 0
Total: 1592 1598
Default minimum time between advertisement runs in seconds: 30
---- ----
Sent Rcvd
Prefix activity: ---- ----
Prefixes Current: 4 2
Prefixes Total: 4 2
Implicit Withdraw: 0 0
Explicit Withdraw: 0 0
Used as bestpath: n/a 2
Used as multipath: n/a n/a
-------- -------
Outbound Inbound
Local Policy Denied Prefixes: -------- -------
Total: 0 0
1384
Related
Commands
Notes
• Route Map
• Route Map Commands
• route-map
• continue
• abort
• match as-number
• match as-path
• match community-list
• match ip/ipv6 address
• match ip next-hop
• match metric
• set as-path prepend
• set community additive
• set community none
• set community delete
• set community-list
• set community-list additive
• set community-list delete
• set ip next-hop
• set local-preference
• set metric
• set origin
• set weight
• show route-map
• IP Prefix-List
• Configuring Prefix-List with Multiple Entries
• IP Prefix-List Commands
• ip prefix-list
• ip prefix-list bulk-mode
• ip prefix-list commit
1385
• permit
• show ipv6 prefix-list
19.5.2.1 route-map
Creates a route map that can be used for importing, exporting routes and applying local
policies.
The no form of the command deletes configured route maps.
Default N/A
History 3.3.5006
Related Commands
Notes • All changes in a the route map configuration mode become pending until the end of
the route-map session
• If not configured, deny | permit is configured as permit
• If not configured, sequence-number default value is 10
1386
19.5.2.2 continue <sequence-number>
continue <sequence-number>
no continue
Enables additional route map evaluation of routes whose parameters meet the clause’s
matching criteria.
The no form of the command removes this configuration from the route map clause.
Default N/A
History 3.3.5006
Notes • A clause typically contains a match (route-map) and a set (route-map) statement. The
evaluation of routes whose settings are the same as match statement parameters
normally end and the clause’s set statement are applied to the route. Routes that match
a clause containing a continue statement are evaluated against the clause specified by
the continue statement.
• When a route matches multiple route-map clauses, the filter action (deny or permit) is
determined by the last clause that the route matches. The set statements in all clauses
matching the route are applied to the route after the route map evaluation is complete.
Multiple set statements are applied in the same order by which the route was
evaluated against the clauses containing them.
• Continue cannot be set to go back to a previous clause; <sequence-number> of the
continue must always be higher than the current clause’s sequence number.
19.5.2.3 abort
abort
1387
Syntax Description N/A
Default N/A
History 3.3.5006
Related Commands
Notes
Default N/A
History 3.3.5006
Related Commands
1388
Notes • When a clause contains multiple match commands, the permit or deny filter applies to
a route only if its properties are equal to corresponding parameters in each match
statement
• When a route’s properties do not equal the statement parameters, the route is evaluated
against the next clause in the route map, as determined by sequence number
• If all clauses fail to permit or deny the route, the route is denied
Creates a route map clause entry that matches the route‘s AS path using an as-path
access-list.
The no form of the command removes the match statement from the configuration mode
route map clause.
Default N/A
History 3.3.5006
Related Commands
Notes • When a clause contains multiple match commands, the permit or deny filter applies
to a route only if its properties are equal to corresponding parameters in each match
statement
• When a route’s properties do not equal the statement parameters, the route is
evaluated against the next clause in the route map, as determined by sequence
number
• If all clauses fail to permit or deny the route, the route is denied
• An as-path-list must already exist before a node is configured to use it
1389
19.5.2.6 match community-list
Creates a route map clause entry that specifies one route filtering condition.
The no form of the command removes the match clause.
Default N/A
History 3.3.5006
Related Commands
Notes • When a clause contains multiple match commands, the permit or deny filter applies to
a route only if its properties are equal to corresponding parameters in each match
statement.
• When a route’s properties do not equal the statement parameters, the route is
evaluated against the next clause in the route map, as determined by sequence
number.
• If all clauses fail to permit or deny the route, the route is denied.
1390
Default N/A
History 3.3.5006
Related Commands
Notes • When a clause contains multiple match commands, the permit or deny filter applies to
a route only if its properties are equal to corresponding parameters in each match
statement
• When a route’s properties do not equal the statement parameters, the route is
evaluated against the next clause in the route map, as determined by sequence number
• If all clauses fail to permit or deny the route, the route is denied
• The prefix-list-name should point to an existing IP prefix-list. If it is not found, no
route is considered as a match for this clause.
Configures a route’s entry next-hop match.
The no form of the command removes a route-map’s entry next-hop match.
Default N/A
History 3.3.5200
1391
Related Commands
Notes • When a clause contains multiple match commands, the permit or deny filter applies to
a route only if its properties are equal to corresponding parameters in each match
statement
• When a route’s properties do not equal the statement parameters, the route is
evaluated against the next clause in the route map, as determined by sequence number
• If all clauses fail to permit or deny the route, the route is denied
Configures a route’s entry metric match.
The no form of the command removes a route-map’s entry metric match.
Default N/A
History 3.3.5200
Related Commands
Notes • When a clause contains multiple match commands, the permit or deny filter applies to
a route only if its properties are equal to corresponding parameters in each match
statement
• When a route’s properties do not equal the statement parameters, the route is
evaluated against the next clause in the route map, as determined by sequence number
• If all clauses fail to permit or deny the route, the route is denied
1392
19.5.2.10 set as-path prepend
Default N/A
History 3.4.0000
Related Commands
Notes
Default N/A
1393
Configuration Mode config route map
History 3.3.5200
Example switch (config route-map mymap permit 10)# set community none
Related Commands
Notes
Default N/A
History 3.3.5200
Example switch (config route-map mymap permit 10)# set community none
Related Commands
Notes
1394
Syntax list of communities List of standard communities:
Description
• <aa:nn>
• <number>
• internet
• local-AS
• no-advertise
• no-export
Default N/A
History 3.3.5200
Related
Commands
Notes
Default N/A
History 3.3.5200
1395
Example switch (config route-map mymap permit 10 )# set community
internet 1:3 additive
Related Commands
Adds to existing communities using the communities found in the community list.
The no form of the command removes the set statement from the clause.
Default N/A
History 3.3.5200
Related Commands
Notes
Deletes the matching community list permit entries from the route community list.
The no form of the command removes the set statement from the clause.
1396
Syntax Description community-list- Name of community list
name
Default N/A
History 3.3.5200
Related Commands
Notes
Configures a route’s entry next-hop parameter.
The no form of the command removes a route-map’s entry next-hop setting.
Default N/A
History 3.3.5200
Related Commands
1397
Notes
Configures a route’s entry local-preference parameter.
The no form of the command removes a route-map’s entry local-pref setting.
Default N/A
History 3.3.5200
Related Commands
Notes
Configures a route’s entry metric parameter.
The no form of the command removes a route-map’s entry metric setting.
Default N/A
1398
History 3.3.5200
Related Commands
Notes
Configures a route’s entry origin parameter.
The no form of the command removes a route-map’s entry origin setting.
igp Set a route’s entry origin parameter to internal.
incomplete Set a route’s entry origin parameter to incomplete.
Default N/A
History 3.3.5200
Example switch (config route-map mymap permit 10)# set origin egp
Related Commands
Notes
1399
19.5.2.21 set weight
Default N/A
History 3.3.5006
Notes
show route-map [<name>]
Default N/A
History 3.3.5006
1400
Example switch (config)# show route-map mymap
route-map mymap, permit, sequence 10
Match clauses:
as-number 40
Set clauses:
weight 7
route-map mymap, permit, sequence 1200
Set clauses:
weight 11
Related Commands
Notes
19.5.2.23 IP Prefix-List
IP prefix-lists are used to match two components of IP packets or an IP route. Prefix-list is a list of entries that include
an IP network address and a bit mask (Range: 1 to 32 and should match the input IP network address).
Apply:
1401
switch (config) # configuration text file prefix-list-001 apply verbose
All commands succeeded.
19.5.2.24
IP Prefix-List Commands
19.5.2.24.1 ip prefix-list
Default N/A
History 3.3.5200
1402
3.6.4070 Added support for IPv6
prefix-list list-name:
count: 2,
range entries: 0,
sequences: 10 - 20
Configuration:
seq 10 deny 1.1.1.0 /24 eq 24
seq 20 deny 1.1.2.0 /24 eq 24
Notes The maximum entries for IPv4 prefix-list is 50K and for IPv6 is 25K.
Default N/A
History 3.9.1900
1403
Example switch (config) # ip prefix-list list-name
switch (config) # ip prefix-list list-name bulk-mode #
bulk-mode will be enabled for the prefix-list
switch (config) # ip prefix-list list-name seq 10 permit
20.20.20.20 /32 eq 32
switch (config) # ip prefix-list list-name seq 20 deny
21.21.21.21 /32 eq 32
switch (config) # ip prefix-list list-name commit # bulk
setting of rules applied to Onyx, and bulk-mode for this
prefix list is cleared.
Related Commands
Notes • In case of bulk-mode enabled, the prefix list rule configuration will be cached in
CLI until 'commit' command is issued. Otherwise, the rule configuration will be
applied immediately.
• To apply prefix list configuration in bulk-mode will improve performance greatly in
case of a very large prefix list (50K and up). The bulk mode is enabled by default if
prefix list rules are configured under CLI prefix mode. When 'exit' is issued to quit
from the CLI prefix mode, CLI will aggregate all the rule configuration and apply
the bulk setting to the system.
If bulk-mode is enabled for the prefix list, then commit the whole prefix-list
configuration and reset bulk mode (otherwise, nothing will happen).
Default N/A
History 3.9.1900
Related Commands
Notes
1404
19.5.2.24.4 permit
eq | ge | le • eq—equal to a specified prefix length
<mask> • ge—greater than or equal to a specified prefix length
• le—less than or equal to a specified prefix length
Default N/A
History 3.8.2100
prefix-list list-name:
count: 2,
range entries: 0,
sequences: 10 - 20
Configuration:
seq 10 deny 1.1.1.0 /24 eq 24
seq 20 deny 1.1.2.0 /24 eq 24
Notes
1405
19.5.2.24.5 show ipv6 prefix-list
show ipv6 prefix-list [<name>]
Default N/A
History 3.3.5200
Related Commands
Notes
19.6 VRRP
The Virtual Router Redundancy Protocol (VRRP) is a computer networking protocol that provides for automatic
assignment of available IP routers to participating hosts. This increases the availability and reliability of routing paths
via automatic default gateway selections on an IP subnetwork.
The protocol achieves this by creating virtual routers, which are an abstract representation of multiple routers (that is, a
master and backup routers, acting as a group). The default gateway of a participating host is assigned to the virtual
router instead of a physical router. If the physical router that is routing packets on behalf of the virtual router fails,
another physical router is selected to automatically replace it. The physical router that is forwarding packets at any
given time is called the master router.
VRRP provides information on the state of a router, not the routes processed and exchanged by that router. Each VRRP
instance is limited, in scope, to a single subnet. It does not advertise IP routes beyond that subnet or affect the routing
table in any way.
Routers have a priority of between 1-255 and the router with the highest priority becomes the master. The configurable
priority value ranges from 1-254, the router which owns the interface IP address as one of its associated IP addresses has
the priority value 255. When a planned withdrawal of a master router is to take place, its priority can be lowered, which
1406
means a backup router will preempt the master router status rather than having to wait for the hold time to expire.Onyx
supports IPv4 in VRRP version 2, and IPv6 in VRRP version 3.
19.6.2.1 Preconditions
1. Enable IP routing functionality. Run:
1407
switch (config)# ip routing
The VLAN cannot be the same one configured for the MLAG IPL, if MLAG is used.
1408
19.6.2.2 Configuring VRRP
1. Enable VRRP protocol globally. Run:
2. Create a virtual router group for an IP interface. Up to 255 VRRP IDs are supported. Run:
3. Set the VIP address.
a. For IPv4, run:
4. Influence the election of the master in the VR cluster make sure that the priority of the desired master is the
highest. Note that the higher IP address is selected in case the priority of the routers in the VR are the same.
Select the priority. Run:
5. The advertisement interval should be the same for all the routers within the VR. Modify the interval. Run:
6. The authentication text should be the same for all the routers within the VR. Configure the authentication text.
Run:
7. Use the preempt command to enable a high-priority backup virtual router to preempt the low-priority master
virtual router. Run:
8. Disable VRRP. Run:
The configuration will not be deleted, only the VRRP state machine will be stopped.
1409
19.6.2.3 Verifying VRRP
1. Display VRRP brief status. Run:
3. Display VRRP statistic counters. Run:
1410
switch (config) # show vrrp statistics
Invalid packets: 0
Too short: 0
Transitions to Master: 1
Total received: 0
Bad TTL: 0
Failed authentication: 0
Unknown authentication: 0
Conflicting authentication: 0
Conflicting Advertise time: 0
Conflicting Addresses: 0
Received with zero priority: 0
Sent with zero priority: 0
Invalid packets v6: 0
Too short v6: 0
Transitions to Master v6: 1
Total received v6: 0
Bad TTL v6: 0
Conflicting Advertise time v6: 0
Conflicting Addresses v6: 0
Received with zero priority v6: 0
Sent with zero priority v6: 0
• Load Balancing
• Configuring VRRP
• Preconditions
• Configuring VRRP
• Verifying VRRP
• VRRP Commands
• protocol vrrp
• clear vrrp statistics
• vrrp
• address
• shutdown
• priority
• preempt
• authentication text
• advertisement-interval
• show vrrp
• show vrrp detail
• show vrrp statistics
1411
19.6.3.1 protocol vrrp
protocol vrrp
no protocol vrrp
History 3.3.4500
Related Commands
Notes
clear vrrp statistics
Default N/A
History 3.3.4500
1412
Related Commands
Notes
19.6.3.3 vrrp
vrrp <number>
no vrrp <number>
Creates a virtual router group on this interface and enters a new configuration mode.
The no form of the command deletes the VRRP instance and the related configuration.
Default N/A
History 3.3.4500
Related Commands
Notes A maximum total of 64 VRRP instances are supported per switch system.
19.6.3.4 address
1413
Syntax Description ip-address The virtual IP address
Default N/A
History 3.3.4500
Related Commands
Notes • The virtual address can be either from the interface’s primary or secondary subnet
• This command is the enabler of the protocol. Therefore, set all the protocol
parameters initially and only then set the ip-address.
• There are up to 20 IP addresses associated with the VRRP instance. One primary and
up to 19 secondary ip-addresses.
• If the configured IP address is the same as the interface IP address, this switch
automatically owns the IP address (priority 255)
• For IPv6, the OS will auto-generate link-local virtual IP. Up to 19 IPv6 addresses are
allowed to be associated with the VRRP instance—one primary address and up to 18
secondary addresses. IPv4 and IPv6 addresses are allowed to be configured on the
same VRRP instance.
19.6.3.5 shutdown
shutdown
no shutdown
1414
Default Enabled (no shutdown)
History 3.3.4500
Related Commands
Notes
19.6.3.6 priority
priority <level>
no priority
Default 100
History 3.3.4500
Related Commands
Notes • The higher IP address is selected as master if the priority of the routers in the VR are
the same
• To influence the election of the master in the VR cluster make sure that the priority
of the desired master is the higher
1415
19.6.3.7 preempt
preempt
no preempt
History 3.3.4500
Related Commands
Notes To set this router as backup for the current virtual router master, preempt must be enabled.
Default Disabled
History 3.3.4500
1416
Example switch (config vrrp 100)# authentication text mypassword
Related Commands
19.6.3.9 advertisement-interval
advertisement-interval <seconds>
no advertisement-interval
Default 1
History 3.3.4500
Related Commands
Notes
show vrrp [interface <type> <number>] [vr <id>]
Syntax Description interface <type> Filters the output to a specific interface type and number
<number>
1417
vr <id> Filters the output to a specific virtual router
Range: 1-10
Default N/A
History 3.3.4500
Related Commands
Notes
Syntax Description interface <type> Filters the output to a specific interface type and number
<number>
Default N/A
History 3.3.4500
1418
3.6.5000 Updated example
Associated IP Addresses:
20.20.20.41
Related Commands
Notes
show vrrp statistics [interface <type <number>] [vr <id>] [all]
Syntax Description interface <type> Filters the output to a specific interface type and number
<number>
1419
vr <id> Filters the output to a specific virtual router
Range: 1-255
Default N/A
History 3.3.4500
Related Commands
Notes
19.7 MAGP
Multi-active gateway protocol (MAGP) is aimed to solve the default gateway problem when a host is connected to a set
of switch routers (SRs) via MLAG.
1420
The network functionality in that case requires that each SR is an active default gateway router to the host, thus
reducing hops between the SRs and directly forwarding IP traffic to the L3 cloud regardless which SR traffic comes
through.
19.7.1.1 Prerequisites
1. Enable IP routing functionality. Run:
The VLAN cannot be the same one configured for the MLAG IPL, if MLAG is used.
1421
switch (config)# protocol magp
3. Set a virtual router primary IP address.
a. For IPv4, run:
Only a virtual IP from the primary subnet can be configured for MAGP.
4. Set a virtual router primary MAC address. Run:
To obtain the virtual router’s MAC address, please run the command “show vrrp detail”.
1422
19.7.2 MAGP Commands
• Configuring MAGP
• Prerequisites
• Configuring MAGP
• Verifying MAGP
• MAGP Commands
• protocol magp
• magp
• shutdown
• ip virtual-router address
• ip virtual-router mac-address
• ip virtual-router mac-address
• show magp
• show magp interface vlan
protocol magp
no protocol magp
Default Disabled
History 3.3.4500
Related Commands
1423
19.7.2.2 magp
magp <instance>
no magp <instance>
Creates an MAGP instance on this interface and enters a new configuration mode.
The no form of the command deletes the MAGP instance.
Default Disabled
History 3.3.4500
Related Commands
19.7.2.3 shutdown
shutdown
no shutdown
Default Disabled
1424
Configuration Mode config interface vlan magp
History 3.3.4500
Related Commands
Notes
Default N/A
History 3.3.4500
3.6.8100 Added “secondary” parameter
Related Commands
1425
Notes • The MAGP virtual IP address must be different from the interface IP address
• In a single MAGP instance, IPv4 and IPv6 addresses are both allowed
History 3.3.4500
Related Commands
Default N/A
1426
Configuration Mode config
History 3.9.0500
show magp [<instance>]
Default N/A
History 3.3.4500
1427
Example switch (config) # show magp
MAGP 100:
Interface vlan: 20
Admin state : Enabled
State : Master
Virtual IP : 11.11.11.200
V6 State : Master
Virtual IPv6 : 2001::254
Virtual MAC : AA:BB:CC:DD:EE:FF
Associated IP Addresses:
11.11.11.254
Related Commands
Note
show magp interface vlan <id>
Default N/A
History 3.3.4500
1428
Example switch (config) # show magp interface vlan 20
MAGP 100:
Interface vlan: 20
Admin state : Enabled
State : Master
Virtual IP : 11.11.11.200
V6 State : Master
Virtual IPv6 : 2001::254
Virtual MAC : AA:BB:CC:DD:EE:FF
Associated IP Addresses:
11.11.11.254
Related Commands
Notes
1429
19.8.3 DHCP Relay Commands
Enters DHCP relay instance configuration mode, and creates DHCP instance in active
VRF context.
The no form of the command deletes the instance and DHCP relay process
corresponding to it.
Default N/A
History 3.6.3004
1430
Example switch (config)# ip dhcp relay instance 1
switch (config ip dhcp relay instance 1)#
Related Commands
Notes If an instance is not specified then instance 1 is used (if nonexistent, then it is created).
19.8.3.2 address
address <ip-address>
no address <ip-address>
Default N/A
History 3.3.4150
1431
19.8.3.3 always-on
always-on
no always-on
Default Disabled
History 3.3.4150
Notes • Broadcasts DHCP requests to all interfaces with the DHCP relay agent for given
VRF
• In order to enable DHCP relay, at least one IP address should be configured, or
always-on parameter should be turned on using this command
• When DHCP servers are configured, requests are forwarded only to configured
servers
• The following option for running this command is also possible: ip dhcp relay
instance 1 always-on. However, if an instance is not specified then instance 1 is
used (if nonexistent, then it is created).
information option
no information option
Enables DHCP relay agents to insert option 82 on the packets of a particular instance.
The no form of the command removes option 82 from the packets.
1432
Syntax Description N/A
Default Disabled
History 3.3.4150
Notes The following option for running this command is also possible: ip dhcp relay instance 1
information option. However, if an instance is not specified then instance 1 is used (if
nonexistent, then it is created).
19.8.3.5 vrf
vrf <vrf-name>
no vrf <vrf-name>
Default N/A
History 3.6.3004
Related Commands
1433
Notes • If no VRF is specified, then the DHCP-R instance is created in the active VRF
• If the VRF is changed, then the configuration of the DHCP-R instance is
automatically deleted
• The following option for running this command is also possible: ip dhcp relay
instance 1 vrf <vrf-name>. However, if an instance is not specified then instance 1
is used (if nonexistent, then it is created).
19.8.3.6 port
port <udp-port>
no port <udp-port>
Default 67
History 3.6.3004
Related Commands
Notes • The system allocated 2 ports: One is the server port (udp-port), and another is client
port (udp-port+1)
• The following option for running this command is also possible: ip dhcp relay
instance 1 port <udp-port>. However, if an instance is not specified then instance 1
is used (if nonexistent, then it is created).
19.8.3.7 use-secondary-ip
use-secondary-ip
no use-secondary-ip
Enables the switch to relay a single request from the client multiple times simultaneously,
with each of the IP addresses configured on the corresponding downstream interfaces as
the respective gateway address (linkaddr field of IPv4 DHCP request packet).
The no form of the command disables this function.
1434
Syntax Description N/A
Default Disabled
History 3.6.8008
Related Commands
Notes
19.8.3.8 vrf-auto-helper
vrf-auto-helper
no vrf-auto-helper
Default N/A
History 3.6.3004
Related Commands
1435
Notes • Every new DHCP-R instance created in a VRF automatically becomes the VRF auto-
helper if no other DHCP-R instance has been configured VRF auto-helper previously
in that VRF
• The following option for running this command is also possible: ip dhcp relay
instance 1 vrf-auto-helper. However, if an instance is not specified then instance 1 is
used (if nonexistent, then it is created).
Enables the given interface to listen for DHCP packets coming from specified instance (i.e.
binds interface to that instance).
The no form of the command removes the interface mapping from that instance.
downstream The interface on which queries are received from clients or from other
relay agents
upstream The interface to which queries from clients and other relay agents
should be forwarded
Default Downstream
History 3.6.3004
Related Commands
1436
Notes • In order to enable DHCP relay, other than configuring the downstream interface, at least
one IP address must be configured, or the always-on parameter must be activated using
the command “ip dhcp relay always-on”
• When DHCP servers are configured, requests are forwarded only to configured servers
• At most, 64 interfaces can be configured on each instance
• Only an existent DHCP-R may be specified
• Each interface is either upstream, downstream, or bidirectional
• If only downstream interfaces are defined, all interfaces in VRF are assumed to be
upstream interfaces
Clears all DHCP relay counters (all interfaces) in a given VRF or instance.
Range: 1-8
Default N/A
History 3.3.4150
3.6.5000 Added “all” parameter
Related Commands
Notes • If no DHCP-R instance is specified, then the counters of all DHCP-R instances are
cleared
• If a VRF is specified, then the counters of all instances on that VRF are cleared
• The command “clear counters all” may also be used to clear all DHCP-R counters
1437
19.8.3.11 ip dhcp relay information option circuit-id
Specifies the content of the circuit ID sub-option attached to the client DHCP packet
when it is forwarded a DHCP server.
The no form of the command removes the label assigned.
Syntax Description label Specifies the label attached to packets. The string may be up to 15
characters.
Default The label is taken from the IP interface name (e.g. “vlan1”)
History 3.3.4150
Related Commands
Notes The circuit ID sub-option is an IP interface attribute which is shared across all DHCP-R
instances.
Enables DHCP relay instance configuration mode, and creates DHCP instance in active
VRF context.
The no form of the command deletes the DHCP relay instance.
1438
vrf-auto-helper Instance becomes VTF auto helper
downstream The interface on which queries are received from clients or from
other relay agents
upstream The interface to which queries from clients and other relay agents
should be forwarded
Default Disabled
History 3.6.4070
Related Commands
1439
Syntax Description instance-id DHCP instance ID
Range: 1-8
Default N/A
History 3.6.4070
Related Commands
Default N/A
History 3.6.4070
1440
Example switch (config interface ethernet 1/13)# ipv6 dhcp relay
instance 1 address fe80::1
Related Commands
History 3.6.4070
Related Commands
Notes
1441
vrf-name Name of VRF
History 3.6.4070
Related Commands
Notes When an instance is moved from one VRF to another - it loses all its current
configuration.
History 3.6.4070
Related Commands
1442
Notes
Specifies the content of the interface-id option that will be sent by the relay agent.
Default N/A
History 3.6.4070
Related Commands
Notes
Enables the switch to relay a single request from the client multiple times simultaneously,
with each of the IP addresses configured on the corresponding downstream interfaces as
the respective gateway address (giaddr field of IPv6 DHCP request packet).
The no form of the command disables this function.
Default Disabled
1443
Configuration Mode config
History 3.6.8008
Related Commands
Notes
clear ipv6 dhcp relay counters [vrf {<vrf-name> | all} | instance <instance-id>]
Clears DHCP relay counters for specific instance or all instances in given VRF or all
instances in the system.
Default N/A
History 3.6.4070
3.6.5000 Added “all” parameter
Example switch (config)# clear ipv6 dhcp relay counters vrf all
Related Commands
Notes
1444
19.8.3.21 show ip dhcp relay
Default N/A
History 3.3.4150
Instance ID 1:
VRF Name: default
DHCP Servers:
1.1.1.1
-------------------------------------------
Interface Label Mode
-------------------------------------------
eth1/5 N/A downstream
Related Commands
1445
Notes • If no DHCP-R instance is given, then all DHCP-R instances are displayed
• Only configured interfaces are displayed
• Once vrf-auto-helper is enabled, no interface is displayed
Syntax Description instance-id Displays the DHCP relay counters for a given instance
Default N/A
History 3.3.4150
Example
1446
switch (config) # show ip dhcp relay counters
Instance 1:
VRF Name: vrf-default
-----------------------------------
Req/Resp Received Forwarded
-----------------------------------
All Req 0 0
All Res 0 0
------------------------------------------------------
If SPRE SPE SPR CPR
------------------------------------------------------
eth1/5 0 0 0 0
Related Commands
Notes
Default N/A
1447
History 3.6.4070 First release
Instance ID 1:
VRF Name: default
DHCP Servers:
2001:db8:701f::8f9
-------------------------------------------
Interface Label Mode
-------------------------------------------
eth1/5 N/A downstream
Related Commands
Notes • If no DHCP-R instance is given, then all DHCP-R instances are displayed
• Only configured interfaces are displayed
• Once vrf-auto-helper is enabled, no interface is displayed
Syntax Description instance-id Displays the DHCPv6 relay counters for a given instance
1448
Default N/A
History 3.3.4150
Example
Instance 1:
VRF Name: vrf-default
-----------------------------------
Req/Resp Received Forwarded
-----------------------------------
All Req 0 0
All Res 0 0
------------------------------------------------------
If SPRE SPE SPR CPR
------------------------------------------------------
eth1/5 0 0 0 0
Related Commands
Notes
1449
20 RDMA Over Converged Ethernet (RoCE)
Configuration of IP/Ethernet L3/L2 QoS is determined by the RoCE application using the The SL component in the
Address Vector.
20.1.1 Definitions/Abbreviation
Definitions/ Description
Abbreviation
Lossless Network As with RoCE, the underlying networks for RoCEv2 should be configured as lossless. In
this context, lossless does not mean that packets are absolutely never lost.
1450
Definitions/ Description
Abbreviation
Options Functionality
Lossless This is the most optimal and automated option and is the default mode for the command, but
requires a lossless network (PFC).
In addition to the PFC control that exists in semi-lossless, it includes that following features:
• Adds traffic pool for lossless and map switch priority (3)
• Enable PFC on priority RoCE (3) on all ports.
Semi-lossless Requires a one-way PFC between the host and the ToR (the fabric will remain lossy).
In addition to the elements common to all options, it includes the following:
• sw-prio 3—TC 3 (RoCE)
• sw-prio 6—TC 6 (CNP)
• other sw-prio—TC 0
1451
Parameters Lossy Semi-lossless Lossless
Port ETS
• TC 6 (CNP)—strict
• TC 3 (RoCE)—WWR 50%
• TC 0 (other traffic)—WWR 50%
• The RoCE command defines the switch default values for several parameters defined in details in the
RoCE Parameters table, above. Changes made by the user for RoCE-related parameters will not be
changed by the RoCE command when executed.
• Changing buffer configuration mode to "advanced buffer management" after configuring RoCE returns
the buffer configuration to its default configuration.
• roce
• show roce
• show interfaces ethernet 1/1 counters roce
• clear roce interface ethernet 1/1
1452
20.4.1 roce
[no] roce
Syntax Description Lossless Full PFC support (this is the default when no parameter is chosen).
Default N/A
History 3.8.2000
switch (config) #
Notes • Configuring RoCE without specifying a mode will configure RoCE with lossless
mode.
• Changing RoCE mode may cause interfaces toggling and, consequently, a
momentary loss of data.
1453
20.4.2 show roce
show roce
Default N/A
History 3.8.2000
Application TLV:
Selector: udp
Protocol: 4791
Priority: 3
Port congestion-control:
Mode: ecn, absolute
Min : 150
Max : 1500
PFC : enabled
switch-priority 3: enabled
-------------------------------------------------------------
---------------------------------
Traffic Type Memory Switch
Memory actual Usage Max Usage
Pool [%] Priorities
1454
-------------------------------------------------------------
---------------------------------
lossy-default lossy auto 0, 1, 2, 5,
14.4M 0 0
6, 7
roce-reserved lossless auto 3, 4
14.4M 0 0
Exception list:
Switch priority 4 is mapped to RoCE traffic pool
LLDP is not enabled.
Interface ethernet 1/8 PFC is not enabled.
Json output:
[
{
"LLDP": "disabled",
"Port trust mode": "L3",
"RoCE mode": "lossless"
},
{
"Application TLV": [
{
"Priority": "3",
"Protocol": "4791",
"Selector": "udp"
}
]
},
{
"Port congestion-control": [
{
"Max": "1500",
"Mode": "ecn, absolute",
"Min": "150"
}
]
},
{
"PFC": "enabled",
"switch-priority 3": "enabled"
},
{
"RoCE used TCs": [
{
"3": [
{
"Application": "RoCE",
"TC": "3",
"ETS": "WRR 50%"
}
],
"6": [
{
"Application": "CNP",
"TC": "6",
"ETS": "Strict"
1455
}
]
}
]
},
{
"RoCE buffer pools": [
{
"roce-reserved": [
{
"Type": "lossless",
"Switch Priorities": "3, 4",
"Max Usage": "0",
"Usage": "0",
"Memory actual": "14.4M",
"Memory [%]": "auto"
}
],
"lossy-default": [
{
"Type": "lossy",
"Switch Priorities": "0, 1, 2, 5, 6,
7",
"Max Usage": "0",
"Usage": "0",
"Memory actual": "14.4M",
"Memory [%]": "auto"
}
]
}
]
},
{
"Exception list": [
{
"Lines": [
"Switch priority 4 is mapped to RoCE
traffic pool",
"LLDP is not enabled.",
"Interface ethernet 1/8 PFC is not
enabled."
]
}
]
}
Notes Interface-related properties (such as ETS, QoS, TC mapping) represent expected values for
RoCE. For the state of a specific interface, please use relevant interface show command.
1456
20.4.3 show interfaces ethernet 1/1 counters roce
Default N/A
History 3.8.2000
1457
Example switch (config) # show interfaces ethernet 1/1 counters roce
Rx:
0 RoCE PG packets
0 RoCE PG bytes
0 RoCE no buffer discard
0 CNP PG packets
0 CNP PG bytes
0 CNP no buffer discard
0 RoCE PFC pause packets
0 RoCE PFC pause duration
0 RoCE buffer usage (bytes)
0 RoCE buffer max usage (bytes)
0 CNP buffer usage (bytes)
0 CNP buffer max usage (bytes)
0 RoCE PG usage (bytes)
0 RoCE PG max usage (bytes)
0 CNP PG usage (bytes)
0 CNP PG max usage (bytes)
Tx:
0 ECN marked packets
0 RoCE TC packets
0 RoCE TC bytes
0 RoCE unicast no buffer discard
0 CNP TC packets
0 CNP TC bytes
0 CNP unicast no buffer discard
0 RoCE PFC pause packets
0 RoCE PFC pause duration
0 RoCE buffer usage (bytes)
0 RoCE buffer max usage (bytes)
0 CNP buffer usage (bytes)
0 CNP buffer max usage (bytes)
0 RoCE TC usage (bytes)
0 RoCE TC max usage (bytes)
0 CNP TC usage (bytes)
0 CNP TC max usage (bytes)
Related roce
Commands
show roce
Notes
1458
Syntax Description N/A
Default N/A
History 3.8.2000
clear counters
Notes
1459
21 Multicast (IGMP and PIM)
Protocol independent multicast (PIM) is a collection of protocols that deal with efficient delivery of IP multicast (MC)
data. Those protocols are published in the series of RFCs and define different ways and aspects of multicast data
distribution. PIM protocol family includes Internet Group Management protocol (IGMP), IGMP Snooping, Bootstrap
router (BSR) protocol, and PIM variations: Sparse mode (PIM-SM), Source-Specific mode (PIM-SSM), Dense mode
(PIM-DM) and Bidirectional mode (PIM-BIDIR). PIM-DM in not supported on Onyx.
PIM builds and maintains multicast routing tables based on the unicast routing information provided by unicast routing
tables that can be maintained statically or dynamically by IP routing protocols like OSPF and BGP.
1460
Source-specific multicast is best understood in contrast to any-source multicast (ASM). In the ASM service model a
receiver expresses interest in traffic to a multicast address. The multicast network must discover all multicast sources
sending to that address, and route data from all sources to all interested receivers.
This behavior is particularly well suited for groupware applications where all participants in the group want to be aware
of all other participants, and the list of participants is not known in advance.
The source discovery burden on the network can become significant when the number of sources is large.
In the SSM service model, in addition to the receiver expressing interest in traffic to a multicast address, the receiver
expresses interest in receiving traffic from only one specific source sending to that multicast address. This relieves the
network of discovering many multicast sources and reduces the amount of multicast routing information that the
network must maintain.
SSM requires support in last-hop routers and in the receiver's operating system. SSM support is not required in other
network components, including routers and even the sending host. Interest in multicast traffic from a specific source is
conveyed from hosts to routers using IGMPv3 as specified in RFC 4607.
By default SSM destination addresses defined in the ranges 232.0.0.0/8 for IPv4 or FF3x::/96 for IPv6. This range may
be configured by user.
Source-specific multicast delivery semantics are provided for a datagram sent to an SSM address. That is, a datagram
with source IP address S and SSM destination address G is delivered to each upper-layer “socket” that has specifically
requested the reception of datagrams sent to address G by source S, and only to those sockets.
1461
Routers should be connected via router port interfaces and not VLAN interfaces. Connecting two routers via
VLAN interface with PIM load-sharing causes loops in the network.
1462
switch (config)# vlan 10
1463
switch (config)# show ip igmp interface vlan 10
Interface vlan10
Status: protocol-down/link-down/admin-up
VRF: "vrf-default"
IP address: 10.10.10.1/24
Active querier: 10.10.10.1
Version: 2
Next query will be sent in: 00:01:45
Membership count: 0
IGMP version: 2
IGMP query interval: 125 secs
IGMP max response time: 10 secs
IGMP startup query interval: 31 secs
IGMP startup query count: 2
IGMP last member query interval: 1 secs
IGMP last member query count: 2
IGMP group timeout: 260 secs
IGMP querier timeout: 0 secs
IGMP unsolicited report interval: 10 secs
IGMP robustness variable: 2
IGMP interface immediate leave: Disabled
Multicast routing status on interface: Enabled
Multicast TTL threshold: 0
IGMP interface statistics:
General (sent/received):
v2-queries: 2/0
v2-reports: 0/0
v2-leaves : 0/0
v3-queries: 0/0
v3-reports: 0/0
Errors:
Checksum errors : 0
Packet length errors : 0
Packets with Local IP as source : 0
Source subnet check failures : 0
Query from non-querier : 0
Report version mismatch : 0
Query version mismatch : 0
Unknown IGMP message type : 0
Invalid v2 reports : 0
Invalid v3 reports : 0
Invalid leaves : 0
Packets dropped due to router-alert check: 0
1464
switch (config)# show ip igmp groups
IGMP Connected Group Membership
Type: S - Static, D - Dynamic
-------------------------------------------------------------------------------
----------------------------------------
Group Address Type Interface Uptime
Expires Last Reporter
-------------------------------------------------------------------------------
----------------------------------------
226.0.1.0 D vlan10 00:00:05
N/A 10.10.10.2
226.0.1.1 D vlan10 00:00:04
N/A 10.10.10.2
To configure PIM:
1. Enable PIM. Run:
2. Enable PIM on any IP interface (router port or VLAN interface) facing an L3 multicast source or L3 multicast
receiver including transit interfaces. For example, run:
The interface’s primary address is always used in PIM.
3. Configure IGMP version on any IP interface (router port or VLAN interface) facing multicast receivers. For
example, run:
If IGMP must be enabled on a VLAN interface, IP IGMP snooping must also be enabled (globally and on the
relevant VLAN interface):
1465
switch (config)# interface vlan 50 ip igmp version {2|3}
switch (config)# ip igmp snooping
switch (config)# vlan 50 ip igmp snooping
A good practice is to configure the RP on the loopback interface. Although RP may be configured on
the any interface with enabled PIM sparse mode. Note that a loopback interface does not require
enabling PIM sparse mode to configure RP.
You may also specify a “group-list <ip-address> <prefix>” parameter (ip pim rp-address 192.168.0.1
group-list 224.0.0.0/4) if you want different RPs for different groups.
• PIM
• protocol pim
• ip pim sg-expiry-timer
• ip pim rp-address
• ip pim bsr-candidate
• ip pim register-source
• ip pim rp-candidate
• ip pim sparse-mode
• ip pim dr-priority
• ip pim hello-interval
• ip pim join-prune-interval
• ip pim ssm range
• ip pim multipath next-hop
• ip pim multipath rp
• clear ip pim counters
• show ip pim protocol
• show ip pim bsr
• show ip pim interface
1466
• show ip pim interface brief
• show ip pim neighbor
• show ip pim rp
• show ip pim rp-hash
• show ip pim rp-candidate
• show ip pim ssm range
• show ip pim upstream joins
• PIM Bidir
• ip pim bidir shutdown
• ip pim df-robustness
• ip pim df-backoff-interval
• ip pim df-offer-interval
• show ip pim interface df
• Multicast
• ip multicast-routing
• ip mroute
• ip multicast ttl-threshold
• clear ip mroute
• show ip mroute
• show ip mroute summary
• IGMP
• ip igmp immediate-leave
• ip igmp last-member-query-response-time
• ip igmp startup-query-count
• ip igmp startup-query-interval
• ip igmp query-interval
• ip igmp query-max-response-time
• ip igmp robustness-variable
• ip igmp static-oif
• clear ip igmp groups
• show ip igmp groups
• show ip igmp interface
• show ip igmp interface brief
21.8.1 PIM
protocol pim
no protocol pim
Default Disabled
1467
History 3.3.5006
Related Commands
Notes
History 3.6.6102
Related Commands
Notes
1468
21.8.1.3 ip pim rp-address
Configures a static IP address of a rendezvous point for a multicast group range or adds
new multicast range to existing RP.
The no form of the command removes the rendezvous point for a multicast group range or
removes all configuration of the RP.
prefix Network prefix (in the format of /24, or 255.255.255.0 for example) of
group range
Default N/A
History 3.3.5006
Related Commands
Notes
1469
21.8.1.4 ip pim bsr-candidate
hash-len Specifies the hash mask length used in BSR messages. Range: 0-32.
priority BSR priority rating. Larger numbers denote higher priority. Range:
0-255.
1470
History 3.3.5006
Notes • A BSR is a PIM router within the PIM domain through which dynamic RP selection is
implemented. The BSR selects RPs from a list of candidate RPs and exchanges
bootstrap messages (BSM) with all routers in the domain. The BSR is elected from
one of the C-BSRs through an exchange of BSMs. A subset of PIM routers within the
domain are configured as candidate Bootstrap routers (C-BSRs). Through the
exchange of Bootstrap messages (BSMs), the C-BSRs elect the BSR, which then uses
BSMs to inform all domain routers of its status.
• Command parameters specify the switch’s BSR address, the interval between BSM
transmissions, hash length used for RP calculations and the priority assigned to the
switch when electing a BSR
• Entering an ip pim bsr-candidate command replaces any previously configured bsr-
candidate command. If the new command does not specify a priority or interval, the
previously configured values persist in running-config.
Default N/A
History 3.6.6102
1471
Related Commands
Notes This command must be set on an L3 interface with PIM sparse-mode (and not on a
regular L3 interface which is not a PIM interface)
1472
bidir Optional during configuration, but appears in the configuration if in
PIM Bidir mode
Default RP priority—192
BSR message interval—60 seconds
History 3.3.5006
3.9.1900 Added bidir option
Related Commands
1473
Note • The BSR selects a multicast group’s dynamic RP set from the list of C-RPs in the
PIM domain. The command specifies the interface (used to derive the RP address),
C-RP advertisement interval, and priority rating. The BSR selects the RP set by
comparing C-RP priority ratings. The C-RP advertisement interval specifies the
period between successive C-RP advertisement message transmissions to the BSR.
• Running-config supports multiple multicast groups through multiple ip pim rp-
candidate statements
• All commands must specify the same interface. Issuing a command with an interface
that differs from existing commands removes all existing commands from running-
config.
• Running-config stores the interval and priority setting in a separate statement that
applies to all rp-candidate statements. When a command specifies an interval that
differs from the previously configured value, the new value replaces the old value
and applies to all configured rp-candidate statements.
• When the no commands do not specify a multicast group, all rp-candidate statements
are removed from running-config. The no ip pim rp-candidate interval commands
restore the interval setting to the default value of 60 seconds.
• When setting a priority, all previous rp-candidates within all interfaces and groups
are configured to this priority
ip pim sparse-mode
no ip pim sparse-mode
Default Disabled
History 3.3.5006
Related Commands
Notes
1474
21.8.1.8 ip pim dr-priority
Syntax Description priority The designated router priority of the PIM Hello messages. Range is
1-4294967295.
Default 1
History 3.3.5006
Notes The command “ip pim sparse-mode” must be run prior to using this command.
Default 30 seconds
1475
History 3.3.5006
Notes The command “ip pim sparse-mode” must be run prior to using this command
Configures the period between Join/Prune messages that the configuration mode interface
originates and sends to the upstream RPF neighbor.
The no form of the command resets this parameter to its default.
Default 60 seconds
History 3.3.5200
Related Commands
Notes
1476
21.8.1.11 ip pim ssm range
Default N/A
History 3.6.4006
Related Commands
Notes Standard and group-list configurations are mutually exclusive. It is necessary to delete
standard SSM configuration in order to add group-list and it is necessary to delete all
existing group-list configuration in order to configure standard SSM configuration.
1477
21.8.1.12 ip pim multipath next-hop
History 3.6.8100
Related Commands
Notes
1478
Syntax Description algorithm Selectable RP selection algorithms:
Default G-hash—RPs are selected according to group address
History 3.7.1100
Related Commands
Note
Default N/A
History 3.6.6102
Related Commands
Notes
1479
21.8.1.15 show ip pim protocol
Default N/A
History 3.3.5200
3.6.8008 Updated example and added “vrf” parameter
Example
1480
switch (config) # show ip pim vrf default protocol
Related Commands
Notes
show ip pim [vrf {all | <vrf_name>}] bsr
Default N/A
History 3.3.5006
1481
3.6.8008 Updated example and added “vrf” parameter
Related Commands
Notes
show ip pim [vrf {all | <vrf_name>}] interface {[ethernet <port> | port-channel <id> |
vlan <vlan id>]}
Default N/A
1482
Configuration Mode Any command mode
History 3.3.5006
3.6.8008 Updated example and added “vrf” parameter
Example
VRF "default":
Interface eth1/17 address 17.17.17.10:
PIM : enabled
PIM version : 2
PIM mode : bidir
PIM DR : N/A
PIM DR Priority : N/A
PIM configured DR priority: N/A
PIM DF robustness : 3
PIM DF Offer interval : 100 msec
PIM DF Backoff interval : 1000 msec
PIM neighbor count : 1
PIM neighbor holdtime : 105 secs
PIM Hello Interval : 30 seconds, next hello will be sent in:
00:00:00
PIM Hello Generation ID : d674dec2
PIM Join-Prune Interval : N/A
PIM domain border :
Errors:
Checksum errors : N/A
Invalid packet types/DF subtypes : N/A / 0
Authentication failed : N/A
Packets from non-neighbors : 0
JPs received on RPF-interface : N/A
(*,G) Joins received with no/wrong RP : N/A / N/A
(*,G)/(S,G) JPs received for Bidir groups: 0
1483
Related Commands
Notes
Default N/A
History 3.3.5006
3.6.8008 Updated example and added “vrf” parameter
Example
VRF "default":
------------------------------------------------------------------------
Address Interface Ver/ Nbr Query DR DR
Mode Count Intvl Prior
------------------------------------------------------------------------
20.20.20.10 eth1/1 v2/S 0 30 1 20.20.20.10
30.30.30.10 eth1/2 v2/S 0 30 1 30.30.30.10
17.17.17.10 eth1/17 v2/S 1 30 1 17.17.17.10
Related Commands
Notes
1484
21.8.1.19 show ip pim neighbor
show ip pim [vrf {all | <vrf_name>}] neighbor [vlan <vlan-id> | <other interfaces> |
<ip-addr>]
Default N/A
History 3.3.5006
3.6.8008 Updated example and added “vrf” parameter
Example
VRF "default":
-------------------------------------------------------------------------
Neighbor Interface Uptime Expires Ver DR-Prio Mode BFD
-------------------------------------------------------------------------
17.17.17.5 eth1/17 01:08:07 00:01:38 v2 N/A Bidir None
Related Commands
Notes
1485
21.8.1.20 show ip pim rp
show ip pim [vrf {all | <vrf_name>}] rp [<rp-address>]
Default N/A
History 3.3.5006
3.6.8008 Updated example and added “vrf” parameter
1486
Example switch (config)# show ip pim vrf all rp
BSR : 100.100.100.100
expires : 53
priority : 64
hash-length: 30
RP 100.100.100.100:
RP 100.100.100.100:
224.0.0.0/4
Related Commands
Notes
show ip pim [vrf <vrf-name> | all] rp-hash <group>
1487
Syntax Description vrf VRF name of all VRFs
Default N/A
History 3.3.5006
VRF "default":
RP 192.167.7.1, v2:
RP-source:
priority : N/A
Uptime : N/A
Expires : N/A
Related Commands
Default N/A
History 3.3.5006
1488
3.6.6000 Updated example
3.6.8008 Updated example and added “vrf” parameter
VRF "default":
PIM mode: BIDIR
VRF "vrf_1":
RP 17.17.17.10:
Interface : eth1/17
Interval : 60
Next advertisement in: 6
Holdtime : 150
Priority : 192
Group prefixes:
1: 225.0.0.0/24
Related Commands
Notes
show ip pim ssm [vrf {all | <vrf_name>}] range
Syntax Description vrf Displays information about configured PIM SSM ranges per specified
VRF
Default N/A
History 3.6.6000
1489
3.6.6102 Updated example
3.6.8008 Updated example and added “vrf” parameter
VRF "default":
PIM SSM is not configured
VRF "vrf_1":
Range type : group-list
Total number of entries: 1
Group ranges:
1: 234.1.1.0/24
2: 234.1.2.0/24
3: 234.1.3.0/24
4: 234.1.4.0/24
5: 234.1.5.0/24
Related Commands
Notes
show ip pim [vrf {all | <vrf_name>}] upstream joins
Displays information about any PIM joins/prunes which are currently being sent to
upstream PIM routers.
Default N/A
History 3.3.5006
3.6.8008 Updated example and added “vrf” parameter
1490
Example switch (config) # show ip pim vrf all upstream joins
VRF "default":
There are no upstream joins
VRF "vrf_1":
Neighbor address 17.17.17.5:
via interface : 17.17.17.10
next message in: N/A seconds
Group 238.0.0.1:
Joins:
1: 10.10.10.5
Prunes:
No prunes included
Group 225.0.0.1:
Joins:
1: 10.10.10.5
Prunes:
No prunes included
Related Commands
Notes Output contains the following information: neighbor address, interface address, group
range, Joins, and Prunes.
force Keyword that is used in case a different mode already configured for
PIM in the same VRF and some configuration is in place.
1491
Configuration Mode config
History 3.9.1900
Related Commands
Notes • If vrf <vrf-name> is not provided, the command will address vrf as “default”
• When applying PIM mode BIDIR to vrf, the same mode will apply to ALL other
VRFs with enabled PIM protocol
• If a different mode already configured for PIM in the same VRF and "force" was not
used, the following warning message will appear:
“PIM SM configuration is present—please remove it to proceed or use “force”
keyword to remove current configuration”
• If another VRF PIM is enabled and is already configured with other PIM mode, force
will not work and the warning message appear:
“PIM SM configuration is present on other vrf—please remove it to proceed”
• Switch PIM mode to Sparse
The following commands are disabled in PIM Sparse mode:
• ip pim df-robustness
• ip pim df-offer-interval
• ip pim df-backoff-interval
Remove configuration of the following (if force keyword provided):
• ip pim df-robustness
• ip pim df-offer-interval
• ip pim df-backoff-interval
• ip pim rp-candidate *
• ip pim rp-address *
• Switch PIM mode to Bidir
The following commands are disabled in PIM Bidir mode:
• ip pim register-source
• ip pim sg-expiry-timer
• ip pim ssm
• ip pim dr-priority
• ip pim join-prune-interval
Remove configuration of the following (if force keyword provided):
• ip pim register-source
• ip pim sg-expiry-timer
• ip pim ssm
• ip pim dr-priority
• ip pim join-prune-interval
• ip pim rp-candidate *
• ip pim rp-address *
1492
21.8.2.2 ip pim df-robustness
Default Disabled
History 3.9.1900
Related Commands
Notes The command “ip pim sparse-mode” must be run prior to using this command (available
only in bidir mode)
If a router hears a better offer than its own from a neighbor, it stops participating in the
election for a period of (df-robustness * df-offer-interval), thus giving a chance to the
neighbor with the better metric to be elected DF. If during this period no winner is
elected, the router restarts the election from the beginning. If at any point during the
initial election a router receives an out of order offer with worse metrics than its own,
then it restarts the election from the beginning.
1493
21.8.2.3 ip pim df-backoff-interval
Default Disabled
History 3.9.1900
Related Commands
Notes The command “ip pim sparse-mode” must be run prior to using this command (available
only in bidir mode)
This command is part of the DF election mechanism: Upon receipt of an offer that is
better than its current metric, the DF records the identity and metrics of the offering router
and responds with a Backoff message. This instructs the offering router to hold off for a
short period of time while the unicast routing stabilizes, and other routers get a chance to
put in their offers.
The Backoff message includes the offering router's new metric and address. All routers on
the link that have pending offers with metrics worse than those in the Backoff message
(including the original offering router) will hold further offers for a period of time defined
in the Backoff message.
If a third router sends a better offer during the Backoff_Period, the Backoff message is
repeated for the new offer and the Backoff_Period is restarted.
1494
21.8.2.4 ip pim df-offer-interval
Default Disabled
History 3.9.1900
Related Commands
Notes The command “ip pim sparse-mode” must be run prior to using this command (available
only in bidir mode)
This command is part of the DF election mechanism: Initially, when no DF has been
elected, routers finding out about a new RPA start participating in the election by sending
Offer messages. Offer messages include the router's metric to reach the RPA(Rp-address).
Offers are periodically retransmitted with a period of Offer_Interval.
show ip pim [vrf {all | <vrf_name>}] interface {[ethernet <port> | port-channel <id> | vlan
<vlan id>]} df
Displays information about IPv4 PIM interface DF election per interface per RP.
1495
Vrf all Will show for all vrf
History 3.9.1900
VRF "default":
------------------------------------------------------------
------------------------
Interface RP State DF
Winner Metric Uptime
------------------------------------------------------------
------------------------
eth1/12 100.100.100.100
Winner 2.1.1.2 0 0:29:48
eth1/12 100.100.100.100
Winner 2.1.1.2 0 0:29:48
eth1/13 100.100.100.100
Winner 1.1.1.2 0 0:29:43
eth1/13 100.100.100.100
Winner 1.1.1.2 0 0:29:43
eth1/3 100.100.100.100
Winner 192.168.2.254 0 5:10:42
eth1/3 100.100.100.100
Winner 192.168.2.254 0 5:10:42
eth1/5 100.100.100.100
Winner 192.168.3.254 0 5:10:42
eth1/5 100.100.100.100
Winner 192.168.3.254 0 5:10:43
Related Commands
1496
Notes The command “ip pim sparse-mode” must be run prior to using this command (available
only in Bidir mode)
This command is part of the DF election mechanism: Initially, when no DF has been
elected, routers finding out about a new RPA start participating in the election by sending
Offer messages. Offer messages include the router's metric to reach the RPA(RP-address).
Offers are periodically retransmitted with a period of Offer_Interval.
Table columns:
Interface name
21.8.3 Multicast
21.8.3.1 ip multicast-routing
Default Disabled
History 3.3.5006
Related Commands
1497
Notes
21.8.3.2 ip mroute
Default Preference is 1
History 3.3.5006
3.6.6000 Added “next-hop” parameter to “no” form
Related Commands
Notes
1498
21.8.3.3 ip multicast ttl-threshold
Default 0—all packets are forwarded
History 3.3.5006
Related Commands
Notes
clear ip mroute [vrf <vrf>] [<group-address> [<source-address>]]
Clears multicast route information.
Syntax Description vrf Clears multicast route information for specific VRF
Default N/A
History 3.6.6102
1499
Example switch (config) # clear ip mroute 237.0.0.1 1.1.1.8
Related Commands
Notes This command does not support clearing specific (S,G) state if G belongs to an ASM
group range. Here (S,G) refers to source and group parameters accordingly.
show ip mroute [vrf {all | <vrf-name>}] [<group> [<prefix> [<source>]]]
Default N/A
History 3.2.1000
3.6.8008 Updated example and added “vrf” parameter
Example
1500
switch (config) # show ip mroute vrf vrf_1
Timers : Uptime/Expires
Interface state: Interface, State/Mode
VRF "vrf_1":
(*, 225.0.0.1/32), 00D 00:04:40, RP 17.17.17.10, flags: AL:
Incoming interface: eth1/17
RPF Neighbor : 0.0.0.0
1501
P : Pruned
R : RP-bit set
T : SPT-bit set
J : Join SPT
F : Failed to install in H/W
W/L:
Timers : Uptime/Expires
Interface state: Interface, State/Mode
VRF "vrf_1":
(*, 225.0.0.1/32), 00D 00:13:27, RP 17.17.17.10, flags: AL:
Incoming interface: eth1/17
RPF Neighbor : 0.0.0.0
W/L:
1502
Timers : Uptime/Expires
Interface state: Interface, State/Mode
VRF "vrf_1":
(*, 225.0.0.1/32), 00D 00:14:54, RP 17.17.17.10, flags: AL:
Incoming interface: eth1/17
RPF Neighbor : 0.0.0.0
Related Commands
Notes
show ip mroute [vrf {all | <vrf-name>}] summary
Default N/A
History 3.2.1000
Example
1503
switch (config) # show ip mroute vrf vrf_1 summary
W/L:
Timers : Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode
VRF "vrf_1":
(*, 225.0.0.1/32):
Uptime : 00D 00:11:18
RP : 17.17.17.10
OIF count: 1
flags : AL
(10.10.10.5, 225.0.0.1/32):
Uptime : 00D 00:11:15
Exptime : 00D 00:00:44
OIF count: 0
flags : AT
(10.10.10.5, 238.0.0.1/32):
Uptime : 00D 00:11:18
Exptime : 00D 00:00:41
OIF count: 1
flags : ST
Total: 3 routes
Related Commands
Notes
1504
21.8.4 IGMP
ip igmp immediate-leave
no ip igmp immediate-leave
Enables the device to remove the group entry from the multicast routing table
immediately upon receiving a leave message for the group.
The no form of the command disables immediate-leave.
Default Disabled
History 3.6.8100
Related Commands
Notes
Range:1-25 seconds.
Default 1
1505
Configuration Mode config interface vlan
config interface ethernet (configured as a router port interface)
config interface port-channel (configured as a router port interface)
History 3.3.5006
Related Commands
Notes When both “IGMP” and “IGMP Snooping” handle a Leave message and have different
values for “Last Member Query Time” timer configured, then traffic loss may occur for a
short period of time.
Default 2
History 3.3.5006
Related Commands
Notes
1506
21.8.4.4 ip igmp startup-query-interval
Default 31
History 3.3.5006
Related Commands
Notes
1507
History 3.3.5006
Related Commands
Notes
Default 10
History 3.3.5006
Related Commands
Notes
1508
Syntax Description count IGMP robustness variable
Range: 1-7
Default 2
History 3.3.5006
Related Commands
Notes The robustness variable can be increased to increase the number of times that packets are
resent
Default N/A
History 3.3.5006
1509
Example switch (config interface vlan 10)# ip igmp static-oif
10.10.10.5
Related Commands
Notes PIM must be enabled in order to configure the route in the hardware.
clear ip igmp groups {all | interface <if> | vrf <number> | <group-address> <mask>}
Default N/A
History 3.3.5200
Related Commands
Notes
1510
21.8.4.10 show ip igmp groups
Default N/A
History 3.3.5200
3.6.8008 Updated example and added “vrf” parameter
Example
1511
switch (config)# show ip igmp vrf all groups
VRF "default":
No IGMP group memberships learned or configured
VRF "vrf_1":
-----------------------------------------------------------------------------
---------------
Group Address Type Interface Uptime Expires
Last Reporter
-----------------------------------------------------------------------------
---------------
225.0.0.1 D eth1/1 01:03:03 00:03:51
20.20.20.5
238.0.0.1 D eth1/2 01:03:03 N/A
30.30.30.5
Related Commands
Notes
show ip igmp [vrf <vrf-name> | all] interface [ethernet <if> | port-channel <if> | vlan
<vlanid>] brief
Default N/A
1512
Configuration Mode Any command mode
History 3.3.5200
3.6.8008 Updated example and added “vrf” parameter
3.6.8100 Added “IGMP interface immediate leave” line to output
Example
1513
switch (config)# show ip igmp interface vlan 10
Interface vlan10
Status: protocol-down/link-down/admin-up
VRF: "vrf-default"
IP address: 10.10.10.1/24
Active querier: 10.10.10.1
Version: 2
Next query will be sent in: 00:01:45
Membership count: 0
IGMP version: 2
IGMP query interval: 125 secs
IGMP max response time: 10 secs
IGMP startup query interval: 31 secs
IGMP startup query count: 2
IGMP last member query interval: 1 secs
IGMP last member query count: 2
IGMP group timeout: 260 secs
IGMP querier timeout: 0 secs
IGMP unsolicited report interval: 10 secs
IGMP robustness variable: 2
IGMP interface immediate leave: Disabled
Multicast routing status on interface: Enabled
Multicast TTL threshold: 0
Errors:
Checksum errors : 0
Packet length errors : 0
Packets with Local IP as source : 0
Source subnet check failures : 0
Query from non-querier : 0
Report version mismatch : 0
Query version mismatch : 0
Unknown IGMP message type : 0
Invalid v2 reports : 0
Invalid v3 reports : 0
Invalid leaves : 0
Packets dropped due to router-alert check: 0
Related Commands
Notes
1514
21.8.4.12 show ip igmp interface brief
show ip igmp interface [ethernet <if> | port-channel <if> | vlan <vlan-id>] brief
Default N/A
History 3.3.5200
3.6.8008 Updated example and added “vrf” parameter
Example
1515
switch (config)# show ip igmp vrf all interface brief
VRF "default":
-----------------------------------------------------------------------------
-------------
Interface IP Address IGMP Querier Membership
Count Version
-----------------------------------------------------------------------------
-------------
eth1/10 12.14.192.5 0.0.0.0 0
v3
VRF "vrf_1":
-----------------------------------------------------------------------------
-------------
Interface IP Address IGMP Querier Membership
Count Version
-----------------------------------------------------------------------------
-------------
eth1/1 20.20.20.10 20.20.20.10 1
v2
eth1/2 30.30.30.10 30.30.30.10 1
v3
eth1/17 17.17.17.10 17.17.17.5 0
v3
Related Commands
Notes
1516
switch (config) # ip igmp snooping
2. Enable IGMP snooping on a VLAN. Run:
b. Change the interface switchport mode of the port (the interface is member of VLAN 1 by default). Run:
d. Change the interface switchport mode of the port (the interface is member of VLAN 1 by default). Run:
1517
switch (config) # interface ethernet 1/22
switch (config interface ethernet 1/22) # switchport mode hybrid
e. Attach the VLAN to the port’s interface. Run:
d. Change the interface switchport mode of the port (the interface is member of VLAN 1 by default). Run:
e. Attach the VLAN to the port’s interface. Run:
g. Define the MRouter port on the VLAN. Run:
1518
switch (config) # vlan 200
switch (config vlan 200) # ip igmp mrouter interface ethernet 1/22
3. Enable the IGMP snooping querier on a specific VLAN. Run:
1519
IGMP Snooping Querier Guard enables the switch administrator to define a filter to discard IGMP Membership Query
messages, allowing it to be selected as the IGMP querier by ignoring the received messages. Connecting a device to an
interface where this filter is defined stops the IGMP Querier election process that allows a 3rd party device to trigger the
local interface to be demoted from being the IGMP querier.
IGMP Snooping Querier Guard can be configured on specific interfaces such as a port, MLAG port channel, or
port channel. It only works when "igmp snooping" is enabled.
To configure IGMP Snooping Querier Guard on a specific interface, do the following:
1. Enable the IGMP snooping on the switch. Run:
2. Enable IGMP snooping querier-guard on a specific interface. Run:
1520
21.9.5.1 ip igmp snooping (admin)
ip igmp snooping
no ip igmp snooping
History 3.1.1400
Notes IGMP snooping has global admin state, and per VLAN admin state. Both states need to
be enabled in order to enable the IGMP snooping on a specific VLAN.
Syntax Description last-member- Sets the time period (in seconds) with which the general queries
query-interval are sent by the IGMP querier. After timeout expiration, the port is
<1-25> removed from the multicast group.
1521
mrouter-timeout Sets the IGMP snooping MRouter port purge time-out after which
<60-600> the port gets deleted if no IGMP router control packets are
received
port-purge- Sets the IGMP snooping port purge time interval after which the
timeout port gets deleted if no IGMP reports are received
<130-1225>
• flood – flood unregistered multicast traffic on all port in
specific VLAN
• forward-to-mrouter-ports – forward unregistered multicast
traffic only to mrouter ports in specific VLAN
version Sets the default operating version to use for newly created IGMP
snooping instances
• 2 – enables IGMPv2
• 3 – enables IGMPv3
Also available in “config vlan” configuration mode
History 3.1.1400
3.2.0500 Added “unregistered multicast” parameter
3.6.1002 Added “version parameter”
3.6.2100 Changed default value for “version” parameter
1522
3.7.1100 Updated note
Notes When both IGMP and IGMP snooping protocols handle a Leave message and have
different values for “Last Member Query Time” timer configured, then there is traffic
loss for a short period of time.
Default Enabled
History 3.1.1400
Notes
1523
21.9.5.4 ip igmp snooping mrouter
History 3.1.1400
Notes The multicast router port can be created only if IGMP snooping is enabled both globally
and on the VLAN.
Creates a specified static multicast group for specified ports and from a specified
source IP address.
The no form of the command deletes the interface from the multicast group.
1524
type Ethernet or port-channel
History 3.1.1400
3.6.2100 Added “source” parameter
Notes If the deleted interface is the last port, it deletes the entire multicast group.
Default Disable
History 3.3.4200
1525
Related Commands igmp snooping querier query-interval
show ip igmp snooping querier
Notes
Enables IGMP querier guard functionality on per L2 interface basis.
The no form of the command disables IGMP querier guard functionality on the current
interface.
Default Disabled
History 3.8.2000
Configures the IGMP Snooping querier source IP address.
The no form of the command deletes the querier IP address.
1526
Syntax Description ip_address The querier IP address
Default Disabled
History 3.4.2000
Notes Need to configure the querier IP address, otherwise the "0.0.0.0." address will be used.
History 3.3.4200
1527
Related Commands igmp snooping querier query-interval
show ip igmp snooping querier
Notes
Defines an IGMP Snooping Filter Profile and rules of the IGMP Snooping Filter Profile.
The no form of the command deletes the profile and the rules.
History 3.9.2100
1528
Example switch (config)# ip igmp snooping profile proflie_1
Notes • By default, rules sequence numbers are incremented decimally (i.e., 10, 20, 30, 40).
• Up to 32 user defined rules per profile are permitted.
• There is always a silent “deny any” rule with seq number 65535 at the end of each
profile rule list.
• Group prefix, source prefix defined in rules are applied to filter only those group
address and source address list inside the incoming IGMP snooping reports, not
considering other attributes (e.g., record type EXCLUDE, INCLUDE, and so forth).
lag-id LAG ID
mlag-id MLAG ID
1529
Default N/A
History 3.9.2100
Configuration:
seq 10 permit 224.1.1.0/24 192.168.1.1/32
seq 20 deny 224.1.1.0/24 192.168.1.1/32
seq 53 permit 224.2.0.1/32 192.168.53.0/24
seq 54 permit 224.3.0.0/16 192.168.54.1/32
seq 65535 deny 0.0.0.0/0 0.0.0.0/0
Notes • By default, rules sequence numbers are incremented decimally (i.e., 10, 20, 30, 40).
• Up to 32 user defined rules per profile are permitted.
• There is always a silent “deny any” rule with seq number 65535 at the end of each
profile rule list.
• Group prefix, source prefix defined in rules are applied to filter only those group
address and source address list inside the incoming IGMP snooping reports, not
considering other attributes (e.g., record type EXCLUDE, INCLUDE, and so forth).
Applies maximum number of IGMP groups that can be joined on a specific interface or in
a specific VLAN.
The no form of the command cancels the maximum number of IGMP groups that can be
joined on a specific interface or in a specific VLAN.
1530
Syntax Description port Ethernet port
lag-id LAG ID
mlag-id MLAG ID
Default N/A
History 3.9.2100
Notes • By default, rules sequence numbers are incremented decimally (i.e., 10, 20, 30, 40)
• Up to 32 user defined rules per profile are permitted
• There is always a silent “deny any” rule with seq number 65535 at the end of each
profile rule list.
• Group prefix, source prefix defined in rules are applied to filter only those group
address and source address list inside the incoming IGMP snooping reports, not
considering other attributes (e.g., record type EXCLUDE, INCLUDE, and so forth)
• For existing groups registered before enabling max-group filtering, a report packet is
accepted in order to refresh the existing groups
1531
21.9.5.13 ip igmp version
History 3.3.5006
Related Commands
Notes
Default N/A
History 3.6.1002
1532
3.6.6000 Updated command format
Related Commands
Notes
Clears the IGMP snooping filter counters for all interfaces or the specifically selected
one(s).
lag-id LAG ID
mlag-id MLAG ID
Default N/A
History 3.9.2100
Related Commands
Notes
1533
21.9.5.16 show ip igmp snooping
Default N/A
History 3.1.1400
Related Commands
Notes
show ip igmp snooping groups [vlan <vid> [group <group-ip>]]
Displays per VLAN the list of multicast groups attached (static or dynamic allocated) per
port.
1534
Syntax Description vid VLAN ID
Default N/A
History 3.1.1400
3.6.2100 Added “vlan” and “group” parameters and Updated example
Example
--------------------------------------------------
Vlan ID Group St/Dyn Ports
--------------------------------------------------
1 230.0.0.1 St Eth1/1,Eth1/2
2 230.0.0.1 St Eth1/4,Eth1/6
2 230.0.0.2 St Eth1/5
1535
Related Commands
Notes
Default N/A
History 3.1.1400
3.9.2100 Updated example, adding support for IGMP snooping filtering
1536
Notes The "profile_filter" and "max-groups" columns are just placeholders for the IGMP
Snooping filter feature that will be introduces 3.9.2100 or later.
Syntax Description vlan Displays IGMP snooping querier counters on specific VLAN
Default N/A
History 3.6.2100
Example
Related Commands
Notes
1537
Syntax Description N/A
Default N/A
History 3.1.1400
Related Commands vlan <id> ip igmp snooping mrouter interface ethernet <id>
Notes
show ip igmp snooping querier [vlan <num>]
Syntax Description vlan <num> Displays the IGMP snooping querier configuration running on the
specified VLAN
Default N/A
History 3.3.4200
1538
Example switch (config) # show ip igmp snooping querier vlan 1
Snooping querier information for VLAN 1
Notes
Shows status of IGMP query-guard mode and statistics of the denied IGMP query
packets.
lag-id LAG ID
mlag-id MLAG ID
Default N/A
History 3.8.2000
Eth1/1:
Querier Guard Mode : Enabled
Denied IGMP Query Messages: 0
1539
Related Commands ip igmp snooping querier-guard
Notes
Syntax Description vlan Displays IGMP snooping querier counters on specific VLAN
Default N/A
History 3.6.1002
Related Commands
Notes
1540
21.9.5.24 show ip igmp snooping statistics
Default N/A
History 3.1.1400
Related Commands
Notes
1541
21.9.5.25 show ip igmp snooping vlan
show ip igmp snooping vlan {<vlan/vlan-range> | all}
Syntax Description vlan/vlan range Displays IGMP VLAN configuration per specific VLAN or
VLAN range
Default N/A
History 3.1.1400
Related Commands
Notes
Default N/A
1542
History 3.9.2100
Configuration:
seq 10 permit 224.1.1.0/24 192.168.1.1/32
seq 20 deny 224.1.1.0/24 192.168.1.1/32
seq 53 permit 224.2.0.1/32 192.168.53.0/24
seq 54 permit 224.3.0.0/16 192.168.54.1/32
seq 65535 deny 0.0.0.0/0 0.0.0.0/0
Notes
1543
21.9.5.27 show ip igmp snooping filter
lag-id LAG ID
mlag-id MLAG ID
Default N/A
History 3.9.2100
1544
Example switch (config) # show ip igmp snooping filter interface
ethernet 1/5 detail
Active groups: 1
Related Commands
1545
Notes • For IGMP Snooping filter feature to show denied group address list, only 50MB
memory in total is allowed to be allocated. If 80% of 50MB is reached, the user will
be notified. If 100% of 50MB is reached, the user will be notified and no more
memory will be allowed to be allocated. Use “clear ip igmp snooping filter
counters” command in the CLI to clear the memory.
• For whole group record filtering, either by profile filtering or max-group limit, the
following format content would be logged:
REJECT IGMP report of (Source, Group) = (1st source, 239.1.12.33) from
Host x.x.x.x due to max-groups limit.
For profile filtering, it could be partial source address matching, i.e., some source
addresses are filtered, while the group record remains not filtered. The related log
is like the following format:
“REJECT these source address list (src2, src4, ... ) out of IGMP report of
Group (239.239.0.18), from Host x.x.x.x due to profile (profile_name_xxx)
filtering”
• For partial source address matching, if there are some source address filtered from
some group records of the report packet, then “Partially denied V3 membership
report packets” will be updated accordingly
1546
22 Appendixes
The document contains the following appendixes:
1547
22.1.2 ESF Configuration Using CLI
Before starting the configuration process, make sure both switches have the same software version installed. To check
the software version, run the "show version" command in the CLI.
It is recommended to upgrade both switches to the latest MLNX-OS software release.
2. Turn off spanning tree using this command only if using (ONYX version v3.6.6102 or earlier)
3. Enable IP routing:
1548
22.1.2.2 IPL Configuration
Control traffic for the MLAG is sent over the IPL ports via a L3 interface (interface VLAN).
For high availability, it is recommended to have more than one physical link serving as the IPL, therefore the IPL is
configured over LAG (port-channel).
It is recommended to use a VLAN ID that is not used within the subnet (4000 in this example) to avoid mixing the host
traffic with the control traffic on this interface.
All VLANs are open on the IPL port. There is no need to configure this port, once an interface is mapped as “IPL”, all
VLANs are open on this port.
In this example, ports 1/35 and 1/36 are used for the IPL connectivity between the switches.
The IPL link may pass traffic upon MLAG port failures, but not under normal circumstances when all ports are in UP
state.
Run the following commands on both switches:
The IPL IP address should not be part of the management network, it could be any IP address and subnet that is not in
use in the network. This address is not advertised outside the switch
As stated in the previous chapter, MAGP configuration is required on the Spine switches when the fabric is utilizing L2
routing in the whole fabric. You can find more details about MAGP in the MAGP section of the UM.
To configure MAGP on the switches, you need to take the following steps on all spine switches used in your setup. In
our use case we have one rack with two such switches:
1549
22.1.2.3.1 Switch 1 Configuration
1. Create a VLAN interface.
4. Next steps (9-11) should be taken per VLAN (done for VLAN 10 below):Create a virtual router group for an IP
interface.
1550
switch (config)# show magp 10
MAGP 10
Interface vlan: 20
Admin state: Master
State: Enabled
Virtual IP: 11.11.11.254
Virtual MAC: AA:BB:CC:DD:EE:FF
sx01 (config) #
interface ethernet 1/1 mlag-channel-group 1 mode active
sx01 (config) # interface ethernet 1/2 mlag-channel-group 2 mode active
LACP mode 4 should be configured on the host side. Configuring LACP is similar in LAG and MLAG ports.
LACP notifications arrive via the control protocol and not via the port physical status. It will show the remote
system-id and may encounter configuration errors. LACP is very valuable, especially in large scale
configurations with multiple MLAGs, as it helps detect any mismatched configurations in terms of connectivity.
4. To change any MLAG port parameter (e.g. MTU), enter the MLAG interface configuration mode and perform
the change:
1551
5. To change the LAG/MLAG port speed, all interfaces should be removed from LAG/MLAG while changing the
speed in the member interface configuration mode.
It is recommended to configure the ports speed before adding the ports as members to the LAG/MLAG port, as
once the ports are members in a LAG/MLAG the speed cannot be modified without removing the port from the
LAG/MLAG.
6. To verify MLAG configuration and status, run the following commands:
1552
sx01 [my-mlag-vip-domain: master] (config) # show interfaces mlag-port-channel
summary
MLAG Port-Channel Flags: D-Down, U-Up
P-Partial UP, S - suspended by MLAG
Port Flags: D - Down, P - Up in port-channel (members)
S - Suspend in port-channel (members), I - Individual
Group
Port-Channel Type Local Ports Peer Ports
(D/U/P/S) (D/P/S/I) (D/P/S/I)
-------------------------------------------------------------------------------
-
1 Mpo1(U) Static Eth1/1(P) Eth1/1(P)
2 Mpo2(U) Static Eth1/2(P) Eth1/2(P)
2. Set a virtual system MAC. The System MAC is used to identify the far-end switch used for the LACP System
ID. It should be unicastrange.
In case of an upgrade the MAC address is auto-calculated. For new MLAG installation, it must be added as
configuration.
The MLAG system-mac needs to be identical between both switches.
3. Enable MLAG globally, run:
1553
For the bonding modes which don’t use LAG on the switch, two independent switches or non MLAG ports on MLAG
switches are enough.
Linux Bonding Mode Mode Number LAG on switch requirement Availability on MLAG
interface
active-backup 1 No No
broadcast 3 No No
balance-tlb 5 No No
balance-alb 6 No No
1554
4. The same switch version is installed on both switches.
5. The IPL link is in UP state. try to ping the other switch via the IPL ping.
6. Align the MLAG interface mode on both the server and the switch.
For example, if you select LACP mode on the MLAG interface (active), mode 4 should be configured on the
bond interface.
Below are failure scenarios followed by monitoring and debug instructions.
The following scenarios are discussed:
• IPL link Down
• 'Inactive Ports' and 'Active-Partial' Status on the “show mlag” command
• Management Port is Down but IPL port is UP
• MLAG Cluster issues
• IPL issues
• MLAG port issues
Standby:
1555
mti-mar-sx03 [my-new-domain: standby] (config) # show mlag
Admin status: Enabled
Operational status: Up
Reload-delay: 30 sec
Keepalive-interval: 1 sec
Upgrade-timeout: 60 min
System-mac: 00:00:5E:00:01:5D
MLAG Ports Configuration Summary:
Configured: 1
Disabled: 0
Enabled: 1
MLAG Ports Status Summary:
Inactive: 0
Active-partial: 0
Active-full: 1
MLAG IPLs Summary:
ID Group Vlan Operational Local Peer
Port-Channel Interface State IP address IP address
--------------------------------------------------------------------------
1 Po1 4000 Up 10.10.10.1 10.10.10.2
MLAG Members Summary:
System-id State Hostname
-------------------------------------
E4:1D:2D:37:54:88 Up <mti-mar-sx03>
E4:1D:2D:37:50:88 Up mti-mar-sx04
mti-mar-sx03 [my-new-domain: standby] (config) #
1556
mti-mar-sx04 [my-new-domain: master] (config) # interface port-channel 1 shutdown
mti-mar-sx04 [my-new-domain: master] (config) # show mlag
Admin status: Enabled
Operational status: Up
Reload-delay: 30 sec
Keepalive-interval: 1 sec
Upgrade-timeout: 60 min
System-mac: 00:00:5E:00:01:5D
MLAG Ports Configuration Summary:
Configured: 1
Disabled: 0
Enabled: 1
MLAG Ports Status Summary:
Inactive: 0
Active-partial: 0
Active-full: 1
MLAG IPLs Summary:
ID Group Vlan Operational Local Peer
Port-Channel Interface State IP address IP address
--------------------------------------------------------------------------
1 Po1 4000 Down 10.10.10.2 10.10.10.1
MLAG Members Summary:
System-id State Hostname
-------------------------------------
E4:1D:2D:37:50:88 Up <mti-mar-sx04>
E4:1D:2D:37:54:88 Down mti-mar-sx03
mti-mar-sx04 [my-new-domain: master] (config) #
Standby switch:
1557
mti-mar-sx03 [my-new-domain: standby] (config) # show mlag
Admin status: Enabled
Operational status: Down
Reload-delay: 30 sec
Keepalive-interval: 1 sec
Upgrade-timeout: 60 min
System-mac: 00:00:5E:00:01:5D
MLAG Ports Configuration Summary:
Configured: 1
Disabled: 1
Enabled: 0
MLAG Ports Status Summary:
Inactive: 0
Active-partial: 0
Active-full: 1
MLAG IPLs Summary:
ID Group Vlan Operational Local Peer
Port-Channel Interface State IP address IP address
--------------------------------------------------------------------------
1 Po1 4000 Down 10.10.10.1 10.10.10.2
MLAG Members Summary:
System-id State Hostname
-------------------------------------
E4:1D:2D:37:54:88 Peering <mti-mar-sx03>
E4:1D:2D:37:50:88 Down mti-mar-sx04
mti-mar-sx03 [my-new-domain: standby] (config) #
22.1.3.2.2 'Inactive Ports' and 'Active-Partial' Status on the “show mlag” command
By default, all ethernet ports are admin UP, while the mlag-port-channels are down, as in most cases the full network
configuration is done first and then the mlag-port-channel is enabled. Make sure to enable the ports when creating mlag-
port-channel and adding ethernet interface to it (either static or LACP).
Note: When one port is down, it doesn't mean that the whole mlag-port-channel is down.
MLAG Ports Status Summary:
• Inactive - all ports in the mlag-port-channel are down (on both switches).
• Active-partial - some ports are down (example below, on one switch)
• Active-full - normal condition, all is good.
When one mlag-port-channel is down, we will see the following output:
1558
mti-mar-sx03 [my-new-domain: master] (config) # interface mlag-port-channel 10
shutdown
mti-mar-sx03 [my-new-domain: master] (config) # show mlag
Admin status: Enabled
Operational status: Up
Reload-delay: 30 sec
Keepalive-interval: 1 sec
Upgrade-timeout: 60 min
System-mac: 00:00:5E:00:01:5D
MLAG Ports Configuration Summary:Configured: 1
Disabled: 0
Enabled: 1
MLAG Ports Status Summary:Inactive: 0
Active-partial: 1
Active-full: 0
MLAG IPLs Summary:
ID Group Vlan Operational Local Peer
Port-Channel Interface State IP address IP address
--------------------------------------------------------------------------
1 Po1 4000 Up 10.10.10.1 10.10.10.2
MLAG Members Summary:
System-id State Hostname
-------------------------------------
E4:1D:2D:37:54:88 Up <mti-mar-sx03>E4:1D:2D:37:50:88 Up mti-mar-sx04
mti-mar-sx03 [my-new-domain: master] (config) #
To enable it:
1559
mti-mar-sx03 [my-new-domain: master] (config) # interface mlag-port-channel 10 no
shutdown
mti-mar-sx03 [my-new-domain: master] (config) # show mlag
Admin status: Enabled
Operational status: Up
Reload-delay: 30 sec
Keepalive-interval: 1 sec
Upgrade-timeout: 60 min
System-mac: 00:00:5E:00:01:5D
MLAG Ports Configuration Summary:
Configured: 1
Disabled: 0
Enabled: 1
MLAG Ports Status Summary:
Inactive: 0
Active-partial: 0
Active-full: 1
MLAG IPLs Summary:
ID Group Vlan Operational Local Peer
Port-Channel Interface State IP address IP address
--------------------------------------------------------------------------
1 Po1 4000 Up 10.10.10.1 10.10.10.2
MLAG Members Summary:
System-id State Hostname
-------------------------------------
E4:1D:2D:37:54:88 Up <mti-mar-sx03>
E4:1D:2D:37:50:88 Up mti-mar-sx04
mti-mar-sx03 [my-new-domain: master] (config) #
1560
The “show mlag” and “show mlag-vip” output will look like this:
1561
mti-mar-sx03 [my-mlag-vip-domain: master] (config) # show mlag-vip
MLAG VIP
========
MLAG group name: my-mlag-vip-domain
MLAG VIP address: 10.20.2.205/24
Active nodes: 2
Hostname VIP-State IP Address
----------------------------------------------------
mti-mar-sx03 master 10.20.2.53
mti-mar-sx04 standby 10.20.2.54
mti-mar-sx03 [my-new-domain: master] (config) #
Verify that the two switches are in the cluster. The other MLAG switch must reflect the same information.
If one switch does not see this MLAG-Domain do the following:
Run "show ip route":
The management subnet must only point out of the MGMT port. inband management is acceptable. If there is a conflict,
the MGMT Keep alive is sent out on the wrong port and not advertised to another switch.
In case the switch still does not see the cluster: The MGMT keep alive is broadcast to a well known multicast DNS
group – 224.0.0.251. Check to see if both switches are advertising to this group. It is likely that the mgmt. port will see
a lot of traffic. This output will need to be captured and analyzed.
This is a transmission from master to the multicast group. Before we have a master, both switches will see this frame,
and both will transmit it. After the cluster is formed, only the master will transmit this. If this frame is not seen, the
cluster will not form.
1562
mti-mar-sx03 [my-mlag-vip-domain: master] (config) # show mlag
Admin status: Enabled
Operational status: Up
Reload-delay: 30 sec
Keepalive-interval: 1 sec
Upgrade-timeout: 60 min
System-mac: 00:00:5E:00:01:5D << Both switches should show the same System MAC
Address
MLAG Ports Configuration Summary:
Configured: 1
Disabled: 0
Enabled: 1
MLAG Ports Status Summary:
Inactive: 0
Active-partial: 0
Active-full: 1
MLAG IPLs Summary:
ID Group Vlan Operational Local Peer
Port-Channel Interface State IP address IP address
--------------------------------------------------------------------------
1 Po1 4000 Up 10.10.10.1 10.10.10.2
MLAG Members Summary:
System-id State Hostname
-------------------------------------
E4:1D:2D:37:54:88 Up <mti-mar-sx03>
E4:1D:2D:37:50:88 Up mti-mar-sx04
In case IPL is up and still member ports are not visible, try ping the remote IPL interface. Ping the local switch and then
the MLAG Peer switch IPL IP address. If ping doesn’t go through use tcpdump to debug this case. In case link is up and
ping is lossy, check for traffic on the IPL interface. During normal operation, IPL traffic is a few frames per second at
the most. If you see a lot of traffic, it is likely an indication of a loop in the setup.
The other usual suspects are checking if both sides are set to static, or LACP. Check interface transceiver for matching
serial numbers to identify cabling issues.
1563
“Partial” means that all ports are down on the MLAG-peer switch side. This could be a result of interface MLAG being
shut on the remote side or mlag protocol shut on remote side.
Peer ports not being visible means that ports in the MLAG-Peer switch are either not added in the MLAG or there are
cluster issues.
If the physical port shows (S) that could result from either receiving no PDUs from the remote side or by receiving a
PDU that doesn’t match what is being received on other members of the MLAG port-channel
Check the LACP counters to see continuous increment of counters, both sent and receive must increment. One every
second for fast retransmit and one every 30 seconds for slow retransmit.
In case the lacp counters are incrementing and port is still down, then check the SID received on different port of the
MLAG. They should match across all MLAG ports.
1564
mti-mar-sx03 [my-mlag-vip-domain: master] (config) #show lacp interfaces neighbors
Flags:
A - Device is in Active mode
P - Device is in Passive mode
MLAG channel group 1 neighbors
Port 1/10
----------
Partner System ID : e4:1d:2d:37:48:80 (This is the System-ID received on this port
from the remote switch. It must match for all ports connected to the same switch)
Partner System priority : 32768
Flags : A
LACP Partner Port Priority : 32768
LACP Partner Oper Key : 13845 (LACP OPER KEY must match across all ports in the same
MLAG port-channel)
LACP Partner Port State : 0xbc
Port State Flags Decode
------------------------
Activity : Active
Aggregation State : Aggregation, Sync, Collecting, Distributing,
To check the SID used by the switch use this command:
1565
22.1.4.1 Single Rack with Two Switches Connected in MLAG
In this setup, we cover the most common deployment scenario and most cost-effective solution: Two switches in a
single rack configured with MLAG, providing high availability for the connected servers (as described in the below
diagrams).
To leverage the high availability and connectivity to the L3 cloud, Multi-Active Gateway Protocol (MAGP) is used,
resolving the default gateway problem when a host is connected to a set of switch routers (SRs) via MLAG with no
LACP control (MAGP is a protocol that implements active-active VRRP). The network functionality in that case
requires that each SR is an active default gateway router to the host, thus reducing hops between the SRs and directly
forwarding IP traffic to the L3 cloud regardless which SR traffic comes through.
In ESF deployment in a single rack, the ToR switches’ router ports are configured for connectivity with the external
network.
To get a detailed overview of the MLAG terminology and its architecture, please refer to the MLAG section in this user
manual.
Leaf Switch 2 SN2010 Spectrum based 25GbE/100GbE, 1U Open Ethernet Switch with Onyx,
18 SFP28 and 4 QSFP28 ports, 2 Power Supplies (AC), short depth, x86 quad
core, P2C airflow, Rail Kit must be purchased separately, RoHS6
Uplinks 2 N/A
Network 2 per ConnectX-5 Dual-Port SFP28 Port, PCIe 3.0 x16, tall bracket, ROHS R6
Adapters server
1566
Component Quantity Description
1567
Some protocols, however, cannot be operated in a manner that complies with the NIST SP 800-131A standard.
2. Show crypto certificate detail.
Search for “signature algorithm” in the output.
3. Set this certificate as the default certificate. Run:
1568
2. Generate a new certificate with default values.
When no options are selected, the generated certificate uses the default values for each field.
To test strict mode connect to the WebUI using HTTPS and get the certificate. Search for “signature algorithm”.
There are other ways to configure the certificate to sha256. For example, it is possible to use “certificate
generation default hash-algorithm” and then regenerate the certificate using these default values.
It is recommended to delete browsing data and previous certificates before retrying to connect to the WebUI.
Make sure not to confuse “signature algorithm” with “Thumbprint algorithm”.
22.2.2 SNMP
SNMPv3 supports configuring username, authentication keys and privacy keys. For authentication keys it is possible to
use MD5 or SHA. For privacy keys AES or DES are to be used.
To configure strict mode, create a new user with HMAC-SHA1-96 and AES-128. Run:
switch (config) # snmp-server user <username> v3 auth sha <password1> priv aes-128
<password2>
To verify the user in the CLI, run:
To test strict mode, configure users and check them using the CLI, then run an SNMP request with the new
users.
SNMPv1 and SNMPv2 are not considered to be secure. To run in strict mode, only use SNMPv3.
22.2.3 HTTPS
By default, the OS supports HTTPS encryption using TLS1.2 only. Working in TLS1.2 mode also bans MD5 ciphers
which are not allowed per NIST 800-131a. In strict mode, the switch supports encryption with TLS1.2 only with the
following supported ciphers:
• RSA_WITH_AES_128_CBC_SHA256
• RSA_WITH_AES_256_CBC_SHA256
• DHE_RSA_WITH_AES_128_CBC_SHA256
• DHE_RSA_WITH_AES_256_CBC_SHA256
• TLS_RSA_WITH_AES_128_GCM_SHA256
1569
• TLS_RSA_WITH_AES_256_GCM_SHA384
• TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
• TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
To enable all encryption methods, run:
To verify which encryption methods are used, run:
1570
22.2.4 Code Signing
Code signing is used to verify that the data in the image is not modified by any third-party. The operating system
supports signing the image files with SHA256, RSA2048 using GnuPG.
22.2.5 SSH
The SSH server on the switch by default uses secure ciphers only, message authentication code (MAC), key exchange
methods, and public key algorithm. When configuring SSH server to strict mode, the aforementioned security methods
only use approved algorithms as detailed in the NIST 800-181A specification and the user can connect to the switch via
SSH in strict mode only.
To enable strict security mode, run the following:
The following ciphers are disabled for SSH when strict security is enabled:
• 3des-cbc
• aes256-cbc
• aes192-cbc
• aes128-cbc
• [email protected]
Once this is done, the user cannot revert back to minimum version 1.
22.2.6 LDAP
By default, the switches support LDAP encryption SSL version 3 or TLS1.0 up to TLS1.2. The only banned algorithm
is MD5 which is not allowed per NIST 800-131a. In strict mode, the switch supports encryption with TLS1.2 only with
the following supported ciphers:
• DHE-DSS-AES128-SHA256
• DHE-RSA-AES128-SHA256
• DHE-DSS-AES128-GCM-SHA256
• DHE-RSA-AES128-GCM-SHA256
• DHE-DSS-AES256-SHA256
1571
• DHE-RSA-AES256-SHA256
• DHE-DSS-AES256-GCM-SHA384
• DHE-RSA-AES256-GCM-SHA384
• ECDH-ECDSA-AES128-SHA256
• ECDH-RSA-AES128-SHA256
• ECDH-ECDSA-AES128-GCM-SHA256
• ECDH-RSA-AES128-GCM-SHA256
• ECDH-ECDSA-AES256-SHA384
• ECDH-RSA-AES256-SHA384
• ECDH-ECDSA-AES256-GCM-SHA384
• ECDH-RSA-AES256-GCM-SHA384
• ECDHE-ECDSA-AES128-SHA256
• ECDHE-RSA-AES128-SHA256
• ECDHE-ECDSA-AES128-GCM-SHA256
• ECDHE-RSA-AES128-GCM-SHA256
• ECDHE-ECDSA-AES256-SHA384
• ECDHE-RSA-AES256-SHA384
• ECDHE-ECDSA-AES256-GCM-SHA384
• ECDHE-RSA-AES256-GCM-SHA384
• AES128-SHA256
• AES128-GCM-SHA256
• AES256-SHA256
• AES256-GCM-SHA384
To enable LDAP strict mode, run the following:
Both modes operate using SSL. The different lies in the connection initialization and the port used.
Logging
show log
1572
show log continuous matching *
1573
Puppet Agent
Scheduled Jobs
show jobs
show jobs *
User Interfaces
show cli
1574
show cli max-sessions
show terminal
1575
Drop Reason Group Drop Reason Comment
1576
Drop Reason Group Drop Reason Comment
1577
Drop Reason Group Drop Reason Comment
Forwarding Overlay switch – source MAC is
multicast
Forwarding Overlay switch – source MAC equals
destination MAC
Buffer WRED
1578
23 Support and Other Resources
Important: Access to some updates might require product entitlement when accessed through the
Hewlett Packard Enterprise Support Center. You must have an HPE Passport set up with relevant
entitlements.
1579
If your product includes additional remote support details, use search to locate that information.
1580
23.7 General Websites
• Hewlett Packard Enterprise Information Library
• Single Point of Connectivity Knowledge (SPOCK) Storage compatibility matrix
• Storage white papers and analyst reports
For additional websites, see Support and other resources.
1581
24 Document Revision History
Rev 6.6-3.9.21xx, December 2020
Added:
• The command "ip igmp snooping profile"
• The command "show ip igmp snooping profile"
• The command "ip igmp snooping filter profile"
• The command "ip igmp snooping max-groups"
• The command "show ip igmp snooping filter"
• The command "clear ip igmp snooping filter"
• The support IGMP snooping filtering (see the command "debug ethernet ip igmp-snooping")
• List of control protocols
Updated:
• The output of the command "show ip igmp snooping interfaces"
• The example of the command "timers bgp"
• The provided information in the command "show interfaces ethernet"
Rev 6.5-3.9.20xx, November 2020
Added:
• PBR Commands
• Configuration example of BGP Unnumbered
• Configuration example of Centralized L3 Gateway
• The section "Policy Based Routing (PBR)"
• The command "tacacs-server enable"
• The command "radius-server enable"
• The command "puppet-agent enable"
• The command "PTP TTL"
• The command "snmp-server notify event what-just-happened"
• The command "show snmp events what-just-happened"
• The command "openflow acl table counter disable"
• The command "show docker" to the user manual
• The command "ldap enable"
• The section Management VRF
• VRF option to the command "file debug-dump"
• VRF option to the command "file tcpdump"
• VRF option to the command "file stats telemetry upload latests"
• VRF option to the command "file stats telemetry upload all"
• VRF option to the command "ldap ssl"
• VRF option to the command "file image upload"
• VRF option to the command "image upload"
• VRF option to the command "snmp-server enable"
• VRF option to the command "snmp-server host traps"
• VRF option to the command "snmp-server host informs"
• VRF option to the command "docker"
• VRF option to the command "ntp"
• VRF option to the command "file stats"
• VRF option to the command "ip ftp source-interface"
• VRF option to the command "show ip ftp source-interface"
• VRF option to the command "ip tftp source-interface"
• The command "show ip tftp source-interface"
• VRF option to the command "ip scp source-interface"
• VRF option to the command "show ip scp source-interface"
• VRF option to the command "ip icmp source-interface"
• VRF option to the command "show ip icmp source-interface"
• VRF option to the command "ip traceroute source-interface"
1582
• VRF option to the command "show ip traceroute source-interface"
• VRF option to the command "ip sftp source-interface"
• VRF option to the command "show ip sftp source-interface"
• VRF option to the command "ntp source-interface"
• VRF option to the command "show ntp source-interface"
• VRF option to the command "tacacs-server source-interface"
• VRF option to the command "show tacacs-server source-interface"
• VRF option to the command "logging source-interface"
• VRF option to the command "show logging source-interface"
• VRF option to the command "snmp-server source-interface"
• VRF option to the command "show snmp-server source-interface"
• VRF option to the command "ssh client global source-interface"
• VRF option to the command "show ssh client source-interface"
• VRF option to the command "logging"
• VRF option to the command "logging port"
• VRF option to the command "logging trap"
• VRF option to the command "image fetch"
• "no-autoneg" parameter on the command "speed"
• Force option to the command "vrf definition"
• Host-trust option to the command "docker start"
• VRF option to the command "logging"
• Note to the command "ip l3"
Added:
• The section "Bidirectional PIM"
• The section "PIM Load-Sharing"
1583
• PIM Bidr commands:
• ip pim bidir shutdown
• ip pim df-robustness
• ip pim df-robustness
• ip pim df-backoff-interval
• ip pim df-offer-interval
• show ip pim interface df
• Bidir option to the following commands:
• ip pim rp-address
• ip pim rp-candidate
• Note in the command "dhcp"
• Note in the command "ipv6 dhcp client enable"
• The command "ip prefix-list bulk-mode"
• The command "ip prefix-list commit"
Updated:
• Output of the command "show ip pim rp"
• Output of the command "show ip pim interface"
• Output of the command "show ip pim neighbor"
• Output of the command "show ip pim rp-candidate"
• Output of the command "show ip pim protocol"
• Output of the command "show vrf"
• Output and note of the command "show interfaces mgmt0"
1584
• Ability input a range of ports on the following "show interfaces ethernet counters" commands:
• show interfaces counters
• show interfaces counters tc
• show interfaces counters pg
• show interfaces ethernet
• show interfaces ethernet counters pfc prio
• show interfaces port-channel counters
• show interfaces mlag-port-channel counters
• Ability to select several attributes for filtering output in the commands show ip bgp evpn
• Note to command "recirculation"
• Information about EVPN MAC Mobility
• Note in SSH section
Updated:
• show ip bgp evpn with multiple filters
• Organized log events in order of severity
• Notes and "session-id" ranges in the command "monitor session"
• Led Indicators information
• Note in command "what-just-happened"
• Output of the command "show telemetry"
• Output of the command "show interface port-channel"
• Output of the command "show interfaces mlag-port-channel"
• Note in "show interfaces counters discard"
• Notes of OpenFlow commands with delete functions
• Notes in "speed"
• Output of "show interface nve 1 detail"
• Output of "show interface nve 1"
• Output if "show vrrp statistics"
• Output of "show interfaces ethernet description"
• Output of "show interfaces ethernet status
• Output of "show interfaces status"
Removed:
• Preempt Delay option from VRRP section
• The deprecated command "IPv6 neighbor"
Rev 6.4-3.9.0900, May/June 2020
Added:
• The command "no logging debug-files rotation criteria"
• The command "no logging files rotation criteria"
• The command "logging mac masking"
• Notes in "ssh server login attempts" command
• Note to "username" command
Updated:
• The command "show logging"
1585
• The example "show what-just-happened acl" and the notes
• The example "show what-just-happened aggregated acl" and notes
Rev 6.4-3.9.0600, April 2020
Added:
• The command "neighbor"
• The command "ip virtual-router mac-address"
• Buffer drop option to WJH
• The command "show configuration auto-upload"
• The command "configuration auto-upload"
• Description of Automated Periodic Configuration File Backup
• Notes to the command "logging source-interface"
• The command "ip igmp snooping querier address"
• The command "match ipv6 address"
• Link to new link to IEEE 1588 Precision Time Protocol Design Guide
Updated:
• Output of "show ip arp" command to reflect addition of "Flags" field
• Output of "show interfaces nve counters" command
• Output of "show ip routing" command
• The command "dcb priority-flow-control enable"
• Note in the command "dcb priority-flow-control priority"
• The command "configuration upload"
• Changed the "SSH server login record-period" default from 30 days to 1 day
• Example and note of the "ptp delay-req interval" command
Removed:
• The command "virtual-router ip-address"
• The commands "match community", "match interface", "match local preferences", "set as-path tag", "set
community", and "set tag" from the Policy Rules section
• no-autoneg parameter from the speed configuration
Rev 6.3-3.9.0300, February 2020
Added:
• Updated description of the command "neighbor next-hop-peer"
• Note to the ACL command "policer"
• The command "show what-just-happened aggregated"
• The command "show ip bgp exceptions"
• The command "interface vrf ip address alias"
• The command "show ip interface vrf vrf"
• The command "interface ip enable"
• Support for BGP unnumbered neighbors
• Support for Layer-1 Aggregation in WJH
1586
• The scale section in the ACL Capability Summary table
• Updated example of the command "show interfaces status"
• Output of the command "show roce"
• Output of the command "ip pim rp-candidate"
• Output of the command "show interfaces nve"
• Output of the command "show interfaces nve detail"
• Output for the command "show ip routing"
• Output for the command "show what-just-happened"
Removed:
• RSA v1 from the command "ssh server host-key"
• RSA v1 from notes on the command "ssh server security strict"
• RSA v1 from the example in the command "show ssh server"
• RSA v1 from the example in the command "show ssh server host-keys"
• The command "web proxy auth host"
Rev 6.3 January 2020
Removed:
• The command "neighbor out-delay"
• The command "graceful-restart helper"
Rev 6.3 December 2019
Added:
• New command "show ip bgp neighbors address-family"
• Output of "show ip bgp evpn detail"
• Output of "show interfaces nve" while running NVE BGP controller mode
• Clarification about LACP system-priority configuration
• “Mapping type” was added to "show interfaces nve detail" command to state whether VLAN to VNI mapping
was done manually or by auto-vlan-map
• The command "interface nve auto-vlan-map"
• The command "interface nve disable nve vni"
• Counters per VLAN in "nve vni vlan" command
• The command "openflow fail-mode secure"
Updated:
• Changed "auto-create" command to "vni auto-create"
• Output of "show ip bgp address-family l2vpn-evpn"
• Replaced auto-completion of “show ip bgp evpn route-type *” command with string keywords instead on
numbers
• Output of "show interfaces nve" command to reflect the addition of the "auto-vlan-map" status
1587
Rev 6.3 November 2019
Added:
• ca-valid option in the "crypto certificate name" command
• ca-valid option in the "crypto certificate generation" command
• New command "ntp server-role disable"
• New ca-valid option to the "crypto certificate system-self-signed regenerate" command
• The command "logging protocol"
Updated:
• Output example of the "qos map pcp dei" command
• Output example of the "show what just happened" command
• Output example of the "show crypto certificate" command
Removed:
• "prefix-modes show-config" option because it is no longer available in the "cli session" command
• Terminal type vt320 from the "cli session" command
• "dcb ets enable" command is deprecated
Rev 6.2 September 2019
Added:
• Instructions on how to change initial password through JSON API
• Instruction on logging out through JSON API
• The section "Changing Default Password" in order to conform to new law: California's Senate Bill No. 327,
Chapter 886
• The command "logging"
1588
• The command "logging filter include"
• The command "logging filter exclude"
• The command "no logging filter"
• New feature: LLDP is now enabled by default
• New feature: RoCE automation
• New feature: IGMP Snooping Querier Guard
• New field "PTP operational state" to the following commands: "show ptp vrf", "show ptp vrf <name>", "show
ptp interface", "show ptp interface ethernet <id>", "show ptp interface vlan <id>", "show ptp interface vlan <id>
ethernet <id>", and "show ptp interface port-channel <id>"
• New command "ptp enable ipv6"
• ACL option for the "what-just-happened" command
• ACL option for the "what-just-happened auto-export" command
• ACL option for the "clear what-just-happened" command
• New page of RoCE commands
• The command "ip igmp snooping querier-guard"
• The command "show ip igmp snooping querier-guard"
• The command "clear buffers interface ethernet 1/1 max-usage" to the user manual
• The command "clear buffers interface max-usage" to the user manual
• The command "clear buffers pool iPool2 max-usage" to the user manual
• The command "clear buffers pool max-usage" to the user manual
• The command "show ptp interface ethernet" to the user manual
• The command "show ptp interface" to the user manual
• Option to the "show ip arp" command
• The command "disable interface ethernet traffic-class congestion-control"
• The command "disable interface port-channel traffic-class congestion-control"
• The command "disable interface mlag-port-channel traffic-class congestion-control"
Updated:
• Description of the no form of the "neighbor ebgp-multihop" command
• Output example of "show traffic pool interface ethernet" command
• Output example of "show interfaces ethernet description" command
• Output example of "show interfaces counters discard" command
• Output example of "show qos mapping ingress interface egress interface"
• Output example of the "show what-just-happened" command
• Output example of the "qos rewrite pcp" command
• Output example of the "qos rewrite dscp" command
• Output example of the "qos rewrite map switch-priority pcp dei" command
• Moved JSON API Authentication Example from "JSON Examples" section to JSON API "Authentication"
section
• BGP "neighbor weight" range
1589
• The XML API is deprecated as of release 3.8.2000.
• xml-gw enable" due to XML API depreciation
• The command "show xml-gw" due to XML API depreciation
No changes to this version. The software version was changed due to bug fixes. For further information, see Release
Notes.
Rev 6.1 July 2019
Added:
• Documentation of The command ip igmp version
• Support for global flow control watchdog
• The options of "keep-docker" and "clear-label <label name>" to the "reset factory" command
Updated
• show interface pfc-wd command output
• The title of the "Telemetry" section is now called "Buffer Histograms Monitoring"
No changes to this version. The software version was changed due to bug fixes. For further information, see Release
Notes.
Rev 6.0 June 2019
Added:
• "Appendix: Show command NOT supported by JSON API"
Rev 5.9 June 2019
No changes to this version. The software version was changed due to bug fixes. For further information, see Release
Notes.
Rev 5.9 May 2019
1590
Added:
• Added note about configuring MTU on MLAG IPL VLAN interface
• Added step for configuring MTU on MLAG IPL VLAN interface in MLAG configuration flow
• The command "ovs logging level"
• The command "show ovs"
• The parameter "vrf" to multiple commands under "IGMP and PIM Commands"
Updated:
• "Web Interface Overview" with note on the maximum allowed number of WebUI sessions
• "Upgrading HA Groups" with note regarding slave switches not learning MAC addresses when they are
upgraded while master switches are still in the lower version
• JSON "Authentication" section
• Section "Authentication Example"
• Section "Defining a Multicast Router Port on a VLAN"
• Section "IGMP Snooping Querier"
• The command "ip igmp snooping (config)"
• The command "show ip igmp snooping membership"
• Content under "Multicast (IGMP and PIM)"
Rev 5.8 April 2019
Added:
• Sections Configure WJH Using CLI, Configure WJH Using NEO
• Sections SALT, Ansible
• Sections ESF Configuration Using CLI, ESF Configuration using AnsibleAdded IPv4 link local to section IP
Routing Overview
• Section WJH Streaming and Integration with Telegraf, InfluxDB and Grafana (TIG) Stack
• Section Ethernet VPN (EVPN)
• The command "show running-config interface"
• The command "file stats telemetry delete latest"
• The command "file stats telemetry delete all"
• The command "file stats telemetry upload latest"
• The command "file stats telemetry upload all"
• Section "Upgrade Ramifications" on page "Linux Dockers"
• The command "what just happened auto-export"
• The command "show snmp source interface"
• The command "snmp server source interface"
• The command "nve controller bgp"
• The command "vxlan mlag-tunnel-ip"
• The command "vxlan mlag-tunnel-ip"
• The command "nve neigh-suppression"
• The command "nve vlan neigh-suppression"
• The command "show interface nve detail"
• The command "vni"
• The command "vni rd"
• The command "vni route-target"
• The command "auto-create"
Updated:
• The command "show stats sample data"
• Page "RDMA Over Converged Ethernet (RoCE)"
• The command “snmp-server user”
• The command "monitor session"
• The command "ib fabric import"
• The command "radius-server host"
• The command "show radius"
• The command "show ip bgp neighbors received"
1591
• Section "Destination Interface" on page "Port Mirroring"
• Section "Configuring an SNMPv3 User" on page "Network Management Interfaces"
• Page "Important Pre-OS Upgrade Notes"
• Page "Linus Dockers"
• The command "show json-gw"
• Section "Router ID" on page "OSPF"
• Section "Memory Resources Allocation Protocol" on page "Linux Dockers"
• The command "show running-config"
• The command "start"
• The command "show docker containers"
• The command "copy-sdk"
• The command "cli session"
• The command "show hosts"
• The command "web enable"
• The command "web https"
• The command "show interface nve"
• The command "show ip bgp address-family"
• Section "Execution Types" on page "Network Management Interfaces"
• The command "show mac-address-table"
• The command "show mac-address-table summary"
• Section "Configuring Signal Degradation Monitoring"
• The command "port-channel load-balance ethernet"
• Section "Restoring Subnet Manager Configuration"
• Page "What Just Happened"
• The command "what just happened"
• The command "clear what just happened"
• The command "show what just happened"
• The command "ip default-gateway"
• Section "System Configuration"
• The command "logging trap"
• The command "logging port"
• The command "show logging port"
• Page "Management Source IP Address"
1592
• The command “bfd interval”
• The command “show ip route static”
• The command “set community”
• The command “magp”
• The command “vrrp”
• Section “Configuring UDK”
• Section “What Just Happened (WJH)”
• Section “56GbE Link Speed”
• The command “show interfaces ethernet”
• The command “ip pim multipath next-hop”
• The command “show ip pim protocol”
• The command “aaa authentication login”
• The command “stats sample interval”
• The command “stats export”
• The command “ip route bfd”
• The command “ip igmp last-member-query-response-time”
• Section “OSPF”
• Section “Config Router”
• The command “ip igmp snooping (config)”
• Section “What Just Happened (WJH)”
• The command “show ip pim rp-hash”
• The command “show ssh client source-interface”
• The command “stats sample <sample-id> enable”
• The command “show stats sample”
• The command “show stats sample data”
• Section “Unsplitting a Split Port”
• The command “width”
Rev 5.6 December 2018
Added:
• “Management Source IP Address”
Rev 5.5 December 2018
Added:
• The command “clear ptp interface port-channel counters”
• The command “clear ptp VRF counters”
• The command “interface port-channel”
• The command “ptp vrf”
• The command “show ptp interface port-channel”
• The command “show ptp vrf”
• The command “show ptp vrf counters”
• The command “show ptp interface port-channel counters”
• The command “email autosupport mailhub”
• The command “email autosupport recipient”
• The command “show email”
• The command “snmp-server cache enable”
• Section “What Just Happened (WJH)”
• Section “Link State Tracking”
Updated:
• Section “IP Diagnostic Tools”
• Section “Configuring PTP”
• The command “show ptp forced-master”
• The command “show ptp”
• Section “Supported Events”
• The command “aaa authorization”
1593
• The command “show aaa”
• Section “System File Encryption”
• The command “system profile”
• The command “show memory”
• Section “Configuring an SNMPv3 User”
• The command “snmp-server user”
• The command “show snmp auto-refresh”
• The command “show virtual-machine interface”
• Section “Resource Scale”
• Section “56GbE Link Speed”
• The command “fec-override”
• The command “show interfaces ethernet rates”
• The command “show interfaces port-channel”
• Section “Port Type”
• Section “BPDU Guard”
• Section “Loop Guard”
• The command “spanning-tree mst root”
• Section “Configuring Link State Tracking”
• The command “link state tracking group”
• The command “link state tracking vlan”
• The command “deny/permit (MAC ACL rule)”
• The command “deny/permit (IPv4 ACL rule)”
• The command “deny/permit (IPv4 TCP ACL rule)”
• The command “deny/permit (IPv4 TCP-UDP/UDP ACL rule)”
• The command “deny/permit (IPv4 ICMP ACL rule)”
• The command “deny/permit (IPv6 ACL rule)”
• The command “deny/permit (IPv6 TCP ACL rule)”
• The command “deny/permit (IPv6 TCP-UDP/UDP ACL rule)”
• The command “deny/permit (IPv6 ICMPv6 ACL rule)”
• The command “deny/permit (MAC UDK ACL rule)”
• The command “deny/permit (IPv4 UDK ACL rule)”
• The command “deny/permit (IPv4 TCP UDK ACL rule)”
• The command “deny/permit (IPv4 TCP-UDP/UDP UDK ACL rule)”
• The command “deny/permit (IPv4 ICMP UDK ACL rule)”
• The command “show access-lists action”
• Section “Configuring VXLAN”
• Section “IGMP Snooping Querier”
• The command “igmp snooping querier query-interval”
• The command “Trust Levels”
• The command “qos default switch-priority”
• The command “storm-control”
• Section “Configuring a Router Port Interface”
• The command “show ip interface ethernet”
• The command “show ip interface port-channel”
• The command “show ip interface vrf”
• Section “Configuring OSPF”
• Section “Configuring BGP”
• The command “show {ip | ipv6} bgp”
Rev 5.4 November 2018
No changes made since last revision
Rev 5.3 August 2018
Added:
• The command “web proxy auth authtype”
• The command “web proxy auth basic”
1594
• The command “web proxy auth host”
Updated:
• The command “{ip | ipv6} route”
• The command “image install”
• The command “image options”
• Section “Authentication, Authorization and Accounting (AAA)”
• The command “aaa authorization”
• The command “show virtual-machine install”
• The command “show telemetry”
• The command “start”
• The command “speed”
• The command “show mac access-lists summary”
• The command “dcb priority-flow-control mode”
• The command “show buffers details”
• The command “show ip bgp address-family”
• The command “show ip bgp neighbors”
• The command “show ip bgp neighbors received”
• The command “vrrp”
• The command “ip virtual-router address”
• The command “show ip bgp peer-group”
1595