AOS-CX 10.14 Command-line Interface Guide for 6300, 6400 Switches

HPE Aruba Networking

AOS-CX 10.14 Command-line Interface ...

AOS-CX 10.14 Command-line Interface Guide for 6300, 6400 Switches

AOS-CX 10.14 Command-Line Interface Guide

Apr 15, 2024 — ... 1739 area default-metric. 1740 authentication ... This document describes features of the AOS-CX network operating system. ... t. With -l, it shows a sort by mtime ...

PDF preview unavailable. Download the PDF instead.

cli 6300-6400
AOS-CX 10.14 Command-Line Interface Guide
6300, 6400 Switch Series
Published: April 2024 Edition: 1

Copyright Information © Copyright 2024 Hewlett Packard Enterprise Development LP. This product includes code licensed under certain open source licenses which require source compliance. The corresponding source for these components is available upon request. This offer is valid to anyone in receipt of this information and shall expire three years following the date of the final distribution of this product version by Hewlett Packard Enterprise Company. To obtain such source code, please check if the code is available in the HPE Software Center at https://myenterpriselicense.hpe.com/cwp-ui/software but, if not, send a written request for specific software version and product for which you want the open source code. Along with the request, please send a check or money order in the amount of US $10.00 to: Hewlett Packard Enterprise Company Attn: General Counsel WW Corporate Headquarters 1701 E Mossy Oaks Rd Spring, TX 77389 United States of America. Notices The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise website.
For more information, see the KM Process Guide. ?>
Acknowledgments Bluetooth is a trademark owned by its proprietor and used by Hewlett Packard Enterprise under license.
|2

Contents
About this document
Applicable products What's new in this release Latest version available online Command syntax notation conventions About the examples Identifying switch ports and interfaces Identifying modular switch components
Introduction to the AOS-CX CLI
CLI access Getting CLI help Authority levels Command contexts
Operator context (>) Navigating to the operator context (>) Auditor context Manager context (#) Navigating to the manager context (#) Global configuration context (config) Navigating to the config context Other configuration command contexts Support for range contexts Rules for range contexts Command history Command completion Pipe (|) support in show commands Command syntax notation conventions
Service OS CLI commands
boot cat cd path config-clear cp du erase zeroize exit format identify ip ls md5sum mkdir
AOS-CX 10.14 Command-Line Interface Guide

Contents
Contents
3
54
54 54 56 56 57 58 58
60
60 60 61 62 62 62 62 63 63 64 64 64 65 67 67 68 68 69
70
70 71 71 72 73 74 75 76 77 78 79 80 82 83
3

mount mv password (svos) ping pwd reboot rm rmdir secure-mode sh system serviceos password-prompt umount update tftp version
ACL commands
ACL application access-list copy access-list ip access-list ipv6 access-list log-timer access-list mac access-list resequence access-list reset access-list secure-update apply access-list control-plane apply access-list (to interface or LAG) apply access-list (to interface VLAN) apply access-list (to subinterface) apply access-list (to L3 VNI) apply access-list (to VLAN) clear access-list hitcounts clear access-list hitcounts control-plane object-group address resequence object-group address reset object-group all reset object-group ip address object-group ipv6 address object-group port object-group port resequence object-group port reset show access-list show access-list control-plane show access-list hitcounts show access-list hitcounts control-plane show access-list secure-update Aruba Central commands
aruba-central aruba-central support-mode configuration-lockout central managed disable enable location-override location-override-alternative show aruba-central

84 84 85 86 87 87 88 89 89 91 92 93 93 95 96
97
97 97 101 112 120 123 129 131 135 136 137 139 141 144 146 147 149 150 151 151 152 154 156 159 160 160 166 168 171 173 174 174 174 175 176 177 178 179 181
Contents | 4

show running-config current-context show capacities show capacities-status show object-group
ACL and Policy hardware resource commands
show resources
Application Recognition and Control commands
app-recognition show app-recognition class show class abp-session-limit-exceed-action mode port-access abp show port-access abp show port-access abp hitcounts clear port-access abp hitcounts show running-config app-recognition diag-dump arcd basic show events arcd show tech arc
ARP commands
arp inspection arp inspection trust arp ip arp process-grat-arp clear arp debug arp-security ip local-proxy-arp ip proxy-arp ipv6 neighbor mac show arp show arp inspection interface show arp inspection statistics show arp inspection vlan show arp state show arp summary show arp timeout show arp vrf show ipv6 neighbors show ipv6 neighbors state show tech arp-security
Aruba Intelligent Forwarding (FIB) commands
fib-optimization ageout-time fib-optimization evpn-vxlan exclude-nexthop fib-optimization evpn-vxlan host-route show fib-optimization configuration show ip route fib-optimization
AVB commands
avb clear msrp statistics
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

184 185 187 189
192
192
197
197 198 201 206 210 211 212 216 219 221 222 222 225 226
228
228 228 229 230 231 233 234 235 236 237 238 240 241 242 243 245 246 247 248 250
252
252 252 253 254 255
257
257 258
5

enable max fan in ports msrp msrp timer join msrp timer leave msrp timer leaveall show avb domain show avb interface show msrp interface show msrp statistics show msrp state show msrp streams show msrp streams statistics show running-config avb vlan
Banner commands
banner show banner
BFD Commands
bfd bfd <IPV4-ADDR> bfd all-interfaces bfd detect-multiplier bfd disable bfd enable (Context: config-hsc) bfd disable (Context: config-hsc) bfd echo disable bfd echo-src-ip-address bfd min-echo-receive-interval bfd min-receive-interval bfd min-transmit-interval clear bfd statistics ip ospf bfd ip ospf bfd disable ip route bfd ipv6 ospfv3 bfd ipv6 ospfv3 bfd disable neighbor fall-over bfd show bfd show bfd interface show hsc
BGP commands
address-family aggregate-address bgp always-compare-med bgp asnotation dotted bgp asnotation dotted-plus bgp bestpath as-path ignore bgp bestpath as-path multipath-relax bgp bestpath compare-routerid bgp bestpath med confed bgp bestpath med missing-as-worst bgp cluster id

258 259 260 261 262 263 263 264 265 267 268 269 270 271 271
273
273 274
276
276 276 277 278 279 280 281 281 282 283 284 285 287 287 288 289 290 291 292 293 296 297
299
299 300 301 302 303 303 304 305 306 307 307
Contents | 6

bgp confederation bgp confederation peers bgp dampening bgp default local-preference bgp deterministic-med bgp fast-external-fallover bgp graceful-restart restart-time bgp graceful-restart stalepath-time bgp log-neighbor-changes bgp maxas-limit bgp router-id bgp update-group clear bgp disable|enable distance bgp maximum-paths neighbor activate neighbor advertisement-interval neighbor add-paths neighbor add-paths advertise-best neighbor allowas-in neighbor ao neighbor capability orf prefix-list neighbor default-originate neighbor ebgp-multihop neighbor fall-over neighbor fall-over bfd neighbor graceful-shutdown neighbor listen ip-range neighbor local-as neighbor maximum-prefix neighbor next-hop-self neighbor next-hop-unchanged neighbor orf prefix-list in neighbor passive neighbor password neighbor port neighbor remote-as neighbor remove-private-AS neighbor route-map neighbor route-reflector-client neighbor send-community neighbor shutdown neighbor slow-peer neighbor soft-reconfiguration inbound neighbor timers neighbor ttl-security-hops neighbor update-source neighbor weight network redistribute router bgp set extcommunity show bgp show bgp <PREFIX> show bgp community
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

308 309 310 311 312 313 314 315 316 316 317 318 319 320 321 322 324 325 325 327 327 329 331 332 333 334 335 336 338 340 341 343 344 345 346 347 348 349 350 351 353 354 355 356 357 358 359 360 361 362 363 365 366 367 370 373
7

show bgp flap-statistics show bgp neighbor advertised-routes show bgp neighbor paths show bgp neighbor received orf-prefix-list show bgp neighbor received-routes show bgp neighbor routes show bgp neighbors show bgp paths show bgp peer-group summary show bgp summary show bgp l2vpn evpn vni route-type show bgp l2vpn evpn vtep show bgp l2vpn evpn vtep route-type show bgp l2vpn evpn vtep vni show bgp l2vpn evpn vtep vni route-type show running-config bgp timers bgp vrf
BIDIR-PIM commands
ip pim-bidir ip pim-bidir hello-delay ip pim-bidir lan-prune-delay ip pim-bidir override-interval ip pim-bidir propagation-delay no ip pim-bidir show ip pim dfe show ip pim dfe show running-config pim
Boot commands
boot fabric-module boot line-module boot management-module boot management-module (recovery console) boot set-default boot system show boot-history
Cable diagnostic commands
diag cable-diagnostic
Captive portal (RADIUS) commands
aaa authentication port-access captive-portal-profile show port-access captive-portal-profile url url-hash-key
CDP commands
cdp clear cdp counters clear cdp neighbor-info show cdp show cdp neighbor-info show cdp traffic show cdp voice-vlan mode

377 378 379 381 382 384 385 390 391 393 396 397 398 399 400 401 402 403
404
404 405 406 407 408 409 410 411 412
414
414 415 416 417 419 420 421
427
427
430
430 431 432 433
436
436 437 437 438 439 440 441
Contents | 8

Checkpoint commands
checkpoint auto checkpoint auto confirm checkpoint diff checkpoint post-configuration checkpoint post-configuration timeout checkpoint rename checkpoint rollback copy checkpoint <CHECKPOINT-NAME> <REMOTE-URL> copy checkpoint <CHECKPOINT-NAME> {running-config | startup-config} copy checkpoint <CHECKPOINT-NAME> <STORAGE-URL> copy <REMOTE-URL> checkpoint <CHECKPOINT-NAME> copy <REMOTE-URL> {running-config | startup-config} copy running-config {startup-config | checkpoint <CHECKPOINT-NAME>} copy {running-config | startup-config} <REMOTE-URL> copy {running-config | startup-config} <STORAGE-URL> copy startup-config running-config copy <STORAGE-URL> running-config erase show checkpoint <CHECKPOINT-NAME> show checkpoint <CHECKPOINT-NAME> hash show checkpoint post-configuration show checkpoint show checkpoint date show running-config hash show startup-config hash write memory
Classifier policy commands
Classifier policy application apply policy (config-if, config-lag-if, config-if-vlan, config-vlan) apply policy class copy class ip class ipv6 class mac class resequence class reset clear policy hitcounts policy policy copy policy resequence policy reset show class show policy
Client Insight Commands
client-insight enable client-insight on-boarding event logs diag-dump client-insight basic show capacities client-insight-client-limit show capacities-status client-insight-client-limit show events -c client-insight show tech client-insight
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

443
443 444 445 447 448 449 449 450 452 452 453 454 456 457 459 460 460 462 463 466 466 467 468 469 470 471
472
472 472 476 477 479 486 492 496 498 499 501 505 506 507 508 510
516
516 516 517 519 520 521 523
9

CLI session commands
alias auto-confirm configure terminal disable do enable (manager context) end exit list page Pipe (|) command repeat session-timeout show session-timeout show alias show history
CLI user session management commands
cli-session
Clock commands
clock date clock datetime clock time clock timezone show clock
Container management commands
container container exec env image-location restrict cpu restrict memory show container show capacities containers show capacities-status containers show running-config container vrf
CoPP commands
Classes of traffic apply copp-policy class clear copp-policy statistics copp-policy default-class reset copp-policy show copp-policy show copp-policy factory-default show copp-policy statistics show tech copp
Debug logging commands

528
528 529 530 531 531 532 533 533 534 535 536 537 537 538 539 539
542
542
545
545 545 546 547 547
549
549 549 550 551 553 554 554 556 557 557 558
560
560 562 563 564 565 566 567 568 570 572 573
575
Contents | 10

clear debug buffer debug {all | <MODULE-NAME>} debug db debug destination show debug show debug buffer show debug buffer vsf show debug destination
Device fingerprinting commands
cdp client device-fingerprint apply-profile client device-fingerprint client-limit client device-fingerprint profile dhcp http user-agent lldp (device fingerprinting) vsx-sync vsx-sync device-fingerprint show client device-fingerprint show client device-fingerprint active show client device-fingerprint profile
Device profile commands
aaa authentication port-access allow-cdp-auth aaa authentication port-access allow-cdp-bpdu aaa authentication port-access allow-cdp-proxy-logoff aaa authentication port-access allow-lldp-bpdu associate cdp-group associate lldp-group associate mac-group associate role disable enable ignore (for CDP groups) ignore (for LLDP groups) ignore (for MAC groups) mac-group match (for CDP groups) match (for LLDP groups) match (for MAC groups) port-access cdp-group port-access device-profile port-access device-profile mode block-until-profile-applied port-access lldp-group show port-access device-profile
DHCP client commands
ip dhcp ip dhcp option show ip dhcp
DHCPv4 relay commands
dhcp-relay dhcp-relay hop-count-increment dhcp-relay l2vpn-clients
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

575 576 577 579 581 582 583 584
586
586 587 588 588 589 590 591 592 593 594 596 597
599
599 600 601 602 604 605 606 607 608 608 609 610 612 616 617 618 620 624 625 626 627 628
631
631 632 633
635
635 635 636
11

dhcp-relay option 82 dhcp-smart-relay diag-dump dhcp-relay basic ip bootp-gateway ip helper-address show dhcp-relay show dhcp-relay bootp-gateway show ip helper-address
DHCP relay (IPv6) commands
dhcpv6-relay dhcpv6-relay option 79 ipv6 helper-address show dhcpv6-relay show ipv6 helper-address
DHCP server IPv4 commands
authoritative bootp clear dhcp-server leases default-router dhcp-server external-storage dhcp-server vrf disable dns-server domain-name enable lease netbios-name-server netbios-node-type option pool range show dhcp-server static-bind
DHCP server IPv6 commands
authoritative clear dhcpv6-server leases dhcpv6-server external-storage dhcpv6-server vrf disable dns-server enable lease option pool range show dhcpv6-server static-bind
DHCP snooping commands
clear dhcp-snooping binding clear dhcp-snooping statistics dhcp-snooping dhcp-snooping (in config-vlan context)

637 638 639 641 642 643 644 645
647
647 648 649 650 651
653
653 654 655 656 657 658 659 659 660 661 662 663 664 665 666 667 668 670
672
672 673 674 675 676 676 677 678 679 680 681 682 684
686
686 687 688 688
Contents | 12

dhcp-snooping allow-overwrite-binding dhcp-snooping authorized-server dhcp-snooping event-log client dhcp-snooping external-storage dhcp-snooping flash-storage dhcp-snooping max-bindings dhcp-snooping option 82 dhcp-snooping static-attributes dhcp-snooping trust dhcp-snooping tunnel vxlan trust dhcp-snooping verify mac show dhcp-snooping show dhcp-snooping binding show dhcp-snooping statistics
DHCPv6 snooping commands
clear dhcpv6-snooping binding clear dhcpv6-snooping guard-policy statistics clear dhcpv6-snooping statistics dhcpv6-snooping dhcpv6-snooping guard-policy dhcpv6-snooping (in config-vlan context) dhcpv6-snooping authorized-server dhcpv6-snooping event-log client dhcpv6-snooping external-storage dhcpv6-snooping flash-storage dhcpv6-snooping max-bindings dhcpv6-snooping trust dhcpv6-snooping tunnel vxlan trust match client prefix-list match server access-list preference show dhcpv6-snooping guard-policy show dhcpv6-snooping guard-policy interface show dhcpv6-snooping guard-policy vlan show dhcpv6-snooping show dhcpv6-snooping binding show dhcpv6-snooping statistics
DHCP options commands
http-proxy
DNS client commands
ip dns domain-list ip dns domain-name ip dns host ip dns server address show ip dns
ECMP commands
show ip ecmp
ERPS Commands
clear erps ring <RINGID> instance <ID> clear erps statistics erps ring
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

689 690 691 692 694 695 696 698 699 700 701 701 703 705
707
707 708 709 709 710 711 712 713 714 716 717 718 719 720 721 721 722 724 725 726 727 728
730
730
732
732 733 734 735 736
739
739
741
741 741 742
13

erps ring <RINGID> <port0|port1> interface

743

erps ring <RINGID> description

744

erps ring <RINGID> guard-interval

745

erps ring <RINGID> hold-off-interval

746

erps ring <RINGID> instance

747

erps ring <RINGID> instance <ID> control-vlan

748

erps ring <RINGID> instance <ID> description

749

erps ring <RINGID> instance <ID> enable

750

erps ring <RINGID> instance <ID> protected-vlans

751

erps ring <RINGID> instance <ID> protection-switch {{manual|force} <PORT0>|<PORT1>} 752

erps ring <RINGID> instance <ID> revertive

754

erps ring <RINGID> instance <ID> role

755

erps ring <RINGID> instance <ID> rpl

756

erps ring <RINGID> meg-level

757

erps ring <RINGID> parent-ring

758

erps ring <RINGID> sub-ring

759

erps ring <RINGID> tcn-propogation

760

erps ring <RINGID> transmission-interval

761

erps ring <RINGID> wtr-interval

762

show erps statistics

763

show erps status

764

show erps summary

767

EVPN commands
active-gateway arp-suppression disable (evpn vlan-aware-bundles) enable(evpn vlan-aware-bundles) evpn mac-move-detection count timer nd-suppression rd rd (evpn vlan-aware-bundles) redistribute host-route redistribute host-route (evpn vlan-aware-bundles) redistribute local-mac redistribute local-svi route-target route-target {evpn} route-target (evpn vlan-aware-bundles) show evpn evi show evpn evi summary show evpn evi <EVI-ID> show evpn evi detail show evpn evi <EVI-ID> detail show evpn mac-ip show evpn mac-ip evi show evpn vtep-neighbor show running-config evpn virtual-mac vlan vlan-aware-bundle vlan-ethernet-tag (evpn vlan-aware-bundles) vlan <ID-RANGE>

768
768 770 771 772 772 773 774 775 776 777 778 779 779 780 781 782 784 786 787 788 790 791 792 792 793 794 795 796 797 798

External storage commands

800

Contents | 14

address directory disable enable external-storage password (external-storage) show external-storage show running-config external-storage type username vrf
Feature pack commands
erase feature-pack feature-pack mode feature-pack server feature-pack validate show feature-pack
Fault monitor commands
(Fault enabling/disabling) action apply fault-monitor profile fault-monitor profile show fault-monitor profile show interface fault-monitor profile show interface fault-monitor status show running-config threshold vsx-sync (fault monitor)
Firmware management commands
copy {primary | secondary} <REMOTE-URL> copy {primary | secondary} <FIRMWARE-FILENAME> copy primary secondary copy <REMOTE-URL> copy secondary primary copy <STORAGE-URL> copy hot-patch hot-patch show hot-patch
Flow monitoring commands
diag-dump ipfix basic flow exporter flow monitor flow record flow-tracking ipv4|ipv6 flow monitor (interface) show flow exporter show flow monitor show flow record show flow-tracking show tech ipfix
Group based policy commands
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

800 801 802 802 803 804 805 806 806 807 808
810
810 811 812 814 815
820
820 821 824 825 826 827 828 829 831 833
835
835 836 837 837 840 840 842 843 844
845
845 846 848 850 852 855 856 858 859 861 863
865
15

class gbp-ip class gbp-ipv6 class gbp-mac clear port-access gbp hitcounts gbp enable gbp role gbp role infra port-access gbp port-access reflexive port-access role associate gbp show class show gbp role-mapping show port-access gbp show port-access gbp hitcounts
High Availability Commands
redundancy switchover
HTTPS server commands
https-server authentication certificate https-server authentication password https-server max-user-sessions https-server rest access-mode https-server rest firmware-site-distribution https-server session close all https-server session-timeout https-server vrf show https-server show https-server authentication
ICMP commands
ip icmp redirect ip icmp throttle ip icmp unreachable
IGMP commands
ip igmp ip igmp apply access-list ip igmp last-member-query-interval ip igmp querier ip igmp querier interval ip igmp querier-wait-time ip igmp querier query-max-response-time ip igmp robustness ip igmp router-alert-check ip igmp static-group ip igmp version ip igmp version strict no ip igmp show ip igmp show ip igmp counters show ip igmp group show ip igmp groups show ip igmp interface show ip igmp interface counters show ip igmp interface group

865 870 874 876 877 877 879 880 882 883 884 885 886 887
889
889
891
891 892 892 893 894 895 896 897 898 899
901
901 901 902
904
904 905 907 907 909 910 911 912 913 914 915 915 916 917 920 922 924 928 929 931
Contents | 16

show ip igmp interface groups show ip igmp interface statistics show ip igmp static-groups show ip igmp statistics
IGMP snooping commands
ip igmp snooping apply access list ip igmp snooping (config mode) ip igmp snooping filter unknown mcast ip igmp snooping (interface mode) ip igmp snooping preprogram-starg-flow ip igmp snooping static group ip igmp snooping (vlan mode) show ip igmp snooping
In-System Programming commands
clear update-log show needed-updates
Interface commands
allow-unsupported-transceiver default interface description energy-efficient-ethernet error-control flow-control interface interface loopback interface vlan ip address ip mtu ipv6 address l3-counters mtu persona rate-interval routing show allow-unsupported-transceiver show interface show interface dom show interface energy-efficient ethernet show interface flow-control show interface statistics show interface transceiver show interface utilization show ip interface show ip source-interface show ipv6 interface show ipv6 source-interface shutdown speed system interface-group client track ip client track ip { enable | disable | auto } client track ip client-limit client track ip update-interval
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

933 935 936 938
940
940 941 942 943 945 947 948 949
953
953 953
955
955 957 958 958 959 960 962 962 963 964 965 966 968 969 970 972 974 974 975 982 983 984 989 992 995 996 998 999 1001 1002 1003 1005 1007 1008 1009 1009
17

client track ip update-method probe show capacities show client ip { count | port | vlan }
IP Directed Broadcast commands
copy support-file feature ip directed-broadcast show arp show ip interface show ip directed-broadcast
IP Neighbor Flood commands
ip neighbor-flood show ip interface show ip neighbor-flood show running-config
IP Prefix priority commands
ip prefix-priority ipv6 prefix-priority show ip prefix-priority show ipv6 prefix-priority
IP-SLA commands
http https icmp-echo ip-sla ip-sla responder show ip-sla responder show ip-sla responder results show ip-sla start-test stop-test tcp-connect udp-echo udp-jitter-voip vrf
IP tunnels commands
description destination ip destination ipv6 interface tunnel ip address ipv6 address ip mtu show interface tunnel show running-config interface tunnel shutdown source ip source ipv6 ttl vrf attach

1010 1011 1012
1013
1013 1013 1014 1015 1016
1018
1018 1018 1019 1020
1022
1022 1023 1024 1025
1027
1027 1028 1029 1030 1031 1032 1033 1034 1038 1039 1039 1040 1042 1043
1045
1045 1046 1047 1048 1050 1051 1052 1053 1055 1056 1057 1058 1059 1061
Contents | 18

IP source lockdown commands
IP source lockdown resource extended
IPv4 source lockdown commands
ipv4 source-binding ipv4 source-lockdown ipv4 source-lockdown hardware retry show ipv4 source-binding show ipv4 source-lockdown
IPv6 destination guard commands
ipv6 destination guard show ipv6 destination-guard show ipv6 destination-guard statistics vlan clear ipv6 destination-guard statistics vlan
IPv6 RA commands
ipv6 address <global-unicast-address> ipv6 address autoconfig ipv6 address link-local ipv6 nd cache-limit ipv6 nd dad attempts ipv6 nd hop-limit ipv6 nd mtu ipv6 nd ns-interval ipv6 nd prefix ipv6 nd ra dns search-list ipv6 nd ra dns server ipv6 nd ra lifetime ipv6 nd ra managed-config-flag ipv6 nd ra max-interval ipv6 nd ra min-interval ipv6 nd ra other-config-flag ipv6 nd ra reachable-time ipv6 nd ra retrans-timer ipv6 nd route ipv6 nd router-preference ipv6 nd suppress-ra show ipv6 nd global traffic show ipv6 nd interface show ipv6 nd interface prefix show ipv6 nd interface route show ipv6 nd ra dns search-list show ipv6 nd ra dns server
IPv6 source lockdown commands
ipv6 source-binding ipv6 source-lockdown ipv6 source-lockdown hardware retry show ipv6 source-binding show ipv6 source-lockdown
IRDP commands
diag-dump irdp basic ip irdp
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1062
1062
1064
1064 1065 1066 1067 1067
1072
1072 1072 1073 1074
1076
1076 1077 1078 1079 1079 1080 1081 1082 1082 1084 1085 1086 1087 1088 1089 1090 1091 1092 1092 1094 1094 1095 1096 1101 1103 1104 1104
1106
1106 1107 1108 1109 1109
1114
1114 1115
19

ip irdp holdtime ip irdp maxadvertinterval ip irdp minadvertinterval ip irdp preference show ip irdp
IVRF commands
address-family ip|ipv6 vrf ipv6 route source interface ip route interface rd redistribute route-target route-target export router bgp router bgp vrf show bgp vpn unicast show bgp info vrf show ip route vrf show ipv6 route vrf vrf
Job Scheduler commands
job schedule show job show capacities (job, schedule) show running-config (job, schedule) show schedule
Key chain commands
accept-lifetime cryptographic-algorithm key keychain key-string name recv-id send-lifetime send-id show capacities keychain show keychain show running-config keychain
L1-100Mbps downshift commands
downshift enable show interface show interface downshift-enable show running-config interface
LACP and LAG commands
description hash interface lag ip address

1116 1117 1118 1119 1120
1122
1122 1123 1124 1126 1129 1130 1131 1133 1134 1135 1136 1140 1141 1142 1143
1145
1145 1147 1150 1153 1153 1155
1158
1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1170
1172
1172 1173 1179 1180
1183
1183 1184 1184 1186
Contents | 20

ipv6 address lacp fallback lacp fallback-static lacp mode lacp port-id lacp port-priority lacp rate lacp system-priority lag show interface show lacp aggregates show lacp configuration show lacp interfaces show lag show running-config interface lag shutdown vlan trunk native
LLDP commands
clear lldp neighbors clear lldp statistics lldp lldp dot3 lldp dot3 eee lldp dot3 mfs lldp holdtime-multiplier lldp management-address vlan lldp management-ip-address lldp management-ipv6-address lldp med lldp med location lldp receive lldp reinit lldp select-tlv lldp timer lldp transmit lldp txdelay lldp trap enable show lldp configuration show lldp configuration mgmt show lldp local-device show lldp neighbor-info show lldp neighbor-info detail show lldp neighbor-info mgmt show lldp statistics show lldp statistics mgmt show lldp tlv
Local AAA commands
aaa accounting all-mgmt aaa authentication console-login-attempts aaa authentication limit-login-attempts aaa authentication login aaa authentication minimum-password-length aaa authorization commands (local) show aaa accounting
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1198 1198 1202 1203 1204 1205
1207
1207 1207 1208 1209 1210 1210 1211 1212 1213 1214 1215 1216 1219 1220 1220 1222 1223 1224 1225 1227 1229 1230 1232 1236 1238 1240 1242 1242
1244
1244 1246 1247 1248 1249 1250 1252
21

show aaa authentication show aaa authorization show authentication locked-out-users show ssh authentication-method show user ssh password-authentication ssh public-key-authentication user authorized-key
Log rotation commands
logging threshold logrotate maxsize logrotate period logrotate target show logrotate
Loop protect commands
loop-protect loop-protect action loop-protect re-enable-timer loop-protect transmit-interval loop-protect trap loop-detected loop-protect vlan show loop-protect
Loopback commands
interface loopback ip address ipv6 address vrf attach show interface loopback
MAC address table commands
clear mac-address clear mac address mac move clear mac-address-table mac-address-table age-time mac-lockout show mac-address-table show mac-address-table address show mac-address-table count show mac-address-table dynamic show mac-address-table interface show mac-address-table lockout show mac address table mac move show mac-address-table mac-move show mac-address-table port show mac-address-table static show mac-address-table vlan show mac address table mac move static-mac
MACsec commands
apply macsec policy bypass cipher-suite

1253 1254 1255 1256 1257 1258 1259 1260
1262
1262 1264 1265 1266 1267
1269
1269 1270 1271 1272 1272 1273 1274
1278
1278 1278 1279 1280 1281
1283
1283 1285 1286 1287 1287 1288 1290 1291 1292 1293 1294 1295 1296 1298 1299 1299 1300 1302
1304
1304 1305 1306
Contents | 22

clear macsec statistics clear tag mode confidentiality include-sci-tag macsec policy macsec selftest replay-protection secure-mode show macsec policy show macsec selftest show macsec statistics show macsec status
Management interface commands
default-gateway ip static nameserver show interface mgmt
mDNS gateway commands
debug mdns description id mdns-sd mdns-sd apply-profile tx mdns-sd enable mdns-sd profile mdns-sd service clear mdns-sd statistics sequence-number show mdns-sd service-entries show mdns-sd statistics show mdns-sd statistics profile show mdns-sd summary show running-config interface show running-config mdns-sd profile show running-config mdns-sd service
Mirroring commands
clear mirror clear mirror endpoint comment copy tcpdump-pcap copy tshark-pcap destination cpu destination interface destination tunnel diagnostic diag utilities tcpdump disable enable mirror endpoint mirror session show mirror show mirror endpoint shutdown
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1308 1308 1310 1311 1312 1313 1314 1315 1316 1317 1318 1321
1324
1324 1325 1326 1327
1329
1329 1330 1330 1331 1332 1333 1334 1335 1335 1336 1337 1339 1340 1340 1341 1342 1343
1345
1345 1345 1346 1347 1348 1349 1350 1351 1353 1354 1356 1357 1358 1359 1360 1362 1363
23

source source interface source vlan
MKA commands (MACsec)
apply mka policy clear mka statistics data-delay-protection eapol-destination-mac eapol-dot1q-tagged eapol-eth-type key-server-priority pre-shared-key mka policy show mka policy show mka statistics show mka status transmit-interval
MLD snooping global configuration commands
ipv6 mld snooping mgmd delayed-refresh timer mgmd querier-offload
MLD snooping VLAN configuration commands
ipv6 mld snooping ipv6 mld snooping fastlearn ipv6 mld snooping fastleave vlan ipv6 mld snooping filter-unknown-mcast ipv6 mld snooping forced fastleave vlan ipv6 mld snooping apply access-list ipv6 mld snooping auto vlan ipv6 mld snooping blocked vlan ipv6 mld snooping forward vlan ipv6 mld snooping preprogram-starg-flow ipv6 mld snooping static-group ipv6 mld snooping version
MLD snooping show commands
show ipv6 mld snooping show mgmd debug-counters
MLD configuration commands for interface VLAN
ipv6 mld ipv6 mld apply access-list no ipv6 mld ipv6 mld querier ipv6 mld querier interval ipv6 mld querier-wait-time ipv6 mld last-member-query-interval ipv6 mld querier query-max-response-time ipv6 mld robustness ipv6 mld static-group ipv6 mld version ipv6 mld version strict

1364 1365 1367
1370
1370 1371 1372 1373 1374 1375 1376 1377 1379 1380 1381 1382 1384
1385
1385 1385 1386
1388
1388 1389 1389 1390 1391 1392 1394 1395 1395 1396 1398 1399
1400
1400 1403
1404
1404 1404 1406 1406 1407 1408 1408 1409 1410 1411 1411 1412
Contents | 24

MLD show commands for interface VLAN
show ipv6 mld
MLD configuration commands for interface
ipv6 mld ipv6 mld apply access-list no ipv6 mld ipv6 mld querier ipv6 mld querier interval ipv6 mld last-member-query-interval ipv6 mld querier query-max-response-time ipv6 mld robustness ipv6 mld static-group ipv6 mld version ipv6 mld version strict
MPLS commands
bind ipv4 (lsp label imposition) bind ipv4 input (static lsp binding) clear mpls statistics crossconnect input (static lsp binding label swap) enable (mpls globally) enable mpls (interface) enable (mpls ldp) enable (mpls static lsp) graceful-restart (mpls ldp) graceful-restart-timers (mpls ldp) label-protocol ldp label-range (static lsp) mpls mpls ldp discovery hello hold time (global) mpls ldp discovery hello hold time (interface) mpls ldp enable graceful-restart-timers (mpls ldp) mpls ldp session holdtime (interface) ping mpls router-id (mpls ldp) session hold time (mpls ldp globally) show bgp vpnv4 unicast show capacities mpls show mpls forwarding show mpls label-range static-lsp show mpls ldp bindings show mpls ldp discovery show mpls ldp graceful-restart show mpls ldp neighbor static-lsp traceroute mpls
MSDP router config commands
disable enable router msdp sa-interval sa-limit
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1414
1414
1419
1419 1419 1421 1421 1422 1423 1423 1424 1425 1426 1427
1428
1428 1430 1431 1432 1434 1435 1436 1437 1437 1438 1441 1441 1443 1444 1445 1446 1447 1449 1450 1452 1454 1455 1460 1461 1463 1464 1465 1466 1467 1468 1469
1471
1471 1471 1472 1473 1474
25

MSDP peer configuration commands
connection-retry-interval connect-source clear ip msdp peer statistics description disable enable (ip msdp peer) ip msdp peer keepalive mesh-group password (router msdp) sa-filter access-list
MSDP show commands
show ip msdp count show ip msdp peer show ip msdp sa-cache show ip msdp summary
MSTP commands
clear spanning-tree statistics show spanning-tree show spanning-tree detail show spanning-tree inconsistent-ports show spanning-tree mst show spanning-tree mst-config show spanning-tree mst detail show spanning-tree mst <INSTANCE-ID> show spanning-tree mst <INSTANCE-ID> detail show spanning-tree mst interface show spanning-tree summary port show spanning-tree summary root spanning-tree spanning-tree bpdu-filter spanning-tree bpdu-guard spanning-tree bpdu-guard timeout spanning-tree config-name spanning-tree config-revision spanning-tree cost spanning-tree forward-delay spanning-tree hello-time spanning-tree instance cost spanning-tree instance port-priority spanning-tree instance priority spanning-tree instance vlan spanning-tree link-type spanning-tree loop-guard spanning-tree max-age spanning-tree max-hops spanning-tree mode spanning-tree port-priority spanning-tree port-type spanning-tree priority spanning-tree root-guard spanning-tree rpvst-filter spanning-tree rpvst-guard

1476
1476 1476 1477 1478 1479 1480 1480 1481 1482 1483 1484
1486
1486 1487 1488 1489
1491
1491 1491 1493 1495 1496 1498 1499 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531
Contents | 26

spanning-tree tcn-guard spanning-tree transmit-hold-count spanning-tree trap
Multicast VXLAN commands
clear ip mroute ip pim-sparse datapath-auto-include ip pim-sparse vsx-virtual-neighbor ipv6 pim6-sparse datapath-auto-include ipv6 pim6-sparse vsx-virtual-neighbor register-source show ip mroute show ip pim neighbor show ipv6 mroute show ipv6 pim6 interface vlan show ipv6 pim6 neighbor
Multicast VXLAN Multi-fabric commands
show ip mroute detail ip multicast multi-fabric border ip multicast multi-fabric identifier
Multicast datapath commands for IPv4
show ip multicast bridging datapath show ip multicast routing datapath
Multicast datapath commands for IPv6
show ipv6 multicast bridging datapath show ipv6 multicast routing datapath
Static Route commands
ip multicast-static-route ip multicast-static-route (l3vni) ipv6 multicast-static-route ipv6 multicast-static-route (l3vni) redistribute static show capacities multicast static route show ip multicast-static-route show ip multicast-static-route detail show ip multicast-static-route (group) show ipv6 multicast-static-route show ipv6 multicast-static-route (group) show ipv6 multicast-static-route detail show running-config
MVRP commands
clear mvrp statistics mvrp mvrp registration mvrp timer show mvrp config show mvrp state show mvrp statistics
ND snooping commands
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1532 1533 1534
1537
1537 1538 1539 1540 1541 1542 1543 1546 1548 1550 1551
1554
1554 1556 1557
1559
1559 1560
1563
1563 1564
1567
1567 1569 1570 1572 1573 1574 1575 1576 1577 1580 1582 1583 1584
1586
1586 1586 1587 1588 1589 1590 1591
1594
27

clear nd-snooping binding clear nd-snooping ra-guard-policy statistics clear nd-snooping statistics diag-dump nd-snooping basic nd-snooping nd-snooping (in config-vlan context) nd-snooping mac-check nd-snooping prefix-list nd-snooping max-bindings nd-snooping nd-guard nd-snooping ra-guard nd-snooping ra-drop nd-snooping trust show nd-snooping show nd-snooping binding show nd-snooping prefix-list show nd-snooping statistics
Network Analytics Engine commands
nae cli-authorization show nae-agent show nae-agent alerts show nae-agent alerts details show nae-script uerieshow running-config (nae-lite)
Network Analytics Engine Lite commands
actions desc disable monitor resource nae-agent lite nae-agent lite activate 2set-condition monitor 5set-condition watch show running-config nae-agent tags watch event-log
Network configuration validation commands
switch config-validator
NLB commands
arp ip mac show arp show ip igmp snooping vlan group
NTP commands
ntp authentication ntp authentication-key ntp disable ntp enable ntp conductor ntp server ntp trusted-key ntp vrf

1594 1595 1596 1596 1599 1600 1601 1602 1602 1603 1604 1605 1606 1607 1609 1610 1610
1612
1612 1612 1615 1616 1617 1619
1621
1621 1624 1625 1626 1628 1629 1630 1632 1634 1635 1636
1638
1638
1640
1640 1641 1642
1643
1643 1643 1645 1645 1646 1647 1649 1650
Contents | 28

show ntp associations show ntp authentication-keys show ntp servers show ntp statistics show ntp status
OSPFv2 commands
active-backbone area (ospf) area default-metric area nssa area range area stub area virtual-link authentication authentication-key clear ip ospf neighbors clear ip ospf statistics dead-interval default-information originate default-information originate always default-metric disable distance distribute-list prefix enable graceful-restart hello-interval ip ospf area ip ospf authentication ip ospf authentication-key ip ospf cost ip ospf dead-interval ip ospf hello-interval ip ospf keychain ip ospf message-digest-key md5 ip ospf network ip ospf passive ip ospf priority ip ospf retransmit-interval ip ospf sha-key sha ip ospf shutdown ip ospf transit-delay keychain max-metric router-lsa maximum-paths message-digest-key md5 passive-interface default redistribute reference-bandwidth retransmit-interval rfc1583-compatibility router ospf router-id sha-key sha show ip ospf
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1651 1652 1653 1654 1655
1657
1657 1657 1658 1659 1660 1662 1663 1664 1665 1666 1668 1669 1669 1671 1672 1673 1673 1675 1676 1676 1678 1679 1680 1681 1683 1684 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1701 1702 1703 1703 1704 1705 1707
29

show ip ospf border-routers show ip ospf interface show ip ospf lsdb show ip ospf neighbors show ip ospf routes show ip ospf statistics show ip ospf statistics interface show ip ospf virtual-links summary-address timers lsa-arrival timers throttle lsa timers throttle spf transit-delay trap-enable
OSPFv3 commands
active-backbone area area authentication ipsec area encryption ipsec area nssa area range area stub area virtual-link area default-metric authentication ipsec clear ipv6 ospfv3 neighbors clear ipv6 ospfv3 statistics dead-interval default-information originate default-metric disable distance distribute-list prefix enable encryption ipsec default-information originate default-information originate always graceful-restart hello-interval ipv6 ospfv3 area ipv6 ospfv3 authentication null ipv6 ospfv3 authentication ipsec ipv6 ospfv3 cost ipv6 ospfv3 dead-interval ipv6 ospfv3 encryption ipsec ipv6 ospfv3 encryption null ipv6 ospfv3 hello-interval ipv6 ospfv3 network ipv6 ospfv3 passive ipv6 ospfv3 priority ipv6 ospfv3 retransmit-interval ipv6 ospfv3 shutdown ipv6 ospfv3 transit-delay maximum-paths max-metric router-lsa

1708 1709 1712 1717 1719 1720 1721 1723 1724 1725 1726 1727 1728 1729
1731
1731 1731 1732 1734 1736 1737 1738 1739 1740 1741 1743 1744 1745 1746 1747 1747 1748 1750 1751 1751 1753 1754 1756 1757 1758 1759 1760 1761 1762 1763 1765 1765 1766 1767 1768 1769 1770 1771 1771 1772
Contents | 30

passive-interface default redistribute reference-bandwidth retransmit-interval router-id router ospfv3 show ipv6 ospfv3 show ipv6 ospfv3 border-routers show ipv6 ospfv3 interface show ipv6 ospfv3 lsdb show ipv6 ospfv3 neighbors show ipv6 ospfv3 routes show ipv6 ospfv3 statistics show ipv6 ospfv3 statistics interface show ipv6 ospfv3 virtual-links summary-address timers lsa-arrival timers throttle lsa timers throttle spf transit-delay trap-enable
PBR commands
apply policy pbr-action-list pbr-action-list copy pbr-action-list resequence pbr-action-list reset policy show pbr show pbr-action-list show running-config current-context
PIM-DM commands for IPv4
disable enable ip pim-dense ip pim-dense bfd ip pim-dense graft-retry-interval ip pim-dense hello-delay ip pim-dense hello-interval ip pim-dense ip-addr ip pim-dense lan-prune-delay ip pim-dense max-graft-retries ip pim-dense override-interval ip pim-dense propagation-delay ip pim-dense ttl-threshold router pim show ip mroute show ip mroute group-addr show ip mroute brief show ip pim show ip pim interface show ip pim interface interface-name show ip pim interface interface-name counters show ip pim rpf
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1773 1774 1776 1777 1778 1779 1780 1781 1782 1785 1789 1791 1793 1794 1796 1797 1798 1799 1800 1802 1803
1804
1804 1805 1808 1809 1810 1811 1814 1815 1817
1819
1819 1819 1820 1821 1822 1823 1825 1826 1827 1828 1829 1830 1831 1833 1840 1841 1843 1844 1845 1846 1847 1848
31

show ip pim neighbor state-refresh-interval
PIM-DM commands for IPv6
disable enable ipv6 pim6-dense ipv6 pim6-dense bfd ipv6 pim6-dense graft-retry-interval ipv6 pim6-dense hello-delay ipv6 pim6-dense hello-interval ipv6 pim6-dense ipv6-addr ipv6 pim6-dense lan-prune-delay ipv6 pim6-dense max-graft-retries ipv6 pim6-dense override-interval ipv6 pim6-dense propagation-delay ipv6 pim6-dense ttl-threshold no ipv6 pim6-dense register-source router pim6 show ipv6 pim6 show ipv6 pim6 interface show ipv6 pim6 interface <INTERFACE-NAME> show ipv6 pim6 rpf show ipv6 mroute show ipv6 mroute brief show ipv6 mroute <GROUP-ADDR> show ipv6 pim6 neighbor state-refresh-interval
PIM-SM commands for IPv4
accept-register access-list accept-rp active-active anycast-rp source-directly-connected bfd all-interfaces bsr-candidate bsm-interval bsr-candidate hash-mask-length bsr-candidate priority bsr-candidate source-ip-interface disable enable ip mroute ip multicast boundary ip multicast multipath ip pim-sparse ip pim-sparse bfd ip pim-sparse bsr-boundary ip pim-sparse dr-priority ip pim-sparse hello-delay ip pim-sparse hello-interval ip pim-sparse ip-addr ip pim-sparse lan-prune-delay ip pim-sparse override-interval ip pim-sparse propagation-delay join-prune-interval

1850 1852
1854
1854 1854 1855 1856 1857 1858 1860 1861 1862 1863 1864 1865 1866 1868 1869 1870 1871 1872 1873 1874 1876 1878 1879 1881 1882
1884
1884 1885 1886 1887 1888 1889 1890 1890 1891 1892 1893 1894 1895 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1908 1909
Contents | 32

multicast-route-limit no ip pim-sparse register-rate-limit register-source router pim rp-address rp-address access list rp-candidate group-prefix rp-candidate hold-time rp-candidate priority rp-candidate source-ip-interface rpf-override show ip mroute show ip mroute brief show ip mroute group-addr show ip multicast anomalies show ip multicast boundary interface show ip pim show ip pim rpf show ip pim bsr show ip pim bsr elected show ip pim bsr local show ip pim interface show ip pim interface interface-name show ip pim interface interface-name counters show ip pim rp show ip pim rp-registered-source show ipv pim rp registered sources show ip pim neighbor show ip pim pending show ip pim rp-candidate show ip pim rp-set show ip pim rp-set learned show ip pim rp-set static show ip pim rpf-override show ip pim rp-registered-source show ipv pim rp registered sources show ip pim rpf-override source show ip pim tree-state sources-per-group spt-threshold
PIM-SM commands for IPv6
accept-register access-list accept-rp bsr-candidate bsm-interval bsr-candidate hash-mask-length bsr-candidate priority bsr-candidate source-ip-interface disable enable ipv6 mroute ipv6 pim6-sparse ipv6 pim6-sparse bfd ipv6 pim6-sparse dr-priority ipv6 pim6-sparse hello-delay
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1910 1911 1911 1912 1913 1920 1921 1923 1924 1924 1925 1926 1927 1929 1930 1932 1933 1934 1935 1937 1938 1939 1941 1943 1945 1947 1948 1949 1950 1952 1953 1954 1956 1957 1958 1959 1959 1961 1962 1964 1965
1967
1967 1968 1969 1970 1971 1971 1973 1973 1974 1975 1976 1977 1978
33

ipv6 pim6-sparse hello-interval ipv6 pim6-sparse ipv6-addr ipv6 pim6-sparse lan-prune-delay ipv6 pim6-sparse override-interval ipv6 pim6-sparse propagation-delay join-prune-interval no ipv6 pim6-sparse rp-address access list rp-address rp-candidate group-prefix rp-candidate hold-time rp-candidate priority rp-candidate source-ip-interface rpf-override show ipv6 mroute <GROUP-ADDR> show ipv6 mroute show ipv6 mroute brief show ipv6 pim6 show ipv6 pim6 bsr show ipv6 pim6 bsr elected show ipv6 pim6 bsr local show ipv6 pim6 interface <INTERFACE-NAME> show ipv6 pim6 interface show ipv6 pim6 neighbor show ipv6 pim6 pending show ipv6 pim6 rp show ipv6 pim6 rpf show ipv6 pim6 rp-candidate show ipv6 pim6 rpf-override show ipv6 pim6 rp-registered-source
show ipv6 pim6 rp registered sources show ipv6 pim6 rpf-override source show ipv6 pim6 rp-set show ipv6 pim6 rp-set learned show ipv6 pim6 rp-set static show ipv6 pim6 tree-state sources-per-group spt-threshold
PIM-SSM commands
ip igmp apply ssm-map access-list show ip igmp ssm-map
PIM-SSM commands for IPv4
pim-ssm pim-ssm range-access-list show ip mroute show ip multicast summary show ip pim interface interface-name counters
PIM-SSM commands for IPv6
ipv6 mld apply ssm-map access-list pim-ssm pim-ssm range-access-list show ip multicast summary

1979 1980 1981 1982 1984 1985 1985 1986 1987 1988 1989 1990 1991 1992 1994 1995 1997 1998 1999 2001 2002 2003 2004 2005 2007 2008 2009 2010 2012 2013 2013 2013 2014 2015 2017 2018 2019 2022 2023
2024
2024 2025
2027
2027 2028 2029 2030 2032
2036
2036 2037 2039 2039
Contents | 34

show ipv6 pim interface counters show ipv6 mld ssm-map show ipv6 mroute
Ping commands
ping ping6
PKI commands
crypto pki application crypto pki certificate crypto pki ta-profile enroll self-signed enroll terminal import (CA-signed leaf certificate) import (self-signed leaf certificate) key-type ocsp disable-nonce ocsp enforcement-level ocsp url ocsp vrf revocation-check ocsp show crypto pki application show crypto pki certificate show crypto pki ta-profile ta-certificate subject
PKI EST commands
arbitrary-label arbitrary-label-enrollment arbitrary-label-reenrollment crypto pki est-profile enroll est-profile reenrollment-lead-time retry-count retry-interval show crypto pki est-profile url username vrf
PoE commands
lldp dot3 poe lldp med poe power-over-ethernet power-over-ethernet allocate-by power-over-ethernet always-on power-over-ethernet assigned-class power-over-ethernet power-pairs power-over-ethernet pre-std-detect power-over-ethernet priority power-over-ethernet quick-poe power-over-ethernet threshold power-over-ethernet trap show lldp local
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2041 2043 2044
2047
2047 2053
2057
2057 2058 2059 2060 2061 2062 2064 2066 2067 2068 2069 2070 2071 2072 2073 2075 2077 2078
2080
2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2092
2094
2094 2095 2095 2096 2098 2099 2100 2101 2102 2102 2103 2104 2105
35

show lldp neighbor show power-over-ethernet
Port access 802.1X authentication commands
aaa authentication port-access dot1x authenticator aaa authentication port-access dot1x authenticator auth-method aaa authentication port-access dot1x authenticator cached-reauth aaa authentication port-access dot1x authenticator cached-reauth-period aaa authentication port-access dot1x authenticator discovery-period aaa authentication port-access dot1x authenticator eap-tls-fragment aaa authentication port-access dot1x authenticator eapol-timeout aaa authentication port-access dot1x authenticator initial-auth-response-timeout aaa authentication port-access dot1x authenticator macsec aaa authentication port-access dot1x authenticator max-eapol-requests aaa authentication port-access dot1x authenticator max-retries aaa authentication port-access dot1x authenticator mka cak-length aaa authentication port-access dot1x authenticator quiet-period aaa authentication port-access dot1x authenticator radius server-group aaa authentication port-access dot1x authenticator reauth aaa authentication port-access dot1x authenticator reauth-period clear dot1x authenticator statistics interface show aaa authentication port-access dot1x authenticator interface client-status show aaa authentication port-access dot1x authenticator interface port-statistics
Port access 802.1X supplicant commands
aaa authentication port-access dot1x supplicant(global) aaa authentication port-access dot1x supplicant(port) associate policy canned-eap-success clear dot1x supplicant statistics discovery-timeout eap-identity eapol-force-multicast eapol-method eapol-protocol-version eapol-source-mac eapol-timeout enable enable fail-mode held-period macsec macsec-policy max-retries mka cak-length policy (supplicant) port-access dot1x supplicant restart show aaa authentication port-access dot1x supplicant policy show aaa authentication port-access dot1x supplicant statistics show aaa authentication port-access dot1x supplicant status start-mode
Port access cached-critical role commands
aaa authentication port-access cached-critical-role (global) aaa authentication port-access cached-critical-role (per interface) port-access clear cached-client

2106 2107
2115
2115 2116 2117 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127 2128 2129 2130 2131 2132
2135
2135 2135 2136 2138 2138 2140 2141 2143 2144 2145 2147 2148 2149 2150 2150 2152 2153 2154 2155 2156 2157 2158 2159 2161 2164 2166
2168
2168 2170 2171

Contents | 36

show port-access cached-clients show port-access cached-critical-role info
Port access general commands
aaa authentication port-access allow-lldp-auth aaa authentication port-access allow-cdp-auth aaa authentication port-access auth-mode aaa authentication port-access auth-precedence aaa authentication port-access auth-priority aaa authentication port-access auth-role aaa authentication port-access client-auto-log-off final-authentication-failure aaa authentication port-access client-limit aaa authentication port-access client-limit multi-domain aaa authentication port-access radius-override port-access allow-flood-traffic port-access auto-vlan port-access client-move port-access event-log client port-access fallback-role port-access log-off client port-access onboarding-method precedence port-access onboarding-method concurrent port-access reauthenticate interface port-access ubt-fallback-role show aaa authentication port-access interface client-status show port-access clients show port-access clients detail show port-access clients onboarding-method show port-access interface
Port access MAC authentication commands
aaa authentication port-access allow-lldp-auth [mac {source-mac|chassis-mac}] aaa authentication port-access mac-auth aaa authentication port-access mac-auth addr-format aaa authentication port-access mac-auth auth-method aaa authentication port-access mac-auth cached-reauth aaa authentication port-access mac-auth cached-reauth-period aaa authentication port-access mac-auth password aaa authentication port-access mac-auth quiet-period aaa authentication port-access mac-auth radius server-group aaa authentication port-access mac-auth reauth aaa authentication port-access mac-auth reauth-period clear mac-auth statistics show aaa authentication port-access mac-auth interface client-status show aaa authentication port-access mac-auth interface port-statistics
Port access policy commands
port-access policy port-access policy copy port-access policy resequence port-access policy reset port-access reflexive clear port-access policy hitcounts show port-access policy show port-access policy hitcounts

2172 2173
2175
2175 2177 2177 2179 2180 2181 2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193 2195 2195 2197 2199 2202 2205 2206
2208
2208 2209 2210 2211 2212 2213 2213 2214 2215 2217 2217 2218 2219 2221
2223
2223 2227 2228 2229 2231 2232 2235 2237

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

37

Port access role commands
app-recognition enable associate captive-portal-profile associate macsec-policy associate policy auth-mode cached-reauth-period client-inactivity timeout description device-traffic-class gateway-zone zone gateway-role mtu poe-allocate-by poe-priority port-access role reauth-period session timeout show aaa authentication port-access interface client-status show port-access role stp-admin-edge-port trust-mode vlan
Port access security violation commands
port-access security violation action port-access security violation action shutdown auto-recovery port-access security violation action shutdown recovery-timer show interface show port-access aaa violation interface show port-access port-security violation client-limit-exceeded interface
Port access VLAN group commands
associate-vlan port-access vlan-group show running-config port-access vlan-group
Port filtering commands
portfilter show portfilter
Port security commands
port-access port-security port-access port-security client-limit port-access port-security mac-address show port-access port-security interface client-status show port-access port-security interface port-statistics show port-access security violation sticky-mac-client-move interface sticky-learn enable sticky-learn mac
PTP commands
clear ptp statistics clock-domain clock-step enable

2239
2239 2240 2241 2241 2242 2244 2245 2246 2246 2247 2248 2249 2250 2251 2251 2252 2253 2254 2256 2257 2258
2261
2261 2262 2263 2264 2265 2266
2268
2268 2269 2270
2271
2271 2272
2275
2275 2276 2277 2277 2279 2280 2281 2282
2284
2284 2284 2286 2287
Contents | 38

mode priority1 priority2 ptp announce-interval ptp announce-timeout ptp clock-source-only ptp delay-req-interval ptp enable ptp lag-role ptp neighbor-propagation-delay-threshold ptp pdelay-req-interval ptp peer ip ptp profile ptp sync-interval ptp sync-timeout ptp vlan show ptp clock show ptp foreign-clock-sources show ptp interface show ptp parent show ptp statistics show ptp time-property show running-config ptp transport-protocol
Private VLAN commands
diag-dump private-vlan basic private-vlan private-vlan port-type show capacities private-vlan show capacities-status private-vlan show private-vlan show private-vlan association show private-vlan inconsistency show private-vlan port-type show running-configuration private-vlan show tech private-vlan system private-vlan share-hw-resource
QoS commands
apply qos dwrr queue map queue min-bandwidth name queue qos cos qos cos-map qos dscp qos dscp-map qos queue-profile qos schedule-profile qos shape qos trust queue action rate-limit show interface queues
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2288 2289 2290 2291 2293 2294 2295 2296 2297 2298 2299 2301 2302 2303 2305 2306 2307 2308 2309 2313 2314 2315 2316 2317
2319
2319 2319 2321 2322 2323 2323 2325 2326 2328 2328 2329 2331
2333
2333 2335 2336 2337 2339 2340 2341 2342 2344 2345 2346 2348 2349 2351 2353 2355
39

show interface qos show qos cos-map show qos dscp-map show qos queue-profile show qos schedule-profile show qos trust strict queue
QinQ commands
debug vlan qinq diag-dump l2vlan basic show qinq show running-config qinq show tech qinq svlan
Configurable RADIUS attribute commands
aaa radius-attribute group nas-id request-type nas-id value nas-ip-addr request-type authentication nas-ip-addr service-type user-management tunnel-private-group-id request-type tunnel-private-group-id value vsa vendor
RADIUS dynamic authorization commands
radius dyn-authorization enable radius dyn-authorization client radius dyn-authorization client tls (RadSec) radius dyn-authorization port show radius dyn-authorization show radius dyn-authorization client show radius dyn-authorization client tls (RadSec)
RA guard policy commands
hop limit ipv6 nd-snooping ra-guard policy managed-config-flag match access-list match prefix-list nd-snooping ra-guard attach-policy other-config-flag router-preference show nd-snooping ra-guard interface show nd-snooping ra-guard policy show nd-snooping ra-guard vlan
Remote AAA (TACACS+, RADIUS) commands
aaa accounting allow-fail-through aaa accounting all-mgmt aaa accounting port-access (RADIUS only) aaa authentication allow-fail-through aaa authentication login aaa authorization allow-fail-through aaa authorization commands

2357 2359 2360 2362 2363 2365 2365
2368
2368 2368 2369 2370 2371 2372
2374
2374 2375 2376 2377 2378 2379 2380 2381
2383
2383 2383 2385 2387 2388 2390 2391
2394
2394 2395 2396 2397 2398 2399 2401 2402 2403 2404 2405
2407
2407 2407 2410 2412 2413 2415 2417
Contents | 40

aaa group server radius-server auth-type radius-server host radius-server host (ClearPass) radius-server host secure ipsec radius-server host tls (RadSec) radius-server host tls port-access radius-server host tls tracking-method radius-server key radius-server retries radius-server status-server interval radius-server timeout radius-server tls timeout (RadSec) radius-server tracking server show aaa accounting show aaa accounting port-access (RADIUS only) show aaa authentication show aaa authorization show aaa server-groups show accounting log show accounting log port-access show radius-server show radius-server secure ipsec show radius-server statistics show radius-server statistics host show tacacs-server show tacacs-server statistics show tech aaa tacacs-server auth-type tacacs-server host tacacs-server key tacacs-server timeout tacacs-server tracking
Remote syslog commands
clear accounting-logs logging logging accounting-format-native logging filter logging facility logging persistent-storage
RIPv2 (IPv4) commands
Configuration commands router rip
Interface commands ip rip ip rip all-ip enable ip rip all-ip disable ip rip all-ip send disable ip rip all-ip receive disable
Routing commands enable disable distance
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2420 2421 2422 2426 2427 2432 2435 2436 2438 2439 2440 2440 2441 2442 2444 2446 2448 2450 2452 2454 2456 2459 2460 2466 2467 2469 2471 2473 2474 2480 2481 2483 2485 2486
2488
2488 2489 2491 2492 2496 2496
2499
2499 2499 2500 2500 2501 2502 2503 2503 2504 2504 2505 2506
41

maximum-paths redistribute timers update RIPv2 clear commands clear ip rip statistics RIPv2 interface commands enable disable send disable receive disable RIPv2 show commands show capacities rip show capacities-status rip show ip rip show ip rip interface show ip rip neighbors show ip rip routes show ip rip statistics show ip rip statistics interface show running-config
RIPng (IPv6) commands
Configuration commands router ripng
Interface commands ipv6 ripng
Routing commands enable disable distance maximum-paths redistribute timers update
RIPng clear commands clear ipv6 ripng statistics
RIPng interface commands enable disable send disable receive disable
RIPng show commands show capacities ripng show capacities-status ripng show ipv6 ripng show ipv6 ripng interface show ipv6 ripng neighbors show ipv6 ripng routes show ipv6 ripng statistics show ipv6 ripng statistics interface show running-config
Route policy and route map commands
General or filtering commands ip aspath-list ip community-list ip prefix-list

2507 2507 2508 2509 2509 2510 2510 2511 2512 2513 2514 2514 2514 2515 2516 2518 2519 2520 2521 2522
2524
2524 2524 2525 2525 2526 2526 2526 2527 2528 2529 2530 2531 2531 2532 2532 2532 2533 2534 2535 2535 2535 2536 2537 2539 2540 2541 2542 2543
2546
2546 2546 2547 2548
Contents | 42

ipv6 prefix-list route-map continue
Description Examples Command History Command Information Match commands match aspath-list match community-list match interface match ip address prefix-list match ip next-hop match ip route-source match local-preference match metric match origin match route-type match source-protocol match tag match vni Set commands set as-path exclude set as-path prepend set community set dampening set ip nexthop set ipv6 nexthop global set local-preference set metric set origin set tag set weight Show commands show ip aspath-list show ip community-list show ip prefix-list show route-map
RPVST+ commands
clear spanning-tree statistics show capacities rpvst show capacities-status rpvst show spanning-tree show spanning-tree detail show spanning-tree inconsistent-ports show spanning-tree summary port show spanning-tree summary root show spanning-tree vlan show spanning-tree vlan detail spanning-tree bpdu-guard timeout spanning-tree extend-system-id spanning-tree ignore-pvid-inconsistency spanning-tree link-type spanning-tree mode spanning-tree pathcost-type
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2549 2550 2551 2551 2552 2552 2552 2553 2553 2553 2554 2555 2556 2557 2557 2558 2559 2560 2561 2561 2562 2563 2563 2564 2565 2566 2567 2568 2568 2569 2570 2571 2571 2572 2572 2573 2574 2575
2577
2577 2577 2578 2579 2581 2582 2584 2585 2586 2587 2589 2590 2591 2592 2593 2594
43

spanning-tree rpvst-mstp interconnect vlan spanning-tree tcn-guard spanning-tree vlan spanning-tree vlan cost spanning-tree vlan port-priority spanning-tree trap
Runtime diagnostic commands
diagnostic monitor diag on-demand show diagnostic show diagnostic events
Security log commands
clear security-logs copy security-log show security-logs
Selftest commands
fastboot show selftest
sFlow agent commands
clear sflow statistics sflow sflow agent-ip sflow collector sflow disable sflow header-size sflow max-datagram-size sflow mode sflow polling sflow sampling show sflow
Smartlink commands
Configuration commands smartlink group smartlink recv-control-vlan
Group context commands description diag-dump smartlink basic primary-port smartlink group secondary-port control-vlan protected-vlans preemption preemption-delay
Display commands show smartlink group show smartlink group all show smartlink group detail show smartlink flush-statistics clear smartlink group statistics clear smartlink flush-statistics show running-config

2595 2596 2597 2598 2599 2600
2603
2603 2604 2606 2611
2613
2613 2614 2615
2619
2619 2620
2625
2625 2625 2627 2628 2629 2629 2630 2631 2632 2633 2634
2637
2637 2637 2638 2638 2638 2639 2640 2641 2642 2643 2644 2644 2645 2645 2646 2647 2648 2649 2649 2650
Contents | 44

Supportability commands show capacities smartlink
SNMP commands
event-trap-enable lldp trap enable mac-notify traps rmon alarm rmon alarm {enable | disable} {index | all} show configuration-changes trap show mac-notify show mac-notify port show rmon alarm show snmp agent-port show snmp community show snmp system show snmp trap show snmp views show snmp vrf show snmpv3 context show snmpv3 engine-id show snmpv3 security-level show snmpv3 users snmp-server agent-port snmp-server community snmp-server community view snmp-server historical-counters-monitor snmp-server response-source snmp-server snmpv3-only snmp-server host snmp-server system-contact snmp-server system-description snmp-server system-location snmp-server trap snmp-server trap aaa-server-reachability-status snmp-server trap configuration-changes snmp-server trap mac-notify snmp-server trap module snmp-server trap port-security snmp-server trap snmp snmp-server trap-source interface vrf snmp-server trap vsx snmp-server view snmp-server vrf snmpv3 context snmpv3 engine-id snmpv3 security-level snmpv3 user snmpv3 user view
Source-interface selection commands
ip source-interface ipv6 source-interface ipv6 source-interface dns show ip source-interface show ipv6 source-interface
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2651 2651
2653
2653 2653 2656 2658 2660 2660 2661 2662 2663 2664 2665 2666 2667 2668 2669 2670 2670 2671 2672 2673 2673 2676 2677 2678 2679 2680 2683 2684 2685 2686 2687 2688 2689 2689 2690 2691 2692 2693 2694 2696 2697 2698 2698 2700 2703
2705
2705 2707 2709 2712 2714
45

show running-config SSH client commands
ssh (client login)
SSH client commands
ssh (client login)
SSH server commands
show ssh host-key show ssh server show ssh server sessions ssh ciphers ssh host-key ssh host-key-algorithms ssh key-exchange-algorithms ssh known-host remove ssh macs ssh maximum-auth-attempts ssh public-key-algorithms ssh server allow-list ssh server port ssh server vrf
Static routing commands
ip route ip route bfd ip route distance ip route tag ip route vrf ipv6 route ipv6 route distance ipv6 route tag show ip rib show ipv6 rib ipv6 route vrf show ip route show ipv6 route
Subinterface commands
encapsulation dot1q interface show capacities subinterface show interface
Supportability copy commands
copy checkpoint copy command-output copy core-dump [<MEMBER/SLOT>] daemon copy core-dump [<MEMBER/SLOT>] kernel copy core-dump [<MEMBER/SLOT>] kernel <STORAGE-URL> copy core-dump vsf member daemon copy core-dump vsf member kernel copy diag-dump feature <FEATURE> copy diag-dump local-file copy diag-dump vsf member local-file copy <IMAGE>

2716 2718 2718
2720
2720
2722
2722 2723 2726 2728 2729 2730 2731 2732 2733 2734 2735 2736 2738 2739
2741
2741 2742 2743 2744 2745 2746 2748 2749 2750 2753 2756 2757 2759
2761
2761 2762 2763 2764
2766
2766 2767 2768 2769 2771 2771 2773 2774 2775 2776 2778
Contents | 46

copy running-config copy show-tech feature copy show-tech local-file copy show-tech vsf member local-file copy startup-config copy support-files copy support-files local-file copy support-files vsf member copy support-log copy support-log vsf member
Switch system and hardware commands
bluetooth disable bluetooth enable clear events clear ip errors console baud-rate domain-name hostname module admin-state module product-number mtrace power consumption-average-period show bluetooth show boot-history show capacities show capacities-status show console show core-dump show deprecated commands show domain-name show environment fan show environment led show environment power-consumption show environment power-consumption show environment power-supply show environment rear-display-module show environment temperature show events show fabric show hostname show images show ip errors show module show running-config show running-config current-context show startup-config show system error-counter-monitor show system show system resource-utilization show tech show usb show usb file-system show version system resource-utilization poll-interval top cpu
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2779 2780 2781 2782 2784 2785 2787 2789 2790 2792
2794
2794 2794 2795 2796 2797 2798 2799 2800 2801 2803 2804 2805 2806 2811 2813 2814 2815 2817 2818 2819 2821 2822 2824 2826 2828 2828 2831 2834 2835 2836 2838 2839 2842 2845 2847 2848 2850 2852 2858 2860 2861 2862 2863 2864
47

top memory usb usb mount | unmount
System profile commands
profile show profiles available show profile current
Telnet commands
show telnet server show telnet server sessions telnet server
Terminal monitor commands
logging console {notify | severity | filter} show terminal-monitor terminal-monitor {notify | severity | filter}
Traceroute commands
traceroute traceroute6
Traffic insight commands
collect egress-vlan collect forwarding-status diag-dump traffic-insight basic show capacities traffic-insight show debug buffer module trafficinsight show events traffic-insightd show running-config traffic-insight show tech traffic-insight show traffic-insight monitor-type traffic insight
Two-factor authentication commands
aaa authorization radius https-server authentication certificate ssh certificate-as-authorized-key ssh two-factor-authentication
UDLD commands
clear udld statistics show udld udld udld interval udld mode udld retries
UFD (Uplink Failure Detection) commands
debug ufd all delay links-to-disable links-to-monitor show capacities ufd

2865 2866 2866
2868
2868 2869 2870
2872
2872 2872 2873
2875
2875 2876 2877
2879
2879 2881
2884
2884 2885 2886 2887 2887 2888 2889 2890 2891 2899
2905
2905 2906 2907 2908
2910
2910 2910 2912 2913 2915 2917
2919
2919 2919 2921 2922 2923
Contents | 48

show running-config ufd show-tech ufd show ufd ufd enable ufd session-id
UDP commands
ip forward-protocol udp ip udp-bcast-forward show ip forward-protocol udp
User and group commands
password complexity user user-group user management-interface user password service export-password show password-complexity show user-group show user information show user-list show user-list management-interface
User-based tunneling commands
backup-controller ip enable ip source-interface papi-security-key primary-controller ip sac-heartbeat-interval show ip source-interface ubt show capacities ubt show running-config ubt show ubt show ubt information show ubt state show ubt statistics show ubt users uac-keepalive-interval ubt ubt-client-vlan ubt mode vlan-extend wol-enable vlan
VLAN commands
description vlan name show capacities-status vlan-count show capacities svi-count show capacities vlan-count show capacities-status vlan-translation show vlan show vlan port show vlan summary show vlan translation
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2924 2925 2926 2927 2928
2930
2930 2931 2931
2934
2934 2938 2940 2944 2946 2947 2948 2949 2950 2952 2954
2956
2956 2957 2957 2959 2960 2961 2962 2962 2963 2964 2968 2970 2974 2979 2982 2983 2984 2986 2987
2989
2989 2989 2990 2991 2992 2992 2993 2994 2998 2999
49

show vlan translation pending show vlan voice shutdown system vlan-client-presence-detect trunk-dynamic-vlan-include uufb vlan vlan access vlan protocol vlan translate vlan trunk allowed vlan trunk native vlan trunk native tag voice
VRF commands
ip route vrf ipv6 route gc interval ipv6 route vrf show ip route show ipv6 route show vrf vrf vrf attach
VRRP commands
address authentication bfd <IPV4-ADDR> preempt preempt delay minimum priority router vrrp {enable | disable} no router vrrp show track show track brief show vrrp shutdown timers advertise track (VRRP group) track (VRRP virtual router) track by version vrrp vrrp dual-active-forwarding
VSF commands
description interface issu rollback-timer issu update-software link member type shutdown show issu

3000 3001 3002 3003 3003 3004 3005 3007 3008 3009 3011 3012 3014 3015
3016
3016 3017 3018 3019 3020 3022 3023 3024
3026
3026 3027 3029 3030 3031 3032 3033 3033 3034 3035 3036 3043 3044 3045 3046 3047 3048 3049 3049
3051
3051 3051 3052 3054 3058 3060 3061 3062 3063
Contents | 50

show vsf show vsf detail show vsf link show vsf link detail show vsf link error-detail show vsf link error-detail member show vsf member show vsf topology vsf force-auto-join vsf start-auto-stacking vsf split-detect vsf secondary-member vsf renumber-to vsf member vsf member reboot
VSX commands
active-gateway config-sync disable inter-switch-link {<PORT-NUM> | lag <LAG-ID>} inter-switch-link dead-interval inter-switch-link hello-interval inter-switch-link hold-time inter-switch-link peer-detect-interval interface lag multi-chassis ip icmp redirect keepalive dead-interval keepalive hello-interval keepalive peer keepalive udp-port lacp fallback linkup-delay-timer linkup-delay-timer exclude lag-list neighbor <IP-ADDRESS> vsx-sync-exclude role {primary | secondary} show active-gateway show active-gateway <IFNAME> show interface <VLAN-NAME> show lacp aggregates show lacp interfaces show lacp interfaces multi-chassis show running-config interface show running-config vsx show running-config vsx-sync show running-config vsx-sync peer-diff show system l2-vlan-mac-mode show vsx active-forwarding show vsx brief show vsx config-consistency show vsx config-consistency lacp show vsx configuration show vsx configuration split-recovery show vsx ip data-path show vsx ip route show vsx ipv6 data-path show vsx ipv6 route
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3068 3070 3072 3073 3074 3076 3078 3079 3080 3080 3081 3082 3084 3085 3086
3088
3088 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106 3107 3108 3109 3109 3110 3112 3113 3114 3115 3118 3120 3121 3122 3123 3124 3124 3125 3127 3129 3130 3132 3132 3134 3136 3138
51

show vsx status show vsx status config-sync show vsx status peering show vsx status shutdown-on-split split recovery system l2-vlan-mac-mode system-mac vsx vsx active-forwarding vsx shutdown-on-split vsx-sync vsx-sync (config-if, config-lag-if contexts) vsx-sync (config-vlan-if context) vsx-sync aaa vsx-sync acl-log-timer vsx-sync acl-secure-update vsx-sync arp-security vsx-sync bfd-global vsx-sync bgp vsx-sync copp-policy vsx-sync dhcp-relay vsx-sync dhcp-server vsx-sync dhcp-snooping vsx-sync dhcpv6-server vsx-sync dns vsx-sync evpn vsx-sync icmp-tcp vsx-sync keychain vsx-sync lldp vsx-sync loop-protect-global vsx-sync mac-lockout vsx-sync mclag-interfaces vsx-sync nd-snooping vsx-sync neighbor vsx-sync ospf vsx-sync policy-global vsx-sync port-access vsx-sync private-vlan-global vsx-sync qos-global vsx-sync route-map vsx-sync sflow vsx-sync sflow-global vsx-sync snmp vsx-sync ssh vsx-sync static-routes vsx-sync stp-global vsx-sync telnet vsx-sync time vsx-sync udp-forwarder vsx-sync vrrp vsx-sync vsx-global vsx update-software vsx update-software boot-bank
VXLAN commands
interface vxlan

3140 3143 3144 3145 3146 3147 3148 3150 3151 3152 3153 3156 3161 3162 3163 3164 3165 3166 3167 3168 3169 3170 3171 3172 3173 3174 3175 3176 3177 3178 3179 3180 3181 3182 3183 3184 3185 3187 3187 3188 3189 3190 3191 3192 3193 3194 3195 3195 3196 3197 3198 3199 3201
3203
3203
Contents | 52

inter-vxlan-bridging mode mcast-group flood replication-mode routing show interface vxlan show interface vxlan multipoint-tunnel show interface vxlan vni show interface vxlan vteps shutdown source ip source ipv6 system vlan-client-presence-detect vlan vni vrf vtep-peer vtep-peer-ipv6 vxlan-counters aggregate
Zeroization commands
erase all zeroize
ZTP commands
show ztp information ztp force provision
Support and Other Resources
Accessing HPE Aruba Networking Support Accessing Updates Warranty Information Regulatory Information Documentation Feedback

3204 3205 3206 3207 3208 3210 3212 3213 3218 3219 3220 3221 3222 3223 3224 3225 3226 3227
3229
3229
3232
3232 3236
3239
3239 3240 3240 3240 3240

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

53

Chapter 1 About this document

About this document
This document describes features of the AOS-CX network operating system. It is intended for administrators responsible for installing, configuring, and managing Aruba switches on a network.

Applicable products
This document applies to the following products:
n HPE Aruba Networking 6300 Switch Series (JL658A, JL659A, JL660A, JL661A, JL662A, JL663A, JL664A, JL665A, JL666A, JL667A, JL668A, JL762A, R8S89A, R8S90A, R8S91A, R8S92A, S0E91A, S0X44A)
n HPE Aruba Networking 6400 Switch Series (R0X31A, R0X38B, R0X38C, R0X39B, R0X39C, R0X40B, R0X40C, R0X41A, R0X41C, R0X42A, R0X42C, R0X43A, R0X43C, R0X44A, R0X44C, R0X45A, R0X45C, R0X26A, R0X27A, JL741A, S0E48A,S0E48A #0D1, S1T83A, S1T83A #0D1)

What's new in this release
Commands introduced or modified in 10.14.0001

Command actions (NAE-lite) arp ip arp ip mac class gbp-ip class gbp-ipv6 clear arp clear dhcp-snooping binding collect egress-vlan collect forwarding-status dhcp-snooping ...

Description
Existing command with new Schedule and Trap actions introduced.
Replaced the ipv4 parameter with the ip parameter. Thei pv4 parameter is deprecated.
Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated.
The app-category parameter is introduced to support applicationbased roles for IPv4 networks.
The app-category parameter is introduced to support applicationbased roles for IPv6 networks.
Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated.
Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated.
New command that configures collect (non-key) fields for a flow record when in the config-flow-record context.
New command that configures collect (non-key) fields for a flow record when in the config-flow-record context.
The dhcpv4-snooping, show dhcpv4-snooping, and clear dhcpv4-

AOS-CX 10.14 Command-Line Interface Guide

54

Command

Description

show dhcp-snooping ... clear dhcp-snooping ...

snooping series of commands are deprecated, and are replaced with dhcp-snooping, show dhcp-snooping and clear dhcp-snooping commands with similarsyntax and functionality.

eapol-eth-type

New command that configures the Ether-Type for use in frames for MKA.

erase feature-pack

The reset parameter is introduced, Running the erase feature-pack reset command will disable all subscription features and stop honor mode warnings.

fib-optimization evpn-vxlan host-route Replaced the ipv4 parameter with the ip parameter. Th eipv4 parameter is deprecated.

flow-tracking

The track icmp parameter is introduced, enabling tracking of ICMP flows, in addition to the TCP/UDP flows tracked by default.

flow record

Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated.

image-location

The allow-unsigned parameter is introduced to allow the download and deployment of an unsigned container image.

interface tunnel

Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated.

ipv4|ipv6 flow monitor rate-limit

Command introduced to enable flow monitoring on a role.
Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated.

show history

The all-sessions parameter is introduced.

show ip pim tree-state

This new command displays upstream join states for a specified group and source address in a VRF.

show ipv6 pim6 tree-state

This new command displays upstream join states for a specified group and source address in a VRF in an IPv6 network.

show running-config container

Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated.

show snmp community

The output of this command now displays an error message when the switch is in SNMPv3-only mode.

show vrrp

Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated.

snmp-server community

Replaced the ipv4 parameter with the ip parameter. Th eipv4 parameter is deprecated.

snmp-server host

Notification-typeis added to SNMP trap receivers. Now, you can select which traps are sent to each trap receiver.

system private-vlan share-hwresource

In the PVLAN default mode, there is now no limit on the number of secondary ports configured. In this mode, multiple trunk ports configured as secondary ports can share the hardware resources.

About this document | 55

Command transport-protocol vlan protocol vrrp

Description
Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated.
Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated.
Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated.

Command
area (ospf) redistribute clear ip ospf neighbors clear ip ospf statistics show ip ospf border-routers show ip ospf interface show ip ospf lsdb show ip ospf routes show ip ospf statistics show ip ospf statistics interface show ip ospf virtual-links area clear ipv6 ospfv3 neighbors clear ipv6 ospfv3 statistics redistribute reference-bandwidth retransmit-interval router-id show ipv6 ospfv3 show ipv6 ospfv3 border-routers show ipv6 ospfv3 interface show ipv6 ospfv3 neighbors show ipv6 ospfv3 routes show ipv6 ospfv3 statistics show ipv6 ospfv3 statistics interface show ipv6 ospfv3 virtual-links redistribute redistribute redistribute

Description
The supported <process-ID> parameter range is expanded from 1-63 to 1-65535.

Latest version available online
Updates to this document can occur after initial publication. For the latest versions of product documentation, see the links provided in Support and Other Resources.

Command syntax notation conventions

Convention example-text

Usage
Identifies commands and their options and operands, code examples, filenames, pathnames, and output displayed in a command window. Items

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

56

Convention
example-text Any of the following: n <example-text> n <example-text> n example-text n example-text
|
{ } [ ] ... or ...

Usage
that appear like the example text in the previous column are to be entered exactly as shown and are required unless enclosed in brackets ([ ]).
In code and screen examples, indicates text entered by a user.
Identifies a placeholder--such as a parameter or a variable--that you must substitute with an actual value in a command or in code:
n For output formats where italic text cannot be displayed, variables are enclosed in angle brackets (< >). Substitute the text--including the enclosing angle brackets--with an actual value.
n For output formats where italic text can be displayed, variables might or might not be enclosed in angle brackets. Substitute the text including the enclosing angle brackets, if any, with an actual value.
Vertical bar. A logical OR that separates multiple items from which you can choose only one. Any spaces that are on either side of the vertical bar are included for readability and are not a required part of the command syntax.
Braces. Indicates that at least one of the enclosed items is required.
Brackets. Indicates that the enclosed item or items are optional.
Ellipsis: n In code and screen examples, a vertical or horizontal ellipsis indicates an
omission of information. n In syntax using brackets and braces, an ellipsis indicates items that can be
repeated. When an item followed by ellipses is enclosed in brackets, zero or more items can be specified.

About the examples
Examples in this document are representative and might not match your particular switch or environment. The slot and port numbers in this document are for illustration only and might be unavailable on your switch.
Understanding the CLI prompts
When illustrating the prompts in the command line interface (CLI), this document uses the generic term switch, instead of the host name of the switch. For example: switch> The CLI prompt indicates the current command context. For example: switch>
Indicates the operator command context. switch#
Indicates the manager command context. switch(CONTEXT-NAME)#
Indicates the configuration context for a feature. For example:

About this document | 57

switch(config-if)# Identifies the interface context.
Variable information in CLI prompts
In certain configuration contexts, the prompt may include variable information. For example, when in the VLAN configuration context, a VLAN number appears in the prompt: switch(config-vlan-100)# When referring to this context, this document uses the syntax: switch(config-vlan-<VLAN-ID>)# Where <VLAN-ID> is a variable representing the VLAN number.
Identifying switch ports and interfaces
Physical ports on the switch and their corresponding logical software interfaces are identified using the format: member/slot/port
On the 6300 Switch Series
n member: Member number of the switch in a Virtual Switching Framework (VSF) stack. Range: 1 to 10. The primary switch is always member 1. If the switch is not a member of a VSF stack, then member is 1.
n slot: Always 1. This is not a modular switch, so there are no slots. n port: Physical number of a port on the switch.
For example, the logical interface 1/1/4 in software is associated with physical port 4 on member 1.
On the 6400 Switch Series
n member: Always 1. VSF is not supported on this switch. n slot: Specifies physical location of a module in the switch chassis.
o Management modules are on the front of the switch in slots 1/1 and 1/2. o Line modules are on the front of the switch starting in slot 1/3. n port: Physical number of a port on a line module.
For example, the logical interface 1/3/4 in software is associated with physical port 4 in slot 3 on member 1.
Identifying modular switch components
n Power supplies are on the front of the switch behind the bezel above the management modules. Power supplies are labeled in software in the format: member/power supply: o member: 1. o power supply: 1 to 4.
n Fans are on the rear of the switch and are labeled in software as: member/tray/fan: o member: 1. o tray: 1 to 4. o fan: 1 to 4.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

58

n Fabric modules are not labeled on the switch but are labeled in software in the format: member/module: o member: 1. o member: 1 or 2.
n The display module on the rear of the switch is not labeled with a member or slot number.
About this document | 59

Chapter 2 Introduction to the AOS-CX CLI

Introduction to the AOS-CX CLI

CLI access
Access the CLI through the following interfaces:
Console port
Connect the management port on the switch to your computer using a serial cable and then use terminal emulation software to reach the switch from the computer. Typically, the console port is used when first installing the switch and performing initial configuration tasks. On switches that support active and standby management modules, there is a console port is on each management module. Connect to the console port on the active management module.
Management port (out-of-band connection)
Connect the management port on the switch to your network, and then use SSH client software to reach the switch from a computer connected to the same network. This requires that a DHCP server is installed on the network. On switches that support active and standby management modules, connect the management port of the active management module to the network. In the switch factory default state, the management port and SSH on the management VRF (mgmt) are enabled.
Data port (in-band connection)
Connect a data port on the switch to your network, and then use SSH client software to reach the switch from a computer connected to the same network. Management traffic ingresses and egresses switch data ports with rest of the traffic on the network, therefore it can be affected by traffic congestion and other issues impacting the network.

Getting CLI help
To show the available commands that you can execute in the current command context, enter the ? symbol. For example:

switch# ? boot checkpoint
switch#

Reboot all or part of the system Checkpoint information

The ? symbol does not display on the screen when you enter it.
The commands that are available to you depend on your authority and the command context. In a given command context, you can only list and execute the commands available in that context.

AOS-CX 10.14 Command-Line Interface Guide

60

To show the available parameters for a command, enter the command followed by a space and then enter the ? symbol.
For example:

switch(config)# access-list ?

all

All access-lists

ip

Internet Protocol v4 (IPv4)

ipv6

Internet Protocol v6 (IPv6)

log-timer Set ACL log timer length (frequency)

mac

Ethernet MAC Protocol

switch(config)# access-list

After the CLI displays the information, it automatically displays the text you entered before you entered the ? symbol.
If there is no <cr> symbol at the end the command help output, the command is not complete as displayed. You must specify one of the listed parameters.
The <cr> symbol alone in the command help output indicates that there are no additional parameters and that you must press the enter key to complete the command. For example:

switch# list ? <cr>
switch# list

The <cr> symbol at the end of the command help output indicates that the parameters preceding the <cr> are optional and you can enter the command as is displayed. For example:

switch# configure ? terminal Configuration terminal (default) <cr>
switch# configure

To show information about a parameter for a command, enter the command and parameter followed by a space, then enter the ? symbol.
For example:

switch(config)# access-list log-timer ? <30-300> Specify value (in seconds) default Default value (300 seconds)
switch(config)# access-list log-timer

Authority levels
In command descriptions, the authority level indicates the user role that is required to execute a command:
Administrators
Users with the role: administrators Users with administrator rights can execute any command.
Operators

Introduction to the AOS-CX CLI | 61

Users with the role: operators. Users with operator rights can execute commands in the operator context (>) only.
Auditors
Users with the role: auditors. Users with auditor rights can execute commands in the auditor context (auditor>) only.
Local user group members with execution rights for a command
You can create up to 29 user-defined local user groups on the switch. Each group can be defined to allow execution of up to 1024 specific CLI commands.
Command contexts
The command context determines the following:
n Which parts of the switch can be managed n Which commands are available to users with the appropriate authority
Command contexts have a parent-child tree structure in which contexts might themselves contain nested contexts.
Operator context (>)
The operator context enables you to execute commands to view--but not change--the configuration. The operator context requires the least user privilege to execute commands. In command descriptions, this context is listed as: Operator (>)
Switch prompt example
switch>
Authority
Operators or Administrators
Showing the available commands in this context
At the command prompt, enter the ? symbol.
Navigating to the operator context (>)
To navigate to the operator command context (>), do one of the following:
n Log in to the switch CLI with a user ID that has the operator-group role. n From the manager context (#), enter the disable command.
Auditor context
When you log in to the switch as user with auditor rights, you have access to the auditor command context only. Users with auditor rights have access to a limited set of commands. for more information about auditors, see the Security Guide for your switch and software version.
Switch prompt example

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

62

auditor>
Showing the available commands in this context
At the command prompt, enter the ? symbol.
Manager context (#)
From the manager context (#), you can execute commands that do not require saving changes to the configuration. In command descriptions, this context is listed as: Manager (#)
Switch prompt example
switch#
Authority
Administrators or local user group members with execution rights for this command.
Showing the available commands in this context
At the command prompt, enter the ? symbol.
Access to manager context commands from descendant contexts
The do command enables you to access commands from the manager context while you are in a child or descendent context, such as config or config-if. For example, to execute the clear command from the config context, enter the following: do clear. The show command can be executed from configuration contexts as well as the manager context, so using the do command with the show command is deprecated. Support for do show might be discontinued in a future software release.
Navigating to the manager context (#)
To navigate to the manager command context (#), do one of the following: n Log in to the switch CLI with a user ID that has the administrators role. n From the operator context (>), enter the enable command.
You must have administrator authority to enter the enable command.
switch> enable switch#
n From the configuration context (config), enter either the exit or the end command. For example:
switch(config)# exit switch#
n From any child or descendent context, enter the end command. For example:
Introduction to the AOS-CX CLI | 63

switch(config-vlan-100)# end switch#
Global configuration context (config)
From the global configuration context (config), you can execute commands that change the configuration of the switch. In command descriptions, this context is listed as: config
Switch prompt example
switch(config)#
Authority
Administrators or local user group members with execution rights for this command.
Showing the available commands in this context
At the command prompt, enter the ? symbol.
You can use the do command to execute some manager context commands--such as the clear command--from the global configuration context.
Navigating to the config context
To navigate to the config command context, do one of the following: n From the manager context (#), enter the configure terminal command:
switch# configure terminal switch(config)#
n From a child configuration context, enter the exit command. For example:
switch(config-vlan-100)# exit switch(config)#
Other configuration command contexts
All other configuration command contexts are descendants of the global configuration command context (config). From these command contexts, you can execute commands that apply to that specific context, such as an interface or a VLAN.
Switch prompt examples
n switch(config-if)# n switch(config-router)# n switch(config-vlan-100)#

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

64

Authority
Administrators or local user group members with execution rights for this command.
Showing the available commands in this context
At the command prompt, enter the ? symbol.
Support for range contexts
On the 6400 Switch Series, interface identification differs. Some switch features enable you to use a single command to apply configuration settings to multiple items. You specify the multiple items by creating a type of command context called a range context. Then you can execute commands that are applied to every item in the range. For example:
switch(config)# interface 1/1/1-1/1/5 switch(config-if-<1/1/1-1/1/5>)# no shutdown
You can use a range context to specify multiple items for the following:
Physical interfaces
n Command example: interface 1/1/1-1/1/8,1/1/10,1/1/12 n Switch prompt example: switch(config-if-<1/1/1-1/1/8,1/1/10,1/1/12>)#
LAG interfaces
n Command example: interface lag 1-10 n Switch prompt example: switch(config-if-lag-<1-10>)#
Loopback interfaces
n Command example: interface loopback 1-10 n Switch prompt example: switch(config-if-loopback-<1-10>)#
VLAN interfaces
n Command example: interface vlan 1,2,3-6 n Switch prompt example: switch(config-vlan-if-<1,2,3-6>)#
VLANs
n Command example: vlan 1-10,15,20-25 n Switch prompt example: switch(config-vlan-<1-10,15,20-25>)# Commands entered in a range context are applied to each item in the range individually: n Each item in the range has its own entry in the output of show running-config commands.
For example, you can configure a range of interfaces as follows:
switch(config)# interface 1/1/1-1/1/5 switch(config-if-<1/1/1-1/1/5>)# no shutdown
In the output for the show running-config command, the interfaces are displayed individually:
Introduction to the AOS-CX CLI | 65

switch(config-if-<1/1/1-1/1/5>)# show running-config Current configuration: ... interface 1/1/1
no shutdown interface 1/1/2
no shutdown interface 1/1/3
no shutdown interface 1/1/4
no shutdown interface 1/1/5
no shutdown ... switch(config-if-<1/1/1-1/1/5>)#
n If you specify a range context for interfaces, you cannot execute commands that create a context within the range context. For example, you cannot execute the vrrp command from an interface range context, even though you can execute the command from the config-if context for a single interface.
n If error is encountered during the execution of a command for an item in the range, the error message returned includes a prefix that identifies the item to which the error applies. However command execution does not stop until the command is attempted on all the items in the range. For example, attempting to set an IP address in a range context of loopback interfaces results in the IP address being applied to the first loopback interface in the range, but results in errors for the subsequent interfaces:
switch(config)# interface loopback 1-4 switch(config-loopback-if-<1-4>)# ip address 10.1.11.11/24 [loopback2] Overlapping networks observed for "10.1.11.11/24". Please configure non overlapping networks. [loopback3] Overlapping networks observed for "10.1.11.11/24". Please configure non overlapping networks. [loopback4] Overlapping networks observed for "10.1.11.11/24". Please configure non overlapping networks.
switch(config-loopback-if-<1-4>)# show running-config | begin 4 "loopback 1" interface loopback 1
ip address 10.1.11.11/24 interface loopback 2 interface loopback 3 interface loopback 4
n The range context is created only if every item in the range is successfully created or already exists in configuration. If an error occurs during the creation of an item in a range, the items that are created successfully are added to the configuration, but the range context is not created. The switch prompt. For example, in the following sequence: 1. VLANs 1 through 100 are created successfully, so the switch prompt reflects the range of VLANs: switch(config-vlan-<1-100>)# 2. The command interface vlan 95-105 fails for VLANs 101 through 105, so the range context is not created and the switch prompt remains in the global configuration context: switch (config)# 3. The configuration includes all the VLANs and VLAN interfaces that are created successfully.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

66

switch(config)# vlan 1-100 switch(config-vlan-<1-100>)# exit switch(config)# interface vlan 95-105 VLAN 101 should be created before creating interface VLAN101. VLAN 102 should be created before creating interface VLAN102. VLAN 103 should be created before creating interface VLAN103. VLAN 104 should be created before creating interface VLAN104. VLAN 105 should be created before creating interface VLAN105. switch(config)# show running-config Current configuration: ... vlan 1-100 interface vlan95 interface vlan96 interface vlan97 interface vlan98 interface vlan99 interface vlan100 ... switch(config)#
n If the no form of the command can be used to remove an item from the configuration, you can use a range context with the no form of the command to remove multiple items from the configuration. For example, you can remove VLANs 95 through 100 from the configuration by entering: no vlan 95-100
Rules for range contexts
For interfaces that use the member/slot/port notation, items in the range must be specified in ascending order. Contiguous items in the range are represented by the smallest and largest values separated by a hyphen. For example: Command: interface 1/1/1-1/1/8 Switch prompt: switch(config-if-<1/1/1-1/1/8>)# Command: vlan 1-10 Switch prompt: switch(config-vlan-<1-10>)# Noncontiguous items in the range must be separated by commas. For example: Command: interface 1/1/1-1/1/8,1/1/10,1/1/12 Switch prompt: switch(config-if-<1/1/1-1/1/8,1/1/10,1/1/12>)# Command: vlan 1-10,15,20-25 Switch prompt: switch(config-vlan-<1-10,15,20-25>)# The switch prompt is truncated to 50 characters.
Command history
You can use the up arrow key or Ctrl+P to display the previous command in the session history, if any. You can use the down arrow key or Ctrl+N to display the next command in the session history, if any.
Introduction to the AOS-CX CLI | 67

You can use the show history command to show a numbered list of the commands executed during this session. You use the command numbers to specify commands to repeat using the repeat command. The show history and repeat commands are not saved in the history buffer.
The commands saved in the history command buffer are in the same format in which you entered the commands. If you enter an incomplete command, the command saved in the history command buffer is also an incomplete one.
If you execute the same command repeatedly, the switch saves only the earliest record. However, if you execute the same command in different formats, the switch saves them as different commands.
For example, if you execute the show startup-config command repeatedly, the system saves only one command in the history command buffer. If you execute the command in the format of show start and show startup respectively, the system saves them as two commands.

Command completion
The CLI supports both command abbreviation and command completion:
n If you enter enough letters to match a valid command, the CLI accepts the command. For example, you can enter con instead of configure to navigate from the manager context to the global configuration context.
switch# con switch(config)#

n If you enter part of a command word and then the press the Tab key, one of the following occurs: o If you have entered enough letters to match a valid command, the CLI displays the remainder of the word. o If you have not entered enough letters to match a valid command, the CLI does not complete the command. If you press the Tab key a second time, the CLI displays commands that match the letters you entered. For example:
switch(config)# cl class clear clock switch(config)# cl

n If you press the Tab key twice after a completed word, the CLI displays the command options.
For example, if you enter the word clock followed by a space and then press the Tab key twice, the CLI displays the commands available in that command context that start with that word, and then displays the prompt--including the characters you entered--enabling you to complete the command without retyping.

switch(config)# clock

date

datetime

switch(config)# clock

time

timezone

Pipe (|) support in show commands

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

68

The pipe (|) command is a CLI session command that filters the output of show show commands according to the criteria specified by the parameter include, exclude, count, begin, or redirect.
n The pipe (|) command is supported for use with the show command only. n You can use multiple pipe commands with a single show command.
For example: show running-config | include "vlan" | exclude "vlan2" | count n You can use the pipe command with the page command. n Command completion by pressing the Tab key is not supported for pipe commands.

Command syntax notation conventions

Convention example-text
example-text Any of the following: n <example-text> n <example-text> n example-text n example-text
|
{ } [ ] ... or ...

Usage
Identifies commands and their options and operands, code examples, filenames, pathnames, and output displayed in a command window. Items that appear like the example text in the previous column are to be entered exactly as shown and are required unless enclosed in brackets ([ ]).
In code and screen examples, indicates text entered by a user.
Identifies a placeholder--such as a parameter or a variable--that you must substitute with an actual value in a command or in code: n For output formats where italic text cannot be
displayed, variables are enclosed in angle brackets (< >). Substitute the text--including the enclosing angle brackets--with an actual value. n For output formats where italic text can be displayed, variables might or might not be enclosed in angle brackets. Substitute the text including the enclosing angle brackets, if any, with an actual value.
Vertical bar. A logical OR that separates multiple items from which you can choose only one. Any spaces that are on either side of the vertical bar are included for readability and are not a required part of the command syntax.
Braces. Indicates that at least one of the enclosed items is required.
Brackets. Indicates that the enclosed item or items are optional.
Ellipsis: n In code and screen examples, a vertical or horizontal
ellipsis indicates an omission of information. n In syntax using brackets and braces, an ellipsis
indicates items that can be repeated. When an item followed by ellipses is enclosed in brackets, zero or more items can be specified.

Introduction to the AOS-CX CLI | 69

Chapter 3 Service OS CLI commands

Service OS CLI commands

boot
boot
Description
Presents you with the boot menu prompt. You can then specify which boot profile: primary, secondary, or Service OS console.
Example
Presenting the boot menu prompt:

SVOS> boot

ServiceOS Information:

Version:

FL.01.07.0002-internal

Build Date:

2020-09-03 10:38:03 PDT

Build ID:

ServiceOS:FL.01.07.0002-internal:1a017598b673:202009031038

SHA:

1a017598b6738448ef679175712e022a966eca88

Boot Profiles:

0. Service OS Console 1. Primary Software Image [FL.10.06.0001] 2. Secondary Software Image [FL.10.08.0000-308-gcfbc0e3]

Select profile(primary):

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide

70

cat
cat <FILENAME/DIRECTORY-NAME>
Description
Prints the contents of a file to the console. The Service OS does not allow command output redirection, so this command is only useful for reading short text files.

Parameter <FILENAME/DIRECTORY-NAME>

Description Shows the contents of the specified file or directory.

Example
Showing the contents of /nos/hosts:

SVOS> cat /nos/hosts

127.0.0.1

localhost.localdomain

SVOS>

localhost

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

cd path
cd path
Description
Changes the current working directory.
Example
Changing the current working directory:
cd /

Service OS CLI commands | 71

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

config-clear
config-clear
Description
Configures the switch to set all configuration settings to factory default when the switch is restarted. The next time the switch starts, the current startup-config is renamed to startup-config-fixme, and a new startup-config is created with factory default settings.
Using this command is not the same as performing zeroization, which securely erases the entire primary storage and other devices, and not just the configuration.
Example
Configuring the system to clear the switch configuration:
SVOS> config-clear
The switch configuration will be cleared.
Continue (y/n)? y The system has been configured to clear the startup-config on the next boot. Please execute the 'boot' command to complete this action. SVOS>

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

72

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

cp
cp [options] <SOURCE-FILENAME/SOURCE-DIRECTORY> <DESTINATION-FLENAME/DESTINATIONDIRECTORY>
Description
Copies files or directories.

Parameter [options]
-d,-P
-a R,-r
-L -H
-p
-f -i -l,-s <SOURCE-FILENAME/SOURCE-DIRECTORY> <DESTINATION-FLENAME/DESTINATION-DIRECTORY>

Description
Selects the options for the command.
Specifies the preservation of symlinks (default if R).
Same as -dpR.
Specifies recursiveness, all files, and subdirectories are copied.
Specifies the following of all symlinks.
Specifies the following of symlinks on command line.
Specifies the preservation of file attributes if possible.
Specifies the overwriting of a file or directory.
Specifies the prompting before an overwrite.
Specifies the creation of (sym) links.
Specifies the name of the source file or directory.
Specifies the name of the destination file or directory.

Example
Copying /home/customers directory to the /home/clients directory:

SVOS> cp /home/customers /home/clients

Service OS CLI commands | 73

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

du
du [options] <FILENAME/DIRECTORY-NAME>...
Description
Shows estimated disk space used for each file or directory or both.

Parameter [options]
-a -L -H -d, N
-c -l -s -x -h -m -k <FILENAME/DIRECTORY-NAME>

Description Selects the options for the command. Show file sizes. Shows all symlinks. Shows symlinks on a command line. Shows limited output to directories (and files with -a) of depth less than N. Shows the total disk space usage of all files or directories or both. Shows the count sizes if hard linked. Shows only a total for each argument. Does not show directories on different file systems. Show sizes in human readable format (1K, 243M, and 2G). Show sizes in megabytes. Show sizes in kilobytes (default). Specifies the file or directory or both for displaying a size estimate.

Example

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

74

Estimating disk space for the /nos directory:
SVOS> du -ah /nos 196.4M /nos/primary.swi 196.4M /nos SVOS>

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

erase zeroize
erase zeroize
Description
Securely erases any user data contained on the SSD or other storage devices on the management module.
Back up all data before running this command or all user/config data will be lost.
Usage
Use this command to securely erase all customer data and restore the software environment to factory default. When you issue this command: Sonftware images are copied to RAM to be restored on completion. Alnl bits undergo a 0>1>0 transition to completely zeroize data. This data is not recoverable. Thnis feature can be used to remove all configuration settings or system alterations for debugging or troubleshooting. Thne zeroization process takes approximately two minutes.
All logs and data are lost in the zeroization process. Best practices is to collect all applicable data before performing zeroization.

Service OS CLI commands | 75

Example
Erasing user data:

SVOS> SVOS> erase --help Usage: erase zeroize

Securely erases storage devices on the management module. SVOS> ```

``` SVOS> erase zeroize ############################WARNING############################ This will securely erase all customer data and reset the switch to factory defaults. This will initiate a reboot and render the switch unavailable until the zeroization is complete. This should take several minutes to one hour to complete. ############################WARNING############################

Continue (y/n)? y reboot: Restarting system

ServiceOS Information: Version: FL.01.07.0002-internal Build Date: 2020-09-02 11:53:34 PDT Build ID: ServiceOS:FL.01.07.0002-internal:1a017598b673:202009031038 SHA: 1a017598b6738448ef679175712e022a966eca88

################ Preparing for zeroization #################

################ Storage zeroization #######################

################ WARNING: DO NOT POWER OFF UNTIL ##########

################

ZEROIZATION IS COMPLETE ##########

################ This should take several minutes ##########

################ to one hour to complete

##########

################ Restoring files ###########################

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

exit

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

76

exit
Description
Logs the user out from the SVOS> prompt.
Example
Loging the user out from the SVOS> prompt:
SVOS> exit
(C) Copyright 2024 Hewlett Packard Enterprise Development LP
RESTRICTED RIGHTS LEGEND Confidential computer software. Valid license from Hewlett Packard Enterprise Development LP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.
To reboot without logging in, enter 'reboot' as the login user name.
ServiceOS login:

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

format
format
Description
Configures the primary storage device with the correct partition and file system formatting. This command removes all pre-existing data on the primary storage device.
Example
Configuring the primary storage device with the correct partition and file system formatting:

Service OS CLI commands | 77

SVOS> format ##################WARNING#################### The following action will cause all data on the primary storage device to be lost. After formatting has completed, a reboot will be initiated to complete storage initialization. ##################WARNING####################
Continue? (y/n): y
Working...This may take a few minutes...

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

identify
identify
Description
Prints the version and serial number information of hardware devices on the management module (for example, FPGAS, PLDs).
Example
Output from a 6400/6300 switch:

SVOS> identify mc svos_primary mc svos_secondary mc uboot_single mc uboot_capsule mc pmc_single mc pmc_primary mc pmc_secondary mc mcb_single mc mcb_primary mc mcb_secondary mc mcb_factory

: FL.01.05.0001 : FL.01.05.0001 : FL.01.0001 : FL.01.0001 : 0x4 : 0x4 : 0x4 : 0x6 : 0x6 : 0x6 : 0x3

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

78

mc ledpld_single mc ledpld_primary mc ledpld_secondary mc tpm

: 0x4 : 0x4 : 0x4 : 0x102420E

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip
ip {show | dhcp | disable | addr <ADDR-NETMASK-GATEWAY>}
Description
Shows or configures the port with a static IP address (IPv4 only) or enables the DHCP client on the port. An address is set only if a DHCP server is available to provide one.

Parameter {show | dhcp | disable | addr <ADDR-NETMASK-GATEWAY>}
show dhcp
disable addr <ADDR-NETMASK-GATEWAY>

Description
Selects the options for the OOBM port.
Shows the OOBM port.
Configures the port with a DHCP address.
Disables the OOBM port.
Configures the port with a static IP address (IPv4 only). Specify address, netmask, and gateway as A.B.C.D.

Example
Configuring the port with a DHCP IP address:

Service OS CLI commands | 79

SVOS> ip dhcp SVOS> ip show Interface : Link Up IP Address : 10.0.26.17 Subnet Mask: 255.255.252.0 Gateway : 10.0.24.1
SVOS> ip disable SVOS> ip show Interface : Disabled SVOS>

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

ls
ls [<OPTIONS>] [<FILE-NME>]
Description
This command lists directory contents.
Parameter <OPTIONS>
-1 -a -A
-C -x -d

Description Specifies options for the command. Shows one-column output. Shows entries which start with a period (.). Shows output similar to -a, but excludes a period (.) and a double period (..). Shows output list by columns. Shows output list by lines. Shows listing of directory entries instead of contents

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

80

Parameter -L -H -R -p -F
-l -i -n -s -e -h
-r -S -X -v -c -t -u -c -w <N>
--color[={always | never | auto}] <FILE-NAME>

Description Follows symlinks. Follows symlinks on the command line. Recurse. Appends a slash (/) to directory entries. Appends an indicator to entries. An indicator can be as an asterisk (*) or slash (/) or equal sign (=) or at sign (@) or pipe (|). Shows the output in a long listing format. Shows the list inode numbers. Shows a list of numeric UIDs and GIDs instead of names. Shows a list of allocated blocks. Shows in one column a list with the full date and time. Shows list sizes in human readable format (1K, 243M, 2G) with a one-column output. Shows in one column a sort in reverse order. Shows in one column a sort by size. Shows in the output sort by extension. Shows in one column a sort by version. With -l, it shows a sort in one column by ctime. With -l, it shows a sort by mtime. With -l, sort by atime. With -l, it shows a sort in one column by ctime Assumes that the terminal has the number of columns wide as specified by <N>. Controls color in the output. Specifies the name of the file to list.

Example
Listing directory contents:

SVOS> ls -la /nos

drwxr-xr-x 3 0

0

drwxr-xr-x 11 0

0

drwx------ 2 0

0

4096 Nov 21 03:19 . 220 Nov 21 03:21 ..
16384 Nov 21 03:20 lost+found

Service OS CLI commands | 81

-rwxr-xr-x 1 0

0

205957424 Nov 21 03:19 primary.swi

SVOS>

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

md5sum
md5sum [-c | -s | -w] [<FILE-NAME>]
Description
This command computes and checks the MD5 message digest.

Parameter [-c | -s | -w]
-c -s -w <FILE-NAME>

Description Selects the options for the command. Specifies to check the sums against the list in files. Specifies not output anything, status code shows success. Specifies to warn about improperly formatted checksum lines. Specifies the file name to run the checksum against.

Example
Computing and checking the MD5 message digest for /nos/primary.swi:

SVOS> md5sum /nos/primary.swi 93ffc89e7ec357854704d8e450c4b7ab /nos/primary.swi SVOS>

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

82

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

mkdir
mkdir [-m | -p] [<DIRECTORY-NAME>]
Description
This command makes directories.

Parameter [-m | -p]
-m -p
<DIRECTORY-NAME>

Description Specifies the options for the command. Specifies the mode. Specifies to make parent directories as needed with no errors for pre-existing directories. Specifies the directory to create.

Example
Making the dir directory:

SVOS> mkdir dir

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Service OS CLI commands | 83

Platforms All platforms

Command context ServiceOS (SVOS>)

Authority
Administrators or local user group members with execution rights for this command.

mount
mount <DEVICE>
Description
This command mounts the SSD partitions to the following locations: /coredump, /logs, /nos, /selftest, and mounts the USB device to /mnt/usb. Users can mount USB flash drives formatted as either FAT16 or FAT32 with a single partition.

Parameter <DEVICE>

Description
Specifies the device to be mounted. Supported device options include all and usb.

Examples
Mounting all of the SSD partitions:

SVOS> mount all SVOS> mount usb

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

mv
mv [-f | -i | -n] <TARGET-DIRECTORY>
Description
This command moves (renames) files.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

84

Parameter -f -i -n
Example
Moving the file named myfile:
SVOS> mv myfile

Description Specifies not to prompt before overwriting. Specifies to prompt before overwriting. Specifies to not overwrite an existing file.

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

password (svos)
password
Description
Sets the admin user account password for both Service OS and AOS-CX once the user boots into AOS-CX and saves the configuration. This will overwrite the previous password if one exists. User input is masked with asterisks. This command is not available if enhanced secure mode is set.
Example
Setting the admin account password:
SVOS> password Enter password:******** Confirm password:******** SVOS>

Service OS CLI commands | 85

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

ping
ping <HOST-IP-ADDRESS>
Description
Pings network hosts for debug purposes.

Parameter <HOST-IP-ADDRESS>

Description Specifies the host IP address.

Example
Pinging a network host:

SVOS> ping 10.0.8.10 PING 10.0.8.10 (10.0.8.10): 56 data bytes 64 bytes from 10.0.8.10: seq=0 ttl=63 time=3.496 ms 64 bytes from 10.0.8.10: seq=1 ttl=63 time=0.367 ms 64 bytes from 10.0.8.10: seq=2 ttl=63 time=0.380 ms 64 bytes from 10.0.8.10: seq=3 ttl=63 time=0.282 ms 64 bytes from 10.0.8.10: seq=4 ttl=63 time=0.669 ms ^C --- 10.0.8.10 ping statistics --5 packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max = 0.282/1.038/3.496 ms SVOS>

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

86

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

pwd
pwd
Description
Displays the current working directory.
Example
Displaying the current working directory:
SVOS> pwd /home SVOS>

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

reboot
reboot
Description
Reboots the Management Module.

Service OS CLI commands | 87

Example
Rebooting the management module:
SVOS> reboot reboot: Restarting system

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

rm
rm [-f | -i | -R | -r] <FILE-NAME>
Description
Removes files or directories.

Parameter [-f | -i | -R | -r]
-f -i -R | -r

Description Selects the options for removing files or directories. Never prompt before removing files or directories. Always prompt before removing files or directories. Recursive.

Example
Removing the file named foo:

SVOS> rm foo

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

88

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

rmdir
rmdir [-p] <DIRECTORY-NAME>
Description
Removes empty directories.
Parameter -p
Example
Removing the empty foo directory:
SVOS> rmdir foo SVOS>

Description Specifies to remove parent directories.

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

secure-mode

Service OS CLI commands | 89

secure-mode <enhanced | standard | status>
Description
Sets the secure mode to enhanced or standard secure mode. Also can display the current secure mode. A zeroization is required before switching between enhanced and standard secure modes. The command also displays a message notifying the user that they are already in the targeted secure mode.
Example
Setting the secure mode to enhanced or standard:
SVOS> secure-mode --help Usage: secure-mode <enhanced | standard | status>
Set or retrieve the secure mode setting. Requires a zeroization to change modes. SVOS> ```
``` SVOS> secure-mode enhanced ############################WARNING############################ This will set the switch into enhanced secure mode. Before enhanced secure mode is enabled, the switch must securely erase all customer data and reset the switch to factory defaults. This will initiate a reboot and render the switch unavailable until the zeroization is complete. This should take several minutes to one hour to complete. ############################WARNING############################
Continue (y/n)? y reboot: Restarting system
```
``` SVOS> secure-mode standard ############################WARNING############################ This will set the switch into standard secure mode. Before standard secure mode is enabled, the switch must securely erase all customer data and reset the switch to factory defaults. This will initiate a reboot and render the switch unavailable until the zeroization is complete. This should take several minutes to one hour to complete. ############################WARNING############################
Continue (y/n)? y reboot: Restarting system
```
``` SVOS> secure-mode standard ############################WARNING############################ Secure mode is already set to standard. Setting it again will repeat the zeroization process. The switch must securely erase all customer data and reset the switch to factory defaults. This will initiate a reboot and render the switch unavailable until the zeroization is complete. This should take several minutes to one hour to complete. ############################WARNING############################

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

90

Continue (y/n)? y reboot: Restarting system
```
``` SVOS> secure-mode status enhanced secure mode is set. SVOS>

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

sh
sh
Description
Launches a bash shell for support purposes. To quit bash, enter exit. This command is not available if enhanced secure mode is set.
Example
Launching a bash shell:
SVOS> sh switch:/cli/fs/home#

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.
Command History

Service OS CLI commands | 91

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

system serviceos password-prompt
system serviceos password-prompt no system serviceos password-prompt
Description
Use this command to enable password authentication for ServiceOS. By default, the ServiceOS shell (accessible only from the local switch console port) requires no password to login as an admin use. When this setting is enabled, the same password used to authenticate the admin user in the AOS-CX CLI or WeUI can be used to log in to the ServiceOS shell. If this setting is enabled, a forgotten admin user password cannot be reset using ServiceOS; if there are no other local or RADIUS/TACACS user accounts with administrator-level access, the switch must be zeroized by entering the username zeroize command at the ServiceOS login prompt to restore administrator access.

Example
Enablling password authentication for ServiceOS
switch(config)# system serviceos password-prompt

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

92

umount
umount <DEVICE>
Description
Unmounts the SSD partitions mounted to the following locations: /coredump, /logs, /nos, /selftest, and unmounts the USB device mounted to /mnt/usb.

Parameter <DEVICE>

Description
Specifies the device to be unmounted. Supported device options include all and usb.

Examples
Unmounting all devices:

SVOS> umount all SVOS> umount usb

Unmounting a USB device:

SVOS> umount all SVOS> umount usb

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

update
update {primary | secondary} <IMAGE>
Description
Verifies and installs a product image. The user can select the primary or secondary boot profile to update and the location of the file.

Service OS CLI commands | 93

Parameter {primary | secondary} <IMAGE>

Description Selects either the primary or secondary image. Specifies the image name.

Examples
Updating the software image using TFTP:
The OOBM port is disabled on first boot and must be enabled using the ip command.

SVOS> ip dhcp SVOS> ip show Interface : Link Up IP Address : 192.0.2.22 Subnet Mask: 255.255.200.20 Gateway : 10.0.24.1 SVOS> tftp -g -r XL.10.00.0001.swi -l image.swi 192.4.8.10 XL.10.00.0001.swi 100% |*******************************| 178M SVOS> ls image.swi SVOS> update primary image.swi Updating primary software image... Verifying image... Done

0:00:00 ETA

Update the software image using USB:
This example assumes that the user has preloaded a USB flash drive with the image to be updated. The image name on the flash drive is not important.

SVOS> mount usb SVOS> ls /mnt/usb image.swi SVOS> update primary /mnt/usb/image.swi Updating primary software image... Verifying image... Done

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

94

Platforms All platforms

Command context ServiceOS (SVOS>)

Authority
Administrators or local user group members with execution rights for this command.

tftp
tftp {-b | -g | -l <LOCAL-FILE> | -p | -r <REMOTE-FILE>} host [<PORT>]
Description
Transfers files to and from a remote machine (TFTP a file).

Parameter {-b | -g | -l | -p | -r <REMOTE-FILE>} -b
-g -l -p -r <REMOTE-FILE> <PORT>

Description
Selects the options for transferring a file.
Specifies the transfer blocks of size octets. The default blocksize is set to 1468, which can be overridden with the -b option.
Specifies to get a file.
Specifies a local file.
Specifies to put a file in remote location.
Specifies a remote file.
Specifies the port for transfer. If no port option is specified, TFTP uses the standard UDP port 69 by default.

Example
Transferring files:

SVOS> tftp -b 65464 -g -r XL.10.00.0002.swi.swi 192.0.2.1 XL.10.00.0002 100% |*******************************| 178M 0:00:00 ETA SVOS>

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Service OS CLI commands | 95

Platforms
6300 6400

Command context ServiceOS (SVOS>)

Authority
Administrators or local user group members with execution rights for this command.

version
version
Description
Displays the following build strings:
n Version. n Build date. n Build time. n Build ID. n SHA.
Example
Displaying version build strings:

SVOS> version

ServiceOS Information:

Version:

GT.01.01.0001

Build Date:

2017-07-19 14:52:31 PDT

Build ID:

ServiceOS:GT.01.01.0001:461519208911:201707191452

SHA:

46151920891195cdb2267ea6889a3c6cbc3d4193

SVOS>

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context ServiceOS (SVOS>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

96

Chapter 4 ACL commands

ACL commands

ACL application
ACLs can be applied as follows:

ACL type Direction L2 interface (port) L2 LAG L3 interface (port) L3 LAG L3 interface (port) subinterface L3 LAG subinterface VLAN Interface VLAN

IPv4+6 In Yes Yes Yes Yes Yes Yes Yes Yes (routed)

Management interface

Yes

Control Plane (per VRF)

Yes

IPv4+6 Out Yes Yes Yes Yes Yes Yes Yes Yes (routed)

MAC In Yes Yes Yes Yes Yes Yes Yes

MAC Out Yes Yes Yes Yes Yes Yes Yes

The following match criteria is not supported. If this match criteria is attempted to be configured, an error message will be displayed and the action will not be completed.
TTL on IP ACLs To apply IPv4 and/or IPv6 ACLs to the management interface, apply them to the Control Plane on the management VRF.

access-list copy
access-list {ip|ipv6|mac} <ACL-NAME> copy <DESTINATION-ACL>
Description
Copies an IPv4, IPv6, or MAC ACL to a new destination ACL or overwrites an existing ACL.

AOS-CX 10.14 Command-Line Interface Guide

97

Parameter {ip|ipv6|mac} <ACL-NAME> <DESTINATION-ACL>

Description Specifies the type of ACL. Specifies the name of the ACL to be copied. Specifies the name of the destination ACL.

Examples
Copying MY_IP_ACL to MY_IP_ACL2:

switch(config)# access-list ip MY_IP_ACL copy MY_IP_ACL2 switch(config-acl-ip)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL

1 permit

udp

any

172.16.1.0/255.255.255.0

2 permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

3 permit

tcp

172.26.1.0/255.255.255.0

any

dscp: AF11

ack

syn

4 deny

any

any

any

Hit-counts: enabled

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL2

1 permit

udp

any

172.16.1.0/255.255.255.0

2 permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

3 permit

tcp

172.26.1.0/255.255.255.0

any

dscp: AF11

ack

syn

4 deny

any

any

any

Hit-counts: enabled

Copying MY_IPV6_ACL to MY_IPV6_ACL2:

ACL commands | 98

switch(config)# access-list ipv6 MY_IPV6_ACL copy MY_IPV6_ACL2 switch(config-acl-ip)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_ACL

1 permit

udp

any

2001::1/64

2 Permit all TCP ephemeral ports

permit

tcp

2001:2001::2:1

> 1023

any

3 permit

tcp

2001:2011::1/64

any

4 deny

any

any

any

Hit-counts: enabled

-------------------------------------------------------------------------------

IPv6

MY_IPV6_ACL2

1 permit

udp

any

2001::1/64

2 Permit all TCP ephemeral ports

permit

tcp

2001:2001::2:1

> 1023

any

3 permit

tcp

2001:2011::1/64

any

4 deny

any

any

any

Hit-counts: enabled

Copying MY_MAC_ACL to MY_MAC_ACL2:

switch(config)# access-list mac MY_MAC_ACL copy MY_MAC_ACL2 switch(config-acl-mac)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_ACL

1 permit

ipv6

1122.3344.5566/ffff.ffff.0000

any

2 permit

any

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

99

aaaa.bbbb.cccc

1111.2222.3333

QoS Priority Code Point: 4

3 Permit all vlan-1 tagged Appletalk traffic

permit

appletalk

any

any

VLAN: 1

4 deny

any

any

any

Hit-counts: enabled

-------------------------------------------------------------------------------

MAC

MY_MAC_ACL2

1 permit

ipv6

1122.3344.5566/ffff.ffff.0000

any

2 permit

any

aaaa.bbbb.cccc

1111.2222.3333

QoS Priority Code Point: 4

3 Permit all vlan-1 tagged Appletalk traffic

permit

appletalk

any

any

VLAN: 1

4 deny

any

any

any

Hit-counts: enabled

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_ACL

1 permit

ipv6

1122.3344.5566/ffff.ffff.0000

any

2 permit

any

aaaa.bbbb.cccc

1111.2222.3333

QoS Priority Code Point: 4

3 Permit all vlan-1 tagged Appletalk traffic

permit

appletalk

any

any

VLAN: 1

4 deny

any

any

any

Hit-counts: enabled

-------------------------------------------------------------------------------

MAC

MY_MAC_ACL2

1 permit

ipv6

1122.3344.5566/ffff.ffff.0000

any

2 permit

any

aaaa.bbbb.cccc

1111.2222.3333

ACL commands | 100

QoS Priority Code Point: 4

3 Permit all vlan-1 tagged Appletalk traffic

permit

appletalk

any

any

VLAN: 1

4 deny

any

any

any

Hit-counts: enabled

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

access-list ip
Syntax to create an IPv4 ACL and enter its context. Plus syntax to remove an ACL: access-list ip <ACL-NAME> no access-list ip <ACL-NAME>
Syntax (within the ACL context) for creating or removing ACEs for protocols ah, gre, esp, igmp, ospf, pim (ip is available as an alias for any):
[<SEQUENCE-NUMBER>] {permit|deny} {any|ip|ah|gre|esp|igmp|ospf|pim|<IP-PROTOCOL-NUM>} {any|<SRC-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]|<ADDRESS-GROUP>} {any|<DST-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]|<ADDRESS-GROUP>} [dscp <DSCP-SPECIFIER>] [ecn <ECN-VALUE>] [ip-precedence <IP-PRECEDENCE-VALUE>] [tos <TOS-VALUE>] [fragment] [vlan <VLAN-ID>] [ttl <TTL-VALUE>] [count] [log]
no <SEQUENCE-NUMBER>
Syntax (within the ACL context) for creating or removing ACEs for protocols sctp, tcp, udp: [<SEQUENCE-NUMBER>] {permit|deny} {sctp|tcp|udp} {any|<SRC-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]|<ADDRESS-GROUP>} [{eq|gt|lt} <PORT>|range <MIN-PORT> <MAX-PORT>|group <PORT-GROUP>] {any|<DST-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]|<ADDRESS-GROUP>} [{eq|gt|lt} <PORT>|range <MIN-PORT> <MAX-PORT>|group <PORT-GROUP>] [urg] [ack] [psh] [rst] [syn] [fin] [established] [dscp <DSCP-SPECIFIER>] [ecn <ECN-VALUE>] [ip-precedence <IP-PRECEDENCE-VALUE>] [tos <TOS-VALUE>] [fragment] [vlan <VLAN-ID>] [ttl <TTL-VALUE>] [count] [log]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

101

no <SEQUENCE-NUMBER> Syntax (within the ACL context) for creating or removing ACEs for protocol icmp:
[<SEQUENCE-NUMBER>] {permit|deny} {icmp} {any|<SRC-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]|<ADDRESS-GROUP>} {any|<DST-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]|<ADDRESS-GROUP>} [icmp-type {echo|echo-reply|<ICMP-TYPE-VALUE>}] [icmp-code <ICMP-CODE-VALUE>] [dscp <DSCP-SPECIFIER>] [ecn <ECN-VALUE>] [ip-precedence <IP-PRECEDENCE-VALUE>] [tos <TOS-VALUE>] [fragment] [vlan <VLAN-ID>] [ttl <TTL-VALUE>] [count] [log]
no <SEQUENCE-NUMBER> Syntax (within the ACL context) for ACE comments:
[<SEQUENCE-NUMBER>] comment <TEXT-STRING>
no <SEQUENCE-NUMBER> comment
Description
Creates an IPv4 Access Control List (ACL) comprised of one or more Access Control Entries (ACEs) ordered and prioritized by sequence number. The lowest sequence number is the highest prioritized ACE. The no form of this command deletes the entire ACL, or deletes an ACE identified by sequence number, or deletes only the comment from the ACE identified by sequence number.

Parameter <ACL-NAME> <SEQUENCE-NUMBER> {permit|deny} <IP-PROTOCOL-NUM> {any|<SRC-IP-ADDRESS>[/{<PREFIX-LENGTH> |<SUBNET-MASK>}]|<ADDRESS-GROUP>}
{any|<DST-IP-ADDRESS>[/{<PREFIX-LENGTH> |<SUBNET-MASK>}]|<ADDRESS-GROUP>}

Description
Specifies the name of this ACL.
Specifies a sequence number for the ACE. Range: 1 to 4294967295.
Specifies whether to permit or deny traffic matching this ACE.
Specifies the protocol as its Internet Protocol number. For example, 2 corresponds to the IGMP protocol. Range: 0 to 255.
Specifies the source IPv4 address. n any - specifies any source IPv4 address. n <SRC-IP-ADDRESS> - specifies the source IPv4 host
address. o <PREFIX-LENGTH> - specifies the address bits to
mask (CIDR subnet mask notation). Range: 1 to 32. o <SUBNET-MASK> - specifies the address bits to mask (dotted decimal notation). n <ADDRESS-GROUP> - specifies an IPv4 address group defined with object-group ip address.
Specifies the destination IPv4 address. n any - specifies any destination IPv4 address. n <DST-IP-ADDRESS> - specifies the destination IPv4

ACL commands | 102

Parameter
[{eq|gt|lt} <PORT>|range <MIN-PORT> <MAX-PORT>|group <PORT-GROUP>]
urg ack psh rst syn fin established [icmp-type {echo|echo-reply| <ICMP-TYPE-VALUE>}]

Description
host address. o <PREFIX-LENGTH> - specifies the address bits to
mask (CIDR subnet mask notation). Range: 1 to 32. o <SUBNET-MASK> - specifies the address bits to mask (dotted decimal notation). n <ADDRESS-GROUP> - specifies an IPv4 address group that you defined earlier with objectgroup ip address.
Specifies the port, port range, or port group. Port numbers are in the range of 0 to 65535. n eq <PORT> - specifies the Layer 4 port. n gt <PORT> - specifies any Layer 4 port greater
than the indicated port. n lt <PORT> - specifies any Layer 4 port less than
the indicated port. n range <MIN-PORT> <MAX-PORT> - specifies the
Layer 4 port range. n group <PORT-GROUP> - specifies the Layer 4 port
group that you defined earlier with objectgroup port.
NOTE: Upon application of the ACL, ACEs with L4 port ranges may consume more than one hardware entry.
Specifies matching on the TCP Flag: Urgent.
Specifies matching on the TCP Flag: Acknowledgment.
Specifies matching on the TCP Flag: Push buffered data to receiving application.
Specifies matching on the TCP Flag: Reset the connection.
Specifies matching on the TCP Flag: Synchronize sequence numbers.
Specifies matching on the TCP Flag: Finish connection.
Specifies matching on the TCP Flag: Established connection.
Specifies the ICMP type. n echo - specifies an ICMP echo request packet. n echo-reply - specifies an ICMP echo reply packet. n <ICMP-TYPE-VALUE> - specifies an ICMP type

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

103

Parameter [icmp-code <ICMP-CODE-VALUE>] dscp DSCP-SPECIFIER>
ecn <ECN-VALUE> ip-precedence <IP-PRECEDENCE-VALUE> tos <TOS-VALUE> fragment vlan <VLAN-ID>

Description
value. Range: 0 to 255.
Specifies the ICMP code value. Range: 0 to 255.
Specifies the Differentiated Services Code Point (DSCP), either a numeric <DSCP-VALUE> (0 to 63) or one of these keywords: n AF11 - DSCP 10 (Assured Forwarding Class 1, low
drop probability) n AF12 - DSCP 12 (Assured Forwarding Class 1,
medium drop probability) n AF13 - DSCP 14 (Assured Forwarding Class 1, high
drop probability) n AF21 - DSCP 18 (Assured Forwarding Class 2, low
drop probability) n AF22 - DSCP 20 (Assured Forwarding Class 2,
medium drop probability) n AF23 - DSCP 22 (Assured Forwarding Class 2, high
drop probability) n AF31 - DSCP 26 (Assured Forwarding Class 3, low
drop probability) n AF32 - DSCP 28 (Assured Forwarding Class 3,
medium drop probability) n AF33 - DSCP 30 (Assured Forwarding Class 3, high
drop probability) n AF41 - DSCP 34 (Assured Forwarding Class 4, low
drop probability) n AF42 - DSCP 36 (Assured Forwarding Class 4,
medium drop probability) n AF43 - DSCP 38 (Assured Forwarding Class 4, high
drop probability) n CS0 - DSCP 0 (Class Selector 0: Default) n CS1 - DSCP 8 (Class Selector 1: Scavenger) n CS2 - DSCP 16 (Class Selector 2: OAM) n CS3 - DSCP 24 (Class Selector 3: Signaling) n CS4 - DSCP 32 (Class Selector 4: Real time) n CS5 - DSCP 40 (Class Selector 5: Broadcast video) n CS6 - DSCP 48 (Class Selector 6: Network control) n CS7 - DSCP 56 (Class Selector 7) n EF - DSCP 46 (Expedited Forwarding)
Specifies an Explicit Congestion Notification value. Range: 0 to 3.
Specifies an IP precedence value. Range: 0 to 7.
Specifies the Type of Service value. Range: 0 to 31.
Specifies a fragment packet.
Specifies VLAN tag to match on. 802.1Q VLAN ID.

ACL commands | 104

Parameter

Description

NOTE: This parameter cannot be used in any ACL that will be applied to a VLAN.

ttl <TTL-VALUE> count log
[<SEQUENCE-NUMBER>] comment <TEXT-STRING>

Specifies a time-to-live (hop limit) value. Range: 0 to 255. Not supported for ACLs.
Keeps the hit counts of the number of packets matching this ACE.
Keeps a log of the number of packets matching this ACE. Works with both permit and deny actions. Works with ACLs applied on ingress, egress, or Control Plane.
Adds a comment to an ACE. The no form removes only the comment from the ACE.

Usage
n If the <IP-PROTOCOL-NUM> parameter is used instead of a protocol name, ensure that any needed ACE-definition parameters specific to the selected protocol are also provided.
n When using multiple ACL types (IPv4, IPv6, or MAC) with logging on the same interface, the first packet that matches an ACE with log option is logged. Until the log-timer wait-period is over, any packets matching other ACL types do not create a log. At the end of the wait-period, the switch creates a summary log for all the ACLs that were matched, regardless of type.
Examples
Creating an IPv4 ACL with four entries:

switch(config)# access-list ip MY_IP_ACL switch(config-acl-ip)# 10 permit udp any 172.16.1.0/24 switch(config-acl-ip)# 20 permit tcp 172.16.2.0/16 gt 1023 any switch(config-acl-ip)# 30 permit tcp 172.26.1.0/24 any syn ack dscp 10 switch(config-acl-ip)# 40 deny any any any count switch(config-acl-ip)# exit

switch(config)# show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL

10 permit

udp

any

172.16.1.0/255.255.255.0

20 permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

30 permit

tcp

172.26.1.0/255.255.255.0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

105

any

dscp: AF11

ack

syn

40 deny

any

any

any

Hit-counts: enabled

Adding a comment to an existing IPv4 ACE:

switch(config)# access-list ip MY_IP_ACL switch(config-acl-ip)# 20 comment Permit all TCP ephemeral ports switch(config-acl-ip)# exit

switch(config)# show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL

10 permit

udp

any

172.16.1.0/255.255.255.0

20 Permit all TCP ephemeral ports

permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

30 permit

tcp

172.26.1.0/255.255.255.0

any

dscp: AF11

ack

syn

40 deny

any

any

any

Hit-counts: enabled

Removing a comment from an existing IPv4 ACE:

switch(config)# access-list ip MY_IP_ACL switch(config-acl-ip)# no 20 comment switch(config-acl-ip)# exit

switch(config)# show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL

10 permit

udp

any

ACL commands | 106

172.16.1.0/255.255.255.0 20 permit
172.16.2.0/255.255.0.0 any 30 permit 172.26.1.0/255.255.255.0 any dscp: AF11 ack syn 40 deny any any Hit-counts: enabled

tcp > 1023
tcp
any

Adding an ACE (insert line 25) to an existing IPv4 ACL:

switch(config)# access-list ip MY_IP_ACL switch(config-acl-ip)# 25 permit icmp 172.16.2.0/16 any switch(config-acl-ip)# exit

switch(config)# show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL

10 permit

udp

any

172.16.1.0/255.255.255.0

20 permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

25 permit

icmp

172.16.2.0/255.255.0.0 any

30 permit

tcp

172.26.1.0/255.255.255.0

any

dscp: AF11

ack

syn

40 deny

any

any

any

Hit-counts: enabled

Replacing an ACE in an existing IPv4 ACL:

switch(config)# access-list ip MY_IP_ACL switch(config-acl-ip)# 25 permit icmp 172.17.1.0/16 any switch(config-acl-ip)# exit

switch(config)# show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

107

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL

10 permit

udp

any

172.16.1.0/255.255.255.0

20 permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

25 permit

icmp

172.17.1.0/255.255.0.0

30 permit

tcp

172.26.1.0/255.255.255.0

any

dscp: AF11

ack

syn

40 deny

any

any

any

Hit-counts: enabled

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL

10 permit

udp

any

172.16.1.0/255.255.255.0

20 permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

25 permit

icmp

172.17.1.0/255.255.0.0

30 permit

tcp

172.26.1.0/255.255.255.0

any

dscp: AF11

ack

syn

40 deny

any

any

any

Hit-counts: enabled

Removing an ACE from an IPv4 ACL:

switch(config)# access-list ip MY_IP_ACL switch(config-acl-ip)# no 25 switch(config-acl-ip)# exit

switch(config)# show access-list

Type

Name

Sequence Comment

Action

Source IP Address

L3 Protocol Source L4 Port(s)

ACL commands | 108

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL

10 permit

udp

any

172.16.1.0/255.255.255.0

20 permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

30 permit

tcp

172.26.1.0/255.255.255.0

any

dscp: AF11

ack

syn

40 deny

any

any

any

Hit-counts: enabled

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL

10 permit

udp

any

172.16.1.0/255.255.255.0

20 permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

30 permit

tcp

172.26.1.0/255.255.255.0

any

dscp: AF11

ack

syn

40 deny

any

any

any

Hit-counts: enabled

Copy an IPv4 ACL:

switch(config)# access-list ip MY_IP_ACL copy MY_IP_ACL2

switch(config)# show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL

10

permit

udp

any

172.16.1.0/255.255.255.0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

109

20

permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

30

permit

tcp

172.26.1.0/255.255.255.0

any

dscp: AF11

ack

syn

40

deny

any

any

any

Hit-counts: enabled

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL2

10

permit

udp

any

172.16.1.0/255.255.255.0

20

permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

30

permit

tcp

172.26.1.0/255.255.255.0

any

dscp: AF11

ack

syn

40

deny

any

any

any

Hit-counts: enabled switch(config)# access-list ip MY_IP_ACL copy MY_

IP_ACL2

switch(config)# show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL

10

permit

udp

any

172.16.1.0/255.255.255.0

20

permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

30

permit

tcp

172.26.1.0/255.255.255.0

any

dscp: AF11

ack

ACL commands | 110

syn

40

deny

any

any

any

Hit-counts: enabled

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL2

10

permit

udp

any

172.16.1.0/255.255.255.0

20

permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

30

permit

tcp

172.26.1.0/255.255.255.0

any

dscp: AF11

ack

syn

40

deny

any

any

any

Hit-counts: enabled

Removing an IPv4 ACL:

switch(config)# no access-list ip MY_IP_ACL

switch(config)# show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL2

1 permit

udp

any

172.16.1.0/255.255.255.0

2 permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

3 permit

tcp

172.26.1.0/255.255.255.0

any

dscp: AF11

ack

syn

4 deny

any

any

any

Hit-counts: enabled

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

111

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.12 10.07 or earlier

Modification Allow ACLs applied to the Control Plane to be logged. --

Command Information

Platforms All platforms

Command context

Authority

config
The access-list ip <ACLNAME> command takes you into the named ACL context where you enter the ACEs.

Administrators or local user group members with execution rights for this command.

access-list ipv6
Syntax to create an IPv6 ACL and enter its context. Plus syntax to remove an ACL: access-list ipv6 <ACL-NAME> no access-list ipv6 <ACL-NAME>
Syntax (within the ACL context) for creating or removing ACEs for protocols ah, gre, esp, ospf, pim (ipv6 is available as an alias for any):
[<SEQUENCE-NUMBER>] {permit|deny} {any|ipv6|ah|gre|esp|ospf|pim|<IP-PROTOCOL-NUM>} {any|<SRC-IP-ADDRESS>[/<PREFIX-LENGTH>]|<ADDRESS-GROUP>} {any|<DST-IP-ADDRESS>[/<PREFIX-LENGTH>]|<ADDRESS-GROUP>} [dscp <DSCP-SPECIFIER>] [ecn <ECN-VALUE>] [ip-precedence <IP-PRECEDENCE-VALUE>] [tos <TOS-VALUE>] [fragment] [vlan <VLAN-ID>] [ttl <TTL-VALUE>] [count] [log]
no <SEQUENCE-NUMBER>
Syntax (within the ACL context) for creating or removing ACEs for protocols sctp, tcp, udp: [<SEQUENCE-NUMBER>] {permit|deny} {sctp|tcp|udp} {any|<SRC-IP-ADDRESS>[/<PREFIX-LENGTH>}]|<ADDRESS-GROUP>} [{eq|gt|lt} <PORT>|range <MIN-PORT> <MAX-PORT>|group <PORT-GROUP>] {any|<DST-IP-ADDRESS>[/<PREFIX-LENGTH>]|<ADDRESS-GROUP>} [{eq|gt|lt} <PORT>|range <MIN-PORT> <MAX-PORT>|group <PORT-GROUP>] [urg] [ack] [psh] [rst] [syn] [fin] [established] [dscp <DSCP-SPECIFIER>] [ecn <ECN-VALUE>] [ip-precedence <IP-PRECEDENCE-VALUE>] [tos <TOS-VALUE>] [fragment] [vlan <VLAN-ID>] [ttl <TTL-VALUE>] [count] [log]
no <SEQUENCE-NUMBER>
Syntax (within the ACL context) for creating or removing ACEs for protocol icmpv6: [<SEQUENCE-NUMBER>] {permit|deny} {icmpv6}

ACL commands | 112

{any|<SRC-IP-ADDRESS>[/<PREFIX-LENGTH>]|<ADDRESS-GROUP>} {any|<DST-IP-ADDRESS>[/<PREFIX-LENGTH>]|<ADDRESS-GROUP>} [icmp-type {echo|echo-reply|<ICMP-TYPE-VALUE>}] [icmp-code <ICMP-CODE-VALUE>] [dscp <DSCP-SPECIFIER>][ecn <ECN-VALUE>] [ip-precedence <IP-PRECEDENCE-VALUE>] [tos <TOS-VALUE>] [fragment] [vlan <VLAN-ID>] [ttl <TTL-VALUE>] [count] [log]
no <SEQUENCE-NUMBER> Syntax (within the ACL context) for ACE comments:
[<SEQUENCE-NUMBER>] comment <TEXT-STRING>
no <SEQUENCE-NUMBER> comment
Description
Creates an IPv6 Access Control List (ACL). The ACL is made of one or more Access Control Entries (ACEs) ordered and prioritized by sequence number. The lowest sequence number is the highest prioritized ACE. The no form of this command deletes the entire ACL, or deletes an ACE identified by sequence number, or deletes only the comment from the ACE identified by sequence number.

Parameter <ACL-NAME> <SEQUENCE-NUMBER> {permit|deny} <IP-PROTOCOL-NUM> {any|<SRC-IP-ADDRESS>[/<PREFIXLENGTH>]|<ADDRESS-GROUP>}
{any|<DST-IP-ADDRESS>[/<PREFIXLENGTH>]|<ADDRESS-GROUP>}

Description
Specifies the name of this ACL.
Specifies a sequence number for the ACE. Range: 1 to 4294967295.
Specifies whether to permit or deny traffic matching this ACE.
Specifies the protocol as its Internet Protocol number. For example, 2 corresponds to the IGMP protocol. Range: 0 to 255.
Specifies the source IPv6 address. n any - specifies any source IPv6 address. n <SRC-IP-ADDRESS> - specifies the source IPv6 host
address. o <PREFIX-LENGTH> - specifies the address bits to
mask (CIDR subnet mask notation). Range: 1 to 128. n <ADDRESS-GROUP> - specifies an IPv6 address group that you defined earlier with object-group ipv6 address.
Specifies the destination IPv6 address. n any - specifies any destination IPv6 address. n <DST-IP-ADDRESS> - specifies the destination IPv6
host address. o <PREFIX-LENGTH> - specifies the address bits to
mask (CIDR subnet mask notation). Range: 1 to 128. n <ADDRESS-GROUP> - specifies an IPv6 address group that you defined earlier with objectgroup ipv6 address.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

113

Parameter [{eq|gt|lt} <PORT>|range <MIN-PORT><MAXPORT>|group <PORT-GROUP>]
urg, ack, psh, rst, syn, fin, established [icmp-type {echo|echo-reply|<ICMP-TYPEVALUE>}]
[icmp-code <ICMP-CODE-VALUE>] dscp DSCP-SPECIFIER>

Description
Specifies the port, port range, or port group. Port numbers are in the range of 0 to 65535. n eq <PORT> - specifies the Layer 4 port. n gt <PORT> - specifies any Layer 4 port greater
than the indicated port. n lt <PORT> - specifies any Layer 4 port less than the
indicated port. n range <MIN-PORT> <MAX-PORT> - specifies the
Layer 4 port range. n group <PORT-GROUP> - specifies the Layer 4 port
group that you defined earlier with objectgroup port.
NOTE: Upon application of the ACL, ACEs with L4 port ranges may consume more than one hardware entry.
These TCP flag-matching parameters are supported for both ingress and egress.
Specifies the ICMP type. n echo - specifies an ICMP echo request packet. n echo-reply - specifies an ICMP echo reply packet. n <ICMP-TYPE-VALUE> - specifies an ICMP type
value. Range: 0 to 255.
Specifies the ICMP code value. Range: 0 to 255.
Specifies the Differentiated Services Code Point (DSCP), either a numeric <DSCP-VALUE> (0 to 63) or one of these keywords: n AF11 - DSCP 10 (Assured Forwarding Class 1, low
drop probability) n AF12 - DSCP 12 (Assured Forwarding Class 1,
medium drop probability) n AF13 - DSCP 14 (Assured Forwarding Class 1, high
drop probability) n AF21 - DSCP 18 (Assured Forwarding Class 2, low
drop probability) n AF22 - DSCP 20 (Assured Forwarding Class 2,
medium drop probability) n AF23 - DSCP 22 (Assured Forwarding Class 2, high
drop probability) n AF31 - DSCP 26 (Assured Forwarding Class 3, low
drop probability) n AF32 - DSCP 28 (Assured Forwarding Class 3,
medium drop probability) n AF33 - DSCP 30 (Assured Forwarding Class 3, high
drop probability) n AF41 - DSCP 34 (Assured Forwarding Class 4, low
drop probability)

ACL commands | 114

Parameter
ecn <ECN-VALUE> ip-precedence <IP-PRECEDENCE-VALUE> tos <TOS-VALUE> fragment vlan <VLAN-ID>

Description
n AF42 - DSCP 36 (Assured Forwarding Class 4, medium drop probability)
n AF43 - DSCP 38 (Assured Forwarding Class 4, high drop probability)
n CS0 - DSCP 0 (Class Selector 0: Default) n CS1 - DSCP 8 (Class Selector 1: Scavenger) n CS2 - DSCP 16 (Class Selector 2: OAM) n CS3 - DSCP 24 (Class Selector 3: Signaling) n CS4 - DSCP 32 (Class Selector 4: Real time) n CS5 - DSCP 40 (Class Selector 5: Broadcast video) n CS6 - DSCP 48 (Class Selector 6: Network control) n CS7 - DSCP 56 (Class Selector 7) n EF - DSCP 46 (Expedited Forwarding)
Specifies an Explicit Congestion Notification value. Range: 0- 3.
Specifies an IP precedence value. Range: 0-7.
Specifies the Type of Service value. Range: 0-31.
Specifies a fragment packet.
Specifies VLAN tag to match on. 802.1Q VLAN ID.
NOTE: This parameter cannot be used in any ACL that will be applied to a VLAN.

ttl <TTL-VALUE> count log
[<SEQUENCE-NUMBER>] comment <TEXT-STRING>

Not supported.
Keeps the hit counts of the number of packets matching this ACE.
Keeps a log of the number of packets matching this ACE. Works with both permit and deny actions. Works with ACLs applied on ingress, egress, or Control Plane.
Adds a comment to an ACE. The no form removes only the comment from the ACE.

Usage
n If the <IP-PROTOCOL-NUM> parameter is used instead of a protocol name, ensure that any needed ACE-definition parameters specific to the selected protocol are also provided.
n When using multiple ACL types (IPv4, IPv6, or MAC) with logging on the same interface, the first packet that matches an ACE with log option is logged. Until the log-timer wait-period is over, any packets matching other ACL types do not create a log. At the end of the wait-period, the switch creates a summary log all the ACLs that were matched, regardless of type.
Examples
Creating an IPv6 ACL with four entries:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

115

switch(config)# access-list ipv6 MY_IPV6_ACL switch(config-acl-ipv6)# 10 permit udp any 2001::1/64 switch(config-acl-ipv6)# 20 permit tcp 2001:2001::2:1/128 gt 1023 any switch(config-acl-ipv6)# 30 permit tcp 2001:2011::1/64 any switch(config-acl-ipv6)# 40 deny any any any count switch(config-acl-ipv6)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_ACL

10 permit

udp

any

2001::1/64

20 permit

tcp

2001:2001::2:1

> 1023

any

30 permit

tcp

2001:2011::1/64

any

40 deny

any

any

any

Hit-counts: enabled

Adding a comment to an existing IPv6 ACE:

switch(config)# access-list ipv6 MY_IPV6_ACL switch(config-acl-ipv6)# 20 comment Permit all TCP ephemeral ports switch(config-acl-ipv6)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_ACL

10 permit

udp

any

2001::1/64

20 Permit all TCP ephemeral ports

permit

tcp

2001:2001::2:1

> 1023

any

30 permit

tcp

2001:2011::1/64

any

40 deny

any

any

any

Hit-counts: enabled

Removing a comment from an existing IPv6 ACE:

ACL commands | 116

switch(config)# access-list ipv6 MY_IPV6_ACL switch(config-acl-ipv6)# no 20 comment switch(config-acl-ipv6)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_ACL

10 permit

udp

any

2001::1/64

20 permit

tcp

2001:2001::2:1

> 1023

any

30 permit

tcp

2001:2011::1/64

any

40 deny

any

any

any

Hit-counts: enabled

Adding an ACE to an existing IPv6 ACL:

switch(config)# access-list ipv6 MY_IPV6_ACL switch(config-acl-ipv6)# 25 permit icmpv6 2001::1/64 any switch(config-acl-ipv6)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_ACL

10 permit

udp

any

2001::1/64

20 permit

tcp

2001:2001::2:1

> 1023

any

25 permit

icmpv6

2001::1/64

any

30 permit

tcp

2001:2011::1/64

any

40 deny

any

any

any

Hit-counts: enabled

Replacing an ACE in an existing IPv6 ACL:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

117

switch(config)# access-list ipv6 MY_IPV6_ACL switch(config-acl-ipv6)# 25 permit icmpv6 2001::2:1/64 any switch(config-acl-ipv6)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_ACL

10 permit

udp

any

2001::1/64

20 permit

tcp

2001:2001::2:1

> 1023

any

25 permit

icmpv6

2001::2:1/64

any

30 permit

tcp

2001:2011::1/64

any

40 deny

any

any

any

Hit-counts: enabled

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_ACL

10 permit

udp

any

2001::1/64

20 permit

tcp

2001:2001::2:1

> 1023

any

25 permit

icmpv6

2001::2:1/64

any

30 permit

tcp

2001:2011::1/64

any

40 deny

any

any

any

Hit-counts: enabled

Removing an ACE from an IPv6 ACL:

switch(config)# access-list ipv6 MY_IPV6_ACL switch(config-acl-ipv6)# no 25 switch(config-acl-ipv6)# exit

ACL commands | 118

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_ACL

10 permit

udp

any

2001::1/64

20 permit

tcp

2001:2001::2:1

> 1023

any

30 permit

tcp

2001:2011::1/64

any

40 deny

any

any

any

Hit-counts: enabled

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_ACL

10 permit

udp

any

2001::1/64

20 permit

tcp

2001:2001::2:1

> 1023

any

30 permit

tcp

2001:2011::1/64

any

40 deny

any

any

any

Hit-counts: enabled

Removing an IPv6 ACL:

switch(config)# no access-list ipv6 MY_IPV6_ACL

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_ACL2

1 permit

udp

any

2001::1/64

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

119

2 Permit all TCP ephemeral ports permit 2001:2001::2:1 any
3 permit 2001:2011::1/64 any
4 deny any any Hit-counts: enabled

tcp > 1023
tcp
any

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.12 10.07 or earlier

Modification Allow ACLs applied to the Control Plane to be logged. --

Command Information

Platforms All platforms

Command context

Authority

config
The access-list ipv6 <ACL-NAME> command takes you into the named ACL context where you enter the ACEs.

Administrators or local user group members with execution rights for this command.

access-list log-timer
access-list log-timer {default|<INTERVAL>}
Description
Sets the log timer interval for all ACEs that have the log parameter configured.

Parameter default <INTERVAL>

Description Resets the log timer to its default 300 seconds. Specifies the log timer interval in seconds. Range: 5 to 300.

Usage
n ACL logging keeps a log of the number of packets matching this ACE. Works with both permit and deny actions. Works with ACLs applied on ingress, egress, or Control Plane.

ACL commands | 120

n The first packet that matches an ACE with the log parameter within an ACL log timer window (configured with the access-list log-timer command) has its header contents extracted and sent to the configured logging destination, such as the console and syslog server. Each time the ACL log timer expires, a summary of all ACEs with log configured are sent to the logging destination. This capability allows throttling of logging ACL hits.
n If no further log messages are generated in the wait-period, the switch suspends the timer and resets itself to log as soon as a new match occurs.
n When using multiple ACL types (IPv4, IPv6, or MAC) with logging on the same interface, the first packet that matches an ACE with the log option is logged. Any packets, matching other ACL types, do not create a log until the log-timer wait-period is over. At the end of the wait-period, a summary log is made of all the ACLs that were matched, regardless of type.
Remarked ACL traffic may lose logging information when a QoS action or a classifier policy with remark is enabled. A classifier policy with remark takes precedence over QoS actions and QoS actions takes precedence over ACL remarked traffic.
n You may see a minor discrepancy between the ACL logging statistics and the hit counts statistics due to the time required to record the log message.
Examples
Although these examples use debug logging, you can alternatively use event logging.
On the 6400 Switch Series, interface identification differs. Enabling debug logging for the ACL logging module:

switch# debug acl log severity info

switch# show debug

----------------------------------------------------------------

module sub_module severity vlan port ip

mac instance vrf

----------------------------------------------------------------

acl acl_log info

----- ----- ----- ---- ----- ---

Setting the debug destination to console with the minimum security level of info:

switch# debug destination console severity info switch# show debug destination ---------------------------------------------------------------------
show debug destination --------------------------------------------------------------------CONSOLE:info

Setting the access list log-timer to 30 seconds:

switch(config)# access-list log-timer 30 switch(config)# do show access-list log-timer ACL log timer length (frequency): 30 seconds

Creating an IPv4 ACL with one entry with the log parameter:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

121

switch(config)# access-list ip MY_IP_ACL

switch(config-acl-ip)# deny icmp 1.1.1.1 1.1.1.2 log

switch(config-acl-ip)# do show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL

10 deny

icmp

1.1.1.1

1.1.1.2

Logging: enabled

Hit-counts: enabled

Enabling interface 1/1/1 and applying the ACL:

switch(config)# interface 1/1/1 switch(config-if)# no shutdown switch(config-if)# no routing switch(config-if)# apply access-list ip MY_IP_ACL in switch(config-if)# do show running-config interface 1/1/1 interface 1/1/1
no shutdown apply access-list ip MY_IP_ACL in no routing vlan access 1 exit

Sending packets that will match the ACE and observe the ACL logging message on the console:

2017-10-10T20:13:36.044+00:00 ops-switchd[875]: debug|LOG_INFO|AMM|1/5|ACL|ACL_ LOG| List MY_IP_ACL, seq# 10 denied icmp 1.1.1.1 -> 1.1.1.2 type 8 code 0, on vlan 1, port 1/1/1, direction in

When the access list log-timer expires, the summary message is printed on the console. The number 30 is the number of packets received during the last access list log-timer window.

2017-10-10T20:14:06.051+00:00 ops-switchd[875]: debug|LOG_INFO|AMM|1/5|ACL|ACL_ LOG| MY_IP_ACL on 1/1/1 (in): 30 10 deny icmp 1.1.1.1 1.1.1.2 log count

Resetting the ACL log timer to the default value:

switch(config)# access-list log-timer default

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.
Command History

ACL commands | 122

Release 10.12 10.09 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Allow ACLs applied to the Control Plane to be logged. <INTERVAL> parameter range changed to 5 to 300. Was 30 to 300. --
Authority Administrators or local user group members with execution rights for this command.

access-list mac
access-list mac <ACL-NAME> no access-list mac <ACL-NAME>

[<SEQUENCE-NUMBER>] {permit|deny} {any|<SRC-MAC-ADDRESS>[/<ETHERNET-MASK>}]} {any|<DST-MAC-ADDRESS>[/<ETHERNET-MASK>}]} {any|aarp|appletalk|arp|fcoe|fcoe-init|ip|ipv6|
ipx-arpa|ipx-non-arpa|is-is|lldp|mpls-multicast|mpls-unicast|q-in-q| rbridge|trill|wake-on-lan|<NUMERIC-ETHERTYPE>} [pcp <PCP-VALUE>] [vlan <VLAN-ID>] [count] [log] no <SEQUENCE-NUMBER>

[<SEQUENCE-NUMBER>] comment <TEXT-STRING> no <SEQUENCE-NUMBER> comment
Description
Creates a MAC Access Control List (ACL). The ACL is made of one or more Access Control Entries (ACEs) ordered and prioritized by sequence numbers. The lowest sequence number is the highest prioritized ACE. The no form of this command deletes the entire ACL, or deletes an ACE identified by sequence number, or deletes only the comment from the ACE identified by sequence number.

Parameter <ACL-NAME> <SEQUENCE-NUMBER>
{permit|deny} comment {any|<SRC-MAC-ADDRESS>

Description Specifies the name of this ACL. Specifies a sequence number for the ACE. Range: 1 to 4294967295. Specifies whether to permit or deny traffic matching this ACE. Specifies storing the remaining entered text as an ACE comment. Specifies the source host MAC address (xxxx.xxxx.xxxx), OUI, or

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

123

Parameter [/<ETHERNET-MASK>}]} {any|<DST-MAC-ADDRESS> [/<ETHERNET-MASK>}]} {any|aarp|appletalk| ... |wakeon-lan|<NUMERIC-ETHERTYPE>
pcp <PCP-VALUE> vlan <VID> count log
Usage

Description
the keyword any. You can optionally include the following: <ETHERNET-MASK> - The address bits to mask (xxxx.xxxx.xxxx).
Specifies the destination host MAC address (xxxx.xxxx.xxxx), OUI, or the keyword any. You can optionally include the following: <ETHERNET-MASK> - The address bits to mask (xxxx.xxxx.xxxx).
Specifics the protocol encapsulated in the Ethernet frame. The encapsulated protocol is identified by the EtherType Ethernet field. The EtherType is specified in one of the following three ways: n any - any EtherType. n <NUMERIC-ETHERTYPE> - the numerical EtherType protocol
number. Range: 0x600 to 0xffff. n One of these EtherType protocol name keywords:
o aarp o appletalk o arp o fcoe o fcoe-init o ip o ipv6 o ipx-arpa o ipx-non-arpa o is-is o lldp o mpls-multicast o mpls-unicast o q-in-q o rbridge o trill o wake-on-lan
Specifies 802.1Q QoS Priority Code Point value. Range: 0 to 7.
Specifies a VLAN ID. The VLAN ID must exist.
NOTE: This parameter cannot be used in any ACL that will be applied to a VLAN.
Keeps the hit counts of the number of packets matching this ACE.
Keeps a log of the number of packets matching this ACE. Works with both permit and deny actions. Works with ACLs applied on ingress or egress.

ACL commands | 124

When using multiple ACL types (IPv4, IPv6, or MAC) with logging on the same interface, the first packet that matches an ACE with log option is logged. Until the log-timer wait-period is over, any packets matching other ACL types do not create a log. At the end of the wait-period, the switch creates a summary log all the ACLs that were matched, regardless of type.
Examples
Creating a MAC ACL with four entries:

switch(config)# access-list mac MY_MAC_ACL switch(config-acl-ip)# 10 permit 1122.3344.5566/ffff.ffff.0000 any ipv6 switch(config-acl-ip)# 20 permit aaaa.bbbb.cccc 1111.2222.3333 any pcp 4 switch(config-acl-ip)# 30 permit any any appletalk vlan 40 switch(config-acl-ip)# 40 deny any any any count switch(config-acl-ip)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_ACL

10 permit

ipv6

1122.3344.5566/ffff.ffff.0000

any

20 permit

any

aaaa.bbbb.cccc

1111.2222.3333

QoS Priority Code Point: 4

30 permit

appletalk

any

any

VLAN: 40

40 deny

any

any

any

Hit-counts: enabled

Adding a comment to an existing MAC ACE:

switch(config)# access-list mac MY_MAC_ACL switch(config-acl-ip)# 30 comment Permit all vlan-40 tagged Appletalk traffic switch(config-acl-ip)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_ACL

10 permit

ipv6

1122.3344.5566/ffff.ffff.0000

any

20 permit

any

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

125

aaaa.bbbb.cccc

1111.2222.3333

QoS Priority Code Point: 4

30 Permit all vlan-40 tagged Appletalk traffic

permit

appletalk

any

any

VLAN: 40

40 deny

any

any

any

Hit-counts: enabled

Removing a comment from an existing MAC ACE:

switch(config)# access-list mac MY_MAC_ACL switch(config-acl-mac)# no 30 comment switch(config-acl-mac)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_ACL

10 permit

ipv6

1122.3344.5566/ffff.ffff.0000

any

20 permit

any

aaaa.bbbb.cccc

1111.2222.3333

QoS Priority Code Point: 4

30 permit

appletalk

any

any

VLAN: 1

40 deny

any

any

any

Hit-counts: enabled

Adding an ACE to an existing MAC ACL:

switch(config)# access-list mac MY_MAC_ACL switch(config-acl-ip)# 35 permit any aabb.cc11.1234 0xffee switch(config-acl-ip)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_ACL

ACL commands | 126

10 permit 1122.3344.5566/ffff.ffff.0000 any
20 permit aaaa.bbbb.cccc 1111.2222.3333 QoS Priority Code Point: 4
30 permit any any VLAN: 1
35 permit any aabb.cc11.1234
40 deny any any Hit-counts: enabled

ipv6 any appletalk 0xffee any

Replacing an ACE in an existing MAC ACL:

switch(config)# access-list mac MY_MAC_ACL switch(config-acl-ip)# 35 permit any aabb.cc11.1234 0xeeee switch(config-acl-ip)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_ACL

10 permit

ipv6

1122.3344.5566/ffff.ffff.0000

any

20 permit

any

aaaa.bbbb.cccc

1111.2222.3333

QoS Priority Code Point: 4

30 permit

appletalk

any

any

VLAN: 1

35 permit

0xeeee

any

aabb.cc11.1234

40 deny

any

any

any

Hit-counts: enabled

Removing an ACE from an MAC ACL:

switch(config)# access-list mac MY_MAC_ACL switch(config-acl-ip)# no 35 switch(config-acl-ip)# exit

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

127

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_ACL

10 permit

ipv6

1122.3344.5566/ffff.ffff.0000

any

20 permit

any

aaaa.bbbb.cccc

1111.2222.3333

QoS Priority Code Point: 4

30 permit

appletalk

any

any

VLAN: 1

40 deny

any

any

any

Hit-counts: enabled

Removing a MAC ACL:

switch(config)# no access-list mac MY_MAC_ACL

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_ACL2

1 permit

ipv6

1122.3344.5566/ffff.ffff.0000

any

2 permit

any

aaaa.bbbb.cccc

1111.2222.3333

QoS Priority Code Point: 4

3 Permit all vlan-40 tagged Appletalk traffic

permit

appletalk

any

any

VLAN: 1

4 deny

any

any

any

Hit-counts: enabled

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.
Command History

ACL commands | 128

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

config
The access-list mac <ACL-NAME> command takes you into the named ACL context where you enter the ACEs.

Administrators or local user group members with execution rights for this command.

access-list resequence
access-list {ip|ipv6|mac} <ACL-NAME> resequence <STARTING-SEQUENCE-NUMBER> <INCREMENT>
Description
Resequences the ACE sequence numbers in an ACL.

Parameter {ip|ipv6|mac} <ACL-NAME> <STARTING-SEQUENCE-NUMBER> <INCREMENT>

Description Specifies the ACL type. Specifies the ACL name. Specifies the starting sequence number. Specifies the sequence number increment.

Examples
Resequencing an IPv4 ACL to start at 1 with an increment of 1:

switch(config)# access-list ip MY_IP_ACL resequence 1 1 switch(config-acl-ip)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_ACL

1 permit

udp

any

172.16.1.0/255.255.255.0

2 permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

3 permit

tcp

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

129

172.26.1.0/255.255.255.0

any

dscp: AF11

ack

syn

4 deny

any

any

any

Hit-counts: enabled

Resequencing an IPv6 ACL to start at 1 with an increment of 1:

switch(config)# access-list ipv6 MY_IPV6_ACL resequence 1 1 switch(config-acl-ip)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_ACL

1 permit

udp

any

2001::1/64

2 Permit all TCP ephemeral ports

permit

tcp

2001:2001::2:1

> 1023

any

3 permit

tcp

2001:2011::1/64

any

4 deny

any

any

any

Hit-counts: enabled

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_ACL

1 permit

udp

any

2001::1/64

2 Permit all TCP ephemeral ports

permit

tcp

2001:2001::2:1

> 1023

any

3 permit

tcp

2001:2011::1/64

any

4 deny

any

any

any

Hit-counts: enabled

Resequencing a MAC ACL to start at 1 with an increment of 1:

ACL commands | 130

switch(config)# access-list mac MY_MAC_ACL resequence 1 1 switch(config-acl-mac)# exit

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_ACL

1 permit

ipv6

1122.3344.5566/ffff.ffff.0000

any

2 permit

any

aaaa.bbbb.cccc

1111.2222.3333

QoS Priority Code Point: 4

3 Permit all vlan-40 tagged Appletalk traffic

permit

appletalk

any

any

VLAN: 1

4 deny

any

any

any

Hit-counts: enabled

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

access-list reset
access-list {all|ip <ACL-NAME>|ipv6 <ACL-NAME>|mac <ACL-NAME>} reset
Description
Changes the user-specified ACL configuration to match the active ACL configuration. Use this command when a discrepancy exists between what the user configured and what is active and accepted by the system.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

131

Parameter all|ip ACL-NAME>|ipv6 <ACL-NAME>|mac <ACL-NAME>

Description
Specifies one of the following: n a reset of all ACLs. n a reset of a named IPv4 ACL. n a reset of a named IPv6 ACL. n a reset of a named MAC ACL.

Usage
The output of the show access-list command displays the active configuration of the product. The active configuration is the ACLs that have been configured and accepted by the system. The output of the show access-list command with the configuration parameter, displays the ACLs that have been configured. The output of this command may not be the same as what was programmed in hardware or what is active on the product. If the active ACLs and user-configured ACLs are not the same, a warning message is displayed in the output of the show command. Modify the user-configured ACL until the warning message is no longer displayed or run the access-list reset command to change the user-specified configuration to match the active configuration.
Examples
On the 6400 Switch Series, interface identification differs. Apply an ACL with TCP acknowledgments (ACKs) on ingress, which is unsupported by hardware:

switch(config-acl)# 10 permit tcp 172.16.2.0/16 any ack

Displaying the user-specified configuration:

switch(config)# do show access-list commands ! access-list ip TEST_ACL user configuration does not match active configuration. ! run 'access-list TYPE NAME reset' to reset access-list to match active configuration. access-list ip TEST_ACL ! access-list ip TEST_ACL user configuration does not match active configuration. ! run 'access-list TYPE NAME reset' to reset access-list to match active configuration. interface 1/1/1
apply access-list ip TEST_ACL in

switch(config)# do show access-list commands configuration ! access-list ip TEST_ACL user configuration does not match active configuration. ! run 'access-list TYPE NAME reset' to reset access-list to match active configuration. access-list ip TEST_ACL
10 permit tcp 172.16.2.0/255.255.0.0 any ack ! access-list ip TEST_ACL user configuration does not match active configuration. ! run 'access-list TYPE NAME reset' to reset access-list to match active configuration. interface 1/1/1
apply access-list ip TEST_ACL in

switch(config)# do show access-list

Type

Name

Sequence Comment

ACL commands | 132

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

% Warning: TEST_ACL user configuration does not match active configuration.

%

run 'access-list TYPE NAME reset' to reset access-list to match active

configuration.

IPv4

TEST_ACL

switch(config)# do show access-list configuration

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

% Warning: TEST_ACL user configuration does not match active configuration.

%

run 'access-list TYPE NAME reset' to reset access-list to match active

configuration.

IPv4

TEST_ACL

10

permit

tcp

172.16.2.0/255.255.0.0

any

ack

! access-list ip TEST_ACL user configuration does not match active configuration. ! run 'access-list TYPE NAME reset' to reset access-list to match active configuration. access-list ip TEST_ACL ! access-list ip TEST_ACL user configuration does not match active configuration. ! run 'access-list TYPE NAME reset' to reset access-list to match active configuration. interface 1/1/1
apply access-list ip TEST_ACL in

switch(config)# do show access-list commands configuration ! access-list ip TEST_ACL user configuration does not match active configuration. ! run 'access-list TYPE NAME reset' to reset access-list to match active configuration. access-list ip TEST_ACL
10 permit tcp 172.16.2.0/255.255.0.0 any ack ! access-list ip TEST_ACL user configuration does not match active configuration. ! run 'access-list TYPE NAME reset' to reset access-list to match active configuration. interface 1/1/1
apply access-list ip TEST_ACL in

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

% Warning: TEST_ACL user configuration does not match active configuration.

%

run 'access-list TYPE NAME reset' to reset access-list to match active

configuration.

IPv4

TEST_ACL

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

133

switch(config)# do show access-list configuration

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

% Warning: TEST_ACL user configuration does not match active configuration.

%

run 'access-list TYPE NAME reset' to reset access-list to match active

configuration.

IPv4

TEST_ACL

10

permit

tcp

172.16.2.0/255.255.0.0

any

ack

Resetting the user-specified configuration to match the active configuration.

switch(config)# access-list ip TEST_ACL reset

Displaying the updated user-specified configuration.

switch(config)# do show access-list commands access-list ip TEST_ACL interface 1/1/1
apply access-list ip TEST_ACL in

switch(config)# do show access-list commands configuration access-list ip TEST_ACL interface 1/1/1
apply access-list ip TEST_ACL in

switch(config)# do show access-list

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

TEST_ACL

switch(config)# do show access-list configuration

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

TEST_ACL

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

ACL commands | 134

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

access-list secure-update
access-list secure-update no access list secure-update
Description
This command determines if access lists are updated using the secure-update feature. Secure-update is enabled by default. When secure-update is enabled and an ACL is updated or replaced, one or more override entries are installed in the TCAM table(s) containing the ACL that is being modified. As a result, all traffic of the same type as the currently configured ACL will be denied on the interfaces to which the ACL is applied. This ensures that traffic is not temporarily allowed while modifying an ACL. Upon completion of the update, the TCAM override entries are uninstalled and traffic resumes ACL matching. The no version of this command disables this feature. If secure-update is disabled, there will be no override entry installed. This results in the faster modification of an ACL and ensures that there is no interruption to previously permitted traffic, but may temporarily allow previously denied traffic to pass through the switch. Once the ACL has been modified, traffic will be processed by the updated ACL.
Examples
Disabling secure-update:
switch(config)# no access-list secure-update
Reenabling secure-update:
switch(config)# access-list secure-update

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.
Related Commands

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

135

Command vsx-sync acl-secure-update

Command History
Release 10.13

Command Information

Platforms All platforms

Command context config

Description If this setting is enabled and the primary VSX node has configurations with the access list secure-update feature enabled, this configuration can synchronize to the secondary peer. This setting is disabled by default. Refer to the Virtual Switching Extension (VSX) Guide for details.
Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

apply access-list control-plane
apply access-list {ip|ipv6} <ACL-NAME> control-plane vrf <VRF-NAME> no apply access-list {ip|ipv6} <ACL-NAME> control-plane vrf <VRF-NAME>
Description
Applies an ACL to the specified VRF. The no form of this command removes application of the ACL from the specified VRF.

Parameter ip|ipv6 <ACL-NAME> vrf <VRF-NAME>

Description Specifies the ACL type: ip for IPv4, oripv6 for IPv6. Specifies the ACL name. Specifies the VRF name.

Usage
Only one ACL per type (ip, or ipv6) may be applied to a Control Plane VRF at a time. Therefore, using the apply access-list control-plane command on a VRF with an already-applied ACL of the same type, will replace the applied ACL.
Examples
Applying My_ip_ACL to Control Plane traffic on the default VRF:

switch(config)# apply access-list ip My_ip_ACL control-plane vrf default

ACL commands | 136

Replacing My_ip_ACL with My_Replacement_ACL on the default VRF:
switch(config)# apply access-list ip My_Replacement_ACL control-plane vrf default
Remove (unapply) the My_Replacement_ACL from the default VRF. Any other interfaces or VLANs with My_Replacement_ACL applied are unaffected.
switch(config)# no apply access-list ip My_Replacement_ACL control-plane vrf default

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

apply access-list (to interface or LAG)
no apply access-list {ip | ipv6 | mac} <ACL-NAME> {in | out}
Description
Applies an ACL to the interface (Individual front plane port) or Link Aggregation Group (LAG) identified by the current interface or LAG context. The no form of this command removes application of the ACL from the current interface or LAG identified by the current interface or LAG context.

Parameter ip|ipv6|mac
<ACL-NAME> in out

Description Specifies the ACL type: ip for IPv4, ipv6 for IPv6, or mac for MAC ACL. Specifies the ACL name. Selects the inbound (ingress) traffic direction.
Selects the outbound (egress) traffic direction.

Usage

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

137

n Each ACL of a given type can be applied to the same interface or LAG once in each direction. Therefore, using the apply access-list command on an interface or LAG with an already-applied ACL of the same typewill replace the currently applied ACL.
n An ACL can be applied to an individual front plane port or to a Link Aggregation Group (LAG). n A port that is a member of a LAG with an applied ACL cannot have a different ACL applied to that
member port. n When the port membership of a LAG with an applied ACL is changed, the LAG ACL is automatically
applied or removed from that port depending on the modification type.
Examples
On the 6400 Switch Series, interface identification differs. Applying My_IP_ACL to ingress traffic on interface range 1/1/10 to 1/1/12:
switch(config)# int 1/1/10-1/1/12 switch((config-if-<1/1/10-1/1/12>)# apply access-list ip My_IP_ACL in switch((config-if-<1/1/10-1/1/12>)# exit
Applying MY_IP_ACL to ingress traffic on LAG 100 and egress traffic on interface 1/1/2:
switch(config)# interface lag 100 switch(config-lag-if)# apply access-list ip MY_IP_ACL in switch(config-lag-if)# exit switch(config)# interface 1/1/2 switch(config-if)# apply access-list ip MY_IP_ACL out switch(config-if)# exit switch(config)#
Applying MY_IPV6_ACL to ingress traffic on interface 1/1/1 and to ingress traffic on LAG 100:
switch(config)# interface 1/1/1 switch(config-if)# apply access-list ipv6 MY_IPV6_ACL in switch(config-if)# exit switch(config)# interface lag 100 switch(config-lag-if)# apply access-list ipv6 MY_IPV6_ACL in switch(config-lag-if)# exit switch(config)#
Applying MY_MAC_ACL to ingress traffic on interface 1/1/1 and ingress traffic on interface 1/1/2:
switch(config)# interface 1/1/1 switch(config-if)# apply access-list mac MY_MAC_ACL in switch(config-if)# exit switch(config)# interface 1/1/2 switch(config-if)# apply access-list mac MY_MAC_ACL in switch(config-if)# exit switch(config)#
ACL commands | 138

Replacing MY_IP_ACL with MY_REPLACEMENT_ACL on interface 1/1/2:
switch(config)# interface 1/1/2 switch(config-if)# apply access-list ip MY_REPLACEMENT_ACL out switch(config-if)# exit switch(config)#
Unapplying MY_REPLACEMENT_ACL from interface 1/1/2 (out):
switch(config)# interface 1/1/2 switch(config-if)# no apply access-list ip MY_REPLACEMENT_ACL out switch(config-if)# exit switch(config)#

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

apply access-list (to interface VLAN)
apply access-list {ip|ipv6} <ACL-NAME> {routed-in|routed-out} no apply access-list {ip|ipv6} <ACL-NAME> {routed-in|routed-out}
Description
Applies an ACL to the interface VLAN (or range of interface VLANs) identified by the current interface VLAN context. Using the apply access-list command on an interface VLAN interface with an alreadyapplied ACL of the same direction and type will replace the currently-applied ACL. The no form of this command removes application of the ACL from the interface VLAN (or range of interface VLANs) identified by the current interface VLAN context.

Parameter ip|ipv6 <ACL-NAME> routed-in

Description Specifies the ACL type: ip for IPv4, ipv6 for IPv6. Specifies the ACL name. Selects the routed inbound (routed ingress) traffic direction.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

139

Parameter routed-out

Description Selects the routed outbound (routed egress) traffic direction.

Usage
n Each ACL of a given type can be applied to the same interface VLAN once in each direction. Therefore, using the apply access-list command on an interface VLAN with an already-applied ACL of the same direction and type, will replace the applied ACL.
n Applicable to the 6300 and 6400 Switch Series: When an ACL is applied to an interface VLAN, it will create hardware entries on all stack members (6300 switch) and line cards (6400 switch) regardless of whether an interface VLAN member exists on any specific stack member or line card.
MadCap:conditions="Default.AOSCX_ML_switches">
Examples
Creating an IPv4 ACL and applying it to routed ingress traffic on interface VLAN vlan100:

switch(config)# access-list ip test switch(config-acl-ip)# 10 permit any 1.1.1.2 2.2.2.2 count switch(config-acl-ip)# 20 permit any 1.1.1.2 2.2.2.1 count switch(config-acl-ip)# 30 permit any 2.2.2.2 1.1.1.2 count switch(config-acl-ip)# 40 permit any 2.2.2.2 1.1.1.1 count switch(config-acl-ip)# 50 permit any any any count switch(config-acl-ip)# exit switch(config)# switch(config)# interface vlan100 switch(config-if-vlan)# apply access-list ip test routed-in

Applying My_ip_ACL to routed ingress traffic on interface VLAN 10:

switch(config)# interface vlan 10 switch(config-if-vlan)# apply access-list ip My_ip_ACL routed-in

Applying My_ipv6_ACL to routed ingress traffic on interface VLAN 10:
switch(config)# interface vlan 10 switch(config-if-vlan)# apply access-list ipv6 My_ip_ACL routed-in
Applying My_ip_ACL to routed ingress traffic on interface VLANs 20 to 25:
switch(config)# interface vlan 20-25 switch(config-if-vlan-<20-25>)# apply access-list ip My_ip_ACL routed-in

Replacing My_ipv6_ACL with My_Replacement_ACL on interface VLAN 10 (following the above examples):

ACL commands | 140

switch(config)# interface vlan 10 switch(config-if-vlan)# apply access-list ipv6 My_Replacement_ACL routed-in
Removing (unapplying) My_Replacement_ACL on interface VLAN 10. Any other interfaces or VLANs with My_Replacement_ACL applied are not affected:
switch(config)# interface vlan 10 switch(config-if-vlan)# no apply access-list ipv6 My_Replacement_ACL routed-in
Removing (unapplying) My_ip_ACL on interface VLANs 20 to 25. Any other interfaces or VLANs with My_ ip_ACL applied are not affected:
switch(config)# interface vlan 20-25 switch(config-if-vlan-<20-25>)# no apply access-list ip My_ip_ACL routed-in
Applying My_ip_ACL to routed egress traffic on interface VLAN 30:
switch(config)# interface vlan 30 switch(config-if-vlan)# apply access-list ip My_ip_ACL routed-out
Applying My_ip_ACL to routed egress traffic on interface VLANs 40 to 50:
switch(config)# interface vlan 40-50 switch(config-if-vlan-<40-50>)# apply access-list ip My_ip_ACL routed-out

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

apply access-list (to subinterface)
apply access-list {ip|ipv6|mac} <ACL-NAME> {in|out} no apply access-list {ip|ipv6|mac} <ACL-NAME> {in|out}
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

141

Applies an ACL to the current port or LAG subinterface context or subinterface context range. The no form of this command removes application of the ACL from the current port or LAG subinterface context or subinterface context range.
An ACL cannot be applied to the parent interface of one or more subinterfaces. This also means that a subinterface cannot be added to an interface if there is an ACL applied.

ACE VLAN IDs cannot be added to ACLs applied to subinterfaces. This also means that an ACL with an ACE matching on a VLAN ID cannot be applied to a subinterface.

Parameter ip|ipv6|mac
<ACL-NAME> in|out

Description
Specifies the ACL type: ip for IPv4, ipv6 for IPv6, or mac for MAC ACL.
Specifies the ACL name.
Selects the traffic direction.

Usage
n Each ACL of a given type can be applied to the same subinterface once in each direction. Therefore, using the apply access-list command on a subinterface with an already-applied ACL of the same type and direction will replace the currently applied ACL.
n In the case of a failed ACL application to a subinterface during switch reboot or hotswap, the subinterface will be shut down. Fixing the failure will cause the subinterface to come back up.
n In the case of a failed ACL application to an added subinterface LAG member(s), the entire LAG subinterface will be shut down. Fixing the failure will cause the LAG subinterface to come back up. For this case to occur, the ACL must already be successfully applied to existing subinterface LAG members. This is done to prevent traffic from circumventing the ACL by passing through new LAG members where the ACL was not successfully applied. This only occurs when the LAG spans more than one line card or stack member.
Examples
On the 6400 Switch Series, interface identification differs. Applying My_ip_ACL to ingress traffic on subinterface 1/1/1.10:

switch(config)# interface 1/1/1.10 switch(config-subif)# apply access-list ip My_ip_ACL in

Applying My_ip_ACL_egr to egress traffic on subinterface 1/1/2.8:

switch(config)# interface 1/1/2.8 switch(config-subif)# apply access-list ip My_ip_ACL_egr out

Applying My_ipv6_ACL to ingress traffic on subinterface 1/1/1.10:

ACL commands | 142

switch(config)# interface 1/1/1.10 switch(config-subif)# apply access-list ipv6 My_ipv6_ACL in
Applying My_ip_ACL to ingress traffic on subinterface range 1/1/1.11 to 1/1/1.15:
switch(config)# interface 1/1/1.11-1/1/1.15 switch(config-subif-<1/1/1.11-1/1/1.15>)# apply access-list ip My_ip_ACL in
Replacing My_ipv6_ACL with My_Replacement_ACL on subinterface 1/1/1.10 (following the above examples):
switch(config)# interface 1/1/1.10 switch(config-subif)# apply access-list ipv6 My_Replacement_ACL in
Removing (unapplying) My_Replacement_ACL on subinterface 1/1/1.10. Any other interfaces or VLANs with My_Replacement_ACL applied are not affected.
switch(config)# interface 1/1/1.10 switch(config-subif)# no apply access-list ipv6 My_Replacement_ACL in

Removing (unapplying) My_ip_ACL on subinterface 1/1/1.11 to 1/1/1.15. Any other interfaces or VLANs with My_ip_ACL applied are not affected.
switch(config)# interface 1/1/1.11-1/1/1.15 switch(config-subif-<1/1/1.11-1/1/1.15>)# no apply access-list ip My_ip_ACL in
Applying My_ip_ACL to ingress traffic on subinterface lag1.10:
switch(config)# interface lag1.10 switch(config-subif)# apply access-list ip My_ip_ACL in
Removing (unapplying) My_ip_ACL from subinterface lag1.10:
switch(config)# interface lag1.10 switch(config-subif)# no apply access-list ip My_ip_ACL in
Applying My_ip_ACL_egr to egress traffic on subinterface lag1.4:
switch(config)# interface lag1.4 switch(config-subif)# apply access-list ip My_ip_ACL_egr out apply access-list ip My_ip_ACL_egr out
For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

143

Release 10.10 10.08

Command Information

Platforms
6300 6400

Command context config-subif

Modification Added subinterface egress support for interfaces and LAGs. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

apply access-list (to L3 VNI)
apply access-list {ip|ipv6} <ACL-NAME> {routed-in} no apply access-list {ip|ipv6} <ACL-NAME> {routed-in}
Description
Applies an ACL to the current L3 VNI. Only one direction (`routed-in`) and one type (IPv4/IPv6) of an ACL may be applied to an L3 VNI at a time, thus the `apply` command on an L3 VNI with an already applied ACL of the same direction and type will replace the currently-applied ACL. The no form of this command removes application of the ACL from the L3 VNI identified by the current L3 VNI context.

Parameter ip|ipv6 <ACL-NAME> routed-in

Description Specifies the ACL type: ip for IPv4 or ipv6 for IPv6. Specifies the ACL name. Selects the routed-inbound (routed ingress) traffic direction.

Usage
n Each ACL of a given type can be applied to the same L3 VNI interface once in each direction. Therefore, using the apply access-list command on an L3 VNI interface with an already-applied ACL of the same type, will replace the applied ACL.
n Applicable to the 6300 and 6400 Switch Series: When an ACL is applied to an L3 VNI interface, it will create hardware entries on all stack members (6300 switch) and line cards (6400 switch) regardless of whether an L3 VNI interface member exists on any specific stack member or line card.
Examples
Applying My_ip_ACL to routed ingress traffic on VNI 10:

switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 10 switch(config-vni-10)# vrf red switch(config-vni-10)# routing switch(config-vni-10)# apply access-list ip My_ip_ACL routed-in switch(config-vni-10)# exit

ACL commands | 144

switch(config-vxlan-if)# exit switch(config)#
Applying My_ipv6_ACL to routed ingress traffic on VNI 10:
switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 10 switch(config-vni-10)# vrf red switch(config-vni-10)# routing switch(config-vni-10)# apply access-list ipv6 My_ipv6_ACL routed-in switch(config-vni-10)# exit switch(config-vxlan-if)# exit switch(config)#
Replacing My_ipv6_ACL with My_Replacement_ACL on VNI 10 (following the preceding examples):
switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 10 switch(config-vni-10)# apply access-list ipv6 My_Replacement_ACL routed-in switch(config-vni-10)# exit switch(config-vxlan-if)# exit switch(config)#
Removing My_Replacement_ACL on interface VNI 10. Any other interfaces, VLANs, or VNIs with My_ip_ ACL applied are not affected:
switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 10 switch(config-vni-10)# no apply access-list ipv6 My_Replacement_ACL routed-in switch(config-vni-10)# exit switch(config-vxlan-if)# exit switch(config)#

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Modification Added support for L3 VNI ACLs. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

145

apply access-list (to VLAN)
apply access-list {ip|ipv6|mac} <ACL-NAME> {in|out} no apply access-list {ip|ipv6|mac} <ACL-NAME> {in|out}
Description
Applies an ACL to the VLAN identified by the current VLAN context. The no form of this command removes application of the ACL from the VLAN identified by the current VLAN context.

Parameter ip|ipv6|mac
<ACL-NAME> in out

Description
Specifies the ACL type: ip for IPv4, ipv6 for IPv6, or mac for MAC ACL.
Specifies the ACL name.
Selects the inbound (ingress) traffic direction.
Selects the outbound (egress) traffic direction.
NOTE: For 6000 and 6100 switch series, the outbound (egress) traffic direction is supported only for MAC ACLs.

Usage
n Each ACL of a given type can be applied to the same VLAN once in each direction. Therefore, using the apply access-list command on a VLAN with an already-applied ACL of the same type, will replace the applied ACL.
n Applicable to the 6300 and 6400 Switch Series: When an ACL is applied to a VLAN, it will create hardware entries on all stack members (6300 switch) and line cards (6400 switch) regardless of whether a VLAN member exists on any specific stack member or line card.
Examples Applying My_ip_ACL to ingress traffic on VLAN range 20 to 25:
switch(config)# vlan 20-25 switch(config-vlan-<20-25>)# apply access-list ip My_ip_ACL in
Applying My_ip_ACL to egress traffic on VLAN range 40 to 50:
switch(config)# vlan 40-50. switch(config-vlan-<40-50>)# apply access-list ip My_ip_ACL out
Applying My_ip_ACL to ingress traffic on VLAN 10:
switch(config)# vlan 10 switch(config-vlan-10)# apply access-list ip My_ip_ACL in
Applying My_ipv6_ACL to ingress traffic on VLAN 10:

ACL commands | 146

switch(config)# vlan 10 switch(config-vlan-10)# apply access-list ipv6 My_ipv6_ACL in
Applying My_mac_ACL to ingress traffic on VLAN 10:
switch(config)# vlan 10 switch(config-vlan-10)# apply access-list mac My_mac_ACL in
Replacing My_ipv6_ACL with My_Replacement_ACL on VLAN 10 (following the preceding examples):
switch(config)# vlan 10 switch(config-vlan-10)# apply access-list ipv6 My_Replacement_ACL in
Removing (unapplying, Specifies the ACL type: ip for IPv4, ipv6 for IPv6, or mac for MAC ACL. ) several ACLs on VLAN 10:
switch(config)# vlan 10 switch(config-vlan-10)# no apply access-list ipv6 My_Replacement_ACL in switch(config-vlan-10)# no apply access-list mac My_mac_ACL in

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

clear access-list hitcounts
clear access-list hitcounts { all | [{ip|ipv6|mac} <ACL-NAME>] [interface <IF-NAME>| vlan <VLAN-ID>] [in|out|routed-in|routed-out] }
Description
Clears the hit counts for ACLs with ACEs that include the count keyword.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

147

Parameter all ip|ipv6|mac <ACL-NAME> interface <IF-NAME>
vlan <VLAN-ID> in out routed-in|routed-out

Description
Selects all ACLs.
Specifies the ACL type: ip for IPv4, ipv6 for IPv6, or mac for MAC.
Specifies the ACL name.
Specifies the interface name (port or LAG). For ingress ACLs you may optionally include a subinterface ID <SUB-INT> in the range 1 to 4094 in the form <IF-NAME>.<SUB-INT>, for example 1/1/4.1.
Specifies the VLAN.
Selects the inbound (ingress) traffic direction.
Selects the outbound (egress) traffic direction.
Selects the routed traffic direction on which the ACL is applied.
NOTE: This is only available for IPv4 and IPv6 ACLs applied to interface VLANs.
n routed-in selects the routed inbound (routed ingress) traffic direction.
n routed-out selects the routed outbound (routed egress) traffic direction.

Examples
On the 6400 Switch Series, interface identification differs. Clearing the hit counts for My_ip_ACL applied to port 1/1/2 (egress):

switch# clear access-list hitcounts ip My_ip_ACL interface 1/1/2 out

Clearing the hit counts for My_ip_ACL applied to VLAN 10 (ingress):

switch# clear access-list hitcounts ip My_ip_ACL vlan 10 in

Clearing the hit counts for My_ip_ACL applied to subinterface 1/1/4.1 (ingress):

switch# clear access-list hitcounts ip My_ip_ACL interface 1/1/4.1 in

Clearing the hit counts for all ACLs:

switch# clear access-list hitcounts all

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

ACL commands | 148

Command History

Release 10.08 10.07 or earlier

Modification Added subinterface information. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

clear access-list hitcounts control-plane
clear access-list hitcounts [{ip|ipv6} <ACL-NAME>] control-plane vrf <VRF-NAME>
Description
Clears the hit counts for ACLs applied to the Control Plane VRF.

Parameter ip|ipv6 <ACL-NAME> vrf <VRF-NAME>

Description Specifies the ACL type: ip for IPv4, or ipv6 for IPv6. Specifies the ACL name. Specifies the VRF name.

Examples
Clearing the hit counts for an IPv4 ACL applied to the Control Plane default VRF:

switch# clear access-list hitcounts ip My_ipv4_ACL control-plane vrf default

Clearing the hit counts for an IPv6 ACL applied to the Control Plane default VRF:

switch# clear access-list hitcounts ipv6 My_ipv6_ACL control-plane vrf default

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

149

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

object-group address resequence
object-group {ip|ipv6} address <OBJECT-GROUP-NAME> resequence <STARTING-SEQUENCE-NUMBER> <INCREMENT>
Description
Reorders the sequence numbers in an address object group.

Parameter ip|ipv6 <OBJECT-GROUP-NAME> <STARTING-SEQUENCE-NUMBER> <INCREMENT>

Description Specifies the object group IP address type, either ip or ipv6. Specifies the address object group name. Specifies the starting sequence number. Specifies the sequence number increment.

Examples
Resequencing address object group my_ipv4_addr_group to use sequence numbers 5, 10, 15 and so on:

switch(config)# object-group address my_ipv4_addr_group resequence 5 5 switch(config)#

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ACL commands | 150

object-group address reset
object-group {ip|ipv6} address <OBJECT-GROUP-NAME> reset
Description
Resets the user configuration back to the active configuration. This command takes immediate effect, it is not saved in the user configuration. Use this command if misconfiguration of an address object group has occurred.

Parameter ip|ipv6 <OBJECT-GROUP-NAME>

Description Specifies the object group IP address type, either ip or ipv6. Specifies the address object group name.

Examples
Resetting IPv4 address object group my_ipv4_group:

switch(config)# object-group ip address my_ip_group reset switch(config)#

Resetting IPv6 address object group my_ipv6_group:

switch(config)# object-group ipv6 address my_ipv6_group reset switch(config)#

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

object-group all reset
object-group all reset
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

151

Resets the user configuration back to the active configuration for all object types (address and port). This command takes immediate effect, it is not saved in the user configuration. Use this command if misconfiguration of address object groups and port object groups has occurred. Individual address and port object groups can be reset respectively with the object-group address reset and object-group port reset commands.
Examples
Resetting the user configuration for all object types (address and port):
switch(config)# object-group all reset switch(config)#

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

object-group ip address
Syntax to create an IPv4 address object group and enter its context: object-group ip address <OBJECT-GROUP-NAME> no object-group ip address <OBJECT-GROUP-NAME>
Syntax (within the address object-group context) for creating or removing IPv4 address entries : [<SEQUENCE-NUMBER>] <IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]
no <SEQUENCE-NUMBER>
Description
Creates an IPv4 address object group comprised of one or more address entries. Address groups are used solely as a shorthand way of specifying groups of addresses in the ACEs that make up ACLs. IPv4 address groups can be used only in the access-list ip command. Entering object-group ip address with an existing address group name, enables you to modify an existing address group. The no form of this command deletes the entire address group or deletes a particular address group entry identified by sequence number.

ACL commands | 152

Parameter <OBJECT-GROUP-NAME> <SEQUENCE-NUMBER>
<IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]

Description
Specifies the address object group name.
Specifies a sequence number for the address entry. Range: 1 to 4294967295. When omitted, a sequence number 10 larger than the current highest sequence number is auto-assigned. Default auto-assigned sequence numbers are 10, 20, 30, and so on.
Specifies the IPv4 address. n <IP-ADDRESS> - specifies the IPv4 host
address. n <PREFIX-LENGTH> - specifies the address
bits to mask (CIDR subnet mask notation). Range: 1 to 32. n <SUBNET-MASK> - specifies the address bits to mask (dotted decimal notation).

Examples
Creating an IPv4 address group with two entries:

switch(config)# object-group ip address my_ipv4_addr_group

switch(config-addrgroup-ip)# 10 192.168.0.1

switch(config-addrgroup-ip)# 20 192.168.0.2

switch(config-addrgroup-ip)# exit

switch(config)# show object-group

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

IPv4

my_ipv4_addr_group

10 192.168.0.1

20 192.168.0.2

Adding an entry to an existing IPv4 address group:

switch(config)# object-group ip address my_ipv4_addr_group

switch(config-addrgroup-ip)# 30 192.168.0.3

switch(config-addrgroup-ip)# exit

switch(config)# show object-group

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

IPv4

my_ipv4_addr_group

10 192.168.0.1

20 192.168.0.2

30 192.168.0.3

Removing an entry (20) from an existing IPv4 address group:

switch(config)# object-group ip address my_ipv4_addr_group switch(config-addrgroup-ip)# no 20 switch(config-addrgroup-ip)# exit

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

153

switch(config)# show object-group

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

IPv4

my_ipv4_addr_group

10 192.168.0.1

30 192.168.0.3

Removing an IPv4 address group:

switch(config)# no object-group ip address my_ipv4_addr_group switch(config)# show object-group No object group found.

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

config
The object-group ip address command takes you into the named address group context (with prompt switch (config-addrgroup-ip)#) where you enter the addresses.

Administrators or local user group members with execution rights for this command.

object-group ipv6 address
Syntax to create an IPv6 address object group and enter its context: object-group ipv6 address <OBJECT-GROUP-NAME> no object-group ipv6 address <OBJECT-GROUP-NAME> Syntax (within the address object-group context) for creating or removing IPv6 address entries :
[<SEQUENCE-NUMBER>] <IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]
no <SEQUENCE-NUMBER>
Description
Creates an IPv6 address object group comprised of one or more address entries. Address groups are used solely as a shorthand way of specifying groups of addresses in the ACEs that make up ACLs. IPv6

ACL commands | 154

address groups can be used only in the access-list ipv6 command. Entering object-group ipv6 address with an existing address group name, enables you to modify an existing address group.
The no form of this command deletes the entire address group or deletes a particular address group entry identified by sequence number.

Parameter <OBJECT-GROUP-NAME> <SEQUENCE-NUMBER>
<IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]

Description
Specifies the address object group name.
Specifies a sequence number for the address entry. Range: 1 to 4294967295. When omitted, a sequence number 10 larger than the current highest sequence number is auto-assigned. Default auto-assigned sequence numbers are 10, 20, 30, and so on.
Specifies the IPv6 address. n <IP-ADDRESS> - specifies the IPv6 host
address.
o <PREFIX-LENGTH> - specifies the address bits to mask (CIDR subnet mask notation). Range: 1 to 128.
o <SUBNET-MASK> - specifies the address bits to mask (dotted decimal notation).

Examples
Creating an IPv6 address group with two entries:

switch(config)# object-group ipv6 address my_ipv6_addr_group

switch(config-addrgroup-ipv6)# 10 1000::1

switch(config-addrgroup-ipv6)# 20 1000::2

switch(config-addrgroup-ipv6)# exit

switch(config)# show object-group

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

IPv6

my_ipv6_addr_group

10 1000::1

20 1000::2

Adding an entry to an existing IPv6 address group:

switch(config)# object-group ipv6 address my_ipv6_addr_group

switch(config-addrgroup-ipv6)#

switch(config-addrgroup-ipv6)# 30 1000::3

switch(config-addrgroup-ipv6)# exit

switch(config)# show object-group

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

IPv6

my_ipv6_addr_group

10 1000::1

20 1000::2

30 1000::3

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

155

Removing an entry (20) from an existing IPv6 address group:

switch(config)# object-group ipv6 address my_ipv6_addr_group

switch(config-addrgroup-ipv6)# no 20

switch(config-addrgroup-ipv6)# exit

switch(config)# show object-group

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

IPv6

my_ipv6_addr_group

10 1000::1

30 1000::3

Removing an IPv6 address group:

switch(config)# no object-group ipv6 address my_ipv6_addr_group switch(config)# show object-group No object group found.

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

config
The object-group ipv6 address command takes you into the named address group context (with prompt switch (config-addrgroupipv6)#) where you enter the addresses.

Administrators or local user group members with execution rights for this command.

object-group port
Syntax to create a Layer 4 port object group and enter its context: object-group port <OBJECT-GROUP-NAME>
no object-group port <OBJECT-GROUP-NAME> Syntax (within the port object-group context) for creating or removing Layer 4 port entries:
[<SEQUENCE-NUMBER>] { {eq|gt|lt} <PORT>|range <MIN-PORT> <MAX-PORT> }
no <SEQUENCE-NUMBER>

ACL commands | 156

Description
Creates a Layer 4 port object group comprised of one or more port entries. Port groups are used solely as a shorthand way of specifying groups of ports in the ACEs that make up ACLs. Layer 4 port groups can be used only in the access-list ip and access-list ipv6 commands. Entering object-group port with an existing port group name, enables you to modify an existing port group.
The no form of this command deletes the entire port group or deletes a particular port group entry identified by sequence number.

Parameter <OBJECT-GROUP-NAME> <SEQUENCE-NUMBER>
{ {eq|gt|lt} <PORT>|range <MIN-PORT><MAX-PORT> }

Description
Specifies the port object group name.
Specifies a sequence number for the port entry. Range: 1 to 4294967295. When omitted, a sequence number 10 larger than the current highest sequence number is auto-assigned. Default auto-assigned sequence numbers are 10, 20, 30, and so on.
Specifies the port or port range. Port numbers are in the range of 0 to 65535. n eq <PORT> - specifies the Layer 4 port. n gt <PORT> - specifies any Layer 4 port
greater than the indicated port. n lt <PORT> - specifies any Layer 4 port
less than the indicated port. n range MIN-PORT> <MAX-PORT> -
specifies the Layer 4 port range.
NOTE: When ACLs using ACEs defined with port groups are applied, the same number of hardware resources are consumed as when the ports are specified directly in the ACEs and not in a group. Keep this in mind when creating port groups that include many ports. Although hardware resource consumption is the same, with or without port groups used, it may not be immediately obvious that some port groups that you have defined, include many ports. It is recommended that you name port groups in a manner that reminds you that a group includes many ports.

Examples
Creating a port group with two entries to cover port 80 plus ports 0 through 50:
switch(config)# object-group port my_port_group switch(config-portgroup)# 10 eq 80 switch(config-portgroup)# 20 range 0 50 switch(config-portgroup)# exit

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

157

switch(config)# show object-group

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

Port

my_port_group

10 eq 80

20 range 0 50

Adding an entry for ports greater than 65525 (covers ports 65526 through 65535):

switch(config)# object-group port my_port_group

switch(config-portgroup)# 30 gt 65525

switch(config-portgroup)# exit

switch(config)# show object-group

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

Port

my_port_group

10 eq 80

20 range 0 50

30 gt 65525

Removing an entry (#20) from the port group:

switch(config)# object-group port my_port_group

switch(config-portgroup)# no 20

switch(config-portgroup)# exit

switch(config)# show object-group

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

Port

my_port_group

10 eq 80

30 gt 65525

Removing the port group:

switch(config)# no object-group port my_port_group switch(config)# show object-group No object group found.

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

ACL commands | 158

Platforms All platforms

Command context

Authority

config
The object-group ip port command takes you into the named port group context (with prompt switch(configportgroup)#) where you specify the ports.

Administrators or local user group members with execution rights for this command.

object-group port resequence
object-group port <OBJECT-GROUP-NAME> resequence <STARTING-SEQUENCE-NUMBER> <INCREMENT>
Description
Reorders the sequence numbers in a port object group.

Parameter <OBJECT-GROUP-NAME> <STARTING-SEQUENCE-NUMBER> <INCREMENT>

Description Specifies the port object group name. Specifies the starting sequence number. Specifies the sequence number increment.

Examples
Resequencing port object group my_port_group to use sequence numbers 110, 120, 130 and so on:

switch(config)# object-group port my_port_group resequence 110 10 switch(config)#

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

159

object-group port reset
object-group port <OBJECT-GROUP-NAME> reset
Description
Resets the user configuration back to the active configuration. This command takes immediate effect, it is not saved in the user configuration. Use this command if misconfiguration of a port object group has occurred.

Parameter <OBJECT-GROUP-NAME>

Description Specifies the port object group name.

Examples
Resetting port object group my_port_group:

switch(config)# object-group port my_port_group reset switch(config)#

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show access-list
Syntax that filters by ACLs applied to an interface, VLAN, or VNI: show access-list [interface <IF-NAME>|vlan <VLAN-ID>|vni <VNI-ID>]
[in|out|routed-in|routed-out][ip|ipv6|mac] [<acl-name>][commands] [configuration] show access-list [ip|ipv6] [<ACL-NAME>] control-plane [vrf <VRF-NAME>] [commands] [configuration] Syntax that filters by the named ACL: show access-list [ip|ipv6|mac] [<ACL-NAME>] [commands] [configuration] [vsx-peer]
Description
Shows information about your defined ACLs and where they have been applied. When show access-list is entered without parameters, information for all ACLs is shown. The parameters filter the list of ACLs for which information is shown.

ACL commands | 160

Available filtering includes:
n The content of a specific ACL. n All ACLs of a specific type. n The ACL applied in a particular direction. n The ACL applied to a specific interface (port or split port or LAG). n The ACL applied to a specific subinterface (port or LAG). n The ACL applied to a specific VLAN. n The ACL applied to a specific VNI. n The ACL applied to specific interface VLAN (routed-in or routed-out). n The control-plane ACL applied to a specific VRF.

Parameter interface <IF-NAME>
vlan <VLAN-ID> vni <VNI-ID> control-plane vrf <VRF-NAME> ip|ipv6|mac
in out routed-in
routed-out
<ACL-NAME> commands configuration

Description
Specifies the interface name (port or LAG). For ingress ACLs you may optionally include a subinterface ID <SUB-INT> in the range 1 to 4094 in the form <IF-NAME>.<SUB-INT>, for example 1/1/4.1.
Specifies the VLAN.
Specifies the ID of the VNI.
Specifies the VRF of the control plane ACL.
Specifies the ACL type: n ip for IPv4, n ipv6 for IPv6, or n mac for MAC.
Selects the inbound (ingress) traffic direction.
Selects the outbound (egress) traffic direction.
Selects the routed inbound (routed ingress) traffic direction. NOTE: This is only available for IPv4 and IPv6 ACLs applied to interface VLANs.
Selects the routed outbound (routed egress) traffic direction. NOTE: This is only available for IPv4 and IPv6 ACLs applied to interface VLANs.
Specifies the ACL name.
Specifies that the ACL definition is to be shown as the commands and parameters used to create it rather than in tabular form.
Specifies that the user-configured ACLs be shown as entered, even if the ACLs are not active due to ACE-definition command issues or hardware issues. This parameter is useful if there is a mismatch between the entered configuration and the previous successfully programmed (active) ACLs configuration.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

161

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Creating an IPv4 ACL, applying it to an interface VLAN (routed in), and then showing ACL information filtered for that interface VAN:

switch(config)# access-list ip test switch(config-acl-ip)# 10 permit any 1.1.1.2 2.2.2.2 count switch(config-acl-ip)# 20 permit any 1.1.1.2 2.2.2.1 count switch(config-acl-ip)# 30 permit any 2.2.2.2 1.1.1.2 count switch(config-acl-ip)# 40 permit any 2.2.2.2 1.1.1.1 count switch(config-acl-ip)# 50 permit any any any count switch(config-acl-ip)# exit switch(config)# switch(config)# interface vlan100 switch(config-if-vlan)# apply access-list ip test routed-in switch(config-if-vlan)# exit switch(config)# show access-list interface vlan100 ip routed-in

Direction

Type

Name

Sequence Comment

Ac L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

Routed Inbound

IPv4

test

10

permit

any

1.1.1.2

2.2.2.2

Hit-counts: enabled

20

permit

any

1.1.1.2

2.2.2.1

Hit-counts: enabled

30

permit

any

2.2.2.2

1.1.1.2

Hit-counts: enabled

40

permit

any

2.2.2.2

1.1.1.1

Hit-counts: enabled

50

permit

any

any

any

Hit-counts: enabled

-------------------------------------------------------------------------------

ACL commands | 162

Showing an IPv4 ACL:

switch# show access-list ip MY_ACL

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

------------------------------------------------------------------------------

IPv4

MY_ACL

10 permit

udp

any

172.16.1.0/255.255.255.0

20 permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

30 permit

tcp

172.26.1.0//255.255.255.0

any

syn

ack

dscp 10

40 deny

any

any

any

Hit-counts: enabled

------------------------------------------------------------------------------

Showing an IPv4 ACL as commands:

switch# show access-list ip MY_ACL commands access-list ip MY_ACL
10 permit udp any 172.16.1.0/255.255.255.0 20 permit tcp 172.16.2.0/255.255.0.0 gt 1023 any 30 permit tcp 172.26.1.0/255.255.255.0 any syn ack dscp 10 40 deny any any any count

Showing a MAC ACL applied to subinterface 1/1/2.1, inbound:

switch# show access-list interface 1/1/2.1 mac in

Direction

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

Inbound

MAC

My_mac_ACL

10

permit

ipv6

1122.3344.5566/ffff.ffff.0000

any

20

permit

any

aaaa.bbbb.cccc

1111.2222.3333

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

163

QoS Priority Code Point: 4

30

deny

any

any

any

Hit-counts: enabled

-------------------------------------------------------------------------------

Showing IPv4 ACLs applied to VLAN 10, inbound:

switch# show access-list vlan 10 ip in

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

------------------------------------------------------------------------------

IPv4

My_ip_ACL

10 permit

udp

any

172.16.1.0/255.255.255.0

20 permit

tcp

172.16.2.0/255.255.0.0

> 1023

any

30 permit

tcp

172.26.1.0//255.255.255.0

any

syn

ack

dscp 10

40 deny

any

any

any

Hit-counts: enabled

------------------------------------------------------------------------------

Showing IPv6 ACLs applied to LAG 128, inbound:

switch# show access-list interface lag128 ipv6 in

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

------------------------------------------------------------------------------

IPv6

MY_IPV6_ACL

10 permit

udp

any

2001::1/64

20 permit

tcp

2001:2001::2:1/128

> 1023

any

30 permit

tcp

2001:2011::1/64

40 deny

any

any

any

ACL commands | 164

Hit-counts: enabled ------------------------------------------------------------------------------

Showing an IPv6 ACL as commands:

switch# show access-list ipv6 MY_IPV6_ACL commands access-list ipv6 MY_IPV6_ACL
10 permit udp any 2001::1/64 20 permit tcp 2001:2001::2:1/128 gt 1023 any 40 deny any any any count

Showing a MAC ACL:

switch# show access-list mac MY_MAC_ACL

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

------------------------------------------------------------------------------

MAC

MY_MAC_ACL

10 permit

ipv6

1122.3344.5566/ffff.ffff.0000

any

20 permit

any

aaaa.bbbb.cccc

1111.2222.3333

QoS Priority Code Point: 4

30 deny

any

any

any

Hit-counts: enabled

------------------------------------------------------------------------------

Showing a MAC ACL as commands:

switch# show access-list mac MY_MAC_ACL commands access-list mac MY_MAC_ACL
10 permit 1122.3344.5566/ffff.ffff.0000 any ipv6 20 permit aaaa.bbbb.cccc 1111.2222.3333 any pcp 4 30 deny any any any count

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.14

Modification Added support for L3VNI ACLs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

165

Release 10.08 10.07 or earlier

Modification Added subinterface information and examples. --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show access-list control-plane
show access-list [ip|ipv6] [<ACL-NAME>] control-plane [vrf <VRF-NAME>] [commands] [configuration][vsx-peer]
Description
Shows information about your defined ACLs that have been applied to the Control Plane. When show access-list control-plane is entered without parameters, information for all ACLs applied to the Control Plane is shown. The parameters filter the list of ACLs for which information is shown. Available filtering includes:
n The content of a specific ACL that has been applied to the Control Plane. n All ACLs of a specific type that have been applied to the Control Plane. n All ACLs applied to the Control Plane for a specific VRF.

Parameter ip|ipv6 <ACL-NAME> vrf <VRF-NAME> [commands] [configuration]
vsx-peer

Description
Specifies the ACL type: ip for IPv4, oripv6 for IPv6.
Specifies the ACL name.
Specifies the VRF name.
Specifies that the ACL definition is to be shown as the commands and parameters used to create it rather than in tabular form.
Specifies that the user-configured ACLs be shown as entered, even if the ACLs are not active due to ACE-definition command issues or hardware issues. This parameter is useful if there is a mismatch between the entered configuration and the previous successfully programmed (active) ACLs configuration.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing an IPv4 ACL applied to the Control Plane default VRF:

ACL commands | 166

switch# show access-list ip My_ipv4_ACL control-plane vrf default

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

------------------------------------------------------------------------------

IPv4

My_ipv4_ACL

10 permit

udp

any

172.16.1.0/24

20 permit

tcp

172.16.2.0/16

> 1023

any

30 permit

tcp

172.26.1.0/24

any

syn

ack

dscp 10

40 deny

any

any

any

Hit-counts: enabled

------------------------------------------------------------------------------

Showing an IPv6 ACL applied to the Control Plane default VRF:

switch# show access-list ipv6 My_ipv6_ACL control-plane vrf default

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

------------------------------------------------------------------------------

IPv6

My_ipv6_ACL

10 permit

udp

any

2001::1/64

20 permit

tcp

2001:2001::2:1/128

> 1023

any

30 permit

tcp

2001:2011::1/64

40 deny

any

any

any

Hit-counts: enabled

------------------------------------------------------------------------------

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

167

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show access-list hitcounts
show access-list hitcounts { [{ip|ipv6|mac} <ACL-NAME>] [interface <IF-NAME> | vlan <VLAN-ID>] [in|out|routed-in|routed-out] [vsx-peer] }
show access-list hitcounts { [{ip|ipv6|mac} <ACL-NAME>] [interface <IF-NAME>| vlan <VLAN-ID>|vni <VNI-ID>] [in|out|routed-in|routed-out]} [vsx-peer] } show access-list hitcounts [{ip|ipv6} <acl-name>] control-plane vrf <VRF-NAME>
Description
Shows the hit count of the number of times an ACL has matched a packet or frame for ACEs with the count keyword. For ACEs without the count keyword, a dash is shown in place of a hit count.

Parameter ip|ipv6|mac <ACL-NAME> interface <IF-NAME>
vlan <VLAN-ID> vni <VNI-ID> control-plane vrf <VRF-NAME> in out routed-in routed-out

Description Specifies the ACL type: ip for IPv4, ipv6 for IPv6, or mac for MAC. Specifies the ACL name. Specifies the interface name (port or split port or LAG). For ingress ACLs you may optionally include a subinterface ID <SUB-INT> in the range 1 to 4094 in the form <IF-NAME>.<SUB-INT>, for example 1/1/4.1. Specifies the VLAN. Specifies the ID of the VNI.
Specifies the VRF of the control plane ACL.
Selects the inbound (ingress) traffic direction. Selects the outbound (egress) traffic direction.
Selects the routed inbound (routed ingress) traffic direction.
Selects the routed outbound (routed egress) traffic direction.

Usage

ACL commands | 168

n ACL hit counts are aggregated across all: o Physical interfaces to which the ACL is applied to on ingress. o Physical interfaces to which the ACL is applied to on egress. o VLANs to which the ACL is applied to on ingress. o VLANs to which the ACL is applied to on egress. o Interface VLANs to which the IPv4 or IPv6 ACL is applied on routed ingress. o Interface VLANs to which the IPv4 or IPv6 ACL is applied on routed egress. o L3 VNI ACLs with interface VLANs applied on routed ingress.
n If an ACL with an ACE with the count keyword is applied to multiple physical interfaces or VLANs, the hit counts are aggregated. There is one aggregation for physical interfaces and another for VLANs.
n If an ACL with an ACE with the count keyword is applied to multiple subinterfaces, the hit counts are aggregated.
n Accumulated hit counts for an applied ACL are cleared upon any modification of the ACL.
Examples
On the 6400 Switch Series, interface identification differs. Showing the hit counts for My_ip_ACL applied to port 1/1/2:
switch# show access-list hitcounts ip My_ip_ACL interface 1/1/2 Statistics for ACL My_ip_ACL (ipv4): interface 1/1/1-1/1/2,lag1 (out):
Matched Packets Configuration - 10 permit udp any 172.16.1.0/255.255.255.0 0 20 permit tcp 172.16.2.0/255.255.0.0 gt 1023 any count - 30 permit tcp 172.26.1.0/255.255.255.0 any dscp AF11 ack syn 0 implicit deny any any any count
Showing the hit counts for My_ip_ACL applied to VLAN 10:
switch# show access-list hitcounts ip My_ip_ACL vlan 10 Statistics for ACL My_ip_ACL (ipv4): vlan 10,20-100,300 (in):
Matched Packets Configuration - 10 permit udp any 172.16.1.0/255.255.255.0 0 20 permit tcp 172.16.2.0/255.255.0.0 gt 1023 any count - 30 permit tcp 172.26.1.0/255.255.255.0 any dscp AF11 ack syn 0 implicit deny any any any count
Showing the hit counts for ACLs applied to subinterfaces:
switch# show access-list hitcounts ip My_ip_ACL interface 1/1/4.1 Statistics for ACL My_ip_ACL (ipv4): interface 1/1/4.1,1/1/10.10 (in):
Matched Packets Configuration - 10 permit udp any 172.16.1.0/255.255.255.0 0 20 permit tcp 172.16.2.0/255.255.0.0 gt 1023 any count - 30 permit tcp 172.26.1.0/255.255.255.0 any dscp AF11 ack syn 0 implicit deny any any any count
switch# show access-list hitcounts ip My_ip_ACL2 interface lag1.3

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

169

Statistics for ACL My_ip_ACL2 (ipv4): interface lag1.3-lag1.4 (in):
Matched Packets Configuration 0 10 deny icmp any 192.168.42.1 count
3884 100 permit any any any count 0 implicit deny any any any count
Showing the hit counts for My_ip_ACL applied to interface VLAN 10:
switch# show access-list hitcounts ip My_ip_ACL vlan 10 Statistics for ACL My_ip_ACL (ipv4): interface vlan 10,20,30 (routed-in):
Matched Packets Configuration - 10 permit udp any 172.16.1.0/255.255.255.0 0 20 permit tcp 172.16.2.0/255.255.0.0 gt 1023 any count - 30 permit tcp 172.26.1.0/255.255.255.0 any dscp AF11 ack syn 0 implicit deny any any any count
Showing the hit counts for My_ip_ACL applied on any interface and direction:
switch# show access-list hitcounts ip My_ip_ACL vlan 10 switch# show access-list hitcounts ip My_ip_ACL Statistics for ACL My_ip_ACL (ipv4): interface 1/1/1 (in):
Matched Packets Configuration - 10 permit udp any 172.16.1.0/255.255.255.0 0 20 permit tcp 172.16.2.0/255.255.0.0 gt 1023 any count - 30 permit tcp 172.26.1.0/255.255.255.0 any dscp AF11 ack syn 0 implicit deny any any any count
interface 1/1/4.1,1/1/10.10 (in): Matched Packets Configuration - 10 permit udp any 172.16.1.0/255.255.255.0 0 20 permit tcp 172.16.2.0/255.255.0.0 gt 1023 any count - 30 permit tcp 172.26.1.0/255.255.255.0 any dscp AF11 ack syn 0 implicit deny any any any count
interface vlan 10,20,30 (routed-in): Matched Packets Configuration - 10 permit udp any 172.16.1.0/255.255.255.0 0 20 permit tcp 172.16.2.0/255.255.0.0 gt 1023 any count - 30 permit tcp 172.26.1.0/255.255.255.0 any dscp AF11 ack syn 0 implicit deny any any any count
interface vlan 80-85 (routed-out): Matched Packets Configuration - 10 permit udp any 172.16.1.0/255.255.255.0 0 20 permit tcp 172.16.2.0/255.255.0.0 gt 1023 any count - 30 permit tcp 172.26.1.0/255.255.255.0 any dscp AF11 ack syn 0 implicit deny any any any count
vlan 10,20-100,300 (in): Matched Packets Configuration - 10 permit udp any 172.16.1.0/255.255.255.0 0 20 permit tcp 172.16.2.0/255.255.0.0 gt 1023 any count
ACL commands | 170

- 30 permit tcp 172.26.1.0/255.255.255.0 any dscp AF11 ack syn 0 implicit deny any any any count
vrf blue,default,red (control-plane): Matched Packets Configuration - 10 permit udp any 172.16.1.0/255.255.255.0 0 20 permit tcp 172.16.2.0/255.255.0.0 gt 1023 any count - 30 permit tcp 172.26.1.0/255.255.255.0 any dscp AF11 ack syn 0 implicit deny any any any count
Showing hit counts for My_ip_ACL applied to L3 VNIs.
switch# show access-list hitcounts ip My_ip_ACL vni 10 Statistics for ACL My_ip_ACL (ipv4): vni 10 (routed-in):
Matched Packets Configuration - 10 permit udp any 172.16.1.0/255.255.255.0 0 20 permit tcp 172.16.2.0/255.255.0.0 gt 1023 any count - 30 permit tcp 172.26.1.0/255.255.255.0 any dscp AF11 ack syn 0 implicit deny any any any count
Removing hit counts for My_ip_ACL applied on L3 VNIs.
switch# clear access-list hitcounts ip My_ip_ACL vni 10 routed-in

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.14 10.08 10.07 or earlier

Modification
Added support for L3 VNI ACLs.
Added subinterface information and examples.
Updated command output to use interface and VLAN ranges to reflect aggregation.

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show access-list hitcounts control-plane
show access-list hitcounts [{ip|ipv6} <ACL-NAME>] control-plane vrf <VRF-NAME> [vsx-peer]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

171

Description
Shows the hit count of the number of times an ACL (applied to the Control Plane) has matched a packet for ACEs with the count keyword. For ACEs without the count keyword, a dash is shown in place of a hit count.

Parameter ip|ipv6 <ACL-NAME> vrf <VRF-NAME> vsx-peer

Description
Specifies the ACL type: ip for IPv4, or ipv6 for IPv6.
Specifies the ACL name.
Specifies the VRF name.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
n ACL hit counts are aggregated across all VRFs to which the ACL is applied to on ingress. n Accumulated hit counts for an applied ACL are cleared upon any modification of the ACL.
Examples
Showing the hit counts for an IPv4 ACL applied to the Control Plane default VRF:

switch# show access-list hitcounts ip My_ipv4_ACL control-plane vrf default Statistics for ACL My_ip_ACL (ipv4): vrf default (control-plane):
Matched Packets Configuration - 10 permit udp any 172.16.1.0/255.255.255.0 0 20 permit tcp 172.16.2.0/255.255.0.0 gt 1023 any count - 30 permit tcp 172.26.1.0/255.255.255.0 any dscp AF11 ack syn 0 implicit deny any any any count

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ACL commands | 172

show access-list secure-update
show access-list secure-update
Description
Use this command to determine if access lists are updated using the secure-update feature. Secureupdate is enabled by default.
Examples
Displaying the status of the access list secure-update feature when that feature is enabled:
switch(config)# show access-list secure-update Access-list secure-update is enabled
Displaying the status of the access list secure-update feature when that feature is disabled:
switch(config)# show access-list secure-update Access-list secure-update is disabled

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Related Commands
Command access-list secure-update

Command History
Release 10.13

Command Information

Platforms All platforms

Command context config

Description This command determines if access lists are updated using the secure-update feature. Secure-update is enabled by default.
Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

173

Chapter 5

Aruba Central commands
aruba-central
aruba-central no aruba-central
Description
Creates or enters the Aruba Central configuration context (config-aruba-central).
Example
Creating the Aruba Central configuration context:
switch(config)# aruba-central switch(config-aruba-central)#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

aruba-central support-mode
aruba-central support-mode no aruba-central support-mode
Description
Allows the device to be writable for all operations in Aruba Central lockout mode for troubleshooting. The no form of this command disables this activity.

AOS-CX 10.14 Command-Line Interface Guide

174

Support-mode is disabled by default when the switch is managed by Aruba Central. This command is only effective in the CLI session where it is executed.
Examples
Configuring the device to be writable for all operations in Aruba Central lockout mode:
switch# aruba-central support-mode switch#
Removing the configuration that allows the device to be writable for all operations in Aruba Central lockout mode:
switch# no aruba-central support-mode switch#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

configuration-lockout central managed
configuration-lockout central managed no configuration-lockout central managed
Description
Configures the device to only be writable from Aruba Central. Aruba Central will be the only agent that can add, modify, or delete configurations on the device. The no form of this command disables this feature.
The no form of this command is only available when the device is disconnected from Aruba Central.

Usage
The AOS-CX switch connects to Aruba Central in either of two modes: monitor or managed. When the device is connected in monitor mode, Aruba Central monitors the configurations on the switch. When

| 175

the device is connected in managed mode, the configuration-lockout central managed command does not allow configuration changes from other interfaces such as CLI or Web UI.
Examples
Configuring the device to only be writable from Aruba Central :

switch(config)# configuration-lockout central managed

switch# show configuration-lockout

configuration lockout

---------------------

central: managed

switch# sh aruba-central

Central admin state

:enable

Central location

:20.0.0.2:8083

VRF for connection

:default

Central connection status

:connected

Central source Central source connection status Central source last connected on

:cli :connected :Tue Feb 9 17:53:13 UTC 2021

Activate Server URL CLI location CLI VRF switch(config)# end

:devices-v2.arubanetworks.com :20.0.2:8083 :default

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

disable
disable
Description
Disables connection to Aruba Central server. When the connection is disabled, the switch does not attempt to connect to the Aruba Central server or fetch central location from any of the three sources (CLI/Aruba Activate/DHCP). It also disconnects any active connection to the Aruba Central server.
Example

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

176

switch(config-aruba-central)# disable switch(config-aruba-central)#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-aruba-central

Authority
Administrators or local user group members with execution rights for this command.

enable
enable
Description
Enables connection to Aruba Central server. When the connection is enabled, the switch attempts to download the location of the Aruba Central server in one of the following ways at startup and after the connection is lost:
n Using command-line interface (CLI). n Connecting to Aruba Activate server. n Using DHCP options provided during ZTP.
DHCP servers provide the options requested by the device to connect to Central, Central On-premise managment, or the TFTP server.
When a switch is able to connect to Aruba Central, but is not registered in the Aruba Central inventory or does not have a proper license, the switch will get disconnected. If the Aruba Central feature is enabled using this command, the switch will then reconnect back to Aruba Central and will get disconnected again. This connect/disconnect process will continue until the switch is properly registered in Aruba Central. To avoid this unnecessary reconnection cycle, best practices is to disable Aruba Central until the switch is registered in Aruba Central, or a license is obtained for that device.

Examples
switch(config-aruba-central)# enable switch(config-aruba-central)#

| 177

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-aruba-central

Authority
Administrators or local user group members with execution rights for this command.

location-override
location-override <location> [vrf <VRF-NAME>] no location-override
Description
When location and vrf are configured, the switch overrides existing connections to Aruba Central. The switch attempts to establish connection to Aruba Central with the specified location and VRF with highest priority. Location can take one of the following values:
n A fully qualified domain name (FQDN) along with an optional port number. n An IPv4 address with an optional port number. n An IPv6 address with an optional port number.
If the port number is not specified, then port 443 is used by default. If the command is executed without the VRF parameter, the switch uses the 'default' VRF. The no form of this command removes location override values from the Aruba Central configuration context.
When you configure an IPv6 address with a port number, specify the address part inside square brackets, optionally followed by the port number, e.g. [2001:0db8:85a3:0000:0000:8a2e:0370:7334]:443.

Parameter <location>
vrf <VRF-NAME>

Description
Specifies one of these values: n <FQDN>: a fully qualified domain name. n <IPV4>: an IPv4 address. n <IPV6>: an IPv6 address.
Specifies the VRF name to be used for communicating with the

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

178

Parameter

Description
server. If no VRF name is provided, the default VRF named default is used.

Examples
Configuring location override with location and VRF:

switch(config-aruba-central)# location-override aruba-central.com vrf default switch(config-aruba-central)# switch(config-aruba-central)# location-override aruba-central.com vrf red switch(config-aruba-central)# location-override 10.0.0.1 vrf red switch(config-aruba-central)# location-override 10.0.0.1:443 vrf red switch(config-aruba-central)# location-override 2001:0db8:85a3:0000:0000:8a2e:0370:7334 vrf red switch(config-aruba-central)# location-override [2001:0db8:85a3:0000:0000:8a2e:0370:7334]:443 vrf red

Configuring location override with location only:

switch(config-aruba-central)# location-override aruba-central.com switch(config-aruba-central)#

Removing location override values from the Aruba Central configuration context:

switch(config-aruba-central)# no location-override switch(config-aruba-central)#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.1000 10.07 or earlier

Modification Command updated to reflect OTP scenario.. --

Command Information
Platforms Command context All platforms config-aruba-central

Authority
Administrators or local user group members with execution rights for this command.

location-override-alternative
location-override-alternative <LOCATION> [vrf <VRF>] no location-override-alternative <LOCATION> [vrf <VRF>]

| 179

Description
Configures information about Aruba Central connection when the alternative location is used. The no form of this command removes the location-override-alternative configuration.

Parameter <LOCATION> vrf <VRF>

Description Specifies the Aruba-Central location. Specifies the VRF used to connect to Aruba-Central.

Usage
When the main and alternative Aruba Central server locations are specified, the switch attempts to connect to the main Aruba Central server. If there is connectivity failure with the main Aruba Central server location, it attempts to establish a connection with the alternative server location. If the alternative location is configured without a main location, the user is prompted for confirmation. In this case, there is no redundancy and the switch attempts to connect to the alternative location. Location can take one of the following values:
n A fully qualified domain name (FQDN) along with an optional port number. n An IPv4 address with an optional port number. n An IPv6 address with an optional port number.
If the port number is not specified, then port 443 is used by default. If the command is executed without the VRF parameter, the switch uses the 'default' VRF. An Aruba Central server location can only be a fully qualified domain name (FQDN) or a valid IP address. If the command is entered without the VRF parameter, the switch uses the default VRF.
Examples
Example of configuring with the aruba-central.com location and VRF red:

switch(config-aruba-central)# location-override-alternative aruba-central.com vrf red switch(config-aruba-central)#

Example of a configuration with location only:

switch(config-aruba-central)# location-override-alternative aruba-central.com switch(config-aruba-central)#

Example of removing the override configuration:

switch(config-aruba-central)# no location-override-alternative switch(config-aruba-central)# location-override-alternative 10.0.0.1 vrf red switch(config-aruba-central)# location-override-alternative 10.0.0.1:443 vrf red switch(config-aruba-central)# location-override-alternative 2001:0db8:85a3:0000:0000:8a2e:0370:7334 vrf red switch(config-aruba-central)# location-override-alternative [2001:0db8:85a3:0000:0000:8a2e:0370:7334]:443 vrf red

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

180

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.1000 10.12.1000

Modification Command updated to reflect OTP scenario. Command introduced.

Command Information

Platforms All platforms

Command context config-aruba-central

Authority
Administrators or local user group members with execution rights for this command.

show aruba-central
show aruba-central
Description
Shows information about Aruba Central connection and the status of the Activate server connection.
Examples
Example of a switch that has the Aruba Central connection:

switch# show aruba-central Central admin state Central location VRF for connection Shared Token Central connection status Central source Central source connection status Central source last connected on Main location Main VRF Alternative location Alternative VRF Activate Server URL System time synchronized from Activate Source IP Source IP Overridden Central support mode

: enabled : 10.0.0.1 : mgmt : N/A : connected : activate : connected : Wed Jun 28 23:07:25 UTC 2023 : 10.0.0.1 : mgmt : N/A : N/A : devices-v2.arubanetworks.com : N/A : N/A : False : disabled

Example of a switch when the main CLI location is used:

switch# show aruba-central Central admin state Central location

: enabled : 10.0.0.1

| 181

VRF for connection

: mgmt

Shared secret

: N/A

Central connection status

: connected

Central source

: cli

Central source connection status

: connected

Central source last connected on

: Wed Jun 28 23:07:25 UTC 2023

Main location

: 10.0.0.1

Main VRF

: mgmt

Alternative location

: 20.0.0.1

Alternative VRF

: default

Activate server URL

: devices-v2.arubanetworks.com

System time synchronized from Activate : N/A

Source IP

: N/A

Source IP Overridden

: False

Central support mode

: disabled

Example of a switch when the alternative CLI location is used:

switch# show aruba-central

Central admin state

: enabled

Central location

: 20.0.0.1

VRF for connection

: default

Shared secret

: N/A

Central connection status

: connected

Central source

: cli

Central source connection status

: connected

Central source last connected on

: Wed Jun 28 23:07:25 UTC 2023

Main location

: 10.0.0.1

Main VRF

: mgmt

Alternative location

: 20.0.0.1

Alternative VRF

: default

Activate server URL

: devices-v2.arubanetworks.com

System time synchronized from Activate : N/A

Source IP

: N/A

Source IP Overridden

: False

Central support mode

: disabledswitch# show aruba-central

Central admin state

: enabled

Central location

: 20.0.0.1

VRF for connection

: default

Shared secret

: N/A

Central connection status

: connected

Central source

: cli

Central source connection status

: connected

Central source last connected on

: Wed Jun 28 23:07:25 UTC 2023

Main location

: 10.0.0.1

Main VRF

: mgmt

Alternative location

: 20.0.0.1

Alternative VRF

: default

Activate server URL

: devices-v2.arubanetworks.com

System time synchronized from Activate : N/A

Source IP

: N/A

Source IP Overridden

: False

Central support mode

: disabled

Example of a switch when the location is obtained from DHCP options:

switch# show aruba-central Central admin state Central location

: enabled : central-western-us.arubanetworks.com

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

182

VRF for connection

: RED

Shared secret

: N/A

Central connection status

: connected

Central source

: DHCP

Central source connection status

: connected

Central source last connected on

: Fri Jun 30 20:22:33 UTC 2023

Main location

: central-western-us.arubanetworks.com

Main VRF

: mgmt

Alternative location

: N/A

Alternative VRF

: N/A

Activate server URL

: devices-v2.arubanetworks.com

System time synchronized from Activate : N/A

Source IP

: 100.0.0.1

Source IP Overridden

: False

Central support mode

: disabled

Example of a switch when Aruba Central is disabled:

switch# show aruba-central

Central admin state

: disabled

Central location

: N/A

VRF for connection

: N/A

Shared secret

: N/A

Central connection status

: N/A

Central source

: none

Central source connection status

: N/A

Central source last connected on

: N/A

Main location

: N/A

Main VRF

: N/A

Alternative location

: N/A

Alternative VRF

: N/A

Activate server URL

: devices-v2.arubanetworks.com

System time synchronized from Activate : N/A

Source IP

: N/A

Source IP Overridden

: False

Central support mode

: disabledswitch# show aruba-central

Central admin state

: disabled

Central location

: N/A

VRF for connection

: N/A

Shared secret

: N/A

Central connection status

: N/A

Central source

: none

Central source connection status

: N/A

Central source last connected on

: N/A

Main location

: N/A

Main VRF

: N/A

Alternative location

: N/A

Alternative VRF

: N/A

Activate server URL

: devices-v2.arubanetworks.com

System time synchronized from Activate : N/A

Source IP

: N/A

Source IP Overridden

: False

Central support mode

: disabled

Example of a switch when Aruba Central is not reachable:

switch# show aruba-central Central admin state Central location

: enabled : N/A

| 183

VRF for connection

: N/A

Shared secret

: N/A

Central connection status

: not-reachable

Central source

: activate

Central source connection status

: connected

Central source last connected on

: Fri Jun 30 20:22:33 UTC 2023

Main location

: N/A

Main VRF

: N/A

Alternative location

: N/A

Alternative VRF

: N/A

Activate server URL

: devices-v2.arubanetworks.com

System time synchronized from Activate : N/A

Source IP

: N/A

Source IP Overridden

: False

Central support mode

: disabled

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.12.1000 10.07 or earlier

Modification Enhanced to support more scenarios --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show running-config current-context
show running-config current-context
Description
Shows the running configuration for the current-context. If user is in the context of Aruba-Central (config-aruba-central), then Aruba Central running configuration is displayed.
Examples
Shows the running configuration of Aruba Central:
switch(config-aruba-central)# show running-config current-context aruba-central
disable

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

184

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show capacities
show capacities <FEATURE> [vsx-peer]
Description
Shows system capacities and their values for all features or a specific feature.

Parameter <FEATURE> vsx-peer

Description
Specifies a feature. For example, aaa or vrrp.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
Capacities are expressed in user-understandable terms. Thus they may not map to a specific hardware or software resource or component. They are not intended to define a feature exhaustively.
Examples
Showing all available capacities for BGP:

switch# show capacities bgp

System Capacities: Filter BGP

Capacities Name

Value

----------------------------------------------------------------------------------

-

Maximum number of AS numbers in as-path attribute

32

...

Showing all available capacities for mirroring:

| 185

switch# show capacities mirroring

System Capacities: Filter Mirroring

Capacities Name

Value

----------------------------------------------------------------------------------

-

Maximum number of Mirror Sessions configurable in a system

4

Maximum number of enabled Mirror Sessions in a system

4

Showing all available capacities for MSTP:

switch# show capacities mstp

System Capacities: Filter MSTP

Capacities Name

Value

----------------------------------------------------------------------------------

-

Maximum number of mstp instances configurable in a system

64

Showing all available capacities for VLAN count:

switch# show capacities vlan-count

System Capacities: Filter VLAN Count

Capacities Name

Value

----------------------------------------------------------------------------------

-

Maximum number of VLANs supported in the system

4094

/switch# show capacities vlan-count

System Capacities: Filter VLAN Count

Capacities Name

Value

----------------------------------------------------------------------------------

-

Maximum number of VLANs supported in the system

4094

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

186

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show capacities-status
show capacities-status <FEATURE> [vsx-peer]
Description
Shows system capacities status and their values for all features or a specific feature.

Parameter <FEATURE> vsx-peer

Description
Specifies the feature, for example aaa or vrrp for which to display capacities, values, and status. Required.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing the system capacities status for all features:

switch# show capacities-status

System Capacities Status

Capacities Status Name

Value

Maximum

----------------------------------------------------------------------------------

-------

Number of active gateway mac addresses in a system

0

16

Number of aspath-lists configured

0

64

Number of community-lists configured

0

64

...

Showing the system capacities status for BGP:

switch# show capacities-status bgp

System Capacities Status: Filter BGP

Capacities Status Name

Value Maximum

----------------------------------------------------------------------------------

--

Number of aspath-lists configured

0

64

Number of community-lists configured

0

64

Number of neighbors configured across all VRFs

0

50

Number of peer groups configured across all VRFs

0

25

Number of prefix-lists configured

0

64

Number of route-maps configured

0

64

| 187

Number of routes in BGP RIB Number of route reflector clients configured across all VRFs

0

256000

0

16

Showing the system capacities status for L3:

switch# show capacities-status l3

System Capacities Status: Filter L3 resources

Capacities Status Name

Value

Maximum

----------------------------------------------------------------------------------

--

Number of IP neighbor (IPv4+IPv6) entries

4

49152

Number of IP Directed Broadcast neighbor entries

0

4096

Number of IPv6 Long Prefix Routes currently configured

3

5000

Number of IPv6 neighbor(ND) entries

4

49152

Number of L3 Groups for IP Tunnels and ECMP Groups currently configured 1

2047

Number of L3 Destinations for Routes, Nexthops in ECMP groups and

Tunnels currently configured

4

2045

Number of routes (IPv4+IPv6) currently configured

5

65536

Number of IPv4 routes currently configured

0

65536

Number of IPv6 routes currently configured with prefix 0-64

4

13312

Number of IPv6 routes currently configured with prefix 65-127

2

510

switch# show capacities-status l3

System Capacities Status: Filter L3 resources

Capacities Status Name

Value

Maximum

----------------------------------------------------------------------------------

--

Number of IP neighbor (IPv4+IPv6) entries

4

49152

Number of IP Directed Broadcast neighbor entries

0

4096

Number of IPv6 Long Prefix Routes currently configured

3

5000

Number of IPv6 neighbor(ND) entries

4

49152

Number of L3 Groups for IP Tunnels and ECMP Groups currently configured 1

2047

Number of L3 Destinations for Routes, Nexthops in ECMP groups and

Tunnels currently configured

4

2045

Number of routes (IPv4+IPv6) currently configured

5

65536

Number of IPv4 routes currently configured

0

65536

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

188

Number of IPv6 routes currently configured with prefix 0-64

4

13312

Number of IPv6 routes currently configured with prefix 65-127

2

510

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.13

10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification Updated to show newly supported configuration of IPv6 routes on the ASIC. --
Authority Administrators or local user group members with execution rights for this command.

show object-group
show object-group [{ip|ipv6} address | port] [<OBJECT-GROUP-NAME>] [commands] [configuration]
Description
Shows information about your defined object groups. When show object-group is entered without parameters, information for all object groups is shown. The parameters filter the list of object groups for which information is shown.

Parameter [{ip|ipv6} address | port] <OBJECT-GROUP-NAME> [commands]
[configuration]
vsx-peer

Description
Specifies the object group type, either address for an IP address, or port.
Specifies the object group name.
Specifies that the object group definition is to be shown as the commands and parameters used to create it rather than in tabular form.
Specifies that the user-configured object groups be shown as configured. The output of the command with this parameter may not be the same as what is active on the switch due to a misconfigured object group. See Examples in this topic.
Shows the output from the VSX peer switch. If the switches do not

| 189

Parameter

Description
have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing configured object groups:

switch# show object-group

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

IPv4

my_address_group

10 192.168.0.1

20 192.168.0.3

Port

my_port_group

10 eq 80

20 gt 65525

switch#

switch# show object-group commands

object-group ip address my_address_group

10 192.168.0.1

20 192.168.0.3

object-group port my_port_group

10 eq 80

20 gt 65525

Showing a misconfigured object group:

switch# show object-group

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

! object-group ip address My_ip_object_group user configuration does not match

! the active hardware configuration. Run 'object-group ip address NAME reset'

! to reset the object group to match the active hardware configuration.

IPv4

my_address_group

switch#

switch#

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

! object-group ip address My_ip_object_group user configuration does not match

! the active hardware configuration. Run 'object-group ip address NAME reset'

! to reset the object group to match the active hardware configuration.

IPv4

my_address_group

switch#

switch# show object-group configuration

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

! object-group ip address My_ip_object_group user configuration does not match

! the active hardware configuration. Run 'object-group ip address NAME reset'

! to reset the object group to match the active hardware configuration.

IPv4

my_address_group

10 192.168.0.1

20 192.168.0.3

switch#

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

190

switch# show object-group commands ! object-group ip address My_ip_object_group user configuration does not match ! the active hardware configuration. Run 'object-group ip address NAME reset' ! to reset the object group to match the active hardware configuration. switch# switch# show object-group commands configuration ! object-group ip address My_ip_object_group user configuration does not match ! the active hardware configuration. Run 'object-group ip address NAME reset' ! to reset the object group to match the active hardware configuration. object-group ip address my_address_group
10 192.168.0.1 20 192.168.0.3

Resetting a misconfigured object group:

switch(config)# object-group all reset

switch(config)# exit

switch# show object-group

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

IPv4

my_address_group

switch#

switch# show object-group configuration

Type

Name

Sequence L4 Port(s)/IP Address

-------------------------------------------------------------------------------

IPv4

my_address_group

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

| 191

Chapter 6
ACL and Policy hardware resource commands

ACL and Policy hardware resource commands

show resources
show resources [<SLOT-ID>] [vsx-peer]
Description
On the 6300 switch, shows hardware resource consumption for the specified VSF member or for all VSF members. On the 6400 switch, shows hardware resource consumption for the specified line module or for all line modules. Resource data is updated every 10 seconds. Hardware resource consumption information is shown for:
n TCAM entries n TCAM lookups n Policers

Parameter <SLOT-ID>
vsx-peer

Description
Specifies the VSF member on the 6300 switch and the member and slot of the line module on the 6400 switch. For example, on the 6400 switch, to specify the line module in member 1, slot 2, enter 1/2.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
The widths for show resources can have features combined (IPv4 + IPv6) into one TCAM lookup. Therefore, the table widths for each ACL/classifier policy type are variable depending on what is applied. For example:

"Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entries/ "Ingress IP Port ACL" = Ingress v4 Port
ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entriC(v2) / "Ingress IP Port ACL" = Ingress v4
Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entries/ "Ingress IP Port ACL" = Ingress v4 Port
ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entriC(v2C(v2)/ "Ingress IP Port ACL" = Ingress
v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries

AOS-CX 10.14 Command-Line Interface Guide

192

= 5 TCAM entries/ "Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs
= 1 TCAM entry + 4 TCAM entries = 5 TCAM entriC(v2C(v2) / "Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entries/ "Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entriC(v2) / "Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entries/ "Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entriC(v2C(v2)/ "Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entries/ "Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entriC(v2C(v2C(v2)/ "Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entries/ "Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entriC(v2) / "Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entries/ "Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entriC(v2C(v2)/ "Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entries/ "Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entriC(v2C(v2C(v2)
Widths per feature are as follows:
MAC ACL 1 IPv4 ACL 1 IPv6 ACL 4 MAC Class 1 IPv4 Class 2 IPv6 Class 4
A MAC Class with an ethertype of "any" has a width of 7 because it uses one TCAM entry each for MAC, IPv4, and IPv6. Specifying the IPv4 (0x0800) or IPv6 (0x86DD) ethertypes in a MAC Class uses a TCAM entry equal to their respective size. IPv4 uses a width of 2 and IPv6 uses a width of 4.
"Ingress IP Port ACL" = Ingress v4 Port ACLs + Ingress v6 Port ACLs = 1 TCAM entry + 4 TCAM entries = 5 TCAM entries
ACL and Policy hardware resource commands | 193

IPv4 ACL 2 MAC ACL 2 IPv6 ACL 4 IPv4 Class 2 IPv6 Class 4

Examples
Showing hardware resource consumption on a 6300 switch:

switch# show resources

Resource Usage:

Mod Description

Resource

Used Reserved Free

-------------------------------------------------------------------------

1/1 Ingress IP Port ACL Lookup

Ingress TCAM Entries

20

0 5093

Total

Ingress Lookups

1

0

4

Egress Lookups

0

0

4

Showing hardware resource consumption for all line modules on a 6405 switch:

switch# show resources

Resource Usage:

Mod Description

Resource

Used

Free

-------------------------------------------------------------------------

1/3 Total

Ingress Lookups

0

5

Egress Lookups

0

4

1/5 Total

Ingress Lookups

0

5

Egress Lookups

0

4

switch# show resources

Resource Usage:

Mod Description

Resource

Used Reserved Free

-------------------------------------------------------------------------

1/1 Total

Ingress TCAM Entries

0

0 5120

Egress TCAM Entries

0

0 2048

Ingress Lookups

0

9

Egress Lookups

0

4

Ingress Policers

0

2047

Egress Policers

0

2047

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

194

switch# show resources

Resource Usage:

Mod Description

Resource

Used Reserved Free

-------------------------------------------------------------------------

1/1 Ingress IPv4 VLAN ACL Lookup

Ingress TCAM Entries

4

128

Ingress IPv6 VLAN ACL Lookup

Ingress TCAM Entries

8

128

Ingress IP CPURX Lookup

Ingress TCAM Entries

126

128

Ingress Policers

19

Ingress IP Port Policy Lookup

Ingress TCAM Entries

2

128

Ingress IP VLAN Policy Lookup

Ingress TCAM Entries

12

128

Total

Ingress TCAM Entries

152

640 3448

Ingress Lookups

5

27

Ingress Policers

19

2029

switch# show resources 1/1

Resource Usage:

Mod Description

Resource

Width Used Reserved Free

-------------------------------------------------------------------------

1/1 Ingress IPv4 Port ACL

High-Capacity TCAM/LPM Entries

2

0 262144

MAC Control Plane Policing

TCAM Entries

2

16

256

IPv4 Control Plane Policing

TCAM Entries

2

70

256

IPv6 Control Plane Policing

TCAM Entries

2

72

*

IPv4 Unicast Route

High-Capacity TCAM/LPM Entries

1

0 131072

IPv6 Unicast Route

High-Capacity TCAM/LPM Entries

2

0 262144

IPv4 Multicast Route

High-Capacity TCAM/LPM Entries

2

0 65536

IPv6 Multicast Route

High-Capacity TCAM/LPM Entries

4

0 65536

Total

TCAM Entries

158

512 49664

High-Capacity TCAM/LPM Entries

0 786432 258048

Policers

0

65536

Ingress L4 Port Ranges

0

24

* This feature shares reserved resources with the preceding feature.

switch# show resources

Resource Usage:

Mod Description

Resource

Width Used Reserved Free

-------------------------------------------------------------------------

1/1 Ingress IPv4 Port ACL

ACL and Policy hardware resource commands | 195

Ingress TCAM Entries Ingress MAC+IPv4 Port Policy
Ingress TCAM Entries Ingress Control Plane Policing
Ingress TCAM Entries Egress Control Plane Policing
Egress TCAM Entries Total
Ingress TCAM Entries Egress TCAM Entries Policers Ingress L4 Port Ranges

1

2

2048

2

8

2048

2

152

1024

2

84

256

162

5120 11264

84

256

768

0

16384

0

32

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

196

Chapter 7
Application Recognition and Control commands

Application Recognition and Control commands
app-recognition
[no] app-recognition [no]enable
Description
The ARC feature recognize applications running on the network and control them based on user configurations. You can enable ARC globally, or on one or more interfaces and physical bridged ports. The no form of this command deletes the ARC configuration context.
IP source lockdown resource extended mode needs to be disabled before you enable ARC feature. For more information, see the IP Services Guide.

Parameter [no] enable

Description Enable or disable ARC for both IPv4 and IPv6 Flows

Examples
The following example creates the ARC configuration context.

switch(config)# app-recognition

The following example deletes the ARC configuration context.

switch(config)# no app-recognition

The following example enables application traffic recognition globally.

switch(config)# app-recognition switch(config-app-recognition)# enable

The following example disable application traffic recognition globally.

switch(config)# app-recognition switch(config-app-recognition)# no enable

The following example enables application traffic recognition on interface 1/1/1.

AOS-CX 10.14 Command-Line Interface Guide

197

switch(config)# int 1/1/1 switch(config-if)# app-recognition enable
The following example disable application traffic recognition on interface 1/1/1.
switch(config)# int 1/1/1 switch(config-if)# no app-recognition enable
The following example enables application traffic recognition for user role guest.
switch(config)# port-access role guest switch(config-pa-role)# app-recognition enable
The following example disable application traffic recognition for user role guest.
switch(config)# port-access role guest switch(config-pa-role)# no app-recognition enable

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400 (v2 profile only

Command context
config config-if config-app-recognition

Authority
Administrators or local user group members with execution rights for this command.

show app-recognition
show app-recognition [<IF-NAME> | <IF-RANGE>] app [<APP-NAME>] app-category [<APP-CATEGORY>]
Description
Displays ARC configuration and status.

Application Recognition and Control commands | 198

Parameter app-recognition <IF-NAME> <IF-RANGE> app app <APP-NAME> app-category app-category <APP-CATEGORY>

Description
Display ARC information globally.
Display ARC information for an interface.
Display ARC information for the specified range of interface.
Display application information.
Display information for the specified application.
Display application category information.
Display information for the specified application category. n antivirus: Antivirus updates n any: Any application category n authentication: Protocol used for authentification purposes n behavioral: Protocol classified by non-deterministic criteria
based on statistical analysis of packet form and session behavior n cloud-file-storage: Cloud File Storage related applications n collaboration: Collaboration applications n custom: Custom family of applications n encrypted: Encryption protocol applications n enterprise-apps: Enterprise applications n gaming: Gaming protocol and applications n im-file-transfer: IM File Transfer application category n instant-messaging: Instant Messaging applications n mail-protocols: Email exchange protocol n mobile: Mobile applications n mobile-app-store: Mobile app store and applications n network-service: Low level network protocol and applications n peer-to-peer: Peer to Peer applications n social-networking: Social Networking applications n standard: Standard applications n streaming: Streaming applications n thin-client: Remote control protocol and applications n tunneling: Tunneling protocol and applications n unified-communications: Unified Communication protocols and applications n unknown: Unknown applications n web: Generic web traffic n webmail: Web email applications

Usage
ARC can be enabled directly on an interface or can be enabled via a port-access role. When ARC is enabled on a port-access role, all the interfaces associated with that role are enabled with ARC.
The names of the applications used in the document are the intellectual property of their respective companies that make them. The trademark names are used only as examples in the document.

Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

199

The following example displays global application port configuration information. The User-Config column reflects the direct enablement on a specific port, Port-Access-Config column reflects the enablement on a port-access role and the Oper-Status column reflects the final state of the ARC on that port.

switch# show app-recognition

Application Recognition Global Configuration

Configuration status

: Enabled

Operational Status

: Enabled

ABP Session Limit Exceed Action : Drop New Flows

Operational Mode

: Fast

Failure Reason

: NA

Application Recognition Port Configuration

Interface User-Config Port-Access-Config

Oper-Status

---------------------------------------------------------------

1/1/1

Enabled

Disabled

Enabled

1/2/3

Disabled

Disabled

Disabled

1/2/4

Disabled

Enabled

Enabled

1/2/5

Enabled

Enabled

Enabled

The following example displays the ARC configuration on interface 1/1/1.

switch#show app-recognition 1/1/1

Application Recognition Port Configuration

Interface User-Config Port-Access-Config

Oper-Status

-----------------------------------------------------------------

1/2/1

Enabled

Disabled

Enabled

The following example displays the ARC configuration for the specified interface range 1/2/3-1/2/5.

switch# show app-recognition 1/2/3-1/2/5

Application Recognition Port Configuration

Interface User-Config Port-Access-Config

Oper-Status

-----------------------------------------------------------------

1/2/3

Enabled

Disabled

Enabled

1/2/4

Disabled

Enabled

Enabled

1/2/5

Enabled

Enabled

Enabled

The following example displays a list of applications recognized by the traffic application feature.

switch# show app-recognition app

NAME

ID CATEGORY

DESCRIPTION

-------------- ----- ---------------------- -------------------------------

call-of-duty 3490 gaming

Call of duty (aka COD) is a video

game ...

facebook

244 social-networking

Facebook is a social network.

twitter

503 social-networking

Online microblogging service that

enables...

Application Recognition and Control commands | 200

NAME

ID CATEGORY

DESCRIPTION

-------------- ----- ---------------------- -------------------------------

call-of-duty 3490 gaming

Call of duty (aka COD) is a video

game ...

facebook

244 social-networking

Facebook is a social network.

twitter

503 social-networking

Online microblogging service that

enables...

The following example displays information for Facebook.

switch# show app-recognition app facebook

NAME

: facebook

ID

: 244

CATEGORY : social-networking

DESCRIPTION : Facebook

The following example displays a list of application category recognized by the traffic application feature.

switch# show app-recognition app-category

CATEGORY

DESCRIPTION

----------------------- ------------------------------------

gaming

Gaming application category

social-networking

Social Networking application category

The following example displays information for gaming category.

switch# show app-recognition app-category gaming

NAME

: gaming

DESCRIPTION : Gaming application category

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms
6300 6400 (v2 profile only)

Command context Manager (#)

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

class

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

201

[no] class {abp-ip | abp-ipv6} <CLASS-NAME> [no] [<SEQUENCE-NUMBER>] {match|ignore} {tcp|udp|any} {SRC-IP-ADDRESS} [{gt|lt} <PORT>|range <MIN-PORT> <MAX-PORT>|eq {<PORT-NAME>|<PORT>}] {any|<DST-IP-ADDRESS|DST-L4-PORT>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]} [{gt|lt} <PORT>|range <MIN-PORT> <MAX-PORT>|eq {<PORT-NAME>|<PORT>}] {app-category {any | <APP-CATEGORY>} {app {any | <APP-NAME>}} [count]
[no] [<SEQUENCE-NUMBER>] {match|ignore} {any} {SRC-IP-ADDRESS} [{gt|lt} <PORT>|range <MIN-PORT> <MAX-PORT>|eq {<PORT-NAME>|<PORT>}] {any|<DST-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]} {app-category {any | <APP-CATEGORY>} {app {any | <APP-NAME>}} [count]
[no] <SEQUENCE-NUMBER>
class {abp-ip | abp-ipv6} <CLASS-NAME> resequence <STARTING-SEQUENCE-NUMBER> <INCREMENT> class {abp-ip | abp-ipv6} <CLASS-NAME> copy <DESTINATION-CLASS>
Description
Create and configure a class to match application-based packets. The no keyword can be used to delete either a class or an individual class entry.

Parameter abp-ip abp-ipv6 app <APP-NAME>

Description
Create or configure an IPv4 application-based policy.
Create or configure an IPv6 application-based policy.
Configure a class for the specified application.
NOTE: The app <unknown> under app-category <standard> matches all recognized flows whose application id is unknown or unmapped.

app-category {<APP-CATEGORY>}

Configure a class for the specified application category.
NOTE: A class configured to match against the unknown appcategory matches all recognized flows whose application id is unknown. A class configured to match against the any appcategory matches all recognized flows regardless of their application id.
Application-based policies can be applied to anyof the following application types: n antivirus-- Antivirus updates n any-- Matches all recognized flows irrespective of their
application id n authentication-- Protocol used for authentification
purposes n behavioral-- Protocol classified by non-deterministic criteria
based on statistical analysis of packet form and session behavior n cloud-file-storage-- Cloud File Storage related applications n collaboration-- Collaboration applications n custom-- Custom family of applications n encrypted-- Encryption protocol applications n enterprise-apps--Enterprise applications

Application Recognition and Control commands | 202

Parameter
CLASS-NAME comment <STRING>> copy <DESTINATION-CLASS> count dst-ip-address
/{<PREFIX-LENGTH>|<SUBNETMASK>} dst-l4-port gt <port>

Description
n gaming--Gaming protocol and applications n im-file-transfer-- IM File Transfer application category n instant-messaging-- Instant Messaging applications n mail-protocols-- Email exchange protocol n mobile--Mobile applications n mobile-app-store--Mobile app store and applications n network-service--Low level network protocol and
applications n peer-to-peer--Peer-to-Peer applications n social-networking--Social Networking applications n standard-- Standard applications n streaming-- Streaming applications n thin-client--Remote control protocol and applications n tunneling-- Tunneling protocol and applications n unified-communications--Unified Communication protocols
and applications n unknown--Unknown applications n web--Generic web traffic n webmail-- Web email applications
Define a class name for which the application-based policy is being created or configured.
Add a comment to the traffic class.
Copy the settings of this traffic class to another specified traffic class.
NOTE: Copying a class to a pre-existing class will overwrite the pre-existing entries with new entries.
Calculates the number of times the ABP was applied to the traffic.
Specify a destination IP address to classify traffic to this destination IP.
Optional. Specify an address mask for the destination IP in one of the following formats: n /<PREFIX-LENGTH>: Subnet mask in CIDR notation.It is an
integer between 1 to 32. n <SUBNET-MASK>: Subnet mask in dotted-decimal notation
(for example, 255.255.255.0).
Specify a destination L4 port or port range to classify traffic to this destination port. Only on selecting tcp|udp you get the option to configure the destination L4 port or port range.
Classify traffic to a layer 4 destination port with a port numbers greater than the specified layer 4 port number.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

203

Parameter lt <port> eq <port>
range <min-port>-<max-port> ignore match no ... resequence <STARTING-SEQUENCENUMBER> <INCREMENT>
[all]reset
SEQUENCE-NUMBER SRC-IP-ADDRESS

Description
Classify traffic to a layer 4 destination port with a port numbers lesser than the specified layer 4 port number.
Classify traffic to layer 4 source port. n PORT-NAME--A single Layer 4 port name
{ftpdata|ftp|ssh|telnet|smtp|tacacs|dns|dhcpserver|dhcp-client| tftp|http|https|pop3|nntp|ntp|dcerpc|netbios-ns|netbios-dgm| netbios-ssn|snmp|snmptrap|bgp|ldap|microsoftds|isakmp|syslog|imap4| radius|radius-acct|iscsi|rdp|nat-t|vxlan}
n PORT--A single Layer 4 port
Layer 4 port range. n min-port--The start of a Layer 4 port range. n max-port--The end of a Layer 4 port range.
Creates a rule that ignores traffic to the specified destination, application, or application category.
Creates a rule that matches traffic to the specified destination, application, or application category.
Negates any configured parameter.
By default, rules added to a traffic class are applied in the order in which they are created. You can also use the sequence parameter to define the sequence numbers for each rule in the traffic class. To change the order in which a rule is applied, you must change its sequence number. Use the resequence command and specify the current (starting) sequence number of the rule, and the number by which you want to increment the rule. For example, use the parameters resequence 40 10 to change the rule with the sequence value of 40 to have a sequence value of 30 (an increase of 10).
Use this parameter to change the user-specified applicationbased policy configuration to match the active application-based policy configuration. n class all reset: reset all classes. n class <name> reset: reset only the specified class. n class abp-ip reset: reset all IPv4 application-based policy
classes. n class abp-ipv6 reset: reset all IPv6 application-based policy
classes.
Specify the class entry sequence number. Integer (1-4294967295)
Source IP Address parameter value must be set to any source.

Application Recognition and Control commands | 204

Parameter src-l4-port
eq <port> gt <port>
lt <port>
tcp udp

Description
Specify a source L4 port or port range to classify traffic from this source port.
Classify traffic from the specified source port.
Classify traffic from source ports with port numbers greater than the specified port number.
Classify traffic from source ports with port numbers lesser than the specified port number.
Apply the application classification policy to TCP traffic
Apply the application classification policy to UDF traffic

Usage

Application based classification works only for the ports that has application recognition enabled. For more information on enabling application recognition on a port, see app-recognition.
When a client initiates a new traffic flow, the AOS-CX app recognition module views the first few initial packets to learn the flow and identify the application. Application-based policy rules are applied only after this flow recognition phase. Application based policies have a default deny behavior that is applied to traffic flows that do not match any configured ABP rules. This implicit deny rule is added to the policy only after the flow recognition phase is completed.
It is possible to create redundant class entries for a class that have the same match criteria and actions. Avoid redundant class entries, as each redundant copy of the class will consume additional processing resources.

Examples
The following example creates a application IPv4 class my_app_ipv4_cls with four rule entries.
switch(config)# class abp-ip my_app_ipv4_cls switch(config-class-abp-ip)# 10 match udp any any app-category web app youtubemusic count switch(config-class-abp-ip)# 20 match tcp any eq 60 any app-category enterpriseapps app workday switch(config-class-abp-ip)# 30 match any any any app-category any app any count switch(config-class-abp-ip)# 40 ignore any any 10.0.0.10/24 app-category standard app unknown
The following example creates a application IPv6 class my_app_ipv6_cls with two rule entries.
switch(config)# class abp-ipv6 my_app_ipv6_cls switch(config-class-abp-ipv6)# 10 match any any 2001:db8::1319:8a2e:370:7348 appcategory standard app unknown switch(config-class-abp-ipv6)# 20 match udp any eq telnet any app-category socialnetworking app instagram count

For more information on features that use this command, refer to the Security Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

205

Command History

Release 10.12

Modification Command introduced.

Command Information

Platforms
6300 6400 (v2 profile only

Command context
config config-class-abp-ip config-class-abp-ipv6

Authority
Administrators or local user group members with execution rights for this command.

show class
show class {abp-ip | abp-ipv6} <CLASS-NAME> [commands] [configuration]
Description
Display information of the active classes that are configured and accepted by the system.

Parameter abp-ip
abp-ipv6
commands configuration
comment <string> copy <DESTINATION-CLASS>

Description
Display information for all IPv4 application classes that have been configured and accepted by the system.
Display information for all IPv6 application classes that have been configured and accepted by the system.
Display the commands used to configure the current application-based policies.
Display a list of commands use to configure the active application-based policy classes.
Add a comment to the traffic class,
Copy the settings of this traffic class to another specified traffic class.
NOTE: Copying a class to a pre-existing class will overwrite the pre-existing entries with new entries.

dst-ip-address <DST-IP-ADDRESS> /<PREFIX-LENGTH>|<SUBNET-MASK>}

Specify a destination IP address to classify traffic to this destination IP.
Optional. Specify an address mask for the destination IP in one of the following formats: n /<PREFIX-LENGTH>: Subnet mask in

Application Recognition and Control commands | 206

Parameter
dst-l4-port eq <port> gt <port> lt <port> range <min-port>-<max-port>
ignore match no .., resequence <STARTING-SEQUENCE-NUMBER>
<INCREMENT>
src-l4-port eq <port> gt <port>

Description
CIDR notation. It is an integer between 1 to 32. n <SUBNET-MASK>: Subnet mask in dotted-decimal notation (for example, 255.255.255.0).
Specify a destination L4 port or port range to classify traffic to this destination port.
Classify traffic to the specified destination port.
Classify traffic to destination ports with port numbers greater than the specified port number.
Classify traffic to destination ports with port numbers lesser than the specified port number.
Classify traffic to destination ports within the specified range.
Creates a rule that ignores traffic to the specified destination, application, or application category.
Creates a rule that matches traffic to the specified destination, application, or application category.
Negates any configured parameter.
By default, rules added to a traffic class are applied in the order in which they are created. You can also use the sequence parameter to define the sequence numbers for each rule in the traffic class. To change the order in which a rule is applied, you must change its sequence number. Use the resequence command and specify the current (starting) sequence number of the rule, and the number by which you want to increment the rule. For example, use the parameters resequence 40 10 to change the rule with the sequence value of 40 to have a sequence value of 30 (an increase of 10).
Specify a source L4 port or port range to classify traffic from this source port.
Classify traffic from the specified source port.
Classify traffic from source ports with port

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

207

Parameter
lt <port> range <min-port>-<max-port> tcp udp

Description
numbers greater than the specified port number.
Classify traffic from source ports with port numbers lesser than the specified port number.
Classify traffic from source ports within the specified range.
Apply the application classification policy to TCP traffic
Apply the application classification policy to UDF traffic

Usage
The show class configuration displays all configured classes. The output of this command may differ from the active application poicy configuration if a class is configured with an unsupported parameter, or if a the class was not applied due to a lack of hardware resources. To determine if there is a discrepancy between what was configured and what is active, compare the output of the show class and show class configuration commands. If an active class and configured class are not the same, the output of the show class configuration command can display a warning message to help troubleshooting the problem. For example:

class abp-ip my_app_class user configuration does not match active configuration. run 'class TYPE NAME reset' to reset class to match active configuration.

If a new configured class is in the learning phase and currently getting processed, the output of the show class configuration command displays the following message:

class abp-ip my_app_class user configuration currently being processed run 'show class [commands]' to display active class configuration.

It is possible to create redundant class entries in a class that have the same match criteria and action. Such a configuration is not recommended, as each redundant copy of the class entry will consume additional processing resources.

Examples
The following example displays all IPv4 traffic application classes configured on the switch.

switch# show class abp-ip

User Configured abp-ipv4 classes: =================================

Type

Name

Sequence Comment

Action

Application

Application Recognition and Control commands | 208

Destination IP Address

L3 Protocol

Source L4 Port(s)

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

abp-ipv4 class1

10

match

social-networking - facebook

20

ignore

unknown

10.0.0.10/24

30

match

social-networking - instagram

tcp

443

-------------------------------------------------------------------------------

abp-ipv4 class2

10

match

music

udp

20

match

news

tcp

443

The command output in the folloiwng example displays the commands used to configure the application classes shown in the output shown above.

switch# show class commands class abp-ip class1 10 match any app-category social-networking app facebook class abp-ip class2 10 ignore any app-category web 20 match any app-category any

For more information on features that use this command, refer to the Security Guide for your switch model.

Related Commands
Command class
Command History
Release 10.12
Command Information

Description Create and configure an application classification policy.
Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

209

Platforms
6300 6400 (v2 profile only

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

abp-session-limit-exceed-action
[no] abp-session-limit-exceed-action {drop-new-flows | log-only}
Description
The CLI command configures the Application Based Policy (ABP) Session Limit Exceed Action. Using this configuration, the new flow entries are either dropped or logged without ABP inspection when the session table is full. The no form of this command updates the ABP Session Limit Exceed Action to drop-new-flows.

Parameter drop-new-flows
Log-only

Description
This is the default action for the command abp-session-limitexceed-action. If the session table is full all new flows associated with clients that have ABP configured are dropped.
If the session table is full, it will log warnings. ABP inspection is not performed and the new traffic flows are not dropped.

Examples
When the session table is full, all new flows that have ABP configured are dropped.

switch(config)# app-recognition switch(config-app-recognition)# abp-session-limit-exceed-action drop-new-flows

When the session table is full, only warnings are logged without ABP inspecting and the new client traffic flow passes through.

switch(config)# app-recognition switch(config-app-recognition)# abp-session-limit-exceed-action log-only

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.12
Command Information

Modification Command introduced.

Application Recognition and Control commands | 210

Platforms
6300 6400 (v2 profile only

Command context
config config-app-recognition

Authority
Administrators or local user group members with execution rights for this command.

mode
mode fast default no ...
Description
This command configures Application Recognition operational modes. The operational mode of the Application Recognition feature determines the number of packets processed for each flow and the extent to which attributes can be extracted. With the default setting enabled, more packets are processed for each flow, and Application Recognition can extract more attributes for those flows. With the fast setting enabled, Application Recognition reduces the number of packets processed for each flow, but will increase the number of connections per second.

Parameter fast default
no ...

Description
Relies on first packet classification to extract information only about the application name and application category.
This default setting allows the Application Recognition feature to process additional packets to determine the URL and TLS attributes.
The no form of this command sets the mode back to its default value.

Examples
The following example sets the Application Recognition mode to fast.

switch(config)# app-recognition switch(config-app-recognition)# mode fast

The following example removes the fast option and returns the mode to the default value.

switch(config)# app-recognition switch(config-app-recognition)#no mode fast

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

211

Release 10.14

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-app-recognition

Authority
Administrators or local user group members with execution rights for this command.

port-access abp
[no] port-access abp <POLICY-NAME> [no] [<SEQUENCE-NUMBER>] class {abp-ip | abp-ipv6} <CLASS-NAME> [action {drop | dscp <value> | local-priority <value> | mirror <value>}] [no] [<SEQUENCE-NUMBER>] comment <TEXT-STRING>
port-access abp <POLICY-NAME> resequence <STARTING-SEQUENCE-NUMBER> <INCREMENT> port-access abp <POLICY-NAME> copy <DESTINATION-POLICY> port-access abp <POLICY-NAME> reset
[no] port-access role <ROLE-NAME> [no] associate abp <POLICY-NAME>
Description
Create, configure and delete the application-based policy and its entries. The no keyword can be used to delete either a class or an individual class entry.

Parameter action {drop | dscp | local-priority | mirror}

Description
Specify the action Application Recognition will perform for the specified class. drop: Drops the traffic. The default action for a policy entry is permit, if the action is not specified. dscp: Specify the Differentiated Services Code Point value between 0 to 63 or a keyword as follows:
AF11 - DSCP 10 (Assured Forwarding Class 1, low drop probability) AF12 - DSCP 12 (Assured Forwarding Class 1, medium drop probability) AF13 - DSCP 14 (Assured Forwarding Class 1, high drop probability) AF21 - DSCP 18 (Assured Forwarding Class 2, low drop probability) AF22 - DSCP 20 (Assured Forwarding Class 2, medium drop probability)

Application Recognition and Control commands | 212

Parameter
abp-ip abp-ipv6 associate abp CLASS-NAME

Description
AF23 - DSCP 22 (Assured Forwarding Class 2, high drop probability) AF31 - DSCP 26 (Assured Forwarding Class 3, low drop probability) AF32 - DSCP 28 (Assured Forwarding Class 3, medium drop probability) AF33 - DSCP 30 (Assured Forwarding Class 3, high drop probability) AF41 - DSCP 34 (Assured Forwarding Class 4, low drop probability) AF42 - DSCP 36 (Assured Forwarding Class 4, medium drop probability) AF43 - DSCP 38 (Assured Forwarding Class 4, high drop probability) CS0 - DSCP 0 (Class Selector 0: Default) CS1 - DSCP 8 (Class Selector 1: Scavenger) CS2 - DSCP 16 (Class Selector 2: OAM) CS3 - DSCP 24 (Class Selector 3: Signaling) CS4 - DSCP 32 (Class Selector 4: Real time) CS5 - DSCP 40 (Class Selector 5: Broadcast video) CS6 - DSCP 48 (Class Selector 6: Network control) CS7 - DSCP 56 (Class Selector 7) EF - DSCP 46 (Expedited Forwarding) local-priority: Specify a valid localpriority value between 0 to 7. mirror: Specify the mirroring session. Only one mirroring session can be mapped to an application policy and only session 4 is supported.
Create or configure an IPv4 application-based policy.
Create or configure an IPv6 application-based policy.
Applies the policy to a role
Define a class name for which the application-based policy is being created or configured.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

213

Parameter comment <STRING>> no POLICY NAME resequence <STARTING-SEQUENCE-NUMBER> <INCREMENT>
reset ROLE NAME SEQUENCE-NUMBER

Description
Add or modify a comment to the application based policy entries.
Negates any configured parameter.
Name of the application based policy to associate with the role (maximum 128 characters).
By default, rules added to a traffic class are applied in the order in which they are created. You can also use the sequence parameter to define the sequence numbers for each rule in the traffic class. To change the order in which a rule is applied, you must change its sequence number. Use the resequence command and specify the current (starting) sequence number of the rule, and the number by which you want to increment the rule. For example, use the parameters resequence 40 10 to change the rule with the sequence value of 40 to have a sequence value of 30 (an increase of 10).
Resets the specified application based policy.
Name of the role to which the application based policy is associated.
Specify the class entry sequence number. Integer (1-4294967295)

Usage
Application policies comprise one or more policy entries. These policies are ordered and prioritized based on their sequence numbers. Each policy entry has the following:
n abp-ip (IPv4 traffic) or abp-ipv6 (IPv6 traffic) class n drop or permit policy actions
The application policy will examine a packet sequentially against all the policy entries and class entries until a match is made. If there are no matches, the packet will be dropped. The application policies are applied to a role using the associate abp command.
If an application policy is associated with a role, it cannot be removed from the configuration. To remove the policy, it must be unassociated from roles that are currently using it.
Entering an existing POLICY NAME value will cause the existing policy to be modified. If no SEQUENCENUMBER is entered then an additional policy entry is created with a new SEQUENCE-NUMBER. If an existing SEQUENCE-NUMBER is entered then the values of the existing SEQUENCE-NUMBER is replaced with the new value.

Application Recognition and Control commands | 214

If no SEQUENCE-NUMBER is specified, a new policy entry is added at the end of the entry list with a sequence number that is equal to the highest SEQUENCE-NUMBER of a policy entry currently in the list plus 10. The sequence numbers may be reordered with the class resequence command. The port-access role command is used to associate a application policy with the source user role.
Examples
Creating a new application class on an application policy with the POLICY-NAME name guest_policy.

switch(config)# port-access abp guest_policy switch(config-pa-app)# class abp-ip class1
10 match any any any app-category streaming app youtube count switch(config-pa-app)# class abp-ipv6 class2
10 match any any any app-category web app http count

Associate the application policy on a port access source role with the ROLE NAME role01.

switch(config)# port-access role role01 switch(config-pa-role)# associate abp guest_policy switch(config-pa-app)# exit switch(config)# show port-access role name role01

Role Information: Attributes overridden by RADIUS are prefixed by '*'.

Name : role01

Type : local

----------------------------------------------

Access VLAN

: 3000

Access VLAN Name

: hpe

App Recognition

: enabled

*App Based Policy

: guest_policy

Associate an existing policy guest_policy to the EMPLOYEE role.

switch(config)# port-access role EMPLOYEE switch(config-pa-role)# associate abp guest_policy

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13 10.12
Command Information

Modification
The sub-paramaters, dscp, local-priority, and mirror were introduced.
Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

215

Platforms
6300 6400 (v2 profile only

Command context
config config-class-abp-ip config-class-abp-ipv6

Authority
Administrators or local user group members with execution rights for this command.

show port-access abp
show [run] port-access abp show port-access abp [<POLICY-NAME>]
Description
Displays the application policies and its current usages. If the command is used without specifying the POLICY-NAME then it displays the details of all the configured application policies on the switch.

Parameter Application Policy Application policy status
POLICY-NAME

Description
Types of Application Policy: n Local--User configured policy n DUR--Downloadable User Role policies
The current running status of the Application policy: n Applied--Policy is successfully applied in the hardware n Rejected--Policy is not supported in the hardware. n In-Progress--Policy is being processed in the hardware.
Name of the application based policy to associate with the role (maximum 128 characters).

Examples
The following example display all application policies configured on the switch:

switch# show port-access abp Port Access Application Policy User Configured Policy Details: ============================================================== App Policy Name : app1 App Policy Type : Local App Policy Status : Applied

SEQUENCE CLASS

TYPE

ACTION

----------- -------------------------------- -------- -----------------------

10

class1

abp-ipv4 permit

App Policy Name : app-policy

App Policy Type : local

App Policy Status : applied

SEQUENCE CLASS

TYPE

ACTION

----------- ----------------------------- ---------- -----------------------------

------

10

app-class

abp-ipv4 drop

20

app-class

abp-ipv4 dscp AF31

30

app-class

abp-ipv4 local-priority 5

Application Recognition and Control commands | 216

40 50 mirror 4

app-class app-class

abp-ipv4 mirror 4 abp-ipv4 local-priority 3 dscp AF11

When no application policies are configured
switch# show port-access abp Application policy is not configured.

When the specified application policy does not exist
switch# show port-access abp plcy Application Based Policy does not exist.

Display the policy currently running on the port.

switch# show run port-access abp port-access abp app1
10 class abp-ip class1

Usage
The show port-access abp command displays all the active configuration. It providing the list of classes that are configured and accepted by the system. The show running-config port-access abp command may not be the same as in active configuration. This is due to the following:
n unsupported command parameters n class modified after the app policy was applied n ABP configuration was unsuccessful due to a lack of hardware resources
Compare the output of the show port-access abp and show running-config port-access abp commands to see if there is a mismatch between what was configured and what is active. If the active abp and the configured abp are not the same, a warning message is displayed to help troubleshoot the problem. If the port-access abp is being processed, an in-progress message will be displayed.
switch(config)# show run ... ! port-access abp <POLICY-NAME> user configuration currently being processed ! run 'show port-access abp' to display active application policy ! configuration. port-access abp policy_1 ... switch(config)# show running-config port-access abp ! port-access abp <POLICY-NAME> user configuration currently being processed ! run 'show port-access abp' to display active application policy ! configuration. port-access abp policy_1 10 class abp-ip app_ip_class action drop

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

217

If the warning or in-progress message is displayed, additional changes may be made until the error message is no longer displayed when show port-access abp, show port-access abp commands, show port-access abp commands configuration, or run the port-access abp reset commands are entered.
The port-access abp reset command changes the user-specified configuration to match the active configuration.
Display details of a particular application policy that needs reset:

switch(config-pa-abp)# show run port-access abp ! port-access abp plcy user configuration does not match active configuration. ! run 'port-access abp <POLICY-NAME> reset' to reset application policy to match ! the active configuration. port-access abp plcy
10 class abp-ip cs action drop 20 class abp-ipv6 cls6

switch(config-pa-abp)# show port-access abp plcy Port Access Application Policy User Configured Policy Details: ==============================================================

App Policy Name : plcy App Policy Type : Local App Policy Status : Rejected

SEQUENCE CLASS

TYPE

ACTION

----------- -------------------------------- -------- -----------------------

10

cs

abp-ipv4 drop

20

cls6

abp-ipv6 permit

switch# port-access abp plcy reset Following abp entries will be removed: 30 class abp-ip cls2

Do you want to continue (y/n)? y

switch# sh running-config port-access abp port-access abp plcy
10 class abp-ip cls action drop 20 class abp-ipv6 cls6

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13
10.12
Command Information

Modification
Command output modified to display the following actions: dscp local-priority mirror
Command introduced.

Application Recognition and Control commands | 218

Platforms
6300 6400 (v2 profile only

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show port-access abp hitcounts
show port-access abp [<POLICY-NAME>] hitcounts
Description
This command is used to show the statistics of the application policy applied on the client. The output helps to identify the application policy entries that are currently matched.

Parameter hitcounts POLICY-NAME

Description The hit counts (statistics) of the application policy Name of this application policy

Usage
If a class entry is configured with the count action, then the show command will display the statistics of that entry. The class entries without the count action are not displayed in the hitcounts output. For collecting the statistics for a specific client, create a copy of the desired policy and attach it to the respective client.
Examples
The following example display show hitcounts of a Application Policy
switch # show port-access abp app-policy hitcounts Port Access ABP Hit-Counts Details: ====================================== App Policy Name : app-policy App Policy Type : local App Policy Status : applied

SEQUENCE CLASS

TYPE

ACTION

----------- ----------------------------- ---------- -----------------------------

------

10

app-class1

abp-ipv4 drop

20

app-class2

abp-ipv4 dscp AF31

30

app-class3

abp-ipv4 local-priority 5

40

app-class4

abp-ipv4 mirror 4

50

app-class5

abp-ipv4 local-priority 3 dscp AF11

mirror 4

Class Name : app-class1 Class Type : abp-ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match any any any app-category network-service app any

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

219

count

1234

Class Name : app-class2 Class Type : abp-ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match any any any app-category encrypted app any count 4312

Class Name : app-class3 Class Type : abp-ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match any any any app-category social-networking app any

count

0

Class Name : app-class4 Class Type : abp-ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match any any any app-category streaming app any count 777

Class Name : app-class5 Class Type : abp-ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match any any any app-category gaming app any count

71193

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13

10.12

Command Information

Platforms
6300 6400 (v2 profile only

Command context Manager (#)

Modification Command output modified to display the following actions:
dscp local-priority mirror Command introduced.
Authority Administrators or local user group members with execution rights for this command.

Application Recognition and Control commands | 220

clear port-access abp hitcounts
clear port-access abp [<POLICY-NAME>] hitcounts
Description
This command is used to clear statistics of the application policy applied on the client.

Parameter hitcounts POLICY-NAME

Description The hit counts (statistics) of the application policy Name of this application policy

Examples
The following example clears the hitcounts of a Application Policy.

switch# show port-access abp app1 hitcounts

Port Access Application Policy Hit-Counts Details: ======================================

App Policy Name : app1 App Policy Type : Local App Policy Status : Applied

SEQUENCE CLASS

TYPE

ACTION

----------- -------------------------------- -------- -----------------------

10

class1

abp-ipv4 drop

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

20

match any app-category gaming app any count

30

switch# clear port-access abp app1 hitcounts

switch# show port-access abp app1 hitcounts

Port Access Application Policy Hit-Counts Details: ======================================

App Policy Name : app1 App Policy Type : Local App Policy Status : Applied

SEQUENCE CLASS

TYPE

ACTION

----------- -------------------------------- -------- -----------------------

10

class1

abp-ipv4 drop

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

20

match any app-category gaming app any count

0

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

221

Release 10.12

Command Information

Platforms
6300 6400 (v2 profile only

Command context Manager (#)

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

show running-config app-recognition
show running-config app-recognition
Description
Shows the active configurations of ARC.
Example
Showing the configured commands for ARC.
switch# show running-config app-recognition no ip source-lockdown resource-extended app-recognition enable mode fast interface 1/1/1 app-recognition enable interface 1/1/2 app-recognition enable

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400 (v2 profile only)

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

diag-dump arcd basic

Application Recognition and Control commands | 222

diag-dump arcd basic
Description
Displays diagnostic information for ARC.
Examples

6300# diag-dump arc basic ========================================================================= [Start] Feature arc Time : Wed Oct 26 15:38:45 2022 ========================================================================= ------------------------------------------------------------------------[Start] Daemon arcd -------------------------------------------------------------------------

=== ARCD Global data ===

===========================================

ARC Global Configuration : ENABLED

MQTT Publisher Status

: CONNECTED

=== ARCD Global LC Data ===

===========================================

LC Name Node Id State Flow Count

-------------------------------------------

1/1

0

UP

0

2/1

1

UP

0

3/1

2

UP

0

-------------------------------------------

=== ARCD Global FLOW Data ===

===========================================

SRC IP

DST IP SRC Port Dst Port Proto VRF Agent State

App

Id

----------------------------------------------------------------------------------

-----

Total Number of Flows : 0 ---------------------------------------------------------------------------------------------

-------------------------------------------------------------------------

[End] Daemon arcd

-------------------------------------------------------------------------

-------------------------------------------------------------------------

[Start] Daemon switchd_agent0

-------------------------------------------------------------------------

======================

FLOW info counters

------------------------------------------------------------

New cache

:0

Remote cache

:0

Local cache

:0

In Hardware

:0

HW add Req

: 18538535

HW retry Req

: 7538

HW add Req suceess

: 17293746

HW add Req fail

: 45591

HW del Req

: 17293746

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

223

HW Bulk del Req

:2

HW del Req failed

:0

HW del Req suceess

: 17293746

HW app modify Req

: 1187548

HW app modify Req succs : 1199198

HW app modify Req fail : 0

Fin req in new

: 6727845

Fin req in local

: 512591

Fin req in remote

: 483600

Fin req in hardware

: 12529218

In notified

: 11022453

Out notified

: 9760743

Purge notified

: 29831736

App notified

: 343865

Flow in msg rcvd

: 3585046

Flow out msg rcvd

: 3726056

Purge msg rcvd

: 19372532

App msg rcvd

: 37820

App update from engine : 25988004

Pkt rx processed

: 267786598

Flow cache miss events : 15802856

pthread mutex lock

: 148342552

pthread mutex lock fail : 0

pthread mutex unlock : 148342552

pthreadmutex unlock fail: 0

==== ARC agent flow cache dump ===

src_ip dst_ip src_port dst_port prot vrf ingress_agent_id state app_

id

flow_miss_count ingress_port ingress_vlan

----------------------------------------------------------------------------------

---------------

Entries in New cache : 0

Entries in Hardware cache : 0

------------------------------------------------------------------------[End] Daemon switchd_agent0 ------------------------------------------------------------------------========================================================================= [End] Feature arc ========================================================================= Diagnostic-dump captured for feature arc

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.11

Command Information

Platforms
6300 6400 (v2 profile only

Command context Manager (#)

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

Application Recognition and Control commands | 224

show events arcd
show events -d arcd
Description
Displays event logs generated by the switch modules since the last reboot for ARC.
Examples
Showing event logs of ARC:
switch# show events -d arcd --------------------------------------------------Event logs from current boot --------------------------------------------------2023-04-05T12:12:23.802838+00:00 6410 arcd[2700]: Event|14105|LOG_INFO|UMM|-|ARCD Publisher is ENABLED 2023-04-05T12:12:23.819248+00:00 6410 arcd[2700]: Event|14101|LOG_INFO|UMM|-|App Recognition feature has been ENABLED 2023-04-05T12:12:26.047307+00:00 6410 arcd[3009]: Event|14105|LOG_INFO|UMM|-|ARCD Publisher is ENABLED 2023-04-05T12:12:26.047440+00:00 6410 arcd[3009]: Event|14101|LOG_INFO|UMM|-|App Recognition feature has been ENABLED 2023-04-05T12:16:32.399665+00:00 EdgeInt arcd[3009]: Event|14103|LOG_INFO|UMM||BULK SYNC event received from linecard 6 2023-04-05T12:16:32.399777+00:00 EdgeInt arcd[3009]: Event|14103|LOG_INFO|UMM||BULK SYNC event received from linecard 7 2023-04-05T15:58:15.601648+00:00 EdgeInt arcd[3009]: Event|14107|LOG_INFO|UMM|-|IP Flow table utilization has exceeded high threshold on linecard 0 2023-04-06T02:03:42.570806+00:00 EdgeInt arcd[2700]: Event|14103|LOG_INFO|UMM||BULK SYNC event received from linecard 3 2023-04-06T02:03:51.259332+00:00 EdgeInt arcd[2700]: Event|14107|LOG_INFO|UMM|-|IP Flow table utilization has exceeded high threshold on linecard 3 2023-04-06T02:04:48.713251+00:00 EdgeInt arcd[2700]: Event|14107|LOG_INFO|UMM|-|IP Flow table utilization has exceeded high threshold on linecard 0 2023-04-06T02:05:54.200794+00:00 EdgeInt arcd[3009]: Event|14105|LOG_INFO|UMM||ARCD Publisher is ENABLED 2023-04-06T02:05:54.200956+00:00 EdgeInt arcd[3009]: Event|14101|LOG_INFO|UMM||App Recognition feature has been ENABLED 2023-04-06T03:56:32.352900+00:00 EdgeInt arcd[2700]: Event|14108|LOG_INFO|UMM|-|IP Flow table utilization back to lower threshold on linecard 0 2023-04-06T03:56:32.521900+00:00 EdgeInt arcd[2700]: Event|14108|LOG_INFO|UMM|-|IP Flow table utilization back to lower threshold on linecard 3

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11
Command Information

Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

225

Platforms
6300 6400 (v2 profile only

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show tech arc
show tech arc
Description
Shows the ARC configuration settings.
Examples
The example shows the ARC configuration settings.

switch# show tech arc ==================================================== Show Tech executed on Wed Jul 20 13:35:39 2022 ==================================================== ==================================================== [Begin] Feature arc ====================================================

********************************* Command : show app-recognition *********************************

Application Recognition Global Configuration

Configuration status : Enabled

Operational status : Enabled

Failure Reason

: NA

Application Recognition Port Configuration

Interface

User-config

Port-access-config

Oper-status

-----------

-----------

------------------

----------

1/5/1

Disabled

Disabled

Disabled

1/5/2

Disabled

Disabled

Disabled

1/5/3

Disabled

Disabled

Disabled

1/5/4

Disabled

Disabled

Disabled

1/5/5

Enabled

Disabled

Enabled

1/5/6

Disabled

Disabled

Disabled

1/5/7

Disabled

Disabled

Disabled

1/5/8

Disabled

Disabled

Disabled

1/5/9

Disabled

Disabled

Disabled

=======================================================================

[End] Feature arc

=======================================================================

======================================================================= Show Tech commands executed successfully ======================================================================= Show Tech took 5 seconds for execution

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

Application Recognition and Control commands | 226

Release 10.11

Command Information

Platforms
6300 6400 (v2 profile only

Command context Manager (#)

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

227

Chapter 8 ARP commands

ARP commands
arp inspection
arp inspection
Description
Enables Dynamic ARP inspection on the current VLAN, which means that ARP packets received from untrusted interfaces are discarded if they have an Invalid IP-to-MAC address binding. The no form of this command disables Dynamic ARP Inspection on the VLAN.
Examples
Enabling dynamic ARP inspection:
switch# configure terminal switch(config)# vlan 1 switch(config-vlan)# arp inspection
Disabling dynamic ARP inspection:
switch# configure terminal switch(config)# vlan 1 switch(config-vlan)# no arp inspection

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

arp inspection trust

AOS-CX 10.14 Command-Line Interface Guide

228

arp inspection trust no arp inspection trust
Description
Configures the interface as a trusted. All interfaces are untrusted by default. The no form of this command returns the interface to the default state (untrusted).
Example
Setting an interface as trusted:
switch(config-if)# arp inspection trust

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

arp ip
arp ip <IP_ADDR> mac <MAC_ADDR> no arp ip <IP_ADDR> mac <MAC_ADDR>
Description
Specifies a permanent static neighbor entry in the ARP table (for IPv4 neighbors). The no form of this command deletes a permanent static neighbor entry from the ARP table.

Parameter ip <IP-ADDR>
mac <MAC-ADDR>

Description
Specifies the IP address of the neighbor or the virtual IP address of the cluster in IP format (x.x.x.x), where x is a decimal number from 0 to 255. . Range: 4096 to 131072. Default: 131072.
Specifies the MAC address of the neighbor or the multicast MAC address in IANA format (xx:xx:xx:xx:xx:xx), where x is a hexadecimal number from 0 to F. Range: 4096 to 131072. Default: 131072.

Example
On the 6400 Switch Series, interface identification differs.

ARP commands | 229

Configuring a static ARP entry on a interface VLAN 10:
switch(config)# interface vlan 10 switch(config-if-vlan)# arp ip 2.2.2.2 mac 01:00:5e:00:00:01
Removing a static ARP entry on interface VLAN10:
switch(config)# interface vlan 10 switch(config-if-vlan)# no arp ip 2.2.2.2 mac 01:00:5e:00:00:01

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14

10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if config-if-vlan

Modification Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated. --
Authority Administrators or local user group members with execution rights for this command.

arp process-grat-arp
arp process-grat-arp no arp process-grat-arp
Description
Enables the processing of gratuitous ARP packets on the individual port or group of L3 ports together. By default, the gratuitous ARP processing is enabled. When gratuitous ARP (GARP) processing is enabled, a switch that is advertising any changes in its MAC through the GARP will reflect in the neighbor table of the switch. However, the switch will not be able to learn the neighbor through the GARP.This configuration is applicable only on L3 interfaces such as ROPs, subinterfaces, and SVIs. The no form of this command disables the processing of gratuitous ARP packets.
Example
Enabling the processing of gratuitous ARP packets on the interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no shutdown switch(config-if)# arp process-grat-arp

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

230

Enabling the processing of gratuitous ARP packets on interfaces 1/1/1 to 1/1/5:
switch(config)# interface 1/1/1-1/1/5 switch(config-if<1/1/1-1/1/5>)# no shutdown switch(config-if<1/1/1-1/1/5>)# arp process-grat-arp
Enabling the processing of gratuitous ARP packets on sub-interface 1/1/1.10:
Applies only to the Aruba 6300, 6400, 8100, and 8360 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# no shutdown switch(config-subif)# arp process-grat-arp
Disabling the processing of gratuitous ARP packets on VLANs 2 to 100:
switch(config)# interface vlan 2-100 switch(config-if-vlan<2-100>)# no shutdown switch(config-if-vlan<2-100>)# no arp process-grat-arp

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if config-if-vlan config-subif

Modification --
Authority Administrators or local user group members with execution rights for this command.

clear arp
clear arp port <PORT-ID> [ip <A.B.C.D>|all]|[ipv6 <X:X::X:X>|all]vla vrf [all-vrfs|{<VRF-NAME> [ip <A.B.C.D>]|[ipv6 <X:X::X:X>]}]
Description
Clears IPv4 and IPv6 neighbor entries from the ARP table. If you do not specify any VRF or port parameters, ARP table entries are cleared for the default VRF.

ARP commands | 231

Parameter port <PORT-ID>
ip <A.B.C.D>|all]
ipv6 <X:X::X:X>|all
vrf all-vrfs <VRF-NAME> ip <A.B.C.D> ipv6 <X:X::X:

Description
Specifies a port on the switch. For example: 1/1/1.
(Optional) Include an IP address to clear neighbor entries for that specific address, or use the all parameter to clear entries for all IP addresses.
(Optional) Include an IPv6 address to clear neighbor entries for that specific address, or use the all parameter to clear entries for all IPv6 addresses.
Clears IPv4 and IPv6 neighbor entries for the specified VRF or for all VRFs. If no VRF is specified he default VRF is cleared.
Clear neighbor entries for all VRFs
Clear neighbor entries for the specified VRF.
(Optional) Include an IP address to clear just the neighbor entries for the specified IP address.
(Optional) Include an IPv6 address to clear the neighbor entries for the specified IPv6 address.

Examples
Clearing all IPv4 and IPv6 neighbor ARP entries for the default VRF:

switch# clear arp

Clearing all ARP neighbor entries for a port (On the 6400 Switch Series, interface identification differs.):

switch# clear arp 1/1/35

Clearing all IPv4 and IPv6 neighbor ARP entries for all VRFs:

switch# clear arp vrf all-vrfs

Clearing all IPv4 and IPv6 neighbor ARP entries for a specific VRF instance:

switch# clear arp vrf RED

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14

Modification
Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

232

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

debug arp-security
debug arp-security <LOG-CATEGORY> [severity <LEVEL>] no debug arp-security [<LOG-CATEGORY>] [severity <LEVEL>]
Description
Enables ARP security debug logs. If <SEVERITY> is omitted, all severities are logged. The no form of this command disables ARP security debug logs.

Parameter <LOG-CATEGORY>
severity <LEVEL>

Description
Selects the ARP security debug log category. Available categories are: n all: Selects all ARP security debug log categories. n config: Selects the ARP security config debug log category. n inspection: Selects the ARP security inspection debug log
category. n packet: Selects the ARP security packet debug log category.
Specifies how to filter the ARP security debug logging by setting the minimum severity level for which debug logging will be performed. The selected severity level and all severities above (more severe) will be included in the logging. n emerg: Sets ARP security debug log filtering to Emergency
only. n alert: Sets ARP security debug log filtering to Alert and above. n critical: Sets ARP security debug log filtering to Critical and
above. n error: Sets ARP security debug log filtering to Error and above. n warning: Sets ARP security debug log filtering to Warning and
above. n notice: Sets ARP security debug log filtering to Notice and
above. n info: Sets ARP security debug log filtering to Info and above. n debug: Sets ARP security debug log filtering to all severities.

Examples
Enable ARP security debug logging for all categories and all severities:

ARP commands | 233

switch# debug arp-security all Enable ARP security config debug log for severity level Error and above:
switch# debug arp-security config severity error Enable ARP security inspection debug log for severity level Notice and above:
switch# debug arp-security inspection severity notice Enable ARP security debug packet for severity level Critical and above:
switch# debug arp-security packet severity critical Enable ARP security debug logging for all categories and severity level Alert and above:
switch# debug arp-security all severity alert Disable ARP security debug logging:
switch# no debug arp-security

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ip local-proxy-arp
ip local-proxy-arp no ip local-proxy-arp
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

234

Enables local proxy ARP on the specified interface. Local proxy ARP is supported on Layer 3 physical interfaces and on VLAN interfaces. To enable local proxy ARP on an interface, routing must be enabled on that interface. The no form of this command disables local proxy ARP on the specified interface.
Examples
On the 6400 Switch Series, interface identification differs. Enabling local proxy ARP on interface 1/1/1:
switch# interface 1/1/1 switch(config-if)# ip local proxy-arp
Enabling local proxy ARP on interface VLAN 3:
switch# interface vlan 3 switch(config-if-vlan)# ip local-proxy-arp
Disabling local proxy ARP on on interface 1/1/1.
switch# interface 1/1/1 switch(config-if)# no ip local-proxy-arp

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip proxy-arp
ip proxy-arp no ip proxy-arp
Description
Enables proxy ARP for the specified Layer 3 interface. Proxy ARP is supported on Layer 3 physical interfaces, LAG interfaces, and VLAN interfaces. It is disabled by default. To enable proxy ARP on an interface, routing must be enabled on that interface. The no form of this command disables proxy ARP for the specified interface.

ARP commands | 235

Examples
Enabling proxy ARP on interface 1/1/1:
switch# interface 1/1/1 switch(config-if)# ip proxy-arp
Enabling proxy ARP on VLAN 3:
switch# interface vlan 3 switch(config-if-vlan)# ip proxy-arp
Enabling proxy ARP on a LAG 11:
switch(config)# int lag 11 switch(config-lag-if)# ip proxy-arp
Disabling proxy ARP on interface 1/1/1:
switch# interface 1/1/1 switch(config-if)# no ip proxy-arp

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if config-if-vlan config-lag-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 neighbor mac
ipv6 neighbor <IPV6-ADDR> mac <MAC-ADDR> no ipv6 neighbor <IPV6-ADDR> mac <MAC-ADDR>
Description
Specifies a permanent static neighbor entry in the ARP table (for IPv6 neighbors). The no form of this command deletes a permanent static neighbor entry from the ARP table.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

236

Parameter <IPV6-ADDR>>
mac <MAC-ADDR>>

Description
Specifies an IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. Range: 4096 to 131072. Default: 131072.
Specifies the MAC address of the neighbor (xx:xx:xx:xx:xx:xx), where x is a hexadecimal number from 0 to F. Range: 4096 to 131072. Default: 131072.

Example
On the 6400 Switch Series, interface identification differs. Creates a static ARP entry on interface 1/1/1.

switch(config)# interface 1/1/1 switch(config-if)# arp ipv6 neighbor 2001:0db8:85a3::8a2e:0370:7334 mac 00:50:56:96:df:c8

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

show arp
show arp [vsx-peer]
Description
Shows the entries in the ARP (Address Resolution Protocol) table.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage

ARP commands | 237

This command displays information about ARP entries, including the IP address, MAC address, port, and state. When no parameters are specified, the show arp command shows all ARP entries for the default VRF (Virtual Router Forwarding) instance.
Examples

switch# show arp

IPv4 Address

MAC

Port

Physical Port

-------------------------------------------------------------------------------

192.168.1.2

00:50:56:96:7b:e0 vlan10

1/1/29

stale

192.168.1.3

00:50:56:96:7b:ac vlan10

1/1/1

reachable

Total Number Of ARP Entries Listed- 2. -------------------------------------------------------------------------------

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show arp inspection interface
show arp inspection interface [<IFNAME>] [vlan <VLAN-ID>] [vsx-peer]
Description
Shows the current configuration of dynamic ARP inspection on an interface.

Parameter <IFNAME>

Description Specifies the interface.

<VLAN-ID> vsx-peer

Specifies the VLAN ID. Range: 1 to 4094.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

238

Examples
On the 6400 Switch Series, interface identification differs. Showing current configuration of dynamic ARP inspection on all interfaces:

switch# show arp inspection interface

---------------------------------------------------------------------------

Interface

Trust-State

---------------------------------------------------------------------------

1/1/1

Untrusted

---------------------------------------------------------------------------

Showing current configuration of dynamic ARP inspection on all interfaces with VSX peer:

switch# show arp inspection interface vsx-peer

---------------------------------------------------------------------------

Interface

Trust-State

---------------------------------------------------------------------------

1/1/1

Untrusted

lag100

Trusted

---------------------------------------------------------------------------

Showing current configuration of dynamic ARP inspection on a particular interface:

switch# show arp inspection interface 1/1/1

---------------------------------------------------------------------------

Interface

Trust-State

---------------------------------------------------------------------------

1/1/1

Untrusted

---------------------------------------------------------------------------

Showing current configuration of dynamic ARP inspection on interface VLAN 2:

switch# show arp inspection interface vlan 2

-----------------------------------------------------------------

Interface

Trust-State

-----------------------------------------------------------------

vlan2

Trusted

-----------------------------------------------------------------

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

ARP commands | 239

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show arp inspection statistics
show arp inspection statistics vlan [<VLAN-ID>] [vsx-peer]
Description
Shows statistics about forwarded and dropped ARP packets. When <VLAN-ID> is not specified, information is shown for all configured VLANs.

Parameter <VLAN-ID>
vsx-peer

Description
Specifies the VLAN ID or range of IDs separated by a dash "-". Range: 1 to 4094.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing ARP packet statistics for a range of VLANs:

switch# show arp inspection statistics vlan 1-100

-----------------------------------------------------------------

VLAN Name

Forwarded

Dropped

-----------------------------------------------------------------

1

DEFAULT_VLAN_1 0

0

-----------------------------------------------------------------

Showing ARP packet statistics for VLANs with VSX peer:

switch# show arp inspection statistics vlan vsx-peer

-----------------------------------------------------------------

VLAN Name

Forwarded

Dropped

-----------------------------------------------------------------

1

DEFAULT_VLAN_1 0

0

200 VLAN200

0

0

-----------------------------------------------------------------

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

240

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show arp inspection vlan
show arp inspection vlan [<VLAN-ID>] [vsx-peer]
Description
Shows the current configuration of dynamic ARP inspection on a VLAN. When <VLAN-ID> is not specified, information is shown for all configured VLANs.

Parameter <VLAN-ID>
vsx-peer

Description
Specifies the VLAN ID or range of IDs separated by a dash "". Range: 1 to 4094.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing dynamic ARP configuration for all VLANs:

switch# show arp inspection vlan

-----------------------------------------------------------------

VLAN Name

ARP Inspection

-----------------------------------------------------------------

1

DEFAULT_VLAN_1 -

100 VLAN100

-

200 VLAN200

Enabled

-----------------------------------------------------------------

Showing dynamic ARP configuration for a particular VLAN:

switch# show arp inspection vlan 1

-----------------------------------------------------------------

VLAN Name

ARP Inspection

-----------------------------------------------------------------

1

DEFAULT_VLAN_1 -

-----------------------------------------------------------------

ARP commands | 241

Showing dynamic ARP configuration for VLANs with VSX peer:

switch# show arp inspection vlan vsx-peer

-----------------------------------------------------------------

VLAN Name

ARP Inspection

-----------------------------------------------------------------

1

DEFAULT_VLAN_1 -

-----------------------------------------------------------------

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show arp state
show arp state {all | failed | incomplete | permanent | reachable | stale} [vsx-peer]
Description
Shows ARP (Address Resolution Protocol) cache entries that are in the specified state.

Parameter all failed incomplete
permanent

Description
Shows the ARP cache entries for all VRF (Virtual Router Forwarding) instances.
Shows the ARP cache entries that are in failed state. The neighbor might have been deleted.
Shows the ARP cache entries that are in incomplete state. An incomplete state means that address resolution is in progress and the link-layer address of the neighbor has not yet been determined. A solicitation request was sent, and the switch is waiting for a solicitation reply or a timeout.
Shows the ARP cache entries that are in permanent state. ARP entries that are in a permanent state can be removed by administrative action only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

242

Parameter reachable stale
vsx-peer

Description
Shows the ARP cache entries that are in reachable state, meaning that the neighbor is known to have been reachable recently.
Shows ARP cache entries that are in stale state. ARP cache entries are in the stale state if the elapsed time is in excess of the ARP timeout in seconds since the last positive confirmation that the forwarding path was functioning properly.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

switch# show arp state failed

IPv4 Address

MAC

Port

Physical Port State

---------------------------------------------------------------------------

192.168.1.4

vlan10

failed

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show arp summary
show arp summary [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows a summary of the IPv4 and IPv6 neighbor entries on the switch for all VRFs or a specific VRF.

ARP commands | 243

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Selects all VRFs.
Specifies the name of a VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing summary ARP information for all VRFs:

switch# show arp summary all-vrfs

ARP Entry's State

: IPv4

IPv6

-------------------------------------------------------

Number of Reachable ARP entries : 2

0

Number of Stale ARP entries

:0

0

Number of Failed ARP entries

:2

2

Number of Incomplete ARP entries : 0

0

Number of Permanent ARP entries : 0

0

-------------------------------------------------------

Total ARP Entries: 6

:4

2

-------------------------------------------------------

Showing a summary of all IPv4 and IPv6 neighbor entries on the primary and secondary (peer) switches:

vsx-primary# show arp summary

ARP Entry's State

IPv4

IPv6

---------------------------------------------------------

Number of Reachable ARP entries 25858

32231

Number of Stale ARP entries

0

1

Number of Failed ARP entries

0

257

Number of Incomplete ARP entries 0

0

Number of Permanent ARP entries 0

0

---------------------------------------------------------

Total ARP Entries- 58347

25858

32489

vsx-primary# show arp summary vsx-peer

ARP Entry's State

IPv4

IPv6

---------------------------------------------------------

Number of Reachable ARP entries 25858

32168

Number of Stale ARP entries

0

3

Number of Failed ARP entries

0

317

Number of Incomplete ARP entries 0

0

Number of Permanent ARP entries 0

0

---------------------------------------------------------

Total ARP Entries- 58346

25858

32488

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

244

---------------------------------------------------------

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show arp timeout
show arp timeout [<INTERFACE>] [vsx-peer]
Description
Shows the age-out period for each ARP (Address Resolution Protocol) entry for a port, LAG, or VLAN interface.

Parameter <INTERFACE>
vsx-peer

Description
Specifies a physical port, VLAN, or LAG on the switch. For physical ports, use the format member/slot/port (for example, 1/3/1).
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing ARP timeout information for a port:

switch# show arp timeout 1/1/1 ARP Timeout:

------------------

Port

VRF

1/1/1

default

Timeout 600

ARP commands | 245

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show arp vrf
show arp {all-vrfs | vrf <VRF-NAME>} [vsx-peer]
Description
Shows the ARP table for all VRF instances, or for the named VRF.

Parameter all-vrfs vrf <VRF-NAME>
vsx-peer

Description
Specifies all VRFs.
Specifies the name of a VRF. Length: 1 to 32 alphanumeric characters.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing ARP entries for VRF vrf1.

switch# show arp vrf vrf1

IPv4 Address

MAC

Port

Physical Port

State

VRF

----------------------------------------------------------------------------------

------------

100.1.250.50

00:50:56:8d:44:13 vlan1001

1/1/2

reachable vrf1

100.2.250.60

00:50:56:8d:45:63 vlan1002

vxlan1(1920:1680:1:1::2)

permanent vrf1

Total Number Of ARP Entries Listed: 2. ---------------------------------------------------------------------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

246

This example from a different network shows ARP entries for all VRFs.

switch# show arp all-vrfs

ARP IPv4 Entries:

-------------------------------------------------------

IPv4 Address MAC

Port Physical Port

192.168.120.10 00:50:56:bd:10:be 1/1/32 1/1/32

10.20.30.40

00:50:56:bd:6a:c5 1/1/29 1/1/29

-------------------------------------------------------

Total Number Of ARP Entries Listed: 2.

-------------------------------------------------------

State reachable reachable

VRF red test

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 neighbors
show ipv6 neighbors {all-vrfs | vrf <VRF-NAME>} [vsx-peer]
Description
Shows entries in the ARP table for all IPv6 neighbors for all VRFs or for a specific VRF. When no parameters are specified, this command shows all ARP entries for the default VRF, and state information for reachable and stale entries only.

Parameter all-vrfs vrf <VRF-NAME>
vsx-peer

Description
Specifies all VRFs.
Specifies the name of a VRF. Length: 1 to 32 alphanumeric characters.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

ARP commands | 247

switch# show ipv6 neighbors IPv6 Entries:

-------------------------------------------------------

IPv6 Address

MAC

Port

Physical Port State

fe80::a21d:48ff:fe8f:2700 a0:1d:48:8f:27:00 vlan2300 1/1/31

reachable

fe80::f603:43ff:fe80:a600 f4:03:43:80:a6:00 vlan2300 1/1/30

reachable

-------------------------------------------------------

Total Number Of IPv6 Neighbors Entries Listed: 2.

-------------------------------------------------------

switch# show ipv6 neighbors vrf vrf1

IPv6 Address

MAC

Port

Physical Port State

VRF

----------------------------------------------------------------------------------

------------

1000:2:1:1::250:60 00:50:56:8d:45:63 vlan1002 vxlan1(1920:1680:1:1::2)

permanent vrf1

1000:1:1:1::250:50 00:50:56:8d:44:13 vlan1001 1/1/2

reachable vrf1

Total Number Of IPv6 Neighbors Entries Listed: 2.

--------------------------------------------------------------------------------------------------------------------------For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show ipv6 neighbors state
show ipv6 neighbors state {all | failed | incomplete | permanent | reachable | stale} [vsx-peer]
Description
Shows all IPv6 neighbor ARP (Address Resolution Protocol) cache entries, or those cache entries that are in the specified state.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

248

Parameter all failed incomplete
permanent reachable stale
vsx-peer

Description
Shows all ARP cache entries.
Shows ARP cache entries that are in failed state. The neighbor might have been deleted. Set the neighbor to be unreachable.
Shows ARP cache entries that are in incomplete state. An incomplete state means that address resolution is in progress and the link-layer address of the neighbor has not yet been determined. This means that a solicitation request was sent, and you are waiting for a solicitation reply or a timeout.
Shows ARP cache entries that are in permanent state.
Shows ARP cache entries that are in reachable state, meaning that the neighbor is known to have been reachable recently.
Shows ARP cache entries that are in stale state. ARP cache entries are in the stale state if the elapsed time is in excess of the ARP timeout in seconds since the last positive confirmation that the forwarding path was functioning properly.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

switch# show ipv6 neighbors state all

IPv6 Address

MAC

Port

Physical Port State

--------------------------------------------------------------------------------

100::2

48:0f:cf:af:f1:cc lag1

lag1

reachable

300::3

48:0f:cf:af:33:be vlan3 1/4/20

reachable

fe80::4a0f:cfff:feaf:f1cc

48:0f:cf:af:f1:cc lag1

lag1

reachable

200::3

48:0f:cf:af:33:be 1/4/11 1/4/11

reachable

fe80::4a0f:cfff:feaf:33be

48:0f:cf:af:33:be vlan3 1/4/20

reachable

Total Number Of IPv6 Neighbors Entries Listed- 5. ---------------------------------------------------------------------------------

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

ARP commands | 249

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show tech arp-security
show tech arp-security
Description
Shows the output of these three commands:
n show arp inspection statistics vlan n show arp inspection vlan n show arp inspection interface
Examples
Showing the output of the three ARP security show commands:
switch(config-if)# show tech arp-security ==================================================== Show Tech executed on Mon Nov 28 09:53:54 2019 ==================================================== ==================================================== [Begin] Feature arp-security ====================================================

********************************* Command : show arp inspection statistics vlan *********************************

-----------------------------------------------------------------

VLAN Name

Forwarded

Dropped

-----------------------------------------------------------------

1

DEFAULT_VLAN_1 0

0

200 VLAN200

0

0

-----------------------------------------------------------------

********************************* Command : show arp inspection vlan *********************************

-----------------------------------------------------------------

VLAN Name

ARP-Inspection

-----------------------------------------------------------------

1

DEFAULT_VLAN_1 -

200 VLAN200

Enabled

-----------------------------------------------------------------

********************************* Command : show arp inspection interface *********************************

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

250

---------------------------------------------------------------------------

Interface

Trust-State

---------------------------------------------------------------------------

1/1/1

Untrusted

lag100

Trusted

---------------------------------------------------------------------------

====================================================

[End] Feature arp-security

====================================================

==================================================== Show Tech commands executed successfully ====================================================

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

ARP commands | 251

Chapter 9
Aruba Intelligent Forwarding (FIB) commands

Aruba Intelligent Forwarding (FIB) commands
fib-optimization ageout-time
fib-optimization ageout-time <AGEOUT-TIME>
Description
Configures the host route age-out time. If a host route entry is designated for ageing, and no traffic is using the route for configured amount of age time, the host route entry will be removed form the hardware resource table. When traffic using that route resumes, the host route entry will be added back to the hardware resource table.
Host route age-out time is a global timer applicable to all types of host route entries, optimized by this feature.

Parameter <AGEOUT-TIME>

Description
Specifies the age-out time for the route in seconds. Range: 60 to 3600 seconds. Default: 90 seconds.

Examples
Configuring the host route age-out time of 100 seconds

switch(config)# fib-optimization ageout-time 100

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History

Release 10.10

Command Information

Platforms
6300 6400

Command context config

Modification Command Introduced.
Authority Administrators or local user group members with execution rights for this command.

fib-optimization evpn-vxlan exclude-nexthop

AOS-CX 10.14 Command-Line Interface Guide

252

fib-optimization evpn-vxlan exclude-nexthop <IP-ADDRESS> no fib-optimization evpn-vxlan exclude-nexthop <IP-ADDRESS>
Description
Excludes optimization of host routes for the identified next-hop hosting destination of frequent regular traffic. Any EVPN host route pointing to the configured next hops will not be optimized by FIB optimization. A maximum of 8 exclude next-hops can be configured. The no form of this command removes the exclude next-hop configuration.

Parameter <IP-ADDRESS>

Description Specifies the IP address of the next hop to be excluded.

Examples
Excluding optimization of host routes for the identified next-hop:

switch(config)# fib-optimization evpn-vxlan exclude-nexthop 8.8.8.8

Disabling the next-hop configuration:

switch(config)# no fib-optimization evpn-vxlan exclude-nexthop 8.8.8.8

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context config

Modification Command Introduced.
Authority Administrators or local user group members with execution rights for this command.

fib-optimization evpn-vxlan host-route
fib-optimization evpn-vxlan host-route ip no fib-optimization evpn-vxlan host-route ip
Description
Enable the FIB optimization process. This feature optimizes EVPN IPv4 host routes. In subnet stretched scenarios, after enabling FIB optimization, initial few packets are punted to CPU and traffic drop will be observed. The no form of this command disables FIB optimization process.

Aruba Intelligent Forwarding (FIB) commands | 253

Examples
Enabling FIB optimization: switch(config)# fib-optimization evpn-vxlan host-route ip
Disabling FIB optimization: switch(config)# no fib-optimization evpn-vxlan host-route ip

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.14

10.10

Command Information

Platforms
6300 6400

Command context config

Modification Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated. Command Introduced.
Authority Administrators or local user group members with execution rights for this command.

show fib-optimization configuration
show fib-optimization configuration
Description
Shows the EVPN data plane route optimization configurations.
Examples
Showing the EVPN data plane route optimization configurations.:

switch# show fib-optimization configuration

Address family

: EVPN IPv4

Operation status : Enabled

Route age-out time : 100

Excluded nexthops : 5.5.5.5 , 6.6.6.6 , 8.8.8.8

For more information on features that use this command, refer to the VXLAN Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

254

Release 10.10

Modification Command Introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

show ip route fib-optimization
show ip route fib-optimization [<IP-ADDRESS>] [summary] {all-vrfs | vrf <VRF-Name>}
Description
Shows the EVPN host routes removed from the data plane by the FIB optimization. The host routes are removed for the data plane if no traffic is using routes for configured age-out time. The show ip route command displays all routes irrespective of optimization.

Parameter <IP-ADDRESS>
summary all-vrfs vrf <vrf-name>

Description
Specifies the longest prefix match. Syntax for IPv4: A.B.C.D
Specifies the information for all VRFs.
Specifies the information for all VRFs.
Speifies a VRF by VRF name (if no <VRF-NAME> is specified, the default VRF is implied.

Examples
Showing the FIB optimized routes for all VRFs:

switch# show ip route fib-optimization all-vrfs
EVPN ipv4 host routes optimized by Aruba Intelligent ForwardingEVPN ipv4 host routes optimized by Aruba Intelligent Forwarding
Origin Codes: C - connected, S - static, L - local R - RIP, B - BGP, O - OSPF Type Codes: E - External BGP, I - Internal BGP, V - VPN, EV - EVPN IA - OSPF internal area, E1 - OSPF external type 1 E2 - OSPF external type 2
VRF: red
Prefix Nexthop Interface VRF(egress) Origin/ Distance/ Age Type Metric ------------------------------------------------------------------------------------------

Aruba Intelligent Forwarding (FIB) commands | 255

200.200.200.2/32 3.3.3.3 - - B/EV [200/0] 00h:09m:24s 200.200.200.251/32 3.3.3.3 - - B/EV [200/0] 00h:09m:50s
Total Route Count : 2

Showing the FIB optimized routes for the specified VRF:

switch# show ip route fib-optimization vrf red
EVPN ipv4 host routes optimized by Aruba Intelligent Forwarding
Origin Codes: C - connected, S - static, L - local R - RIP, B - BGP, O - OSPF Type Codes: E - External BGP, I - Internal BGP, V - VPN, EV - EVPN IA - OSPF internal area, E1 - OSPF external type 1 E2 - OSPF external type 2
VRF: red
Prefix Nexthop Interface VRF(egress) Origin/ Distance/ Age Type Metric ---------------------------------------------------------------------------------200.200.200.2/32 3.3.3.3 - - B/EV [200/0] 00h:09m:51s 200.200.200.251/32 3.3.3.3 - - B/EV [200/0] 00h:10m:17s
Total Route Count : 2

Showing the specific FIB optimized host route information:

switch# show ip route fib-optimization 100.100.100.22 vrf red

VRF: red

Prefix

: 100.100.100.22/32

Nexthop : 3.3.3.3

Origin

: bgp

Distance : 200

Age

: 00h:03m:45s

Encap Type : vxlan

1000

VRF(egress) Interface Type Metric Tag Encap Details

::: bgp_evpn :0 :0 :l3vni

Showing FIB optimized routes summary for all VRFs:

switch# show ip route fib-optimization summary all-vrfs IPv4 Route FIB optimization Summary
VRF name : red Number of evpn routes optimized : 2

For more information on features that use this command, refer to the VXLAN Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

256

Release 10.10

Modification Command Introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

AVB commands

avb
avb no avb
Description
Enables the AVB feature and creates the AVB context. Enables user to exercise various configuration options available under AVB. The no form of this command removed the AVB configuration in the global context.
Examples
Enable AVB:
switch(config)# avb switch(config-avb)#
Disable AVB:
switch(config)# no avb AVB configuration will be deleted. Continue (y/n)? y

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.1000
Command Information

Modification Featured introduced.

AVB commands | 257

Platforms 6300

Command context config

Authority
Administrators or local user group members with execution rights for this command.

clear msrp statistics
clear msrp statistics [<IF-NAME>]
Description
Clears the MSRP counters for the given interfaces.

Parameter <IFNAME>

Description Specifies the interface name.

Examples
Clear the MSRP counter for interface 1/1/1:
switch# clear msrp statistics 1/1/1

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.1000

Command Information

Platforms 6300

Command context Manager (#)

Modification Featured introduced.
Authority Administrators or local user group members with execution rights for this command.

enable
enable no enable
Description
Enables AVB globally. The no form of this command disables AVB globally.
Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

258

Enable audio video bridging:
switch(config)# avb switch(config-avb)# enable
Disable audio video bridging:
switch(config)# avb switch(config-avb)# no enable

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.1000

Command Information

Platforms 6300

Command context config

Modification Featured introduced.
Authority Administrators or local user group members with execution rights for this command.

max fan in ports
max-fan-in-ports <NUMPORTS> no max-fan-in-ports <NUMPORTS>
Description
Configures the AVB maximum number of fan in ports globally. The default maximum is 10. Whenever the max-fan-in-ports is changed, AVB disable and enable are required to make it operational. The no form of this command sets the AVB maximum number of fan in ports to default.

Parameter <NUMPORTS>

Description Specifies the maximum number of fan in ports. Range: 1-10. Default: 10.

Examples
Enable AVB max-fan-in-ports 3:
switch(config)# avb switch(config-avb)# max-fan-in-ports 3 Disable and Enable AVB to reflect max-fan-in-ports configuration as operational.

AVB commands | 259

Disable AVB VLAN 3 max-fan-in-ports and setting to default:
switch(config)# avb switch(config-avb)# no max-fan-in-ports 3 Disable and Enable AVB to reflect max-fan-in-ports configuration as operational.

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.13.1000

Command Information

Platforms 6300

Command context config

Modification Featured introduced.
Authority Administrators or local user group members with execution rights for this command.

msrp
msrp no msrp
Description
Configures the MSRP protocol on the interface The no form of this command disables the MSRP protocol on the interface.
Examples
Enable MSRP protocol on the interface:
switch(config-if)# msrp
Disable MSRP protocol on the interface:
switch(config-if)# no msrp

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

260

Release 10.13.1000

Command Information

Platforms 6300

Command context config-if

Modification Featured introduced.
Authority Administrators or local user group members with execution rights for this command.

msrp timer join
msrp timer join <TIME-INTERVAL> no msrp timer join <TIME-INTERVAL>
Description
Configures the MSRP join timer on a MSRP enabled interface. The timer configures the time to wait for the MSRP Protocol Data Units (PDUs) to be sent out of the interface. The timer units are in centiseconds. The default is 20 centiseconds. The no form of this command sets the configuration back to the default value.

Parameter <TIME-INTERVAL>

Description
Specifies the time interval in centiseconds. Range: 20-100. Default: 20.

Examples
Configure MSRP timer join to 50 centiseconds:

switch(config-if)# msrp timer join 50

Remove MSRP timer join configuration and set to default timers:

switch(config-if)# no msrp timer join 50

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.1000
Command Information

Modification Featured introduced.

AVB commands | 261

Platforms 6300

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

msrp timer leave
msrp timer leave <TIME-INTERVAL> no msrp timer leave <TIME-INTERVAL>
Description
Configures the MSRP leave timer on a MSRP enabled interface. The timer configures the time to wait for the MSRP registrar state to move from LEAVE state to EMPTY state on the interface. The timer units are in centiseconds. The default is 300 centiseconds. The no form of this command sets the configuration back to the default value.

Parameter <TIME-INTERVAL>

Description
Specifies the time interval in centiseconds. Range: 40-1000000. Default: 300.

Examples
Configure MSRP timer leave to 500 centiseconds:

switch(config-if)# msrp timer leave 500

Remove MSRP timer leave configuration and set to the default configuration:

switch(config-if)# no msrp timer leave 500

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.13.1000

Command Information

Platforms 6300

Command context config-if

Modification Featured introduced.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

262

msrp timer leaveall
msrp timer leaveall <TIME-INTERVAL> no msrp timer leaveall <TIME-INTERVAL>
Description
Configures the MSRP leaveall timer on a MSRP enabled interface. The timer configures the time to wait for the leaveall messages to be sent on the interface. The timer units are in centiseconds. The default is 1000 centiseconds. The no form of this command sets the configuration back to the default value.

Parameter <TIME-INTERVAL>

Description
Specifies the time interval in centiseconds. Range: 500-1000000. Default: 1000.

Examples
Configure MSRP leaveall timer to 500 centiseconds:

switch(config-if)# msrp timer leaveall 500

Remove MSRP leaveall timer configuration and set to default configuration:

switch(config-if)# no msrp timer leaveall 500

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.1000

Command Information

Platforms 6300

Command context config-if

Modification Featured introduced.
Authority Administrators or local user group members with execution rights for this command.

show avb domain
show avb domain
Description
Displays the global AVB domain status.

AVB commands | 263

Examples
Display the global AVB domain status:

switch# show avb domain AVB state AVB VLAN Max Fan in Ports AVB Class-A
Priority Code Point Number of Core Ports Number of Boundary Ports AVB Class-B Priority Code Point Number of Core Ports Number of Boundary Ports

: operational :2 : 10
:3 :1 :1
:2 ;1 :1

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.13.1000

Command Information

Platforms 6300

Command context Manager (#)

Modification Featured introduced.
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show avb interface
show avb interface [<IFNAME> | brief]
Description
Displays the AVB interface information.

Parameter <IFNAME>

Description Specifies the interface name.

brief

Shows information in brief format.

Examples
Display the AVB interface status:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

264

switch# show avb interface 1/1/2

AVB state

: Enabled

MSRP State

: Enabled

PTP State

: Enabled, asCapable

Neighbor Propogation Delay

: 98

Port State

: clock_source

Peer Mean Path Delay

: 99

AVB readiness state

: operational

Allocated BW (Kbit/s)

: 7500000

Used BW (Kbits/s)

: 27456

Available BW (Kbits/s)

: 7472544

Per-class value

Class-A

Class-B

-----------------------------------------------------------------

Tx srClassVID

2

2

Rx srClassVID

2

2

Tx PCP

3

2

Rx PCP

3

-

Domain State

Core

Boundary

Display the AVB interface status in brief:

switch# show avb interface brief

Ethernet

Peer PCP

Peer AVB Core

Allocated

Available

Used

Interface A | B

VLAN A | B

(Kbit/s)

(Kbit/s)

(Kbit/s)

----------------------------------------------------------------------------------

---------

1/1/1

3|2

2

YES | YES

0

0

0

1/1/2

3|2

2

YES | NO

7500000

7472544

27456

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.13.1000

Command Information

Platforms 6300

Command context Manager (#)

Modification Featured introduced.
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show msrp interface
show msrp interface [<IFNAME> | brief]

AVB commands | 265

Description
Displays MSRP interface information.

Parameter <IFNAME>

Description Specifies the interface name.

brief

Shows information in brief format.

Examples
Display the MSRP interface 1/1/1 information:

switch# show msrp interface 1/1/1

Stream Id

: 00:11:01:00:00:01:00:01

Stream Age

: N/A

Peer Participant

: Talker

Registration Attribute

Type

: Talker-advertise

Registrar State

: Registered(IN)

Last registered Event : JoinIn

Declaration Attribute

Type

: Listener-ready

Applicant State

: Quiet Active(QA)

Last Declared Event : JoinIn

Declared Failure Info : N/A

Display the MSRP interface 1/1/2 information in brief:

switch# show msrp interface 1/1/2 brief

Stream-Id

Peer

Applicant Registrar Reservation

Failure

Participant State

State

Status

----------------------------------------------------------------------------------

---------

00:11:01:00:00:01:00:01 Listener qa

in

Reserved

N/A

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.1000
Command Information

Modification Featured introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

266

Platforms 6300

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show msrp statistics
show msrp statistics [<IF-NAME>]
Description
Displays the MSRP statistics for MSRP enabled interfaces.

Parameter <IFNAME>

Description Specifies the interface name.

Examples
Display the MSRP interface 1/1/1 statistics:

switch# show msrp statistics 1/1/1

Total PDU Transmitted : 7029

Total PDU Received : 7036

Leaveall Tx count

: 2242

Leaveall Rx count

: 2260

Domain Tx count

: 2242

Domain Rx count

: 4908

TALKER-ADV

LISTENER-READY

Rx-New

0

0

Rx-In

0

0

Rx-Empty

0

0

Rx-JoinEmpty 6545

0

Rx-JoinIn

7170

0

Rx-Leave

3

0

Tx-New

0

6

Tx-In

0

0

Tx-Empty

0

0

Tx-JoinEmpty

0

6367

Tx-joinIn

0

7170

Tx-Leave

0

3

TALKER-FAILED
3 0 0 0 0 0 0 0 0 0 0 0

LISTENER-ASKING-FAILED
0 0 0 0 0 0 2 0 0 79 105 0

LISTENER-READY-FAILED
0 0 0 0 0 0 0 0 0 0 0 0

AVB commands | 267

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.1000

Command Information

Platforms 6300

Command context Manager (#)

Modification Featured introduced.
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show msrp state
show msrp state <STREAM-ID>
Description
Displays all information about a given stream.

Parameter <STREAM-ID>

Description Specifies the Stream ID.

Examples
Display the MSRP stream information:

switch# show msrp state 00:11:01:00:00:01:00:01

Stream-ID

: 00:11:01:00:00:01:00:01

Stream Talker Port : 1/1/32

Stream Creation time: 1 minute

Destination MAC

: 91:e0:f0:00:fe:00

VLAN

:2

Priority

: 3 (class-A)

Rank

: low

Accumulated Latency : 20 ns

Max frame size

: 100

Max frame interval : 1 (frames/125 us)

Bandwidth

: 9152 (Kbit/s)

Status

: active

Failure Information : N/A

Failure Bridge

: N/A

----------------------------------------------------------------------------------

---------

Port Reg Appl Peer

Reg

Decl

Rsvn

State State Participant Attribute

Attribute

status

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

268

----------------------------------------------------------------------------------

---------

1/1/31 in qa listener

listener_ready

talker_advertise

Reserved

1/1/32 in qa talker

talker_advertise

listener_ready

N/A

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.1000

Command Information

Platforms 6300

Command context Manager (#)

Modification Featured introduced.
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show msrp streams
show msrp streams
Description
Displays all information about MSRP streams.
Examples
Display the MSRP stream information:

switch# show msrp streams

Stream-Id

DMAC

VLAN Priority Rank Accumulated

(class)

Latency

Bandwidth Status Talker Port

(Kbit/s)

----------------------------------------------------------------------------------

---------

00:11:01:00:00:01:00:01 91:e0:f0:00:fe:00 2

3 (A) low 150020

9152

active 1/1/1

00:11:01:00:00:01:00:05 91:e0:f0:00:fe:02 2

3 (A) low 150020

9152

active 1/1/1

00:11:01:00:00:01:00:03 91:e0:f0:00:fe:01 2

3 (A) low 150020

9152

active 1/1/1

Note: One extra byte (per packet) is considered (to offset the clock diff from the neighbor device) for MSRP stream bandwidth.

AVB commands | 269

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.1000

Command Information

Platforms 6300

Command context Manager (#)

Modification Featured introduced.
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show msrp streams statistics
show msrp streams statistics
Description
Displays the traffic statistics for all streams.
Examples
Display the MSRP traffic statistics:

switch# show msrp streams statistics

Stream-Id

DMAC

Class

In Packets Drop Packets

In Bytes

Drop bytes

----------------------------------------------------------------------------------

---------

00:11:01:00:00:01:00:01 91:e0:f0:00:fe:00 3 (A)

0

0

0

0

00:11:01:00:00:01:00:05 91:e0:f0:00:fe:02 3 (A)

0

0

0

0

00:11:01:00:00:01:00:03 91:e0:f0:00:fe:01 3 (A)

0

0

0

0

Note: The drop counters are pointing to the ACL drops associated to a given

stream.

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.1000

Modification Featured introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

270

Command Information

Platforms 6300

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config avb
show running-config avb
Description
Displays all configured commands under the AVB context.
Examples
Display configured commands under the AVB context:
switch# show running-config avb avb
enable vlan 3 max-fan-in-ports 4

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.1000

Command Information

Platforms 6300

Command context Manager (#)

Modification Featured introduced.
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

vlan
vlan <VLAN ID> no vlan <VLAN ID>
Description
Configures the AVB VLAN globally. The default AVB VLAN is 2. Whenever the VLAN is changed, AVB disable and enable are required to make it operational. The no form of this command sets the AVB VLAN to default.

AVB commands | 271

Parameter <VLAN ID>

Description Specifies the VLAN. Range: 1-4094. Default: 2.

Examples
Enable AVB VLAN 3:
switch(config)# avb switch(config-avb)# vlan 3 Disable and Enable AVB to reflect VLAN configuration as operational.
Disable AVB VLAN 3 and setting to default:
switch(config)# avb switch(config-avb)# no vlan 3 Disable and Enable AVB to reflect VLAN configuration as operational.

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.1000

Command Information

Platforms 6300

Command context config

Modification Featured introduced.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

272

Chapter 10 Banner commands

Banner commands

banner
banner {motd | exec} <DELIMITER> no banner {motd | exec} <DELIMITER>
Description
Enables the customization of the MOTD or the EXEC banner. The no form of this command disables the MOTD or the EXEC banner.
Command context
config

Parameter motd exec <DELIMITER>

Description Configures the banner shown before the login prompt. Configures the banner shown after a successful login. Specifies the character used to terminate the input string.

Authority
Administrators or local user group members with execution rights for this command.
Usage
This command enables the customization of two types of banners:
n The MOTD banner. The banner displayed on attempting to connect to a management interface. n The EXEC banner. The banner displayed upon successful authentication.
You can create a banner that spans multiple lines. The maximum length of a banner is 4,095 characters. This requirement includes any non-visible characters. The minimum number of characters allowed is an empty string, which displays no banner. End the banner text with a chosen delimiter character. A delimiter character can be any non-whitespace character that does not have special meaning to the CLI, such as the caret (^). A question mark (?) is not permitted. Question marks can however be included as part of the banner text.
Examples
Configuring the banner displayed before login:

switch(config)# banner motd ^ Enter a new banner. Terminate the banner with the delimiter you have chosen. (banner-motd)# This is an example of a banner text which a connecting user

AOS-CX 10.14 Command-Line Interface Guide

273

(banner-motd)# will see before they are prompted for their password. (banner-motd)# (banner-motd)# As you can see it may span multiple lines and the input (banner-motd)# will be terminated when the delimiter character is (banner-motd)# encountered.^

Configuring the banner displayed after a successful login:

switch(config)# banner exec & Enter a new banner. Terminate the banner with the delimiter you have chosen. (banner-motd)# This is an example of different banner text. This time (banner-motd)# the banner entered will be displayed after a user has (banner-motd)# authenticated. (banner-motd)# (banner-motd)# & This text will not be included because it comes after the &

Disabling the MOTD banner:

switch(config)# no banner motd ^

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

show banner
show banner {motd | exec} [vsx-peer]
Description
Shows the MOTD or EXEC banner message.

Parameter motd exec [vsx-peer]

Description
Shows the banner displayed before the login prompt.
Shows the banner displayed after a successful login.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

Banner commands | 274

Showing the MOTD banner displayed before the login prompt:
switch(config)# show banner motd This is an example of a banner text which a connecting user will see before they are prompted for their password.
As you can see it may span multiple lines and the input will be terminated when the delimiter character is encountered.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

275

Chapter 11 BFD Commands

BFD Commands
bfd
bfd no bfd
Description
Enables BFD support on the switch. BFD is disabled by default. The no form of this command disables BFD and removes all related configuration settings. To disable BFD, but retain configuration settings, use the command bfd disable.
Examples
Enabling BFD support:
switch(config)# bfd
Disabling BFD support and removing all configuration settings:
switch(config)# no bfd

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

bfd <IPV4-ADDR>
bfd <IPV4-ADDR> no bfd <IPV4-ADDR>

AOS-CX 10.14 Command-Line Interface Guide

276

Description
Enables BFD under VRRP for the specified IP address. BFD is asynchronous and echo mode is supported. The no form of this command disables BFD under VRRP for the specified IP address.

Parameter <IPV4-ADDR>

Description
Specifies the address on which to enable BFD in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.

Examples
On the 6400 Switch Series, interface identification differs. Enabling BFD on the address 10.0.0.1 on VRRP 1:

switch(config)# interface 1/1/1 switch(config-if)# routing switch(config-if)# vrrp 1 address-family ipv4 switch(config-if-vrrp)# bfd 10.0.0.1

Disabling BFD on the address 10.0.0.1 on VRRP 1:

switch(config)# interface 1/1/1 switch(config-if)# routing switch(config-if)# vrrp 1 address-family ipv4 switch(config-if-vrrp)# no bfd 10.0.0.1

For more information on features that use this command, refer to the High Availability Guide or IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if-vrrp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bfd all-interfaces
bfd all-interfaces no bfd all-interfaces
Description

BFD Commands | 277

Enables BFD on all OSPFv2 or OSPFv3 interfaces. The no form of this command disables BFD on all active OSPFv2/OSPFv3 or IPv4/IPv6 interfaces, excluding those on which BFD was enabled at the interface level with the commands ip ospf bfd and ipv6 ospfv3 bfd.
Examples
Enabling BFD on all OSPFv2 interfaces:
switch(config)# router ospf 1 switch(config-ospf-1)# bfd all-interfaces
Disabling BFD on all OSPFv2 interfaces:
switch(config)# router ospf 1 switch(config-ospf-1)# no bfd all-interfaces
Enabling BFD on all OSPFv3 interfaces:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# bfd all-interfaces
Disabling BFD on all OSPFv3 interfaces:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no bfd all-interfaces

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config-ospf-<INSTANCE-TAG> config-ospfv3-<INSTANCE-TAG>

Authority
Administrators or local user group members with execution rights for this command.

bfd detect-multiplier
bfd detect-multiplier <MULTIPLIER> no bfd detect-multiplier <MULTIPLIER>
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

278

Sets BFD detection multiplier on an interface. The no form of this command removes the configured BFD detection multiplier.

Parameter <MULTIPLIER>

Description Specifies the BFD detection multiplier. Range: 1 to 5. Default: 5.

Examples
Setting the BFD detection multiplier to 3:

switch(config-if)# bfd detect-multiplier 3

Removing the BFD detection multiplier:

switch(config-if)# no bfd detect-multiplier 3

Setting the BFD detection multiplier to the default value:

switch(config-if)# no bfd detect-multiplier

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

bfd disable
bfd disable
Description
Disables BFD on the switch, but retains all configuration settings.
Examples
Disabling BFD:

BFD Commands | 279

switch(config)# bfd disable

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

bfd enable (Context: config-hsc)
switch(config-hsc)# bfd enable switch(config-hsc)# no bfd enable
Description
Enables or disables BFD for HSC feature.
Usage
BFD must be enabled globally to work for HSC.
Examples
Enabling BFD support for HSC:
switch(config)# hsc switch(config-hsc)# bfd enable
Disabling BFD support for HSC:
switch(config)# hsc switch(config-hsc)# no bfd enable

For more information on features that use this command, refer to the High Availability Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

280

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

bfd disable (Context: config-hsc)
switch(config-hsc)# bfd disable
Description
Disables BFD for HSC feature.
Example
Disabling BFD support for HSC:
switch(config)# hsc switch(config-hsc)# bfd disable

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

bfd echo disable
bfd echo disable no bfd echo disable
Description
Disables support for BFD echo packets. Echo packet support is enabled by default. The no form of this command enables support for BFD echo packets.

BFD Commands | 281

BFD IPv6 Echo is not supported.
Authority Examples
On the 6400 Switch Series, interface identification differs. Enabling BFD echo packet support on all interfaces:
switch(config)# no bfd echo disable
Disabling BFD echo packet support on all interfaces:
switch(config)# bfd echo disable
Enabling BFD echo packet support on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# bfd echo disable
Disabling BFD echo packet support on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no bfd echo disable

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

bfd echo-src-ip-address
bfd echo-src-ip-address <IPV4-ADDR> no bfd echo-src-ip-address <IPV4-ADDR>
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

282

Sets the source IPv4 address for BFD echo packets. This address is used in all echo sessions.

The source IP address must not be on the same network segment as any switch interface, otherwise a large number of ICMP redirect packets may be sent by the remote device, causing network congestion.
The no form of this command removes the source IPv4 address for BFD echo packets, which causes the switch to stop sending echo packets. When a valid value is set, all sessions with a peer that is capable of receiving echo packets, will start transmitting echo packets. BFD control sessions continue to run concurrently with echo packets.

Parameter <IPV4-ADDR>

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.

Examples
Setting the source IP address to 198.51.100.1:

switch(config)# bfd echo-src-ip-address 198.51.100.1

Removing the source IP address 198.51.100.1:

switch(config)# no bfd echo-src-ip-address 198.51.100.1

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

bfd min-echo-receive-interval
bfd min-echo-receive-interval <INTERVAL> no bfd min-echo-receive-interval <INTERVAL>
Description
Sets the minimum time interval between received BFD echo packets.

BFD Commands | 283

The no form of this command removes the configured BFD echo packets interval. If the interval is not set, the default interval is used.
BFD IPv6 Echo is not supported.

Parameter <INTERVAL>

Description
Specifies the minimum reception interval in milliseconds. A value of 0 means that the switch does not support reception of BFD echo packets. Range: 0, 50 to 1000. Default: 500.

Examples
Setting the minimum reception interval to 1000 milliseconds:

switch(config)# bfd min-echo-receive-interval 1000

Removing the minimum reception interval:

switch(config)# no bfd min-echo-receive-interval 1000

Setting the minimum reception interval to the default value:

switch(config)# no bfd min-echo-receive-interval

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

bfd min-receive-interval
bfd min-receive-interval <INTERVAL> no bfd min-receive-interval <INTERVAL>
Description
Sets the minimum time interval between received BFD control packets on an interface.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

284

The no form of this command removes the configured BFD minimum interval on an interface. If the interval is not set, the default interval is used.

Parameter <INTERVAL>

Description
Specifies the minimum receive interval in milliseconds. A value of 0 means that the switch does not support reception of BFD control packets. Range: 500 to 20000. Default: 3000.

Examples
Setting the minimum receive interval to 1000 milliseconds:

switch(config-if)# bfd min-receive-interval 1000

Removing the minimum receive interval:

switch(config-if)# no bfd min-receive-interval 1000

Setting the minimum receive interval to the default value:

switch(config-if)# no bfd min-receive-interval

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

bfd min-transmit-interval
bfd min-transmit-interval <INTERVAL> no bfd min-transmit-interval <INTERVAL>
Description
Sets the minimum time interval between transmitted BFD control packets on an interface. The no form of this command removes the configured BFD minimum transmitted interval on an interface. If the interval is not set, the default interval is used.

BFD Commands | 285

Parameter <INTERVAL>

Description
Specifies the minimum transmit interval in milliseconds. Range: 500 to 20000 Default: 3000.

Usage
n If the minimum time interval is set between 500 ms and 1000 ms, then bfd detect-multiplier must be set to at least 3.
n If bfd detect-multiplier is set to 1, then the minimum transmit interval must be set to at least 3000 ms.
n Whenever the minimum time interval is set to a value less than 1000 ms, BFD automatically adjusts the transmission interval to 1000 ms if any of the following conditions apply: o The session is operating in asynchronous mode and echo is enabled. o The session state is in any other state than up.
As described in RFC 5880, this behavior occurs because BFD echo provides quick detection which allows the BFD asynchronous session to lower its traffic/resource requirements.

BFD IPv6 Echo is not supported.

Examples
Setting the minimum transmit interval to 500 ms: switch(config-if)# bfd min-transmit-interval 500
Removing the minimum transmit interval: switch(config-if)# no bfd min-transmit-interval 500
Setting the minimum transmit interval to the default value: switch(config-if)# no bfd min-transmit-interval

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

286

Platforms
6300 6400

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

clear bfd statistics
clear bfd statistics [session <ID>]
Description
Clears statistics for all BFD sessions or for a specific BFD session.

Parameter session <ID>

Description Specifies a session ID.

Examples
Clearing statistics for all BFD sessions:

switch# clear bfd statistics

Clearing statistics for BFD session 1:

switch# clear bfd statistics session 1

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip ospf bfd
ip ospf bfd no ip ospf bfd
Description

BFD Commands | 287

Enables BFD for OSPFv2 on the current interface. The interface must have OSPFv2 enabled on it. This overrides the global settings defined with the command bfd all-interfaces. The no form of this command sets the current interface to the global settings defined with the command bfd all-interfaces.
Examples
On the 6400 Switch Series, interface identification differs. Enabling BFD on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# ip ospf bfd
Disabling BFD on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no ip ospf bfd

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip ospf bfd disable
ip ospf bfd disable
Description
Disables BFD for OSPFv2 on the current interface. This overrides the global settings defined with the command bfd all-interfaces.
Examples
On the 6400 Switch Series, interface identification differs. Enabling BFD on interface 1/1/1:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

288

switch(config)# interface 1/1/1 switch(config-if)# ip ospf bfd disable

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip route bfd
ip route <DEST-IPV4-ADDR>/<NETMASK> [<NEXT-HOP-IP-ADDR> | <INTERFACE>] [bfd] no ip route <DEST-IPV4-ADDR>/<NETMASK> [<NEXT-HOP-IP-ADDR> | <INTERFACE>] [bfd]
Description
Enables or disables BFD on the specified static route. To disable BFD, issue the command without the bfd option.

Parameter <DEST-IPV4-ADDR> <NETMASK> <NEXT-HOP-IP-ADDR> <INTERFACE> bfd

Description
Specifies a route destination in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the next hop address for reaching the destination in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the next hop as an outgoing interface.
Enables BFD on the static route. Omit this parameter to disable BFD.

Examples
On the 6400 Switch Series, interface identification differs. Enabling BFD on a static route:

BFD Commands | 289

switch(config)# interface 1/1/1 switch(config-if)# ip address 20.1.1.2/24 switch(config-if)# no shutdown switch(config-if)# routing switch(config-if)# exit switch(config)# ip route 192.0.0.0/8 20.1.1.1 bfd
Disabling BFD on a static route:
switch(config)# ip route 192.0.0.0/8 20.1.1.1

For more information on features that use this command, refer to the High Availability Guide or IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 bfd
ipv6 ospfv3 bfd no ipv6 ospfv3 bfd
Description
Enables BFD for OSPFv3 on the current interface. The interface must have OSPFv3 enabled on it. This overrides the global settings defined with the command bfd all-interfaces. The no form of this command sets the current interface to the global settings defined with the command bfd all-interfaces.
Examples
Enabling BFD:
switch(config-if)# ipv6 ospfv3 bfd
Disabling BFD:
switch(config-if)# no ipv6 ospfv3 bfd

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

290

Enabling BFD on a subinterface: switch(config-subif)# ipv6 ospfv3 bfd
Disabling BFD on a subinterface: switch(config-subif)# no ipv6 ospfv3 bfd

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 bfd disable
ipv6 ospfv3 bfd disable
Description
Disables BFD on the current OSPFv3 interface. This overrides the global settings defined with the command bfd all-interfaces.
Examples
On the 6400 Switch Series, interface identification differs. Enabling BFD on interface 1/1/1 :
switch(config)# interface 1/1/1 switch(config-if)# routing switch(config-if)# ipv6 ospfv3 bfd disable

For more information on features that use this command, refer to the High Availability Guide for your switch model.
Command History

BFD Commands | 291

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor fall-over bfd
neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} fall-over bfd no neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} fall-over bfd
Description
Enables BGP to register with BFD to receive fast peering session deactivation messages from BFD. The no form of this command disables BGP for BFD.
BFD is supported with IPv6 neighbors on the 6300, 6400, , , , , , , and switch series.

Parameter <IP-ADDR>
<PEER-GROUP-NAME>

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies a peer group.

Examples

switch(config-router)# neighbor 1.1.1.1 fall-over switch(config-router)# no neighbor 1.1.1.1 fall-over bfd

switch(config-router)# neighbor PG fall-over switch(config-router)# no neighbor PG fall-over bfd

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

292

Platforms
6300 6400

Command context config-router

Authority
Administrators or local user group members with execution rights for this command.

show bfd
show bfd [session <ID>] [all-vrfs | vrf <NAME>] [vsx-peer]
Description
Shows information for all BFD sessions or for a specific BFD session.

Parameter session <ID> all-vrfs vrf <NAME> vsx-peer

Description
Session ID.
All VRFs.
Specifies the name of a VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
Possible values for State are:
n Up n Down n AdminDown n Init
Possible values for Local diagnostic and Remote diagnostic are:
n Control detection time expired (1): The session has stopped receiving BFD control packets from the peer after one detection time.
n Echo function failed: The session has stopped receiving BFD Echo packets, so the session was declared Down.
n Neighbor signaled session down: A packet from the peer was received with either AdminDown or Down state.
n Forwarding plane reset: Not set in this release. n Path down: The forwarding path when Down. n Concatenated path down: Not set in this release. n Administratively down: The administrator has disabled BFD. n Reverse concatenated path down: Not set in this release.

BFD IPv6 Echo is not supported.

Examples

BFD Commands | 293

Showing information for all BFD sessions:

switch# show bfd

Admin status : Enabled Echo source IP : 2.2.2.2 Statistics: Total Number of Control Packets Transmitted : 42 Total Number of Control Packets Received : 42 Total Number of Control Packets Dropped : 0

Session Interface VRF

Source IP

Destination IP

Echo

State Application

------- --------- --------- ------------------------------- ----------------------

--------- -------- -------- ------------

1

vlan10 blue

10.10.10.1

10.10.10.2

disabled up

ospf

1

vlan10 blue

N/A

10.10.10.2

disabled up

static_routes

2

vlan40 red

40.10.10.1

40.10.10.2

disabled up

ospf

3

vlan30 red

30.10.10.1

30.10.10.2

disabled up

ospf

4

vlan20 blue

20.10.10.1

20.10.10.2

disabled up

ospf

5

vlan50 black

50.10.10.1

50.10.10.2

disabled up

ospf

6

vlan60 black

60.10.10.1

60.10.10.2

disabled up

ospf

7

vlan10 blue

fe80::409:7380:a62:2400

fe80::409:7380:a49:a200

disabled up

ospfv3

Admin status : Enabled Echo source IP : 2.2.2.2 Statistics: Total Number of Control Packets Transmitted : 42 Total Number of Control Packets Received : 42 Total Number of Control Packets Dropped : 0

Session Interface VRF

Source IP

Destination IP

Echo

State Application

------- --------- --------- ------------------------------- ----------------------

--------- -------- -------- ------------

1

vlan10 blue

10.10.10.1

10.10.10.2

disabled up

ospf

1

vlan10 blue

N/A

10.10.10.2

disabled up

static_routes

2

vlan40 red

40.10.10.1

40.10.10.2

disabled up

ospf

3

vlan30 red

30.10.10.1

30.10.10.2

disabled up

ospf

4

vlan20 blue

20.10.10.1

20.10.10.2

disabled up

ospf

5

vlan50 black

50.10.10.1

50.10.10.2

disabled up

ospf

6

vlan60 black

60.10.10.1

60.10.10.2

disabled up

ospf

7

vlan10 blue

fe80::409:7380:a62:2400

fe80::409:7380:a49:a200

disabled up

ospfv3

Showing information for BFD session 1:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

294

switch# show bfd session 1

BFD Session Information ­ Session 1

VRF: blue

Min Tx Interval (msec) : 10000

Min Rx Interval (msec) : 10000

Min Echo Rx Interval (msec) : 700

Detect Multiplier : 3

Application : ospf

Local Discriminator : 1

Remote Discriminator : 1

Echo : Enabled

Local Diagnostic : no_diagnostic

Remote Diagnostic: administratively_down

State flaps: 0

Interface Source IP

Destination IP State

Pkt In Pkt Out Pkt Drop

--------- --------------- --------------- ---------- -------- -------- --------

1/1/1

100.100.100.100 100.100.100.101 Up

100

101

0

BFD Session Information ­ Session 1

VRF: blue

Min Tx Interval (msec) : 10000

Min Rx Interval (msec) : 10000

Min Echo Rx Interval (msec) : 700

Detect Multiplier : 3

Application : ospf

Local Discriminator : 1

Remote Discriminator : 1

Echo : Enabled

Local Diagnostic : no_diagnostic

Remote Diagnostic: administratively_down

State flaps: 0

Interface Source IP

Destination IP State

Pkt In Pkt Out Pkt Drop

--------- --------------- --------------- ---------- -------- -------- --------

1/1/1

100.100.100.100 100.100.100.101 Up

100

101

0

Showing information for all BFD sessions related to a particular VRF in the system:

switch# show bfd vrf blue

Admin status: enabled

Echo source IP: 100.1.1.1

Statistics:

Total number of control packets transmitted: 2226

Total number of control packets received: 2222

Total number of control packets dropped: 0

Session Interface VRF

Source IP

Destination IP

Echo

State Application

------- --------- --------- ------------------------------- ----------------------

--------- -------- -------- ------------

1

vlan10 blue

10.10.10.1

10.10.10.2

disabled up

ospf

1

vlan10 blue

N/A

10.10.10.2

disabled up

static_routes

4

vlan20 blue

20.10.10.1

20.10.10.2

disabled up

ospf

7

vlan10 blue

fe80::409:7380:a62:2400

fe80::409:7380:a49:a200

disabled up

ospfv3

For more information on features that use this command, refer to the High Availability Guide for your switch model.

BFD Commands | 295

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show bfd interface
show bfd interface <NAME>
Description
Shows information for all BFD sessions related to the specified interface.

Parameter interface <NAME>

Description Specifies an interface.

BFD IPv6 Echo is not supported.

Examples
Showing information for all BFD sessions related to the specified interface:

switch# show bfd interface vlan10

BFD session information - Session 1

Min Tx interval (msec): 3000

Min Rx interval (msec): 3000

Min echo Rx interval (msec): 500

Detect multiplier: 5

Application: ospf

Local discriminator: 13211

Remote discriminator: 13211

Echo: disabled

Local diagnostic: no_diagnostic

Remote diagnostic: no_diagnostic

State flaps: 0

Interface Source IP

Destination IP

State

Pkt Rx Pkt Tx Pkt drop

--------- --------------------------------------- --------------------------------

------- ------------ -------- -------- --------

vlan10 10.10.10.1

10.10.10.2

up

453

455

0

=============================================== BFD session information - Session 1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

296

Min Tx interval (msec): 3000

Min Rx interval (msec): 3000

Min echo Rx interval (msec): 500

Detect multiplier: 5

Application: static_routes

Local discriminator: 13211

Remote discriminator: 13211

Echo: disabled

Local diagnostic: no_diagnostic

Remote diagnostic: no_diagnostic

State flaps: 0

Interface Source IP

Destination IP

State

Pkt Rx Pkt Tx Pkt drop

--------- --------------------------------------- --------------------------------

------- ------------ -------- -------- --------

vlan10 N/A

10.10.10.2

up

453

455

0

===============================================

BFD session information - Session 7

Min Tx interval (msec): 3000

Min Rx interval (msec): 3000

Min echo Rx interval (msec): 500

Detect multiplier: 5

Application: ospfv3

Local discriminator: 1402

Remote discriminator: 1402

Echo: disabled

Local diagnostic: no_diagnostic

Remote diagnostic: no_diagnostic

State flaps: 0

Interface Source IP

Destination IP

State

Pkt Rx Pkt Tx Pkt drop

--------- --------------------------------------- --------------------------------

------- ------------ -------- -------- --------

vlan10 fe80::409:7380:a62:2400

fe80::409:7380:a49:a200

up

58

58

0

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

show hsc

BFD Commands | 297

show hsc
Description
Displays connection information for the remote controller.
Example
Displaying connection information for the remote controller:

switch# show hsc

BFD status : Enabled

Controller IP Port Connection Connection

address

status

state

--------------- ------- ---------- -------------

192.168.16.17 6640 UP

ACTIVE

192.168.16.17 6650 UP

IDLE

192.168.16.17 6660 DOWN

BACKOFF

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

298

Chapter 12 BGP commands

BGP commands

address-family
address-family {{ipv4 | ipv6} unicast | l2vpn evpn} no address-family {{ipv4 | ipv6} unicast | l2vpn evpn}
Description
Specifies address family to use and changes to the configuration context for the specified family:
n config-bgp-ipv4-uc for IPv4 unicast n config-bgp-ipv6-uc for IPv6 unicast n config-bgp-l2vpn-evpn for L2VPN EVPN
The no form of this command removes the specified address family configuration.

Parameter ipv4 ipv6 unicast l2vpn evpn

Description
Selects the IPv4 address family.
Selects the IPv6 address family.
Specifies unicast addresses.
Selects the L2VPN EVPN address family. Route maps with the match vni clause can be used with L2VPN EVPN neighbors only.

Example
Setting the address family to IPv4 unicast.

switch(config-bgp)# address-family ipv4 unicast switch(config-bgp-ipv4-uc)#

Setting the address family to L2VPN EVPN.

switch(config-bgp)# address-family l2vpn evpn switch(config-bgp-l2vpn-evpn)#

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide

299

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

aggregate-address
aggregate-address <IP-ADDR>/<MASK> [as-set] [summary-only] [suppress-map <MAP-NAME>] [advertise-map <MAP-NAME>] [attribute-map <MAP-NAME>]
no aggregate-address <IP-ADDR>/<MASK> [as-set] [summary-only] [suppress-map <MAP-NAME>] [advertise-map <MAP-NAME>] [attribute-map <MAP-NAME>]
Description
Creates an aggregate address entry in the BGP routing table. The no form of this command removes the specified aggregate address entry.

Parameter <ADDRESS>
<MASK> as-set summary-only suppress-map <MAP-NAME>
advertise-map <MAP-NAME> attribute-map <MAP-NAME>

Description
Specifies an aggregate address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
The AS_PATH attribute advertised for this route will contain an AS_ SET consisting of all AS numbers contained in all paths that are being summarized.
Creates the aggregate route but also suppresses advertisements of more-specific routes to all neighbors.
Specifies an aggregate route for creation, but suppresses the advertisement of the created route. Match clauses of route maps can be used to suppress some more-specific routes of the aggregate selectively, and leave others unsuppressed. IP prefix lists and as_path lists match clauses are supported.
Specifies routes that will be used to build attributes of the aggregate route, such as AS_SET or community.
Specifies that the attributes of the aggregate route can be changed.

Examples

BGP commands | 300

switch(config-bgp-ipv4-uc)# aggregate-address 10.0.0.0/8 switch(config-bgp-ipv4-uc)# no aggregate-address 10.0.0.0/8
switch(config-bgp-ipv6-uc)# aggregate-address 2001:0db8:85a3::8a2e:0370:7334/24 switch(config-bgp-ipv6-uc)# no aggregate-address 2001:0db8:85a3::8a2e:0370:7334/24
switch(config-bgp-ipv4-uc)# aggregate-address 10.0.0.0/8 as-set summary-only switch(config-bgp-ipv4-uc)# aggregate-address 10.0.0.0/8 attribute-map RMap
switch(config-bgp-ipv6-uc)# aggregate-address 2001:0db8:85a3::8a2e:0370:7334/24 as-set summary-only switch(config-bgp-ipv6-uc)# aggregate-address 2001:0db8:85a3::8a2e:0370:7334/24 attribute-map RMap

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc

Authority
Administrators or local user group members with execution rights for this command.

bgp always-compare-med
bgp always-compare-med no bgp always-compare-med
Description
Enables comparison of the Multi Exit Discriminator (MED) for paths from neighbors in different autonomous systems. Any changes in BGP configuration are applied by restarting the current BGP sessions on the VRFs. The no form of this command sets comparison of MED to the default setting (disabled).
Usage
n MED is one of the parameters that is considered when selecting the best path among many alternative paths. The path with a lower MED is preferred over a path with a higher MED.
n During the best-path selection process, MED comparison is done only among paths from the same autonomous system. Use the command bgp always-compare-med to change this behavior by

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

301

enforcing MED comparison between all paths, regardless of the autonomous system from which the paths are received.
Examples
switch(config-bgp)# bgp always-compare-med All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?
switch(config-bgp)# no bgp always-compare-med All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp asnotation dotted
bgp asnotation dotted no bgp asnotation dotted
Description
Specifies that Autonomous System (AS) numbers greater than 65535 be shown in dotted integer format for all show commands, including running-configuration. The no form of this command restores the default format of non-dotted, simple integer.
Example
switch(config-bgp)# bgp asnotation dotted

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

BGP commands | 302

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp asnotation dotted-plus
bgp asnotation dotted-plus no bgp asnotation dotted-plus
Description
Specifies that all Autonomous System (AS) numbers be shown in dotted integer format for all show commands, including running-configuration. The no form of this command restores the default format of non-dotted, simple integer.
Example
switch(config-bgp)# bgp asnotation dotted-plus

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp bestpath as-path ignore
bgp bestpath as-path ignore no bgp bestpath as-path ignore
Description
Configures BGP to avoid considering the autonomous system (AS) path during best path route selection. By default, the AS-path is considered during BGP best path selection.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

303

Any changes in BGP configuration are applied by restarting the current BGP sessions on the VRFs. The no form of this command restores default behavior which configures BGP to consider the AS-path during route selection.
Examples
switch(config-bgp)# bgp bestpath as-path ignore All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?
switch(config-bgp)# no bgp bestpath as-path ignore All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp bestpath as-path multipath-relax
bgp bestpath as-path multipath-relax no bgp bestpath as-path multipath-relax
Description
Configures Border Gateway Protocol (BGP) to treat two BGP routes as equal cost even if their AS-paths differ, as long as their AS-path lengths and other relevant attributes are the same. This allows routes with different AS-paths to be programmed into the forwarding table as equal cost multipath routes. Any changes in BGP configuration are applied by restarting the current BGP sessions on the VRFs. The no form of this command restores the default behavior which configures BGP to treat two BGP routes as different costs when their AS-paths differ.
Examples
switch(config-bgp)# bgp bestpath as-path multipath-relax All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

BGP commands | 304

switch(config-bgp)# no bgp bestpath as-path multipath-relax All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp bestpath compare-routerid
bgp bestpath compare-routerid no bgp bestpath compare-routerid
Description
Configures a BGP routing process to compare identical routes received from different external peers during the best path selection process and selects the route with the lowest router ID as the best path. Defaults to disabled. Any changes in BGP configuration are applied by restarting the current BGP sessions in the VRFs. The no form of this command returns the BGP routing process to the default operation. By default, BGP selects the route that was received first when two routes with identical attributes are received.
Examples
switch(config-bgp)# bgp bestpath compare-routerid All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?
switch(config-bgp)# no bgp bestpath compare-routerid All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

305

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp bestpath med confed
bgp bestpath med confed no bgp bestpath med confed
Description
Compares the identical routes received from the different confederation peers and selects the route with the lowest Multi Exit Discriminator (MED) value as the best path. This behavior is disabled by default. The no form of this command prevents the routing process from considering the MED value.
The selection of other attributes like as-multi-path relax and as-path ignore will not affect the behavior of this command within a confederation.
Examples
Selecting the route with lowest MED value:
switch(config-bgp)# bgp bestpath med confed All active BGP sessions in the VRF %s will be restarted. Do you want to continue (y/n)?
Preventing the routing process from selecting the MED value:
switch(config-bgp)# no bgp bestpath med confed All active BGP sessions in the VRF %s will be restarted. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

BGP commands | 306

Platforms
6300 6400

Command context config-bgp

Authority
Administrators or local user group members with execution rights for this command.

bgp bestpath med missing-as-worst
bgp bestpath med missing-as-worst no bgp bestpath med missing-as-worst
Description
Configures a BGP routing process to assign a value of infinity (max possible) to routes that are missing the Multi Exit Discriminator (MED) attribute. The path without a MED value is the least desirable path. Any changes in BGP configuration are applied by restarting the current BGP sessions in the VRFs. The no form of this command restores default behavior. The default behavior assigns a value of 0 to the missing MED.
Examples
switch(config-bgp)# bgp bestpath med missing-as-worst All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?
switch(config-bgp)# no bgp bestpath med missing-as-worst All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp cluster id
bgp cluster-id {<IPV4-ADDR> | <ID>} no bgp cluster-id {<IPV4-ADDR> | <ID>}
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

307

Specifies the cluster ID when the BGP router is used as a route-reflector. The cluster ID default is the router ID. Any changes in BGP configuration are applied by restarting the current BGP sessions on the VRFs.
The no form of this command sets the cluster ID to the default value, which is the router ID.

Parameter <IPV4-ADDR>
<ID>

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. You can remove leading zeros. For example, the address 192.169.005.100 becomes 192.168.5.100.
Specifies the cluster ID as 32-bit number. Range: 1 to 4294967295.

Examples

switch(config-bgp)# bgp cluster-id 2.2.2.2 All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

switch(config-bgp)# no bgp cluster-id 2.2.2.2 All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp confederation
bgp confederation <AS-NUMBER> no bgp confederation<AS-NUMBER>
Description
Configures a BGP confederation with the confederation identifier. The group of Autonomous Systems (ASs) will be presented as a single autonomous system with the confederation identifier as the AS number. The no form of the command deletes the BGP confederation identifier.

BGP commands | 308

Parameter <AS-NUMBER>

Description Sets the identifier for the confederation. Range:1-4294967295.

Examples
Configuring the BGP confederation with the AS number:

switch(config-bgp)# bgp confederation 100

Deleting BGP confederation identifier:

switch(config-bgp)# no bgp confederation 100 This will delete BGP confederation identifier on this device. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp confederation peers
bgp confederation peers <AS NUMBER> no bgp bgp confederation peers <AS NUMBER>
Description
Configures BGP confederation peers with both same and different sub-autonomous system to establish an eBGP membership. You can configure a list of AS numbers separated by spaces. The no form of this command disables the peer session and deletes the peer information.

Parameter <AS NUMBER>

Description
Specifies the autonomous system numbers to establish an eBGP membership. Range: 64512-65535.

Examples Configuring peers with ASNs:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

309

switch(config-bgp)# bgp confederation peers 64512 64513
Disabling peers and deleting the peer information:
switch(config-bgp)# no bgp confederation peers 64512

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp dampening
bgp dampening {{half-life <HALF-TIME> reuse <LOW-THRESHOLD> suppress <HI-THRESHOLD> maxsuppress-time <MAX-TIME>} | route-map <NAME>}
Description
Enables route flap dampening which reduces the propagation of unstable routes in the network.

Parameter half-life <HALF-TIME> reuse <LOW-THRESHOLD> suppress <HI-THRESHOLD> max-suppress-time <MAX-TIME> route-map <NAME>

Description
Specifies the half-life time in minutes. When the time expires, the penalty on a route gets reduced exponentially to half its current value. Default: 15.
Specifies the lower threshold of penalty. On a suppressed route, when the penalty on a route falls below this value, the route is unsuppressed. Default: 750.
Specifies the upper threshold of penalty. When the penalty on a flapping route exceeds this value, the route is suppressed. Default: 2000.
Specifies the maximum time to keep a route suppressed in minutes. Once this timer expires, the route is unsuppressed. Default: 60.
Specifies the name of a route map.

BGP commands | 310

These parameters can be configured at the router level for specific address families or the same parameters can be configured under a route map which can be applied to dampening command.
Usage
The dampening algorithm assigns a penalty of 1000 to a flapping route every time the route gets withdrawn. The penalty values accumulate on the route every time it flaps. However, the penalty decays and is reduced to half its value by the half-life time.
This feature is not applicable on IBGP routes.
Example
switch(config)# router bgp 1 switch(config-bgp)# address-family ipv4 unicast switch(config-bgp-ipv4-uc)# bgp dampening
switch(config-bgp-ipv4-uc)# bgp dampening route-map abc
switch(config-bgp-ipv4-uc)# bgp dampening route-map xyz
switch(config-bgp-ipv4-uc)# bgp dampening half-life 10 reuse 100 suppress 250 maxsuppress-time 45

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-bgp-ipv4-uc

Authority
Administrators or local user group members with execution rights for this command.

bgp default local-preference
bgp default local-preference <NUMBER> no bgp default local-preference
Description
Default local preference value for BGP learned routes. Any changes in BGP configuration are applied by restarting the current BGP sessions on the VRFs. The no form of this command sets the local preference to the default value of 100.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

311

Parameter <NUMBER>

Description
Specifies the local preference value. Range: 0 to 4294967295. Default: 100.

Examples

switch(config-bgp)# bgp default local-preference 20 All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

switch(config-bgp)# no bgp default local-preference All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp deterministic-med
bgp deterministric-med no bgp deterministic-med
Description
Enables comparison of the Multi-Exit Discriminator (MED) attribute when selecting routes advertised by different peers in the same autonomous system. Any changes in BGP configuration are applied by restarting the current BGP sessions on the VRFs. The no form of this command sets MED comparison to the default setting of disabled.
Examples
switch(config-bgp)# bgp deterministric-med All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

BGP commands | 312

switch(config-bgp)# no bgp deterministric-med All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp fast-external-fallover
bgp fast-external-fallover no bgp fast-external-fallover
Description
Sets the switch to reset the BGP sessions of any directly adjacent external peers when the connected link goes down. It is enabled by default. The no form of this command restores the default behavior where BGP waits until the hold time expires before closing sessions.
Examples
switch(config-bgp)# bgp fast-external-fallover switch(config-bgp)# no bgp fast-external-fallover

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.08

Modification
The default behavior has been changed from disabled to enabled state.
NOTE: When upgrading, the feature will remain in the state it was (disabled or

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

313

Release

Modification

enabled) in the earlier release.

10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

--
Authority Administrators or local user group members with execution rights for this command.

bgp graceful-restart restart-time
bgp graceful-restart restart-time <DELAY> no bgp graceful-restart restart-time
Description
Sets the graceful restart timer which determines how long the switch waits for a graceful-restart capable neighbor to re-establish BGP peering. Any changes in BGP configuration are applied by restarting the current BGP sessions on the VRFs. The no form of this command resets to the default value of 120 seconds.

Parameter <DELAY>

Description
Graceful restart timer delay in seconds. Range: 1 to 3600. Default: 1500.

Usage
n Graceful restart functionality is enabled by default, and there is no command to disable the functionality at the protocol level.
n However, the graceful-restart functionality can be disabled globally using the command router graceful-restart.
Examples

switch(config-bgp)# bgp graceful-restart restart-time 150 All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

switch(config-bgp)# no bgp graceful-restart restart-time All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

BGP commands | 314

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp graceful-restart stalepath-time
bgp graceful-restart stalepath-time <TIME> no bgp graceful-restart stalepath-time
Description
Sets the stale path timer. This timer determines how long BGP keeps stale routes from the restarting BGP peer. Any changes in BGP configuration are applied by restarting the current BGP sessions on the VRFs. The no form of this command resets to the stale path timer to the default of 300 seconds.

Parameter <TIME>

Description
Specifies the stale path timer in seconds. Range: 1 to 3600. Default: 300.

Examples

switch(config-bgp)# bgp graceful-restart stalepath-time 300 All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

switch(config-bgp)# no bgp graceful-restart stalepath-time All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

315

Platforms
6300 6400

Command context config-bgp

Authority
Administrators or local user group members with execution rights for this command.

bgp log-neighbor-changes
bgp log-neighbor-changes no bgp log-neighbor-changes
Description
Enables logging of BGP neighbor session state changes. The no form of this command disables logging of changes in BGP neighbor adjacencies.
Examples
switch(config-bgp)# bgp log-neighbor-changes switch(config-bgp)# no bgp log-neighbor-changes

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp maxas-limit
bgp maxas-limit <LENGTH> no bgp maxas-limit
Description
Specifies the maximum size of AS paths in update messages. Routes with AS paths greater than the specified length are discarded. The no form of this command sets the limit to the default of 32.

Parameter <LENGTH>

Description
Specifies the number of AS segments. Length: 1 to 32 characters. Default: 32.

BGP commands | 316

Example
switch(config-bgp)# bgp maxas-limit 20 switch(config-bgp)# no bgp maxas-limit

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp router-id
bgp router-id <ROUTER-ID> no bgp router-id <ROUTER-ID>
Description
Configures a fixed router ID for the BGP peer process running on the router. Any changes in BGP configuration are applied by restarting the current BGP sessions on the VRFs. The no form of this command removes the fixed router ID from the running configuration and restores the default router ID selection.

Parameter <ROUTER-ID>

Description
Specifies the router ID in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
If router-id is changed, then all the active BGP peer sessions go down and restart with the newly configured router-id.

Usage
BGP determines the router ID as follows:
1. The address configured with the command bgp router-id. 2. The highest IP address on all the loopback interfaces. 3. The highest IP address on any interface.
Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

317

switch(config-bgp)# bgp router-id 1.1.1.1 All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?
switch(config-bgp)# no bgp router-id 1.1.1.1 All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bgp update-group
bgp update-group no bgp update-group
Description
Enables the update-group feature. Update-group is used to optimize BGP processing. With updategroup enabled, neighbors that share same outbound policy are grouped under single update-group and update messages are shared to all peers within that group. Disabled by default.
On enabling/disabling update-group, all the current BGP sessions including dynamic peer sessions will be restarted. The dynamic peer sessions will get re-established based on the connect-retry timer configured on the peer device.
BGP determines the AS number size to be used with each individual peer based on the configured AS octet-size on the peers. If BGP is configured to use 2 octet ASN with peer A and 4 octet ASN with peer B, then BGP updates sends to peer A and peer B will be different. Therefore, they will form into two different update-groups.
This feature is supported for IBGP alone. It is not recommended to enable update-group on VPNv4 address families or configure update-group if an VPNv4 address family is configured. Update-group indices are created automatically and cannot be configured. Indices are ephemeral in nature. Updategroup indices will not be retained across process restart. When update-group is configured, route reflector clients and non route reflector clients are parted into different update-groups. The use of update-groups imposes the following limitations in BGP processing:

BGP commands | 318

1. While advertising routes to peers of the update-group, the check on route's next-hop is ignored. This means that, BGP routes can get advertised to a peer even if the next-hop IP of the routes is same as peer's IP, and the peer should discard such routes.
2. The use of ORF is restricted. BGP will continue to send outbound route filters to peers, but received filters are ignored.
3. Sender loop detection is delayed until the point where UPDATE messages are sent to the members of the update-group. This means route dropped by the sender due to loop detection will still count as advertised, as they have been advertised to the update-groups.
It is recommended to enable BGP update-group globally before configuring BGP neighbors. This ensures that toggling of BGP neighborship can be avoided and memory of the routing process can be optimized. The no form of this command disables the update-group feature.
Examples
Enabling BGP update-group:
switch(config-bgp)# bgp update-group All current BGP sessions in VRF default will be restarted.
Do you want to continue (y/n)?
Disabling BGP update-group:
switch(config-bgp)# no bgp update-group All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms
6300 6400

Command context config-bgp

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

clear bgp
clear bgp [vrf <VRF-NAME>][ipv4 unicast | ipv6 unicast | all] {* | <NEIGHBOR-IP-ADDR>} [soft in]
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

319

Resets BGP peer sessions. Sends a route refresh request when you have specified soft in. Optionally, you can specify reset for a specific VRF.

Parameter ipv4 unicast ipv6 unicast l2vpn evpn vrf <VRF-NAME> all * | <NEIGHBOR-IP-ADDRESS>
soft in

Description Specifies the IPv4 address family. Specifies the IPv6 address family. Selects the L2VPN EVPN address family Specifies a VRF name. Specifies all VRFs and address families. Specifies a neighbor IP address for which peer sessions are to be reset, or * to reset all sessions. Send a route refresh request.

Examples

add descriptions for all examples switch# clear bgp all * switch# clear bgp ipv4 unicast 192.168.12.1 soft in

switch# clear bgp l2vpn evpn * soft in switch# clear bgp l2vpn evpn 9.0.0.2 soft in

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

disable|enable
disable | enable
Description

BGP commands | 320

This command disables or enables the BGP instance while retaining the configuration. Disable and enable of the BGP instance may result in a change of the router ID. By default the BGP instance is enabled.
Examples
switch(config)# router bgp 100 switch(config-bgp)# disable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

distance bgp
distance bgp <EXTERNAL> <INTERNAL> no distance bgp <EXTERNAL> <INTERNAL>
Description
Configures the administrative distance for BGP. The no form of this command restores the default settings, 20 for eBGP and 200 for iBGP,

Parameter <EXTERNAL>
<INTERNAL>

Description
Specifies the administrative distance for eBGP routes. Range: 1 to 255. Default: 20.
Specifies the administrative distance for iBGP routes. Range: 1 to 255. Default: 200.

Example

switch(config-bgp-ipv4-uc)# distance bgp 100 150 switch(config-bgp-ipv4-uc)# no distance bgp 100 150

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

321

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc

Authority
Administrators or local user group members with execution rights for this command.

maximum-paths
maximum-paths <MAXPATHS> no maximum-paths <MAXPATHS>
Description
Configures the maximum number of paths that BGP adds to the route table for equal-cost multipath (ECMP) load balancing for routes learned from both internal and external BGP. Any changes in BGP configuration are applied by restarting the current BGP sessions on the VRFs. On 8325 and 10000 switch series, a maximum-paths configuration is supported globally as well as for ipv4-unicast, ipv6-unicast and l2vpn-evpn address families. For 6300, 6400, 8100, 8360, 8320, 8400 and 9300 switch series, this configuration is supported globally and for l2vpn2-evpn address families. If address-family specific maximum-paths are configured, they take precedence over global configuration. Greater than eight maximum-paths at can be configured within the global context, but for l2vpn-evpn routes the supported maximum limit is still eight. The no form of this command restores the default setting of 4.

Parameter <MAXPATHS>

Description
Specifies the maximum number of paths. 1 to 32 paths can be set globally. 1 to 8 paths can be set for an individual address family. The default is 4.

Usage
When both global and address-family maximum paths are configured then the address family value takes precedence.

Global max-path
Default( 4)
Configured (4)
Default (4)

l2evpn, ipv4-unicast,or ipv6unicast address-family Maxpath
Default (4)
configured (4)

Operational Max-path
4 4

8 (max)

8

Comments
-Four is the configured value for address family paths The address family value takes

BGP commands | 322

Global max-path
32 (max) Default (8)

l2evpn, ipv4-unicast,or ipv6unicast address-family Maxpath

Operational Max-path

8 (max)

8

configured (4)

4

Comments
precedence CLI configuration is limited to eight paths. Four is the configured value for address family paths

Examples
Configuring the maximum number of global paths:

switch(config)# router bgp 1 switch(config-bgp)# maximum-paths 32 All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)? y

Configuring the maximum-paths for the l2vpn-evpn address family:

switch(config-bgp)# address-family l2vpn evpn switch(config-bgp-l2vpn-evpn)# maximum-paths 6

Removing the global maximum paths setting:

switch(config-bgp)# no maximum-paths All current BGP sessions in VRF default will be restarted. Do you want to continue (y/n)? y

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.13.1000
10.10 10.07 or earlier
Command Information

Modification
On 8325 and 10000 switch series configuration is supported on ipv4-unicast, ipv6-unicast and l2vpn-evpn address families. For 6300, 6400, 8100, 8360, 8320, 8400 and 9300 switch series, this configuration is supported globally and for l2vpn2-evpn address families.
Increased upper limit of range of <MAXPATHS> parameter to 32.
--

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

323

Platforms
6300 6400

Command context
config-bgp config-bgp-l2vpn-evpn

Authority
Administrators or local user group members with execution rights for this command.

neighbor activate
neighbor <IP-ADDR> activate no neighbor <IP-ADDR> activate
Description
This command enables the address-family capability and exchange of information specific to an address family with a BGP neighbor. The no form of this command removes the address-family capability and disables the exchange of routes for the specified address-family with the BGP neighbor.

Parameter <IP-ADDR>

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.

Examples

switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 activate switch(config-bgp-ipv4-uc)# no neighbor 1.1.1.1 activate

switch(config-bgp-l2vpn-evpn)# neighbor 1.1.1.1 activate switch(config-bgp-l2vpn-evpn)# no neighbor 1.1.1.1 activate

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc config-bgp-l2vpn-evpn

Authority
Administrators or local user group members with execution rights for this command.

BGP commands | 324

neighbor advertisement-interval
neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} advertisement-interval <INTERVAL> no neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} advertisement-interval
Description
Sets the advertisement interval, which defines the length of time between transmission of BGP routing updates. The no form of this command restores the default value. Default values are 30 seconds for external BGP peer and 5 seconds for internal BGP peer.

Parameter <IP-ADDR>
<PEER-GROUP-NAME> <INTERVAL>

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies a Peer-Group.
Specifies the advertisement interval in seconds. Range: 0 to 600. Default: 30 for external BGP peer and 5 for internal BGP peer.

Examples

switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 advertisement-interval 20 switch(config-bgp-ipv4-uc)# no neighbor 1.1.1.1 advertisement-interval

switch(config-bgp-ipv4-uc)# neighbor pg advertisement-interval 50 switch(config-bgp-ipv4-uc)# no neighbor pg advertisement-interval

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc

Authority
Administrators or local user group members with execution rights for this command.

neighbor add-paths
neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} add-paths {send | recv | both} no neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} add-paths {send | recv | both}

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

325

Description
Enables additional path capability for BGP as described in RFC 7911. This allows BGP peer to send, receive, or send and receive multiple paths for the same address prefix without the subsequent advertisements implicitly replacing any previous paths. The additional path includes the first (N-1) best paths, which means that the total paths for an address prefix received by a BGP speaker will include the best path and the additional paths determined by its BGP peer.
With additional path feature, each path is identified by a path identifier in addition to the address prefix. To use this command, the backup path of BGP next-hop must be different than the primary path.
The no form of this command disables the additional path feature.

Parameter <IP-ADDR> <PEER-GROUP-NAME> add-paths {send | recv | both}

Description
Specifies an IP address.
Specifies a peer group.
Configures the additional paths in one of the following ways: send--Enables the neighbor to send the additional paths. recv--Enables the neighbor to receive the additional paths. both--Enables the neighbor to send and receive the additional paths.

Examples
Enabling BGP neighbor to send the additional paths:

switch(config)# router bgp 100 switch(config-bgp)# address-family ipv4 unicast switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 add-paths send

Disabling BGP neighbor to send the additional paths:

switch(config)# router bgp 100 switch(config-bgp)# address-family ipv4 unicast switch(config-bgp-ipv4-uc)# no neighbor 1.1.1.1 add-paths send

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc

Authority
Administrators or local user group members with execution rights for this command.

BGP commands | 326

neighbor add-paths advertise-best
neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} add-paths advertise-best <2-4> no neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} add-paths advertise-best <2-4>
Description
Controls the number of best BGP Paths to be advertised by a BGP speaker to a BGP peer. When enabled, it allows BGP speaker to advertise more than one best paths for the same address prefix. The total paths for an address prefix will include the best path and the additional paths. The no form of this command removes the advertise best path configuration.

Parameter <IP-ADDR> <PEER-GROUP-NAME> advertise-best <2-4>

Description
Specifies an IP address.
Specifies a peer group.
Specifies the number of best BGP paths to be advertised to a BGP Peer. Range: 2 to 4. Default: 2.

Examples
Setting the number of best paths to send to the neighbor:

switch(config)# router bgp 100 switch(config-bgp)# address-family ipv4 unicast switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 add-paths advertise-best 3

Removing the advertise best path configuration:

switch(config)# router bgp 100 switch(config-bgp)# address-family ipv4 unicast switch(config-bgp-ipv4-uc)# no neighbor 1.1.1.1 add-paths advertise-best 3

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc

Authority
Administrators or local user group members with execution rights for this command.

neighbor allowas-in

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

327

neighbor {<IP-ADDRESS> |<LIMIT> no neighbor {<IP-ADDRESS> |<LIMIT>
Description
Specifies the number of times that the AS path of a received route can contain the AS number of the recipient BGP speaker and still be accepted. When this configuration is applied to a peer-group, all the neighbors that are part of the peer-group inherit this setting. The no form of this command restores the default setting, which is to reject as a loop any route where the path contains the speaker AS number.

Parameter <IP-ADDRESS>

Description
Specifies the neighbor IP address in the IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or in the IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
NOTE: IPv6 MP-BGP peering must not be used for L2VPN EVPN address family, because VXLAN tunnel interface does not support IPv6 addresses.

<PEER-GROUP-NAME> <LIMIT>

Specifies a peer group.
Specifies the number of times that the AS path of a received route can contain the AS number of the recipient BGP. Range: 1 to 10.

Examples

switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 allowas-in 5 switch(config-bgp-ipv4-uc)# no neighbor 1.1.1.1 allowas-in

switch(config-bgp-ipv6-uc)# neighbor 2001:0db8:85a3::8a2e:0370:7334 allowas-in 5 switch(config-bgp-ipv6-uc)# no neighbor 2001:0db8:85a3::8a2e:0370:7334 allowas-in

switch(config-bgp-ipv4-uc)# neighbor PG allowas-in 5 switch(config-bgp-ipv4-uc)# no neighbor PG allowas-in

switch(config-bgp-l2vpn-evpn)# neighbor 1.1.1.1 allowas-in 5 switch(config-bgp-l2vpn-evpn)# no neighbor 1.1.1.1 allowas-in

switch(config-bgp-l2vpn-evpn)# neighbor PG allowas-in 5 switch(config-bgp-l2vpn-evpn)# no neighbor PG allowas-in

switch(config-bgp-l2vpn-evpn)# neighbor 2001:0db8:85a3::8a2e:0370:7334 allowas-in 5 switch(config-bgp-l2vpn-evpn)# no neighbor 2001:0db8:85a3::8a2e:0370:7334 allowasin

BGP commands | 328

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc config-bgp-l2vpn-evpn

Authority
Administrators or local user group members with execution rights for this command.

neighbor ao
neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} ao <keychain-name> accept-ao-mismatch include-tcp-options no ...
Description
Enables TCP Authentication Option (TCP-AO) authentication on a TCP connection between two BGP neighbors. To disable this function, use the no form of this command.

Parameter <IP-ADDRESS> <PEER-GROUP-NAME> <keychain-name>
accept-ao-mismatch include-tcp-options

Description
Specifies an IP address.
Specifies a peer group.
Name of the keychain for the neighbor. The keychain allows keys to be configured with different valid lifetimes. This mechanism provides a way for a set of keys to be rotated and hence protect against long-lived-key attacks. At any given time only one key is selected as active-key and keys are valid for a duration of the defined send-lifetime. If the send-lifetime and the accept-lifetimes are not configured for the key, the key is considered to be valid for infinite lifetime. When multiple keys are configured, its recommended that keys overlap in their send-lifetimes so that the key rollover occurs at the start of the next key's send-lifetime. This allows for a continuous key usage by TCP-AO.
Accept incoming TCP segments without TCP-AO option. If enabled, the device will accept a connection from the peer even if the received TCP packets do not contain the TCP-AO option.
Include the TCP header options for MAC calculation. Note that enabling this setting will immediately reset the neighbor session.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

329

Parameter no ...

Description This setting is disabled by default. Negates any configured parameter.

Usage
TCP-AO authentication can not be used with the neighbor password feature. When TCP-AO is applied to a peer-group, all the neighbors in peer-group will inherit the peer-group configuration unless there is a configuration specific to an individual neighbor. If a peer-group is configured with the neighbor password feature but the neighbors that belong to that peer-group are configured with TCP-AO, the TCP-AO configuration will be rejected. Similarly, If a peer-group is configured to use TCP-AO authentication, the neighbors that belong to that peer-group will reject the neighbor password. The neighbor connection must be reset using the clear ip bgp command for the TCP-AO configuration to take effect. The TCP-AO feature takes a keychain as a parameter. The key will not be valid until a Recv-D, Send-ID, and send lifetime is configured. The supported cryptographic algorithms for TCP-AO are:
n HMAC-SHA-1-96 based on [RFC2104] and [FIPS-180-3] n AES-128-CMAC-96 based on [NIST-SP800-38B][FIPS197]
Examples

switch(config)# keychain bgpkeys switch(config-keychain)# key 1 switch(config-keychain-key)# send-lifetime start-time 10:10:10 10/25/2022 duration infinite switch(config-keychain-key)# accept-lifetime start-time 10:10:10 10/25/2022 duration infinite switch(config-keychain-key)# send-id 10 switch(config-keychain-key)# recv-id 10 switch(config-keychain-key)# cryptographic-algorithm aes-cmac-128 switch(config-keychain-key)# key-string plaintext qwer switch(config)# router bgp 1 switch(config-bgp)# neighbor 1.1.1.1 ao bgpkeys switch(config-bgp)# no neighbor 1.1.1.1 ao accept-ao-mismatch switch(config-bgp)# no neighbor 1.1.1.1 ao include-tcp-option

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.11 or earlier
Command Information

Modification --

BGP commands | 330

Platforms
6300 6400

Command context config-bgp

Authority
Administrators or local user group members with execution rights for this command.

neighbor capability orf prefix-list
neighbor <IP-ADDRESS> capability orf prefix-list {send | receive | both} no neighbor <IP-ADDRESS> capability orf prefix-list {send | receive | both}
Description
Enables the Outbound Route filtering (ORF) capability with the neighbor in one of the three available modes. The available modes are send, receive, and both. The ORF capability is executed based on prefix list only. The Outbound Route Filtering (ORF) capability provides a mechanism for a BGP speaker to send a set of Outbound Route Filters (ORFs) that can be used by its BGP peer to filter its outbound routing updates to the speaker. This is a filtering method used to reduce the computation on the router receiving the route. The no form of this command disables the ORF capability.

Parameter
<IP-ADDRESS>
capability orf prefix-list {send | receive | both}

Description
Specifies an IP address.
Enables ORF prefix list capability with the neighbor in one of the following modes: n send - Enables the ORF prefix list capability in send mode. n receive - Enables the ORF prefix list capability in receive mode. n both- Enables the ORF prefix list capability in both send and
receive mode.

Examples
Enabling the ORF prefix list capability in both send and receive mode:

switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 capability orf prefix-list both

Enabling the ORF prefix list capability in send mode:

switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 capability orf prefix-list send

Disabling the ORF prefix list capability in both send and receive mode: :

switch(config-bgp-ipv4-uc)# no neighbor 1.1.1.1 capability orf prefix-list both

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

331

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc

Authority
Administrators or local user group members with execution rights for this command.

neighbor default-originate
neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} default-originate [route-map <MAP-NAME>] no neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} default-originate [route-map <MAP-NAME>]
Description
Enables the local router to send the default route 0.0.0.0 to a neighbor. The neighbor can then use this route to reach the router when all other routes are unavailable. Use the route-map option to configure the route map to modify the default route attributes. The no form of this command disables this feature.

Parameter <IP-ADDR>
<PEER-GROUP-NAME> <MAP-NAME>

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies a peer group.
Sets the route map to modify the default route attributes.

Examples

switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 default-orginate switch(config-bgp-ipv4-uc)# no neighbor 1.1.1.1 default-originate

switch(config-bgp-ipv4-uc)# neighbor PG default-originate switch(config-bgp-ipv4-uc)# no neighbor PG default-originate

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

BGP commands | 332

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc

Authority
Administrators or local user group members with execution rights for this command.

neighbor ebgp-multihop
neighbor {<IP-ADDR> | <PEER-GROUP-NAME>} ebgp-multihop <HOP-COUNT> no neighbor {<IP-ADDRESS> |<HOP-COUNT>
Description
Enables BGP to establish a session with external peers residing on networks that are not directly connected. By default, BGP can only establish sessions with external BGP peers that are directly connected. The neighbor connection must be reset using clear bgp to allow this configuration to take effect. The no form of this command disables the peer ebgp-multihop feature.

Parameter <IP-ADDR> <PEER-GROUP-NAME> ebgp-multihop <HOP-COUNT>

Description Specifies an IP address. Specifies a peer group. Specifies the maximum number of hops to reach the peer.

Examples
Enabling BGP to establish connection with external peers residing on networks that are not directly connected:

switch(config-bgp)# neighbor 1.1.1.1 ebgp-multihop 5 switch(config-bgp)# no neighbor 1.1.1.1 ebgp-multihop

Disabling BGP to establish connection with external peers residing on networks that are not directly connected:

switch(config-bgp)# neighbor pg ebgp-multihop 5 switch(config-bgp)# no neighbor pg ebgp-multihop

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

333

Command Information

Platforms
6300 6400

Command context config-bgp

Authority
Administrators or local user group members with execution rights for this command.

neighbor fall-over
neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} fall-over no neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} fall-over
Description
Enables BGP fast peering session deactivation. When neighbor fall-over is configured, the BGP process monitors the RIB and if the route to peer is not present in the routing table, it immediately deactivates the peer session without waiting for the hold down timer. It is disabled by default. The no form of this command disables this feature.

Parameter <IP-ADDR> <PEER-GROUP-NAME>

Description Specifies an IP address. Specifies a peer group.

Usage
Neighbor fall-over does not track connected or static routes to peers. However, this is not an issue when IBGP peering is using a loopback interface. To force a fall-over for connected and static routes, use the command neighbor fall-over bfd.
Examples

switch(config-bgp)# neighbor 1.1.1.1 fall-over switch(config-bgp)# no neighbor 1.1.1.1 fall-over

switch(config-bgp)# neighbor PG fall-over switch(config-bgp)# no neighbor PG fall-over

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

BGP commands | 334

Platforms
6300 6400

Command context config-bgp

Authority
Administrators or local user group members with execution rights for this command.

neighbor fall-over bfd
neighbor {<IPV4-ADDR>|<IPV6-ADDR>|<PEER-GROUP-NAME>} fall-over bfd no neighbor {<IPV4-ADDR>|<IPV6-ADDR>|<PEER-GROUP-NAME>} fall-over bfd
Description
Enables BGP to register with BFD to receive fast peering session deactivation messages from BFD. You can either configure BFD support for BGP per neighbor or peer-group. The no form of this command disables BGP for BFD.
Multihop BFD is not supported for BGP.

Parameter <IPV4-ADDR> <IPV6-ADDR>
<PEER-GROUP-NAME>

Description
Specifies the neighbor address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the neighbor address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. This parameter applies only to 6300 and 6400 switch series.
Specifies a peer group.

Examples
Enabling BFD for BGP neighbor with IPv4 address:

switch(config-bgp)# neighbor 1.1.1.1 fall-over bfd

Enabling BFD for BGP neighbor with IPv6 address (applies only to 6300 and 6400 switch series):

switch(config-bgp)# neighbor 1000::1 fall-over bfd

Enabling BFD for peer group:

switch(config-bgp)# neighbor PG fall-over bfd

Disabling BFD for BGP per neighbor IPv4 address:

switch(config-bgp)# neighbor 1.1.1.1 fall-over bfd

Disabling BFD for BGP per neighbor with IPv6 address (applies only to 6300 and 6400 switch series):

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

335

switch(config-bgp)# no neighbor 1000::1 fall-over bfd Disabling BFD for peer group:
switch(config-bgp)# no neighbor PG fall-over bfd

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor graceful-shutdown
neighbor {<IP-ADDR> | <PEER-GROUP-NAME>} graceful-shutdown [ local-preference <LOCAL-PREF> | <CONFIG-DELAY> |<LOCAL-PREF> ]
no neighbor {<IP-ADDR> | <PEER-GROUP-NAME>} graceful-shutdown [ local-preference <LOCAL-PREF> | <CONFIG-DELAY> |<LOCAL-PREF> ]
Description
Configures the wait time before shutting down the BGP neighbor session, and can also configure the local preference value to be advertised before graceful shutdown. The no form of this command sets the wait time to the default value of 180 seconds and the localpreference value to the default of 0.

Parameter <IP-ADDR>
<PEER-GROUP-NAME> local-preference<LOCAL-PREF>

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies a peer group.
Specifies the local preference value for exporting the iBGP routes

BGP commands | 336

Parameter <CONFIG-DELAY>

Description
during a graceful shutdown. The lower the value, the lower the local preference. A value of 0 indicates that the route is the least preferred. Range: 0 to 4294967295. Default: 0.
Specifies the time to wait before shutting down the neighbor in seconds. Range: 10 to 1200. Default: 180.

Usage
If the graceful shutdown timer has already started and the administrator configures a command that triggers a session restart, traffic loss can occur if the graceful shutdown delay is not sufficient for the BGP peers to converge to a new route.

On each Autonomous System Boundary Router (ASBR) supporting the graceful shutdown receiver procedure, an inbound BGP route policy must be applied on all EBGP sessions of the ASBR.
The policy must match the GSHUT community and lower the precedence of the route by changing the route attributes.

The Graceful-Shutdown feature does not work for reflected routes because the route reflector (RR) does not modify local-preference attribute. The routes, originated by the RR, carry the GSHUT localpreference value. As per the RFC 4456, when an RR reflects a route, it should not modify the following path attributes:
n NEXT-HOP n AS-PATH n LOCAL-PREF n MED
Their modification could potentially result in routing loops. In this situation, apply on the RR an inbound BGP route policy, meeting the following conditions:
n Match the graceful-shutdown community. n Set the local preference attributes of the paths tagged with the graceful-shutdown community to a
lower value than other routes to the same destination.
Examples
Setting the wait time delay:

switch(config-bgp)# neighbor 1.1.1.1 graceful-shutdown 10

Setting the local-preference value:

switch(config-bgp)# neighbor 1.1.1.1 graceful-shutdown local-preference 100

Setting the wait time delay and local-preference value:

switch(config-bgp)# neighbor 1.1.1.1 graceful-shutdown 10 local-preference 100

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

337

Setting the wait time delay to the default of 180 seconds: switch(config-bgp)# no neighbor 1.1.1.1 graceful-shutdown 10
Setting the local-preference value to default of 0: switch(config-bgp)# no neighbor 1.1.1.1 graceful-shutdown local-preference 100
Setting the wait time delay and local-preference value to defaults: switch(config-bgp)# no neighbor 1.1.1.1 graceful-shutdown 10 local-preference 100
Complete deletion: switch(config-bgp)# no neighbor 1.1.1.1 graceful-shutdown

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor listen ip-range
neighbor <PEER-GROUP-NAME> listen ip-range <IP-ADDR>/<MASK> {as-range <AS-RANGE> | limit <LIMIT>} no neighbor <PEER-GROUP-NAME> listen ip-range <IP-ADDR>/<MASK> {as-range <AS-RANGE> | limit <LIMIT>}
Description
Configures BGP dynamic neighbors as ranges of remote addresses with associated peer groups. The no form of this command restores default behavior.
n Each range of remote addresses is configured as a remote address prefix. n Any BGP peer with a remote address that matches the remote address prefix becomes a member of the
associated peer group.

BGP commands | 338

Parameter <PEER-GROUP-NAME> <IP-ADDR>/<MASK> <AS-RANGE> <LIMIT>

Description Specifies peer group. Specifies subnet range. Specifies AS number as a range in integer or dotted format. Specifies maximum number of peers. Range: 1 to 256.

Restrictions
n Dynamic peers are always passive. Outbound connections to dynamic peers are not supported. n Dynamic BGP peering is only compatible with peer-groups n Disabling partial AS range is not supported. The exact value that is configured must be used.
o When disabling AS range, CLI must use the same AS range that was used when first configured. For example, if AS range "1-4" is configured, when disabling, "1-4" must be used ("1,2,3,4" is not supported).

Configuring overlapping peer ranges with different remote address prefix lengths is not recommended. Peer range configuration is recommended when peer ranges do not overlap.

Usage
n All supported address-families are activated on a dynamic peer for negotiation by default.
n If an incoming connection matches multiple peer range entries, the entry with the longest remote address prefix is selected.
n AS ranges are used to match remote AS presented by connecting peers. Remote AS matching with ASes or AS ranges in this list will be accepted.
o AS range only applies to dynamic peers.
n The limit option is used to set the maximum number of dynamic BGP peers within the peer range. The default is 512 if no limit is set.
o If the limit is reached, BGP rejects incoming connections from new dynamic BGP peers until BGP session termination causes the number of dynamic BGP peers to fall below the limit.
o If the limit is reduced below the current number of dynamic BGP peers, BGP will reject incoming connections from new dynamic BGP peers until the number of dynamic BGP peers falls below the new limit. BGP will not terminate existing BGP sessions with dynamic BGP peers in this case. If an existing BGP session gets terminated, that session will not re-establish until the number of BGP sessions falls below the limit.
n After dynamic peer is configured, additional configuration is required on the peer-group as a whole. Individual member groups are incompatible. For example, the neighbor shutdown command can be executed on a peer-group, but not on individual members of the peer-group.
n When a peer is configured as dynamic and is in an established state, a shutdown is required before reconfiguring as static.
n Connect-retry interval is recommended to be configured with a smaller value than the default value on the active peer.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

339

n When a set of valid and invalid AS values are issued (separated by commas), only the valid values are accepted.
n When the AS range parameter is not explicitly configured in dynamic bgp peering, iBGP session comes up, eBGP session does not. If there are no configured remote AS or AS list entries, DC-BGP assumes that any peer is an iBGP peer.
Examples
switch(config-bgp)# neighbor pg listen ip-range 192.168.0.0/16

switch(config-bgp)# no neighbor pg listen ip-range 192.168.0.0/16

Command History
Release 10.11

Modification Command introduced

Command Information

Platforms
6300 6400

Command context config-bgp

Authority
Administrators or local user group members with execution rights for this command.

neighbor local-as
neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} local-as <AS-NUMBER> no neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} local-as
Description
Configures an alternate local AS number that can be used to establish a session with a peer, allowing a router to appear to be a member of a second autonomous system (AS), and its real AS. Local AS allows two autonomous systems to merge without modifying peering arrangements. This command is valid only for external peers. The no form of this command restores the default, which is for a peering session to be established using the primary AS (primary AS is the AS number specified at the time of neighbor creation using the command neighbor remote-as).

Parameter <IP-ADDR> <PEER-GROUP-NAME> local-as <AS-NUMBER>

Description
Specifies an IP address.
Specifies a peer group.
Specifies a 4-byte AS number in asplain format (z), or asdot format (x.y), where z is a number from 1 to 4294967295 and x and y are 16-bit numbers.

Examples

BGP commands | 340

switch(config-bgp)# neighbor 1.1.1.1 local-as 200 switch(config-bgp)# no neighbor 1.1.1.1 local-as
switch(config-bgp)# neighbor pg local-as 200 switch(config-bgp)# no neighbor pg local-as

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor maximum-prefix
neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} maximum-prefix <MAXIMUM> [threshold <THRESHOLD>] [restart <INTERVAL>] [warning-only]
no neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} maximum-prefix
Description
Sets the maximum number of prefixes that can be received from a neighbor. By default, the device accepts 128,000 prefixes from a BGP neighbor with a threshold value of 75%. A warning message is generated when the number of prefixes per neighbor reaches 75% of default prefix limit. Another warning message is generated when the default prefix limit is reached. The session is re-established only if the number of routes received from the BGP peer does not exceed the configured prefix limit. When the restart timer is configured, sessions are automatically reestablished when the timer expires. The no form of this command disables the maximum number of prefixes limit.

Parameter <IP-ADDRESS>
<PEER-GROUP-NAME> maximum-prefix <MAXIMUM>

Description
Specifies the IP address of the neighbor in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies a Peer-Group.
Specifies the maximum number of prefixes allowed from the

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

341

Parameter threshold <THRESHOLD>
restart <INTERVAL> warning-only

Description
specified neighbor. Range: 1 to 128000. Default: 128000.
Specifies at what percentage of MAXIMUM a warning message is generated. Range: 1 to 100. Default: 75. For example, if MAXIMUM is set to 1000 and threshold is 70, the router generates a warning message when the number of BGP learned routes from the neighbor exceeds 70 percent of 1000 (700) routes.
Specifies interval in seconds for restarting the BGP connection when the prefix limit is exceeded. Range: 30 to 65535.
Specifies generating and logging a warning message without disconnecting the BGP session when the prefix limit is exceeded.

Examples
Setting the prefix limit to 1000 prefixes:

switch(config-bgp-ipv4-uc)# neighbor 10.0.0.1 maximum-prefix 1000

Enabling logging of a warning message when more than 1000 prefixes are received:

switch(config-bgp-ipv4-uc)# neighbor 10.0.0.1 maximum-prefix 1000 warning-only

Setting the prefix limit to 1000 prefixes and enabling logging of a warning message when 500 prefixes are received:

switch(config-bgp-ipv4-uc)# neighbor 10.0.0.1 maximum-prefix 1000 threshold 50

Setting the prefix limit to 1000 prefixes and enabling logging of a warning message when 500 prefixes are received and a second warning when the prefix limit is exceeded without disconnecting the session:

switch(config-bgp-ipv4-uc)# neighbor 10.0.0.1 maximum-prefix 1000 threshold 50 warning-only

Removing the threshold value:

switch(config-bgp-ipv4-uc)# no neighbor 10.0.0.1 maximum-prefix 1000 threshold 50

Disabling the maximum-prefix feature:

switch(config-bgp-ipv4-uc)# no neighbor 10.0.0.1 maximum-prefix

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

BGP commands | 342

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc

Authority
Administrators or local user group members with execution rights for this command.

neighbor next-hop-self
neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} next-hop-self no neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} next-hop-self
Description
Configures the router as the next hop for a BGP-speaking neighbor or peer group, and enables BGP to send itself as the next hop for advertised routes. The no form of this command resets the peer next-hop-self status to default. The next hop is generated based on the IP.

Parameter <IP-ADDR>
<PEER-GROUP-NAME> all

Description
Specifies the neighbor's IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies a peer group.
Applies the configuration to all route-reflector clients.

Usage
n An administrator uses this command to make a BGP speaker fill its address when advertising routes to a BGP peer.
n This command is useful in non-meshed networks where BGP neighbors may not have direct access to all other neighbors on the same IP subnet.
n While advertising routes to eBGP peers, the next-hop is set to self IP by default. The default behavior can be changed by configuring next-hop-unchanged.
n While advertising routes to iBGP peers, the next-hop is kept unchanged by default. The default behavior can be changed by configuring next-hop-self.
Examples
Setting and resetting the router as the next hop self for neighbor 1.1.1.1:

switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 next-hop-self switch(config-bgp-ipv4-uc)# no neighbor 1.1.1.1 next-hop-self

Setting and resetting the router as the next hop self for its peer group:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

343

switch(config-bgp-ipv4-uc)# neighbor pg next-hop-self switch(config-bgp-ipv4-uc)# no neighbor pg next-hop-self

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor next-hop-unchanged
neighbor <IP-ADDRESS> next-hop-unchanged no neighbor <IP-ADDRESS> next-hop-unchanged
Description
Enables the neighbor to preserve next-hop while advertising routes to eBGP peers, in the L2VPN EVPN address-family. The no form of this command resets the peer next-hop-unchanged status to default.

Parameter <IP-ADDRESS>

Description
Specifies the neighbor IP address in the IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or in the IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
NOTE: IPv6 MP-BGP peering must not be used for L2VPN EVPN address family, because VXLAN tunnel interface does not support IPv6 addresses.

Examples
switch(config-bgp-l2vpn-evpn)# neighbor 1.1.1.1 next-hop-unchanged

switch(config-bgp-l2vpn-evpn)# neighbor 2001:0db8:85a3::8a2e:0370:7334 next-hopunchanged

BGP commands | 344

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-bgp-l2vpn-evpn

Authority
Administrators or local user group members with execution rights for this command.

neighbor orf prefix-list in
neighbor <IP-ADDRESS> orf-prefix-list <PREFIX-LIST-NAME> in no neighbor <IP-ADDRESS> orf-prefix-list <PREFIX-LIST-NAME> in
Description
Applies an inbound prefix list filter to filter the distribution of BGP neighbor information. The no form of this command restores the default behavior of not applying the prefix list filter.
This command must be used only along with the ORF capability to take effect.

Parameter <IP-ADDRESS> orf-prefix-list PREFIX-LIST-NAME>

Description Specifies an IP address. Sends the prefix list name to be filtered.

Usage
To use this command, the following conditions must be met:
n If route-map inbound is also applied on multiple neighbors along with ORF, then the route-map name must be common on all the neighbors.
n If route-map inbound is also applied on an IPv6 AF BGP neighbor, then the route-map sequence number with value 1 cannot be used.
Examples
Applying the inbound prefix list filter:

switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 orf-prefix-list ABC in

Removing the inbound prefix list filter:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

345

switch(config-bgp-ipv4-uc)# no neighbor 1.1.1.1 orf-prefix-list ABC in

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc

Authority
Administrators or local user group members with execution rights for this command.

neighbor passive
neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} passive no neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} passive
Description
Configures a specific neighbor, or all neighbors in a peer-group, as passive, which means that they will not initiate the TCP session. The neighbor connection must be reset using clear ip bgp for this setting to take effect. The no form of this command enables the neighbor to initiate the TCP session.

Parameter <IP-ADDRESS> <PEER-GROUP-NAME>

Description Specifies an IP address. Specifies a peer group.

Examples

switch(config-bgp)# neighbor 1.1.1.1 passive switch(config-bgp)# no neighbor 1.1.1.1 passive

switch(config-bgp)# neighbor pg passive switch(config-bgp)# no neighbor pg passive

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

BGP commands | 346

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor password
neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} password [{ciphertext | plaintext} <PASSWORD>]
no neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} password [ciphertext <PASSWORD>]
Description
Enables message digest5 (MD5) authentication on a TCP connection between two BGP neighbors. When the password is applied to a peer-group, all the neighbors that are part of peer-group inherit the configured setting. The neighbor connection must be reset using clear ip bgp <NEIGHBOR-IP-ADDR> to allow this configuration to take effect. The no form of this command removes the neighbor password.

Parameter <IP-ADDR> <PEER-GROUP-NAME> {ciphertext | plaintext} <PASSWORD>

Description Specifies an IP address. Specifies a Peer-Group. Selects the password format. Specifies the password.

When the password is not provided on the command line, plaintext password prompting occurs upon pressing Enter. The entered password characters are masked with asterisks.
Examples
Enabling message digest5 (MD5) authentication for a neighbor with a provided plaintext password: switch(config-bgp)# neighbor 1.1.1.1 password plaintext doubt_Plane#93
Enabling message digest5 (MD5) authentication for a neighbor with a prompted plaintext password: switch(config-bgp)# neighbor 1.1.1.5 password

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

347

Enter the neighbor password: ************* Re-Enter the neighbor password: ************* Enabling message digest5 (MD5) authentication for a peer group with a provided plaintext password: switch(config-bgp)# neighbor pg_3 password plaintext doubt_Plane#93 Disabling message digest5 (MD5) authentication for a neighbor: switch(config-bgp)# no neighbor 1.1.1.5 password Disabling message digest5 (MD5) authentication for a peer group: switch(config-bgp)# no neighbor pg_3 password

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor port
neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} port <NUMBER> no neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} port
Description
Sets a custom TCP port on which to communicate with the BGP neighbor. When this configuration is applied for peer-group, all the neighbors that are part of peer-group will inherit this setting. Though the neighbor inherits the configuration from the peer-group, the neighborspecific command, if configured, takes precedence. This setting only takes effect after a hard reset of the session. The no form of this command allows a random TCP port to be selected for the communication with the BGP neighbor.

BGP commands | 348

Parameter <IP-ADDRESS> <PEER-GROUP-NAME> port <NUMBER>

Description Specifies an IP address. Specifies a peer group. Specifies a TCP port number. Range: 0 to 65535.

Examples

switch(config-bgp)# neighbor 1.1.1.1 port 1500 switch(config-bgp)# no neighbor 1.1.1.1 port

switch(config-bgp)# neighbor PG port 1500 switch(config-bgp)# no neighbor PG port

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor remote-as
neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} remote-as <AS-NUMBER> no neighbor {<IP-ADDR>|<PEER-GROUP-NAME>} remote-as <AS-NUMBER>
Description
Creates a peer, initiates the connection to the peer, and adds an entry to the BGP neighbor table. Specifies a neighbor with an autonomous system (AS) number that identifies the neighbor as internal to the local autonomous system. Otherwise, the neighbor is considered as external. By default, neighbors that are defined using this command, exchange only unicast address prefixes. The no form of this command disables the peer session and deletes the peer information.

Parameter <IP-ADDR>

Description Speciies an IP address.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

349

Parameter <PEER-GROUP-NAME> remote-as <AS-NUMBER>

Description
Specifies a peer group.
Specifies a 4-byte AS number in asplain format (z), or asdot format (x.y), where z is a number from 1 to 4294967295 and x and y are 16-bit numbers in the range 0 to 65535.

Usage
The configured peer AS number is compared with the AS number received in the open message and a peer session is initiated only if both the AS numbers match.
Examples

switch(config-bgp)# neighbor 1.1.1.1 remote-as 1 switch(config-bgp)# no neighbor 1.1.1.1 remote-as 1

switch(config-bgp)# neighbor pg remote-as 1 switch(config-bgp)# no neighbor pg remote-as 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor remove-private-AS
neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} remove-private-AS no neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} remove-private-AS
Description
This command forces the BGP neighbor to drop the private AS numbers. When the outbound update contains a sequence of private AS numbers, this sequence is dropped. If the command is configured for peer-group, then all the neighbors that are part of peer-group will remove the private-AS before sending the BGP update message. The no form of this command allows the private-AS number to be carried in BGP update message. The neighbor connection must be reset using clear ip bgp neighbor-ip-address to allow this configuration to take effect.

BGP commands | 350

Parameter <IP-ADDRESS> <PEER-GROUP-NAME>

Description Specifies an IP address. Specifies a peer group.

Examples

switch(config-bgp)# neighbor 1.1.1.1 remove-private-AS switch(config-bgp)# no neighbor 1.1.1.1 remove-private-AS

switch(config-bgp)# neighbor PG remove-private-AS switch(config-bgp)# no neighbor PG remove-private-AS

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor route-map
neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} route-map <MAP-NAME> {in|out} no neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} route-map <MAP-NAME> {in|out}
Description
This command applies a route map to incoming or outgoing routes. It configures the route map for modifying the default attributes of the route.
When both peer group and neighbor configuration have route maps associated, then the following configuration applies:
n For outbound route maps, peer group configuration will override the configuration of the neighbor. n For inbound route maps, neighbor configuration will override the peer group configuration.
The no form of this command removes a route map.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

351

Parameter <IP-ADDRESS> <PEER-GROUP-NAME> <MAP-NAME> in|out

Description
Specifies an IP address.
Specifies a peer group.
Specifies the name of the route map.
Sets the route map policy to apply to either the received routes from the neighbor (in) or the advertised routes to the neighbor (out).

Examples

switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 route-map HPE in switch(config-bgp-ipv4-uc)# no neighbor 1.1.1.1 route-map HPE in

switch(config-bgp-ipv4-uc)# neighbor PG route-map HPE in switch(config-bgp-ipv4-uc)# no neighbor PG route-map HPE in

switch(config)# route-map Rmap permit seq 10 switch(config-route-map-Rmap-10)# match metric 100 switch(config-route-map-bgp-10)# router bgp 100 switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 remote-as 100 switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 route-map Rmap out
Configuring inbound route maps in L2VPN EVPN address family.
switch(config)# router bgp 100 switch(config-bgp)# neighbor 2.1.1.1 remote-as 100 switch(config-bgp)# neighbor 2.1.1.1 update-source loopback 1 switch(config-bgp)# address-family l2vpn evpn switch(config-bgp-l2vpn-evpn)# neighbor 2.1.1.1 activate switch(config-bgp-l2vpn-evpn)# neighbor 2.1.1.1 route-map Rmap in switch(config-bgp-l2vpn-evpn)# neighbor 2.1.1.1 send-community extended

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms 6300

Command context config-bgp-ipv4-uc

Authority Administrators or local user group members with execution

BGP commands | 352

Platforms 6400

Command context
config-bgp-ipv6-uc config-bgp-l2vpn-evpn

Authority rights for this command.

neighbor route-reflector-client
neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} route-reflector-client no neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} route-reflector-client
Description
This command configures the router as a BGP route reflector and the specified peer as its client. The no form of this command disables this function.

Parameter <IP-ADDRESS>

Description
Specifies the neighbor IP address in the IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or in the IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
NOTE: Pv6 MP-BGP peering must not be used for L2VPN EVPN address family, because VXLAN tunnel interface does not support IPv6 addresses.

<PEER-GROUP-NAME>

Specifies a peer group.

Examples

switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 route-reflector-client switch(config-bgp-ipv4-uc)# no neighbor 1.1.1.1 route-reflector-client

switch(config-bgp-ipv4-uc)# neighbor PG route-reflector-client switch(config-bgp-ipv4-uc)# no neighbor PG route-reflector-client

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms 6300

Command context config-bgp-ipv4-uc

Authority Administrators or local user group members with execution

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

353

Platforms 6400

Command context
config-bgp-ipv6-uc config-bgp-l2vpn-evpn

Authority rights for this command.

neighbor send-community
neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} send-community [standard | extended] no neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} send-community [standard | extended]
Description
This command allows community values to be sent to a specific neighbor. When this command is configured for the peer-group, then all the neighbors that are part of peer-group will send the community values to the peers. The parameters standard and extended send only the respective community numbers. When the command is issued without either of these parameters, both standard and extended communities will be sent to the neighbor. The no form of this command will not allow the neighbor to send community values to the specific neighbors that are part of peer-group.

Parameter <IP-ADDRESS>

Description
Specifies the neighbor IP address in the IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or in the IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
NOTE: IPv6 MP-BGP peering must not be used for L2VPN EVPN address family, because VXLAN tunnel interface does not support IPv6 addresses.

<PEER-GROUP-NAME>

Specifies a peer group.

Examples

switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 send-community standard switch(config-bgp-ipv4-uc)# no neighbor 1.1.1.1 send-community standard

switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 send-community extended switch(config-bgp-ipv4-uc)# no neighbor 1.1.1.1 send-community

switch(config-bgp-ipv4-uc)# neighbor PG send-community standard switch(config-bgp-ipv4-uc)# no neighbor PG send-community standard

switch(config-bgp-ipv4-uc)# neighbor PG send-community extended switch(config-bgp-ipv4-uc)# no neighbor PG send-community

BGP commands | 354

switch(config-bgp-l2vpn-evpn)# neighbor 1.1.1.1 send-community standard switch(config-bgp-l2vpn-evpn)# no neighbor 1.1.1.1 send-community standard
switch(config-bgp-l2vpn-evpn)# neighbor 1.1.1.1 send-community extended switch(config-bgp-l2vpn-evpn)# no neighbor 1.1.1.1 send-community
switch(config-bgp-l2vpn-evpn)# neighbor PG send-community standard switch(config-bgp-l2vpn-evpn)# no neighbor PG send-community standard
switch(config-bgp-l2vpn-evpn)# neighbor PG send-community extended switch(config-bgp-l2vpn-evpn)# no neighbor PG send-community
switch(config-bgp-l2vpn-evpn)# neighbor 2001:0db8:85a3::8a2e:0370:7334 sendcommunity extended switch(config-bgp-l2vpn-evpn)# no neighbor 2001:0db8:85a3::8a2e:0370:7334 sendcommunity

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc

Authority
Administrators or local user group members with execution rights for this command.

neighbor shutdown
neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} shutdown no neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} shutdown
Description
This command disables the peer session, terminates any active session for the specified neighbor or peer group, and removes all associated routing information. This action can cause the sudden termination of many peering sessions. The no form of this command enables the peer session for the specified neighbor.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

355

Parameter <IP-ADDRESS> <PEER-GROUP-NAME>

Description Specifies an IP address. Specifies a peer group.

Usage
Sessions are gracefully shut down when graceful-shutdown is enabled. Enter the neighbor gracefulshutdown command to enable graceful-shutdown. If graceful-shutdown is configured without delay or local-preference, the default values are used.
Examples

switch(config-bgp)# neighbor 1.1.1.1 shutdown switch(config-bgp)# no neighbor 1.1.1.1 shutdown

switch(config-bgp)# neighbor pg shutdown switch(config-bgp)# no neighbor pg shutdown

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor slow-peer
neighbor {<IP-ADDR>|<IPV6-ADDR>} slow-peer no neighbor {<IPV4-ADDR>|<IPV6-ADDR>} slow-peer
Description
Slow peer configuration moves the peer from its normal update group to a slow update group. Removing slow peers allows the normal update group to function without being slowed down and enables faster convergence. Slow peer configuration is applicable only to explicitly configured BGP neighbors. All configured slow peers will be grouped into a slow update group. This group will converge based on the slowest group peer. Dynamic detection and splitting isn't supported. Peers can be statically configured as slow. The no form of this command removes the slow peer configuration.

BGP commands | 356

Parameter <IP-ADDR> <IPV6-ADDR>

Description Specifies a neighbor IP address. Specifies a neighbor IPv6 address.

Examples
Configuring a neighbor with an IP address of 1.1.1.1 as a slow peer:

switch(config-bgp)# neighbor 1.1.1.1 slow-peer

Removing the slow peer configuration for a neighbor with an IP address of 1.1.1.1:

switch(config-bgp)# no neighbor 1.1.1.1 slow-peer

Configuring a neighbor with an IPv6 address of 2001::2 as a slow peer:

switch(config-bgp)# neighbor 2001::2 slow-peer

Removing the slow peer configuration for a neighbor with an IPv6 address of 2001::2:

switch(config-bgp)# no neighbor 2001::2 slow-peer

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.13

Command Information

Platforms
6300 6400

Command context config-bgp

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

neighbor soft-reconfiguration inbound
neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} soft-reconfiguration inbound no neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} soft-reconfiguration inbound
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

357

This command enables you to generate inbound updates from a neighbor and change and activate BGP policies without clearing the BGP session. Changes in BGP policies require the BGP session to be cleared which can have a large negative impact on network operations.
The no form of this command disables this setting.

Parameter <IP-ADDRESS> <PEER-GROUP-NAME>

Description Specifies an IP address. Specifies a peer group.

Usage
n To perform inbound soft reconfiguration, the BGP speaker must store all received route updates, regardless of the current inbound policy.
n When inbound soft reconfiguration is enabled, the stored updates are processed by the new policy configuration to create new inbound updates.
Examples

switch(config-bgp-ipv4-uc)# neighbor 1.1.1.1 soft-reconfiguration inbound

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc

Authority
Administrators or local user group members with execution rights for this command.

neighbor timers
neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} timers <KEEPALIVE> <HOLDTIME> no neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} timers <KEEPALIVE> <HOLDTIME>
Description
This command sets the timers for a specific BGP neighbor or peer group. When the timer is applied to peer-group then all the neighbors that are part of peer-group will inherit the value configured. The neighbor connection must be reset using clear ip bgp <NEIGHBOR-IP-ADDRESS> to allow this configuration to take effect. The no form of this command clears the timers for a specific BGP neighbor or peer group.

BGP commands | 358

Parameter <IP-ADDRESS> <PEER-GROUP-NAME> <KEEPALIVE>
<HOLDTIME>

Description
Specifies an IP address.
Specifies a peer group.
Specifies the Keep-Alive timer value for the neighbor. Default: 60 seconds. Range: 0-65535.
Specifies the Hold-timer value. Default: 180 seconds. Range: 065535.

Examples

switch(config-bgp)# neighbor 1.1.1.1 timers 120 360 switch(config-bgp)# no neighbor 1.1.1.1 timers

switch(config-bgp)# neighbor pg timers 120 360 switch(config-bgp)# no neighbor pg timers

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor ttl-security-hops
neighbor {<IP-ADDRESS> | <PEER-GROUP-NAME>} ttl-security-hops <HOP-COUNT> no neighbor {<IP-ADDRESS> | <PEER-GROUP-NAME>} ttl-security-hops <HOP-COUNT>
Description
This command enables BGP to establish connection with external peers residing on networks that are not directly connected. By enabling this feature, the received TTL from a BGP peer is compared with the difference "255 - hop-count". BGP messages coming with a TTL less than this value are not accepted. BGP peering will not be established if the TTL in the session establishment is received with a lower value. Also, by enabling this feature the router will send BGP packets with TTL value of 255 to the neighbor. For a neighbor, either TTL security or ebgp-multihop can be configured, not both together. If there are multiple paths to reach the node, then the hop count should be configured considering the longest route.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

359

The no form of this command disables the peer ttl-security-hop feature.

Parameter <IP-ADDRESS> <PEER-GROUP-NAME> <HOP-COUNT>

Description
Specifies an IP address.
Specifies a peer group.
Specifies the hop count to reach the neighbor for the eBGP session. Range: 1-255.

Examples

switch(config-bgp)# neighbor 1.1.1.1 ttl-security-hops 10 switch(config-bgp)# no neighbor 1.1.1.1 ttl-security-hops

switch(config-bgp)# neighbor pg ttl-security-hops 5 switch(config-bgp)# no neighbor pg ttl-security-hops

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor update-source
neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} update-source {<IPv4>|<IPv6> | loopback <NUMBER>}
no neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} update-source [<IPv4>|<IPv6> | loopback <NUMBER>]
Description
This command specifies the source address to reach the neighbor. An iBGP connection can occur as long as there is a TCP/IP path between the routers. If multiple paths exist between the iBGP routers, using a loopback interface as the neighbor address can add stability to the network. With this command, stability can be achieved by providing the loopback interface address as the source address of the TCP/IP session. The no form of this command negates the route updates of the neighbor.

BGP commands | 360

Parameter <IP-ADDRESS> <PEER-GROUP-NAME> <IPV4> <IPV6> loopback <NUMBER>

Description Specifies an IP address. Specifies a peer group. Specifies an interface by IPv4 address. Specifies an interface by IPv6 address. Specifies a loopback interface number.

Examples

switch(config-bgp)# neighbor 1.1.1.1 update-source loopback 1 switch(config-bgp)# no neighbor 1.1.1.1 update-source

switch(config-bgp)# neighbor PG update-source loopback 1 switch(config-bgp)# no neighbor PG update-source

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor weight
neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} weight <WEIGHT-VALUE> no neighbor {<IP-ADDRESS>|<PEER-GROUP-NAME>} weight <WEIGHT-VALUE>
Description
This command assigns a weight to a neighbor connection. When the weight is applied to a peer-group then all the neighbors that are part of the peer-group will inherit the value configured. The no form of this command removes a weight assignment.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

361

Parameter <IP-ADDRESS> <PEER-GROUP-NAME> <WEIGHT-VALUE>

Description
Specifies an IP address.
Specifies a peer group.
Specifies the weigh to be associated with the routes received from the neighbor. Range: 0-65535.

Examples

switch(config-bgp)# neighbor 1.1.1.1 weight 500 switch(config-bgp)# no neighbor 1.1.1.1 weight

switch(config-bgp)# neighbor pg weight 600 switch(config-bgp)# no neighbor pg weight

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

network
network {[<IPV4/MASK> | <IPV6/MASK>]} [route-map <ROUTE-MAP-NAME>] no network {[<IPV4/MASK> | <IPV6/MASK>]} [route-map <ROUTE-MAP-NAME>]
Description
This command specifies the networks to be advertised by the Border Gateway Protocol (BGP) routing processes. The no form of this command removes an entry from the routing table.

Parameter <IPV4/MASK> <IPV6/MASK>

Description
Specifies the IPv4 network with mask. For example: 1.1.1.1/24
Specifies the IPv6 network with mask. For example: 2001:0db8:85a3::8a2e:0370:7334/24

BGP commands | 362

Parameter route-map <ROUTE-MAP-NAME>

Description
Optional parameter. Specifies a route map to apply to the prefixes advertised by this specific network statement.

Usage
n This command is used to advertise prefixes currently installed in the routing table into the BGP table. n Use the route-map keyword to apply the specified route map to network advertisements. The mask
length as configured in the network statement must match the mask length of prefixes in the routing table.
Examples

switch(config-bgp-ipv4-uc)# network 11.11.11.0/24 switch(config-bgp-ipv4-uc)# no network 11.11.11.0/24

switch(config-bgp-ipv6-uc)# network 2001:0db8:85a3::8a2e:0370:7334/24 switch(config-bgp-ipv6-uc)# no network 2001:0db8:85a3::8a2e:0370:7334/24

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc

Authority
Administrators or local user group members with execution rights for this command.

redistribute
redistribute {connected|ospf <process ID> |static|local loopback} [route-map <ROUTE-MAPNAME>] no redistribute {connected|ospf <process ID> |static|local loopback} [route-map <ROUTEMAP-NAME>]
Description
This command specifies routes to import into BGP. This command causes routes from the specified protocol to be considered for redistribution into BGP. The no form of this command specifies no redistribution into BGP.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

363

Parameter connected

Description
Redistributes directly attached networks (directly attached to the subnet or host).

ospf
static local loopback

Redistributes Open Shortest Path First (OSPFv2) routes. It is optional to mention the process ID. Range: <1-65535>
Redistributes statically configured routes .
Performs the following functions: n Redistributes local routes on loopback interfaces. n For EVPN enabled VRFs, it advertises the IP address of
loopback interfaces as a EVPN Type-5 prefix route.

route-map <ROUTE-MAP-NAME>

Optional. Specifies a route map to match for redistribution.

Usage
n If a route map is specified, then routes that pass the match clause specified in the route map will be imported into the BGP peer Routing Information Base (RIB).
n Route-maps must be configured prior to being referenced in redistribution statements. n Redistribute connected is required to redistribute connected subnet even if redistribute local
loopback is already configured.
Examples
Redistribute directly attached networks:

switch(config-bgp-ipv4-uc)# redistribute connected switch(config-bgp-ipv4-uc)# no redistribute connected

Redistributing local routes on loopback interfaces:

switch(config-bgp-ipv4-uc)# redistribute local loopback switch(config-bgp-ipv4-uc)# no redistribute local loopback

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.12 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. Added support for the host-routes parameter. --

BGP commands | 364

Command Information

Platforms
6300 6400

Command context
config-bgp-ipv4-uc config-bgp-ipv6-uc

Authority
Administrators or local user group members with execution rights for this command.

router bgp
router bgp <AS-NUMBER> no router bgp <AS-NUMBER>
Description
This command configures the BGP instance on the router, configures the AS (Autonomous System) the router belongs to, and enters into the BGP router configuration mode. Only a single BGP AS number can be assigned for the entire system. The no form of the command deletes the BGP instance from the router.

Parameter AS-NUMBER

Description
Specifies a 4-byte AS number in the range 1-4294967295 in integer format or from 0.1-65535.65535 in dotted format.

Examples
Configuring the BGP instance with the AS number:

Deleting BGP configurations:
switch(config)# no router bgp 100 This will delete all BGP configurations on this device. Continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

365

set extcommunity
set extcommunity "[rt <VALUE> | evpn-rmac <MAC-ADDRESS>]" no set extcommunity [rt | evpn-mac]
Description
Sets the extended community number attribute for a route matching the route map. Extended communities are supported only on Route Targets. This command is applicable to OSPF, static, and connected routes which will be redistributed to the BGP protocol. The no form of this command restores the default behavior of not modifying the extended community number attribute of the route.

Parameter <VALUE>
<MAC-ADDRESS>

Description
Sets the extended community number attribute. Specify the information in asn:nn format.
Specifies MAC address of the Router-MAC extended community. When configuring a route map and using the set ip next-hop command. this value can be set for the OUT direction only.

Usage
n Multiple community numbers can be configured within the double quotes. n 2-byte and 4-byte ASN values are supported in the global administrator component of the extended
community attribute. n 4-byte ASN values must be within the range of 1-4294967295. n 4-byte ASN values do not support dotted notation. n Extended communities are only supported on route targets. n The
Examples
Configuring a set clause in a route-map to modify the community number attribute of the route:

switch(config)# route-map abc permit seq 10 switch(config-route-map-abc-10)# set extcommunity rt "1:1 2:2"

Configuring a set clause in a route-map to modify the router mac:

switch(config)# route-map abc permit seq 1 switch(config-route-map-abc-1)# set extcommunity evpn-mac 00:01:01:90:90:01

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.10

Modification Command introduced

BGP commands | 366

Command Information

Platforms 6400

Command context
config-route-map-abc10

Authority
Administrators or local user group members with execution rights for this command.

show bgp
show bgp [{vrf <VRF-NAME>|all-vrf}] [{ipv4 unicast|ipv6 unicast |all}] [vsx-peer][update-group [<INDEX>]]
show bgp l2vpn evpn
Description
This command shows entries in the BGP routing table.

Parameter ipv4 ipv6 unicast vrf <VRF-NAME> all-vrf vsx-peer
update-group [<INDEX>]

Description
Selects the IPv4 address family.
Selects the IPv6 address family.
The subaddress family identifier.
Select to display information by VRFs by specifying the VRF name.
Select to display the BGP summary information for all VRFs and address-families.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.
Select to display information about update-group and peers which are member of that update-group for given afi/safi. Specifying an integer defines the desired update-group index.

Examples
Showing BGP routing table information for VRF 1 IPv4 unicast:

switch# show bgp vrf v1 ipv4 unicast Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed, a additional-paths Origin codes: i - IGP, e - EGP, ? - incomplete

VRF : v1 Local Router-ID 9.0.0.1

Network

Nexthop

Metric

LocPrf

Weight Path

-----------------------------------------------------------------------

*>e 9.0.0.0/24

9.0.0.2

0

100

0

65534.65535 3.4

18.54934 3574.8570 5.6 ?

*>e 100.0.0.0/24

9.0.0.2

0

100

0

200 ?

*>e 100.0.1.0/24

9.0.0.2

0

100

0

200 ?

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

367

*>e 100.0.2.0/24

9.0.0.2

0

*>e 100.0.3.0/24

9.0.0.2

0

*ae 100.0.3.0/24

9.0.0.3

0

Total number of entries 6

100

0

200 ?

100

0

200 ?

100

0

200 ?

Showing BGP routing table information for L2VPN EVPN:

switch# show bgp l2vpn evpn

Status codes: s suppressed, d damped, h history, * valid, > best, = multipath, i internal, e external S Stale, R Removed
Origin codes: i - IGP, e - EGP, ? - incomplete EVPN Route-Type 2 prefix: [2]:[ESI]:[EthTag]:[MAC]:[OrigIP] EVPN Route-Type 3 prefix: [3]:[EthTag]:[OrigIP]

VRF : default Router-ID not configured

Network

Nexthop

Metric LocPrf Weight Path

----------------------------------------------------------------------------------

----------------------

Route Distinguisher: 10.1.1.54:32967 (L2VNI 30000)

*> [2]:[0]:[0]:[00:06:f6:3f:e3:c1]:[]

1.1.1.20

0

100 32768 i

*> [2]:[0]:[0]:[8c:60:4f:f2:f5:41]:[]

1.1.1.10

0

100 0

i

*> [3]:[0]:[1.1.1.1]

0.0.0.0

0

100 0

?

Total number of entries 3

BGP routing information for a network that includes both IPv4 and IPv6 addresses.

switch# show bgp l2vpn evpn vtep 1920:1680:1:1::4 vni 1001001

Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,

i internal, e external S Stale, R Removed, a additional-paths

Origin codes: i - IGP, e - EGP, ? - incomplete

EVPN Route-Type 2 prefix: [2]:[ESI]:[EthTag]:[MAC]:[OrigIP]

EVPN Route-Type 3 prefix: [3]:[EthTag]:[OrigIP]

EVPN Route-Type 5 prefix: [5]:[ESI]:[EthTag]:[IPAddrLen]:[IPAddr]

VRF : default

Local Router-ID 192.168.1.1

Network

Nexthop

Metric

LocPrf Weight Path

----------------------------------------------------------------------------------

--------------------------

Route Distinguisher: 192.168.1.4:1001

(L2VNI 1001001)

*>i [2]:[0]:[0]:[00:aa:bb:cc:11:01]:[100.1.1.1]

1920:1680:1:1::4

0

100

0

?

* i [2]:[0]:[0]:[00:aa:bb:cc:11:01]:[100.1.1.1]

1920:1680:1:1::4

0

100

0

?

*>i [2]:[0]:[0]:[00:aa:bb:cc:11:01]:[1000:1:1:1::1]

1920:1680:1:1::4

0

100

0

?

* i [2]:[0]:[0]:[00:aa:bb:cc:11:01]:[1000:1:1:1::1]

1920:1680:1:1::4

0

100

0

?

*>i [2]:[0]:[0]:[00:aa:bb:cc:11:01]:[fe80:0:1::1]

1920:1680:1:1::4

0

100

0

?

* i [2]:[0]:[0]:[00:aa:bb:cc:11:01]:[fe80:0:1::1]

1920:1680:1:1::4

0

100

0

?

BGP commands | 368

*>i [3]:[0]:[1920:1680:1:1::4]

0

100

0

?

* i [3]:[0]:[1920:1680:1:1::4]

0

100

0

?

Total number of entries 8

1920:1680:1:1::4 1920:1680:1:1::4

switch# show bgp l2vpn evpn neighbors 1920:1680:1:1::8

Codes: ^ Inherited from peer-group, * Dynamic Neighbor

VRF : default

BGP Neighbor 1920:1680:1:1::8 (Internal)

Description

: RR peer-group^

Peer-group

: RRv6

Remote Router Id : 192.168.1.8

Local Router Id : 192.168.1.1

Remote AS

: 65001

Local AS

: 65001

Remote Port

: 42423

Local Port

: 179

State

: Established

Admin Status

: Up

Conn. Established : 5

Conn. Dropped

:4

Passive

: No

Update-Source

: loopback0^

Cfg. Hold Time

: 180

Cfg. Keep Alive : 60

Neg. Hold Time

: 180

Neg. Keep Alive : 60

Up/Down Time

: 06h:46m:13s

Connect-Retry Time : 120

Local-AS Prepend : No

Alt. Local-AS

:0

BFD

: Disabled

Slow Peer

: Yes

Password

:

Last Err Sent

: No Error

Last SubErr Sent : No Error

Last Err Rcvd

: No Error

Last SubErr Rcvd : No Error

Graceful-Restart : Enabled

Gr. Restart Time : 120

Gr. Stalepath Time : 300

Remove Private-AS : No

TTL

: 255

Local Cluster-ID :

Weight

:0

Fall-over

: No

Confederation-Peers : No

Message statistics ------------------Open Notification Updates Keepalives Route Refresh Total

Sent -----
8 3 20730 1153 0 21894

Rcvd -----
7 1 91332 952 0 92292

Capability

----------------------------

Route Refresh

Graceful Restart

Add-Path

Four Octet ASN

Address family IPv4 Unicast

Address family IPv6 Unicast

Address family VPNv4 Unicast

Address family L2VPN EVPN

Address Family : L2VPN EVPN

-----------------------------

Rt. Reflect. Client : No

Allow-AS in

:0

Max. Prefix

: 64000

Nexthop-Self

:

Cfg. Add-Path

:

Neg. Add-Path

:

Advertised ----------Yes Yes No Yes No No No Yes

Received ---------Yes Yes No Yes No No No Yes

Send Community : extended^ Advt. Interval : 30 Soft Reconfig In : Default-Originate :

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

369

Routemap In Routemap Out ORF type ORF capability

: : : Prefix-list :

Showing all BGP update groups:

switch# show bgp all update-group

VRF : default

BGP Update-Group 1

Address Family : ipv4-unicast

Peer Count

:5

Peering Type : internal Slow Group : No

Members ------110.162.100.221, 120.221.221.221, 130.121.21.111, 140.131.131.131, 150.100.101.2

BGP Update-Group 2

Address Family : ipv4-unicast

Peer Count

:2

Peering Type : external Slow Group : Yes

Members ------20.1.1.1, 30.1.1.1

BGP Update-Group 3

Address Family : ipv6-unicast

Peer Count

:1

Peering Type : external Slow Group : No

Members ------20ab::cd:08

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show bgp <PREFIX>

BGP commands | 370

show bgp [vrf <VRF-NAME>] {ipv4 unicast <A.B.C.D/M> | ipv6 unicast <X::Y/M>} [vsx-peer]
show bgp l2vpn evpn [RD-[ROUTE_TYPE]:[ESI]:[EthTag]:[MAC]:[OrigIP] | RD-[ROUTE_TYPE]:[EthTag]:[OrigIP] | RD-[ROUTE_TYPE]:[ESI]:[EthTag]:[IPAddrLen]:[IPAddr]]
Description
This command displays entries in the BGP routing table that are part of the specified network. For EVPN Route-type 2 with MAC only prefix as an input, displays all the prefixes containing the specific MAC address (MAC route, MAC/IP route, Host route).

Parameter vrf <VRF-NAME> ipv4 unicast <A.B.C.D/M>
ipv6 unicast <X::Y/M>
vsx-peer
l2vpn evpn RD-[ROUTE_TYPE]:[ESI]:
[EthTag]:[MAC]:[OrigIP] RD-[ROUTE_TYPE]:[EthTag]:[OrigIP] RD-[ROUTE_TYPE]:[ESI]:
[EthTag]:[IPAddrLen]:[IPAddr]

Description
Shows the information for a specified VRF.
Shows the information for an IPv4 unicast family with an IP prefix (network/length such as 35.0.0.0/8) in the BGP routing table to display.
Shows the information for an IPv6 unicast family an IPv6 prefix in the BGP routing table to display.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.
Shows the information for L2VPN EVPN address family.
EVPN Route-Type 2 prefix.
EVPN Route-Type 3 prefix.
EVPN Route-Type 5 prefix.

Examples
Showing the entries in the BGP routing table that are part of an IPv4 unicast network

switch# show bgp ipv4 unicast 10.0.0.0/16

VRF : default BGP Local AS 2

BGP Router-ID 1.1.1.2

Network Peer Metric Weight Best Type Originator ID Aggregator ID Aggregator AS Atomic Aggregate RFD Flaps

: 10.0.0.0/16 : 1.1.1.1 :0 :0 : Yes : external : 0.0.0.0 : : : :0

AS-Path

:1

Nexthop Origin Local Pref Calc. Local Pref Valid Stale Path ID

: 1.1.1.1 : IGP : 100 : 100 : Yes : No :0

RFD Penalty

:0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

371

Cluster List

:

Communities

:

50:100,50:101,50:102,50:103,50:104,50:105,50:106,50:107,50:108,50:109,50:110,50:1

Extd. Communities :

Showing the entries in the BGP routing table that are part of L2VPN EVPN

switch# show bgp l2vpn evpn vni 30000 Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete EVPN Route-Type 2 prefix: [2]:[ESI]:[EthTag]:[MAC]:[OrigIP] EVPN Route-Type 3 prefix: [3]:[EthTag]:[OrigIP]

VRF : default Router-ID not configured

Network

Nexthop

Metric LocPrf Weight Path

----------------------------------------------------------------------------------

----------------------

Route Distinguisher: 10.1.1.54:32967 (L2VNI 30000)

*> [2]:[0]:[0]:[00:06:f6:3f:e3:c1]:[]

1.1.1.20

0

100 32768 i

*> [2]:[0]:[0]:[8c:60:4f:f2:f5:41]:[]

1.1.1.10

0

100 0

i

*> [3]:[0]:[1.1.1.1]

0.0.0.0

0

100 0

?

Total number of entries 3

Showing the entries in the BGP routing table for EVPN route-type 2

switch# show bgp l2vpn evpn 2:2-[2]:[0]:[0]:[00:50:56:96:6d:6f]:[20.20.1.10]

VRF : default

BGP Local AS 1

BGP Router-id 3.3.3.3

Network

: 2:2-[2]:[0]:[0]:[00:50:56:96:6d:6f]:[20.20.1.10]

Nexthop

: 1.1.1.1

vni

:2

vni_type

: L2VNI

Peer

: 2.2.2.2

Origin

: incomplete

Metric

:0

Local Pref

: 100

Weight

:0

Calc. Local Pref : 100

Best

: Yes

Valid

: Yes

Type

: internal

Stale

: No

Originator ID

: 1.1.1.1

Aggregator ID

:

Aggregator AS

:

Atomic Aggregate :

AS-Path

:

Cluster List

:

Communities

:

Ext-Communities : RT: 2:2 RT: 10:10 Router MAC: 00:00:00:00:00:11

Network

: 2:2-[2]:[0]:[0]:[00:50:56:96:6d:6f]:[20.20.1.10]

Nexthop

: 1.1.1.1

vni

: 10000

vni_type

: L3VNI

Peer

: 2.2.2.2

Origin

: incomplete

Metric

:0

Local Pref

: 100

Weight

:0

Calc. Local Pref : 100

Best

: Yes

Valid

: Yes

Type

: internal

Stale

: No

Originator ID

: 1.1.1.1

Aggregator ID

:

BGP commands | 372

Aggregator AS Atomic Aggregate AS-Path Cluster List Communities Ext-Communities

: : : : : : RT: 2:2 RT: 10:10 Router MAC: 00:00:00:00:00:11

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Modification Added l2vpn evpn route types --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show bgp community
show bgp [{ipv4 | ipv6 | ipv4 {vrf <VRF-NAME>}} unicast] community [<VALUE> | <TYPE>]
Description
This command shows routes that belong to BGP communities. Optionally you can specify displaying information by a specific community or by VRF.

Parameter ipv4 ipv6 unicast ipv4 vrf <VRF-NAME> <VALUE>
<TYPE>

Description
Shows the information for an IPv4 address family.
Shows the information for an IPv6 address family.
Shows the information for a subaddress family identifier.
Shows the information for a specified VRF.
Shows the information for a community number. Specify the information in aa:nn format.
Shows a specified community type. Select the following wellknown communities, as well as others: internet
Advertise the prefix to all BGP neighbors. local-as

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

373

Parameter vsx-peer

Description
Do not advertise the prefix outside the sub-AS. no-advertise
Do not advertise the prefix to any BGP neighbors. no-export
Do not advertise the prefix to any eBGP neighbors.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing information for routes that belong to all BGP communities:

switch# show bgp ipv4 unicast community

Status codes: s suppressed, d damped, h history, * valid, &gt; best, = multipath,i

internal, e external S Stale, R Removed, a additional-pathsVRF : defaultLocal

Router-ID 9.0.0.1

Network

Nexthop

Metric

LocPrf

Weight Path

-----------------------------------------------------------------------

*&gt;e 9.0.0.0/24

9.0.0.2

0

100

0

200 ?

*&gt;e 100.0.0.0/24 9.0.0.2

0

100

0

200 ?

*&gt;e 100.0.1.0/24 9.0.0.2

0

100

0

200 ?

*&gt;e 100.0.2.0/24 9.0.0.2

0

100

0

200 ?

*&gt;e 100.0.3.0/24 9.0.0.2

0

100

0

200 ?

*ae 100.0.3.0/24

9.0.0.3

0

100

0

200 ?

Total number of entries 6

Showing information for routes that belong to the 200:20 BGP community number:

switch# show bgp ipv4 unicast community 200:20 Status codes: s suppressed, d damped, h history, * valid, > best, = multipath, i internal, e external S Stale, R RemovedOrigin codes: i - IGP, e - EGP, ? incomplete VRF : defaultLocal Router-ID 9.0.0.1

Network

Nexthop

Metric

LocPrf

Weight Path

-----------------------------------------------------------------------

*>e 9.0.0.0/24

9.0.0.2

0

100

0

200 ?

*>e 100.0.0.0/24 9.0.0.2

0

100

0

200 ?

*>e 100.0.1.0/24 9.0.0.2

0

100

0

200 ?

*>e 100.0.2.0/24 9.0.0.2

0

100

0

200 ?

*>e 100.0.3.0/24 9.0.0.2

0

100

0

200 ?

*ae 100.0.3.0/24 9.0.0.3

0

100

0

200 ?

Total number of entries 6

Showing information for routes that belong to the Internet BGP community type:

switch# show bgp ipv4 unicast community internet

Status codes: s suppressed, d damped, h history, * valid, &gt; best, = multipath,

i internal, e external S Stale, R Removed, a additional-paths

Origin codes: i - IGP, e - EGP, ? - incomplete

VRF : default

Local Router-ID 9.0.0.1

Network

Nexthop

Metric

LocPrf

Weight Path

BGP commands | 374

-----------------------------------------------------------------------

*&gt;e 9.0.0.0/24

9.0.0.2

0

100

0

200 ?

*&gt;e 100.0.0.0/24 9.0.0.2

0

100

0

200 ?

*&gt;e 100.0.1.0/24 9.0.0.2

0

100

0

200 ?

*&gt;e 100.0.2.0/24 9.0.0.2

0

100

0

200 ?

*&gt;e 100.0.3.0/24 9.0.0.2

0

100

0

200 ?

*ae 100.0.3.0/24

9.0.0.3

0

100

0

200 ?

Total number of entries 6

Showing information for routes that belong to the local-as BGP community type:
switch# show bgp ipv4 unicast community local-as Status codes: s suppressed, d damped, h history, * valid, &gt; best, = multipath, i internal, e external S Stale, R Removed, a additional-paths Origin codes: i - IGP, e - EGP, ? - incomplete VRF : default

Local Router-ID 9.0.0.1

Network

Nexthop

Metric

LocPrf

Weight Path

------------------------------------------------------------------------

*&gt;e 9.0.0.0/24

9.0.0.2

0

100

0

200 ?

*&gt;e 100.0.0.0/24 9.0.0.2

0

100

0

200 ?

*&gt;e 100.0.1.0/24 9.0.0.2

0

100

0

200 ?

*&gt;e 100.0.2.0/24 9.0.0.2

0

100

0

200 ?

*&gt;e 100.0.3.0/24 9.0.0.2

0

100

0

200 ?

*ae 100.0.3.0/24

9.0.0.3

0

100

0

200 ?

Total number of entries 6

Showing information for routes that belong to the no-advertise BGP community type:

switch# show bgp ipv4 unicast community no-advertise Status codes: s suppressed, d damped, h history, * valid, > best, = multipath, i internal, e external S Stale, R Removed, a additional-pathsOrigin codes: i IGP, e - EGP, ? - incomplete

VRF : default

Local Router-ID 9.0.0.1

Network

Nexthop

Metric

LocPrf

Weight Path

-----------------------------------------------------------------------

*>e 9.0.0.0/24

9.0.0.2

0

100

0

200 ?

*>e 100.0.0.0/24

9.0.0.2

0

100

0

200 ?

*>e 100.0.1.0/24

9.0.0.2

0

100

0

200 ?

*>e 100.0.2.0/24

9.0.0.2

0

100

0

200 ?

*>e 100.0.3.0/24

9.0.0.2

0

100

0

200 ?

*ae 100.0.3.0/24

9.0.0.2

0

100

0

200 ?

Total number of entries 6

Showing information for routes that belong to the no-export BGP community type:

switch# show bgp ipv4 unicast community no-export Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,i internal, e external S Stale, R Removed, a additional-pathsOrigin codes: i - IGP, e - EGP, ? - incomplete
VRF : default Local Router-ID 9.0.0.1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

375

Network

Nexthop

Metric

LocPrf

Weight Path

-----------------------------------------------------------------------

*>e 9.0.0.0/24

9.0.0.2

0

100

0

200 ?

*>e 100.0.0.0/24

9.0.0.2

0

100

0

200 ?

*>e 100.0.1.0/24

9.0.0.2

0

100

0

200 ?

*>e 100.0.2.0/24

9.0.0.2

0

100

0

200 ?

*>e 100.0.3.0/24

9.0.0.2

0

100

0

200 ?

*ae 100.0.3.0/24

9.0.0.3

0

100

0

200 ?

Total number of entries 6

Showing information for routes that belong to the gshut BGP community type:

switch# show bgp ipv4 unicast community gshut Status codes: s suppressed, d damped, h history, * valid, > best, = multipath, i internal, e external S Stale, R RemovedOrigin codes: i - IGP, e - EGP, ? incomplete

VRF : default Local Router-ID 1.1.1.2

Network

Nexthop

Metric

LocPrf

Weight Path

------------------------------------------------------------------------

*>e 1.1.1.0/24

10.1.1.2

0

0

0

2i

Total number of entries 1

switch# switch# show bgp ipv6 unicast community gshut

Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,i internal, e external S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete

VRF : default Local Router-ID 1.1.1.2

Network

Nexthop

Metric

LocPrf

Weight Path

------------------------------------------------------------------------

*>e 1::/64

10::2

fe80::98f2:b300:1368:e882

0

0

0

2i

Total number of entries 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

BGP commands | 376

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show bgp flap-statistics
show bgp {vrf <VRF_NAME> | all-vrf} [{ipv4 unicast | ipv6 unicast | all}] flap-statistics
Description
Displays all the flapped and suppressed routes.
Usage
Status of the route with dampening enabled:
n If the route is available, the history flag is unset. n If route has been flapping, is not suppressed and is withdrawn; the state of the route is h n If route is currently available but is suppressed due to dampening, the state of the route is d n If the route is unsuppressed and currently withdrawn, the state of the route is h
Examples
Showing all the flapped and suppressed routes:

switch# show bgp all Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed, a additional-paths Origin codes: i - IGP, e - EGP, ? - incomplete

VRF : default Local Router-ID 1.1.1.1

Address-family : IPv4 Unicast

-----------------------------

Network

Nexthop

*>i 2.2.2.0/24

2.2.2.2

*>i 11.1.1.0/24

2.2.2.2

*ai 11.1.1.0/24

2.2.2.3

Total number of entries 3

Metric 0 0 0

LocPrf 100 100 100

Weight Path

0

?

0

?

0

?

Address-family : IPv6 Unicast

-----------------------------

Network

Nexthop

Total number of entries 0

Metric

LocPrf

Weight Path

switch# show bgp ipv4 unicast flap-statistics Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed, a additional-paths Origin codes: i - IGP, e - EGP, ? - incomplete

VRF : default Local Router-ID 20.0.0.1

Network

Nexthop

Flaps

Reuse

Path

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

377

*>e 2.2.2.0/24

20.0.0.2

1

de 3.3.3.0/24

20.0.0.2

2

Total number of entries 2

00h:00m:00s 300 ? 00h:29m:31s 300 ?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show bgp neighbor advertised-routes
show bgp [vrf <VRF-NAME>] {ipv4 unicast | ipv6 unicast | all} neighbors <IP-ADDRESS> advertised-routes [vsx-peer]
show bgp l2vpn evpn neighbors <IP-ADDRESS> advertised-routes
Description
Shows all routes that have been advertised to the specified neighbor.

Parameter vrf <VRF-NAME> ipv4 unicast ipv6 unicast l2vpn evpn all vsx-peer
<IP-ADDRESS>

Description
Shows the information for a specified VRF.
Shows the information for an IPv4 unicast address family.
Shows the information for an IPv6 unicast address family.
Shows the information for L2VPN EVPN address family.
Shows the information for all address families and subaddress families.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.
Shows the information for a neighbor IP address.

Examples
Showing routes that have been advertised to the specified IPv4 unicast neighbor:

BGP commands | 378

switch# show bgp ipv4 unicast neighbors 9.0.0.1 advertised-routes Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete

VRF : default Local Router-ID 9.0.0.2

Network

Nexthop

Metric

LocPrf

Weight Path

-----------------------------------------------------------------------

*>e 9.0.0.0/24

9.0.0.2

0

0

0

200 65534.65535

3.4 18.54934 3574.8570 5.6 ?

*>e 100.0.0.0/24

9.0.0.2

0

0

0

200 ?

*>e 100.0.1.0/24

9.0.0.2

0

0

0

200 ?

*>e 100.0.2.0/24

9.0.0.2

0

0

0

200 ?

*>e 100.0.3.0/24

9.0.0.2

0

0

0

200 ?

Total number of entries 5

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show bgp neighbor paths
show bgp [vrf <VRF-NAME>] {ipv4 unicast | ipv6 unicast | all} neighbors <IP-ADDRESS> paths [vsx-peer]
show bgp l2vpn evpn neighbors <IP-ADDRESS> paths
Description
Shows autonomous system paths learned from the specified neighbor.

Parameter vrf <VRF-NAME> ipv4 unicast ipv6 unicast all

Description Shows the information for a specified VRF. Shows the information for an IPv4 unicast address family. Shows the information for an IPv6 unicast address family. Shows the information for all address families and subaddress

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

379

Parameter <IP-ADDRESS> vsx-peer
l2vpn evpn

Description
families.
Shows the information for a neighbor IP address.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.
Shows the information for L2VPN EVPN address family.

Examples
Showing autonomous system paths learned from the specified IPv4 unicast neighbor:

switch# show bgp ipv4 unicast neighbors 192.168.12.2 paths Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed VRF : default Local Router-ID 9.0.0.1

Network

Nexthop

Path

--------------------------------------------

*>e 9.0.0.0/24

9.0.0.2

200 65534.65535 3.4 18.54934 3574.8570 5.6

*>e 100.0.0.0/24

9.0.0.2

200

*>e 100.0.1.0/24

9.0.0.2

200

*>e 100.0.2.0/24

9.0.0.2

200

*>e 100.0.3.0/24

9.0.0.2

200

Total number of entries 5

Showing autonomous system paths learned from the specified L2VPN EVPN neighbor:

switch# show bgp l2vpn evpn neighbors 192.168.12.1 paths

Status codes: s suppressed, d damped, h history, * valid, > best, = multipath, i internal, e external S Stale, R Removed
Origin codes: i - IGP, e - EGP, ? - incomplete EVPN Route-Type 2 prefix: [2]:[ESI]:[EthTag]:[MAC]:[OrigIP] EVPN Route-Type 3 prefix: [3]:[EthTag]:[OrigIP]

VRF : default Local Router-ID 9.0.0.2

Network

Nexthop

Path

----------------------------------------------------------------------------------

-

Route Distinguisher: 10.1.1.54:32967 (L2VNI 30000)

*> [2]:[0]:[0]:[00:06:f6:3f:e3:c1]:[]

1.1.1.20

100

*> [2]:[0]:[0]:[8c:60:4f:f2:f5:41]:[]

1.1.1.10

100

Total number of entries 2

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

BGP commands | 380

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show bgp neighbor received orf-prefix-list
show bgp [vrf <VRF-NAME>]{ipv4 unicast | ipv6 unicast | all} neighbors <IP-ADDRESS> received orf-prefix-list
Description
Shows all the prefix lists received from the specified neighbor.

Parameter vrf <VRF-NAME> ipv4 unicast ipv6 unicast all
<IP-ADDRESS>

Description Shows the information for a specified VRF. Shows the information for an IPv4 unicast address family. Shows the information for an IPv6 unicast address family. Shows the information for all address families and subaddress families. Shows the information for a neighbor IP address.

Examples
Showing received prefix list from the specified neighbor:

switch# show bgp ipv4 unicast neighbors A.B.C.D received orf-prefix-list Address family: IPv4 Unicast
ip prefix-list 10.0.0.200: 4 entries seq 10 permit 28.119.16.0/24 seq 15 deny 28.119.19.0/24 seq 20 permit 28.119.17.0/24
Address family: IPv6 Unicast ip prefix-list 10.0.0.200: 4 entries
seq 30 permit 2000::/64 seq 35 deny 3000::/64

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

381

seq 40 permit 4000:0/64

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show bgp neighbor received-routes
show bgp [vrf <VRF-NAME>] {ipv4 unicast | ipv6 unicast | all} neighbors <IP-ADDRESS> received-routes [vsx-peer]
show bgp l2vpn evpn neighbors <IP-ADDRESS> received-routes
Description
Shows received routes from the specified neighbor.

Parameter vrf <VRF-NAME> ipv4 unicast ipv6 unicast all
<IP-ADDRESS> vsx-peer

Description
Shows the information for a specified VRF.
Shows the information for an IPv4 unicast address family.
Shows the information for an IPv6 unicast address family.
Shows the information for all address families and subaddress families.
Shows the information for a neighbor IP address.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing received routes from the specified IPv4 unicast neighbor:

BGP commands | 382

switch# show bgp ipv4 unicast neighbors 192.168.12.1 received-routes Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed, a additional-paths Origin codes: i - IGP, e - EGP, ? - incomplete

VRF : default Local Router-ID 9.0.0.2

Network

Nexthop

Metric

LocPrf

Weight Path

-----------------------------------------------------------------------

*>e 9.0.0.0/24

9.0.0.2

0

0

0

200 65534.65535

3.4 18.54934 3574.8570 5.6 ?

*>e 100.0.0.0/24

9.0.0.2

0

0

0

200 ?

*>e 100.0.1.0/24

9.0.0.2

0

0

0

200 ?

*>e 100.0.2.0/24

9.0.0.2

0

0

0

200 ?

*>e 100.0.3.0/24

9.0.0.2

0

0

0

200 ?

*ae 100.0.3.0/24

9.0.0.2

0

0

0

200 ?

Total number of entries 6

Showing received routes from the specified L2VPN EVPN neighbor:

switch# show bgp l2vpn evpn neighbors 192.168.12.1 received-routes

Status codes: s suppressed, d damped, h history, * valid, > best, = multipath, i internal, e external S Stale, R Removed
Origin codes: i - IGP, e - EGP, ? - incomplete EVPN Route-Type 2 prefix: [2]:[ESI]:[EthTag]:[MAC]:[OrigIP] EVPN Route-Type 3 prefix: [3]:[EthTag]:[OrigIP]

VRF : default Local Router-ID 9.0.0.2

Network

Nexthop

Metric

LocPrf Weight Path

----------------------------------------------------------------------------------

----------------------

Route Distinguisher: 10.1.1.54:32967 (L2VNI 30000)

*> [2]:[0]:[0]:[00:06:f6:3f:e3:c1]:[]

1.1.1.20

0

100

32768 i

*> [2]:[0]:[0]:[8c:60:4f:f2:f5:41]:[]

1.1.1.10

0

100

0

i

Total number of entries 2

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

383

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show bgp neighbor routes
show bgp [vrf <VRF-NAME>] {ipv4 unicast | ipv6 unicast | all} neighbors <IP-ADDRESS> routes [vsx-peer]
Description
This command shows routes that are received and accepted from the specified neighbor.

Parameter vrf <VRF-NAME> ipv4 unicast ipv6 unicast all
<IP-ADDRESS> vsx-peer

Description
Shows the information for a specified VRF.
Shows the information for an IPv4 unicast address family.
Shows the information for an IPv6 unicast address family.
Shows the information for all address families and subaddress families.
Shows the information for a neighbor IP address.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing all routes that are received and accepted from the specified neighbor:

switch# show bgp ipv4 unicast neighbors 9.0.0.2 routes Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed, a additional-paths Origin codes: i - IGP, e - EGP, ? - incomplete

VRF : default Local Router-ID 9.0.0.1

Network

Nexthop

Metric

LocPrf

Weight Path

-----------------------------------------------------------------------

*>e 9.0.0.0/24

9.0.0.2

0

100

0

200 65534.65535

3.4 18.54934 3574.8570 5.6 ?

*>e 100.0.0.0/24

9.0.0.2

0

100

0

200 ?

*>e 100.0.1.0/24

9.0.0.2

0

100

0

200 ?

*>e 100.0.2.0/24

9.0.0.2

0

100

0

200 ?

*>e 100.0.3.0/24

9.0.0.2

0

100

0

200 ?

*ae 100.0.3.0/24

9.0.0.3

0

100

0

200 ?

Total number of entries 6

Showing 12 VPN EVPN routes that are received and accepted from the specified neighbor:

BGP commands | 384

switch# show bgp l2vpn evpn neighbor 9.0.0.2 routes

Status codes: s suppressed, d damped, h history, * valid, > best, = multipath, i internal, e external S Stale, R Removed, a additional-paths
Origin codes: i - IGP, e - EGP, ? - incomplete EVPN Route-Type 2 prefix: [2]:[ESI]:[EthTag]:[MAC]:[OrigIP] EVPN Route-Type 3 prefix: [3]:[EthTag]:[OrigIP]

VRF

: default

Local Router-id: 9.0.0.1

Network

Nexthop

Metric

LocPrf

Weight Path

-----------------------------------------------------------------------

*>e 9.0.0.0/24

9.0.0.2

0

0

0

200 65534.65535

3.4 18.54934 3574.8570 5.6 ?

*>e 100.0.0.0/24

9.0.0.2

0

0

0

200 ?

*>e 100.0.1.0/24

9.0.0.2

0

0

0

200 ?

*>e 100.0.2.0/24

9.0.0.2

0

0

0

200 ?

*>e 100.0.3.0/24

9.0.0.2

0

0

0

200 ?

*ae 100.0.3.0/24

9.0.0.3

0

100

0

200 ?

Total number of entries 6

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show bgp neighbors
show bgp [vrf <VRF-NAME>] {ipv4 unicast | ipv6 unicast | all} neighbors [vsx-peer]
show bgp l2vpn evpn neighbors
Description
This command shows information about BGP and TCP connections to neighbors. If neighbors are member of a peer-group, the command shows the configured values inherited from the peer-group. The configured values are postfixed with a caret (^) for inherited values.

Parameter vrf <VRF-NAME>

Description Shows the information for a specified VRF.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

385

Parameter ipv4 unicast ipv6 unicast all vsx-peer
l2vpn evpn

Description
Shows the information for an IPv4 unicast address family.
Shows the information for an IPv6 unicast address family.
Shows the information for all address families and subaddress families.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.
Shows the information for L2VPN EVPN address family.

Examples
Showing all information about BGP and TCP connections to neighbors:

switch# show bgp all neighbors Codes: ^ Inherited from peer-group VRF : default

BGP Neighbor 10.1.1.2 (Internal)

Description

:

Peer-group

:

Remote Router Id Remote AS Remote Port State Conn. Established Passive Cfg. Hold Time Neg. Hold Time Up/Down Time Local-AS Prepend BFD Password Last Err Sent Last SubErr Sent Last Err Rcvd Last SubErr Rcvd

: 10.1.1.2 :1 :0 : Established :1 : No : 180 :0 : 00h:00m:00s : No : Disabled : : No Error : No Error : No Error : No Error

Local Router Id : 1.0.0.1

Local AS

:1

Local Port

:0

Admin Status

: Up

Conn. Dropped

:0

Update-Source

:

Cfg. Keep Alive : 60

Neg. Keep Alive : 0

Connect-Retry Time : 120

Alt. Local-AS

:0

Slow Peer

: No

Graceful-Restart Gr. Stalepath Time TTL Weight

: Enabled : 150 : 255 :0

Gr. Restart Time Remove Private-AS Local Cluster-ID Fall-over

: 120 : No : : No

Message statistics ------------------Open Notification Updates Keepalives Route Refresh Total

Sent -----
7 5 3 12 0 28

Rcvd -----
6 2 2 10 0 20

Capability -----------

Advertised -----------

Received ----------

BGP commands | 386

Route Refresh

Yes

No

Graceful Restart

Yes

No

Four Octet ASN

Yes

No

Add-Path

Yes

Yes

Address family IPv4 Unicast

Yes

No

Address family IPv6 Unicast

No

No

Address family L2VPN EVPN

No

No

Address Family : IPv4 Unicast

-----------------------------

Rt. Reflect. Client : No

Allow-AS in

:0

Max. Prefix

: 64000

Nexthop-Self

:

Update-Group

:2

Send Community : Advt. Interval : 30 Soft Reconfig In : Default-Originate :

Cfg. Add-Path Neg. Add-Path Routemap In Routemap Out ORF type ORF capability

: Send and Receive : Send and Receive : : : Prefix-list : Receive

Address Family : IPv6 Unicast

-----------------------------

Rt. Reflect. Client : No

Allow-AS in

:0

Max. Prefix

: 64000

Nexthop-Self

:

Update-Group

:3

Send Community : Advt. Interval : 30 Soft Reconfig In : Default-Originate :

Cfg. Add-Path Neg. Add-Path Routemap In Routemap Out ORF type ORF capability

: Send and Receive : Send and Receive : : : Prefix-list : Receive

Address Family : L2VPN EVPN

-----------------------------

Rt. Reflect. Client : No

Allow-AS in

:0

Max. Prefix

: 32768

Nexthop-Self

:

Update-Group

:4

Send Community : extended Advt. Interval : 30 Soft Reconfig In : Default-Originate :

Cfg. Add-Path Neg. Add-Path Routemap In Routemap Out ORF type ORF capability

: : : : : Prefix-list : Receive

Showing information about L2VPN EVPN connections to neighbors: switch# show bgp l2vpn evpn neighbors
Codes: ^ Inherited from peer-group, * Dynamic Neighbor

VRF : default

BGP Neighbor 10.1.1.2 (Internal)

Description

:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

387

Peer-group

:

Remote Router Id Remote AS Remote Port State Conn. Established Passive Cfg. Hold Time Neg. Hold Time Up/Down Time Local-AS Prepend BFD Password Last Err Sent Last SubErr Sent Last Err Rcvd Last SubErr Rcvd

: 10.1.1.2 :1 : 179 : Established :1 : No : 180 : 180 : 00m:01w:03d : No : Disabled : : No Error : No Error : No Error : No Error

Local Router Id Local AS Local Port Admin Status Conn. Dropped Update-Source Cfg. Keep Alive Neg. Keep Alive Alt. Local-AS

: 10.1.1.1 :1 : 56008 : Up :0 : : 60 : 60 :0

Graceful-Restart Gr. Stalepath Time TTL Weight

: Enabled : 150 : 255 :0

Gr. Restart Time Remove Private-AS Local Cluster-ID Fall-over

: 120 : No : : No

Message statistics ------------------Open Notification Updates Keepalives Route Refresh Total

Sent -----
1 0 3 17995 0 17999

Rcvd -----
1 0 2 18009 0 18012

Capability ----------Route Refresh Graceful Restart Four Octet ASN Address family IPv4 Unicast Address family IPv6 Unicast Address family L2VPN EVPN

Advertised ----------Yes Yes Yes Yes Yes Yes

Received ---------Yes Yes Yes Yes Yes Yes

Address Family : L2VPN EVPN -----------------------------

Rt. Reflect. Client : No

Allow-AS in

:0

Max. Prefix

: 32768

Nexthop-Self

:

Send Community : extended Advt. Interval : 30 Soft Reconfig In : Default-Originate :

Routemap In

:

Routemap Out

:

Showing information for BGP IPv4 unicast neighbors:

switch# show bgp ipv4 unicast neighbors Codes: ^ Inherited from peer-group
VRF : default
BGP Neighbor 10.1.1.2 (Internal)

BGP commands | 388

Description

:

Peer-group

:

Remote Router Id Remote AS Remote Port State Conn. Established Passive Cfg. Hold Time Neg. Hold Time Up/Down Time Local-AS Prepend BFD Password Last Err Sent Last SubErr Sent Last Err Rcvd Last SubErr Rcvd

: 10.1.1.2 :1 :0 : Idle :0 : No : 180 :0 : 00h:00m:00s : No : Disabled : : No Error : No Error : No Error : No Error

Local Router Id : 1.0.0.1

Local AS

:1

Local Port

:0

Admin Status

: Up

Conn. Dropped

:0

Update-Source

:

Cfg. Keep Alive : 60

Neg. Keep Alive : 0

Connect-Retry Time : 120

Alt. Local-AS

:0

Slow Peer

: Yes

Graceful-Restart Gr. Stalepath Time TTL Weight

: Enabled : 150 : 255 :0

Gr. Restart Time Remove Private-AS Local Cluster-ID Fall-over

: 120 : No : : No

Message statistics ------------------Open Notification Updates Keepalives Route Refresh Total

Sent ----0 0 0 0 0 0

Rcvd ----0 0 0 0 0 0

Capability ----------Route Refresh Graceful Restart Four Octet ASN Add-Path Address family IPv4 Unicast Address family IPv6 Unicast Address family L2VPN EVPN

Advertised ----------Yes Yes Yes Yes Yes No Yes

Received ---------No No No Yes No No Yes

Address Family : IPv4 Unicast -----------------------------

Rt. Reflect. Client : No

Allow-AS in

:0

Max. Prefix

: 64000

Nexthop-Self

:

Update-Group

: 12

Send Community : Advt. Interval : 30 Soft Reconfig In : Default-Originate :

Routemap In

:

Routemap Out

:

ORF Type ORF Capability

: Prefix-list : Send

Cfg. Add-Path Neg. Add-Path

: Send : Send

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

389

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show bgp paths
show bgp [vrf <VRF-NAME>] {ipv4 unicast | ipv6 unicast | all} paths [vsx-peer]
show bgp l2vpn evpn paths
Description
Shows received BGP path information in the database.

Parameter vrf <VRF-NAME> ipv4 unicast ipv6 unicast all vsx-peer
l2vpn evpn

Description
Shows the information for a specified VRF.
Shows the information for an IPv4 unicast address family.
Shows the information for an IPv6 unicast address family.
Shows the information for all address families and subaddress families.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.
Shows the information for L2VPN EVPN address family.

Examples
Showing received BGP path information from the specified IPv4 unicast neighbor:

switch# show bgp ipv4 unicast paths Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed, a additional-paths VRF : default Local Router-ID 9.0.0.1

BGP commands | 390

Network

Nexthop

PathID

Path

--------------------------------------------------------

*>e 9.0.0.0/24

9.0.0.2

0

200 65534.65535 3.4 18.54934

3574.8570 5.6

*>e 100.0.0.0/24

9.0.0.2

0

200

*>e 100.0.1.0/24

9.0.0.2

0

200

*>e 100.0.2.0/24

9.0.0.2

0

200

*>e 100.0.3.0/24

9.0.0.2

10

200

*ae 100.0.3.0/24

9.0.0.3

5

200

Total number of entries 6

Showing received BGP path information from the specified L2VPN EVPN neighbor:

switch# show bgp l2vpn evpn paths

Status codes: s suppressed, d damped, h history, * valid, > best, = multipath, i internal, e external S Stale, R Removed
Origin codes: i - IGP, e - EGP, ? - incomplete EVPN Route-Type 2 prefix: [2]:[ESI]:[EthTag]:[MAC]:[OrigIP] EVPN Route-Type 3 prefix: [3]:[EthTag]:[OrigIP]

VRF : default Local Router-ID 9.0.0.2

Network

Nexthop

Path

----------------------------------------------------------------------------------

Route Distinguisher: 10.1.1.54:32967 (L2VNI 30000)

*> [2]:[0]:[0]:[00:06:f6:3f:e3:c1]:[]

1.1.1.20

100

*> [2]:[0]:[0]:[8c:60:4f:f2:f5:41]:[]

1.1.1.10

100

Total number of entries 2

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show bgp peer-group summary
show bgp [vrf <VRF-NAME>] {ipv4 unicast | ipv6 unicast | all} peer-group <PEER-GROUP-NAME> summary [vsx-peer]
show bgp l2vpn evpn peer-group <PEER-GROUP-NAME> summary

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

391

Description
This command shows the peer-group information in the database.

Parameter vrf <VRF-NAME> ipv4 unicast ipv6 unicast all <PEER-GROUP-NAME> vsx-peer
l2vpn evpn

Description
Shows the information for a specified VRF.
Shows the information for an IPv4 unicast address family.
Shows the information for an IPv6 unicast address family.
Shows the information for all address families and subaddress families.
Shows the information for the BGP peer-group for the BGP instance.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.
Shows the information for L2VPN EVPN address family. This parameter only applies to 8100, 8325, 9300, and 8360 series switches.

Examples
Showing the information from IPv4 unicast address families in pg_name1 peer-group:

switch# show bgp ipv4 unicast peer-group pg_name1 summary

Codes: * Dynamic Neighbor

VRF : default

BGP Peer-Group Summary

=======================

Local AS

:1

BGP Router Identifier

Peers

:1

Dynamic Peer Count

Cfg. Hold Time

: 180

Cfg. Keep Alive

: 2.2.2.2 :3 : 60

Neighbor 10.0.0.1 *10.1.1.5

Remote-AS MsgRcvd MsgSent Up/Down Time State

AdminStatus

1

8

10

00h:00m:58s Established Up

11

15

14

00h:10m:24s Established Up

Showing the information from all address families in pg_name1 peer-group:

switch# show bgp all unicast peer-group pg_name1 summary

Codes: * Dynamic Neighbor

VRF : default

BGP Peer-Group Summary

=======================

Local AS

:1

BGP Router Identifier : 2.2.2.2

Peers

:1

Dynamic Peer Count

:3

Cfg. Hold Time

: 180

Cfg. Keep Alive

: 60

Confederation Id

:0

For address family: IPv4 Unicast

Neighbor

Remote-AS MsgRcvd MsgSent Up/Down Time State

AdminStatus

10.0.0.1

1

8

10

00h:00m:58s Established Up

*10.1.1.5

11

15

14

00h:10m:24s Established Up

BGP commands | 392

For address family: IPv6 Unicast

Neighbor

Remote-AS MsgRcvd MsgSent Up/Down Time State

AdminStatus

1001::1002

11

12

12

00h:00m:07s Established Up

2001::2002

11

12

12

00h:00m:07s Established Up

For address family: L2VPN EVPN

Neighbor

Remote-AS MsgRcvd MsgSent Up/Down Time State

AdminStatus

10.0.0.1

1

8

10

00h:00m:58s Established Up

10.1.1.6

11

15

14

00h:10m:24s Established Up

Showing the information from L2VPN EVPN address families in pg_name1 peer-group:

switch# show bgp l2vpn evpn peer-group pg_name1 summary

VRF : default

BGP Peer-Group Summary

=======================

Local AS

:1

BGP Router Identifier

Peers

:1

Dynamic Peer Count

Cfg. Hold Time

: 180

Cfg. Keep Alive

Confederation Id

:0

: 2.2.2.2 :3 : 60

Neighbor 10.0.0.1 *10.1.1.6

Remote-AS MsgRcvd MsgSent Up/Down Time State

AdminStatus

1

8

10

00h:00m:58s Established Up

11

15

14

00h:10m:24s Established Up

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show bgp summary
show bgp [vrf <VRF-NAME>] {ipv4 unicast | ipv6 unicast | all} summary [vsx-peer]
show bgp l2vpn evpn summary
Description
This command shows a summary of the status of Border Gateway Protocol (BGP) connections.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

393

Parameter ipv4 unicast ipv6 unicast all vrf <VRF-NAME> vsx-peer
l2vpn evpn

Description
Selects to display the BGP summary information for the IPv4 subaddress family identifier.
Selects to display the BGP summary information for the IPv6 subaddress family identifier.
Selects to display the BGP summary information for all VRFs and address-families.
Selects to display information by VRFs by specifying the VRF name.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.
Shows the information for L2VPN EVPN address family. This parameter only applies to 8100, 8325, 9300, and 8360 series switches.

Examples
Showing BGP summary information for all address-families:

switch(config-bgp)# show bgp all summary

Codes: * Dynamic Neighbor

VRF : default

BGP Summary

Local AS

: 100

BGP Router Identifier

Peers

:1

Log Neighbor Changes

Cfg. Hold Time

: 180

Cfg. Keep Alive

Confederation Id

:0

: 9.0.0.1 : No : 60

Address-family : IPv4 Unicast

-----------------------------

Neighbor

Remote-AS MsgRcvd MsgSent Up/Down Time State

AdminStatus

9.0.0.2

200

25

23

00h:17m:50s Established Up

*10.1.1.5

11

26

24

00h:20m:26s Established Up

Address-family : IPv6 Unicast

-----------------------------

Neighbor

Remote-AS MsgRcvd MsgSent Up/Down Time State

AdminStatus

*2001::2002

11

3

3

00h:00m:14s Established Up

9000::2

200

25

23

00h:17m:50s Established Up

Address-family : VPNv4 Unicast

-----------------------------

Neighbor

Remote-AS MsgRcvd MsgSent Up/Down Time State

AdminStatus

1.1.1.1

100

207

208

02h:54m:18s Established Up

*3.3.3.4

11

26

24

00h:20m:26s Established Up

Address-family : L2VPN EVPN

-----------------------------

Neighbor

Remote-AS MsgRcvd MsgSent Up/Down Time State

AdminStatus

10.0.0.2

200

25

23

00h:17m:50s Established Up

*10.1.1.6

11

26

24

00h:20m:26s Established Up

VRF : v1

BGP commands | 394

BGP Summary Local AS Peers Cfg. Hold Time

: 100 :1 : 180

BGP Router Identifier : 9.0.0.1

Log Neighbor Changes : No

Cfg. Keep Alive

: 60

Address-family : IPv4 Unicast

-----------------------------

Neighbor

Remote-AS MsgRcvd MsgSent Up/Down Time State

AdminStatus

*4.4.4.4

11

26

24

00h:20m:26s Established Up

9.0.0.2

200

25

23

00h:17m:50s Established Up

Address-family : IPv6 Unicast

-----------------------------

Neighbor

Remote-AS MsgRcvd MsgSent Up/Down Time State

AdminStatus

*3001::3002

11

3

3

00h:00m:14s Established Up

9000::2

200

25

23

00h:17m:50s Established Up

Showing BGP summary information for a specific VRF for IPv4 unicast network:

switch(config-bgp)# show bgp ipv4 unicast vrf v1 summary

Codes: * Dynamic Neighbor

VRF : v1

BGP Summary

Local AS

: 100

BGP Router Identifier

Peers

:1

Log Neighbor Changes

Cfg. Hold Time

: 180

Cfg. Keep Alive

: 9.0.0.1 : No : 60

Neighbor 9.0.0.2 *10.1.1.5

Remote-AS MsgRcvd MsgSent Up/Down Time State

AdminStatus

200

25

23

00h:17m:50s Established Up

11

26

24

00h:20m:26s Established Up

Showing BGP summary information for L2VPN EVPN:

switch(config-bgp)# do show bgp l2vpn evpn summary

Codes: * Dynamic Neighbor

VRF : default

BGP Summary

Local AS

: 100

BGP Router Identifier

Peers

:1

Log Neighbor Changes

Cfg. Hold Time

: 180

Cfg. Keep Alive

: 9.0.0.1 : No : 60

Neighbor 10.0.0.2 10.1.1.6

Remote-AS MsgRcvd MsgSent Up/Down Time State

AdminStatus

200

25

23

00h:17m:50s Established Up

11

26

24

00h:20m:26s Established Up

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

395

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show bgp l2vpn evpn vni route-type
show bgp l2vpn evpn vni <VNI-Value> route-type <ROUTE-TYPE-Value>
Description
Shows the BGP L2VPN information for the particular EVPN VNI and routes type.

Parameter <VNI-Value> <ROUTE-TYPE-Value>

Description Specifies the VNI. Specifies the routes filtered by NLRI route type.

Examples
Showing BGP L2VPN information for the particular EVPN VNI and route type:

switch# show bgp l2vpn evpn vni 30000 route-type 5 Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete EVPN Route-Type 5 prefix: [5]:[ESI]:[EthTag]:[IPAddrLen]:[IPAddr]

VRF : default Router-ID not configured

Network

Nexthop

Metric LocPrf Weight Path

----------------------------------------------------------------------------------

----------------------

Route Distinguisher: 1:100

(L3VNI 10000)

*>i [5]:[0]:[0]:[24]:[32.32.32.0]

3.3.3.3

0

100 0

?

*> [5]:[0]:[0]:[24]:[52.52.52.0]

1.1.1.1

0

100 0

?

*>i [5]:[0]:[0]:[64]:[aaa::]

3.3.3.3

0

100 0

?

Total number of entries 3

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

BGP commands | 396

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show bgp l2vpn evpn vtep
show bgp l2vpn evpn vtep <IP-address>
Description
Shows the BGP L2VPN information for the particular EVPN VTEP IP address.

Parameter <IP-address>

Description Specifies the VTEP IP address.

Examples
Showing BGP L2VPN information for the particular EVPN VTEP IP:

switch# show bgp l2vpn evpn vtep 1.1.1.1 Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete

EVPN Route-Type 2 prefix: [2]:[ESI]:[EthTag]:[MAC]:[OrigIP] EVPN Route-Type 3 prefix: [3]:[EthTag]:[OrigIP] EVPN Route-Type 5 prefix: [5]:[ESI]:[EthTag]:[IPAddrLen]:[IPAddr] VRF : default Local Router-ID 2.2.2.2

Network

Nexthop

Metric

LocPrf Weight Path

----------------------------------------------------------------------------------

--------------------------

Route Distinguisher: 1.1.1.1:2

(L2VNI 2)

*>i [2]:[0]:[0]:[00:00:00:00:00:33]:[10.1.1.10]

1.1.1.1

0

100

0

?

*>i [2]:[0]:[0]:[00:00:00:00:00:33]:[1000::10]

1.1.1.1

0

100

0

?

*>i [2]:[0]:[0]:[00:50:56:96:15:1c]:[10.1.1.1]

1.1.1.1

0

100

0

?

*>i [2]:[0]:[0]:[00:50:56:96:15:1c]:[]

1.1.1.1

0

100

0

?

*>i [3]:[0]:[1.1.1.1]

1.1.1.1

0

100

0

?

Route Distinguisher: 1.1.1.1:2

(L3VNI 10000)

*>i [2]:[0]:[0]:[00:00:00:00:00:33]:[10.1.1.10]

1.1.1.1

0

100

0

?

*>i [2]:[0]:[0]:[00:00:00:00:00:33]:[1000::10]

1.1.1.1

0

100

0

?

*>i [2]:[0]:[0]:[00:50:56:96:15:1c]:[10.1.1.1]

1.1.1.1

0

100

0

?

*>i [2]:[0]:[0]:[00:50:56:96:15:1c]:[]

1.1.1.1

0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

397

100

0

?

Route Distinguisher: 1:100

*>i [5]:[0]:[0]:[24]:[10.1.1.0]

100

0

?

*>i [5]:[0]:[0]:[64]:[1000::]

100

0

?

Total number of entries 11

(L3VNI 10000)

1.1.1.1

0

1.1.1.1

0

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

show bgp l2vpn evpn vtep route-type
show bgp l2vpn evpn vtep <IP-address> route-type <ROUTE-TYPE-Value>
Description
Shows the BGP L2VPN information for the particular EVPN VTEP IP address and routes type.

Parameter <IP-address> <ROUTE-TYPE-Value>

Description Specifies the VTEP IP address. Specifies the routes filtered by NLRI route type.

Examples
Showing BGP L2VPN information for the particular EVPN VTEP and route type:

switch# show bgp l2vpn evpn vtep 1.1.1.1 route-type 5 Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete EVPN Route-Type 5 prefix: [5]:[ESI]:[EthTag]:[IPAddrLen]:[IPAddr]

VRF : default Router-ID not configured

Network

Nexthop

BGP commands | 398

Metric LocPrf Weight Path

----------------------------------------------------------------------------------

----------------------

Route Distinguisher: 1:100

(L3VNI 10000)

*>i [5]:[0]:[0]:[24]:[32.32.32.0]

1.1.1.1

0

100 0

?

*> [5]:[0]:[0]:[24]:[52.52.52.0]

1.1.1.1

0

100 0

?

*>i [5]:[0]:[0]:[64]:[aaa::]

1.1.1.1

0

100 0

?

Total number of entries 3

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show bgp l2vpn evpn vtep vni
show bgp l2vpn evpn vtep <IP-address> vni <VNI-Value>
Description
Shows the BGP L2VPN information for the particular EVPN VTEP IP address and VNI.

Parameter <IP-address> <VNI-Value>

Description Specifies the VTEP IP address. Specifies the VNI.

Examples
Showing BGP L2VPN information for the particular EVPN VTEP IP and VNI:

switch# show bgp l2vpn evpn vtep 1.1.1.1 vni 10000 Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete
EVPN Route-Type 2 prefix: [2]:[ESI]:[EthTag]:[MAC]:[OrigIP]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

399

EVPN Route-Type 3 prefix: [3]:[EthTag]:[OrigIP] EVPN Route-Type 5 prefix: [5]:[ESI]:[EthTag]:[IPAddrLen]:[IPAddr] VRF : default Local Router-ID 2.2.2.2

Network

Nexthop

Metric

LocPrf Weight Path

----------------------------------------------------------------------------------

--------------------------

Route Distinguisher: 1.1.1.1:2

(L3VNI 10000)

*>i [2]:[0]:[0]:[00:00:00:00:00:33]:[10.1.1.10]

1.1.1.1

0

100

0

?

*>i [2]:[0]:[0]:[00:00:00:00:00:33]:[1000::10]

1.1.1.1

0

100

0

?

*>i [2]:[0]:[0]:[00:50:56:96:15:1c]:[10.1.1.1]

1.1.1.1

0

100

0

?

*>i [2]:[0]:[0]:[00:50:56:96:15:1c]:[]

1.1.1.1

0

100

0

?

Route Distinguisher: 1:100

*>i [5]:[0]:[0]:[24]:[10.1.1.0]

100

0

?

*>i [5]:[0]:[0]:[64]:[1000::]

100

0

?

Total number of entries 6

(L3VNI 10000)

1.1.1.1

0

1.1.1.1

0

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

show bgp l2vpn evpn vtep vni route-type
show bgp l2vpn evpn vtep <VTEP-ID> vni <VNI-Value> route-type <ROUTE-TYPE-Value>
Description
Shows the BGP L2VPN information for the particular EVPN VTEP, VNI, and router type.

Parameter <VTEP-ID>

Description Specifies the VTEP.

BGP commands | 400

Parameter <VNI-Value> <ROUTE-TYPE-Value>

Description Specifies the VNI. Specifies the router type.

Examples
Showing BGP L2VPN information for the particular EVPN VTEP, route type, and VNI:

switch# show bgp l2vpn evpn vtep 1.1.1.1 vni 10000 route-type 2 Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete

EVPN Route-Type 2 prefix: [2]:[ESI]:[EthTag]:[MAC]:[OrigIP] EVPN Route-Type 3 prefix: [3]:[EthTag]:[OrigIP] EVPN Route-Type 5 prefix: [5]:[ESI]:[EthTag]:[IPAddrLen]:[IPAddr] VRF : default Local Router-ID 2.2.2.2

Network

Nexthop

Metric

LocPrf Weight Path

----------------------------------------------------------------------------------

--------------------------

Route Distinguisher: 1.1.1.1:2

(L3VNI 10000)

*>i [2]:[0]:[0]:[00:50:56:96:7d:03]:[10.1.1.1]

1.1.1.1

0

100

0

?

*>i [2]:[0]:[0]:[00:50:56:96:7d:03]:[]

1.1.1.1

0

100

0

?

Total number of entries 3

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show running-config bgp
show running-config bgp [vsx-peer]
Description
This command shows all configured BGP commands.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

401

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
EVPN only applies to 8100, 8325, 8360, 9300, 6300 and 6400 series switches.

switch# show running-config bgp router bgp 65534.65535
bgp asnotation dotted network 2.2.2.0/24 neighbor 1.1.1.2 remote-as 65533.65535 address-family ipv4 unicast
neighbor 1.1.1.2 activate neighbor 1.1.1.2 route-map A out vrf v1 address-family l2vpn evpn neighbor 1.1.1.2 activate neighbor 1.1.1.2 send-community extended exit-address-family

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

timers bgp
timers bgp <KEEPALIVE> <HOLDTIME> no timers bgp <KEEPALIVE> <HOLDTIME>
Description
The command adjusts BGP network timers. The no form of this command resets the BGP timers to defaults of 60 seconds for the keepalive timer and 180 seconds for the holdtime timer.

BGP commands | 402

Parameter <KEEPALIVE>
<HOLDTIME>

Description
Sets the value for keepalive timer. Default: 60 seconds. Range: 065535.
Sets the value for holdtime timer. Default: 180 seconds. Range: 065535.

Usage
n The keepalive timer is the number of seconds a BGP peer waits for a keep-alive message from a BGP peer before deciding the connection is down.
The holdtime timer is the number of seconds a BGP peer waits after not receiving a keepalive, update, or notification message before declaring that a connection with BGP peer is down. n When a session is started, BGP negotiates holdtime with the neighbor, and selects the smaller value.
The keepalive timer is then set based on the negotiated holdtime and the configured keepalive time.
Examples

switch(config-bgp)# timers bgp 100 150 switch(config-bgp)# no timers bgp

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

vrf
vrf <VRF-NAME> no vrf <VRF-NAME>
Description
Creates a VRF instance named <VRF-NAME> and then enters its context. Use default for <VRF-NAME> to enter the default VRF configure context. Except for the default VRF, the no form of the command deletes the named VRF instance and any IP configuration for interfaces or SVI linked to default VRF. The default VRF cannot be deleted and a warning is given if attempted. To erase the Route-Distinguisher and Route-Targets, enter the default VRF context and delete them manually one by one.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

403

Parameter <VRF-NAME>

Description
Specifies the VRF name. Range: Up to 32 alphanumeric characters. The mgmt VRF cannot be used.

Examples
Creating the VRF named cust_A and then entering its context:

switch(config)# vrf cust_A

Entering the default VRF context:

switch(config)# vrf default

Deleting the VRF named test:

switch(config)# no vrf test

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.09 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Added default VRF information. --
Authority Administrators or local user group members with execution rights for this command.

BIDIR-PIM commands

ip pim-bidir
ip pim-bidir [enable | disable]
Description
Enables or disables PIM-Bidir in the designated interface. This command works in the interface context, including loopback. The IP address must be configured on the interface to enable BIDIR-PIM.

BIDIR-PIM commands | 404

Parameter [enable] [disable]

Description Enables PIM Bidirectional on the interface. Disables PIM Bidirectional on the interface.

Example
Enabling PIM-Bidir:
switch(config)# interface vlan40 switch(config-if-vlan)# ip address 40.0.0.4/24 switch(config-if-vlan)# ip pim-bidir enable
Disabling PIM-Bidir:
switch(config)# interface vlan40 switch(config-if-vlan)# ip address 40.0.0.4/24 switch(config-if-vlan)# ip pim-bidir disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification Command introduced
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ip pim-bidir hello-delay
ip pim-bidir hello-delay <DELAY-VALUE> no ip pim-bidir hello-delay <DELAY-VALUE>
Description
Changes the maximum time, in seconds, before the router transmits the initial PIM hello message on the current interface. The no form of this command removes the currently configured value and sets it to default. The default value is 5.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

405

Parameter <DELAY-VALUE>

Description Configures the given value as the hello interval. Range: <0-5>.

Usage
In cases where a new L3 interface activates with connections to multiple routers, if all of the connected routers sent hello packets at the same time, the receiving router could momentarily become overloaded. This value randomizes the transmission delay to a time between 0 and the hello delay setting. Using 0 means no delay. After the router sends the initial hello packet to a newly detected L3 interface, it sends subsequent hello packets according to the current Hello Interval setting.
Example
Changing the maximum time before the router transmits the initial PIM hello message on the current interface to 4 seconds:
switch(config)# interface vlan40 switch(config-if-vlan)# ip pim-bidir hello-delay 4
Removing the maximum time before the router transmits the initial PIM hello message on the current interface from 4 seconds and reverting to the default: Disabling hello-delay:
switch(config)# interface vlan40 switch(config-if-vlan)# no ip pim-bidir hello-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification Command introduced
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ip pim-bidir lan-prune-delay
ip pim-bidir lan-prune-delay no ip pim-bidir lan-prune-delay
Description

BIDIR-PIM commands | 406

Enables the LAN prune delay option on the current interface. The no form of this command disables the LAN prune delay option.
Usage
With LAN prune delay enabled, the router informs the downstream neighbors how long it waits before pruning a flow after receiving a prune request. Other downstream routers on the same subnet must send a join to override the prune before the LAN prune delay time for the flow to continue. This prompts any downstream neighbors with multicast receivers that continue to belong to the flow to reply with a join. If no joins are received after the LAN prune delay and override-interval period, the router prunes the flow. The propagation-delay and override-interval settings determine the LAN prune delay setting. It is enabled by default.
Example
Enabling the LAN prune delay option:
switch(config)# interface vlan40 switch(config-if-vlan)# ip pim-bidir lan-prune-delay
Disabling the LAN prune delay option:
switch(config)# interface vlan40 switch(config-if-vlan)# no ip pim-bidir lan-prune-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification Command introduced
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ip pim-bidir override-interval
ip pim-bidir override-interval <INTERVAL-VALUE> no ip pim-bidir override-interval <INTERVAL-VALUE>
Description
Configures the override interval that gets inserted into the Override Interval field of a LAN prune delay option. The no form of this command removes the currently configured value and sets it to the default. The default value is 2500 milliseconds.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

407

Parameter <INTERVAL-VALUE>

Description
Specifies override interval value. Range: 500-6000. Default: 2500.

Example
Configuring the override interval value to 4000:

switch(config)# interface vlan40 switch(config-if-vlan)# ip pim-bidir override-interval 4000

Removing the override interval value and setting to default:

switch(config)# interface vlan40 switch(config-if-vlan)# no ip pim-bidir override-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification Command introduced
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ip pim-bidir propagation-delay
ip pim-bidir propagation-delay <DELAY-VALUE> no ip pim-bidir propagation-delay <DELAY-VALUE>
Description
Configures the propagation delay that gets inserted into the propagation delay field of a LAN prune delay option. The no form of this command removes any configuration and resets to the default. Default: 500 milliseconds.

Parameter <DELAY-VALUE>

Description
Specifies the propagation delay in milliseconds. Range: 250-2000. Default: 500.

BIDIR-PIM commands | 408

Example
Configuring the propagation delay to to 400 milliseconds:
switch(config)# interface vlan40 switch(config-if-vlan)# ip pim-bidir propagation-delay 400
Removing the propagation delay and setting to default:
switch(config)# interface vlan40 switch(config-if-vlan)# no ip pim-bidir propagation-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification Command introduced
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

no ip pim-bidir
no ip pim-bidir
Description
Removes all PIM-Bidir configurations for the interface.
Example
Removing PIM-Bidir configurations for the interface:
switch(config)# interface vlan40 switch(config-if-vlan)# no ip pim-bidir

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

409

Release 10.13

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification Command introduced
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim dfe
show ip pim dfe [vrf <VRF-NAME> | all-vrfs]
Description
Displays the Designated Forwarder information for a given interface and RP address in the topology. This prints the winner address along with winner metric details to reach RPA and its uptime details for a given VRF. If a VRF is not specified, the default is displayed.

Parameter <VRF-NAME> [all-vrfs]

Description Specifies the VRF. Specifies all VRFs.

Example
Displaying the Designated Forwarder information for the default VRF:

switch# show ip pim dfe PIM BIDIR DFE Information

VRF

: default

Total number of DFE entries : 2

Interface (HH:MM:SS) vlan10 vlan30

RPA
1.1.1.1 1.1.1.1

DF Winner
10.1.1.3 30.1.1.1

Metric
100 0

Uptime
00:33:15 00:33:16

Displaying the Designated Forwarder information for VRF red:

switch# show ip pim dfe vrf red PIM BIDIR DFE Information

VRF

: red

Total number of DFE entries : 1

Interface

RPA

DF Winner

Metric

Uptime

BIDIR-PIM commands | 410

(HH:MM:SS)

vlan50

5.5.5.5

50.1.1.5

200

00:34:42

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim dfe
show ip pim dfe <INTERFACE-NAME> <RP-ADDRESS>
Description
Displays the Designated Forwarder information for all interfaces of an RP address in the topology. This prints the winner address along with winner metric details to reach RPA and its uptime details for a given VRF. If a VRF is not specified, the default is displayed.

Parameter <INTERFACE-NAME> <RP-ADDRESS>

Description Specifies the interface. Specifies the RP address.

Example
Displaying the Designated Forwarder information for 1.1.1.1:

switch# show ip pim dfe vlan10 1.1.1.1 PIM BIDIR DFE Information

VRF

: default

Interface (HH:MM:SS) vlan10

RPA 1.1.1.1

DF Winner 10.1.1.3

Metric 100

Uptime 00:33:15

For more information on features that use this command, refer to the Multicast Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

411

Command History

Release 10.13

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config pim
show running-config pim
Description
Displays the current running configuration in the router pim context.
Example
Displaying the current running configuration in the router pim context:
switch# show running-config pim router pim
enable rp-address 10.0.0.4 rp-candidate source-ip-interface loopback1 group-prefix 239.1.1.1/32 multicast-route-limit 1024 active-active anycast-rp source-directly-connected router pim vrf green enable rp-address 30.0.0.4 rp candidate source-ip-interface loopback1 group-prefix 224.0.0.0/4 multicast-route-limit 1024 active-active anycast-rp source-directly-connected interface loopback11 ip pim-bidir enable interface loopback44 ip pim-bidir enable interface vlan30 ip pim-bidir enable interface vlan500 ip pim-bidir enable

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

BIDIR-PIM commands | 412

Release 10.13

Modification BIDIR PIM introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

413

Chapter 13 Boot commands

Boot commands

boot fabric-module
boot fabric-module <SLOT-ID>
Description
Reboots the specified fabric module.
Parameter <SLOT-ID>

Description
Specifies the member and slot of the module in the format member/slot. For example, to specify the module in member 1 slot 3, enter 1/3.

Usage
The boot fabric-module command reboots the specified fabric module. Traffic performance is affected while the module is down. If the specified module is the only fabric module in an up state, rebooting that module stops traffic switching between line modules and the line modules power down. The line modules power up when one fabric module returns to an up state. This command is valid for fabric modules only.
Examples
Rebooting the fabric module in slot 1/3 when auto-confirm is not enabled:

switch# boot fabric-module 1/3 This command will reboot the specified fabric module. Traffic performance may be affected while the module is down. Rebooting the last fabric module will stop traffic switching between line modules. Do you want to continue (y/n)? y
switch#

Rebooting the fabric module in slot 1/1 when auto-confirm is enabled:

switch# boot fabric-module 1/3 This command will reboot the specified fabric module. Traffic performance may be affected while the module is down. Rebooting the last fabric module will stop traffic switching between line modules. Do you want to continue (y/n) y (auto-confirm)
switch#

AOS-CX 10.14 Command-Line Interface Guide

414

For more information on features that use this command, refer to the Fundamentals Guide or the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

boot line-module
boot line-module <SLOT-ID>
Description
Reboots the specified line module.
Parameter <SLOT-ID>

Description
Specifies the member and slot of the module in the format member/slot. For example, to specify the module in member 1 slot 3, enter 1/3.

Usage
This command is supported on switches that have multiple line modules. Reboots the specified line module. Any traffic for the switch passing through the affected module (SSH, TELNET, and SNMP) is interrupted. It can take up to 2 minutes to reboot the module. During that time, you can monitor progress by viewing the event log. This command is valid for line modules only.
Examples
Reloading the module in slot 1/1:

switch# boot line-module 1/1 This command will reboot the specified line module and interfaces on this module will not send or receive packets while the module is down. Any traffic passing through the line module will be interrupted. Management sessions connected through the line module will be affected. It might take up to 2 minutes to complete rebooting the module. During that time, you can monitor progress by viewing the event log. Do you want to continue (y/n)? y switch#

Boot commands | 415

For more information on features that use this command, refer to the Fundamentals Guide or the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

boot management-module
boot management-module {active | standby | <SLOT-ID>}
Description
Reboots the specified management module. Choose the management module to reboot by role (active or standby) or by slot number.

Parameter active standby <SLOT-ID>

Description
Selects the active management module.
Selects the standby management module.
Specifies the member and slot of the management module in the format member/slot. For example, to specify the module in member 1 slot 5, enter 1/5.

Usage
This command is supported on switches that have multiple management modules.
This command reboots a single management module in a chassis. Choose the management module to reboot by role (active or standby) or by slot number.
You can use the show images command to show information about the primary and secondary system images.
If you reboot the active management module and the standby management module is available, the active management module reboots and the standby management module becomes the active management module.
If you reboot the active management module and the standby management module is not available, you are warned, you are prompted to save the configuration, and you are prompted to confirm the operation.
If you reboot the standby management module, the standby management module reboots and remains the standby management module.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

416

If you attempt to reboot a management module that is not available, the boot command is aborted. Saving the configuration is not required. However, if you attempt to save the configuration and there is an error during the save operation, the boot command is aborted.
Hewlett Packard Enterprise recommends that you use the boot management-module command instead of pressing the module reset button to reboot a management module because if you are rebooting the only available management module, the boot management-module command enables you to save the configuration, cancel the reboot, or both.
Examples
Rebooting the active management module when the standby management module is available:
switch# boot management-module active The management-module in slot 1/5 is going down for reboot now.
Rebooting the active management module when the standby management module is not available:
switch# boot management-module 1/5 The management module in slot 1/5 is currently active and no standby management module was found. This will reboot the entire switch.
Do you want to save the current configuration (y/n)? n
This will reboot the entire switch and render it unavailable until the process is complete. Continue (y/n)? y The system is going down for reboot.

command, refer to the Fundamentals Guide or the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

boot management-module (recovery console)
boot management-module {local|remote}
Description

Boot commands | 417

Reboots the specified management module by specified location (local or remote).

Parameter <local>

Description Reboots the local management module.

<remote>

Reboots the remote management module.

Usage
This command is supported on switches that have multiple management modules. This command reboots a single management module in a chassis. Choose the management module to reboot by role (active or standby) or by slot number. You can use the show images command to show information about the primary and secondary system images. If you reboot the active management module and the standby management module is available, the active management module reboots and the standby management module becomes the active management module. If you reboot the active management module and the standby management module is not available, you are warned, you are prompted to save the configuration, and you are prompted to confirm the operation. If you reboot the standby management module, the standby management module reboots and remains the standby management module. If you attempt to reboot a management module that is not available, the boot command is aborted. Saving the configuration is not required. However, if you attempt to save the configuration and there is an error during the save operation, the boot command is aborted.
Hewlett Packard Enterprise recommends that you use the boot management-module command instead of pressing the module reset button to reboot a management module because if you are rebooting the only available management module, the boot management-module command enables you to save the configuration, cancel the reboot, or both.
Examples
Booting a remote management module:
switch# boot management-module remote There is no other management module installed. Aborting. switch#

command, refer to the Fundamentals Guide or the Monitoring Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

418

Release 10.12

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

boot set-default
boot set-default {primary | secondary}

Description
Sets the default operating system image to use when the system is booted.

Parameter primary secondary

Description Selects the primary network operating system image. Selects the secondary network operating system image.

Example
Selecting the primary image as the default boot image:

switch# boot set-default primary Default boot image set to primary.

For more information on features that use this command, refer to the Fundamentals Guide or the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

Boot commands | 419

boot system
boot system [primary | secondary | serviceos]
Description
Reboots all modules on the switch. By default, the configured default operating system image is used. Optional parameters enable you to specify which system image to use for the reboot operation and for future reboot operations.

Parameter primary
secondary serviceos

Description
Selects the primary operating system image for this reboot and sets the configured default operating system image to primary for future reboots.
Selects the secondary operating system image for this reboot and sets the configured default operating system image to secondary for future reboots.
Selects the service operating system for this reboot. Does not change the configured default operating system image. The service operating system acts as a standalone bootloader and recovery OS for switches running the AOS-CX operating system and is used in rare cases when troubleshooting a switch.

Usage
This command reboots the entire system. If you do not select one of the optional parameters, the system reboots from the configured default boot image. You can use the show images command to show information about the primary and secondary system images. Choosing one of the optional parameters affects the setting for the default boot image:
n If you select the primary or secondary optional parameter, that image becomes the configured default boot image for future system reboots. The command fails if the switch is not able to set the operating system image to the image you selected.
You can use the boot set-default command to change the configured default operating system image. n If you select serviceos as the optional parameter, the configured default boot image remains the same, and the system reboots all management modules with the service operating system.
If the configuration of the switch has changed since the last reboot, when you execute the boot system command you are prompted to save the configuration and you are prompted to confirm the reboot operation. Saving the configuration is not required. However, if you attempt to save the configuration and there is an error during the save operation, the boot system command is aborted.
Examples
Rebooting the system from the configured default operating system image:

switch# boot system Do you want to save the current configuration (y/n)? y The running configuration was saved to the startup configuration.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

420

This will reboot the entire switch and render it unavailable until the process is complete. Continue (y/n)? y The system is going down for reboot. The system is going down for reboot.
Rebooting the system from the secondary operating system image, setting the secondary operating system image as the configured default boot image:
switch# boot system secondary Default boot image set to secondary.
Do you want to save the current configuration (y/n)? n
This will reboot the entire switch and render it unavailable until the process is complete. Continue (y/n)? y The system is going down for reboot.
Canceling a system reboot:
switch# boot system
Do you want to save the current configuration (y/n)? n
This will reboot the entire switch and render it unavailable until the process is complete. Continue (y/n)? n Reboot aborted. switch#

For more information on features that use this command, refer to the Fundamentals Guide or the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show boot-history
show boot-history [all|{vsf member <1-10>}]
Description

Boot commands | 421

Shows boot history information. When no parameters are specified, shows the most recent information about the current boot operation, and the three previous boot operations for the switch. When the all parameter is specified, the output of this command shows the boot information for the active management module. For switches that support line modules (such as 6400 switch series) including the all parameter displays information for the active management module and all available line modules.
To view boot-history on a standby, the command must be sent on the conductor console.

Parameter all
vsf member <1-10>

Description
Optional. Shows boot information for the active management module. For switches that support line modules, including this parameter displays information for and all available line modules.
Optional. Display boot history for the specified VSF member

Usage
This command displays the boot-index, boot-ID, and up time in seconds for the current boot. If there is a previous boot, it displays boot-index, boot-ID, reboot time (based on the time zone configured in the system) and reboot reasons. Previous boot information is displayed in reverse chronological order. The output of this command includes the following information:

Parameter Index Boot ID Current Boot, up for <time>
<Timestamp>: boot reason

Description
The position of the boot in the history file. Range: 0 to 3.
A unique ID for the boot . A system-generated 128bit string.
For the current boot, the show boot-history command shows the number of seconds the module has been running on the current software.
For previous boot operations, the show boothistory command shows the time at which the operation occurred and the reason for the boot. The reason for the boot is one of the following values: n <DAEMON-NAME> crash: The daemon identified
by <DAEMON-NAME> caused the module to boot. n Kernel crash: The operating system software
associated with the module caused the module to boot. n Uncontrolled reboot: The reason for the reboot is not known. n Reboot requested through database: The reboot occurred because of a request made through the CLI or other API. For details, see , show boot-history

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

422

Table 1: Description of reboots handled through the database

Boot History String

Description

Reboot requested by user

A user requested a switch reboot through the CLI or web UI.

Reset button pressed

The switch detected a short-press of the reset button

Backplane fault

A backplane fault occurred.

Configuration change

A configuration change resulted in a reboot.

Configuration version migration

A configuration version migration occurred which required a reboot.

Console error

The console failed to start.

Fabric fault

A fabric fault occurred.

All line modules faulted

A zero line card condition occurred.

Redundancy switchover requested

A user requested a redundancy switchover.

Redundant Management communication timeout

The standby management module has taken over from an unresponsive active management module.

Redundant Management election timeout

A failure to elect a standby management module in the allotted time.

Critical service fault (error)

A daemon critical to switch operation has stopped functioning. An extra error string may be present to describe the error in detail.

VSF autojoin renumber

Reset triggered by VSF autojoin.

VSF member renumbered

A user requested a renumber of a VSF member.

VSF switchover requested

A user requested a VSF switchover.

VSX software update

Reset triggered by a VSX software update.

Chassis critical temperature Chassis operating temperature exceeded.

Chassis low critical temperature

Chassis temperature below the minimum operating threshold.

Chassis insufficient fans

Insufficient fans to cool the chassis.

Chassis unsupported PSUs/fans

Unsupported or misconfigured PSUs or system fans.

Management module critical Management module operating temperature exceeded. temperature

ISSU SMM update

Standby management module reboot triggered by an In-Service Software Upgrade (ISSU).

ISSU switchover

Redundancy switchover triggered by an In-Service Software Upgrade.

Boot commands | 423

Boot History String ISSU aborted
Rollback timer expired

Description
Standby management module reset triggered by failure during an In-Service Software Upgrade.
Reset triggered by the ISSU rollback timer expiring.

Examples
Showing the boot history of the active management module:

switch# show boot-history Management module =================
Index : 2 Boot ID : c34a2c2499004a02bbeeff4992e1fdbd Current Boot, up for 1 days 13 hrs 13 mins 27 secs
Index : 1 Boot ID : bfba9bc486304e57904ac717a0ccbdcd 02 Sep 23 02:55:33 : CPU request reset with 0x20201, Version: FL.10.14.0000-1619ga9ec1805bd442~dirty 02 Sep 23 02:55:33 : Switch boot count is 2
Index : 0 Boot ID : a88a71b7ca9a4574af7e3b811ddfdc7e 02 Sep 23 02:49:26 : Reboot requested by user, Version: FL.10.14.0000-1619ga9ec1805bd442~dirty 02 Sep 23 02:50:02 : Switch boot count is 1
Index : 3 Boot ID : f00ba10c8c44457f83fee303d014a89a 25 Aug 23 10:27:42 : Power on reset with 0x1, Version: FL.10.14.0000-1465g9df95249d06b0~dirty 25 Aug 23 10:28:18 : Switch boot count is 3 25 Aug 23 10:29:02 : Primary overtemperature fault detected with 0x2 in PSU 1/1

(For 6400 Switch series) Showing the boot history of the active management module and all line modules:

switch# Management module =================
Index : 3 Boot ID : f1bf071bdd04492bbf8439c6e479d612 Current Boot, up for 22 hrs 12 mins 22 secs
Index : 2 Boot ID : edfa2d6598d24e989668306c4a56a06d 07 Aug 18 16:28:01 : Reboot requested through database
Index : 1 Boot ID : 0bda8d0361df4a7e8e3acdc1dba5caad 07 Aug 18 14:08:46 : Reboot requested through database
Index : 0 Boot ID : 23da2b0e26d048d7b3f4b6721b69c110

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

424

07 Aug 18 13:00:46 : Reboot requested through database
Line module 1/1 ================= Index : 3 10 Aug 17 12:45:46 : dune_agent crashed ...
Management module =================
Index : 3 Boot ID : f1bf071bdd04492bbf8439c6e479d612 Current Boot, up for 22 hrs 12 mins 22 secs
Index : 2 Boot ID : edfa2d6598d24e989668306c4a56a06d 07 Aug 18 16:28:01 : Reboot requested through database
Index : 1 Boot ID : 0bda8d0361df4a7e8e3acdc1dba5caad 07 Aug 18 14:08:46 : Reboot requested through database
Index : 0 Boot ID : 23da2b0e26d048d7b3f4b6721b69c110 07 Aug 18 13:00:46 : Reboot requested through database
Line module 1/1 ================= Index : 3 10 Aug 17 12:45:46 : dune_agent crashed ...
In the event of a reset triggered by a power supply unit (PSU), or a PSU input fault, the output of this command also displays information about why the PSU initiated a reboot. The following example displays the boot history of a switch with a reboot initiated by a PSU.
switch# show boot-history
Management module ================= Index : 2 Boot ID : a61ad00d10864c748bc7893a5d4af2e4 15 Dec 23 19:02:02 : Power on reset with 0x1, Version: FL.10.13.1000AF
15 Dec 23 19:02:02 : Switch boot count is 0 15 Dec 23 19:02:17 : PSU 1/1: Fault detected
Index : 1 Boot ID : 30d831bbfdfa425baf50a629ee01b185 15 Dec 23 19:01:58 : Power on reset with 0x1, Version: FL.10.13.1000AF 15 Dec 23 19:01:58 : Switch boot count is 0
The following example displays the boot history for the VSF member 2.
switch# show boot-history vsf member 2
Member-2 =========
Boot commands | 425

Index : 0 Boot ID : df99026c194a44f1944a3e7685fb4d90 Current Boot, up for 3 hrs 31 mins 39 secs
Index : 3 Boot ID : 7bf4104903fe4ad1ba4bce40e8099c76 10 Aug 17 10:02:24 : Reboot requested through database 10 Aug 17 10:02:13 : Switch boot count is 2

For more information on features that use this command, refer to the Fundamentals Guide or the Monitoring Guide for your switch model.

Command History
Release 10.13.1000

10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification The output of this command is enhanced to display additional information about the reason for the reboot, if available. --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

426

Chapter 14 Cable diagnostic commands

Cable diagnostic commands
diag cable-diagnostic
diag cable-diagnostic test <IF-NAME> show <IF-NAME> clear <IF-NAME>
Description
Provides information about the cable health after running a diagnostic test on an interface. If you run a new cable diagnostic command when a cable diagnostic is in progress for the interface, the new cable diagnostic command fails to execute. In such a scenario, an error message is displayed. On executing a cable diagnostic test command, it automatically clears the old test results before the new test starts.

Parameter <IF-NAME> test <IF-NAME> show <IF-NAME> clear <IF-NAME>

Description Specifies the name of the interface. Runs a cable diagnostic test on an interface. Displays the diagnostic test result for an interface. Clears the cable diagnostic test results for an interface.

Examples
On the 6400 Switch Series, interface identification differs. The following example displays running a cable diagnostic test on interface 1/3/1:

switch# diag cable-diagnostic test 1/3/1 This command will cause a loss of link on the port under test and will take several seconds to complete. Continue (y/n)? y

The following example displays the error message on executing a cable diagnostic command while the current diagnostic test is in progress:

switch# diag cable-diagnostic test 1/3/1 A cable diagnostic test for interface 1/3/1 is already in progress.

The following example displays the error message when cable diagnostic test is requested for an unsupported port:

AOS-CX 10.14 Command-Line Interface Guide

427

switch# diag cable-diagnostic test 1/3/1 Cable diagnostic is not supported on interface 1/3/1.

The following examples display the cable diagnostic test result for 1GbT interface:

switch# diag cable-diagnostic show 1/3/1

Cable

Impedance Distance* MDI

Interface

Pinout Status

(Ohms)

(Meters) Mode

--------------------------------------------------------------------

1/3/1

1-2

good

85-115

10 +/- 10 mdi

(1GbT)

3-6

good

85-115

10 +/- 10 mdi

4-5

good

85-115

5 +/- 10 mdi

7-8

good

85-115

3 +/- 10 mdi

* Full cable length for good cables or distance to fault for faulty cables.

Cable status legend (1GbT):

Cable

Impedance

Status

(Ohms)

Description

----------------------------------------------------------------

good

85-115

No cable faults found

open

>115

Open circuit detected

intra-short <85

Short circuit within the same wire pair

inter-short <85

Short circuit with another wire pair

high-imp

>115

Cable impedance higher than expected

low-imp

<85

Cable impedance lower than expected

unknown

--

Cable test inconclusive

The following examples display the cable diagnostic test result for 5G-SmartRate interface:

switch# diag cable-diagnostic show 1/1/20

Cable

Impedance Distance* MDI

Interface

Pinout Status

(Ohms)

(Meters) Mode

--------------------------------------------------------------------

1/1/20

1-2

good

85-115

--

mdi

(5G-SmartRate) 3-6

open

>300

4 +/- 5 mdi

4-5

open

>300

4 +/- 5 mdi

7-8

high-imp

>115

3 +/- 5 mdi

* Full cable length for good cables or distance to fault for faulty cables.

Cable status legend (5G-SmartRate):

Cable

Impedance

Status

(Ohms)

Description

----------------------------------------------------------------

good

85-115

No cable faults found

open

>300

Open circuit detected

intra-short <30

Short circuit within the same wire pair

inter-short <30

Short circuit with another wire pair

high-imp

>115

Cable impedance higher than expected

low-imp

<85

Cable impedance lower than expected

unknown

--

Cable test inconclusive

The following example displays the error message when you execute a cable diagnostic command while the current diagnostic test is in progress:

Cable diagnostic commands | 428

switch# diag cable-diagnostic show 1/3/1 A cable diagnostic test for interface 1/3/1 is currently in progress.
The following example displays the error message when cable diagnostic test result is not available:
switch# diag cable-diagnostic show 1/3/1 Cable diagnostic test results for interface 1/3/1 are not available.
The following example clears the cable diagnostic test results for the specified interface:
switch# diag cable-diagnostic clear 1/3/1
The following example displays the error message when you execute a cable diagnostic command while the current diagnostic test is in progress:
switch# diag cable-diagnostic clear 1/3/1 A cable diagnostic test for interface 1/3/1 is currently in progress.

Running a cable diagnostic test will result in a brief interruption in connectivity on all tested ports. If a good cable is used on the SmartRate ports, the Distance to Fault (Meters) value is 0.

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

429

Chapter 15 Captive portal (RADIUS) commands

Captive portal (RADIUS) commands

aaa authentication port-access captive-portal-profile
aaa authentication port-access captive-portal-profile <PROFILE-NAME> no aaa authentication port-access captive-portal-profile <PROFILE-NAME>
Description
Creates the specified captive portal profile (if it does not yet exist) and then enters its context. For existing captive portal profiles, this command enters the context of the specified captive portal profile. The no form of this command deletes the specified captive portal profile.

Parameter <PROFILE-NAME>

Description Specifies the captive portal profile name. From 2 to 64 characters.

Examples
Creating a captive portal profile named employee and entering its context for additional configuration:

switch(config)# aaa authentication port-access captive-portal-profile employee switch(config-captive-portal)# url http://1.1.1.1/employee/captiveportal.php switch(config-captive-portal)# switch(config-captive-portal)# url-hash-key plaintext cjQrJ9#$erty switch(config-captive-portal)# switch(config-captive-portal)# exit switch(config)#

Deleting the captive portal profile named employee:

switch(config)# no aaa authentication port-access captive-portal-profile employee switch(config)#

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide

430

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

show port-access captive-portal-profile
show port-access captive-portal-profile [name <PROFILE-NAME>]
Description
Shows the configuration information for all captive portal profiles or a particular captive portal profile.

Parameter <PROFILE-NAME>

Description Specifies the captive portal profile name. From 2 to 64 characters.

Example
Showing IPv4 local captive portal profile configuration information:

switch# show port-access captive-portal-profile name employee

Captive Portal Profile Configuration

Name Type URL URL Hash Key

: employee : local : http://1.1.1.1/employee/captiveportal.php : SWNGWyMeYubHPDgVIirpEUwNK5Uf+r1vmhBIncQPw1Y=

Showing IPv6 local captive portal profile configuration information:

switch# show port-access captive-portal-profile name CP6

Captive Portal Profile Configuration

Name Type URL URL Hash Key

: CP6 : local : https://[2000::3]/guest/captive_portal.php : SWNGWyMeYubHPDgVIirpEUwNK5Uf+r1vmhBIncQPw1Y=

Showing IPv6 DUR captive portal profile configuration information):

switch# show port-access captive-portal-profile name CP6_DUR_GUEST_ROLE

Captive Portal Profile Configuration

Name Type URL

: CP6_DUR_GUEST_ROLE : downloaded : https://[2030:1::40]/guest/captive_portal_2.php

Showing IPv6 RADIUS VSA captive portal profile configuration information:

Captive portal (RADIUS) commands | 431

switch# show port-access captive-portal-profile name RADIUS_2259748436

Captive Portal Profile Configuration

Name Type URL

: RADIUS_2259748436 : radius : https://[2030:1::40]/guest/captive_portal_2.php

Showing all captive portal profile configuration information):

switch# show port-access captive-portal-profile

Captive Portal Profile Configuration

Name Type URL URL Hash Key

: CP6 : local : https://[2000::3]/guest/captive_portal.php : SWNGWyMeYubHPDgVIirpEUwNK5Uf+r1vmhBIncQPw1Y=

Name Type URL

: CP6_DUR_GUEST_ROLE : downloaded : https://[2030:1::40]/guest/captive_portal_2.php

Name Type URL

: RADIUS_2259748436 : radius : https://[2030:1::40]/guest/captive_portal_2.php

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

url
url <URL> no url
Description
Within the captive portal context, defines the captive portal URL. The no form of this command deletes the captive portal URL.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

432

Parameter <URL>

Description
Specifies the captive portal URL as an IPv4 or IPv6 address or a fully-qualified domain name. Up to 1024 characters.

Examples
Creating a captive portal profile named employee and then setting its IPv4 redirect URL:

switch(config)# aaa authentication port-access captive-portal-profile employee switch(config-captive-portal)# url http://1.1.1.1/employee/captiveportal.php switch(config-captive-portal)# switch(config-captive-portal)# exit switch(config)#

Entering the captive portal profile employee and then deleting its URL:

switch(config)# aaa authentication port-access captive-portal-profile employee switch(config-captive-portal)# no url switch(config-captive-portal)# switch(config-captive-portal)# exit switch(config)#

Creating a captive portal profile named CP6 and then setting its IPv6 redirect URL:

switch(config)# aaa authentication port-access captive-portal-profile CP6 switch(config-captive-portal)# url https://[2000::3]/guest/captive_portal.php switch(config-captive-portal)# switch(config-captive-portal)# exit switch(config)#

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-captive-portal

Authority
Administrators or local user group members with execution rights for this command.

url-hash-key
url-hash-key [{plaintext | ciphertext} <HASH-KEY>] no url-hash-key

Captive portal (RADIUS) commands | 433

Description
Within the captive portal context, defines the captive portal URL hash key.

When this command is entered without parameters, plaintext hash key prompting occurs upon pressing Enter. The entered hash key characters are masked with asterisks.
The no form of this command deletes the captive portal URL hash key.

Parameter {plaintext | ciphertext}
<HASH-KEY>

Description
Selects the URL hash key type as either plaintext or ciphertext.
Specifies the captive portal URL hash key. Up to 128 characters.

Examples
Creating a captive portal profile named employee and then setting its URL and URL hash key:

switch(config)# aaa authentication port-access captive-portal-profile employee switch(config-captive-portal)# url http://1.1.1.1/employee/captiveportal.php switch(config-captive-portal)# switch(config-captive-portal)# url-hash-key plaintext cjQrJ9#$erty switch(config-captive-portal)#

Creating a captive portal profile named guest and then setting its URL and entering the URL hash key when prompted:

switch(config)# aaa authentication port-access captive-portal-profile guest switch(config-captive-portal)# url http://1.1.1.1/guest/captiveportal.php switch(config-captive-portal)# switch(config-captive-portal)# url-hash-key Enter the URL Hash-Key: **** Re-Enter the URL Hash-Key: **** switch(config-captive-portal)#

Entering the captive portal profile employee and then deleting its URL hash key:

switch(config)# aaa authentication port-access captive-portal-profile employee switch(config-captive-portal)# no url-hash-key switch(config-captive-portal)#

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

434

Platforms
6300 6400

Command context config-captive-portal

Authority
Administrators or local user group members with execution rights for this command.

Captive portal (RADIUS) commands | 435

Chapter 16 CDP commands

CDP commands
cdp
cdp
Description
Configures CDP support globally on all active interfaces or on a specific interface. By default, CDP is enabled on all active interfaces. When CDP is enabled, the switch adds entries to its CDP Neighbors table for any CDP packets it receives from neighboring CDP devices. When CDP is disabled, the CDP Neighbors table is cleared and the switch drops all inbound CDP packets without entering the data in the CDP Neighbors table. The no form of this command disables CDP support globally on all active interfaces or on a specific interface.
Examples
Enabling CDP globally:
switch(config)# cdp
Disabling CDP globally:
switch(config)# no cdp
Enabling CDP on interface 1/1/1:
switch(config)# interface 1/1/1s switch(config-if)# cdp
Disabling CDP on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no cdp
For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide

436

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

clear cdp counters
clear cdp counters
Description
Clears CDP counters.
Examples
Clearing CDP counters:
switch(config) clear cdp counters

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

clear cdp neighbor-info
clear cdp neighbor-info
Description
Clears CDP neighbor information.
Examples

CDP commands | 437

Clearing CDP neighbor information: switch(config) clear neighbor-info

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show cdp
show cdp
Description
Shows CDP information for all interfaces.
Examples
On the 6400 Switch Series, interface identification differs. Showing CDP information:

switch(config)# show cdp

CDP Global Information

======================

CDP

: Enabled

CDP Mode

: Rx only

CDP Hold Time : 180 seconds

Port -------1/1/1 1/1/2 1/1/3 1/1/4 1/1/5 1/1/6 1/1/7 1/1/8 1/1/9 1/1/10

CDP --------------
Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

438

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show cdp neighbor-info
show cdp neighbor-info <INTERFACE-ID>
Description
Shows CDP information for all neighbors or for CDP information on a specific interface.

Parameter <INTERFACE-ID>

Description Specifies an interface. Format: member/slot/port.

Examples
On the 6400 Switch Series, interface identification differs. Showing all CDP neighbor information:

switch(config)# show cdp neighbor-info

Total Neighbor Entries : 1

Port

Device ID

Platform

Capability

---------------------------------------------------------------------------

1/1/1

Aruba-3810M-24G-1-slot... Aruba Sw

S

Showing CDP information for interface 1/1/1:

switch(config)# show cdp neighbor-info 1/1/1

Local Port

: 1/1/1

MAC

: 70:10:6f:86:78:7f

Device ID

: Aruba-3810M-24G-1-slot(70106f-867800)

Address

: 127.0.0.1

Platform

: Aruba Sw

Duplex

: half

Version

: Revision KB.16.07.0002, ROM KB.16.01....

Capability

: switch

CDP commands | 439

Native VLAN

:1

Voice VLAN Support : No

Neighbor Port-ID : 1

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show cdp traffic
show cdp traffic
Description
Shows CDP statistics for each interface.
Examples
On the 6400 Switch Series, interface identification differs. Showing CDP traffic statistics:

switch(config)# show cdp traffic

CDP Statistics

====================

Port

Transmitted Frames

Received Frames

Discarded Frames

--------------------------------------------------------------------------------

1/1/1

0

4

0

1/1/2

0

0

0

1/1/3

0

2

0

1/1/4

0

0

0

1/1/5

0

0

0

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

440

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show cdp voice-vlan mode
show cdp voice-vlan mode
Description
Shows CDP voice-vlan and mode.
Examples
On the 6400 Switch Series, interface identification differs. Showing CDP voice-vlan and mode:

switch(config)# show cdp voice-vlan mode

CDP voice VLAN mode

====================

Port

Voice VLAN

Mode

-------- -----------

----------

1/1/1

N/A

Rx only

1/1/2

N/A

Rx only

1/1/3

N/A

Rx only

1/1/4

N/A

Rx only

1/1/5

N/A

Rx only

1/1/6

N/A

Rx only

1/1/7

N/A

Rx only

1/1/8

N/A

Rx only

1/1/9

N/A

Rx only

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

CDP commands | 441

Platforms All platforms

Command context config

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

442

Chapter 17 Checkpoint commands

Checkpoint commands

checkpoint auto
checkpoint auto <TIME-LAPSE-INTERVAL>
Description
Starts auto checkpoint mode. In auto checkpoint mode, the switch temporarily saves the runtime configuration as a checkpoint only for the specified time lapse interval. Configuration changes must be saved before the interval expires, otherwise the runtime configuration is restored from the temporary checkpoint.

Parameter <TIME-LAPSE-INTERVAL>

Description Specifies the time lapse interval in minutes. Range: 1 to 60.

Usage
To save the runtime checkpoint permanently, run the checkpoint auto confirm command during the time lapse interval. The filename for the saved checkpoint is named AUTO <YYYYMMDDHHSS>. If the checkpoint auto confirm command is not entered during the specified time lapse interval, the previous runtime configuration is restored.
Examples
Confirming the auto checkpoint:

switch# checkpoint auto 20 Auto checkpoint mode expires in 20 minute(s) switch# WARNING Please "checkpoint auto confirm" within 2 minutes switch# checkpoint auto confirm checkpoint AUTO20170801011154 created

In this example, the runtime checkpoint was saved because the checkpoint auto confirm command was entered within the value set by the time-lapse-interval parameter, which was 20 minutes.
Not confirming the auto checkpoint:

switch# checkpoint auto 20 Auto checkpoint mode expires in 20 minute(s) switch# WARNING Please "checkpoint auto confirm" within 2 minutes WARNING: Restoring configuration. Do NOT add any new configuration. Restoration successful

In this example, the runtime checkpoint was reverted because the checkpoint auto confirm command was not entered within the value set by the time-lapse-interval parameter, which was 20 minutes.

AOS-CX 10.14 Command-Line Interface Guide

443

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

checkpoint auto confirm
checkpoint auto confirm
Description
Signals to the switch to save the running configuration used during the auto checkpoint mode. This command also ends the auto checkpoint mode.
Usage
To save the runtime checkpoint permanently, run the checkpoint auto confirm command during the time lapse value set by the checkpoint auto TIME-LAPSE-INTERVAL command. The generated checkpoint name will be in the format AUTO <YYYYMMDDHHSS>. If the checkpoint auto confirm command is not entered during the specified time lapse interval, the previous runtime configuration is restored.
Examples
Confirming the auto checkpoint:
switch# checkpoint auto confirm

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Checkpoint commands | 444

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

checkpoint diff
checkpoint diff {<CHECKPOINT-NAME1> | running-config | startup-config} {<CHECKPOINT-NAME2> | running-config | startup-config}
Description
Shows the difference in configuration between two configurations. Compare checkpoints, the running configuration, or the startup configuration.

Parameter {<CHECKPOINT-NAME1> | running-config | startup-config}
{<CHECKPOINT-NAME2> | running-config | startup-config}

Description
Selects either a checkpoint, the running configuration, or the startup configuration as the baseline.
Selects either a checkpoint, the running configuration, or the startup configuration to compare.

Usability The output of the checkpoint diff command has several symbols:
n The plus sign (+) at the beginning of a line indicates that the line exists in the comparison but not in the baseline.
n The minus sign (-) at the beginning of a line indicates that the line exists in the baseline but not in the comparison.
Examples
In the following example, the configurations of checkpoints cp1 and cp2 are displayed before the checkpoint diff command, so that you can see the context of the checkpoint diff command.

switch# show checkpoint cp1 Checkpoint configuration: ! !Version AOS-CX XL.10.00.0002 !Schema version 0.1.8 module 1/1 product-number jl363a ! ! ! ! ! ! ! vlan 1,200 interface 1/1/1
no shutdown ip address 1.0.0.1/24

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

445

interface 1/1/2 no shutdown ip address 2.0.0.1/24
switch# show checkpoint cp2 Checkpoint configuration: ! !Version AOS-CX XL.10.00.0002 !Schema version 0.1.8 module 1/1 product-number jl363a ! ! ! ! ! ! ! vlan 1,200,300 interface 1/1/1
no shutdown ip address 1.0.0.1/24 interface 1/1/2 no shutdown ip address 2.0.0.1/24
switch# checkpoint diff cp1 cp2 --- /tmp/chkpt11501550258421 2017-08-01 01:17:38.420514016 +0000 +++ /tmp/chkpt21501550258421 2017-08-01 01:17:38.420514016 +0000 @@ -9,7 +9,7 @@
! ! ! -vlan 1,200 +vlan 1,200,300 interface 1/1/1
no shutdown ip address 1.0.0.1/24
switch# checkpoint diff chkpt01 chkpt02 --- /tmp/chkpt011607564301327 +++ /tmp/chkpt021607564301353 @@ -1,7 +1,7 @@
! !Version AOS-CX PL.10.06.0100V !export-password: default -hostname Switch +hostname Switch1 user admin group administrators password ciphertext AQBapTyg9tpaiAaTfSVV5eNdFzOORRvZ6CMpglh1P+LQUHQLYgAAAGAhmRqFbkNvrgy2SBVk7H8C5hvg/I ib8rWYFZLEaSCrobNP9EwMu+hLNM0xmsh45yG8dncP7WkxjwrW4p4Qra6dVfr0EW8xh/lpQf8F/2Wki20L c9JLXiYge7ti0H6cVn+G radius-server tracking interval 60 no usb
switch#
For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History
Checkpoint commands | 446

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

checkpoint post-configuration
checkpoint post-configuration
no checkpoint post-configuration
Description
Enables creation of system generated checkpoints when configuration changes occur. This feature is enabled by default. The no form of this command disables system generated checkpoints.
Usage
System generated checkpoints are automatically created by default. Whenever a configuration change occurs, the switch starts a timeout counter (300 seconds by default). For each additional configuration change, the timeout counter is restarted. If the timeout expires with no additional configuration changes being made, the switch generates a new checkpoint. System generated checkpoints are named with the prefix CPC followed by a time stamp in the format <YYYYMMDDHHMMSS>. For example: CPC20170630073127. System checkpoints can be applied using the checkpoint rollback feature or copy command. A maximum of 32 system checkpoints can be created. Beyond this limit, the newest system checkpoint replaces the oldest system checkpoint.
Examples
Enabling system checkpoints:
switch(config)# checkpoint post-configuration
Disabling system checkpoints:
switch(config)# no checkpoint post-configuration

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

447

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

checkpoint post-configuration timeout
checkpoint post-configuration timeout <TIMEOUT>
no checkpoint post-configuration timeout <TIMEOUT>
Description
Sets the timeout for the creation of system checkpoints. The timeout specifies the amount of time since the latest configuration for the switch to create a system checkpoint. The no form of this command resets the timeout to 300 seconds, regardless of the value of the <TIMEOUT> parameter.

Parameter timeout <TIMEOUT>

Description Specifies the timeout in seconds. Range: 5 to 600. Default: 300.

Examples
Setting the timeout for system checkpoints to 60 seconds:

switch(config)# checkpoint post-configuration timeout 60

Resetting the timeout for system checkpoints to 300 seconds:

switch(config)# no checkpoint post-configuration timeout 1

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Checkpoint commands | 448

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

checkpoint rename
checkpoint rename <OLD-CHECKPOINT-NAME> <NEW-CHECKPOINT-NAME>
Description
Renames an existing checkpoint.

Parameter <OLD-CHECKPOINT-NAME> <NEW-CHECKPOINT-NAME>

Description
Specifies the name of an existing checkpoint to be renamed.
Specifies the new name for the checkpoint. The checkpoint name can be alphanumeric. It can also contain underscores (_) and dashes (-).
NOTE: Do not start the checkpoint name with CPC because it is used for systemgenerated checkpoints.

Examples
Renaming checkpoint ckpt1 to cfg001:
switch# checkpoint rename ckpt1 cfg001

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

checkpoint rollback
checkpoint rollback {<CHECKPOINT-NAME> | startup-config}

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

449

Description
Applies the configuration from a pre-existing checkpoint or the startup configuration to the running configuration.

Parameter <CHECKPOINT-NAME>
startup-config

Description Specifies a checkpoint name. Specifies the startup configuration.

Examples
Applying a checkpoint named ckpt1 to the running configuration:

switch# checkpoint rollback ckpt1 Success

Applying a startup checkpoint to the running configuration:

switch# checkpoint rollback startup-config Success

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

copy checkpoint <CHECKPOINT-NAME> <REMOTE-URL>
copy checkpoint <CHECKPOINT-NAME> <REMOTE-URL> [vrf <VRF-NAME>]
Description
Copies a checkpoint configuration to a remote location as a file. The configuration is exported in checkpoint format, which includes switch configuration and relevant metadata.

Checkpoint commands | 450

Parameter <CHECKPOINT-NAME> <REMOTE-URL>
vrf <VRF-NAME>

Description
Specifies the name of a checkpoint.
Specifies the remote destination and filename using the syntax: TFTP format:
tftp://<IP-ADDR>[:<PORT-NUM>] [;blocksize=<Value>]/<FILENAME>
SFTP format: sftp://<USERNAME>@<IP-ADDR> [:<PORT-NUM>]/<FILENAME>
SCP format: scp://USER@{IP|HOST}[:PORT]/FILE
Specifies a VRF name.

Examples
Copying checkpoint configuration to remote file through TFTP:

switch# copy checkpoint ckpt1 tftp://192.168.1.10/ckptmeta vrf default ######################################################################### 100.0% Success

Copying checkpoint configuration to remote file through SFTP:

switch# copy checkpoint ckpt1 sftp://root@192.168.1.10/ckptmeta vrf default The authenticity of host '192.168.1.10 (192.168.1.10)' can't be established. ECDSA key fingerprint is SHA256:FtOm6Uxuxumil7VCwLnhz92H9LkjY+eURbdddOETy50. Are you sure you want to continue connecting (yes/no)? yes root@192.168.1.10's password: sftp> put /tmp/ckptmeta ckptmeta Uploading /tmp/ckptmeta to /root/ckptmeta Warning: Permanently added '192.168.1.10' (ECDSA) to the list of known hosts. Connected to 192.168.1.10. Success

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

451

copy checkpoint <CHECKPOINT-NAME> {running-config | startup-config}
copy checkpoint <CHECKPOINT-NAME> {running-config | startup-config}
Description
Copies an existing checkpoint configuration to the running configuration or to the startup configuration.

Parameter

Description

<CHECKPOINT-NAME>

Specifies the name of an existing checkpoint.

{running-config | startup-config}

Selects whether the running configuration or the startup configuration receives the copied checkpoint configuration. If the startup configuration is already present, the command overwrites the startup configuration.

Examples
Copying ckpt1 checkpoint to the running configuration:

switch# copy checkpoint ckpt1 running-config Success

Copying ckpt1 checkpoint to the startup configuration:

switch# copy checkpoint ckpt1 startup-config Success

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

copy checkpoint <CHECKPOINT-NAME> <STORAGE-URL>
copy checkpoint <CHECKPOINT-NAME> <STORAGE-URL>

Checkpoint commands | 452

Description
Copies an existing checkpoint configuration to a USB drive. The file format is defined when the checkpoint was created.

Parameter <CHECKPOINT-NAME>
<STORAGE-URL>>

Description
Specifies the name of the checkpoint to copy. The checkpoint name can be alphanumeric. It can also contain underscores (_) and dashes (-).
Specifies the name of the target file on the USB drive using the following syntax: usb:/<FILE> The USB drive must be formatted with the FAT file system.

Examples
Copying the test checkpoint to the testCheck file on the USB drive:

switch# copy checkpoint test usb:/testCheck Success

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

copy <REMOTE-URL> checkpoint <CHECKPOINT-NAME>
copy <REMOTE-URL> checkpoint <CHECKPOINT-NAME> [vrf <VRF-NAME>]
Description
Copies a remote configuration file to a checkpoint. The remote configuration file must be in checkpoint format.

Parameter <REMOTE-URL>

Description
Specifies a remote file using the following syntax: TFTP format:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

453

Parameter <CHECKPOINT-NAME>

Description
tftp://<IP-ADDR>[:<PORT-NUM>] [;blocksize=<Value>]/<FILENAME>
SFTP format: sftp://<USERNAME>@<IP-ADDR> [:<PORT-NUM>]/<FILENAME>
SCP format: scp://USER@{IP|HOST}[:PORT]/FILE
Specifies the name of the target checkpoint. The checkpoint name can be alphanumeric. It can also contain underscores (_) and dashes (-). Required.
NOTE: Do not start the checkpoint name with CPC because it is used for system-generated checkpoints.

vrf <VRF-NAME>

Specifies a VRF name. Default: default.

Examples
Copying a checkpoint format file to checkpoint ckpt5 on the default VRF:

switch# copy tftp://192.168.1.10/ckptmeta checkpoint ckpt5 ######################################################################### 100.0% 100.0% Success

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

copy <REMOTE-URL> {running-config | startup-config}
copy <REMOTE-URL> {running-config | startup-config } [vrf <VRF-NAME>]
Description
Copies a remote file containing a switch configuration to the running configuration or to the startup configuration.

Checkpoint commands | 454

Parameter <REMOTE-URL>
{running-config | startup-config} vrf <VRF-NAME>

Description
Specifies a remote file with the following syntax: TFTP format:
tftp://<IP-ADDR>[:<PORT-NUM>] [;blocksize=<Value>]/<FILENAME>
SFTP format: sftp://<USERNAME>@<IP-ADDR> [:<PORT-NUM>]/<FILENAME>
SCP format: scp://USER@{IP|HOST}[:PORT]/FILE
Selects whether the running configuration or the startup configuration receives the copied checkpoint configuration. If the startup configuration is already present, the command overwrites the startup configuration.
Specifies the name of a VRF. Default: default.

Usage
The switch copies only certain file types. The format of the file is automatically detected from contents of the file. The startup-config option only supports the JSON file format and checkpoints, but the running-config option supports the JSON and CLI file formats and checkpoints. When a file of the CLI format is copied, it overwrites the running configuration. The CLI command does not clear the running configuration before applying the CLI commands. All of the CLI commands in the file are applied line-by-line. If a particular CLI command fails, the switch logs the failure and it continues to the next line in the CLI configuration. The event log (show events -d hpe-config) provides information as to which command failed.
Examples
Copying a JSON format file to the running configuration:

switch# copy tftp://192.168.1.10/runjson running-config ######################################################################### 100.0% Configuration may take several minutes to complete according to configuration file size
--0%----10%----20%----30%----40%----50%----60%----70%----80%----90%----100%-Success

Copying a CLI format file to the running configuration with an error in the file:

switch# copy tftp://192.168.1.10/runcli running-config ######################################################################### 100.0% Configuration may take several minutes to complete according to configuration file size
--0%----10%----20%----30%----40%----50%----60%----70%----80%----90%----100%-Some of the configuration lines from the file were NOT applied. Use 'show events -d hpe-config' for more info. ######################################################################### 100.0% Configuration may take several minutes to complete according to configuration file size
--0%----10%----20%----30%----40%----50%----60%----70%----80%----90%----100%-Some of the configuration lines from the file were NOT applied. Use 'show events -d hpe-config' for more info.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

455

Copying a CLI format file to the startup configuration:
switch# copy tftp://192.168.1.10/startjson startup-config ######################################################################### 100.0% 100.0% Success
Copying an unsupported file format to the startup configuration:
switch# copy tftp://192.168.1.10/startfile startup-config ######################################################################### 100.0% 100.0% unsupported file format

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

copy running-config {startup-config | checkpoint <CHECKPOINT-NAME>}
copy running-config {startup-config | checkpoint <CHECKPOINT-NAME>}
Description
Copies the running configuration to the startup configuration or to a new checkpoint. If the startup configuration is already present, the command overwrites the existing startup configuration.

Parameter startup-config
checkpoint <CHECKPOINT-NAME>

Description
Specifies that the startup configuration receives a copy of the running configuration.
Specifies the name of a new checkpoint to receive a copy of the running configuration. The checkpoint name can be comprised of alphanumeric character, underscores (_) and dashes (-), and must be 32 characters or fewer.

Checkpoint commands | 456

Parameter

Description
NOTE: Do not start the checkpoint name with CPC because it is used for system-generated checkpoints.

Examples
Copying the running configuration to the startup configuration:
switch# copy running-config startup-config Success
Copying the running configuration to a new checkpoint named ckpt1:
switch# copy running-config checkpoint ckpt1 Success

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

copy {running-config | startup-config} <REMOTE-URL>
copy {running-config | startup-config} <REMOTE-URL> {cli | json} [vrf <VRF-NAME>]
Description
Copies the running configuration or the startup configuration to a remote file in either CLI or JSON format.

Parameter {running-config | startup-config}
<REMOTE-URL>

Description
Selects whether the running configuration or the startup configuration is copied to a remote file.
Specifies the remote file using the syntax:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

457

Parameter
{cli | json} vrf <VRF-NAME>

Description
TFTP format: tftp://<IP-ADDR>[:<PORT-NUM>] [;blocksize=<Value>]/<FILENAME>
SFTP format: sftp://<USERNAME>@<IP-ADDR> [:<PORT-NUM>]/<FILENAME>
SCP format: scp://USER@{IP|HOST}[:PORT]/FILE
Selects the remote file format: P: CLI or JSON.
Specifies the name of a VRF. Default: default.

Examples
Copying a running configuration to a remote file in CLI format:

switch# copy running-config tftp://192.168.1.10/runcli cli ######################################################################### 100.0% Success

Copying a running configuration to a remote file in JSON format:

switch# copy running-config tftp://192.168.1.10/runjson json ######################################################################### 100.0% Success

Copying a startup configuration to a remote file in CLI format:

switch# copy startup-config sftp://root@192.168.1.10/startcli cli root@192.168.1.10's password: sftp> put /tmp/startcli startcli Uploading /tmp/startcli to /root/startcli Connected to 192.168.1.10. Success

Copying a startup configuration to a remote file in JSON format:

switch# copy startup-config sftp://root@192.168.1.10/startjson json root@192.168.1.10's password: sftp> root@192.168.1.10's password: sftp> put /tmp/startjson startjson Uploading /tmp/startjson to /root/startjson Connected to 192.168.1.10. Success

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

Checkpoint commands | 458

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

copy {running-config | startup-config} <STORAGE-URL>
copy {running-config | startup-config} <STORAGE-URL> {cli | json}
Description
Copies the running configuration or a startup configuration to a USB drive.

Parameter {running-config | startup-config}
<STORAGE-URL> {cli | json}

Description
Selects the running configuration or the startup configuration to be copied to the switch USB drive.
Specifies a remote file with the following syntax: usb:/<file>
Selects the format of the remote file: CLI or JSON.

Usage
The switch supports JSON and CLI file formats when copying the running or starting configuration to the USB drive. The USB drive must be formatted with the FAT file system. The USB drive must be enabled and mounted with the following commands:

switch(config)# usb switch(config)# end switch# usb mount

Examples
Copying a running configuration to a file named runCLI on the USB drive:

switch# copy running-config usb:/runCLI cli Success

Copying a startup configuration to a file named startCLI on the USB drive:

switch# copy startup-config usb:/startCLI cli Success

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

459

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

copy startup-config running-config
copy startup-config running-config
Description
Copies the startup configuration to the running configuration.
Examples
switch# copy startup-config running-config Success

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

copy <STORAGE-URL> running-config
copy <STORAGE-URL> {running-config | startup-config | checkpoint <CHECKPOINT-NAME>}

Checkpoint commands | 460

Description
This command copies a specified configuration from the USB drive to the running configuration, to a startup configuration, or to a checkpoint.

Parameter <STORAGE-URL> running-config startup-config
checkpoint <CHECKPOINT-NAME>

Description
Specifies the name of a configuration file on the USB drive with the syntax: usb:/<FILE>
Specifies that the configuration file is copied to the running configuration. The file must be in CLI, JSON, or checkpoint format or the copy will fail. the copy will not work.
Specifies that the configuration file is copied to the startup configuration. The switch stores this configuration between reboots. The startup configuration is used as the operating configuration following a reboot of the switch. The file must be in JSON or checkpoint format or the copy will fail.
Specifies the name of a new checkpoint file to receive a copy of the configuration. The configuration file on the USB drive must be in checkpoint format.
NOTE: Do not start the checkpoint name with CPC because it is used for systemgenerated checkpoints.

Usage
This command requires that the USB drive is formatted with the FAT file system and that the file be in the appropriate format as follows:
n running-config: This option requires the file on the USB drive be in CLI, JSON, or checkpoint format. n startup-config: This option requires the file on the USB drive be in JSON or checkpoint format. n checkpoint <checkpoint-name>: This option requires the file on the USB drive be in checkpoint
format.
Examples
Copying the file runCli from the USB drive to the running configuration:
switch# copy usb:/runCli running-config Configuration may take several minutes to complete according to configuration file size --0%----10%----20%----30%----40%----50%----60%----70%----80%----90%----100%-Success
Copying the file startUp from the USB drive to the startup configuration:
switch# copy usb:/startUp startup-config Success
Copying the file testCheck from the USB drive to the abc checkpoint:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

461

switch# copy usb:/testCheck checkpoint abc Success

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

erase
erase checkpoint <checkpont-name> core-dump all|daemon|dsm|kernel|vsf startup-config all
Description
Deletes an existing checkpoint, startup configuration, or core-dump.

Parameter checkpoint <CHECKPOINT-NAME> core-dump all|daemon <daemon-name>
|kernel|vsf
startup-config all

Description
Specifies the name of a checkpoint.
Erase one of the following sets of core-dump files: n all: Erase all core-dump files. n daemon <daemon-name>: Erase daemon core-dump files. n kerne:l Erase the kernel core-dump. n vsf Erase daemon core-dump files for VSF. (For 6300 Switches
only.)
Specifies the startup configuration.
Specifies all checkpoints.

Examples
Erasing checkpoint ckpt1:

Checkpoint commands | 462

switch# erase checkpoint ckpt1 Erasing the startup configuration:
switch# erase startup-config Erasing all checkpoints:
switch# erase checkpoint all

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show checkpoint <CHECKPOINT-NAME>
show checkpoint <CHECKPOINT-NAME> [json]
Description
Shows the configuration of a checkpoint.

Parameter <CHECKPOINT-NAME> [json]

Description Specifies the name of a checkpoint. Specifies that the output is displayed in JSON format.

Examples
Showing the configuration of the ckpt1 checkpoint in CLI format:

switch# show checkpoint ckpt1 Checkpoint configuration: ! !Version AOS-CX PL.10.07.0000K-75-g55e5193

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

463

!export-password: default lacp system-priority 65535 user admin group administrators password ciphertext AQBapQjwipebv36io0jFfde7ZzrHckncal1D+3n8XFTZKQdmYgAAADEtYOeHSme93xzdD0uz6Vr9Kl+XBz B+2GB0UBxSF7rvgN2x8KSgkqv7iqXVQ0Te6LkSMnH4BdNaT3Bf25qyvOqmr4YakO1V3rg8zAOADkPktQD8 joTHXflzwomoIzcmv/uX cli-session
timeout 0 ! ! ! ! ssh server vrf default vlan 1 spanning-tree interface lag 1
no shutdown vlan access 1 interface lag 128 no shutdown vlan access 1 interface lag 129 shutdown vlan access 1 lacp mode active interface 1/1/1 no shutdown lag 128 lacp port-id 65535 interface 1/1/2 no shutdown vlan access 1 interface 1/1/3 no shutdown vlan access 1 interface 1/1/4 no shutdown vlan access 1 interface 1/1/5 no shutdown vlan access 1 interface 1/1/6 no shutdown vlan access 1 interface 1/1/7 no shutdown vlan access 1 interface 1/1/8 no shutdown vlan access 1 interface 1/1/9 no shutdown vlan access 1 interface 1/1/10 no shutdown vlan access 1 interface 1/1/11 no shutdown vlan access 1 interface 1/1/12 no shutdown vlan access 1
Checkpoint commands | 464

interface 1/1/13 no shutdown vlan access 1
interface 1/1/14 no shutdown vlan access 1
interface 1/1/15 no shutdown vlan access 1
interface 1/1/16 no shutdown vlan access 1
interface vlan 1 ip dhcp
snmp-server vrf default ! ! ! ! ! https-server vrf default
Showing the configuration of the ckpt1 checkpoint in JSON format:
switch# show checkpoint ckpt1 json Checkpoint configuration: {
"AAA_Server_Group": { "local": { "group_name": "local" }, "none": { "group_name": "none" }
}, ... ... ... ...

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

465

show checkpoint <CHECKPOINT-NAME> hash
show checkpoint <CHECKPOINT-NAME> hash [cli | json]
Description
Shows a configuration checkpoint hash calculated with the SHA-256 algorithm. When the output format is not specified, the CLI format is used. This enables you to determine whether there has been a configuration change since a previous hash was calculated.

Parameter <CHECKPOINT-NAME> [cli | json]

Description Specifies an existing checkpoint name. Selects either the CLI or JSON format.

Examples
Showing a checkpoint SHA-256 hash in JSON format:

switch# show checkpoint ckpt1 hash json Calculating the hash: [Success]
The SHA-256 hash of the checkpoint in JSON format, created in image XX.10.08.xxxx:
cc7a57a9bbb4e6600d3b4180296a35f6af9e797ce9c439955dfe5de58b06da9e
This hash is only valid for comparison to a baseline hash if the configuration has not been explicitly changed (such as with a CLI command, REST operation, etc.) or implicitly changed (such as by changing a hardware module, upgrading the SW version, etc.).

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.08

Command Information

Platforms All platforms

Command context Manager (#)

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

show checkpoint post-configuration
show checkpoint post-configuration
Description

Checkpoint commands | 466

Shows the configuration settings for creating system checkpoints.
Examples

switch# show checkpoint post-configuration

Checkpoint Post-Configuration feature -------------------------------------

Status

: enabled

Timeout (sec) : 300

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show checkpoint
show checkpoint
Description
Shows a detailed list of all saved checkpoints.
Examples
Showing a detailed list of all saved checkpoints:

switch# show checkpoint

NAME ckpt1 ckpt2 ckpt3 ckpt4 ckpt5

TYPE checkpoint checkpoint checkpoint checkpoint latest

WRITER User User User User User

DATE(YYYY/MM/DD) 2017-02-23T00:10:02Z 2017-03-08T18:10:01Z 2017-03-09T23:11:02Z 2017-03-11T00:00:03Z 2017-03-14T01:12:27Z

IMAGE VERSION XX.01.01.000X XX.01.01.000X XX.01.01.000X XX.01.01.000X XX.01.01.000X

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

467

Command History
Release 10.08

10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification Command syntax show checkpoint list all is replaced with show checkpoint. --
Authority Administrators or local user group members with execution rights for this command.

show checkpoint date
show checkpoint date <START-DATE> <END-DATE>
Description
Shows detailed list of all saved checkpoints created within the specified date range.

Parameter <START-DATE>
<END-DATE>

Description
Specifies the starting date for the range of saved checkpoints to show. Format: YYYY-MM-DD.
Specifies the endingdate for the range of saved checkpoints to show. Format: YYYY-MM-DD.

Examples
Showing a detailed list of saved checkpoints for a specific date range:

switch# show checkpoint date 2017-03-08 2017-03-12

NAME ckpt2 ckpt3 ckpt4

TYPE checkpoint checkpoint checkpoint

WRITER User User User

DATE(YYYY/MM/DD) 2017-03-08T18:10:01Z 2017-03-09T23:11:02Z 2017-03-11T00:00:03Z

IMAGE VERSION XX.01.01.000X XX.01.01.000X XX.01.01.000X

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.08

Modification Command syntax show checkpoint list date <START-

Checkpoint commands | 468

Release

10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification DATE> <END-DATE> is replaced with show checkpoint date <START-DATE> <END-DATE> --
Authority Administrators or local user group members with execution rights for this command.

show running-config hash
show running-config hash [cli | json]
Description
Shows the running-config checkpoint hash, calculated with the SHA-256 algorithm. When the output format is not specified, the CLI format is used. This enables you to determine whether there has been a configuration change since a previous hash was calculated.

Parameter [cli | json]

Description Selects either the CLI or JSON format.

Examples
Showing the running-config checkpoint SHA-256 hash in CLI format:

switch# show running-config hash cli Calculating the hash: [Success]
SHA-256 hash of the config in CLI format:
8db4e7e10f4b7f1a6ab17ad2b4efe0e72f1849103eaf43da62aa1d715075b89e
This hash is only valid for comparison to a baseline hash if the configuration has not been explicitly changed (such as with a CLI command, REST operation, etc.) or implicitly changed (such as by changing a hardware module, upgrading the SW version, etc.).

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.08

Modification Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

469

Command Information

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show startup-config hash
show startup-config hash [cli | json]
Description
Shows the startup-config checkpoint hash, calculated with the SHA-256 algorithm. When the output format is not specified, the CLI format is used. This enables you to determine whether there has been a configuration change since a previous hash was calculated.

Parameter [cli | json]

Description Selects either the CLI or JSON format.

Examples
Showing the startup-config checkpoint SHA-256 hash in CLI format:

switch# show startup-config hash cli Calculating the hash: [Success]
SHA-256 hash of the config in CLI format:
8db4e7e10f4b7f1a6ab17ad2b4efe0e72f1849103eaf43da62aa1d715075b89e
This hash is only valid for comparison to a baseline hash if the configuration has not been explicitly changed (such as with a CLI command, REST operation, etc.) or implicitly changed (such as by changing a hardware module, upgrading the SW version, etc.).

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms All platforms

Command context Manager (#)

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

Checkpoint commands | 470

write memory
write memory
Description
Saves the running configuration to the startup configuration. It is an alias of the command copy running-config startup-config. If the startup configuration is already present, this command overwrites the startup configuration.
Examples
switch# write memory Success

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

471

Chapter 18 Classifier policy commands

Classifier policy commands

Classifier policy application
Classifier policies can be applied as follows ("Rt-In" = "Routed-In"):

Policy type Direction

IPv4+6 In

L2 interface

Yes

(port)

L2 LAG

Yes

L3 interface

Yes

(port)

L3 LAG

Yes

L3 interface

Yes

(port)

subinterface

L3 LAG

Yes

subinterface

VLAN

Yes

Interface VLAN

IPv4+6 Rt-In

IPv4+6 Out
Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes
Yes Yes (PBR)

MAC In Yes Yes Yes Yes
Yes

MAC Out Yes Yes Yes Yes
Yes

The following match criteria is not supported. If this match criteria is attempted to be configured, an error message will be displayed and the action will not be completed.
PCP on MAC classes

apply policy (config-if, config-lag-if, config-if-vlan, configvlan)
Context config-if, config-lag-if: apply policy <POLICY-NAME> {in|out|routed-in} [per-interface] no apply policy <POLICY-NAME> {in|out|routed-in} [per-interface]
Context config-vlan: apply policy <POLICY-NAME> {in|out} no apply policy <POLICY-NAME> {in|out}
Context config-if-vlan:

AOS-CX 10.14 Command-Line Interface Guide

472

apply policy <POLICY-NAME> routed-in no apply policy <POLICY-NAME> routed-in
Description
Applies a policy to the current physical interface port or LAG or VLAN context. Subinterfaces are supported on interfaces and LAGs. Only one direction of a policy can be applied to an interface or VLAN at a time, thus using the apply command on an interface or VLAN with an already-applied policy of the same direction will replace the currently applied policy.
The VLAN context supports the in and out directions, which apply to both bridged and routed traffic. The Interface VLAN context only supports the routed-in direction which applies only to routed traffic.
The no form of this command removes a policy from the interface or VLAN specified by the current context.

Parameter <POLICY-NAME> in out routed-in per-interface

Description
Specifies the policy to apply.
Selects the inbound (ingress) traffic direction.
Selects the outbound (egress) traffic direction.
Selects routed in traffic.
Specifies that unique instances of the policy be applied to each interface or LAG rather than the default of sharing the policy across all interfaces and LAGs.

Usage (applies to config-if, config-lag-if contexts)
n The subinterface can optionally be specified after the interface or LAG, preceded by a period. For example, 1/1/1.10 or lag 125.4.
n When per-interface is included, unique instances of the policy are applied to each physical interface port or LAG rather than the default of sharing the policy across all interfaces and LAGs. The unique instance of a policy has a parent-child relationship with the policy from which it was created. The per-interface option is useful when you want unique policers to be created for each interface or LAG rather than using shared policers. It is also useful when you want the statistics (hit counts and conform rate) to be specific to an interface or LAG rather than being aggregated. Because perinterface creates more hardware instances of a policy, resource consumption may increase significantly. It is recommended that you use show resources to monitor resource utilization as configuration is applied.
Usage (applies to config-vlan context)
n Only one policy type may be applied to a VLAN at a time. Therefore, using the apply policy command on a VLAN with an already-applied policy of the same type, will replace the applied policy.
n 6400 Switch Series only: When a policy is applied to a VLAN, it will create hardware entries on all line cards and stack members regardless of whether a VLAN member exists on any specific line card.
Examples

Classifier policy commands | 473

On the 6400 Switch Series, interface identification differs. Applying a policy to an interface (ingress):
switch(config)# interface 1/1/1 switch(config-if)# apply policy MY_POLICY1 in
Applying a policy to an interface (ingress) specifying per-interface:
switch(config)# interface 1/1/2 switch(config-if)# apply policy MY_POLICY1 in per-interface
Applying a policy to an interface (egress):
switch(config)# interface 1/1/2 switch(config-if)# apply policy MY_POLICY2 out
Applying a policy to an interface (egress) specifying per-interface:
switch(config)# interface 1/1/2 switch(config-if)# apply policy MY_POLICY2 out per-interface
Applying a policy to an interface range (ingress):
switch(config)# interface 1/1/3-1/1/6 switch(config-if-<1/1/2-1/1/5>)# apply policy MY_POLICY3 in
Applying a policy to an interface range (ingress) specifying per-interface:
switch(config)# interface 1/1/7-1/1/9 switch(config-if-<1/1/2-1/1/5>)# apply policy MY_POLICY4 in per-interface
Removing a policy from an interface (ingress):
switch(config)# interface 1/1/1 switch(config-if)# no apply policy MY_POLICY1 in
Removing a policy from an interface range (ingress):
switch(config)# interface 1/1/3-1/1/6 switch(config-if-<1/1/3-1/1/6>)# no apply policy MY_POLICY3 in
Applying a policy to a subinterface (ingress):
switch(config)# interface 1/1/1.10 switch(config-if)# apply policy MY_POLICY1 in
Applying a policy to a subinterface (egress):

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

474

switch(config)# interface 1/1/2.8 switch(config-if)# apply policy MY_POLICY1_egr out Applying a policy to a LAG (ingress): switch(config)# interface lag 100 switch(config-lag-if)# apply policy MY_POLICY5 in Applying a policy to a LAG (ingress) specifying per-interface: switch(config)# interface lag 200 switch(config-lag-if)# apply policy MY_POLICY5 in per-interface Removing a policy from a LAG (ingress): switch(config)# interface lag 100 switch(config-lag-if)# no apply policy MY_POLICY5 in Applying a policy to a LAG subinterface (ingress): switch(config)# interface lag 125.4 switch(config-lag-if)# apply policy MY_POLICY5 in Applying a policy to a LAG subinterface (egress): switch(config)# interface lag 150.8 switch(config-lag-if)# apply policy MY_POLICY5 out Applying a policy to a VLAN (ingress): switch(config)# vlan 1 switch(config-vlan)# apply policy MY_POLICY6 in Applying a policy to multiple VLANs (ingress): switch(config)# vlan 10,20 switch(config-vlan-<10,20>)# apply policy MY_POLICY7 in Applying a policy to an interface VLAN routed (ingress): switch(config)# vlan 1 switch(config-if-vlan)# apply policy MY_POLICY8 routed-in Applying a policy to an interface VLAN range routed (ingress):
Classifier policy commands | 475

switch(config)# vlan 2-5 switch(config-if-vlan-<2-5>)# apply policy MY_POLICY8 routed-in
Removing a policy from a VLAN (ingress):
switch(config)# vlan 1 switch(config-vlan)# no apply policy MY_POLICY6 in
Removing a policy from multiple VLANs (ingress):
switch(config)# vlan 10,20 switch(config-vlan-<10,20>)# no apply policy MY_POLICY7 in
Removing a policy from an interface VLAN routed (ingress):
switch(config)# vlan 1 switch(config-if-vlan)# no apply policy MY_POLICY8 routed-in
Removing a policy from an interface VLAN range routed (ingress):
switch(config)# vlan 2-5 switch(config-if-vlan-<2-5>)# no apply policy MY_POLICY8 routed-in

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.10 10.08 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if config-lag-if config-vlan config-if-vlan

Modification Added subinterface egress support for interfaces and LAGs. Added [per-interface] parameter. --
Authority Administrators or local user group members with execution rights for this command.

apply policy
apply policy <POLICY-NAME> in

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

476

no apply policy <POLICY-NAME> in
Description
Applies a policy to the global config context. Only one policy can be globally applied at a time. Applying a policy globally again, replaces the previous globally applied policy. The no form of this command removes application of the global policy.

Parameter <POLICY-NAME> in

Description Specifies the policy to apply. Selects the inbound (ingress) traffic direction.

Examples
Applying policy global1 to the global config context:

switch(config)# apply policy global1 in

Removing application of policy global1 from the global config context:

switch(config)# no apply policy global1 in

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

class copy
class {ip|ipv6|mac} <CLASS-NAME> copy <DESTINATION-CLASS>
Description
Copies a class to a new destination class or overwrites an existing class. Copying a class copies all entries as well.

Classifier policy commands | 477

Parameter {ip|ipv6|mac} <CLASS-NAME> <DESTINATION-CLASS>

Description Specifies the type and name of the class to be copied. Specifies the name of the destination class.

Examples
Copying an IPv4 class. Copying a class with entries copies all its entries as well:

switch(config)# class ip MY_IP_CLASS copy MY_IP_CLASS2

switch(config)# do show class

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_CLASS

11 ignore

udp

any

any

21 match

tcp

192.168.0.1

192.168.0.2

-------------------------------------------------------------------------------

IPv4

MY_IP_CLASS2

11 ignore

udp

any

any

21 match

tcp

192.168.0.1

192.168.0.2

Copying an IPv6 class:

switch(config)# class ipv6 MY_IPV6_CLASS copy MY_IPV6_CLASS2

switch(config)# do show class

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_CLASS

2 ignore

udp

any

any

-------------------------------------------------------------------------------

IPv6

MY_IPV6_CLASS2

2 ignore

udp

any

any

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

478

Copying a MAC class:

switch(config)# class mac MY_MAC_CLASS copy MY_MAC_CLASS2

switch(config)# do show class

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_CLASS

2 ignore

arp

any

any

-------------------------------------------------------------------------------

MAC

MY_MAC_CLASS2

2 ignore

arp

any

any

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

class ip
Syntax to create an IPv4 class and enter its context. Plus syntax to remove a class: class ip <CLASS-NAME> no class ip <CLASS-NAME>
Syntax (within the class context) for creating or removing class entries for protocols ah, gre, esp, igmp, ospf, pim (ip is available as an alias for any):
[<SEQUENCE-NUMBER>] {match|ignore} {any|ip|ah|gre|esp|igmp|ospf|pim|<IP-PROTOCOL-NUM>} {any|<SRC-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]} {any|<DST-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]} [dscp <DSCP-SPECIFIER>] [ecn <ECN-VALUE>] [ip-precedence <IP-PRECEDENCE-VALUE>] [tos <TOS-VALUE>] [fragment] [vlan <VLAN-ID>] [ttl <TTL-VALUE>] [count]
no <SEQUENCE-NUMBER>
Syntax (within the class context) for creating or removing class entries for protocols sctp, tcp, udp:

Classifier policy commands | 479

[<SEQUENCE-NUMBER>] {match|ignore} {sctp|tcp|udp} {any|<SRC-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]} [{eq|gt|lt} <PORT>|range <MIN-PORT> <MAX-PORT>] {any|<DST-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]} [{eq|gt|lt} <PORT>|range <MIN-PORT> <MAX-PORT>] [cwr][ece] [urg] [ack] [psh] [rst] [syn] [fin] [established] [dscp <DSCP-SPECIFIER>] [ecn <ECN-VALUE>] [ip-precedence <IP-PRECEDENCE-VALUE>] [tos <TOS-VALUE>] [fragment] [vlan <VLAN-ID>] [ttl <TTL-VALUE>] [count]
no <SEQUENCE-NUMBER>
Syntax (within the class context) for creating or removing class entries for protocol icmp: [<SEQUENCE-NUMBER>] {match|ignore} {icmp} {any|<SRC-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]} {any|<DST-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]} [icmp-type {echo|echo-reply|<ICMP-TYPE-VALUE>}] [icmp-code <ICMP-CODE-VALUE>] [dscp <DSCP-SPECIFIER>] [ecn <ECN-VALUE>] [ip-precedence <IP-PRECEDENCE-VALUE>] [tos <TOS-VALUE>] [fragment] [vlan <VLAN-ID>] [ttl <TTL-VALUE>] [count]
no <SEQUENCE-NUMBER>
Syntax (within the class context) for class entry comments: [<SEQUENCE-NUMBER>] comment <TEXT-STRING>
no <SEQUENCE-NUMBER> comment
Description
Creates or modifies an IPv4 traffic class to match specified packets. Class is composed of one or more class entries ordered and prioritized by sequence numbers. With this command, the class can classify traffic based on IPv4 header information.
The no form of the command can be used to delete either an IPv4 traffic class (use no with the class command) or an individual IPv4 traffic class entry (use no with the sequence number).

Parameter ip <CLASS-NAME> <SEQUENCE-NUMBER>
{match|ignore}
<IP-PROTOCOL-NUM>
{any|<SRC-IP-ADDRESS> [/{<PREFIX-LENGTH>|<SUBNET-MASK>}]}

Description
Specifies create or modify an IPv4 class.
Specifies the name of this class.
Specifies a sequence number for the class entry. Optional. Range: 1-4294967295.
Creates a rule to match or ignore specified packets.
Specifies the protocol as its Internet Protocol number. For example, 2 corresponds to the IGMP protocol. Range: 0 to 255.
Specifies the source IPv4 address. n any - specifies any source IPv4 address. n <SRC-IP-ADDRESS> - specifies the source
IPv4 host address. o <PREFIX-LENGTH> - specifies the
address bits to mask (CIDR subnet mask

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

480

Parameter
{any|<DST-IP-ADDRESS> [/{<PREFIX-LENGTH>|<SUBNET-MASK>}]}
[{eq|gt|lt} <PORT>|range <MIN-PORT><MAX-PORT>]
cwr ece urg ack psh rst syn fin established dscp <DSCP-SPECIFIER>

Description
notation). Range: 1 to 32. o <SUBNET-MASK> - specifies the address
bits to mask (dotted decimal notation).
Specifies the destination IPv4 address. n any - specifies any destination IPv4
address. n <DST-IP-ADDRESS> - specifies the
destination IPv4 host address. o <PREFIX-LENGTH> - specifies the
address bits to mask (CIDR subnet mask notation). Range: 1 to 32. o <SUBNET-MASK> - specifies the address bits to mask (dotted decimal notation).
Specifies the port or port range. Port numbers are in the range of 0 to 65535. n eq <PORT> - specifies the Layer 4 port. n gt <PORT> - specifies any Layer 4 port
greater than the indicated port. n lt <PORT> - specifies any Layer 4 port less
than the indicated port. n range <MIN-PORT> <MAX-PORT> - specifies
the Layer 4 port range.
Specifies matching on the TCP Flag CWR : Congestion Window Reduced
Specifies matching on the TCP Flag ECE : Explicit Congestion Notification [ECN]- Echo
Specifies matching on the TCP Flag: Urgent.
Specifies matching on the TCP Flag: Acknowledgment.
Specifies matching on the TCP Flag: Push buffered data to receiving application.
Specifies matching on the TCP Flag: Reset the connection.
Specifies matching on the TCP Flag: Synchronize sequence numbers.
Specifies matching on the TCP Flag: Finish connection.
Specifies matching on the TCP Flag: Established connection.
Specifies the Differentiated Services Code

Classifier policy commands | 481

Parameter
ecn <ECN-VALUE> ip-precedence <IP-PRECEDENCE-VALUE> tos <TOS-VALUE> fragment vlan <VLAN-ID>

Description
Point (DSCP), either a numeric <DSCP-VALUE> (0 to 63) or one of these keywords: n AF11 - DSCP 10 (Assured Forwarding Class
1, low drop probability) n AF12 - DSCP 12 (Assured Forwarding Class
1, medium drop probability) n AF13 - DSCP 14 (Assured Forwarding Class
1, high drop probability) n AF21 - DSCP 18 (Assured Forwarding Class
2, low drop probability) n AF22 - DSCP 20 (Assured Forwarding Class
2, medium drop probability) n AF23 - DSCP 22 (Assured Forwarding Class
2, high drop probability) n AF31 - DSCP 26 (Assured Forwarding Class
3, low drop probability) n AF32 - DSCP 28 (Assured Forwarding Class
3, medium drop probability) n AF33 - DSCP 30 (Assured Forwarding Class
3, high drop probability) n AF41 - DSCP 34 (Assured Forwarding Class
4, low drop probability) n AF42 - DSCP 36 (Assured Forwarding Class
4, medium drop probability) n AF43 - DSCP 38 (Assured Forwarding Class
4, high drop probability) n CS0 - DSCP 0 (Class Selector 0: Default) n CS1 - DSCP 8 (Class Selector 1: Scavenger) n CS2 - DSCP 16 (Class Selector 2: OAM) n CS3 - DSCP 24 (Class Selector 3: Signaling) n CS4 - DSCP 32 (Class Selector 4: Realtime) n CS5 - DSCP 40 (Class Selector 5: Broadcast
video) n CS6 - DSCP 48 (Class Selector 6: Network
control) n CS7 - DSCP 56 (Class Selector 7) n EF - DSCP 46 (Expedited Forwarding)
Specifies an Explicit Congestion Notification value. Range: 0 to 3.
Specifies an IP precedence value. Range: 0 to 7.
Specifies the Type of Service value. Range: 0 to 31.
Specifies a fragment packet.
Specifies VLAN tag to match on. 802.1Q VLAN ID.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

482

Parameter

Description

NOTE: This parameter cannot be used in any class that will be applied to a VLAN.

ttl <TTL-VALUE> count [<SEQUENCE-NUMBER>] comment <TEXT-STRING>

Specifies a time-to-live (hop limit) value. Range: 0 to 255.
Keeps the hit counts of the number of packets matching this class entry.
Adds a comment to a class entry. The no form removes only the comment from the class entry.

Usage
n Entering an existing <CLASS-NAME> value will cause the existing class to be modified, with any new <SEQUENCE-NUMBER> value creating an additional class entry, and any existing <SEQUENCENUMBER> value replacing the existing class entry with the same sequence number.
n If no sequence number is specified, a new class entry will be appended to the end of the class with a sequence number equal to the highest class entry currently in the list plus 10.
n If the <IP-PROTOCOL-NUM> parameter is used instead of a protocol name, ensure that any needed class entry-definition parameters specific to the selected protocol are also provided.
Examples
Creating an IPv4 class with three entries:

switch(config)# class ip MY_IP_CLASS switch(config-class-ip)# 10 match icmp any any10 match icmp any any switch(config-class-ip)# 20 ignore udp any any switch(config-class-ip)# 30 match tcp 192.168.0.1 192.168.0.2 switch(config-class-ip)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_CLASS

10 match

icmp

any

any

20 ignore

udp

any

any

30 match

tcp

192.168.0.1

192.168.0.2

Adding a comment to an existing IPv4 class entry:

Classifier policy commands | 483

switch(config)# class ip MY_IP_CLASS switch(config-class-ip)# 30 comment myipClass switch(config-class-ip)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_CLASS

10 match

icmp

any

any

20 ignore

udp

any

any

30 myipClass

match

tcp

192.168.0.1

192.168.0.2

Removing a comment from an existing IPv4 class entry:

switch(config)# class ip MY_IP_CLASS switch(config-class-ip)# no 30 comment switch(config-class-ip)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_CLASS

10 match

icmp

any

any

20 ignore

udp

any

any

30 match

tcp

192.168.0.1

192.168.0.2

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_CLASS

10 match

icmp

any

any

20 ignore

udp

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

484

any

any

30 match

tcp

192.168.0.1

192.168.0.2

Replacing an IPv4 class entry in an existing class:

switch(config)# class ip MY_IP_CLASS switch(config-class-ip)# 10 match igmp any any switch(config-class-ip)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_CLASS

10 match

igmp

any

any

20 ignore

udp

any

any

30 match

tcp

192.168.0.1

192.168.0.2

Removing an IPv4 class entry:

switch(config)# class ip MY_IP_CLASS switch(config-class-ip)# no 10 switch(config-class-ip)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_CLASS

20 ignore

udp

any

any

30 match

tcp

192.168.0.1

192.168.0.2

Removing an IPv4 class. Removing a class with entries removes all its entries as well. If a class associated with a policy entry (or multiple policy entries) is removed, the corresponding entries are also removed.
The corresponding entries are only removed if the class is unused by all policy entries.

Classifier policy commands | 485

switch(config)# no class ip MY_IP_CLASS
switch(config)# do show class No Class found.

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
config
The class ip <CLASSNAME> command takes you into the config-class-ipconfigclass-ip context where you enter the class entries.

Authority
Administrators or local user group members with execution rights for this command.

class ipv6
Syntax to create an IPv6 class and enter its context. Plus syntax to remove a class: class ipv6 <CLASS-NAME> no class ipv6 <CLASS-NAME>
Syntax (within the class context) for creating or removing class entries for protocols ah, gre, esp, igmp, ospf, pim (ipv6 is available as an alias for any):
[<SEQUENCE-NUMBER>] {match|ignore} {any|ipv6|ah|gre|esp|igmp|ospf|pim|<IP-PROTOCOL-NUM>} {any|<SRC-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]} {any|<DST-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]} [dscp <DSCP-SPECIFIER>] [ecn <ECN-VALUE>] [ip-precedence <IP-PRECEDENCE-VALUE>] [tos <TOS-VALUE>] [fragment] [vlan <VLAN-ID>] [ttl <TTL-VALUE>] [count]
no <SEQUENCE-NUMBER>
Syntax (within the class context) for creating or removing class entries for protocols sctp, tcp, udp: [<SEQUENCE-NUMBER>] {match|ignore} {sctp|tcp|udp} {any|<SRC-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]} [{eq|gt|lt} <PORT>|range <MIN-PORT> <MAX-PORT>] {any|<DST-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]} [{eq|gt|lt} <PORT>|range <MIN-PORT> <MAX-PORT>] [urg] [ack] [psh] [rst] [syn] [fin] [established]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

486

[dscp <DSCP-SPECIFIER>] [ecn <ECN-VALUE>] [ip-precedence <IP-PRECEDENCE-VALUE>] [tos <TOS-VALUE>] [fragment] [vlan <VLAN-ID>] [ttl <TTL-VALUE>] [count]
no <SEQUENCE-NUMBER> Syntax (within the class context) for creating or removing class entries for protocol icmpv6:
[<SEQUENCE-NUMBER>] {permit|deny} {icmpv6} {any|<SRC-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]} {any|<DST-IP-ADDRESS>[/{<PREFIX-LENGTH>|<SUBNET-MASK>}]} [icmp-type {echo|echo-reply|<ICMP-TYPE-VALUE>}] [icmp-code <ICMP-CODE-VALUE>] [dscp <DSCP-SPECIFIER>] [ecn <ECN-VALUE>] [ip-precedence <IP-PRECEDENCE-VALUE>] [tos <TOS-VALUE>] [fragment] [vlan <VLAN-ID>] [ttl <TTL-VALUE>] [count]
no <SEQUENCE-NUMBER> Syntax (within the class context) for class entry comments:
[<SEQUENCE-NUMBER>] comment <TEXT-STRING>
no <SEQUENCE-NUMBER> comment
Description
Creates or modifies an IPv6 traffic class to match specified packets. Class is composed of one or more class entries ordered and prioritized by sequence numbers. With this command, each class can classify traffic based on IPv6 header information. The no form of the command deletes either an IPv6 traffic class (use no with the class command) or an individual IPv6 traffic class entry (use no with the sequence number).

Parameter ipv6 <CLASS-NAME> <SEQUENCE-NUMBER> {match|ignore} <IP-PROTOCOL-NUM>
{any|<SRC-IP-ADDRESS>[/ { <PREFIX-LENGTH>|<SUBNET-MASK>}]}
{any|<DST-IP-ADDRESS>[/ { <PREFIX-LENGTH>|<SUBNET-MASK>}]}

Description
Specifies create or modify an IPv6 class.
Specifies the name of this class.
Specifies a sequence number for the class entry. Optional. Range: 1-4294967295.
Creates a rule to match or ignore specified packets.
Specifies the protocol as its Internet Protocol number. For example, 2 corresponds to the IGMP protocol. Range: 0 to 255.
Specifies the source IPv6 address. n any - specifies any source IPv6 address. n <SRC-IP-ADDRESS> - specifies the source IPv4
host address. o <PREFIX-LENGTH> - specifies the address bits
to mask (CIDR subnet mask notation). Range: 1 to 32. o <SUBNET-MASK> - specifies the address bits to mask (dotted decimal notation).
Specifies the destination IPv4 address. n any - specifies any destination IPv6 address. n <DST-IP-ADDRESS> - specifies the destination

Classifier policy commands | 487

Parameter
[{eq|gt|lt} <PORT>|range <MIN-PORT><MAX-PORT>]
cwr ece urg ack psh rst syn fin established dscp <DSCP-SPECIFIER>

Description
IPv6 host address. o <PREFIX-LENGTH> - specifies the address bits
to mask (CIDR subnet mask notation). Range: 1 to 32. o <SUBNET-MASK> - specifies the address bits to mask (dotted decimal notation).
Specifies the port or port range. Port numbers are in the range of 0 to 65535. n eq <PORT> - specifies the Layer 4 port. n gt <PORT> - specifies any Layer 4 port greater
than the indicated port. n lt <PORT> - specifies any Layer 4 port less than
the indicated port. n range <MIN-PORT> <MAX-PORT> - specifies the
Layer 4 port range.
Specifies matching on the TCP Flag CWR : Congestion Window Reduced
Specifies matching on the TCP Flag ECE : Explicit Congestion Notification [ECN]- Echo
Specifies matching on the TCP Flag: Urgent.
Specifies matching on the TCP Flag: Acknowledgment.
Specifies matching on the TCP Flag: Push buffered data to receiving application.
Specifies matching on the TCP Flag: Reset the connection.
Specifies matching on the TCP Flag: Synchronize sequence numbers.
Specifies matching on the TCP Flag: Finish connection.
Specifies matching on the TCP Flag: Established connection.
Specifies the Differentiated Services Code Point (DSCP), either a numeric <DSCP-VALUE> (0 to 63) or one of these keywords: n AF11 - DSCP 10 (Assured Forwarding Class 1, low
drop probability) n AF12 - DSCP 12 (Assured Forwarding Class 1,
medium drop probability) n AF13 - DSCP 14 (Assured Forwarding Class 1, high
drop probability)

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

488

Parameter
ecn <ECN-VALUE> ip-precedence <IP-PRECEDENCE-VALUE> tos <TOS-VALUE> fragment vlan <VLAN-ID>

Description
n AF21 - DSCP 18 (Assured Forwarding Class 2, low drop probability)
n AF22 - DSCP 20 (Assured Forwarding Class 2, medium drop probability)
n AF23 - DSCP 22 (Assured Forwarding Class 2, high drop probability)
n AF31 - DSCP 26 (Assured Forwarding Class 3, low drop probability)
n AF32 - DSCP 28 (Assured Forwarding Class 3, medium drop probability)
n AF33 - DSCP 30 (Assured Forwarding Class 3, high drop probability)
n AF41 - DSCP 34 (Assured Forwarding Class 4, low drop probability)
n AF42 - DSCP 36 (Assured Forwarding Class 4, medium drop probability)
n AF43 - DSCP 38 (Assured Forwarding Class 4, high drop probability)
n CS0 - DSCP 0 (Class Selector 0: Default) n CS1 - DSCP 8 (Class Selector 1: Scavenger) n CS2 - DSCP 16 (Class Selector 2: OAM) n CS3 - DSCP 24 (Class Selector 3: Signaling) n CS4 - DSCP 32 (Class Selector 4: Real time) n CS5 - DSCP 40 (Class Selector 5: Broadcast video) n CS6 - DSCP 48 (Class Selector 6: Network control) n CS7 - DSCP 56 (Class Selector 7) n EF - DSCP 46 (Expedited Forwarding)
Specifies an Explicit Congestion Notification value. Range: 0 to 3.
Specifies an IP precedence value. Range: 0 to 7.
Specifies the Type of Service value. Range: 0 to 31.
Specifies a fragment packet.
Specifies VLAN tag to match on. 802.1Q VLAN ID.
NOTE: This parameter cannot be used in any class that will be applied to a VLAN.

ttl <TTL-VALUE> count [<SEQUENCE-NUMBER>] comment <TEXT-STRING>

Specifies a time-to-live (hop limit) value. Range: 0 to 255.
Keeps the hit counts of the number of packets matching this class entry.
Adds a comment to a class entry. The no form removes only the comment from the class entry.

Usage

Classifier policy commands | 489

n If you enter an existing <CLASS-NAME> value, the existing class is modified with any new <SEQUENCE-NUMBER> value. This action creates an additional class entry. Any existing <SEQUENCENUMBER> value replaces the existing class entry with the same sequence number.
n If no sequence number is specified, a new class entry is appended to the end of the class with a sequence number equal to the highest class entry currently in the list plus 10.
n If the <IP-PROTOCOL-NUM> parameter is used instead of a protocol name, ensure that any needed class entry-definition parameters specific to the selected protocol are also provided.
Examples
Creating an IPv6 class with two entries:

switch(config)# class ipv6 MY_IPV6_CLASS switch(config-class-ipv6)# 10 match icmpv6 any any switch(config-class-ipv6)# 20 ignore udp any any switch(config-class-ipv6)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_CLASS

10 match

icmpv6

any

any

20 ignore

udp

any

any

Adding a comment to an existing IPv6 class entry:

switch(config)# class ipv6 MY_IPV6_CLASS switch(config-class-ipv6)# 10 match icmpv6 any any switch(config-class-ipv6)# 20 ignore udp any any switch(config-class-ipv6)# 20 comment myipv6class switch(config-class-ipv6)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_CLASS

10 match

icmpv6

any

any

20 myipv6class

ignore

udp

any

any

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

490

Removing a comment from an existing IPv6 class entry:

switch(config)# class ipv6 MY_IPV6_CLASS switch(config-class-ipv6)# no 20 comment switch(config-class-ipv6)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_CLASS

10 match

icmpv6

any

any

20 ignore

udp

any

any

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_CLASS

10 match

icmpv6

any

any

20 ignore

udp

any

any

Replacing an IPv6 class entry in an existing IPv6 class:

switch(config)# class ipv6 MY_IPV6_CLASS switch(config-class-ipv6)# 10 match any any 1020:: switch(config-class-ipv6)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_CLASS

10 match

any

any

1020::

20 ignore

udp

any

any

Removing an IPv6 class entry:

Classifier policy commands | 491

switch(config)# class ipv6 MY_IPV6_CLASS switch(config-class-ipv6)# no 10 switch(config-class-ipv6)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_CLASS

20 ignore

udp

any

any

Removing an IPv6 class. Removing a class with entries removes all its entries as well. If a class associated with a policy entry (or multiple policy entries) is removed, the corresponding entries are also removed.
The corresponding entries are only removed if the class is unused by all policy entries.

switch(config)# no class ipv6 MY_IPV6_CLASS
switch(config)# do show class No Class found.

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

config
The class ipv6 <CLASSNAME> command takes you into the config-classipv6 command context where you enter the class entries.

Administrators or local user group members with execution rights for this command.

class mac
class mac <CLASS-NAME>

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

492

[<SEQUENCE-NUMBER>] {match|ignore} {any|<SRC-MAC-ADDRESS>[/<ETHERNET-MASK>}]} {any|<DST-MAC-ADDRESS>[/<ETHERNET-MASK>}]} {any|aarp|appletalk|arp|fcoe|fcoe-init|ip|ipv6|ipx-arpa|ipx-non-arpa|is-is|
lldp|mpls-multicast|mpls-unicast|q-in-q|rbridge|trill|wake-on-lan| <NUMERIC-ETHERTYPE>} [pcp <PCP-VALUE>] [vlan <VLAN-ID>] [count]
[<SEQUENCE-NUMBER>] comment <TEXT-STRING>
Description
Creates or modifies a MAC traffic class to match specified packets. Class is composed of one or more class entries ordered and prioritized by sequence numbers. With this command, each class can classify traffic based on MAC header information. The no form of the command can be used to delete either a MAC traffic class (use no with the class command) or an individual MAC traffic class entry (use no with the sequence number).

Parameter mac <CLASS-NAME> <SEQUENCE-NUMBER>
{match|ignore} comment {any|<SRC-MAC-ADDRESS> [/<ETHERNET-MASK>}]}
{any|<DST-MAC-ADDRESS> [/<ETHERNET-MASK>}]}

Description
Specifies create or modify a MAC class.
Specifies the name of this class.
Specifies a sequence number for the class entry. Optional. Range: 1-4294967295.
Creates a rule to match or ignore specified packets.
Stores the remaining entered text as a class comment.
Specifies the source host MAC address (xxxx.xxxx.xxxx), OUI, or the keyword any. You can optionally include the following: <ETHERNET-MASK> - The address bits to mask (xxxx.xxxx.xxxx).
Specifies the destination host MAC address (xxxx.xxxx.xxxx), OUI, or the keyword any. You can optionally include the following: <ETHERNET-MASK> - The address bits to mask (xxxx.xxxx.xxxx).

Protocol

Select an ethertype protocol from the following (enter one only): n any - Any ethertype protocol n <NUMERIC-ETHERTYPE> - Enter an EtherType protocol
number. Range: 0x600-0xffff. n Or enter an EtherType protocol name from the following list:
o aarp o appletalk o arp o fcoe o fcoe-init o ip o ipv6 o ipx-arpa

Classifier policy commands | 493

Parameter
pcp <PCP-VALUE> vlan <VLAN-ID>

Description
o ipx-non-arpa o is-is o lldp o mpls-multicast o mpls-unicast o q-in-q o rbridge o trill o wake-on-lan
Not supported.
Specifies matching on a VLAN ID. Enter a VLAN ID or the VLAN name, if configured.
NOTE: This parameter cannot be used in any class that will be applied to a VLAN.

count

Keeps the hit counts of the number of packets matching this class entry.

Examples
Creating a MAC class:

switch(config)# class mac MY_MAC_CLASS

switch(config-class-mac)# match any any lldp

switch(config-class-mac)# ignore any any arp

switch(config-class-mac)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_CLASS

10 match

lldp

any

any

20 ignore

arp

any

any

Adding a comment to an existing MAC class entry:

switch(config)# class mac MY_MAC_CLASS switch(config-class-mac)# 10 comment MY_CLASS_ENTRY10 comment MY_CLASS_ENTRY switch(config-class-mac)# exit switch(config)# do show class

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

494

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_CLASS

10 MY_CLASS_ENTRY

match

lldp

any

any

20 ignore

arp

any

any

Removing a comment from an existing MAC class entry:

switch(config)# class mac MY_MAC_CLASS

switch(config-class-mac)# no 10 comment MY_CLASS_ENTRY

switch(config-class-mac)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_CLASS

10 match

lldp

any

any

20 ignore

arp

any

any

Replacing a MAC class entry in an existing MAC class:

switch(config)# class mac MY_MAC_CLASS

switch(config-class-mac)# 10 match any any any

switch(config-class-mac)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_CLASS

10 match

any

any

any

20 ignore

arp

any

any

Removing a MAC class entry:

Classifier policy commands | 495

switch(config)# class mac MY_MAC_CLASS

switch(config-class-mac)# no 1

switch(config-class-mac)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_CLASS

2 ignore

arp

any

any

Removing a MAC class. Removing a class with entries removes all its entries as well. If a class associated with a policy entry (or multiple policy entries) is removed, the corresponding entries are also removed.
The corresponding entries are only removed if the class is unused by all policy entries.

switch(config)# no class mac MY_MAC_CLASS switch(config)# do show class No Class found.

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

config
The class mac <CLASSNAME> command takes you into the config-classmac context where you enter the class entries.

Administrators or local user group members with execution rights for this command.

class resequence
class {ip|ipv6|mac} <CLASS-NAME> resequence <STARTING-SEQUENCE-NUMBER> <INCREMENT>
bDescription

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

496

Resequence numering in an IPv4, or IPv6, or MAC class.

Parameter {ip|ipv6|mac} <CLASS-NAME> <STARTING-SEQUENCE-NUMBER> <INCREMENT>

Description Specifies the class where you want to resequence class entries. Specifies the sequence number to start resequencing from. Specifies how much to increment the sequence numbers by.

Examples
Resequencing an IPv4 class:

switch(config)# class ip MY_IP_CLASS resequence 1 10

switch(config)# do show class

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv4

MY_IP_CLASS

1 match

igmp

any

any

11 ignore

udp

any

any

21 match

tcp

192.168.0.1

192.168.0.2

Resequencing an IPv6 class:

switch(config)# class ipv6 MY_IPV6_CLASS resequence 1 1

switch(config-class-ipv6)# exit

switch(config)# do show class

Type

Name

Sequence Comment

Action

L3 Protocol

Source IP Address

Source L4 Port(s)

Destination IP Address

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

IPv6

MY_IPV6_CLASS

1 match

any

any

1020::

2 ignore

udp

any

any

Classifier policy commands | 497

Resequencing a MAC class:

switch(config)# class mac MY_MAC_CLASS resequence 1 1

switch(config)# do show class

Type

Name

Sequence Comment

Action

EtherType

Source MAC Address

Destination MAC Address

Additional Parameters

-------------------------------------------------------------------------------

MAC

MY_MAC_CLASS

1 match

any

any

any

2 ignore

arp

any

any

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

class reset
class { all | ip <CLASS-NAME> | ipv6 <CLASS-NAME> |mac <CLASS-NAME> } reset
Description
Changes the user-specified class configuration to match the active class configuration. Use this command when there is a discrepancy between what the user configured and what is active and accepted by the system.

Parameter { all | ip <CLASS-NAME>| ipv6 <CLASS-NAME> |mac <CLASS-NAME> }

Description
Specifies either all classes be reset or specifies the type (ip for IPv4, ipv6 for IPv6 or mac for MAC ACL) and name of the class to be reset.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

498

Examples
Resetting the user-specified configuration to the active configuration:
switch(config)# class all reset

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

clear policy hitcounts
clear policy hitcounts { all | [<POLICY-NAME>] [[interface <IF-NAME> [in|out|routed-in]] | [vlan <VLAN-ID> [in|out]]] | global }
Description
Clears the policy hit count statistics.

Parameter all <POLICY-NAME> interface <IF-NAME> vlan <VLAN-ID> in out routed-in
global

Description Selects all policies. Specifies the policy name. Specifies the interface name. Specifies the VLAN. Specifies the inbound (ingress) traffic direction. Selects the outbound (egress) traffic direction. Selects the routed in traffic direction. Not applicable to a policy applied to a VLAN. Selects the globally applied policy.

Examples
On the 6400 Switch Series, interface identification differs.

Classifier policy commands | 499

Clearing policy hit counts and then showing the policy hit counts (statistics):
switch# clear policy hitcounts my_policy int 1/1/1 in switch# show policy hitcounts my_policy Statistics for Policy my_policy: Interface 1/1/1* (in):
Hit Count Configuration 10 class ipv6 my_class1 action dscp af21 action drop
0 10 match any any any count * policy statistics are shared among each context type (interface, VLAN).
For routed ingress, they are only shared within the same VRF. Use 'policy NAME copy' to create a new policy for separate statistics.
Clearing the globally applied policy hit counts and then showing the global policy hit counts (statistics):
switch# clear policy hitcounts global switch# show policy hitcounts global Statistics for Policy global1: Global Policy:
Hit Count Configuration 10 class ipv6 my_class1 action mirror
0 10 match any any any count * policy statistics are shared among each context type (interface, VLAN).
For routed ingress, they are only shared within the same VRF. Use 'policy NAME copy' to create a new policy for separate statistics.
Clearing hit counts for policy MY_IPv6_Policy applied to VLAN 10 (ingress):
switch# clear policy hitcounts My_IPv6_Policy vlan 10 in
Clearing hit counts for all policies:
switch# clear policy hitcounts all

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

500

policy
policy <POLICY-NAME>
[<SEQUENCE-NUMBER>] class {ip|ipv6|mac} <CLASS-NAME>
action {<REMARK-ACTIONS> | <POLICE-ACTIONS> | <OTHER-ACTIONS>} [{<REMARK-ACTIONS> | <POLICE-ACTIONS> | <OTHER-ACTIONS>}]
[<SEQUENCE-NUMBER>] comment ...
Description
Creates or modifies classifier policy and policy entries. A policy is made up of one or more policy entries ordered and prioritized by sequence numbers. Each entry has an IPv4/IPv6/MAC class and zero or more policy actions associated with it. A policy must be applied using the apply command. The no form of the command can be used to delete either a policy (use no with the policy command) or an individual policy entry (use no with the sequence number).

Parameter <POLICY-NAME> <SEQUENCE-NUMBER> comment class {ip|ipv6|mac} <CLASS-NAME> <REMARK-ACTIONS>
pcp <PCP-VALUE> ip-precedence <IP-PRECEDENCE-VALUE> dscp <DSCP-VALUE>

Description
Specifies the name of the policy.
Specifies a sequence number for the policy entry. Optional. Range: 1 to 4294967295.
Stores the remaining entered text as a policy entry comment.
Specifies a type of class, ip for IPv4, ipv6 for IPv6 and mac for a MAC policy. And specifies a class name.
Remark actions can be any of the following options: {pcp <PRIORITY> | ip-precedence <IPPRECEDENCE_VALUE> | dscp <DSCP-VALUE> | localpriority <LOCAL-PRIORITY-VALUE>} where:
Specifies the Priority Code Point (PCP) value. Range: 0 to 7.
Specifies the numeric IP precedence value. Range: 0 to 7.
Specifies a Differentiated Services Code Point (DSCP) value. Enter either a numeric value (0 to 63) or a keyword as follows: n AF11 - DSCP 10 (Assured Forwarding Class 1, low
drop probability)
n
n AF12 - DSCP 12 (Assured Forwarding Class 1, medium drop probability)
n AF13 - DSCP 14 (Assured Forwarding Class 1, high drop probability)
n AF21 - DSCP 18 (Assured Forwarding Class 2, low drop probability)

Classifier policy commands | 501

Parameter
local-priority <LOCAL-PRIORITY-VALUE> <POLICE-ACTIONS>
cir kbps <RATE-KBPS> cbs <BYTES> exceed <OTHER-ACTIONS> drop

Description
n AF22 - DSCP 20 (Assured Forwarding Class 2, medium drop probability)
n AF23 - DSCP 22 (Assured Forwarding Class 2, high drop probability)
n AF31 - DSCP 26 (Assured Forwarding Class 3, low drop probability)
n AF32 - DSCP 28 (Assured Forwarding Class 3, medium drop probability)
n AF33 - DSCP 30 (Assured Forwarding Class 3, high drop probability)
n AF41 - DSCP 34 (Assured Forwarding Class 4, low drop probability)
n AF42 - DSCP 36 (Assured Forwarding Class 4, medium drop probability)
n AF43 - DSCP 38 (Assured Forwarding Class 4, high drop probability)
n CS0 - DSCP 0 (Class Selector 0: Default) n CS1 - DSCP 8 (Class Selector 1: Scavenger) n CS2 - DSCP 16 (Class Selector 2: OAM) n CS3 - DSCP 24 (Class Selector 3: Signaling) n CS4 - DSCP 32 (Class Selector 4: Real time) n CS5 - DSCP 40 (Class Selector 5: Broadcast video) n CS6 - DSCP 48 (Class Selector 6: Network control) n CS7 - DSCP 56 (Class Selector 7) n EF - DSCP 46 (Expedited Forwarding)
Specifies a local priority value. Range: 0 to 7.
Police actions can be the following {cir <RATEBPS>cbs <BYTES> exceed} where:
Specifies a Committed Information Rate value in Kilobits per second. Range: 1 to 4294967295.
Specifies a Committed Burst Size value in bytes. Range: 1 to 4294967295.
Specifies action to take on packets that exceed the rate limit.
Other actions can be the following:
Specifies drop traffic.

Usage
n An applied policy will process a packet sequentially against policy entries in the list until the last policy entry in the list has been evaluated or the packet matches an entry.
n Entering an existing <POLICY-NAME> value will cause the existing policy to be modified, with any new <SEQUENCE-NUMBER> value creating an additional policy entry, and any existing <SEQUENCE-NUMBER> value replacing the existing policy entry with the same sequence number.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

502

n If no sequence number is specified, a new policy entry will be appended to the end of the entry list with a sequence number equal to the highest policy entry currently in the list plus 10.
Examples
Creating a policy with several entries:
switch(config)# policy MY_POLICY switch(config-policy)# 10 class ipv6 MY_CLASS1 action dscp af21 action drop switch(config-policy)# 20 class ip MY_CLASS3 action mirror 1 switch(config-policy)# exit switch(config)# do show policy
Name Sequence Comment
Class Type action
------------------------------------------------------------------------------MY_POLICY
10 MY_CLASS1 ipv6 drop dscp AF21
20 MY_CLASS3 ipv4 mirror 1
Adding a comment to an existing policy entry:
switch(config)# policy MY_POLICY switch(config-policy)# 20 comment MY_TEST_POLICY switch(config-policy)# exit switch(config)# do show policy
Name Sequence Comment
Class Type action
------------------------------------------------------------------------------MY_POLICY
10 MY_CLASS1 ipv6 drop dscp AF21
20 MY_TEST_POLICY MY_CLASS3 ipv4 mirror 1
Removing a comment from an existing policy entry:
switch(config)# policy MY_POLICY switch(config-policy)# no 20 comment switch(config-policy)# exit switch(config)# do show policy
Name Sequence Comment
Class Type action
Classifier policy commands | 503

------------------------------------------------------------------------------MY_POLICY
10 MY_CLASS1 ipv6 drop dscp AF21
20 MY_CLASS3 ipv4 mirror 1
Adding/Replacing a policy entry in an existing policy:
switch(config)# policy MY_POLICY switch(config-policy)# 10 class ip MY_CLASS3 action drop action dscp af21 switch(config-policy)# exit switch(config)# do show policy
Name Sequence Comment
Class Type action
------------------------------------------------------------------------------MY_POLICY
10 MY_CLASS3 ipv4 drop dscp AF21
20 MY_CLASS3 ipv4 mirror 1
Removing a policy entry:
switch(config)# policy MY_POLICY switch(config-policy)# no 10 switch(config-policy)# exit switch(config)# do show policy
Name Sequence Comment
Class Type action
------------------------------------------------------------------------------MY_POLICY
20 MY_CLASS3 ipv4 mirror 1
Removing a policy:
switch(config)# no policy MY_POLICY switch(config)# do show policy
Name Sequence Comment
Class Type action

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

504

------------------------------------------------------------------------------MY_POLICY2
2 MY_CLASS3 ipv4 mirror 1
The policer exceed DSCP action cannot be combined with other actions in the same policy entry, but other entries in the policy may use other actions. For example, this configuration is valid:
switch(config)# policy my_policy switch(config-policy)# 10 class ip my_class action cir kbps 1000 cbs 15625 exceed dscp EF
But this is not because it adds a secondary action within the same policy entry:
6300(config-policy)# 10 class ip my_class action cir kbps 1000 cbs 15625 exceed dscp EF action mirror 1
Invalid input: action

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

config
The policy command takes you into the config-policy context where you enter the policy entries.

Administrators or local user group members with execution rights for this command.

policy copy
policy <POLICY-NAME> copy <DESTINATION-POLICY>
Description
Copies a policy to a new destination policy or overwrites an existing policy. Copying a policy copies all its entries as well.

Classifier policy commands | 505

Parameter <POLICY-NAME> <DESTINATION-POLICY>

Description Specifies the policy to be copied. Specifies the name of the destination policy.

Examples
Copying a policy:

switch(config)# policy MY_POLICY copy MY_POLICY2 switch(config)# do show policy
Name Sequence Comment
Class Type action
------------------------------------------------------------------------------MY_POLICY
2 my_class3 ipv4 mirror 1
------------------------------------------------------------------------------MY_POLICY2
2 my_class3 ipv4 mirror 1

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

policy resequence
policy <POLICY-NAME> resequence <STARTING-SEQ-NUM> <INCREMENT>
Description
Resequences numbering in a policy.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

506

Parameter <POLICY-NAME> <STARTING-SEQ-NUM> <INCREMENT>

Description Specifies the policy where you want to resequence policy entries. Specifies the sequence number to start resequencing from. Specifies how much to increment the sequence numbers by.

Examples
Resequencing a policy:

switch(config)# policy MY_POLICY resequence 1 1 switch(config)# do show policy
Name Sequence Comment
Class Type action
------------------------------------------------------------------------------MY_POLICY
1 MY_CLASS3 ipv4 drop dscp AF21
2 MY_CLASS3 ipv4 mirror 1

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

policy reset
policy <POLICY-NAME> reset
Description

Classifier policy commands | 507

Changes the user-specified policy configuration to match the active policy configuration. Use this command when a discrepancy exists between what the user configured and what is active and accepted by the system.

Parameter <POLICY-NAME>

Description Specifies the policy to be reset.

Examples
Resetting a policy:

switch(config)# policy MY_POLICY reset

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show class
show class [ip | ipv6 | mac] [<CLASS-NAME>] [commands] [configuration] [vsx-peer]
Description
Shows class configuration information. All parameters are optional.

Parameter [ip | ipv6 | mac]
<CLASS-NAME> commands
configuration

Description
Selects the class type for the display: ip for IPv4, ipv6 for IPv6, or mac for MAC classes.
Specifies the class name.
Specifies whether to display output as the CLI commands showing the configured class entries.
Specifies whether to display classes that have been configured by

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

508

Parameter vsx-peer

Description
the user, even if they are not active due to issues with the command parameters or hardware issues. This parameter is useful during a mismatch between the entered configuration and the previous successfully programmed (active) classes.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing all class configuration:

switch# show class

Type Name

Sequence Comment

action

L3 Protocol

Source IP address

Source L4 Port(s)

Destination IP address

Destination L4 Port(s)

Additional Parameters

---------------------------------------------------------------

ipv4 MY_IPV4_CLASS

10 my first class entry comment

match

icmp

192.168.0.1/255.255.255.0

192.168.1.1/255.255.255.0

VLAN: 1

20 my second class entry comment

ignore

tcp

10.100.0.10/255.255.255.0 < 3000

10.100.1.10/255.255.255.0 > 2000

VLAN: 1

----------------------------------------------------------------------

Showing class configuration for the IPv4 class MY_IPV4_CLASS as CLI commands:

switch# show class ip MY_IPV4_CLASS commands class ip "MY_IPV4_CLASS"
10 match icmp 192.168.0.1/255.255.255.0 192.168.1.1/255.255.255.0 vlan 1 10 comment my first class entry comment 20 ignore tcp 10.100.0.10/255.255.255.0 lt 3000 10.100.1.10/255.255.255.0 gt
2000 vlan 1 20 comment my second class entry comment

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Classifier policy commands | 509

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show policy
Syntax that shows information for all policies: show policy [commands] [configuration] [vsx-peer] Syntax that filters by policies applied to an interface or VLAN: show policy [interface <IF-NAME> [in | out | routed-in] | vlan <VLAN-ID> [in | out] | vni <VNI-ID> [routed-in]]
[commands] [configuration] [vsx-peer] show policy [interface <IF-NAME> [in | routed-in] | vlan <VLAN-ID> [in] | vni <VNI-ID> [routed-in]]
[commands] [configuration] [vsx-peer] Syntax that filters by the named policy: show policy <POLICY-NAME> [commands] [configuration] [vsx-peer] Syntax that filters by the globally applied policy: show policy global [commands] [configuration] [vsx-peer] Syntax that shows statistical information in the form of hit counts: show policy hitcounts <POLICY-NAME> [interface <IF-NAME> [in | out | routed-in] |
vlan <VLAN-ID> [in | out] | vni <VNI-ID> [routed-in]] [vsx-peer] Syntax that shows statistical information in the form of hit counts for the globally applied policy: show policy hitcounts global [vsx-peer]
Description
Shows information about your defined policies and where they have been applied. When show policy is entered without parameters, information for all policies is shown. The parameters filter the list of policies for which information is shown. Available filtering includes:
n The content of a specific policy. n All policies applied to a specific interface. n All policies applied to a specific VLAN. n All policies applied to a specific VNI. n The globally applied policy. n The inbound (ingress) or outbound (egress) direction.
To display policy statistics, use the show policy hitcounts form of this command.
When a policy is applied to a physical interface or lag using command apply policy, with the per-interface parameter included, unique instances of the policy are applied to each physical interface port or LAG. The unique instance of a policy has a parent-child relationship with the policy from which it was created. The show policy command shows information about the parent policy not the unique instances.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

510

If a policy contains any class entries with the count keyword and policy entries with the cir action, and the policy is applied to multiple physical or virtual interfaces in the same direction, except for the routed ingress direction, the statistics will be aggregated. In the routed ingress direction, the statistics will be aggregated in multiple physical or virtual interfaces in the same VRF. If separate statistics for different physical or virtual interfaces are required, then another policy should be created. Alternatively, in the case of physical interfaces or LAGs, a policy applied with per-interface set can be used.

Parameter interface <IF-NAME> vlan <VLAN-ID> vni<VNI-ID> in out routed-in
<POLICY-NAME> commands
configuration
global hitcounts vsx-peer

Description
Specifies the interface name.
Specifies the VLAN.
Specifies the VNI.
Selects the inbound (ingress) traffic direction.
Selects the outbound (egress) traffic direction.
Selects the routed in traffic direction. Not applicable to a policy applied to a VLAN.
Specifies the policy name.
Causes the policy definition to be shown as the commands and parameters used to create it rather than in tabular form.
Causes the user-configured policies be shown as entered, even if the policies are not active due to policy-definition command issues or hardware issues. This parameter is useful if there is a mismatch between the entered configuration and the previous successfully programmed (active) policies configuration.
Selects the globally applied policy.
Selects the policy hit counts (statistics).
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing information for all policies:

switch# show policy Name
Sequence Comment Class Type action
------------------------------------------------------------------------------my_policy
10 QOS class class1 ipv4

Classifier policy commands | 511

dscp af21 drop 20 PBR policy. class2 ipv4 pbr mypbr -------------------------------------------------------------------------------
Showing a policy as commands:
switch# show policy commands policy my_policy
10 class ip class1 action dscp af21 action drop 20 class ip class2 action pbr mypbr
Showing the globally applied policy:
switch# show policy global commands policy global1
10 class ip my_class1 action drop apply policy my_policy in
Showing policy hit counts (statistics) for the globally applied policy:
switch# show policy hitcounts global Statistics for Policy My_Policy: global (in):
Matched Packets Configuration 10 class ip My_ip_Class
0 10 match tcp any any ack count - 20 match udp any lt 8 any 0 30 match icmp any 10.1.1.10 count 20 class ipv6 My_ipv6_Class action cir kbps 1000000 cbs 1000000 exceed drop [ 0 kbps conform ] - 10 match tcp any any ack 0 20 match icmpv6 1000::10 any count
Showing policy hit counts (statistics) for a policy applied everywhere (with 1/1/4 and 1/1/5 being applied per interface):
switch# show policy hitcounts My_Policy Statistics for Policy My_Policy:
Interface 1/1/1,lag1 (in): Matched Packets Configuration
10 class ip My_ip_Class 0 10 match tcp any any ack count - 20 match udp any lt 8 any 0 30 match icmp any 10.1.1.10 count
20 class ipv6 My_ipv6_Class action cir kbps 1000000 cbs 1000000 exceed drop [ 0 kbps conform ]
- 10 match tcp any any ack 0 20 match icmpv6 1000::10 any count
Interface 1/1/4 (in): Matched Packets Configuration

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

512

10 class ip My_ip_Class 0 10 match tcp any any ack count - 20 match udp any lt 8 any 0 30 match icmp any 10.1.1.10 count
20 class ipv6 My_ipv6_Class action cir kbps 1000000 cbs 1000000 exceed drop [ 0 kbps conform ]
- 10 match tcp any any ack 0 20 match icmpv6 1000::10 any count
Interface 1/1/5 (in): Matched Packets Configuration
10 class ip My_ip_Class 0 10 match tcp any any ack count - 20 match udp any lt 8 any 0 30 match icmp any 10.1.1.10 count
20 class ipv6 My_ipv6_Class action cir kbps 1000000 cbs 1000000 exceed drop [ 0 kbps conform ]
- 10 match tcp any any ack 0 20 match icmpv6 1000::10 any count
interface 1/1/2.10,1/1/3.10 (in): Matched Packets Configuration
10 class ip My_ip_Class 0 10 match tcp any any ack count - 20 match udp any lt 8 any 0 30 match icmp any 10.1.1.10 count
20 class ipv6 My_ipv6_Class action cir kbps 1000000 cbs 1000000 exceed drop [ 0 kbps conform ]
- 10 match tcp any any ack 0 20 match icmpv6 1000::10 any count ...
Showing policy hit counts (statistics) for a policy applied on physical interfaces and LAGs:
switch# show policy hitcounts My_Policy interface 1/1/1 Statistics for Policy My_Policy:
Interface 1/1/1,lag1 (in): Matched Packets Configuration
10 class ip My_ip_Class 0 10 match tcp any any ack count - 20 match udp any lt 8 any 0 30 match icmp any 10.1.1.10 count
20 class ipv6 My_ipv6_Class action cir kbps 1000000 cbs 1000000 exceed drop [ 0 kbps conform ]
- 10 match tcp any any ack 0 20 match icmpv6 1000::10 any count
Showing policy hit counts (statistics) for a policy applied on VLANs:
switch# show policy hitcounts My_Policy vlan 10 Statistics for Policy My_Policy:
vlan 10,20-30 (in): Matched Packets Configuration
10 class ip My_ip_Class 0 10 match tcp any any ack count - 20 match udp any lt 8 any 0 30 match icmp any 10.1.1.10 count
Classifier policy commands | 513

20 class ipv6 My_ipv6_Class action cir kbps 1000000 cbs 1000000 exceed drop [ 0 kbps conform ]
- 10 match tcp any any ack 0 20 match icmpv6 1000::10 any count Statistics for Policy My_Policy:
vlan 10,20-30 (in): Matched Packets Configuration
10 class ip My_ip_Class 0 10 match tcp any any ack count - 20 match udp any lt 8 any 0 30 match icmp any 10.1.1.10 count
20 class ipv6 My_ipv6_Class action cir kbps 1000000 cbs 1000000 exceed drop [ 0 kbps conform ]
- 10 match tcp any any ack 0 20 match icmpv6 1000::10 any count
Showing policy hit counts (statistics) for a policy applied on interface VLANs:
switch# show policy hitcounts My_Policy interface vlan10 Statistics for Policy My_Policy:
VRF red interface vlan 10,30 (routed-in):
Matched Packets Configuration 10 class ip My_ip_Class
0 10 match tcp any any ack count - 20 match udp any lt 8 any 0 30 match icmp any 10.1.1.10 count 20 class ipv6 My_ipv6_Class action cir kbps 1000000 cbs 1000000 exceed drop [ 0 kbps conform ] - 10 match tcp any any ack 0 20 match icmpv6 1000::10 any count
show policy hitcounts My_Policy vni 1000 Statistics for Policy My_Policy: vni 1000 (routed-in):
Matched Packets Configuration 10 class ip My_ip_Class
0 10 match tcp any any ack count - 20 match udp any lt 8 any 0 30 match icmp any 10.1.1.10 count 20 class ipv6 My_ipv6_Class action cir kbps 1000000 cbs 1000000 exceed drop 0 10 match tcp any any count [ 0 kbps conform ] 0 20 match icmpv6 1000::10 any count [ 0 kbps conform ]show policy hitcounts My_Policy vni 1000 Statistics for Policy My_Policy: vni 1000 (routed-in): Matched Packets Configuration 10 class ip My_ip_Class 0 10 match tcp any any ack count - 20 match udp any lt 8 any 0 30 match icmp any 10.1.1.10 count 20 class ipv6 My_ipv6_Class action cir kbps 1000000 cbs 1000000 exceed drop 0 10 match tcp any any count [ 0 kbps conform ] 0 20 match icmpv6 1000::10 any count [ 0 kbps conform ]
Showing policy hit counts (statistics) for a policy applied on interface VLANs for a specific VRF:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

514

switch# show policy hitcounts My_Policy vrf green routed-in Statistics for Policy My_Policy:
VRF green interface vlan 20,25 (routed-in):
Matched Packets Configuration 10 class ip My_ip_Class
0 10 match tcp any any ack count - 20 match udp any lt 8 any 0 30 match icmp any 10.1.1.10 count 20 class ipv6 My_ipv6_Class action cir kbps 1000000 cbs 1000000 exceed drop [ 0 kbps conform ] - 10 match tcp any any ack 0 20 match icmpv6 1000::10 any count

For more information on features that use this command, refer to the ACLs and Classifiers Policy Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Modification Added [per-interface] information. Updated examples. --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Classifier policy commands | 515

Chapter 19 Client Insight Commands

Client Insight Commands
client-insight enable
client-insight enable no client-insight enable
Description
Enables the Client Insight feature on the device. Client Insight is disabled by default at the device level. The no form of the command disables Client Insight.
Examples
Enabling the Client Insight feature:
switch(config)# client-insight enable
Disabling the Client Insight feature:
switch(config)# no client-insight enable

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

client-insight on-boarding event logs
client-insight event-log client-onboarding
Description

AOS-CX 10.14 Command-Line Interface Guide

516

Enables generation of event logs that lists the onboarding status of each client. Onboarding event logs are disabled by default. For onboarding event logs to work, the Client Insight feature should be enabled before client onboarding. Use the no form of the command to disable onboarding event logs for clients.

Parameter event-log client-onboarding

Description Configure client onboarding event logs. Enable client onboarding event logs.

Examples
Enabling client onboarding event logs:

switch(config)# client-insight event-log client-onboarding

Disabling client onboarding event logs:

switch(config)# no client-insight event-log client-onboarding

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

diag-dump client-insight basic
diag-dump client-insight basic
Description
Displays the status of the Client Insight feature--whether enabled or disabled globally. It also displays latencies for all active clients that are onboarded.
Examples
switch# diag-dump client-in basic ========================================================================= [Start] Feature client-insight Time : Tue Jul 25 05:32:14 2023

Client Insight Commands | 517

========================================================================= ------------------------------------------------------------------------[Start] Daemon client-insightd -------------------------------------------------------------------------

Global client-insight

= ENABLED

Client on-boarding event logs = ENABLED

Client dns on-boarding latency= ENABLED

Displaying client entries with (mac) as key. Total number of entries: 2

MAC : 00:50:56:96:0e:3f

-----------------------

Overall on-boarding status

: successful

Overall on-boarding failure reason : -

L2 on-boarding detail

---------------------

L2 on-boarding status

: successful

L2 on-boarding failure reason : -

L2 on-boarding start time

: 07/25/2023 05:28:50.495425 UTC

L2 on-boarding end time

: 07/25/2023 05:28:50.495425 UTC

L2 on-boarding latency

: 0 min, 0 sec, 0 us

802.1x RADIUS latency

:-

MAC-Auth RADIUS latency

:-

L3 on-boarding detail ---------------------IP on-boarding status IP on-boarding failure reason L3 on-boarding latency

: successful :: 0 min, 3 sec, 455792 us

VLAN : 20 ----------IP details ---------IPv4 on-boarding status IPv6 on-boarding status

: successful :-

DHCPv4

------

Status

: successful

Failure reason : -

Start time

: 07/25/2023 05:28:50.485325 UTC

End time

: 07/25/2023 05:28:53.941117 UTC

DHCPv6

------

Status

:-

Failure reason : -

Start time

:-

End time

:-

DNS details

-----------

DNS on-boarding status : successful

Failure reason

:-

Server IP: 11.11.11.2

---------------------

On-boarding latency : 0 min, 0 sec, 306 us

DNS request time

: 07/25/2023 05:28:59.656937 UTC

DNS response time : 07/25/2023 05:28:59.657243 UTC

Average latency: Server IP: 11.11.11.2 --------------------Average latency

: 7091960 usec

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

518

DNS start time for latency calculation : 07/25/2023 05:23:51.335296 UTC

DNS end time for latency calculation : 07/25/2023 05:28:51.323025 UTC

Number of DNS requests

: 14

Server IP: 12.12.12.2

---------------------

Average latency

: 7954 usec

DNS start time for latency calculation : 07/25/2023 05:23:51.335296 UTC

DNS end time for latency calculation : 07/25/2023 05:28:51.323025 UTC

Number of DNS requests

: 12

Server IP: 13.13.13.2

---------------------

Average latency

: 7388 usec

DNS start time for latency calculation : 07/25/2023 05:23:51.335296 UTC

DNS end time for latency calculation : 07/25/2023 05:28:51.323025 UTC

Number of DNS requests

: 12

-------------------------------------------------------------------------

[End] Daemon client-insightd

-------------------------------------------------------------------------

=========================================================================

[End] Feature client-insight

=========================================================================

Diagnostic-dump captured for feature client-insight

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show capacities client-insight-client-limit
show capacities client-insight-client-limit
Description
Displays the maximum number of clients supported by the Client Insight feature on the switch.
Examples
switch# show capacities client-insight-client-limit System Capacities: Filter Client-Insight client limit

Client Insight Commands | 519

Capacities Name

Value

------------------------------------------------------------------------

Maximum number of clients supported by Client-Insight feature

4096

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show capacities-status client-insight-client-limit
show capacities-status client-insight-client-limit
Description
Displays the maximum number of clients learnt by the Client Insight feature on the switch.
Examples

switch# show capacities-status client-insight-client-limit

System Capacities Status: Filter Client-Insight client limit

Capacities Status Name

Value Maximum

------------------------------------------------------------

Number of clients learnt by Client-Insight feature

0 4096

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11
Command Information

Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

520

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

show events -c client-insight
show events -c client-insight
Description
Displays all the events logged by the Client Insight feature. Following events are logged by the Client Insight feature:

Table 1: Events Logged by Client Insight

Process

Event ID

Severity

Message

Description

clientinsightd

14301

Info

Client {mac} {vlans} on {port_name} successfully on-boarded. Client onboarding started at {ob_ start_ts}; L2 complete at {l2_end_ts}; L3 complete at {l3_end_ts}

Client successfully onboarded with given timestamp values.

clientinsightd

14302

Info

Client {mac} {vlans} on {port_name} partial success in on-boarding. L2 status: {l2_ob_state} L3 status: {l3_ob_state}. Client onboarding started at {ob_ start_ts};L2 complete at {l2_end_ts}; L3 complete at {l3_end_ts}

Client on-boarding is partialsuccessful with given timestamp values.

clientinsightd

14303

Info

Client {mac} on {port_name} failed to on-board with status: {onboarding_status} reason_code: {failure_ phase_id}

Client failed to on-board with given status and reason code.

clientinsightd

14304

Info

Maximum system wide client limit {client-number} reached

Maximum system wide client limit is reached

clientinsightd

14305

Info

Maximum system wide client

Maxiumum system wide client limit is reached

Client Insight Commands | 521

Process clientinsightd
clientinsightd
clientinsightd

Event ID 14306 14307
14308

Severity Info Info
Info

Message

Description

limit {client-number} reached

Client {mac} successfully on-boarded on VLAN {vlans}; Client on-boarding started at {ob_start_ts}; L2 complete at {l2_end_ts}; L3 complete at {l3_end_ts}; ARP to GW response received at {arp_end_ts}; DNS onboarding to (dns_server_ip) completed at {dns_end_ts}

Client successfully onboarded with given timestamp values.

Client {mac} on-boarded on VLANs {vlans} and failed on VLANs {failed_vlans}; Client on-boarding started at {ob_start_ts}; L2 complete at {l2_end_ts}; L3 complete at {l3_end_ts}; ARP to GW response received at {arp_end_ts}; DNS onboarding to (dns_server_ip) completed at {dns_end_ts}; L2 status {l2_ob_state} failure_reason_code ­ {l2_ failure_reason}; L3 status {l3_ob_state} failure_ reason_code ­ {l3_failure_ reason}; DNS on-boarding status {dns_status} failure_reason_code ­ {dns_ failure_reason}

Client on-boarding is partialsuccessful with given timestamp values.

Client {mac} failed to onboard with status: {onboarding_status} in failure phase: {failure_ phase_id} with reason: {failure_reason}

Client failed to on-board with given status, phase_id and reason code.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

522

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

show tech client-insight
show tech client-insight
Description
Displays if the global Client Insight and client on-boarding event log features are enabled or disabled. Also displays the latencies for all active clients that are onboarded.
Examples

switch# show tech client-insight

====================================================

Show Tech executed on Thu May 18 15:05:43 2022

====================================================

====================================================

[Begin] Feature client-insight

====================================================

*********************************

Command : show client-insight

*********************************

Client Insight Information:

Global client-insight

= ENABLED

Client on-boarding event logs = ENABLED

====================================================

[End] Feature client-insight

====================================================

====================================================

Show Tech commands executed successfully

====================================================

Displaying L2, L3 client latencies and details:

switch# show tech client-insight ==================================================== Show Tech executed on Thu Sep 22 06:34:16 2022 ====================================================

Client Insight Commands | 523

==================================================== [Begin] Feature client-insight ====================================================

********************************* Command : diag-dump client-insight basic ********************************* ========================================================================= [Start] Feature client-insight Time : Thu Sep 22 06:34:16 2022 ========================================================================= ------------------------------------------------------------------------[Start] Daemon client-insightd -------------------------------------------------------------------------

Global client-insight

= ENABLED

Client on-boarding event logs = ENABLED

Displaying client entries with (mac) as key. Total number of entries: 1

MAC : 00:11:01:00:00:08

-----------------------

Overall on-boarding status

:-

Overall on-boarding failure reason : -

L2 on-boarding detail

---------------------

L2 on-boarding status

: successful

L2 on-boarding failure reason : -

L2 authentication start time : 05/18/22 15:01:01.456789 UTC

L2 authentication end time : 05/18/22 15:01:02.123456 UTC

L2 authentication latency

: 0 min, 0 sec, 666667 us

802.1x RADIUS latency

:-

MAC-Auth RADIUS latency

: 0 min, 0 sec, 332456 us

L3 on-boarding detail ----------------------
L3 on-boarding status L3 on-boarding failure reason L3 on-boarding latency

: in_progress ::-

VLAN : 10 -----------
IP details ----------
IPv4 on-boarding status IPv6 on-boarding status

: successful :-

DHCPv4

------

Status

: successful

Failure reason : -

Start time

: 05/18/22 15:01:02.456789 UTC

End time

: 05/18/22 15:01:02.999988 UTC

DHCPv6

------

Status

:-

Failure reason : -

Start time

:-

End time

:-

VLAN : 20 -----------
IP details ----------
IPv4 on-boarding status IPv6 on-boarding status

: In_Progress :-

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

524

DHCPv4

------

Status

: In_Progress

Failure reason : -

Start time

: 05/18/22 15:01:03.256485 UTC

End time

:-

DHCPv6

------

Status

:-

Failure reason : -

Start time

:-

End time

:-

DNS details

-----------

Server IP: 172.16.1.8

---------------------

Average latency

: 0 min, 0 sec, 432456 us

DNS start time for latency calculation : 05/18/22 15:01:03.123456 UTC

DNS end time for latency calculation : 05/18/22 15:01:03.425466 UTC

Number of DNS requests

: 16

Server IP: 2003::1

---------------------

Average latency

: 0 min, 0 sec, 432456 us

DNS start time for latency calculation : 05/18/22 15:01:03.123456 UTC

DNS end time for latency calculation : 05/18/22 15:01:03.425466 UTC

Number of DNS requests

: 16

------------------------------------------------------------------------[End] Daemon client-insightd ------------------------------------------------------------------------========================================================================= [End] Feature client-insight ========================================================================= Diagnostic-dump captured for feature client-insight ==================================================== [End] Feature client-insight ====================================================
==================================================== Show Tech commands executed successfully ==================================================== Show Tech took 43 seconds for execution
==================================================== Show Tech executed on Thu Sep 22 06:34:16 2022 ==================================================== ==================================================== [Begin] Feature client-insight ====================================================
********************************* Command : diag-dump client-insight basic ********************************* ========================================================================= [Start] Feature client-insight Time : Thu Sep 22 06:34:16 2022 ========================================================================= ------------------------------------------------------------------------[Start] Daemon client-insightd -------------------------------------------------------------------------

Client Insight Commands | 525

Global client-insight

= ENABLED

Client on-boarding event logs = ENABLED

Displaying client entries with (mac) as key. Total number of entries: 1

MAC : 00:11:01:00:00:08

-----------------------

Overall on-boarding status

:-

Overall on-boarding failure reason : -

L2 on-boarding detail

---------------------

L2 on-boarding status

: successful

L2 on-boarding failure reason : -

L2 authentication start time : 05/18/22 15:01:01.456789 UTC

L2 authentication end time : 05/18/22 15:01:02.123456 UTC

L2 authentication latency

: 0 min, 0 sec, 666667 us

802.1x RADIUS latency

:-

MAC-Auth RADIUS latency

: 0 min, 0 sec, 332456 us

L3 on-boarding detail ----------------------
L3 on-boarding status L3 on-boarding failure reason L3 on-boarding latency

: in_progress ::-

VLAN : 10 -----------
IP details ----------
IPv4 on-boarding status IPv6 on-boarding status

: successful :-

DHCPv4

------

Status

: successful

Failure reason : -

Start time

: 05/18/22 15:01:02.456789 UTC

End time

: 05/18/22 15:01:02.999988 UTC

DHCPv6

------

Status

:-

Failure reason : -

Start time

:-

End time

:-

VLAN : 20 -----------
IP details ----------
IPv4 on-boarding status IPv6 on-boarding status

: In_Progress :-

DHCPv4

------

Status

: In_Progress

Failure reason : -

Start time

: 05/18/22 15:01:03.256485 UTC

End time

:-

DHCPv6

------

Status

:-

Failure reason : -

Start time

:-

End time

:-

DNS details

-----------

Server IP: 172.16.1.8

---------------------

Average latency

: 0 min, 0 sec, 432456 us

DNS start time for latency calculation : 05/18/22 15:01:03.123456 UTC

DNS end time for latency calculation : 05/18/22 15:01:03.425466 UTC

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

526

Number of DNS requests

: 16

Server IP: 2003::1

---------------------

Average latency

: 0 min, 0 sec, 432456 us

DNS start time for latency calculation : 05/18/22 15:01:03.123456 UTC

DNS end time for latency calculation : 05/18/22 15:01:03.425466 UTC

Number of DNS requests

: 16

------------------------------------------------------------------------[End] Daemon client-insightd ------------------------------------------------------------------------========================================================================= [End] Feature client-insight ========================================================================= Diagnostic-dump captured for feature client-insight ==================================================== [End] Feature client-insight ====================================================
==================================================== Show Tech commands executed successfully ==================================================== Show Tech took 43 seconds for execution

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

Client Insight Commands | 527

Chapter 20 CLI session commands

CLI session commands

alias
alias <ALIAS-NAME> <COMMAND-STRING> no alias <ALIAS-NAME><COMMAND-STRING>
Description
Defines an alias for one or more CLI commands. The alias and its definition are valid only for the user that creates the alias. The alias name cannot be an existing token name.

The alias command should not be configured for CLI commands that contain sensitive information. The no form of this command removes the specified alias.

Parameter <ALIAS-NAME> <COMMAND-STRING>

Description
Specifies the name of the alias you are defining.
Specifies one or more commands and their parameters. Separate commands with a semicolon (;). Length: 1 to 400 characters. For commands that require user-supplied parameters, use $1 through $n, in order, as placeholders. These parameters are replaced by the corresponding arguments from the command line, and must match the number of parameters required by the original command. For alias definitions that include multiple commands, continue numbering parameters through all commands. Do not restart numbering for each command.

Examples
Defining an alias:

switch(config)# alias srci show running-config interface $1

switch(config)# srci?

shv Execute "show alias" to list the command list. Arguments to replace $1,

$2 etc.

switch(config)# show alias

Alias Name

Alias Definition

-------------------------------------------------------------------------------

srci

show running-config interface $1

Using alias in config context:

switch(config)# srci 1/1/1 interface 1/1/1
no shutdown

AOS-CX 10.14 Command-Line Interface Guide

528

ip address 1.1.1.1/24 exit

Using alias in enable context:

switch# srci 1/1/1 interface 1/1/1
no shutdown ip address 1.1.1.1/24 exit

Using alias in operator context:

switch> srci 1/1/1 interface 1/1/1
no shutdown ip address 1.1.1.1/24 exit

Removing an alias:

switch(config)# no alias srci show running-config interface $1

switch(config)# show alias

Alias Name

Alias Definition

-------------------------------------------------------------------------------

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

auto-confirm
auto-confirm no auto-confirm
Description
Specifies that the CLI automatically enters the affirmative response (y) to all confirmation prompts, enabling commands to execute without waiting for user confirmation. The no form of this command sets auto-confirmation to the default value disabled.
Usage

CLI session commands | 529

Some commands, such as boot command, prompt to confirm execution of the command or to save the current configuration. Typically, such commands display a confirmation message similar to the following:

Continue (y/n)?

This command is useful for automating switch configuration, but Hewlett Packard Enterprise recommends that you use the REST API instead of using CLI scripts to automate configuration operations. When the switch reboots, auto-confirmation is set to the default (disabled).
Example
switch# auto-confirm

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

configure terminal
configure [terminal]
Description
Enters the global configuration (config) context.

Parameter terminal

Description Configure from the terminal. This is the default parameter.

Example

switch# configure terminal switch(config)#

Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

530

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

disable
disable
Description
Exits the manager context (#) and enters the operator context (>).
Example
switch# disable switch>

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

do
do <COMMAND>
Description
Executes a manager context (#) or operator context (>) command from a configuration (config) context.
You can execute exec commands from a configuration context with or without using the do command.

CLI session commands | 531

Parameter <COMMAND>

Description
Specifies the manager context (#) or the operator context (>) command to execute.

Usage
You can execute exec commands from a configuration context with or without using the do command. Use the do command to execute commands such as clear, checkpoint, auto-confirm and show commands while you are in a configuration context (such as config or config-vlan-10). For all exec commands you can use with the do command, from the global configuration context (config), enter do, followed by a space, and then press the tab key twice.
Examples
Clearing LLDP neighbors from the global configuration context:

switch(config)# clear lldp neighbors switch(config)# do clear lldp neighbors switch(config)#

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
A configuration context such as config or config-vlan-10

Authority
Administrators or local user group members with execution rights for this command.

enable (manager context)
enable
Description
Exits the operator context (>) and enters the manager context (#).
Example
switch> enable switch#
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

532

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Operator (>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

end
end
Description
Exits the current context and enters the manager context (#).
Example
switch# configure terminal switch(config)# vlan 10 switch(config-vlan-10)# vlan 22 switch(config-vlan-22)# end switch#

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Any context

Modification --
Authority Administrators or local user group members with execution rights for this command.

exit
exit
Description
Exits the current context and enters its parent context.
Example

CLI session commands | 533

switch# configure terminal switch(config)# vlan 10 switch(config-vlan-10)# vlan 22 switch(config-vlan-22)# exit switch(config)# exit switch#

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context Any context

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

list
list
Description
Shows a list of commands available from the current context.
Example
switch> list list enable exit show session-timeout
...

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context Any context

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

534

page
page [<LINES>] no page
Description
Specifies the number of output lines the CLI displays before pausing to wait for a user to press a key. This value is the number of lines supported by the terminal session. This setting is not persistent and applies to the current session only. The page command is enabled by default on the switch with the number of lines supported by the terminal. Change this default by using the page command to specify a different number of output lines. The no form of this command sets the number of lines that are displayed to the default, which is the number of lines supported by the current terminal session.

Parameter <LINES>

Description
Specifies the number to display before pausing. If not specified, the number of lines supported by the current terminal session is used. Range: 2-1000 lines. Default: The number of lines supported by the current terminal session

Examples
Setting the page size to an unlimited number of lines:

switch# no page switch#

Example output of a command after setting the page size to 10 lines:
switch# page 10 switch# list
show hostname show domain-name list configure { terminal } disable exit end page page <2-1000> -- MORE --, next page: Space, next line: Enter, quit: q

Command History
Release 10.07 or earlier

Modification --

Command Information

CLI session commands | 535

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

Pipe (|) command
show running-config | begin 2 "vlan" | redirect "abc.txt" show running-config | include "vlan" | exclude "vlan2" | count show vlan | include "up" | include "VLAN100"
list | include "show" | exclude "show" | count
Description
The pipe (|) command filters the output of show or list commands using the options include, exclude, begin, count, or redirect.
Usage
show {<SHOW-COMMAND-OPTIONS>}... [ | {include <PATTERN-STRING> | exclude <PATTERN-STRING> | begin {<LINES-TO-DISPLAY>} <PATTERN-STRING>}]...
[ | {count [<PATTERN-STRING>] | redirect [<FILE-NAME>]}]
list [ | {include <PATTERN-STRING> | exclude <PATTERN-STRING> | begin {<LINES-TO-DISPLAY>} <PATTERN-STRING>}]...
[ | {count [<PATTERN-STRING>] | redirect [<FILE-NAME>]}]
n The pipe (|) command is supported for use with the show and list commands only. n You can use multiple pipe commands with a single show or list command.
Examples
show running-config | redirect "abc.txt" show running-config | begin 2 "vlan" | begin -2 "vlan" | begin "vlan" show running-config | include "vlan" | exclude "vlan2" | count show vlan | include "up" | include "VLAN100" list | include "show" | exclude "show" | count
Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

536

repeat
repeat [id <POSITION>] [<COUNT>] [<DELAY>]
Description
Repeatedly executes one or more commands. By default, the most recent command in the history is executed until you press Ctrl+C.

Parameter <POSITION>
<COUNT> <DELAY>

Description
Specifies the position of a command, or range of positions of multiple commands, in the history list as shown in the output of the show history command. <POSITION> can be a single number, a comma-separated list of numbers, or a range of numbers specified by the beginning and end of the range, separated by a hyphen. If the id parameter is not specified, the repeat command executes the command that was entered most recently. Default: 1.
Specifies number of times to execute the command or commands. Default: The command repeats an infinite number of times.
Specifies the number of seconds to delay before executing the command. Default: 2

Example
switch# repeat id 1-4,7-8,10 count 2 delay 3
Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

session-timeout
session-timeout <MINUTES> no session-timeout <MINUTES>
Description
Specifies the number of minutes a CLI session can be idle before the session is automatically terminated and the user is logged out. The no form of this command sets the timeout to the default value of 30 minutes.

CLI session commands | 537

Parameter <MINUTES>

Description
Specifies the number of minutes the CLI session can remain idle. Specify 0 to configure CLI sessions to never time out. Range: 0 to 4320. Default: 30

Example
switch(config)# session-timeout 15

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

show session-timeout
show session-timeout [vsx-peer]
Description
Shows the configured session timeout value.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
switch# show session-timeout session-timeout: 30 minutes (Default)

Command History
Release 10.07 or earlier

Modification --

Command Information

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

538

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show alias
show alias [vsx-peer]
Description
Shows the command aliases that are defined on the switch.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

switch# show alias

Alias Name

Alias Definition

-------------------------------------------------------------------------------

hst

hostname int_config

interface $1; no shutdown; ip address

$2; lldp receive; mtu $3; exit

switch# show hst

Alias Name

Alias Definition

-------------------------------------------------------------------------------

hst

hostname

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show history
show history [all-sessions] [timestamp]
Description

CLI session commands | 539

Shows all commands that have been executed by the user in the current session. By default, the output of this command will display up to 500 commands previously executed by the user in the current session.
This command will not display any commands entered by the user that contain sensitive information such as plain text passwords or keys. The output will only be valid for the current boot and not for commands executed in the previous boot.

Parameter all-sessions
timestamp

Description
Specifies that the output includes commands from the current session as well as previous sessions logged out of by the user. When you include the all-sessions parameter, the output of this command will display up to 1000 commands previously executed by the user.
Specifies that the output include the time of execution of each command in the command history.

If you include the all-sessions and timestamp parameters in the same command, timestamp must always be entered after all-sessions. It cannot come before.

Example
Showing a list of commands executed during the current CLI session:

switch# show history

5

configure

4

session-timeout 0

3

exit

2

show feature-pack

1

show logging

Showing a list of commands executed during the current CLI session, with timestamps:

switch# show history timestamp

5

Mon May 6 18:42:05 2024

4

Mon May 6 18:42:08 2024

3

Mon May 6 18:42:10 2024

2

Mon May 6 18:42:19 2024

1

Mon May 6 18:42:29 2024

configure session-timeout 0 exit show feature-pack show logging

Showing a list of commands executed by the user both in the current session and during all previous CLI sessions:

switch# show history all-sessions

12 configure

11 session-timeout 0

10 exit

9

show feature-pack

8

show logging

7

configure

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

540

6

exit

5

configure

4

alias abcd show running-config

3

abcd

2

show tech

1

exit

Showing a list of commands executed by the user both in the current session and during all previous sessions, with timestamps:

switch# show history all-sessions timestamp

12 Mon May 6 18:42:05 2024

configure

11 Mon May 6 18:42:08 2024

session-timeout 0

10 Mon May 6 18:42:10 2024

exit

9

Mon May 6 18:42:19 2024

show feature-pack

8

Mon May 6 18:42:29 2024

show logging

7

Mon May 6 18:42:44 2024

configure

6

Mon May 6 18:42:55 2024

exit

5

Mon May 6 18:45:41 2024

configure

4

Mon May 6 18:45:55 2024

alias abcd show running-config

3

Mon May 6 18:45:59 2024

abcd

2

Mon May 6 18:46:09 2024

show tech

1

Mon May 6 18:46:14 2024

exit

Attempting to specify the timestamp parameter before the all-sessions parameter:
switch# show history timestamp all-sessions Invalid input: all-sessions

Command History

Release 10.14 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification The all-sessions parameter is introduced. --
Authority Administrators or local user group members with execution rights for this command.

CLI session commands | 541

Chapter 21
CLI user session management commands
CLI user session management commands
cli-session
cli-session no cli-session
Description
Enters the CLI session context (shown in the switch prompt as config-cli-session) for the purpose of configuring CLI user session management. Session management enhances security by enforcing specific CLI user session requirements. The following information is provided at time of successful login:
n When applicable, the number of failed login attempts since the most recent successful login. n The date, time, and location (console or IP address or hostname) of the most recent previous
successful login. n The count of successful logins within the past (configurable) time period.
For example: switch login: admin Password:
There were 3 failed login attempts since the last successful login Last login: 2019-04-20 08:51:33 from the console User "admin" has logged in 73 times in the past 30 days The no form of this command disables concurrent CLI user session restrictions and reverts timeout and tracking-range to their default values.
To ensure that enhanced security is maintained, it is recommended that you keep CLI user session management fully enabled by setting max-per-user to a nondefault value.
The cli-session command applies only to SSH/console login connection types. It does not apply to other connection types such as REST.
Subcommands
These subcommands are available within the CLI session context. [no] max-per-user <SESSIONS>
Specifies the maximum number of concurrent CLI sessions per user. The no form of this subcommand disables concurrent CLI user session restrictions. Default: Disabled (no value). Range: 1 to 5.

AOS-CX 10.14 Command-Line Interface Guide

542

When the same user name is configured for both local and remote authentication, both users, regardless of privilege level, are considered to be the same user for the purpose of counting concurrent CLI sessions. For example, with max-per-user set to 1 and user admin1 configured for local and remote authentication, only the local user admin1 or the remote user admin1 can be logged in at any given moment. Both admin1 users cannot be logged in simultaneously unless max-per-user is increased to at least 2.
[no] timeout <MINUTES> Specifies the number of minutes a CLI session can be idle before the session is automatically terminated and the user is logged out. A value of 0 minutes disables the session timeout. The no form of this subcommand sets the timeout value to the default. Default 30: Range 0 to 4320.
This subcommand is the recommended replacement for the session-timeout command.
[no] tracking-range <DAYS> Specifies the maximum number of days to track CLI user session logins. The no form of this subcommand resets the value to its default. Default 30: Range 1 to 30.
exit Exits the CLI session context.
end Exits the CLI session context and then the config context.
Examples
Configuring CLI user session settings for a maximum of one concurrent session, a 20-minute timeout, and tracking for a maximum of 25 days.
switch(config)# cli-session switch(config-cli-session)# max-per-user 1 switch(config-cli-session)# timeout 20 switch(config-cli-session)# tracking-range 25 switch# exit
After successful earlier logins, logging in from the console without any intervening unsuccessful logins.
switch login: admin1 Password:
Last login: 2019-04-15 14:10:21 from the console User 'admin1' has logged in 65 times in the past 25 days
Attempting to log in as admin1 when already logged in as admin1 from elsewhere.
switch login: admin1 Password: Too many logins for 'admin1'
After successful earlier logins, attempting to log in twice with an invalid password, followed by a successful login.
switch login: admin1 Password:
CLI user session management commands | 543

Login incorrect switch login: admin1 Password:
Login incorrect switch login: admin1 Password:
There were 2 failed login attempts since the last successful login Last login: 2019-04-15 17:22:45 from 192.168.1.1 User 'admin1' has logged in 72 times in the past 25 days

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

544

Chapter 22 Clock commands

Clock commands

clock date
clock date <DATE>
Description
Sets the switch date.

Parameter <DATE>

Description Specifies the date. Format: YYYY-MM-DD.

Examples
This example sets the date to Dec 14, 2017.

switch(config)# clock date 2017-12-14

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

clock datetime
clock datetime <DATE> <TIME>
Description
Sets the switch date and time.
Parameter <DATE>

Description Specifies the date. Format: YYYY-MM-DD.

AOS-CX 10.14 Command-Line Interface Guide

545

Parameter <TIME>

Description
Specifies the time in 24-hour clock format. Seconds are optional. Format: HH:MM or HH:MM:SS.

Examples
This example sets the date and time to Dec 13, 2017 at 15:00.

switch(config)# clock datetime 2017-12-13 14:15:00

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

clock time
clock time <TIME>
Description
Sets the switch time.

Parameter <TIME>

Description
Specifies the time in 24-hour clock format. Seconds are optional. Format: HH:MM or HH:MM:SS.

Examples
This example sets the time to 15:01:23.

switch(config)# clock time 15:01:23

Command History
Release 10.07 or earlier

Modification --

Command Information

Clock commands | 546

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

clock timezone
clock timezone <TIME-ZONE> no clock timezone [<TIME-ZONE>]
Description
Sets the time zone and its associated daylight savings time rule. The no form of this command sets the time zone to the default value of UTC.

Parameter <TIME-ZONE>

Description
Specifies the time zone, <TIME-ZONE>, using a name defined in the IANA time zone database. See https://en.wikipedia.org/wiki/List_of_tz_database_time_zones.

Examples
Setting the time zone to Eastern Standard Time (EST):

switch(config)# clock timezone EST

Command History
Release 10.08

10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Added optional <TIME-ZONE> parameter to no form of the command. --
Authority Administrators or local user group members with execution rights for this command.

show clock
show clock
Description
This command displays the current date, time, and time zone.
Example

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

547

switch# show clock Wed Nov 22 23:29:10 PDT 2017 System is configured for timezone : US/Pacific

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Clock commands | 548

Chapter 23 Container management commands

Container management commands

container
container <CONTAINER-NAME> no container <CONTAINER-NAME>
Description
Enters into the container configuration context. The no form of this command removes the existing configurations of the specified container.
Example
Configures a new container:

switch(config)# container app The feature being used requires a AOS-CX Advanced Software Feature Pack. For more information,refer to the AOS-CX Feature Pack Deployment Guide.

AOS-CX does not enforce the requirement to own a feature pack prior to using container features. This warning message is displayed only during creation, subsequent calls to the container context will not display the message.
Command History

Release 10.12

Modification Command introduced

Command Information

Platforms
6300, except for S3L75A, S3L76A and S3L77A 6400

Command context
config config-container-<CONTAINER-NAME>

Authority
Administrators or local user group members with execution rights for this command.

container exec
container <NAME> exec <PARAMS>
Description
Allows the execution of an endpoint script in the container. The location of this endpoint is provided to the container manager infrastructure through a manifest file in the image file system of the container.

AOS-CX 10.14 Command-Line Interface Guide

549

This manifest file provides metadata related to the container application. When the exec command runs, the manifest information is used to determine the endpoint to execute and the user parameters are passed directly to the endpoint. The output of such execution is provided directly to the user through the CLI. In case the manifest information or the endpoint file are missing an error is presented to the user. User can interrupt the execution by using Ctrl+C.
If the container is not operational when the command is executed, the following error message is returned: Failed to execute endpoint - The container is not operational.

Parameter <NAME>
exec <PARAMS>

Description
Specifies a container name up to 64 characters long.
Runs a container application command. Specifies container command parameters.

Command History
Release 10.12

Modification Command introduced

Command Information

Platforms
6300, except for S3L75A, S3L76A and S3L77A 6400

Command context config-container-<CONTAINER-NAME>

Authority
Administrators or local user group members with execution rights for this command.

env
env <NAME> {value <VALUE>}|{encrypted [plaintext <VALUE>|ciphertext <VALUE>]} no env <NAME> {value <VALUE>}|{encrypted {plaintext|ciphertext}<VALUE>}
Description
Configures an environment variable for a container that is composed of a key and a value pair. The keyvalue pair defines the behavior of the environment in a container and is used by the container processes. The value of the environment variable can be stored in the host system as an encrypted value. The container manager infrastructure provides the decrypted value to the container. The no form of this command removes the configured environment variable from a container.
Configuring the env variable for an already operational container causes the container to restart.

Container management commands | 550

Parameter <NAME>
value <VALUE> encrypted
plaintext <VALUE> ciphertext <VALUE>

Description
Specifies the name of the container environment variables.
Specifies the variable value.
Encrypts the environment variable value. If you press <enter> after the encrypted parameter, you will enter a variable configuration mode that allows you to securely enter a hidden value. This is the recommended method for entering an encrypted variable
Optional. Specifies the variable value in plain text. Not recommended for encrypted variables.
Optional. Specifies the variable value as previously encrypted text. Recommended for encrypted variables; specify the encrypted variable value as previously encrypted text.

Example
Securely entering an encrypted variable:

6300(config-container-test)# env TEST encrypted Enter environment variable value: ******** 6300(config-container-test)# end

Command History
Release 10.13.1000
10.12

Modification
The plaintext and ciphertext options for the encrypted parameter are now optional. Starting with this release, you can use the encrypted option to encrypt the environment variable and specify the value in plaintext hidden from the CLI.
Command introduced

Command Information

Platforms
6300, except for S3L75A, S3L76A and S3L77A 6400

Command context config-container-<CONTAINER-NAME>

Authority
Administrators or local user group members with execution rights for this command.

image-location
image-location <URL> [vrf <VRF-NAME>][allow-unsigned] no image-location <URL> [<VRF-NAME>][allow-unsigned]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

551

Description
Configures the image location for a container. Modifying image location prompts an image upgrade. The no form of this command removes the configured location of a container.
n If the user sets a location value which does not follow the standard URL format, the following error message is returned: Failure to configure image location: Invalid URL
n If the user tries to use a VRF value that doesn't exist on the switch, the following error message is returned: Failure to configure image location: Invalid VRF
n If the image of the container exceeds 500mb the container won´t be deployed

By default, only container images with a valid HPE signature are allowed. To bypass this signature check and allow unsigned container images, include the allow-unsigned parameter when you define the image location. The allow-unsigned parameter cannot be used if you have issued the secure-mode enhanced command to set the switch to enhanced secure mode.

Parameter URL
vrf <VRF-NAME> allow-unsigned

Description
Specifies the URL of the container application. URL supports HTTP protocol. The image-location URL can either be IPv4 or IPv6 address. The IPv6 address must be provided within square brackets.
(Optional) Specifies the VRF of the image URL.
(Optional) Allow download and deployment of an unsigned container image.

Examples
Configures the image location for the IPv4 setting:

switch(config)# image-location http://10.0.0.1/container.img vrf mgmt

Appends the port to the address if the image server is running on a port other than HTTP for an IPv4 setting:

switch(config)# image-location http://10.0.0.1:9050/container.img vrf mgmt

Configures image location for IPv6 setting by wrapping IP address between square brackets:

switch(config)# image-location http://[2001::2]/container.img vrf mgmt

Specifies port number by appending it with the IPv6 address:

switch(config)# image-location http://[2001::2]:9050/container.img vrf mgmt

When you include the allow-unsigned parameter on a switch in standard secure mode, the following message will be displayed to inform this can be a potential security issue.

Container management commands | 552

switch(config)# image-location http://10.0.0.1/container.img vrf mgmt allowunsigned Allowing unsigned container images poses a potential security risk that can impact both the current device and the entire network. By allowing installation of unsigned applications you are acknowledging and accepting these risks. HPE shall not be responsible for the consequences of your actions and disclaims any and all liability.
Continue (y/n)? y
When you attempt to include the allow-unsigned parameter on a switch in enhanced secure mode, the following message will appear to indicate that this parameter is not supported.
switch(config)# image-location http://10.0.0.1/container.img vrf mgmt allowunsigned Unsigned images are not permitted in the current secure mode, using the allow-unsigned parameter will have no effect.

Release 10.14 10.12

Modification The allow-unsigned parameter is introduced. Command introduced.

Command Information

Platforms
6300, except for S3L75A, S3L76A and S3L77A 6400

Command context config-container-<CONTAINER-NAME>

Authority
Administrators or local user group members with execution rights for this command.

restrict cpu
restrict cpu <PERCENTAGE> no restrict cpu
Description
Configures limitations for the container CPU usage. The CPU constraint is set as a percentage of the total switch CPUs. A container can use up to 20% of the total CPU capacity of the device.

Configuring the CPU constraint for an already operational container will cause the container to restart. The no form of this command removes restrictions on the CPU usage.

Parameter <PERCENTAGE>

Description
Specifies percentage for the container CPU usage, The default value is 10%.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

553

Command History

Release 10.12

Modification Command introduced

Command Information

Platforms
6300, except for S3L75A, S3L76A and S3L77A 6400

Command context config-container-<CONTAINER-NAME>

Authority
Administrators or local user group members with execution rights for this command.

restrict memory
restrict memory <MB> no restrict memory
Description
Configures limitations for memory usage of the container. The memory constraint is set in MB, and the maximum 20% of the capacity of the device can be configured. Configuring the memory constraint for an already operational container restarts the container. The no form of this command removes restrictions on the memory usage.

Parameter <MB>

Description
Specifies the maximum memory usage in MB.The default value is 256 MB.

Command History
Release 10.12

Modification Command introduced

Command Information

Platforms
6300, except for S3L75A, S3L76A and S3L77A 6400

Command context config-container-<CONTAINER-NAME>

Authority
Administrators or local user group members with execution rights for this command.

show container
show container [<CONTAINER-NAME>]

Container management commands | 554

Description
Shows the configuration and status information of the containers running in the system. If the container name is not specified, displays information of all the containers. When a container name is specified, displays information specific to the container.

Parameter <CONTAINER-NAME>

Description
Specifies the name of the container for which information need to be specified.

Examples
The following example shows configured container information:

switch# show container

Container

: app

Container status

: operational

Manifest status

: success

Image status

: verified

Image version

: 1.0.0

Image location VRF : mgmt

Image location URL : http://30.0.0.2:8000/container.img

CPU limit

: 10%

Memory limit

: 512 MB

VRFs

: mgmt

Environment variables:

PYP=/usr/bin/python3

Encrypted environment variables:

encryptedVar1

encryptedVar2

The following example shows additional error messages:

switch# show container

Container

: app

Container status

: configuration failed

Config failure reason : Multiple definitions of environment variable PYP

Manifest status

: error

Manifest status reason : 'exec' file not found in container

Image status

: verified

Image version

: 1.0.0

Image location VRF

: mgmt

Image location URL

: http://30.0.0.2:8000/container.img

CPU limit

: 10%

Memory limit

: 512 MB

VRFs

: mgmt

Environment variables :

PYP=/usr/bin/python3

Encrypted environment variables:

PYP

encryptedVar2

The following example shows a configured container without signature validation:

switch# show container app1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

555

Container

: app1

Container status

: operational

Manifest status

: success

Image status

: allowed without signature

Image version

: 1.0.0

Image location VRF : mgmt

Image location URL : http://30.0.0.2:8000/container.img

CPU limit

: 10%

Memory limit

: 512 MB

Environment variables:

PYP=/usr/bin/python3

Encrypted environment variables:

encryptedVar1

encryptedVar2

Network:

VRF name : mgmt

Preferred : no

Port map : n/a

VRF name : default Preferred : yes Port map :
8080:80/tcp 8080:8080/udp

The following example shows the command out when there are no configured containers:

switch# show container No containers configured

Command History
Release 10.12

Modification Command introduced

Command Information

Platforms
6300, except for S3L75A, S3L76A and S3L77A 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show capacities containers
show capacities containers
Description
Shows the maximum number of containerized applications that can be configured in the system.
Examples
Shows maximum number of containerized applications that can be configured:

Container management commands | 556

switch# show capacities containers

System Capacities: Filter CONTAINERS

Capacities Name

Value

----------------------------------------------------------------------------------

----

Maximum number of containerized applications configurable in the system 2

2

Command History
Release 10.12

Modification Command introduced

Command Information

Platforms
6300, except for S3L75A, S3L76A and S3L77A 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show capacities-status containers
show capacities-status containers
Description
Reserved for future use.
Command History

Release 10.12

Modification Command introduced

Command Information

Platforms
6300, except for S3L75A, S3L76A and S3L77A 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config container
show running-config container
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

557

Shows the running configuration of all the containers.

Parameter container

Description
Specifies that container running configuration must be displayed.

Examples
Shows the running configuration for the container:

container app1 image-location http://30.0.0.2:8000/container.img vrf mgmt restrict cpu 10 restrict memory 512 vrf attach mgmt env PYP value /usr/bin/python3 env encryptedVar1 encrypted ciphertext
AQBapcmUTCVdagTGkLA3m6NsslLgNOdxqUP0j+CCaCxVdz7oEwAAAOmmBmgPHGavS+6GkgmtwE4NU1Y=
container app2 image-location http://[2001::2]:8000/changeValidation_x86_t.img vrf mgmt restrict cpu 5 restrict memory 256 vrf attach mgmt env PYP value /usr/bin/python3 env encryptedVar1 encrypted ciphertext
AQBapcmUTCVdagTGkLA3m6NsslLgNOdxqUP0j+CCaCxVdz7oEwAAAOmmBmgPHGavS+6GkgmtwE4NU1Y= env encryptedVar2 encrypted ciphertext
AQBapY4V4v9UtDaazZaaJMeROhUizlVYVrTKKpa1N1bABTYICQAAACiXj/d3ZtBSYg==

Command History

Release 10.12

Modification Command introduced

Command Information

Platforms
6300, except for S3L75A, S3L76A and S3L77A 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

vrf
vrf <VRF-NAME>
Description
Allows container L3 connectivity using the given VRF. The container network namespace is connected to the VRF using the source NAT.

Container management commands | 558

Parameter <VRF-NAME>

Description Specifies the VRF-NAME used by the container application.

Command History

Release 10.12

Modification Command introduced

Command Information

Platforms
6300, except for S3L75A, S3L76A and S3L77A 6400

Command context config-container-<CONTAINER-NAME>

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

559

Chapter 24 CoPP commands

CoPP commands
Classes of traffic
The different classes of traffic that can be individually configured are: n acl-logging: Access Control List logging packets. n arp-broadcast: Address Resolution Protocol packets with a broadcast destination MAC address. n arp-protect: Address Resolution Protocol packets intercepted and inspected for ARP protection. n arp-unicast: Address Resolution Protocol packets with a switch system destination MAC address. n bfd-control: Bidirectional Forwarding Detection (BFD) control packets with a destination IP address
owned by the switch.
The bfd-control class is not supported for 6200 switch.

n bgp: Border Gateway Protocol packets with a destination IPv4 or IPv6 address owned by the switch.
The bgp class is not supported for 6200 switch.
n captive-portal: Packets intercepted in support of the Captive Portal feature. n dhcp: Dynamic Host Configuration Protocol packets. Also includes snooped DHCP packets if DHCP
snooping is enabled. n erps: Ethernet Ring Protection Switching control packets with the destination MAC address
01:19:a7:00:00:XX, where XX can be any value. n icmp-broadcast-ipv4: Internet Control Message Protocol packets with a broadcast or multicast
destination IPv4 address. n icmp-multicast-ipv6: Internet Control Message Protocol packets with a well-known multicast
destination IPv6 address. n icmp-security-ipv6: IPv6 Internet Control Message Protocol packets intercepted and inspected. n icmp-unicast-ipv4: Internet Control Message Protocol packets with a destination IPv4 address
owned by the switch n icmp-unicast-ipv6: Internet Control Message Protocol packets with a destination IPv6 address
owned by the switch. n ieee-8021x: IEEE 802.1X protocol packets with EtherType 0x0888E. n igmp: Internet Group Management Protocol packets. n ip-exceptions: Routable packets that would exceed the MTU for the egress interface, packets that
trigger ICMP redirects, and packets with TTL/hop_limit=1 that are discarded when routing through the switch. n ip-lockdown: Packets denied and logged due to violation of allowed "IP address/VLAN/port/MAC address" association.

AOS-CX 10.14 Command-Line Interface Guide

560

n ip-tracker: Track packets received for client IP address tracking.
The ip-tracker class is not supported for 6300 and 6400 switches.
n ipsec: Internet Protocol Security IPv4 or IPv6, unicast or configured multicast. All IPsec traffic received by the CPU will be regulated by the ipsec class regardless of the encapsulated protocol.
n ipv4-options: Unicast IPv4 packets including option headers. n lacp: Link Aggregation Control Protocol packets with the destination MAC address 01:80:c2:00:00:02. n lldp: Link Layer Discovery Protocol packets with the destination MAC address 01:80:c2:00:00:0e. n loop-protect: Loop Protection packets with the destination MAC address 09:00:09:09:13:a6. n mac-lockout: Packets denied and logged due to locked-out MAC address. n manageability: Unicast IP packets addressed to the switch for specific protocols that do not have a
dedicated CoPP class like HTTP, SSH, Telnet, and RADIUS. n mirror-to-cpu: Packets from mirroring session configured to deliver to the console. n mld: Multicast Listener Discovery packets of type V1 or V2 with an IPv6 address of FF00::/8, FF02::16
or FF02::2. n mvrp: Multiple VLAN Registration Protocol packets with the destination MAC address
01:80:c2:00:00:20 or 01:80:c2:00:00:21 n ntp: Network Time Protocol packets with a destination IP address owned by the switch. n ospf-multicast: Open Shortest Path First packets with the multicast destination IPv4 address
224.0.0.5 or 224.0.0.6, or IPv6 address FF02::5 or FF02::6. n ospf-unicast: Open Shortest Path First packets with a local destination IPv4 address or IPv6
address. n pim: Protocol Independent Multicast packets with the destination IPv4 address 224.0.0.13 or IPv6
address FF02::D, or with a destination IP address owned by the switch. n secure-learn: Packets intercepted and inspected to see if source MAC address is allowed on the
port. n sflow: Packet headers sampled by the switch that will be sent to the sFlow collector. n stp: Spanning Tree Protocol (STP) packets with the destination MAC address 01:80:c2:00:00:00 or
Per-VLAN Spanning Tree (PVST) packets with the destination MAC address 01:00:0c:cc:cc:cd. n udld: Unidirectional Link Detection packets with the destination MAC address 01:00:0c:cc:cc:cc or
00:e0:52:00:00:00, or Cisco Discovery Protocol packets with the destination MAC address 01:00:0c:cc:cc:cc. n unknown-multicast: Packets with an unknown multicast destination IP address. n unresolved-ip-unicast: Packets to be software forwarded by the management processor. n vrrp: Virtual Router Redundancy Protocol packets with the destination IPv4 address 224.0.0.18 or IPv6 address FF02::12, or VSX-Keepalive packets.
To regulate any other traffic destined for the CPU, every CoPP policy has a class named default that can also be configured to regulate other traffic to the CPU or prevent other traffic from being delivered.
All IPsec traffic received by the CPU will be regulated by the ipsec class regardless of the encapsulated protocol.
When ARP protection is enabled on the system, all ARP traffic will be regulated by the arp-protect class, regardless of the ARP destination and configuration of arp-broadcast or arp-unicast CoPP classes.
Packets for each of the CoPP classes above may have arrived through a tunnel, if tunneling was enabled.
CoPP commands | 561

apply copp-policy
apply copp-policy { <NAME> | default } no apply copp-policy <NAME>
Description
Applies a CoPP policy to the switch, replacing the policy that is in effect. There may be a brief interruption in traffic flow to the management processor while the switch implements the change. Enter the no apply copp-policy <NAME> command with the name of a CoPP policy to unapply a CoPP policy and apply the default CoPP policy. This will only take effect if the specified policy is actively applied. Since there must always be a CoPP policy applied, this command effectively attempts to replace the applied CoPP policy with the default CoPP policy. The default CoPP policy cannot be unapplied using this command.

Parameter <NAME>
default

Description
Specifies the name of the policy to apply. Length: 1 to 64 characters.
Applies the default policy.

Usage
If the new policy cannot be applied (for example, due to a lack of hardware resources), the previous policy remains in effect. Use the show copp-policy command to determine which policy is in effect.
Examples
Applying a policy named My_CoppPolicy:

switch(config)# apply copp-policy My_CoppPolicy

Applying the default policy:

switch(config)# apply copp-policy default

Unapplying a policy named My_CoppPolicy:

switch(config)# no apply copp-policy My_CoppPolicy

For more information on features that use this command, refer to the CoPP Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

562

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

class
class <CLASS> {drop | priority <PRIORITY> rate <RATE> [burst <BURST>]} no class <CLASS> {drop | priority <PRIORITY> rate <RATE> [burst <BURST>]}
Description
Adds a class to a CoPP policy. If the class exists, the existing class is modified. Changes made to an active (applied) policy take effect immediately. When adding or modifying a class in an active policy, CoPP immediately activates the change on the switch. In cases where insufficient hardware resources exist to support a class or its action, CoPP fails to activate the changed class on the switch. When this failure occurs, the active configuration on the switch will be out of sync with its definition. To diagnose and remedy this situation:
n Use the show copp-policy command to determine which classes are out of sync between the active policy and its definition.
n Use the reset copp-policy command to synchronize the active policy with its definition. This synchronization changes the classes in the definition to match the classes in the active policy.
The no form of this command removes the configuration for the class. Traffic for the class will be prioritized and regulated using the factory default configuration for the class. Use the show copppolicy factory-default command to display the factory default CoPP policy. To stop a class of traffic from reaching the processor, set the class action to drop.

Parameter <CLASS> drop priority <PRIORITY>
rate <RATE>
burst <BURST>

Description
Specifies the class to add or edit.
Drop packets matching the selected class.
Specifies the priority for packets matching the selected class. Range: 0 to 6.
Specifies the maximum rate, in packets per second (pps), for packets matching the selected class. Range: 25 to 99999.
Specifies the maximum burst size, in packets, for packets matching the selected class. Range: 1 to 9999.

Examples
Adding a class to handle LACP traffic with priority of 2 and rate of 2000:

switch(config-copp)# class lacp priority 2 rate 2000

Modifying the class to drop LLDP packets:

CoPP commands | 563

switch(config-copp)# class lldp drop Removing the class that handles LLDP packets.
switch(config-copp)# no class lldp

For more information on features that use this command, refer to the CoPP Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-copp

Modification --
Authority Administrators or local user group members with execution rights for this command.

clear copp-policy statistics
clear copp-policy statistics
Description
Resets statistics for all CoPP classes to zero.
Examples
Displaying and then resetting statistics for all classes in the active policy:

switch# show copp-policy statistics Statistics for CoPP policy 'default': Totals:
packets passed : 1000 Class: default
packets passed : 400 Class: acl-logging
packets passed : 100 Class: arp-broadcast
packets passed : 500 <--OUTPUT OMITTED FOR BREVITY-->
switch# clear copp-policy statistics switch# show copp-policy statistics Statistics for CoPP policy 'default': Totals:
packets passed : 0 Class: default
packets passed : 0 Class: acl-logging

packets dropped packets dropped packets dropped packets dropped
packets dropped packets dropped

: 1500 : 600 : 100 : 800
:0 :0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

564

packets passed : 0 Class: arp-broadcast
packets passed : 0

packets dropped : 0 packets dropped : 0

For more information on features that use this command, refer to the CoPP Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

copp-policy
copp-policy {<NAME> | default [revert]} no copp-policy <NAME>
Description
Creates a CoPP policy and switches to the config-copp context for the policy. Or, if the specified policy exists, switches to the config-copp context for the policy. A predefined policy, named default, contains factory default classes and is applied to the switch at first startup. This policy cannot be deleted, but its configuration can be changed. The no form of this command removes a CoPP policy. If a policy is active (applied), it cannot be removed . It must be replaced with another policy before it can be removed.

Parameter <NAME>
default revert

Description
Specifies the name of the policy to add or edit. Length: 1 to 64 characters. The name must not be a substring of any of the following reserved words: default, factory-default, commands, configuration, or statistics.
Specifies the default CoPP policy. Use this default policy to configure the default policy.
Sets the default CoPP policy to its factory settings.

Examples
Creating a policy named My_CoppPolicy:

CoPP commands | 565

switch(config)# copp-policy My_CoppPolicy switch(config-copp)# Removing a policy named My_CoppPolicy: switch(config)# no copp-policy My_CoppPolicy Setting the default policy to its factory settings: switch(config)# copp-policy default revert Unapplying the policy named My_CoppPolicy: switch(config)# no apply copp-policy My_CoppPolicy

For more information on features that use this command, refer to the CoPP Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

default-class
default-class priority <PRIORITY> rate <RATE> [burst <BURST>]
Description
Configures the default class that is automatically defined for all CoPP policies. The default class cannot be removed, but its configuration can be changed. The default class is applied to traffic that does not match any other class defined for a policy.

Parameter priority <PRIORITY>
rate <RATE>

Description
Specifies the priority for packets matching the selected class. Range: 0 to 6.
Specifies the maximum rate, in packets per second (pps), for packets matching the selected class. Range: 25 to 99999.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

566

Parameter burst <BURST>

Description
Specifies the maximum burst size, in packets, for packets matching the selected class. Range: 1 to 9999.

Example
Setting the default class to a priority of 2 and rate of 2000:

switch(config-copp)# default-class priority 2 rate 2000

For more information on features that use this command, refer to the CoPP Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-copp

Modification --
Authority Administrators or local user group members with execution rights for this command.

reset copp-policy
reset copp-policy { <NAME> | default }
Description
Resets an active CoPP policy to match the settings that are currently in effect for the active policy on the switch. Changes made to the active policy that could not be activated are removed from the active policy. When the switch fails to add or modify a class in an active CoPP policy, it is possible the active policy settings on the switch may be out of sync with those defined in the policy.

Parameter <NAME>
default

Description
Specifies the name of the policy to reset. Length: 1 to 64 characters.
Resets the default policy to match its active settings.

Examples
Resetting a policy named My_CoppPolicy:

switch# show copp-policy My_CoppPolicy

class

drop priority rate pps burst pkts hardware rate pps

CoPP commands | 567

--------------------- ---- -------- -------- ---------- -----------------

igmp

6

5000

60

5000

lacp

2

2000

2050

2000

default

1

6000

70

6000

switch# config terminal

switch(config)# copp-policy My_CoppPolicy

switch(config-copp)# class stp priority 4 rate 4000 burst 60

switch(config-copp)# do show copp-policy My_CoppPolicy

class

drop priority rate pps burst pkts hardware rate pps

--------------------- ---- -------- -------- ---------- -----------------

igmp

6

5000

60

5000

lacp

2

2000

2050

2000

default

1

6000

70

6000

% Warning: user-specified classes in CoPP policy My_CoppPolicy do not match

active configuration.

switch(config-copp)# do show copp-policy My_CoppPolicy configuration

class

drop priority rate pps burst pkts applied

--------------------- ---- -------- -------- ---------- -------

igmp

6

5000

60

yes

lacp

2

2000

2050

yes

stp

4

4000

60

no

default

1

6000

70

yes

% Warning: user-specified classes in CoPP policy My_CoppPolicy do not match

active configuration.

switch(config-copp)# exit

switch(config)# reset copp-policy My_CoppPolicy

switch(config)# do show copp-policy My_CoppPolicy

class

drop priority rate pps burst pkts hardware rate pps

--------------------- ---- -------- -------- ---------- -----------------

igmp

6

5000

60

5000

lacp

2

2000

2050

2000

default

1

6000

70

6000

Resetting the default policy:

switch(config)# reset copp-policy default

For more information on features that use this command, refer to the CoPP Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show copp-policy
show copp-policy [<NAME> | default] [commands] [configuration] [vsx-peer]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

568

Description
Shows CoPP policy settings for a specific CoPP policy. When entered without specifying either a name or the default parameter, shows all the CoPP policy settings that are active on the switch and have successfully been programmed into the hardware. A warning is displayed if:
n The active and user-specified applications of a policy do not match. n The active and user-specified configurations of a policy do not match.

Parameter <NAME>
default commands configuration vsx-peer

Description
Specifies the name of the policy for which to display settings. Length: 1 to 64 characters.
Displays CoPP settings for the default policy.
Displays output as CLI commands.
Displays user-specified CoPP settings and not the active settings.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Displaying the CoPP policies defined in the configuration and the active application:

switch# show copp-policy applied copp_policy_name ------- ----------------
My_CoppPolicy applied default switch#

Displaying the active configuration of all CoPP policies as CLI commands:

switch# show copp-policy commands copp-policy My_CoppPolicy
class igmp priority 6 rate 5000 burst 60 class lacp priority 2 rate 2000 burst 2050 default-class priority 1 rate 6000 burst 70 copp-policy default class acl-logging priority 0 rate 25 burst 3 class arp-broadcast priority 2 rate 1250 burst 1250 class arp-protect priority 2 rate 2075 burst 2075 class arp-unicast priority 3 rate 825 burst 825 class bfd-control priority 5 rate 850 burst 850
<--OUTPUT OMITTED FOR BREVITY--> default-class priority 2 rate 4225 burst 528 apply copp-policy default switch#

Displaying the default policy:

CoPP commands | 569

switch# show copp-policy default

class

drop priority rate pps burst pkts hardware rate pps

--------------------- ---- -------- -------- ---------- -----------------

acl-logging

0

25

3

25

arp-broadcast

2

1250

1250

1250

arp-protect

2

2075

2075

2075

arp-unicast

3

825

825

825

bfd-control

5

850

850

850

<--OUTPUT OMITTED FOR BREVITY-->

default

2

4225

528

4225

For more information on features that use this command, refer to the CoPP Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show copp-policy factory-default
show copp-policy factory-default [commands] [vsx-peer]
Description
Display the configuration for the factory-default CoPP policy.

Parameter commands vsx-peer

Description
Displays output as CLI commands.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Displaying the factory-default policy:

switch# show copp-policy factory-default

class

drop priority rate pps burst pkts

--------------------- ---- -------- -------- ----------

acl-logging

0

25

3

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

570

arp-broadcast

2

1250

arp-protect

2

2075

arp-unicast

3

825

bfd-control

5

850

<--OUTPUT OMITTED FOR BREVITY-->

default

2

4225

1250 2075 825 850
528

Displaying the active configuration of My_CoppPolicy (My_CoppPolicy is applied):

switch# config terminal

switch(config)# apply copp-policy My_CoppPolicy

switch(config)# do show copp-policy My_CoppPolicy

class

drop priority rate pps burst pkts hardware rate pps

--------------------- ---- -------- -------- ---------- -----------------

igmp

6

5000

60

5000

lacp

2

2000

2050

2000

default

1

6000

70

6000

Displaying the active configuration of My_CoppPolicy as CLI commands:

switch# show copp-policy My_CoppPolicy commands copp-policy My_CoppPolicy
class igmp priority 6 rate 5000 burst 60 class lacp priority 2 rate 2000 burst 2050 default-class priority 1 rate 6000 burst 70 apply copp-policy My_CoppPolicy

Displaying the user-specified configuration of My_CoppPolicy:

switch# show copp-policy My_CoppPolicy configuration

class

drop priority rate pps burst pkts applied

--------------------- ---- -------- -------- ---------- -------

igmp

6

5000

60

yes

lacp

2

2000

2050

yes

default

1

6000

70

yes

Displaying the user-specified configuration of My_CoppPolicy as CLI commands:

switch# show copp-policy My_CoppPolicy commands configuration copp-policy My_CoppPolicy
class igmp priority 6 rate 5000 burst 60 class lacp priority 2 rate 2000 burst 2050 default-class priority 1 rate 6000 burst 70 apply copp-policy My_CoppPolicy

For more information on features that use this command, refer to the CoPP Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

CoPP commands | 571

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show copp-policy statistics
show copp-policy statistics [class <CLASS> | default-class | non-zero] [vsx-peer]
Description
Displays statistics for all classes, a single class, or all classes with non-zero statistics in the active CoPP policy.

Parameter <CLASS> default-class non-zero vsx-peer

Description
Specifies the class for which to display statistics.
Displays statistics for the default class.
Displays statistics for all classes with non-zero statistics.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
If a single class is specified, the priority, rate, and burst size that has been programmed in hardware for that class will be shown.
Examples
Applying the default CoPP policy and displaying statistics for all classes in the actively applied policy:
The rate displayed is the actual rate in hardware.

switch# config terminal

switch(config)# apply copp-policy default

switch(config)# exit

switch# show copp-policy statistics

Statistics for CoPP policy 'default':

Totals:

packets passed : 1000

packets dropped

Class: default

packets passed : 400

packets dropped

Class: acl-logging

packets passed : 100

packets dropped

Class: arp-broadcast

packets passed : 500

packets dropped

<--OUTPUT OMITTED FOR BREVITY-->

: 1500 : 600 : 100 : 800

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

572

Displaying statistics for the default class in the active policy:

switch(config)# show copp-policy statistics default-class

Statistics for CoPP policy 'default':

Class: default

Description: Default

priority

:2

rate (pps)

: 4225

burst size (pkts) : 528

packets passed : 400

packets dropped : 600

Displaying statistics for the class arp-broadcast in the actively applied policy:

switch# show copp-policy statistics class arp-broadcast

Statistics for CoPP policy 'default':

Class: arp-broadcast

Description: Address Resolution Protocol broadcast

priority

:2

rate (pps)

: 1250

burst size (pkts) : 1250

packets passed : 500

packets dropped : 800

For more information on features that use this command, refer to the CoPP Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show tech copp
show tech copp
Description
Displays the output of all show commands supported by CoPP.
Examples
Capturing the command output into a local file:

CoPP commands | 573

switch# show tech copp local-file Show Tech output stored in local-file. Please use 'copy show-tech local-file' to copy-out this file.
switch# copy show-tech local-file ? REMOTE_URL URL of syntax {tftp://|sftp://USER@}{IP|HOST}[:PORT][;blocksize=VAL]/FILE STORAGE_URL URL of syntax usb:/file
switch# copy show-tech local-file

For more information on features that use this command, refer to the CoPP Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

574

Chapter 25 Debug logging commands

Debug logging commands
clear debug buffer
clear debug buffer
Description
Clears all debug logs. Using the show debug buffer command will only display the logs generated after the clear debug buffer command.
Examples
Clearing all generated debug logs:
switch# show debug buffer ------------------------------------------------------------------------------------------------------------show debug buffer ------------------------------------------------------------------------------------------------------------2018-10-14:09:10:58.558710|lldpd|LOG_DEBUG|MSTR||LLDP|LLDP_CONFIG|No Port cfg changes 2018-10-14:09:10:58.558737|lldpd|LOG_DEBUG|MSTR||LLDP|LLDP_EVENT|lldpd_stats_run entered at time 8257199 2018-10-14:09:10:58.569317|lldpd|LOG_DEBUG|MSTR||LLDP|LLDP_CONFIG|No Port cfg changes 2018-10-14:09:11:21.881907|hpe-sysmond|LOG_INFO|MSTR||SYSMON|SYSMON_CONFIG|Sysmon poll interval changed to 32
switch# clear debug buffer switch# show debug buffer ------------------------------------------------------------------------------------------------------------show debug buffer ------------------------------------------------------------------------------------------------------------2018-10-14:09:13:24.481407|hpe-sysmond|LOG_INFO|MSTR||SYSMON|SYSMON_CONFIG|Sysmon poll interval changed to 51

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide

575

Command Information

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

debug {all | <MODULE-NAME>}
debug {all | <MODULE-NAME>} [<SUBMODULE-NAME>] [severity (emer|crit|alert|err|notice|warning|info|debug)] {port <PORT-NAME> | vlan <VLAN-ID> | ip <IP-ADDRESS> | mac <MAC-ADDRESS> | vrf <VRF-NAME> | instance <INSTANCE-ID>}
no debug {all | <MODULE-NAME>} [<SUBMODULE-NAME>] {port | vlan | ip | mac | vrf | instance}
Description
Enables debug logging for modules or submodules by name, with optional filtering by specific criteria. The no form of this command disables debug logging.

Parameter all
<MODULE-NAME>
<SUBMODULE-NAME>
severity (emer|crit|alert|err| notice|warning|info|debug)
emer crit alert err notice warning info

Description
Enables debug logging for all modules.
Enables debug logging for a specific module. For a list of supported modules, enter the debug command followed by a space and a question mark (?).
Enables debug logging for a specific submodule. For a list of supported submodules, enter the debug <MODULE-NAME> command followed by a space and a question mark (?).
Selects the minimum severity log level for the destination. If a severity is not provided, the default log level is debug. Optional.
Specifies storage of debug logs with a severity level of emergency only.
Specifies storage of debug logs with severity level of critical and above.
Specifies storage of debug logs with severity level of alert and above.
Specifies storage of debug logs with severity level of error and above.
Specifies storage of debug logs with severity level of notice and above.
Specifies storage of debug logs with severity level of warning and above.
Specifies storage of debug logs with severity level of info and above.

Debug logging commands | 576

Parameter debug port vlan <VLAN-ID> ip <IP-ADDRESS> mac <MAC-ADDRESS> vrf <VRF-NAME> instance <INSTANCE-ID>
Examples
switch# debug all

Description
Specifies storage of debug logs with severity level of debug (default).
Displays debug logs for the specified port, for example 1/1/1.
Displays debug logs for the specified VLAN. Provide a VLAN from 1 to 4094.
Displays debug logs for the specified IP Address.
Displays debug logs for the specified MAC Address, for example A:B:C:D:E:F.
Displays debug logs for the specified VRF.
Displays debug logs for the specified instance. Provide an instance ID from 1 to 255.

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

debug db
debug db {all | sub-module} [level <MINIMUM-SEVERITY>] [filter]
no debug db {all | sub-module} [level <MINIMUM-SEVERITY>] [filter]
Description
Enables or disables debug logging for a db module or submodules, with an option to filter by specific criteria. The no form of this command disables debug logging for the db module or submodule.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

577

Parameter all sub-module filter severity (emer|crit|alert|err|
notice|warning|info|debug) emer crit alert err notice warning info debug

Description
Enables all submodules for the db log.
Enables debug logging for supported submodules. Specify rx or tx debug logs.
Specifies supported filters for the db log. Specify table, column, or client. Optional
Selects the minimum severity log level for the destination. If a severity is not provided, the default log level is debug. Optional.
Specifies storage of debug logs with a severity level of emergency only.
Specifies storage of debug logs with severity level of critical and above.
Specifies storage of debug logs with severity level of alert and above.
Specifies storage of debug logs with severity level of error and above.
Specifies storage of debug logs with severity level of notice and above.
Specifies storage of debug logs with severity level of warning and above.
Specifies storage of debug logs with severity level of info and above.
Specifies storage of debug logs with severity level of debug (default).

Usage
DBlog is a high performance, configuration, and state database server logging infrastructure where a user can log the transactions which are sent or received by clients to the configuration and state database server. It can be enabled through the CLI and REST, and also supports filters where a user can filter out logs on the basis of table, column, or client. It is helpful for debugging when the user wants to debug an issue with a particular client, table, or column combination. It is not enabled by default. A combination of filters can also be applied to filter out messages based on table, column, and client. There are three submodules for the "db" module:
1. all: When All is enabled, no filters are applied to any of the debug logs, even if other submodules are configured with filters.
2. tx: If enabled, only the replies and notifications sent out for the initial and incremental updates are logged.
3. rx: If enabled, only the transactions sent to the configuration and state database server are logged.
The keyword all may be used to enable or disable debug logging for all sub-modules. Also a combination of filters can be used to filter the message types.

Debug logging commands | 578

If the table or client filter is applied, then the messages belonging to this specific table or client will be logged. The column filter can also be applied to further filter messages on a table, providing a mechanism to filter messages on a column. The table and client filter can be used in combination or separately, but column can only be used in conjunction with table.
Examples
Configuring all submodules with severity debug:
switch# debug db all severity debug
Configuring the tx submodule with table Interface filter and severity debug:
switch# debug db tx table Interface severity debug
Configuring the rx submodule with table Interface column statistics filter and severity debug:
switch# debug db rx table Interface column statistics severity debug
Disabling the rx submodule:
switch# no debug db rx
Disabling the tx submodule table Interface:
switch# no debug db tx table Interface

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

debug destination
debug destination {syslog | file | console | buffer} [severity (emer|crit|alert|err|notice|warning|info|debug)] no debug destination {syslog | file | console}

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

579

Description
Sets the destination for debug logs and the minimum severity level for each destination The no form of this command unsets the destination for debug logs.

Parameter {syslog | file | console | buffer} syslog file console buffer severity (emer|crit|alert|err|
notice|warning|info|debug)
emer
crit
alert
err
notice
warning
info
debug

Description
Selects the destination to store debug logs. Required.
Specifies that the debug logs are stored in the syslog.
Specifies that debug logs are stored in file.
Specifies that debug logs are stored in console.
Specifies that debug logs are stored in buffer (default).
Selects the minimum severity log level for the destination. If a severity is not provided, the default log level isdebug. Optional.
Specifies storage of debug logs with a severity level of emergency only.
Specifies storage of debug logs with severity level of critical and above.
Specifies storage of debug logs with severity level of alert and above.
Specifies storage of debug logs with severity level of error and above.
Specifies storage of debug logs with severity level of notice and above.
Specifies storage of debug logs with severity level of warning and above.
Specifies storage of debug logs with severity level of info and above.
Specifies storage of debug logs with severity level of debug (default).

Usage
Events that have a severity equal to or higher than the configured severity level are stored in the designated destination. The product defaults to buffer for destination and debug as a severity level.
Examples

switch# debug destination syslog severity alert switch# debug destination console severity info switch# debug destination file severity warning

Debug logging commands | 580

switch# debug destination buffer severity err

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show debug
show debug [vsx-peer]
Description
Displays the enabled debug types. Parameter vsx-peer
Examples

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

switch# show debug

----------------------------------------------------------------------------------

-

module sub_module severity vlan port ip

mac

instance vrf

----------------------------------------------------------------------------------

-

all

all

err 1 1/1/1 10.0.0.1 1a:2b:3c:4d:5e:6f 2

abcd

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

581

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show debug buffer
show debug buffer [module <MODULE-NAME> | severity (emer|crit|alert|err|notice|warning|info|debug)]
Description
Displays debug logs stored in the specified debug buffer with optional filtering by module or severity.

Parameter <MODULE-NAME> severity (emer|crit|alert|err|
notice|warning|info|debug) emer crit alert err
notice
warning info debug

Description Filters debug logs displayed by the specified module name.
Displays debug logs with a specified severity level. Defaults todebug. Optional.
Displays debug logs with a severity level of emergency only.
Displays debug logs with a severity level of critical and above.
Displays debug logs with a severity level of alert and above.
Specifies storage of debug logs with severity level of error and above.
Specifies storage of debug logs with severity level of notice and above.
Displays debug logs with a severity level of warning and above.
Displays debug logs with a severity level of info and above.
Displays debug logs with a severity level of debug (default).

Examples

switch# show debug buffer
-----------------------------------------------------------------------------show debug buffer -----------------------------------------------------------------------------2017-03-06:06:51:15.089967|hpe-sysmond|SYSMON|SYSMON_CONFIG|LOG_INFO|Sysmon poll

Debug logging commands | 582

interval changed to 20

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show debug buffer vsf

Applicable for 6300 switches only.
show debug buffer vsf [member <MEMBER-ID>] [{conductor | standby}]
Description
Displays VSF member debug logs stored in the debug buffer, with an option to filter by VSF member and role.

Parameter <MEMBER-ID>
conductor standby

Description
Displays debug logs for the specified member-id. Optional. Range: 1-10.
Display debug logs for the VSF conductor.
Display debug logs for the VSF standby.

Examples
Displaying VSF member debug logs with member-id 1:

switch# show debug buffer vsf member 1 -----------------------------------------------------------------------------show debug buffer -----------------------------------------------------------------------------2020-12-14:07:53:17.217919|hpe-ledarbd|LOG_DEBUG|MMBR|2|LED|LED|ledarbd_vsf_mbrs_ check: Checking VSF_Member table

Displaying VSF member debug logs for member state conductor:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

583

switch# show debug buffer vsf conductor -----------------------------------------------------------------------------show debug buffer -----------------------------------------------------------------------------2020-12-14:07:54:20.469024|hpe-ledarbd|LOG_DEBUG|CDTR|1|LED|LED|ledarbd_pd_ subsystems_check: Checking Subsystem table

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History

Release 10.09 10.07 or earlier

Command Information

Platforms 6300

Command context Manager (#)

Modification Updated parameter name for inclusive language --
Authority Administrators or local user group members with execution rights for this command.

show debug destination
show debug destination [vsx-peer]
Description
Displays the configured debug destination and severity.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

switch# show debug destination --------------------------------------------------------------------show debug destination ---------------------------------------------------------------------
CONSOLE:info FILE:warning

Debug logging commands | 584

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

585

Chapter 26 Device fingerprinting commands

Device fingerprinting commands

cdp
cdp [tlv-name {chassis-id | address | port-id | capabilities | version | platform | native-vlan | duplex}] [tlv-num <TLV-NUMBER>]
no cdp [tlv-name {chassis-id | address | port-id | capabilities | version | platform | native-vlan | duplex}] [tlv-num <TLV-NUMBER>]
Description
Configures the CDP protocol attributes in the device fingerprinting profile context which the switch uses to collect information from the connected devices. The no form of this command removes the CDP protocol configuration associated with the device fingerprinting profile.

Parameter tlv-name <TLV-NUMBER>

Description
Selects one of the available CDP TLV names. Default: platform.
Selects one of the available CDP TLV numbers. Supported values are 1 to 6, 10, and 11. Default: 6

Examples
Configuring the device fingerprinting profile temp using CDP with TLV name capabilities and TLV number 4:

switch(config)# client device-fingerprint profile temp switch(temp)# cdp tlv-name capabilities switch(temp)# cdp tlv-num 4

Removing the device fingerprinting profile temp using CDP with TLV name capabilities:

switch(config)# client device-fingerprint profile temp switch(temp)# no cdp tlv-name capabilities

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08

Modification Command introduced

AOS-CX 10.14 Command-Line Interface Guide

586

Command Information

Platforms
6300 6400

Command context <DEVICE-FINGERPRINTING-PROFILE-NAME>

Authority
Administrators or local user group members with execution rights for this command.

client device-fingerprint apply-profile
client device-fingerprint [apply-profile <PROFILE-NAME>] no client device-fingerprint [apply-profile <PROFILE-NAME>]
Description
Associates a device fingerprinting profile on all interfaces. When a profile is configured on an interface, the configured profile will supersede the system-wide profile configuration. The no form of this command removes the association of device fingerprinting profile from the ports.
The client-limit on the interface is governed by the configuration under the interface.

Parameter <PROFILE-NAME>

Description
Specifies the name of the fingerprint profile. Range: Up to 128 characters.

Examples
Applying device fingerprinting profile named frprnt01 at system level:

switch# configure switch(config)# client device-fingerprint apply-profile fnprnt01

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13 10.08

Command Information

Platforms
6300 6400

Command context config

Modification Command supported on all interfaces. Command introduced for interface level.
Authority Administrators or local user group members with execution rights for this command.

Device fingerprinting commands | 587

client device-fingerprint client-limit
client device-fingerprint [client-limit <LIMIT>] no client device-fingerprint [client-limit <LIMIT>]
Description
Set a maximum client-limit supported on a port or port list. The client-limit can be configured under the interface context.The no form of this command will remove the client-limit from the particular port/portlist.

Parameter <LIMIT>

Description
Specifies the maximum client limit for a port. Range: n 6300: 1 to 2048. Default is 256. An individual interface on the
switch can support 1-2048 clients, with a default value of 256 clients. n 6400: 1 to 4096. Default is 256. An individual interface on the switch can support 1-4096 clients, with a default value of 256 clients.

Examples
Applying a client limit of 200 on the interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# client device-fingerprint client-limit 200

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08

Command Information

6300 6400

Command context config-if

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

client device-fingerprint profile
client device-fingerprint profile <PROFILE-NAME> no client device-fingerprint profile <PROFILE-NAME>
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

588

Configures a device fingerprinting profile. You can configure a maximum of 32 profiles. The no form of this command removes the device fingerprinting profile.

Parameter <PROFILE-NAME>

Description
Specifies the name of the fingerprint profile. Range: Up to 128 characters.

Examples
Configuring fingerprint profile fnprnt01:

switch(config)# client device-fingerprint profile fnprnt01

Deleting the fingerprint profile fnprnt01:

switch(config)# no client device-fingerprint profile fnprnt01

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

dhcp
dhcp [option-num <OPTION-NUMBER>][options-list] no dhcp [option-num <OPTION-NUMBER>][options-list]
Description
Configures the DHCP protocol attributes in the device fingerprinting profile context based on which the switch collects information from the connected devices. Default option numbers are 12, 55, and 60. The DHCP options-list is disabled by default. It can be manually enabled to extract the DHCP Options list in network order as they appear in a DHCP packet. The no form of this command removes the DHCP protocol configuration associated with the device fingerprinting profile.

Device fingerprinting commands | 589

Parameter <OPTION-NUMBER>
[options-list]

Description
Specifies the DHCP option number to match. Supported values are 1 to 255. Default option numbers: 12, 55, and 60.
Selects the DHCP options list for device fingerprinting.

Examples
Configuring the device fingerprinting profile temp2 using DHCP with option 55:

switch(config)# client device-fingerprint profile temp2 switch(config-device-fingerprint)# dhcp option-num 55

Removing the device fingerprinting profile temp2 using DHCP with option 55:

switch(config)# client device-fingerprint profile temp2 switch(config-device-fingerprint)# no dhcp option-num 55

Configuring the device fingerprinting profile temp2 using DHCP default options and options-list:

switch(config)# client deivce-fingerprint profile temp2 switch(temp2)# dhcp options-list

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10 10.08

Modification Added options-list parameter. Command introduced

Command Information

Platforms
6300 6400

Command context config-device-fingerprint

Authority
Administrators or local user group members with execution rights for this command.

http user-agent
http user-agent no http user-agent
Description
Configures the HTTP protocol in the device fingerprinting profile context based on which the switch collects information from the connected devices.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

590

The no form of this command removes the HTTP protocol configuration associated with the device fingerprinting profile.
As of AOS-CX release 10.10 information from the last 3 user agents is provided as part of the device fingerprinting solution.
Examples
Configuring the device fingerprinting profile temp3 using HTTP:
switch(config)# client device-fingerprint profile temp3 switch(temp3)# http user-agent
Removing the device fingerprinting profile temp3 using HTTP:
switch(config)# client device-fingerprint profile temp3 switch(temp3)# no http user-agent

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.08

Modification Command introduced

Command Information

Platforms
6300 6400

Command context <DEVICE-FINGERPRINTING-PROFILE-NAME>

Authority
Administrators or local user group members with execution rights for this command.

lldp (device fingerprinting)
lldp [tlv-name {chassis-id | port-id | time-to-live | port-description | system-name | system-description | system-capabilities | management-address}] [tlv-num <TLV-NUMBER>]
no lldp [tlv-name {chassis-id | port-id | time-to-live | port-description | system-name | system-description | system-capabilities | management-address}] [tlv-num <TLV-NUMBER>]
Description
Configures the LLDP protocol attributes in the device fingerprinting profile context based on which the switch collects information from the connected devices. The no form of this command removes the LLDP protocol configuration associated with the device fingerprinting profile.

Device fingerprinting commands | 591

Parameter tlv-name
<TLV-NUMBER>

Description
Selects one of the available LLDP TLV names. Default: systemdescription.
Selects one of the available LLDP TLV numbers. Supported values are 1 to 8. Default: 6

Examples
Configuring the device fingerprinting profile temp1 using LLDP with TLV name system-name and TLV number 5:

switch(config)# client deivce-fingerprint profile temp1 switch(temp1)# lldp tlv-name system-name switch(temp1)# lldp tlv-num 5

Removing the device fingerprinting profile temp1 using LLDP with TLV name system-name:

switch(config)# client device-fingerprint profile temp1 switch(temp1)# no lldp tlv-name system-name

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08

Modification Command introduced

Command Information

Platforms
6300 6400

Command context <DEVICE-FINGERPRINTING-PROFILE-NAME>

Authority
Administrators or local user group members with execution rights for this command.

vsx-sync
vsx-sync no vsx-sync
Description
Enables device fingerprint profile-level synchronization between primary to secondary switches in VSX. The no form of this command disables device fingerprint profile-level synchronization between primary to secondary switches in VSX.
Examples
Enabling VSX synchronization at the device fingerprinting profile fnprnt01:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

592

switch(config)# client device-fingerprint profile fnprnt01 switch(fnprnt01)# vsx-sync
Disabling VSX synchronization at the device fingerprinting profile fnprnt01:
switch(config)# client device-fingerprint profile fnprnt01 switch(fnprnt01)# no vsx-sync

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08

Modification Command introduced

Command Information

Platforms 6400

Command context <DEVICE-FINGERPRINTING-PROFILE-NAME>

Authority
Administrators or local user group members with execution rights for this command.

vsx-sync device-fingerprint
vsx-sync device-fingerprint no vsx-sync device-fingerprint
Description
Enables synchronization of device fingerprinting configuration between primary to secondary switches at the interface level. The no form of this command disables synchronization of device fingerprinting configuration between primary to secondary switches in VSX at the interface level.
Examples
Enabling VSX synchronization for device fingerprinting:
switch(config)# interface 1/1/1 switch(config-if)# vsx-sync device-fingerprint
Disabling VSX synchronization for device fingerprinting:
switch(config)# interface 1/1/1 switch(config-if)# no vsx-sync device-fingerprint

Device fingerprinting commands | 593

For more information on features that use this command, refer to the Security Guide for your switch model.
>

Release 10.08

Modification Command introduced

Command Information

Platforms 6400

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

show client device-fingerprint
show client device-fingerprint <MAC-ADDRESS>
Description
Shows fingerprinting attributes collected from all devices or a particular device using MAC address.

Parameter <MAC-ADDRESS>

Description Specifies the client MAC address.

Examples
Showing fingerprinting attributes collected from a device with MAC address f8:40:f0:c9:70:40:

switch (config)# show client device-fingerprint f8:60:f0:c9:70:40

Port

: 1/1/2

VLAN

: 30

Protocol : DHCP

Host Name(12)

: dut1

Vendor-Class-Identifier(60) : Aruba JL678A

Protocol : HTTP

User Agent1 : n/a

Protocol : LLDP

Chassis-Name(1)

: 6100

Chassis-Description(6)

: Aruba JL678A PL.10.06.0001AAF-180-g9406d01

System Capabilities(7)

: Bridge, Router

Protocol : CDP

n/a

Showing fingerprinting attributes collected from all devices when the LLDP profile is not configured on port 1/1/1 and all the protocols are enabled on port 1/1/2. CDP data was not collected on 1/1/2, though it was configured:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

594

switch (config)# show client device-fingerprint

Client MAC Address : f8:60:f0:c9:70:40

Port

: 1/1/1

VLAN

: 20

Protocol: DHCP

Host Name(12)

: dut1

Vendor-Class-Identifier(60) : Aruba JL678A

Protocol: HTTP

User Agent1 : Aruba123

User Agent2 : Aruba234

User Agent3 : Aruba345

Protocol: LLDP

n/a

Protocol: CDP

Device-Id(1)

: dut1

Address(3)

: 10.1.1.2

Platform(6)

: cisco C9300-24T

Version(5)

: Cisco IOS Software [Gibraltar], Catal...

Capabilities(4) : igmp_capable,router,switch

Client MAC Address : f8:40:f0:c9:70:40

Port

: 1/1/2

VLAN

: 30

Protocol : DHCP

Host Name(12)

: dut1

Vendor-Class-Identifier(60) : Aruba JL678A

Protocol : HTTP

User Agent1 : ArubaCentral

User Agent2 : Aruba234

Protocol : LLDP

Chassis-Name(1)

: 6100

Chassis-Description(6)

: Aruba JL678A PL.10.06.0001AAF-180-g9406d01

System Capabilities(7)

: Bridge, Router

Protocol: CDP

Showing fingerprinting attributes where all the protocols are enabled on port 1/1/3 along with DHCP options-list:

switch (config)# show client device-fingerprint

Client MAC Address : f8:40:f0:c9:70:50

Port

: 1/1/3

VLAN

: 40

Protocol : DHCP

Host Name(12)

: dut1

Vendor-Class-Identifier(60) : Aruba JL678A

DHCP Options-List :

Discover(1) : 53,116,61,50,12,60,55,255

Request(3) : 53,61,50,54,12,81,60,55,255

Protocol : HTTP

User Agent1 : Aruba

Protocol : LLDP

Chassis-Name(1)

: 6100

Chassis-Description(6)

: Aruba JL678A PL.10.06.0001AAF-180-g9406d01

System Capabilities(7)

: Bridge, Router

Protocol: CDP

Device-Id(1)

: dut1

Address(3)

: 10.1.1.2

Device fingerprinting commands | 595

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show client device-fingerprint active
show client device-fingerprint active
Description
Shows status details of device fingerprinting profiles associated with the ports. Displays the protocols that are configured for a profile and whether the profile is enabled or disabled at that port.
Examples
Showing details of device fingerprinting profiles:

switch (config)# show client device-fingerprint active

Port Profile

Status

DHCP HTTP LLDP CDP

-----------------------------------------------------------------------

1/1/1 profile1

Configured

Y

Y

NN

1/1/2 profile2

Not configured

N

N

YY

1/1/3 profile3

Configured

N

Y

NY

System profile4

Configured

Y

Y

YN

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13 10.08
Command Information

Modification
Command output modified to displays details about all the interfaces.
Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

596

Platforms
6300 6400

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show client device-fingerprint profile
show client device-fingerprint profile [<PROFILE-NAME>]
Description
Shows details of protocol configuration for device fingerprinting profiles.

Parameter <PROFILE-NAME>

Description
Specifies the name of the fingerprint profile. Range: Up to 128 characters.

Examples
Showing details of protocol configuration for device fingerprinting profile Profile1:

switch (config)# show client device-profile Profile1 DHCP Attributes
Option Numbers : 12,50,55,60 Options List : Enable

HTTP Attributes

User-Agent

: Enable

LLDP Attributes TLV Names TLV Numbers

: chassis-id, system-description : 4,5,7

CDP Attributes TLV Names TLV Numbers

: n/a : 1-3,6

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms 6300

Command context Manager (#)

Modification Command introduced
Authority Operators or Administrators or local user group members with

Device fingerprinting commands | 597

Platforms 6400

Command context

Authority
execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

598

Chapter 27 Device profile commands

Device profile commands
aaa authentication port-access allow-cdp-auth
aaa authentication port-access allow-cdp-auth no aaa authentication port-access allow-cdp-auth
Description
Use this command to allow or block authentication on the CDP (Cisco Discovery Protocol) BPDU (Bridge Protocol Data Unit) . This is allowed by default. The no form of this command prevents authentication on CDP packets received on the port. This command can be issued from the interface (config-if) or Link Aggregation Group (config-lag-if) contexts.
Examples
On the 6400 Switch Series, interface identification differs. Allowing authentication on a CDP CPDU on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access allow-cdp-auth
Allowing authentication on a CDP CPDU on a LAG port:
switch(config)# interface lag 1 switch(config-lag-if)# aaa authentication port-access allow-cdp-auth

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13

10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-lag-if

Modification This command can be issued from a Link Aggregation Group (LAG) context. --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide

599

aaa authentication port-access allow-cdp-bpdu
aaa authentication port-access allow-cdp-bpdu no aaa authentication port-access allow-cdp-bpdu
Description
Allows all packets related to the CDP (Cisco Discovery Protocol) BPDU (Bridge Protocol Data Unit) on a secure port or LAG. This command can be issued from the interface (config-if) or Link Aggregation Group (config-lag-if) contexts. The no form of this command blocks the CDP BPDU on a secure port. On a nonsecure port, the command has no effect.
Examples
On the 6400 Switch Series, interface identification differs. Allowing a CDP BPDU on secure port 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access allow-cdp-bpdu switch(config-if)# do show running-config Current configuration: ! !Version AOS-CX 10.0X.0000 led locator on ! ! vlan 1 aaa authentication port-access mac-auth
enable aaa authentication port-access dot1x authenticator
enable interface 1/1/1
no shutdown vlan access 1 aaa authentication port-access allow-cdp-bpdu aaa authentication port-access mac-auth
enable aaa authentication port-access dot1x authenticator enable

switch(config-if)# do show port-access device-profile interface all

Port 1/1/1, Neighbor-Mac 00:0c:29:9e:d1:20

Profile Name : access_switches

LLDP Group

:

CDP Group

: aruba-ap_cdp

Role

: test_ap_role

Status

: In Progress

Failure Reason :

Blocking LLDP packet on secure port 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no aaa authentication port-access allow-cdp-bpdu switch(config-if)# do show running-config Current configuration: ! !Version AOS-CX 10.0X.0000 led locator on

Device profile commands | 600

! ! vlan 1 aaa authentication port-access mac-auth
enable interface 1/1/1
no shutdown vlan access 1 aaa authentication port-access mac-auth
enable
Allowing a CDP BPDU on LAG 1:
switch(config)# interface lag 1 switch(config-lag-if)# aaa authentication port-access allow-cdp-bpdu

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13

10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-lag-if

Modification This command can be issued from a Link Aggregation Group (LAG) context. --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access allow-cdp-proxy-logoff
aaa authentication port-access allow-cdp-proxy-logoff no aaa authentication port-access allow-cdp-proxy-logoff
Description
Allows a client to be logged off from the system via a special TLV in the CDP packet. By default, proxy logoff via CDP packet support is disabled. When allow-cdp-proxy-logoff is enabled, TLV received from CDP packets corresponding to logoff processing will be read and logoff is issued to the clients. This only works on client authentication enabled ports and aaa authentication port-access allow-cdp-bpdu must be enabled to process. This command can be issued from the interface (config-if) or Link Aggregation Group (config-lag-if) contexts.
Examples
On the 6400 Switch Series, interface identification differs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

601

Allowing a client to be logged off from the system via a special TLV in the CDP packet:
switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access allow-cdp-proxy-logoff switch(config-if)# show running-config interface 1/1/1 interface 1/1/1
no shutdown
vlan access 1 aaa authentication port-access allow-cdp-bpdu aaa authentication port-access allow-cdp-proxy-logoff aaa authentication port-access allow client-limit 2 aaa authentication port-access dot1x authenticator
enable aaa authentication port-accss mac-auth
enable exit
The aaa authentication port-access allow-cdp-proxy-logoff command can also be issued from a LAG port context
switch(config)# interface lag 1 switch(config-lag if)# aaa authentication port-access allow-cdp-proxy-logoff

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13

10.09.1000

Command Information

Platforms
6300 6400

Command context
config-if config-lag-if

Modification This command can be issued from a Link Aggregation Group (LAG) context. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access allow-lldp-bpdu
aaa authentication port-access allow-lldp-bpdu no aaa authentication port-access allow-lldp-bpdu
Description
Allows all packets related to the LLDP BPDU (Bridge Protocol Data Unit) on a secure port. This command can be issued from the interface (config-if) or Link Aggregation Group (config-lag-if) contexts.

Device profile commands | 602

The no form of this command blocks the LLDP BPDU on a secure port. On a nonsecure port, the command has no effect.
Examples
On the 6400 Switch Series, interface identification differs. Allowing an LLDP BPDU on secure port 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access allow-lldp-bpdu switch(config-if)# do show running-config Current configuration: ! !Version AOS-CX 10.0X.0000 led locator on ! ! vlan 1 aaa authentication port-access mac-auth
enable interface 1/1/1
no shutdown

vlan access 1 aaa authentication port-access allow-lldp-bpdu aaa authentication port-access mac-auth
enable

switch(config-if)# do show port-access device-profile interface all

Port 1/1/1, Neighbor-Mac 00:0c:29:9e:d1:20

Profile Name : access_switches

LLDP Group

: 2920-grp

CDP Group

:

Role

: local_2920_role

Status

: Profile Applied

Failure Reason :

Blocking LLDP BPDU on secure port 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# no aaa authentication port-access allow-lldp-bpdu switch(config-if)# do show running-config Current configuration: ! !Version AOS-CX 10.0X.0000led locator on ! ! vlan 1 aaa authentication port-access mac-auth
enable interface 1/1/1
no shutdown
vlan access 1 aaa authentication port-access mac-auth enable

Allowing an LLDP BPDU on a LAG port:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

603

switch(config)# interface lag 1 switch(config-lag-if)#aaa authentication port-access allow-lldp-bpdu

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13

10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-lag-if

Modification This command can be issued from a Link Aggregation Group (LAG) context. --
Authority Administrators or local user group members with execution rights for this command.

associate cdp-group
associate cdp-group <GROUP-NAME> no associate cdp-group <GROUP-NAME>
Description
Associates a CDP (Cisco Discovery Protocol) group with a device profile. A maximum of two CDP groups can be associated with a device profile. The no form of this command removes a CDP group from a device profile.

Parameter <GROUP-NAME>

Description
Specifies the name of the CDP group to associate with this device profile. Range: 1 to 32 alphanumeric characters.

Examples
Associating the CDP group my-cdp-group with the device profile profile01:

switch(config)# port-access device-profile profile01 switch(config-device-profile)# associate cdp-group my-cdp-group

Removing the CDP group my-cdp-group from the device profile profile01:

switch(config)# port-access device-profile profile01 switch(config-device-profile)# no associate cdp-group my-cdp-group

Device profile commands | 604

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-device-profile

Authority
Administrators or local user group members with execution rights for this command.

associate lldp-group
associate lldp-group <GROUP-NAME> no associate lldp-group <GROUP-NAME>
Description
Associates an LLDP group with a device profile. A maximum of two LLDP groups can be associated with a device profile The no form of this command removes an LLDP group from a device profile.

Parameter <GROUP-NAME>

Description
Specifies the name of the LLDP group to associate with the device profile. Range: 1 to 32 alphanumeric characters.

Examples
Associating the LLDP group my-lldp-group with the device profile profile01:

switch(config)# port-access device-profile profile01 switch(config-device-profile)# associate lldp-group my-lldp-group

Removing the LLDP group my-lldp-group from the device profile profile01:

switch(config)# port-access device-profile profile01 switch(config-device-profile)# no associate lldp-group my-lldp-group

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

605

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-device-profile

Authority
Administrators or local user group members with execution rights for this command.

associate mac-group
associate mac-group <GROUP-NAME> no associate mac-group <GROUP-NAME>
Description
Associates a MAC group with a device profile. A maximum of two MAC groups can be associated with a device profile. The no form of this command removes a MAC group from a device profile.

Parameter <GROUP-NAME>

Description
Specifies the name of the MAC group to associate with this device profile. Range: 1 to 32 alphanumeric characters.

Examples
Associating the MAC group mac01-group with the device profile profile01:

switch(config)# port-access device-profile profile01 switch(config-device-profile)# associate mac-group mac01-group

Removing the MAC group mac01-group from the device profile profile01:

switch(config)# port-access device-profile profile01 switch(config-device-profile)# no associate mac-group mac01-group

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Device profile commands | 606

Platforms
6300 6400

Command context config-device-profile

Authority
Administrators or local user group members with execution rights for this command.

associate role
associate role <ROLE-NAME> no associate role <ROLE-NAME>
Description
Associates a role with a device profile. Only one role can be associated with a device profile. For information on how to configure a role, see the port access role information in the Security Guide. The no form of this command removes a role from a device profile.

Parameter <ROLE-NAME>

Description
Specifies the name of the role to associate with the device profile. Range: 1 to 64 alphanumeric characters.

Examples
Associating the role my-role with the device profile profile01:

switch(config)# port-access device-profile profile01 switch(config-device-profile)# associate role my-role

Removing the role my-role from the device profile profile01:

switch(config)# port-access device-profile profile01 switch(config-device-profile)# no associate role my-role

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-device-profile

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

607

disable
disable no disable
Description
Disables a device profile. The no form of this command enables a device profile.
Examples
Disabling a device profile:
switch(config)# port-access device-profile profile01 switch(config-device-profile)# disable
Enabling a device profile named profile01:
switch(config)# port-access device-profile profile01 switch(config-device-profile)# no disable

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-device-profile

Authority
Administrators or local user group members with execution rights for this command.

enable
enable no enable
Description
Enables a device profile. The no form of this command disables a device profile.
Examples
Enabling a device profile:

Device profile commands | 608

switch(config)# port-access device-profile profile01 switch(config-device-profile)# enable
Disabling a device profile named profile01:
switch(config)# port-access device-profile profile01 switch(config-device-profile)# no enable

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-device-profile

Authority
Administrators or local user group members with execution rights for this command.

ignore (for CDP groups)
ignore [seq <SEQ-NUM>] {platform <PLATFORM> | sw-version <SWVERSION> | voice-vlan-query <VLAN-ID>}
no ignore [seq <SEQ-ID>] {platform <PLATFORM> | sw-version <SWVERSION> | voice-vlan-query <VLAN-ID>}
Description
Defines a rule to ignore devices for a CDP (Cisco Discovery Protocol) group. Up to 64 match/ignore rules can be defined for a group. The no form of this command removes a rule for ignoring devices from a CDP group.

Parameter seq <SEQ-ID>
platform <PLATFORM> sw-version <SWVERSION>

Description
Specifies the ID of the rule to create or modify. If no ID is specified when adding a rule, an ID is automatically assigned in increments of 10 in the order in which rules are added. When more than one rule matches the command entered, the rule with the lowest ID takes precedence.
Specifies the hardware or model details of the neighbor. Range: 1 to 128 alphanumeric characters.
Specifies the software version of the neighbor. Range: 1 to 128 alphanumeric characters.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

609

Parameter voice-vlan-query <VLAN-ID>

Description Specifies the VLAN query value of the neighbor. Range: 1 to 65535.

Examples
Adding a rule to the CDP group grp01 that ignores a device that transmits PLATFORM01 in the platform TLV:

switch(config)# port-access cdp-group grp01 switch(config-cdp-group)# ignore platform PLATFORM01

Adding a rule to the CDP group grp01 that ignores a device that transmits SWVERSION in software version TLV:

switch(config)# port-access cdp-group grp01 switch(config-cdp-group)# ignore sw-version SWVERSION

Removing the rule that matches the sequence number 25 from the CDP group named grp01.

switch(config)# port-access cdp-group grp01 switch(config-cdp-group)# no ignore seq 25

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-cdp-group

Modification --
Authority Administrators or local user group members with execution rights for this command.

ignore (for LLDP groups)
ignore [seq <SEQ-ID>] {sys-desc <SYS-DESC> | sysname <SYS-NAME> | vendor-oui <VENDOR-OUI> [type <KEY> [value <VALUE>]]}
no ignore [seq <SEQ-ID>] {sys-desc <SYS-DESC> | sysname <SYS-NAME> | vendor-oui <VENDOR-OUI> [type <KEY> [value <VALUE>]]}
Description
Defines a rule to ignore devices for an LLDP group. Up to 64 match/ignore rules can be defined for a group.

Device profile commands | 610

The no form of this command removes a rule for ignoring devices from an LLDP group.

Parameter seq <SEQ-ID>
sys-desc <SYS-DESC> sysname <SYS-NAME> vendor-oui <VENDOR-OUI> type <KEY> value <VALUE>

Description
Specifies the ID of the rule to create or modify. If no ID is specified when adding a rule, an ID is automatically assigned in increments of 10 in the order in which rules are added. When more than one rule matches the command entered, the rule with the lowest ID takes precedence.
Specifies the LLDP system description type-length-value (TLV). Range: 1 to 256 alphanumeric characters.
Specifies the LLDP system name TLV. Range: 1 to 64 alphanumeric characters.
Specifies the LLDP system vendor OUI TLV. Range: 1 to 6 alphanumeric characters.
Specifies the vendor OUI subtype key. Optional.
Specifies the vendor OUI subtype value. Range: 1 to 256 alphanumeric characters.

Examples
Adding a rule to the LLDP group grp01 that ignores a device that transmits PLATFORM01 in the system description TLV:

switch(config)# port-access lldp-group grp01 switch(config-lldp-group)# ignore sys-desc PLATFORM01

Removing the rule that matches the sequence number 25 from the LLDP group named grp01.

switch(config)# port-access lldp-group grp01 switch(config-lldp-group)# no match seq 25

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-lldp-group

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

611

ignore (for MAC groups)
[seq <SEQ-ID>] ignore {mac <MAC-ADDR> | mac-mask <MAC-MASK> | mac-oui <MAC-OUI>} no [seq <SEQ-ID>] ignore {mac <MAC-ADDR> | mac-mask <MAC-MASK> | mac-oui <MAC-OUI>}
Description
Defines a rule to ignore devices for a MAC group based on the criteria of MAC address, MAC address mask, or MAC Organizational Unique Identifier (OUI). Up to 64 ignore rules can be defined for a group. The no form of this command removes a rule for ignoring devices from a MAC group.

Parameter seq <SEQ-ID>
mac <MAC-ADDR> mac-mask <MAC-MASK> mac-oui <MAC-OUI>

Description
Specifies the entry sequence ID of the rule to create or modify a MAC group. If no ID is specified when adding a rule, an ID is automatically assigned in increments of 10 in the order in which rules are added. When more than one rule matches the command entered, the rule with the lowest ID takes precedence. Range: 1 to 4294967295.
Specifies the MAC address of the device to ignore.
Specifies the MAC address mask to ignore devices in that range. Supported MAC address masks: /32 and /40.
Specifies the MAC OUI to ignore devices in that range. Supports MAC OUI address of maximum length of 24 bits.

Usage
To achieve the required configuration of matches for devices, it is recommended to first ignore the devices that you do not want to add. Then match the criteria for the rest of the devices that you want to add to the MAC group. For example, if you want to ignore a specific device but add all the other devices that belong to a MAC OUI, then you must first configure the ignore criteria with a lower sequence number. And then configure match criteria with a higher sequence number.
Examples
Adding a rule to the MAC group grp01 to ignore a device based on MAC address, but match all other devices belonging to a MAC OUI:

switch(config)# mac-group grp01 switch(config-mac-group)# ignore mac 1a:2b:3c:4d:5e:6f switch(config-mac-group)# match mac-oui 1a:2b:3c switch(config-mac-group)# exit switch(config)# do show running-config Current configuration: ! !Version AOS-CX Virtual.10.0X.0001 !export-password: default led locator on ! ! ! ! ssh server vrf mgmtdefault !

Device profile commands | 612

! ! ! ! vlan 1 interface mgmt
no shutdown ip dhcp mac-group grp01
seq 10 ignore mac 1a:2b:3c:4d:5e:6f seq 20 match mac-oui 1a:2b:3c
```
Adding a rule to the MAC group grp01 to ignore devices based on MAC address mask, but match all other devices belonging to a MAC OUI:
switch(config)# mac-group grp01 switch(config-mac-group)# ignore mac-mask 1a:2b:3c:4d/32 switch(config-mac-group)# match mac-oui 1a:2b:3c switch(config-mac-group)# exit switch(config)# do show running-config Current configuration: ! !Version AOS-CX Virtual.10.0X.0001 !export-password: default led locator on ! ! ! ! ssh server vrf mgmtdefault ! ! ! ! ! vlan 1 interface mgmt
no shutdown ip dhcp mac-group grp01
seq 10 ignore mac-mask 1a:2b:3c:4d/32 seq 20 match mac-oui 1a:2b:3c
```
Adding a rule to the MAC group grp01 that ignores a device based on complete MAC address:
switch(config)# mac-group grp01 switch(config-mac-group)# ignore mac 1a:2b:3c:4d:5e:6f
Adding a rule to the MAC group grp02 that ignores devices based on MAC mask:
switch(config)# mac-group grp01 switch(config-mac-group)# ignore mac-mask 1a:2b:3c:4d:5e/40 switch(config-mac-group)# ignore mac-mask 18:e3:ab:73/32

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

613

Adding a rule to the MAC group grp03 that ignores devices based on MAC OUI:
switch(config)# mac-group grp03 switch(config-mac-group)# ignore mac-oui 81:cd:93
Adding a rule to the MAC group grp01 that ignores devices with a sequence number and based on MAC address:
switch(config)# mac-group grp01 switch(config-mac-group)# seq 10 ignore mac b2:c3:44:12:78:11 switch(config-mac-group)# exit switch(config)# do show running-config Current configuration: ! !Version AOS-CX Virtual.10.0X.0001 !export-password: default led locator on ! ! vlan 1 interface mgmt
no shutdown ip dhcp mac-group grp01 seq 10 ignore mac b2:c3:44:12:78:11
```
Removing the rule from the MAC group grp01 based on sequence number:
switch(config)# mac-group grp01 switch(config-mac-group)# no ignore seq 10 switch(config-mac-group)# exit switch(config)# do show running-config Current configuration: ! !Version AOS-CX Virtual.10.0X.0001 !export-password: default led locator on ! ! vlan 1 interface mgmt
no shutdown ip dhcp mac-group grp01
```
Adding a rule to the MAC group grp01 that ignores devices with MAC entry sequence number and based on MAC OUI:
switch(config)# mac-group grp01 switch(config-mac-group)# seq 10 ignore mac b2:c3:44:12:78:11 switch(config-mac-group)# seq 20 ignore mac-oui 1a:2b:3c switch(config-mac-group)# seq 30 ignore mac-mask 71:14:89:f3/32 switch(config-mac-group)# exit
Device profile commands | 614

switch(config)# do show running-config Current configuration: ! !Version AOS-CX Virtual.10.0X.0001 !export-password: default led locator on ! ! vlan 1 interface mgmt
no shutdown ip dhcp mac-group grp01
seq 10 ignore mac b2:c3:44:12:78:11 seq 20 ignore mac-oui 1a:2b:3c seq 30 ignore mac-mask 71:14:89:f3/32
```
Removing the rule from the MAC group grp01 based on sequence number and MAC OUI:
switch(config)# mac-group grp01 switch(config-mac-group)# no seq 20 ignore mac-oui 1a:2b:3c switch(config-mac-group)# exit switch(config)# do show running-config Current configuration: ! !Version AOS-CX Virtual.10.0X.0001 !export-password: default led locator on ! ! vlan 1 interface mgmt
no shutdown ip dhcp mac-group grp01
seq 10 ignore mac b2:c3:44:12:78:11 seq 30 ignore mac-mask 71:14:89:f3/32
```
Removing the rule that matches the sequence number 25 from the MAC group named grp01.
switch(config)# mac-group grp01 switch(config-mac-group)# no ignore seq 25

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

615

Command Information

Platforms
6300 6400

Command context config-mac-group

Authority
Administrators or local user group members with execution rights for this command.

mac-group
mac-group <MAC-GROUP-NAME> no mac-group <MAC-GROUP-NAME>
Description
Creates a MAC group or modifies an existing MAC group. A MAC group is used to classify connected devices based on the MAC address details, such as mask or OUI. A maximum of 32 MAC groups can be configured on the switch. A maximum of 2 MAC groups can be associated with a device profile. Each group accepts 64 match or ignore commands. The no form of this command removes a MAC group.

Parameter <MAC-GROUP-NAME>

Description
Specifies the name of the MAC group to create or modify. The maximum number of characters supported is 32.

Examples
Creating a MAC group named grp01:

switch(config)# mac-group grp01 switch(config-mac-group)# exit

Removing a MAC group named grp01:

switch(config)# no mac-group grp01

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Device profile commands | 616

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

match (for CDP groups)
match [seq <SEQ-ID>] {platform <PLATFORM> | sw-version <SWVERSION> | voice-vlan-query <VLAN-ID>}
no match [seq <SEQ-ID>] {platform <PLATFORM> | sw-version <SWVERSION> | voice-vlan-query <VLAN-ID>}
Description
Defines a rule to match devices for a CDP group. A maximum of 32 CDP groups can be configured on the switch. Up to 64 match or ignore rules can be defined for each group. The no form of this command removes a rule for adding devices to a CDP group.

Parameter seq <SEQ-ID>
platform <PLATFORM> sw-version <SWVERSION> voice-vlan-query <VLAN-ID>

Description
Specifies the ID of the rule to create or modify. If no ID is specified when adding a rule, an ID is automatically assigned in increments of 10 in the order in which rules are added. When more than one rule matches the command entered, the rule with the lowest ID takes precedence.
Specifies the hardware or model details of the neighbor. Range: 1 to 128 alphanumeric characters.
Specifies the software version of the neighbor. Range: 1 to 128 alphanumeric characters.
Specifies the VLAN query value of the neighbor. Range: 1 to 65535.

Examples
Adding rules to match a Cisco device with a specific software version on VLAN 512 to the CDP group grp01:

switch(config)# port-access cdp-group grp01 switch(config-cdp-group)# match platform CISCO switch(config-cdp-group)# match sw-version 11.2(12)P switch(config-cdp-group)# match voice-vlan-query 512 switch(config-cdp-group)# match seq 50 platform cisco sw-version 11.2(12)P voicevlan-query 512 switch(config-cdp-group)# exit switch(config)# do show running-config
Current configuration: ! !Version AOS-CX Virtual.10.0X.000 !export-password: default led locator on ! ! vlan 1 port-access cdp-group grp01

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

617

seq 10 match platform CISCO seq 20 match sw-version 11.2(12)P seq 30 match voice-vlan-query 512 seq 50 match platform cisco sw-version 11.2(12)P voice-vlan-query 512
Removing a rule that matches the sequence number 25 from the CDP group named grp01:
switch(config)# port-access cdp-group grp01 switch(config-cdp-group)# no match seq 25
Adding a rule that matches the value of vendor-OUI 000b86 to the CDP group named grp01:
switch(config)# port-access cdp-group grp01 switch(config-cdp-group)# match vendor-oui 000b86

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-cdp-group

Modification --
Authority Administrators or local user group members with execution rights for this command.

match (for LLDP groups)
match [seq <SEQ-ID>] {sys-desc <SYS-DESC> | sysname <SYS-NAME> | vendor-oui <VENDOR-OUI> [type <KEY> [value <VALUE>]]}
no match [seq <SEQ-ID>] {sys-desc <SYS-DESC> | sysname <SYS-NAME> | vendor-oui <VENDOR-OUI> [type <KEY> [value <VALUE>]]}
Description
Defines a rule to match devices for an LLDP group. Up to 64 match/ignore rules can be defined for a group. The no form of this command removes a rule.

Parameter seq <SEQ-ID>

Description
Specifies the ID of the rule to create or modify. If no ID is specified when adding a rule, an ID is automatically assigned in increments of 10 in the order in which rules are added. When more than one

Device profile commands | 618

Parameter
sys-desc <SYS-DESC> sysname <SYS-NAME> vendor-oui <VENDOR-OUI> type <KEY> value <VALUE>

Description
rule matches the command entered, the rule with the lowest ID takes precedence.
Specifies the LLDP system description type-length-value (TLV). Range: 1 to 256 alphanumeric characters.
Specifies the LLDP system name TLV. Range: 1 to 64 alphanumeric characters.
Specifies the LLDP system vendor OUI TLV. Range: 1 to 6 alphanumeric characters.
Specifies the vendor OUI subtype key.
Specifies the vendor OUI subtype value. Range: 1 to 256 alphanumeric characters.

Examples
Adding rules that match the LLDP system description ArubaSwitch and system name Aruba to the LLDP group named grp01:

switch(config)# port-access lldp-group grp01 switch(config-lldp-group)# match sys-desc ArubaSwitch switch(config-lldp-group)# match sysname Aruba switch(config)# do show running-config
Current configuration: ! !Version AOS-CX Virtual.10.0X.000 !export-password: default led locator on ! ! vlan 1 port-access lldp-group grp01
seq 10 match sys-desc ArubaSwitch seq 20 match sysname Aruba

Removing a rule that matches the sequence number 25 from an LLDP group named grp01:

switch(config)# port-access lldp-group grp01 switch(config-lldp-group)# no match seq 25

Adding a rule that matches the value of vendor-OUI 000b86 with type of 1 to the LLDP group named grp01:

switch(config)# port-access lldp-group grp01 switch(config-lldp-group)# match vendor-oui 000b86 type 1

Adding a rule that matches the value of vendor-OUI 000c34 to the LLDP group named grp01:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

619

switch(config)# port-access lldp-group grp01 switch(config-lldp-group)# match vendor-oui 000c34

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-lldp-group

Modification --
Authority Administrators or local user group members with execution rights for this command.

match (for MAC groups)
[seq <SEQ-ID>] match {mac <MAC-ADDR> | mac-mask <MAC-MASK> | mac-oui <MAC-OUI>} no [seq <SEQ-ID>] match {mac <MAC-ADDR> | mac-mask <MAC-MASK> | mac-oui <MAC-OUI>}
Description
Defines a rule to match devices for a MAC group based on the criteria of MAC address, MAC address mask, or MAC Organizational Unique Identifier (OUI). Up to 64 match rules can be defined for a group.

You must not configure the following special MAC addresses: n Null MAC--For example, 00:00:00:00:00:00 or 00:00:00/32 n Multicast MAC n Broadcast MAC--For example, ff:ff:ff:ff:ff:ff:ff n System MAC
Although the switch accepts these addresses, it will not process these addresses for the local MAC match feature.

The no form of this command removes a rule for adding devices to a MAC group.
The number of clients that can onboard based on the match criteria is configured in the aaa authentication port-access client-limit command. For information about this command, see the Security Guide for your switch.

Parameter seq <SEQ-ID>

Description
Specifies the entry sequence ID of the rule to create or modify a MAC group. If no ID is specified when adding a rule, an ID is automatically assigned in increments of 10 in the order in which

Device profile commands | 620

Parameter
mac <MAC-ADDR> mac-mask <MAC-MASK> mac-oui <MAC-OUI>

Description
rules are added. When more than one rule matches the command entered, the rule with the lowest ID takes precedence. Range: 1 to 4294967295.
Specifies the MAC address of the device.
Specifies the MAC address mask to add devices in that range. Supported MAC address masks: /32 and /40.
Specifies the MAC OUI to add devices in that range. Supports MAC OUI address of maximum length of 24 bits.

Examples
Adding a device to the MAC group grp01 based on complete MAC address:

switch(config)# mac-group grp01 switch(config-mac-group)# match mac 1a:2b:3c:4d:5e:6f switch(config-mac-group)# exit

Adding devices to the MAC group grp02 based on MAC mask:

switch(config)# mac-group grp01 switch(config-mac-group)# match mac-mask 1a:2b:3c:4d:5e/40 switch(config-mac-group)# match mac-mask 18:e3:ab:73/32 switch(config-mac-group)# exit

Adding devices to the MAC group grp03 based on MAC OUI:

switch(config)# mac-group grp03 switch(config-mac-group)# match mac-oui 81:cd:93 switch(config-mac-group)# exit

Adding devices to the MAC group grp01 with MAC entry sequence number and based on MAC address:

switch(config)# mac-group grp01 switch(config-mac-group)# seq 10 match mac b2:c3:44:12:78:11 switch(config-mac-group)# exit switch(config)# do show running-config Current configuration: ! !Version AOS-CX Virtual.10.0X.0001 !export-password: default led locator on ! ! vlan 1 interface mgmt
no shutdown ip dhcp mac-group grp01 seq 10 match mac b2:c3:44:12:78:11

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

621

```
Removing devices from the MAC group grp01 based on sequence number:
switch(config)# mac-group grp01 switch(config-mac-group)# no match seq 10 switch(config-mac-group)# exit switch(config)# do show running-config Current configuration: ! !Version AOS-CX Virtual.10.0X.0001 !export-password: default led locator on ! ! vlan 1 interface mgmt
no shutdown ip dhcp mac-group grp01
```
Adding devices to the MAC group grp01 with MAC entry sequence number and based on MAC address, MAC address mask, and MAC OUI:
switch(config)# mac-group grp01 switch(config-mac-group)# seq 10 match mac b2:c3:44:12:78:11 switch(config-mac-group)# seq 20 match mac-oui 1a:2b:3c switch(config-mac-group)# seq 30 match mac-mask 71:14:89:f3/32 switch(config-mac-group)# exit switch(config)# do show running-config Current configuration: ! !Version AOS-CX Virtual.10.0X.0001 !export-password: default led locator on ! ! vlan 1 interface mgmt
no shutdown ip dhcp mac-group grp01
seq 10 match mac b2:c3:44:12:78:11 seq 20 match mac-oui 1a:2b:3c seq 30 match mac-mask 71:14:89:f3/32
```
Removing devices from the MAC group grp01 based on MAC OUI:
switch(config)# mac-group grp01 switch(config-mac-group)# no seq 20 match mac-oui 1a:2b:3c switch(config-mac-group)# exit switch(config)# do show running-config Current configuration:
Device profile commands | 622

! !Version AOS-CX Virtual.10.0X.0001 !export-password: default led locator on ! ! vlan 1 interface mgmt
no shutdown ip dhcp mac-group grp01
seq 10 match mac b2:c3:44:12:78:11 seq 30 match mac-mask 71:14:89:f3/32
```
Adding devices to the MAC group grp03 with MAC entry sequence number and based on MAC address mask:
switch(config)# mac-group grp03 switch(config-mac-group)# seq 10 match mac-mask 10:14:a3:b7:55/40 switch(config-mac-group)# exit switch(config)# do show running-config Current configuration: ! !Version AOS-CX Virtual.10.0X.0001 !export-password: default led locator on ! ! vlan 1 interface mgmt
no shutdown ip dhcp mac-group grp03
seq 10 match mac-mask 10:14:a3:b7:55/40
```
Removing devices from the MAC group grp03 based on MAC address mask:
switch(config)# mac-group grp03 switch(config-mac-group)# no seq 10 match mac-mask 10:14:a3:b7:55/40 switch(config-mac-group)# exit switch(config)# do show running-config Current configuration: ! !Version AOS-CX Virtual.10.0X.0001 !export-password: default led locator on ! ! vlan 1 interface mgmt
no shutdown ip dhcp mac-group grp03

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

623

```

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-mac-group

Modification --
Authority Administrators or local user group members with execution rights for this command.

port-access cdp-group
port-access cdp-group <CDP-GROUP-NAME> no port-access cdp-group <CDP-GROUP-NAME>
Description
Creates a CDP (Cisco Discovery Protocol) group or modifies an existing CDP group. A CDP Group is used to classify connected devices based on the CDP packet details advertised by the device. A maximum of 32 CDP groups can be configured on the switch. Each group accepts 64 match/ignore commands. The no form of this command removes a CDP group.

Parameter <CDP-GROUP-NAME>

Description
Specifies the name of the CDP group to create or modify. The maximum number of characters supported is 32. Required.

Examples
Creating a CDP group named grp01:

switch(config)# port-access cdp-group grp01 switch(config-cdp-group)# match platform CISCO switch(config-cdp-group)# match sw-version 11.2(12)P switch(config-cdp-group)# match voice-vlan-query 512 switch(config-cdp-group)# seq 50 match platform cisco sw-version 11.2(12)P voicevlan-query 512 switch(config-cdp-group)# exit switch(config)# do show running-config
Current configuration: !

Device profile commands | 624

!Version AOS-CX Virtual.10.0X.000 !export-password: default led locator on ! ! vlan 1 port-access cdp-group grp01
seq 10 match platform CISCO seq 20 match sw-version 11.2(12)P seq 30 match voice-vlan-query 512 seq 50 match platform cisco sw-version 11.2(12)P voice-vlan-query 512
Removing a CDP group named grp01:
switch(config)# no port-access cdp-group grp01

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

port-access device-profile
port-access device-profile <DEVICE-PROFILE-NAME> no port-access device-profile <DEVICE-PROFILE-NAME>
Description
Creates a new device profile and switches to the config-device-profile context. A maximum of 32 device profiles can be created. This command can be issued from the interface (config-if) or Link Aggregation Group (config-lag-if) contexts. The no form of this command removes a device profile.

Parameter <DEVICE-PROFILE-NAME>

Description
Specifies the name of a device profile. Range: 1 to 32 alphanumeric characters.

Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

625

Creating a device profile named profile01:
switch(config)# port-access device-profile profile01 switch(config-device-profile)#
Removing a device profile named profile01:
switch(config)# no port-access device-profile profile01
Creating a device profile named profile02 on a LAG port:
switch(config)#interface lag 1 switch(config-lag-if)# port-access device-profile profile01 switch(config-device-profile)#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13

10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config config-if config-lag-if

Modification This command can be issued from a Link Aggregation Group (LAG) context. --
Authority Administrators or local user group members with execution rights for this command.

port-access device-profile mode block-until-profile-applied
You must configure this mode in device profile only on standalone ports where there is no security configured and when you not want the port to be offline until one client is onboarded.
port-access device-profile mode block-until-profile-applied no port-access device-profile mode block-until-profile-applied
Description
Configures the switch to block the port until a profile match occurs for a device. This configuration is required when no security feature is enabled on the port. You must enable this mode or security on the port for local MAC match feature to operate. You must not enable both features on the same port at the same time.

Device profile commands | 626

You must not combine any other AAA configurations with the block-until-profile-applied mode.
This command can be issued from the interface (config-if) or Link Aggregation Group (config-lag-if) contexts. The no form of this command removes a rule for adding devices to a MAC group.
Example
On the 6400 Switch Series, interface identification differs. Configuring block-until-profile applied mode on port 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# port-access device-profile switch(config-if-deviceprofile)# mode block-until-profile-applied switch(config-if-deviceprofile)# end

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13
10.07 or earlier

Modification
This command can be issued from a Link Aggregation Group (LAG) context.
--

Command Information

Platforms
6300 6400

Command context
config-if config-if-deviceprofile config-lag-if

Authority
Administrators or local user group members with execution rights for this command.

port-access lldp-group
port-access lldp-group <LLDP-GROUP-NAME> no port-access lldp-group <LLDP-GROUP-NAME>
Description
Creates an LLDP group or modifies an existing LLDP group. An LLDP group is used to classify connected devices based on the LLDP type-length-values (TLVs) advertised by the device. A maximum of 32 LLDP groups can be configured on the switch. Each group accepts 64 match/ignore commands. The no form of this command removes an LLDP group.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

627

Parameter <LLDP-GROUP-NAME>

Description
Specifies the name of the LLDP group to create or modify. The maximum number of characters supported is 32. Required.

Examples
Creating an LLDP group named grp01:

switch(config)# port-access lldp-group grp01 switch(config-lldp-group)#

Removing an LLDP group named grp01:

switch(config)# no port-access lldp-group grp01

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show port-access device-profile
show port-access device-profile [[interface {all | <INTERFACE-ID>} [client-status <MAC-ADDR>]] | name <DEVICE-PROFILE-NAME>]
Description
Shows the client status for a specific MAC address or profile name.

Parameter interface {all | <INTERFACE-ID>} client-status <MAC-ADDR> name <DEVICE-PROFILE-NAME>

Description
Select all for all interfaces or specify the name of an interface in the format: member/slot/port.
Specifies a MAC address (xx:xx:xx:xx:xx:xx), where x is a hexadecimal number from 0 to F.
Specifies the name of the device profile.

Device profile commands | 628

Examples
On the 6400 Switch Series, interface identification differs. Showing the applied state of the device profiles:

switch# show port-access device-profile

Profile Name LLDP Groups CDP Groups MAC Groups Role State

: accesspoints : 2920-grp : : 2920-mac-grp1,2920-iot-grp2 : local_role_1 : Enabled

Profile Name LLDP Groups CDP Groups MAC Groups Role State

: access_switches : 2920-grp : : : local_2920_role : Enabled

Profile Name LLDP Groups CDP Groups MAC Groups Role State

: iot_devices : : : iot_camera-grp1,iot_sensors-grp1 : local_2920_role : Enabled

Profile Name LLDP Groups CDP Groups MAC Groups Role State

: lobbyaps : : lobby_ap_cdp_grp : : test_ap_role : Disabled

Showing the applied state of the device profile on interface 1/1/3:

switch# show port-access device-profile interface 1/1/3 client-status 00:0c:29:9e:d1:20

Port 1/1/3, Neighbor-Mac 00:0c:29:9e:d1:20

Profile Name : lobbyaps

LLDP Group

:

CDP Group

: aruba-ap_cdp

MAC Group

:

Role

: test_ap_role

Status

: Failed

Failure Reason : Failed to apply MAC based VLAN

Showing the applied state of a specific device profile:

switch# show port-access device-profile name lldp-group

Profile Name LLDP Groups CDP Groups MAC Groups Role State

: lldp-group : : : pc-behind-phone, lldp : auth_role : Enabled

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

629

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

Device profile commands | 630

Chapter 28 DHCP client commands

DHCP client commands
ip dhcp
ip dhcp no ip dhcp
Description
Enables the DHCP client on the management interface or any interface VLAN to automatically obtain an IP address from a DHCP server on the network. By default, the DHCP client is enabled on the management interface and VLAN 1. The no form of the command disables DHCP mode and is supported only on interface VLANs; it is not supported on the management interface.
Examples
Enabling the DHCP client on the management interface:
switch(config)# interface mgmt switch(config-if-mgmt)# ip dhcp switch(config-if-mgmt)# no shutdown
Enabling the DHCP client on the interface vlan 1:
switch(config)# interface vlan 1 switch(config-if-vlan)# ip dhcp switch(config-if-vlan)# no shutdown
Disabling the DHCP client on the interface vlan 1:
switch(config)# interface vlan 1 switch(config-if-vlan)# no ip dhcp
Enabling the DHCP client on the interface vlan 4 under non-default VRF:
switch(config)# interface vlan 4 switch(config-if-vlan)# vrf attach red switch(config-if-vlan)# ip dhcp
If the interface is not enabled, you can enable it by entering the no shutdown command.
ip dhcp is supported only on one vlan at a time.

For more information on features that use this command, refer to the IP Services Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide

631

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if-mgmt config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip dhcp option
ip dhcp option [host-name | broadcast-flag] no ip dhcp option[host-name | broadcast-flag]
Description
This command enables the DHCP client host name and broadcast flag globally. If the ip dhcp option broadcast-flag command is enabled, then the DHCP offer and ack packets in the DHCP requests will be treated as broadcast packets. These packets will not be forwarded due to the presence of a default static route. The no form of this command globally disables the host name and DHCP client broadcast flag options.
The ip dhcp option broadcast-flag command should be configured before configuring the ip dhcp command.
Example
Enabling the DHCP client broadcast flag globally:
switch(config)# interface vlan 1 switch(config-if-vlan)# ip dhcp option broadcast-flag
Enabling the DHCP client host name globally:
switch(config)# interface vlan 1 switch(config-if-vlan)# ip dhcp option host-name
Disabling the DHCP client broadcast flag globally:
switch(config)# interface vlan 1 switch(config-if-vlan)# no ip dhcp option broadcast-flag
Disabling the DHCP client host name globally:
switch(config)# interface vlan 1 switch(config-if-vlan)# no ip dhcp option host-name

DHCP client commands | 632

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.13.1000

Command Information

Platforms
6300 6400

Command context
config-if-mgmt config-if-vlan

Modification Command Introduced
Authority Administrators or local user group members with execution rights for this command.

show ip dhcp
show ip dhcp
Description
Displays DHCP IPv4 information on the ports.
Examples
Displaying the DHCP IPv4 information on the ports:

switch# show ip dhcp DHCP Options: Broadcast-flag, Hostname

INTERFACE-NAME ADDRESS

DEFAULT_GATEWAY DOMAIN_NAME VRF

DNS-SERVERS

--------------------------------------------------------------------------------------------

-------------

vlan1

10.254.239.10/27

domain.com default 50.0.0.2,

50.0.0.3, 50.0.0.4

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.13.1000 10.09 or earlier
Command Information

Modification
The output parameters, Broadcast-flag and Hostname were introduced.
Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

633

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

DHCP client commands | 634

Chapter 29 DHCPv4 relay commands

DHCPv4 relay commands
dhcp-relay
dhcp-relay no dhcp-relay
Description
Enables DHCP relay support. DHCP relay is enabled by default. DHCP relay is not supported on the management interface. The no form of this command disables DHCP relay (and DHCP relay option 82) support.
Examples
This example enables DHCP relay support.
switch(config)# dhcp-relay
This example removes DHCP relay support.
switch(config)# no dhcp-relay

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

dhcp-relay hop-count-increment
dhcp-relay hop-count-increment no dhcp-relay hop-count-increment
Description

AOS-CX 10.14 Command-Line Interface Guide

635

Enables the DHCP relay hop count increment feature, which causes the DHCP relay agent to increment the hop count in all relayed DHCP packets. Hop count is enabled by default. The no form of this command disables the hop count increment feature.
Examples
Enabling the hop count increment feature.
switch(config)# dhcp-relay hop-count-increment
Disabling the hop count increment feature.
switch(config)# no dhcp-relay hop-count-increment

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

dhcp-relay l2vpn-clients
dhcp-relay l2vpn-clients no dhcp-relay l2vpn-clients
Description
Enables forwarding of packets from L2 VPN clients. Forwarding is enabled by default. Best practices is to disable this configuration on all the VXLAN tunnel endpoints (VTEPs), to avoid forwarding duplicate DHCP requests to the server. The no form of this command disables forwarding of packets from L2 VPN clients.
Usage
In Asymmetric/Symmetric Integrated Routing and Bridging (IRB) VXLAN deployments with a VLAN extension in subset of VTEPs , client DHCP broadcast requests are received by all the VTEPS where a client VLAN is configured. A DHCP-Relay agent on those VTEPs forward DHCP packets to configured DHCP server(s). As DHCP requests are forwarded by multiple DHCP relay agents, the DHCP server receives duplicate copies of the same packet. When this configuration is disabled, the DHCP relay agent on VTEPs ignores DHCP request packets that are received from client MACs addresses learned via EVPN.

DHCPv4 relay commands | 636

Example
Enabling forwarding of packets from L2 VPN clients.
switch(config)# dhcp-relay l2vpn-clients switch(config)# no dhcp-relay l2vpn-clients

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

dhcp-relay option 82
dhcp-relay option 82 {replace [validate] | drop [validate] | keep | source-interface | validate [replace | drop]} [ip | mac]
no dhcp-relay option 82 {replace [validate] | drop [validate] | keep | source-interface | validate [replace | drop]} [ip | mac]
Description
Configures the behavior of DHCP relay option 82. A DHCP relay agent can receive a message from another DHCP relay agent having option 82. The relay information from the previous relay agent is replaced by default. The no form of this command disables the DHCP relay option 82 configurations. Option 82 is disabled when DHCP relay is disabled globally. When DHCP relay is re-enabled, option 82 also needs to be reenabled using the dhcp-relay option 82 command.
DHCP Relay is supported over VXLAN with both IPv4 and IPv6 underlay.

Parameter replace
validate drop

Description
Replace the existing option 82 field in an inbound client DHCP packet with the information from the switch. The remote ID and circuit ID information from the first relay agent is lost. Default.
Validate option 82 information in DHCP server responses and drop invalid responses.
Drop any inbound client DHCP packet that contains option 82

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

637

Parameter keep source-interface ip mac

Description
information.
Keep the existing option 82 field in an inbound client DHCP packet. The remote ID and circuit ID information from the first relay agent is preserved.
Configures the DHCP relay to use a configured source IP address for inter-VRF server reachability. Set the source IP address with the command ip source-interface.
Use the IP address of the interface on which the client DHCP packet entered the switch as the option 82 remote ID.
Use the MAC address of the switch as the option 82 remote ID. Default.

Example
This example enables DHCP option 82 support and replaces all option 82 information with the values from the switch, with the switch MAC address as the remote ID.

switch(config)# dhcp-relay option 82 replace mac

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

dhcp-smart-relay
dhcp-smart-relay no dhcp-smart-relay
Description
Enables DHCP Smart Relay on the device and on all the interfaces where IP helper addresses are configured. Disabled by default at the device level. Not supported on the management interface. The no form of this command disables DHCP Smart Relay.

DHCPv4 relay commands | 638

Prior to enabling DHCP Smart Relay, enable IP helper address configuration and configure secondary IP addresses on the interface.
Examples
Enabling DHCP Smart Relay: switch(config)# dhcp-smart-relay
Disabling DHCP Smart Relay support: switch(config)# no dhcp-smart-relay

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

diag-dump dhcp-relay basic
diag-dump dhcp-relay basic
Description
Dumps DHCP relay configurations for all interfaces.
Examples
This example enables DHCP relay support.
switch# diag-dump dhcp-relay basic ========================================================================= [Start] Feature dhcp-relay Time : Sun Apr 26 06:38:10 2020 ========================================================================= ------------------------------------------------------------------------[Start] Daemon hpe-relay ------------------------------------------------------------------------DHCP Relay : 1 DHCP Relay hop-count-increment : 1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

639

DHCP Relay Option82 : 1 DHCP Relay Option82 validate : 0 DHCP Relay Option82 policy : keep DHCP Relay Option82 remote-id : mac DHCP Relay Option82 Source Intf : Disable DHCP Smart Relay : Enable System Mac [f4:03:43:80:27:00] VRF :BLUE, Source Ip:200.0.0.10 vsx: Not Present

Interface vlan2: 1

Client Packet Statistics:

Valid ----0

Dropped ------0

O82_Valid --------0

O82_Dropped ----------0

vsx_drops --------0

Server Packet Statistics:

Valid

Dropped

O82_Valid O82_Dropped Invalid_IP_Drops

Dsnoop

-----

-------

--------- ----------- ----------------

-

0

0

0

0

0

client request dropped packets with extn option 82 = 0

client request valid packets with extn option 82 = 0

server request dropped packets with extn option 82 = 0

server request valid packets with extn option 82 = 0

Port 67 - 200.0.0.100,2

source vrf-BLUE.

To_ -------0

Interface vlan3: 1

Client Packet Statistics:

Valid ----0

Dropped ------0

O82_Valid --------0

O82_Dropped ----------0

vsx_drops --------0

Server Packet Statistics:

Valid

Dropped

O82_Valid O82_Dropped Invalid_IP_Drops

Dsnoop

-----

-------

--------- ----------- ----------------

-

0

0

0

0

0

client request dropped packets with extn option 82 = 0

client request valid packets with extn option 82 = 0

server request dropped packets with extn option 82 = 0

server request valid packets with extn option 82 = 0

Port 67 - 200.0.0.100,2

source vrf-BLUE.

To_ -------0

DHCP Smart Relay Client Cache:

Total Number of entries: 2

--------------------------------------------------------------------------

Client-MAC

PortIndex Timestamp RetryCount DiscCount GWIP

--------------------------------------------------------------------------

00:50:56:bd:6a:7a 20

1636105218 1

4

30.0.0.1

00:50:56:bd:71:17 20

1636105214 1

4

30.0.0.1

DHCPv4 relay commands | 640

------------------------------------------------------------------------[End] Daemon hpe-relay ------------------------------------------------------------------------========================================================================= [End] Feature dhcp-relay ========================================================================= Diagnostic-dump captured for feature dhcp-relay

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip bootp-gateway
ip bootp-gateway <IPV4-ADDR> no ip bootp-gateway <IPV4-ADDR>
Description
Configures a gateway address for the DHCP relay agent to use for DHCP requests. By default DHCP relay agent picks the lowest-numbered IP address on the interface. The no form of this command removes the gateway address.

Parameter <IPV4-ADDR>

Description
Specifies the IP address of the gateway in IPv4 format (x.x.x.x), where x is a is a decimal number from 0 to 255.

Examples
On the 6400 Switch Series, interface identification differs. Setting the IP address of the gateway for interface 1/1/1 to 10.10.10.10:

switch(config)# interface 1/1/1 switch(config-if)# ip bootp-gateway 10.10.10.10

For more information on features that use this command, refer to the IP Services Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

641

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip helper-address
ip helper-address <IPV4-ADDR> [vrf <VRF-NAME>] no ip helper-address <IPV4-ADDR> [vrf <VRF-NAME>]
Description
Defines the address of a remote DHCP server or DHCP relay agent. Up to eight addresses can be defined. The DHCP relay agent forwards DHCP client requests to all defined servers. If IP helper adddress is defined with VRF argument then this command requires you define a source IP address for DHCP relay with the command ip source-interface. The configured source IP on the VRF is used to forward DHCP packets to the server. A helper address cannot be defined on the OOBM interface. The no form of this command removes an IP helper address.

Parameter helper-address <IPV4-ADDR> vrf <VRF-NAME>

Description
Specifies the helper IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the name of a VRF. Default: default.

Examples
On the 6400 Switch Series, interface identification differs. Defining the IP helper address 10.10.10.209 on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# ip helper-address 10.10.10.209

Removing the IP helper address 10.10.10.209 on interface 1/1/1:

switch(config-if)# no ip helper-address 10.10.10.209

DHCPv4 relay commands | 642

Defining the IP helper address 10.10.10.209 on interface 1/1/2 on VRF myvrf: switch(config)# interface 1/1/2 switch(config-if)# ip helper-address 10.10.10.209 vrf myvrf
Removing the IP helper address 10.10.10.209 on interface 1/1/2 on VRF myvrf: switch(config-if)# no ip helper-address 10.10.10.209 vrf myvrf

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

show dhcp-relay
show dhcp-relay [vsx-peer]
Description
Shows DHCP relay configuration settings.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing DHCP relay settings:

switch# show dhcp-relay

DHCP Relay Agent

: enabled

DHCP Request Hop Count Increment : enabled

L2VPN Clients

: disabled

Option 82

: disabled

Source-Interface

: disabled

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

643

Response Validation Option 82 Handle Policy Remote ID

: disabled : replace : mac

DHCP Relay Statistics:

Valid Requests Dropped Requests Valid Responses Dropped Responses

-------------- ---------------- --------------- -----------------

60

10

60

10

DHCP Relay Option 82 Statistics:

Valid Requests Dropped Requests Valid Responses Dropped Responses

-------------- ---------------- --------------- -----------------

50

8

50

8

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show dhcp-relay bootp-gateway
show dhcp-relay bootp-gateway [interface <INTERFACE-NAME>] [vsx-peer]
Description
Shows the bootp gateway defined for all interfaces or a specific interface.

Parameter <INTERFACE-NAME> vsx-peer

Description
Specifies an interface. Format: member/slot/port.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing the designated bootp gateway for all interfaces:

DHCPv4 relay commands | 644

switch# show dhcp-relay bootp-gateway

BOOTP Gateway Entries

Interface

Source IP

-------------------- ---------------

1/1/1

1.1.1.1

1/1/2

1.1.1.2

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip helper-address
show ip helper-address [interface <INTERFACE-ID>] [vsx-peer]
Description
Shows the IP helper addresses defined for all interfaces or a specific interface.

Parameter interface <INTERFACE-ID> vsx-peer

Description
Specifies an interface. Format: member/slot/port.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing the IP helper addresses for all interfaces:

switch# show ip helper-address IP Helper Addresses
Interface: 1/1/1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

645

IP Helper Address ----------------192.168.20.1 192.168.10.1
Interface: 1/1/2 IP Helper Address ----------------192.168.30.1

VRF ----------------default default
VRF ----------------RED

Showing the IP helper addresses for interface 1/1/1:

switch# show ip helper-address interface 1/1/1 IP Helper Addresses

Interface: 1/1/1 IP Helper Address ----------------192.168.20.1 192.168.10.1

VRF ----------------default default

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

DHCPv4 relay commands | 646

Chapter 30 DHCP relay (IPv6) commands

DHCP relay (IPv6) commands

dhcpv6-relay
dhcpv6-relay [l2vpn-clients|source-interface] no dhcpv6-relay [l2vpn-clients|source-interface]
Description
Enables DHCPv6 relay support. DHCPv6 relay is disabled by default. DHCP relay is not supported on the management interface. Best practices is to disable this configuration on all the VXLAN tunnel endpoints (VTEPs), to avoid forwarding duplicate DHCPv6 requests to the server. The no form of this command disables DHCP relay support. DHCPv6 Relay requires that you configure the egress interface using the ipv6 helper-address command. The egress interface of a VTEP is used as an underlay, so a DHCPv6 Relay Multicast ipv6 address is not supported in a VXLAN topology.

Parameter l2vpn-clients
source-interface

Description
Enables packets from l2vpn clients to be forwarded to configured servers. Enabled by default.
Enables DHCPv6 relay to use the configured source interface.

Usage
In Asymmetric/Symmetric Integrated Routing and Bridging (IRB) VXLAN deployments with a VLAN extension in subset of VTEPs , client DHCPv6 broadcast requests are received by all the VTEPS where a client VLAN is configured. A DHCPv6 relay agent on those VTEPs forward DHCPv6 packets to configured DHCPv6 server(s). As DHCPv6 requests are forwarded by multiple DHCPv6 relay agents, the DHCPv6 server receives duplicate copies of the same packet. When this configuration is disabled, the DHCPv6 relay agent on VTEPs ignores DHCPv6 request packets that are received from client MACs addresses learned via EVPN.
Examples
Enables DHCPv6 relay support.

switch(config)# dhcpv6-relay

Removes DHCPv6 relay support.

switch(config)# no dhcpv6-relay

For more information on features that use this command, refer to the IP Services Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide

647

Command History

Release 10.12.1000 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification l2vpn-clients and source-interface added. --
Authority Administrators or local user group members with execution rights for this command.

dhcpv6-relay option 79
dhcpv6-relay option 79 no dhcpv6-relay option 79
Description
Enables support for DHCP relay option 79. When enabled, the DHCPv6 relay agent forwards the linklayer address of the client. This option is disabled by default. The no form of this command disables support for DHCP relay option 79.
Examples
Enables DHCP option 79 support.
switch(config)# dhcpv6-relay option 79
Disables DHCP option 79 support.
switch(config)# no dhcpv6-relay option 79

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

DHCP relay (IPv6) commands | 648

ipv6 helper-address
ipv6 helper-address unicast <UNICAST-IPV6-ADDR> no ipv6 helper-address unicast <UNICAST-IPV6-ADDR> ipv6 helper-address multicast {all-dhcp-servers | <MULTICAST-IPV6-ADDR>} egress <PORTNUM> no ipv6 helper-address multicast {all-dhcp-servers | <MULTICAST-IPV6-ADDR>} egress <PORTNUM>
Description
Defines the address of a remote DHCPv6 server or DHCPv6 relay agent. Up to eight addresses can be defined. The DHCPv6 agent forwards DHCPv6 client requests to all defined servers. Not supported on the OOBM interface. The no form of this command removes an IP helper address.

Parameter <UNICAST-IPV6-ADDR> <MULTICAST-IPV6-ADDR> all-dhcp-servers egress <PORT-NUM>
vrf <VRF-NAME>

Description
Specifies the unicast helper IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the multicast helper IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies all the DHCP server IPv6 addresses for the interface.
Specifies the port number on which DHCPv6 service requests are relayed to a multicast destination. The egress port must be different than the one on which the multicast helper address is configured. Format: member/slot/port.
Specifies the name of the VRF from which the specified protocol sets its source IP address.

Examples
On the 6400 Switch Series, interface identification differs. Defining a multicast IPv6 helper address of 2001:DB8::1 on port 1/1/2:

switch(config-if)# ipv6 helper-address multicast 2001:DB8:0:0:0:0:0:1 egress 1/1/2

Removing the IP helper address of 2001:DB8::1 on port 1/1/2:

switch(config-if)# no ipv6 helper-address multicast 2001:DB8:0:0:0:0:0:1 egress 1/1/2

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

649

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

show dhcpv6-relay
show dhcpv6-relay [vsx-peer]
Description
Shows DHCP relay configuration settings.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

switch# show dhcpv6-relay

DHCPv6 Relay Agent : enabled

Option 79

: disabled

L2vpn-clients

: enabled

Source-interface : enabled

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

DHCP relay (IPv6) commands | 650

show ipv6 helper-address
show ipv6 helper-address [interface <INTERFACE-ID>] [vsx-peer]
Description
Shows the helper IP addresses defined for all interfaces or a specific interface.

Parameter interface <INTERFACE-ID> vsx-peer

Description
Specifies an interface. Format: member/slot/port.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs.

switch# show ipv6 helper-address

Interface: 1/1/1

IPv6 Helper Address

Egress Port

---------------------------------------------- -----------

2001:db8:0:1::

-

FF01::1:1000

1/1/2

Interface: 1/1/2 IPv6 Helper Address -------------------------------------------2001:db8:0:1::

Egress Port -----------

switch# show ipv6 helper-address interface 1/1/1

Interface: 1/1/1

IPv6 Helper Address

Egress Port

---------------------------------------------- -----------

2001:db8:0:1::

-

FF01::1:1000

1/1/2

switch# show ipv6 helper-address interface vlan20

Interface: vlan20

IP Helper Address

Egress Port

---------------------------------------------- -----------

2001::1

-

ff01::1:1000

vlan30

default

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

651

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

DHCP relay (IPv6) commands | 652

Chapter 31 DHCP server IPv4 commands

DHCP server IPv4 commands
authoritative
authoritative no authoritative
Description
Configures the DHCPv4 server as authoritative on the current VRF. This means that the server is the sole authority for the network on the VRF. Therefore, if a client requests an IP address lease for which the server has no record, the server responds with DHCPNAK, indicating that the client must no longer use that IP address. If the server is not authoritative, then it will ignore DHCPv4 requests received for unknown leases from unknown hosts. The no form of this command disables authoritative mode on the current VRF.
Example
Configures DHCPv4 server authoritative mode on VRF primary.
switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# authoritative
Removes the DHCPv4 server authoritative mode on VRF primary.
switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# no authoritative

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcp-server

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide

653

bootp
bootp <REMOTE-URL> no bootp <REMOTE-URL>
Description
Sets the BOOTP options that are returned by the DHCPv4 server for the current pool. BOOTP provides a way to distribute an IP address and boot image file to client stations. The DHCPv4 server returns the IP address and the location of the boot image file, which must be stored on an external TFTP server. The no form of this command disables support for BOOTP.

Parameter <REMOTE-URL>

Description
Specifies the name and location of a BOOTP file on a TFTP server in the format:
tftp://{<IP> | <HOST>}/<FILE> n <IP>: Specifies the IP address of the TFTP server hosting the
file in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. You can remove leading zeros. For example, the address 192.169.005.100 becomes 192.168.5.100. n <HOST>: Specifies the fully-qualified domain name of the TFTP server hosting the file. Range: 1 to 64 printable ASCII characters. n <FILE>: Specifies the name of the BOOTP file. Range: 1 to 64 printable ASCII characters.

Example
Defines BOOTP support on the DHCPv4 server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# bootp tftp://10.0.0.1/mybootfile

Deletes BOOTP support on the DHCPv4 server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# no bootp tftp://10.0.0.1/mybootfile

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

DHCP server IPv4 commands | 654

Platforms
6300 6400

Command context config-dhcp-server-pool

Authority
Administrators or local user group members with execution rights for this command.

clear dhcp-server leases
clear dhcp-server leases [all-vrfs | <IPV4-ADDR> vrf <VRF-NAME>] | vrf <VRF-NAME>]
Description
Clears DHCPv4 server lease information. The DHCPv4 server must be disabled before clearing lease information.

Parameter all-vrfs <IPV4-ADDR> vrf <VRF-NAME>
vrf <VRF-NAME>

Description
Clears leases for all VRFs.
Clears the lease for a specific client on a specific VRF. Specify the client address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. You can remove leading zeros. For example, the address 192.169.005.100 becomes 192.168.5.100.
Clears leases for a specific VRF.

Examples
Clearing all DHCPv4 server leases.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# disable switch(config-dhcp-server)# exit switch(config)# exit switch# clear dhcp-server leases

Clearing all DHCPv4 server leases for VRF primary-vrf.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# disable switch(config-dhcp-server)# exit switch(config)# exit switch# clear dhcp-server leases vrf primary-vrf

Clear the DHCPv4 server lease for IP address 10.10.10.1 on VRF primary-vrf.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# disable switch(config-dhcp-server)# exit switch(config)# exit switch# clear dhcp-server leases 10.10.10.1 vrf primary-vrf

For more information on features that use this command, refer to the IP Services Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

655

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

default-router
default-router <IPV4-ADDR-LIST> no default-router <IPV4-ADDR-LIST>
Description
Defines up to four default routers for the current DHCPv4 server pool. The no form of this command removes the specified default routers from the pool.

Parameter <IPV4-ADDR-LIST>

Description
Specifies the IP addresses of the default routers in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. You can remove leading zeros. For example, the address 192.169.005.100 becomes 192.168.5.100. Separate addresses with a space. A maximum of four IP addresses can be defined.

Example
Defines two default routers, 10.0.0.1 and 10.0.0.10, for the server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# default-router ip 10.0.0.1 10.0.0.10

Deletes the default router 10.0.0.1 from the server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# no default-router ip 10.0.0.1

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

DHCP server IPv4 commands | 656

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcp-server-pool

Authority
Administrators or local user group members with execution rights for this command.

dhcp-server external-storage
dhcp-server external-storage <VOLUME-NAME> file <LEASE-FILENAME> [delay <DELAY>] no dhcp-server external-storage <VOLUME-NAME> file <LEASE-FILENAME> [delay <DELAY>]
Description
Configures the external storage file location for DHCPv4 server lease information. This file provides persistent storage, enabling DHCPv4 server settings to be restored when the switch is restarted. Lease information is stored in a flat file on the configured external device. If external storage is not configured, then after a failure or reboot, all existing lease information is lost. Lease information is saved to external storage each time the delay timer expires, which by default is every 300 seconds. Lease information is not restored when issuing the command dhcp-server enable. The no form of this command removes external storage support for the DHCPv4 server.

Parameter <VOLUME-NAME> file <LEASE-FILENAME> delay <DELAY>

Description
Specifies the external storage volume name. Range: 1 to 64 printable ASCII characters.
Specifies the external storage filename. Range: 1 to 255 printable ASCII characters.
Specifies the interval in seconds between updates to the external storage file. Range: 15 to 86400. Default: 300.

Example
Stores the lease file on external storage volume Storage1 in file LeaseFile at an interval of 600 seconds.

switch(config)# dhcp-server external-storage Storage1 file LeaseFile delay 600

Disables storage of the lease file on external storage volume Storage1 in file LeaseFile.

switch(config)# no dhcp-server external-storage Storage1 file LeaseFile delay 600

For more information on features that use this command, refer to the IP Services Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

657

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

dhcp-server vrf
dhcp-server vrf <VRF-NAME> no dhcp-server vrf <VRF-NAME>
Description
Configures the DHCPv4 server to support a VRF and changes to the config-dhcp-server context for that VRF. The no form of this command removes DHCPv4 server support on a VRF.

Parameter <VRF-NAME>

Description Name of a VRF.

Example
Configures DHCPv4 server support on VRF primary. switch(config)# dhcp-server vrf primary
Removes DHCPv4 server support on VRF primary. switch(config)# no dhcp-server vrf primary

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

DHCP server IPv4 commands | 658

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

disable
disable
Description
Disables the DHCPv4 server on the current VRF. The DHCPv4 server is disabled by default when configured on a VRF.
Example
Disables the DHCPv4 server on VRF primary.
switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# disable

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcp-server

Authority
Administrators or local user group members with execution rights for this command.

dns-server
dns-server <IPV4-ADDR-LIST> no dns-server <IPV4-ADDR-LIST>
Description
Defines up to four DNS servers for the current DHCPv4 server pool. The no form of this command removes the specified DNS servers from the pool.

Parameter <IPV4-ADDR-LIST>

Description
Specifies the IP addresses of the DNS servers in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.Separate addresses with a space.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

659

Example
Defines DNS servers for the server pool primary-pool on VRF primary.
switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# dns-server 10.0.20.1
Deletes a DNS server from the server pool primary-pool on VRF primary.
switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# no dns-server 10.0.20.1

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcp-server-pool

Authority
Administrators or local user group members with execution rights for this command.

domain-name
domain-name <DOMAIN-NAME> no domain-name <DOMAIN-NAME>
Description
Defines a domain name for the current DHCPv4 server pool. The no form of this command removes the specified domain name from the pool.

Parameter <DOMAIN-NAME>

Description
Specifies a domain name. Range: 1 to 255 printable ASCII characters.

Example
Defines a domain name for the server pool primary-pool on VRF primary.

DHCP server IPv4 commands | 660

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# domain-name example.org.in
Deletes a domain name from the server pool primary-pool on VRF primary.
switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# no domain-name example.org.in

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcp-server-pool

Authority
Administrators or local user group members with execution rights for this command.

enable
enable
Description
Enables the DHCPv4 server on the current VRF. The DHCPv4 server is disabled by default when configured on a VRF.
Example
Enables the DHCPv4 server on VRF primary.
switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# enable

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

661

Command Information

Platforms
6300 6400

Command context config-dhcp-server

Authority
Administrators or local user group members with execution rights for this command.

lease
lease {<TIME> | infinite} no lease
Description
Sets the length of the DHCPv4 lease time for the current pool. The lease time determines how long an IP address is valid before a DHCPv4 client must request that it be renewed. The no form of this command returns the DHCPv4 lease time to its default value 1 hour.

Parameter <TIME>
infinite

Description
Sets the DHCPv4 lease time. Format: DD:HH:MM. Default: 01:00:00.
Sets the DHCPv4 lease time to infinite. This means that addresses do not need to be renewed.

Example
Sets the lease time for DHCPv4 server pool primary-pool on VRF primary to 12 hours.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# lease 00:12:00

Deletes the lease time for DHCPv4 server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# no lease 00:12:00

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

DHCP server IPv4 commands | 662

Platforms
6300 6400

Command context config-dhcp-server-pool

Authority
Administrators or local user group members with execution rights for this command.

netbios-name-server
netbios-name-server <IPV4-ADDR-LIST> no netbios-name-server <IPV4-ADDR-LIST>
Description
Defines up to four NetBIOS WINS servers for the current DHCPv4 server pool. WINS is used by Microsoft DHCP clients to match host names with IP addresses. The no form of this command removes the specified WINS servers from the pool.

Parameter <IPV4-ADDR-LIST>

Description
Specifies the IP addresses of NetBIOS (WINS) servers in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. Separate addresses with a space. A maximum of four IP addresses can be defined.

Example
Defines two WINS servers for the server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# netbios-name-server ip 10.0.20.1 10.0.30.10

Deletes a WINS server from the server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# no netbios-name-server ip 10.0.20.1

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

663

Platforms
6300 6400

Command context config-dhcp-server-pool

Authority
Administrators or local user group members with execution rights for this command.

netbios-node-type
netbios-node-type <TYPE> no netbios-node-type <TYPE>
Description
Defines the NetBIOS node type for the current DHCPv4 server pool. The no form of this command removes the NetBIOS node type for the current pool.

Parameter <TYPE>

Description
Specifies the NetBIOS node type: broadcast, hybrid, mixed, or peer-to-peer.

Examples
Defines the NetBIOS node type broadcast for the DHCPv4 server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# netbios-node-type broadcast

Deletes the NetBIOS node type broadcast from the DHCPv4 server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# no netbios-node-type broadcast

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcp-server-pool

Authority
Administrators or local user group members with execution rights for this command.

DHCP server IPv4 commands | 664

option
option <OPTION-NUM> {ascii "<ASCII-STR>" | hex <HEX-STR> | ip <IPV4-ADDR-LIST>} no option <OPTION-NUM> {ascii <ASCII-STR> | hex <HEX-STR> | ip <IPV4-ADDR-LIST>}
Description
Defines custom DHCPv4 options for the current DHCPv4 server pool. DHCPv4 options enable the DHCPv4 server to provide additional information about the network when DHCPv4 clients request an address. The no form of this command removes custom DHCPv4 options from the pool.

Parameter <OPTION-NUM>
ascii <ASCII-STR>

Description
Specifies a DHCPv4 option number. For a list of DHCPv4 option numbers, see https://www.iana.org/assignments/bootp-dhcpparameters/bootp-dhcp-parameters.xhtml. Range: 2 to 254.
Specifies a value for the selected option as an ASCII string. Range: 1 to 255 ASCII characters.
NOTE: If you specify 18 as the <OPTION-NUM> parameter, the ASCII string must be enclosed within quotation marks (").

hex <HEX-STR> ip <IPV4-ADDR-LIST>

Specifies a value for the selected option as a hexadecimal string. Range: 1 to 255 hexadecimal characters.
Specifies a list of IP addresses in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. Separate addresses with a space. A maximum of four IP addresses can be defined.

Example
Defines DHCPv4 option 3 for the server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# option 3 ip 192.168.1.1

Deletes DHCPv4 option 3 for the server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# no option 3 ip 192.168.1.1

Defines DHCPv4 option 18 for the server pool mgmt-test on VRF mgmt.

switch(config)# dhcp-server vrf mgmt switch(config-dhcp-server)# pool mgmt-test switch(config-dhcp-server-pool)# option 18 ascii "aswed"

For more information on features that use this command, refer to the IP Services Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

665

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcp-server-pool

Authority
Administrators or local user group members with execution rights for this command.

pool
pool <POOL-NAME> no pool <POOL-NAME>
Description
Creates a DHCPv4 server pool for the current VRF and switches to the config-dhcp-server-pool context for it. Multiple pools, each with a distinct range, can be assigned to a VRF. A maximum of 64 pools (IPv4 and IPv6), 64 address ranges, and 8182 clients are supported on the switch across all VRFs. The no form of this command deletes the specified DHCPv4 server pool.

Parameter <POOL-NAME>

Description
Specifies the DHCPv4 pool name. A maximum of 64 pools (IPv4 and IPv6) are supported across VRFs on the switch. Range: 1 to 32 printable ASCII characters. First character must be a letter or number.

Example
Creates the DHCPv4 server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)#

Deletes the DHCPv4 server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# no pool primary-pool

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

DHCP server IPv4 commands | 666

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcp-server

Authority
Administrators or local user group members with execution rights for this command.

range
range <LOW-IPV4-ADDR> <HIGH-IPV4-ADDR> [prefix-len <MASK>] no range <LOW-IPV4-ADDR> <HIGH-IPV4-ADDR> [prefix-len <MASK>]
Description
Defines the range of IP addresses supported by the current DHCPv4 server pool. A maximum of 64 ranges are supported per switch across all VRFs. The no form of this command deletes the address range for the current pool.

Parameter <LOW-IPV4-ADDR> <HIGH-IPV4-ADDR> prefix-len <MASK>

Description
Specifies the lowest IP address in the pool in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the highest IP address in the pool in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 32.
NOTE: When active gateway is configured on the interface serviced by the pool, you must specify a prefix length that matches the mask on the IP address assigned to the interface. Otherwise, client stations will get a prefix length from active gateway that may not be consistent with the configured range, and a DHCP error will occur. In the following example, the DHCP range prefix is set to 16 to match the mask on the IP address assigned to interface VLAN 2.
switch(config)# interface vlan 2 switch(config-if-vlan)# ip address 200.1.1.1/16 switch(config-if-vlan)# active-gateway ip 200.1.1.3
mac 00:aa:aa:aa:aa:aa switch(config-if-vlan)# exit switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# range 192.168.1.1
192.168.1.100 prefix-len 16

Examples
Defines the address range 192.168.1.1 to 192.168.1.100 with a mask of 24 bits for the DHCPv4 server pool primary-pool on VRF primary.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

667

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# 192.168.1.1 192.168.1.100 prefix-len 24
Deletes the address range 192.168.1.1 to 192.168.1.100 with a mask of 24 bits from the DHCPv4 server pool primary-pool on VRF primary.
switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# no 192.168.1.1 192.168.1.100 prefix-len 24

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcp-server-pool

Authority
Administrators or local user group members with execution rights for this command.

show dhcp-server
show dhcp-server [all-vrfs] show dhcp-server leases {all-vrfs | vrf <VRF-NAME>} show dhcp-server pool <POOL-NAME> [vrf <VRF-NAME>]
Description
Shows configuration settings for the DHCPv4 server.

Parameter all-vrfs leases {all-vrfs | vrf <VRF-NAME>}
pool <POOL-NAME> [vrf <VRF-NAME>]

Description
Shows DHCPv4 server configuration settings for all VRFs.
Shows DHCPv4 server lease provided by the server for all VRFs or a specific VRF.
Shows DHCPv4 server pool configuration settings for all VRFs or a specific VRF.

Examples
Showing all DHCPv4 server configuration settings.

DHCP server IPv4 commands | 668

switch# show dhcp-server

VRF Name

: default

DHCP Server

: enabled

Operational State : operational

Authoritative Mode : false

Config_status

: Applied

Pool Name Lease Duration

: test : 00:01:00

DHCP dynamic IP allocation

--------------------------

Start-IP-Address End-IP-Address

---------------- --------------

192.168.1.1

192.168.1.20

Prefix-Length -------------24

DHCP Server options

-------------------

Option-Number Option-Type

------------- -----------

6

ip

Option-Value -----------10.0.0.3 10.0.0.4 10.0.0.5 10.0.0.6

DHCP Server static IP allocation

--------------------------------

IP-Address

Client-Hostname

----------- ----------------

10.0.0.3

*

State -----OPERATIONAL

MAC-Address -----------aa:aa:aa:aa:aa:aa

BOOTP Options --------------Boot-File-Name -------------boot.txt

TFTP-Server-Name ---------------*

TFTP-Server-Address --------------------10.0.0.10

Showing DHCP server configuration settings for VRF primary-vrf.

switch# show dhcp-server vrf primary-vrf

VRF Name

: primary-vrf

DHCP Server

: disabled

Operational State : disabled

Authoritative Mode : false

Config_status

: Applied

Pool Name Lease Duration

: test : 00:01:00

DHCP dynamic IP allocation

--------------------------

Start-IP-Address End-IP-Address

---------------- --------------

10.0.0.1

10.0.0.30

192.168.1.1

192.168.1.20

192.168.10.30

192.168.10.60

Prefix-Length -------------* 24 16

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

669

DHCP Server options

-------------------

Option-Number Option-Type

------------- -----------

6

ip

18

ascii

Option-Value -----------10.0.0.3 10.0.0.4 10.0.0.5 10.0.0.6 aswed

DHCP Server static IP allocation

--------------------------------

IP-Address Client-Hostname MAC-Address

---------- --------------- -----------------

10.0.0.1

*

aa:bb:cc:11:12:a4

20.0.0.1

*

11:22:11:22:aa:dd

BOOTP Options --------------Boot-File-Name -------------boot.txt

TFTP-Server-Name ---------------*

State -----OPERATIONAL

TFTP-Server-Address --------------------10.0.0.10

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

static-bind
static-bind {ip <IPV4-ADDR>}|{ mac <MAC-ADDR>} [hostname <HOST>] no static-bind <IPV4-ADDR-LIST>
Description
Creates a static binding that associates an IP address in the current pool with a specific MAC address. This causes the DHCPv4 server to only assign the specified IP address to a client station with the specified MAC address. The no form of this command removes the specified binding.

DHCP server IPv4 commands | 670

Parameter <IPV4-ADDR>
mac <MAC-ADDR> hostname <HOST>

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. The IP address must be within the address range defined for the current pool.
Specifies a client station MAC address (xx:xx:xx:xx:xx:xx), where x is a hexadecimal number from 0 to F.
Specifies the host name of the client station. Range: 1 to 255 printable ASCII characters

Examples
Defines a static address for the server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# static-bind ip 10.0.0.1 mac 24:be:05:24:75:73

Deletes a static address from the server pool primary-pool on VRF primary.

switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# pool primary-pool switch(config-dhcp-server-pool)# no static-bind ip 10.0.0.1 mac 24:be:05:24:75:73

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcp-server-pool

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

671

Chapter 32 DHCP server IPv6 commands

DHCP server IPv6 commands
authoritative
authoritative no authoritative
Description
Configures the DHCPv6 server as authoritative on the current VRF. This means that the server is the sole authority for the network on the VRF. It responds to client solicit messages with advertise messages having a priority/preference value set to 255 (the maximum), instead of 0 (the minimum). Clients always choose the DHCPv6 server with the highest priority/preference value. If two DHCPv6 servers send an advertise message with the same priority/preference value, then the client picks one and discards the other. The no form of this command disables authoritative mode on the current VRF.
Example
Configures DHCPv6 server authoritative mode on VRF primary.
switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# authoritative
Removes DHCPv6 server authoritative mode on VRF primary.
switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# no authoritative

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcpv6-server

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide

672

clear dhcpv6-server leases
clear dhcpv6-server leases [all-vrfs | <IPV6-ADDR> vrf <VRF-NAME>] | vrf <VRF-NAME>]
Description
Clears DHCPv6 server lease information. The DHCPv6 server must be disabled before clearing lease information.

Parameter all-vrfs <IPV6-ADDR> vrf <VRF-NAME>
vrf <VRF-NAME>

Description
Clears leases for all VRFs.
Clears the lease for a specific client on a specific VRF. Specify the client address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. You can use two colons (::) to represent consecutive zeros (but only once), remove leading zeros, and collapse a hextet of four zeros to a single 0. For example, this address 2222:0000:3333:0000:0000:0000:4444:0055 becomes 2222:0:3333::4444:55.
Clears leases for a specific VRF.

Examples
Clearing all DHCPv6 server leases.

switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# disable switch(config-dhcpv6-server)# exit switch(config)# exit switch# clear dhcpv6-server leases

Clearing all DHCPv6 server leases for VRF primary-vrf.

switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# disable switch(config-dhcpv6-server)# exit switch(config)# exit switch# clear dhcpv6-server leases vrf primary-vrf

Clear the DHCPv6 server lease for IP address 2001::1 on VRF primary-vrf.

switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# disable switch(config-dhcpv6-server)# exit switch(config)# exit switch# clear dhcpv6-server leases 2001::1 vrf primary-vrf

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

DHCP server IPv6 commands | 673

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

dhcpv6-server external-storage
dhcpv6-server external-storage <VOLUME-NAME> file <LEASE-FILENAME> [delay <DELAY>] no dhcpv6-server external-storage <VOLUME-NAME> file <LEASE-FILENAME> [delay <DELAY>]
Description
Configures the external storage file location for DHCPv6 server lease information. This file provides persistent storage, enabling DHCPv6 server settings to be restored when the switch is restarted. Lease information is stored in a flat file on the configured external device. If external storage is not configured, then after a failure or reboot, all existing lease information is lost. Lease information is saved to external storage each time the delay timer expires, which by default is every 300 seconds. Lease information is not restored when issuing the command dhcp-server enable. The no form of this command removes external storage support for the DHCPv6 server.

Parameter <VOLUME-NAME> file <LEASE-FILENAME> delay <DELAY>

Description
Specifies the external storage volume name. Range: 1 to 64 printable ASCII characters.
Specifies the external storage filename. Range: 1 to 255 printable ASCII characters.
Specifies the interval in seconds between updates to the external storage file. Range: 15 to 86400. Default: 300.

Example
Stores the lease file on external storage volume Storage1 in file LeaseFile at an interval of 600 seconds.

switch(config)# dhcpv6-server external-storage Storage1 file LeaseFile delay 600

Disables storage of the lease file on external storage volume Storage1 in file LeaseFile.

switch(config)# no dhcpv6-server external-storage Storage1 file LeaseFile delay 600

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

674

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

dhcpv6-server vrf
dhcpv6-server vrf VRF-NAME no dhcpv6-server vrf VRF-NAME
Description
Configures the DHCPv6 server to support a VRF and changes to the config-dhcpv6-server context for that VRF. The no form of this command removes DHCPv6 server support on a VRF.

Parameter VRF-NAME

Description Name of a VRF.

Example
Configures DHCPv6 server support on VRF primary.

switch(config)# dhcpv6-server vrf primary

Removes the DHCPv6 server support on VRF primary.

switch(config)# no dhcpv6-server vrf primary

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

DHCP server IPv6 commands | 675

Command Information

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

disable
disable
Description
Disables the DHCPv6 server on the current VRF. The DHCPv6 server is disabled by default when configured on a VRF.
Example
Disables the DHCPv6 server on VRF primary.
switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# disable

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcpv6-server

Authority
Administrators or local user group members with execution rights for this command.

dns-server
dns-server <IPVv6-ADDR-LIST> no dns-server <IPVv6-ADDR-LIST>
Description
Defines up to four DNS servers for the current DHCPv6 server pool. The no form of this command removes the specified DNS servers from the pool.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

676

Parameter <IPVv6-ADDR-LIST>

Description
Specifies the IP addresses of the DNS servers in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. Separate addresses with a space. A maximum of four IP addresses can be defined.

Example
Defines DNS server 2001::13 for the server pool primary-pool on VRF primary.

switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# pool primary-pool switch(config-dhcpv6-server-pool)# dns-server 2001::13

Deletes DNS server 2001::13 from the server pool primary-pool on VRF primary.

switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# pool primary-pool switch(config-dhcpv6-server-pool)# no dns-server 2001::13

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcpv6-server-pool

Authority
Administrators or local user group members with execution rights for this command.

enable
enable
Description
Enables the DHCPv6 server on the current VRF. The DHCPv6 server is disabled by default when configured on a VRF.
Example
Enables the DHCPv6 server on VRF primary.

DHCP server IPv6 commands | 677

switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# enable

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcpv6-server

Authority
Administrators or local user group members with execution rights for this command.

lease
lease {<TIME> | infinite} no lease
Description
Sets the length of the DHCPv6 lease time for the current pool. The lease time determines how long an IP address is valid before a DHCPv6 client must request that it be renewed. The no form of this command returns the DHCPv6 lease time to the default value 1 hour.

Parameter <TIME>
infinite

Description
Sets the DHCPv6 lease time. Format: DD:HH:MM. Default: 01:00:00.
Sets the DHCPv6 lease time to infinite. This means that addresses do not need to be renewed.

Example
Sets the lease time for DHCPv6 server pool primary-pool on VRF primary to 12 hours.

switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# pool primary-pool switch(config-dhcpv6-server-pool)# lease 00:12:00

Sets the lease time for DHCP server pool primary-pool on VRF primary to the default value.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

678

switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# pool primary-pool switch(config-dhcpv6-server-pool)# no lease 00:12:00

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcpv6-server-pool

Authority
Administrators or local user group members with execution rights for this command.

option
option <OPTION-NUM> {ascii <ASCII-STR> | hex <HEX-STR> | ip <IPV6-ADDR-LIST>} no option <OPTION-NUM> {ascii <ASCII-STR> | hex <HEX-STR> | ip <IPV6-ADDR-LIST>}
Description
Defines custom DHCPv6 options for the current DHCPv6 server pool. The no form of this command removes custom DHCPv6 options from the pool.

Parameter <OPTION-NUM> ascii <ASCII-STR>
hex <HEX-STR>
ip <IPV6-ADDR-LIST>

Description
Specifies a DHCPv6 option number. Range: 2 to 254.
Specifies a value for the selected option as an ASCII string. Range: 1 to 255 ASCII characters.
Specifies a value for the selected option as a hexadecimal string. Range: 1 to 255 hexadecimal characters.
Specifies a list of IP addresses for the option in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.

Example
Defines DHCPv6 option 22 for the server pool primary-pool on VRF primary.

switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# pool primary-pool switch(config-dhcpv6-server-pool)# option 22 ipv6 2001::12

Deletes DHCPv6 option 22 for the server pool primary-pool on VRF primary.

DHCP server IPv6 commands | 679

switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# pool primary-pool switch(config-dhcpv6-server-pool)# no option 22 ipv6 2001::12

Defines DHCPv6 option 18 for the server pool mgmt-test on VRF mgmt.
switch(config)# dhcpvv6-server vrf mgmt switch(config-dhcpv6-server)# pool mgmt-test switch(config-dhcpv6-server-pool)# option 18 ascii "aswed"

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcpv6-server-pool

Authority
Administrators or local user group members with execution rights for this command.

pool
pool <POOL-NAME> no pool <POOL-NAME>
Description
Creates a DHCPv6 server pool for the current VRF and switches to the config-dhcpv6-server-pool context for it. Multiple pools, each with a distinct range, can be assigned to a VRF. A maximum of 64 pools (IPv4 and IPv6), 64 address ranges, and 8182 clients are supported on the switch across all VRFs. The no form of this command deletes the specified DHCPv6 server pool.

Parameter <POOL-NAME>

Description
Specifies the DHCPv6 pool name. A maximum of 64 pools (IPv4 and IPv6) are supported across VRFs on the switch. Range: 1 to 32 printable ASCII characters. First character must be a letter or number.

Example
Creates the DHCPv6 server pool primary-pool on VRF primary.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

680

switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# pool primary-pool switch(config-dhcpv6-server-pool)#
Deletes the DHCPv6 server pool primary-pool on VRF primary.
switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# no pool primary-pool

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcpv6-server

Authority
Administrators or local user group members with execution rights for this command.

range
range <LOW-IPV6-ADDR> <HIGH-IPV6-ADDR> [prefix-len <MASK>] no range <LOW-IPV6-ADDR> <HIGH-IPV6-ADDR> [prefix-len <MASK>]
Description
Defines the range of IP addresses supported by the current DHCPv6 server pool. A maximum of 64 ranges are supported per switch across all VRFs. The no form of this command deletes the address range for the current pool.

Parameter <LOW-IPV6-ADDR>
<HIGH-IPV6-ADDR>
prefix-len <MASK>

Description
Specifies the lowest IP address in the pool in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the highest IP address in the pool in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 64 to128.

Example
Defines an address range for the DHCPv6 server pool primary-pool on VRF primary.

DHCP server IPv6 commands | 681

switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# pool primary-pool switch(config-dhcpv6-server-pool)# range 2001::1 2001::10 prefix-len 64
Deletes an address range for the DHCPv6 server pool primary-pool on VRF primary.
switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# pool primary-pool switch(config-dhcpv6-server-pool)# no range 2001::1 2001::10 prefix-len 64

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcpv6-server-pool

Authority
Administrators or local user group members with execution rights for this command.

show dhcpv6-server
show dhcpv6-server [all-vrfs] show dhcpv6-server leases {all-vrfs | vrf <VRF-NAME>} show dhcpv6-server pool <POOL-NAME> [vrf <VRF-NAME>]
Description
Shows configuration settings for the DHCPv6 server.

Parameter all-vrfs leases {all-vrfs | vrf <VRF-NAME>}
pool <POOL-NAME> [vrf <VRF-NAME>]

Description
Shows DHCPv6 server configuration settings for all VRFs.
Shows DHCPv6 server lease provided by the server for all VRFs or a specific VRF.
Shows DHCPv6 server pool configuration settings for all VRFs or a specific VRF.

Examples
Showing all DHCPv6 server configuration settings.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

682

switch# show dhcpv6-server

VRF Name

: default

DHCPv6 Server

: enabled

Operational State : operational

Authoritative Mode : true

Config_status

: Applied

Pool Name Lease Duration

: test : 00:01:00

DHCPV6 dynamic IP allocation

-----------------------------

Start-IPv6-Address End-IPv6-Address

------------------ ----------------

2001::2

2001::10

Prefix-Length ------------64

DHCPv6 Server options

---------------------

Option-Number

Option-Type

-------------

-----------

7

ipv6

Option-Value -----------2001::15

DHCPv6 Server static IP allocation ----------------------------------DHCPv6 Server static host is not configured.

Showing DHCPv6 server configuration settings for VRF primary-vrf.

switch# show dhcpv6-server vrf primary-vrf

VRF Name

: primary-vrf

DHCPv6 Server

: disabled

Operational State : standby

Authoritative Mode : false

Config_status

: Applied

Pool Name Lease Duration

: test : 00:01:00

DHCPV6 dynamic IP allocation

-----------------------------

Start-IPv6-Address End-IPv6-Address

------------------ ----------------

2000::1

2000::20

2001::20

2001::50

2001::2

2001::10

2010::20

2010::40

Prefix-Length ------------* * 64 *

DHCPv6 Server options

---------------------

Option-Number

Option-Type

-------------

-----------

7

ipv6

23

ipv6

30

ipv6

Option-Value -----------2001::15 2001::30 2001::10

DHCPv6 Server static IP allocation -----------------------------------

DHCP server IPv6 commands | 683

DHCPv6 Server static host is not configured.

Pool Name

: v6test

Lease Duration : 00:01:00

DHCPv6 dynamic IP allocation

-----------------------------

Start-IPv6-Address End-IPv6-Address

------------------ ----------------

2001::1

2001::20

2010::10

2010::30

2020::20

2020::60

Prefix-Length ------------64 * *

DHCPv6 Server options

---------------------

Option-Number Option-Type Option-Value

------------- ----------- -----------------

7

ipv6

2001::20

23

ipv6

2001:0db8:85a3:0000:0000:8a2e:0370:7334

2001:0db8:85a3:0000:0000:8a2e:0370:7335

2001:0db8:85a3:0000:0000:8a2e:0370:7336

2001:0db8:85a3:0000:0000:8a2e:0370:7337

DHCPv6 Server static IP allocation

------------------------------------

IPv6-Address Client-Hostname

State

------------ ---------------

-----------

2100::4

*

OPERATIONAL

Client-Id --------1:0:a0:24:ab:fb:9c

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

static-bind
static-bind ipv6 <IPVv6-ADDR> client-id <ID> [hostname <HOST>] no static-bind ipv6 <IPVv6-ADDR-LIST>
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

684

Creates a static binding that associates an IP address in the current pool with a client identifier or DUID. This causes the DHCPv6 server to only assign the specified IP address to a client station with the specified client identifier or DUID.
The no form of this command removes the specified static binding from the pool.

Parameter <IPV6-ADDR>
client-id <ID> hostname <HOST>

Description
Specifies the IP address to assign in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. For example, this address 2222:0000:3333:0000:0000:0000:4444:0055 becomes 2222:0:3333::4444:55.
Specifies the client identifier or DUID.
Specifies the host name of the client station. Range: 1 to 255 printable ASCII characters

Example
Defines a static address for the DHCPv6 server pool primary-pool on VRF primary.

switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# pool primary-pool switch(config-dhcpv6-server-pool)# static-bind ipv6 2001::10 client-id 1:0:a0:24:ab:fb:9c

Deletes a static address from the DHCPv6 server pool primary-pool on VRF primary.

switch(config)# dhcpv6-server vrf primary switch(config-dhcpv6-server)# pool primary-pool switch(config-dhcpv6-server-pool)# no static-bind ipv6 2001::10 client-id 1:0:a0:24:ab:fb:9c

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-dhcpv6-server-pool

Authority
Administrators or local user group members with execution rights for this command.

DHCP server IPv6 commands | 685

Chapter 33 DHCP snooping commands

DHCP snooping commands

clear dhcp-snooping binding
clear dhcp-snooping binding {all | ip <IP-ADDR> vlan <VLAN-ID> | port <PORT-NUM> | vlan <VLAN-ID>}
Description
Clears DHCP snooping binding entries.

Parameter all ip <IP-ADDR> vlan <VLAN-ID>
port <PORT-NUM>
vlan <VLAN-ID>

Description
Specifies that all DHCP binding information is to be cleared.
Specifies the IP address and VLAN for which all DHCP binding information is to be cleared.
Specifies the port number for which all DHCP binding information is to be cleared.
Specifies the VLAN for which all DHCP binding information is to be cleared.

Examples
On the 6400 Switch Series, interface identification differs. Clearing all DHCP binding information for IP address 192.168.2.4 and VLAN 5:

switch(config)# clear dhcp-snooping binding ip 192.168.2.4 vlan 5

Clearing all DHCP binding information for port 1/1/1:

switch(config)# clear dhcp-snooping binding port 1/1/1

Clearing all DHCP binding information for VLAN 10:

switch(config)# clear dhcp-snooping binding vlan 10

Clearing all DHCP binding information:

switch(config)# clear dhcp-snooping binding all

For more information on features that use this command, refer to the IP Services Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide

686

Command History
Release 10.14
10.09.1000 10.09 10.07 or earlier

Modification
The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping. The ipv4 parameter is deprecated and replaced with ip.
Command introduced for the 8360 Switch Series.
Command introduced for the 6000 and 6100 Switch Series.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

clear dhcp-snooping statistics
clear dhcp-snooping statistics
Description
Clears all DHCP snooping statistics.
Examples
Clear all DHCP snooping statistics:
switch# clear dhcp-snooping statistics

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14
10.09.1000 10.09 10.07 or earlier
Command Information

Modification
The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping.
Command introduced for the 8360 Switch Series.
Command introduced for the 6000 and 6100 Switch Series.

DHCP snooping commands | 687

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

dhcp-snooping
dhcp-snooping no dhcp-snooping
Description
Enables DHCP snooping. DHCP snooping is disabled by default. DHCP snooping is not supported on the management interface. The no form of the command disables DHCP snooping, flushing all the IP bindings learned since DHCP snooping was enabled.
Examples
Enabling DHCP snooping:
switch(config)# dhcp-snooping
Disabling DHCP snooping:
switch(config)# no dhcp-snooping

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14

10.09.1000 10.09 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping. Command introduced for the 8360 Switch Series. Command introduced for the 6000 and 6100 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

dhcp-snooping (in config-vlan context)

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

688

dhcp-snooping no dhcp-snooping
Description
Enables DHCP snooping for the specified VLAN in the config-vlan context. DHCP snooping is disabled by default for all VLANs. The no form of the command disables DHCP snooping on the specified VLAN, flushing all the IP bindings learned for this VLAN since DHCP snooping was enabled for this VLAN.
Examples
Enabling DHCP snooping on VLAN 100:
switch(config)# vlan 100 switch(config-vlan-100)# dhcp-snooping switch(config-vlan-100)# exit switch(config)#
Disabling DHCP snooping on VLAN 100:
switch(config)# vlan 100 switch(config-vlan-100)# no dhcp-snooping switch(config-vlan-100)# exit switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14

10.09.1000 10.09 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-vlan

Modification The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping. Command introduced for the 8360 Switch Series. Command introduced for the 6000 and 6100 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

dhcp-snooping allow-overwrite-binding
dhcp-snooping allow-overwrite-binding no dhcp-snooping allow-overwrite-binding

DHCP snooping commands | 689

Description
Allows binding to be overwritten for the same IP address. When enabled, and a DHCP server offers a host an IP address that is already bound to an existing host in the binding table, the existing binding is overwritten for the new host if the new host is successfully able to acquire the same IP address. This overwriting is disabled by default, causing the DHCP server offers to be dropped. The no form of the command disables DHCP snooping overwrite binding.
Examples
Enabling DHCP snooping overwrite binding:
switch(config)# dhcp-snooping allow-overwrite-binding
Disabling DHCP snooping overwrite binding:
switch(config)# no dhcp-snooping allow-overwrite-binding

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14

10.09.1000 10.09 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping. Command introduced for the 8360 Switch Series. Command introduced for the 6000 and 6100 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

dhcp-snooping authorized-server
dhcp-snooping authorized-server <IP-ADDR> [vrf <VRF-NAME>] no dhcp-snooping authorized-server <IP-ADDR> [vrf <VRF-NAME>]
Description
Adds an authorized (trusted) DHCP server to a list of authorized servers for use by DHCP snooping. This command can be issued multiple times, adding a maximum of 20 authorized servers per VRF. By default, with an empty list of authorized servers, all DHCP servers are considered to be trusted for DHCP snooping purposes.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

690

The mgmt VRF cannot be used with this command. The no form of this command deletes the specified DHCP server from the authorized list.

Parameter <IP-ADDR> vrf <VRF-NAME>

Description
Specifies the IP address of the trusted DHCP server.
Specifies the VRF name. The name can be default or a configured VRF instance but it cannot be mgmt.

Usage
For authorized server lookup, the VRF is derived from the Switch Virtual Interface (SVI) configured for the incoming VLAN. If the SVI is not configured, the default VRF is assumed.
Examples
Adding DHCP servers 192.168.2.2, 192.168.2.3, and 192.168.2.10 to the authorized server list:

switch(config)# dhcp-snooping authorized-server 192.168.2.2 switch(config)# dhcp-snooping authorized-server 192.168.2.3 vrf default switch(config)# dhcp-snooping authorized-server 192.168.2.10 vrf default

Removing DHCP server 192.168.2.3 from the authorized server list:

switch(config)# no dhcp-snooping authorized-server 192.168.2.3 vrf default

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14

10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping. --
Authority Administrators or local user group members with execution rights for this command.

dhcp-snooping event-log client
dhcp-snooping event-log client no dhcp-snooping event-log client

DHCP snooping commands | 691

Description
This command enables or disables dhcp-snooping client level event logs that help with client telemetry on a remote management station such as Aruba Central. By default, client level event logs are disabled. The no form of this command disables client-level event logs for DHCP snooping after they are enabled. View these logged DHCP snooping events by issuing the command show events -c dhcp-snooping.
For additional information on DHCP-related event logging, please refer to the Event Log Message Reference Guide.
Examples
Enabling DHCP client level event logs:
switch(config)# # dhcp-snooping event-log client
Disabling external storage:
witch(config)# # no dhcp-snooping event-log client

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14

10.10

Command Information

Platforms
6300 6400

Command context config

Modification The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

dhcp-snooping external-storage
dhcp-snooping external-storage volume <VOL-NAME> file <FILE-NAME> no dhcp-snooping external-storage volume <VOL-NAME> file <FILE-NAME>
Description
Configures external storage to be used for backing up IP bindings (used by DHCP snooping) to a file. When configured, the switch stores all the IP bindings in an external storage file so that they are retained after the switch restarts. When the switch restarts, it reads the IP bindings from the configured external storage file to populate its local cache.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

692

When both external storage and flash storage are configured to store DHCP snooping IP bindings, the external storage takes priority, and is used exclusively until it becomes unconfigured, at which time flash storage (if configured) is used. Later, if external storage is configured again, flash storage stops and external storage resumes.
The no form of this command disables the saving of IP bindings in an external storage file.

Parameter volume <VOL-NAME>
file <FILE-NAME>

Description
Specifies the name of the existing external storage volume where the IP bindings file will be saved. Before running the dhcpsnooping external-storage volume command, first create the external storage volume using command external-storage <VOLUME-NAME>. See External storage commands in the Command-Line Interface Guide.
Specifies the file name to use for storing IP bindings. Maximum 255 characters.

Configuring IP bindings storage in file dsnoop_ipbindings on existing volume dhcp_snoop:

switch(config)# dhcp-snooping external-storage volume dhcp_snoop file dsnoop_ ipbindings

Disabling external storage:

switch(config)# no dhcp-snooping external-storage volume dhcp_snoop

Disabling external storage when flash storage is also configured (note the message indicating that flash storage will be used):

switch(config)# no dhcp-snooping external-storage volume dhcp_snoop dhcp-snooping will use flash storage to store IP Binding database switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14
10.09.1000 10.09 10.08 10.07 or earlier

Modification The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping. Command introduced for the 8360 Switch Series. Command introduced for the 6000 and 6100 Switch Series. Updated example with flash storage information.

DHCP snooping commands | 693

Command Information

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

dhcp-snooping flash-storage
dhcp-snooping flash-storage [delay <DELAY>] no dhcp-snooping flash-storage [delay <DELAY>]
Description
Configures switch flash storage to be used for backing up client IP bindings (used by DHCP snooping). When flash storage is configured (and external storage is not already configured for this purpose), the switch stores the IP bindings in switch flash storage. When the switch restarts, it reads the IP bindings from the switch flash storage to populate its local cache. Writing the IP bindings to flash storage only occurs after the configured delay and if there has been a change in client IP bindings. Writing is skipped when client IP bindings have not changed since the previous write. Omitting delay <DELAY> sets the default delay of 900 seconds.
To reduce switch flash aging it is recommended that you use external storage (command dhcp-snooping external-storage) to backup DHCP snooping IP bindings. Alternatively, consider configuring flash storage with a substantial delay between writes.

When both external storage and flash storage are configured to store DHCP snooping IP bindings, the external storage takes priority, and is used exclusively until it becomes unconfigured, at which time flash storage (if configured) is used. Later, if external storage is configured again, flash storage stops and external storage resumes.
The no form of this command disables the saving of IP bindings in flash storage.

Parameter delay <DELAY>

Description
Specifies the delay in seconds between writes (when necessary) to the flash storage, Default: 900. Range: 300 to 86400.

Examples
Configuring switch flash storage for DHCP snooping IP binding storage with a write delay of 1200 seconds:

switch(config)# dhcp-snooping flash-storage delay 1200 Warning: Using flash storage reduces switch lifetime. It is recommended to use an external-storage. Do you want to continue (y/n)? y switch(config)#

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

694

Unconfiguring usage of switch flash storage for IP bindings : switch(config)# no dhcp-snooping flash-storage

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14

Command Information

Platforms
6300 6400

Command context config

Modification The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping.
Authority Administrators or local user group members with execution rights for this command.

dhcp-snooping max-bindings
dhcp-snooping max-bindings <MAX-BINDINGS> no dhcp-snooping max-bindings <MAX-BINDINGS>
Description
Sets the maximum number of DHCP bindings allowed on the selected interface. For all interfaces on which this command is not run, the default max binding is the maximum value of the range. The no form of the command reverts max bindings for the selected interface to its default.

Parameter <MAX-BINDINGS>

Description
Specifies the maximum number of DHCP bindings. Range 1 to 8192.

Examples
On the 6400 Switch Series, interface identification differs. Set the DHCP max bindings to 256 on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# dhcp-snooping max-bindings 256 switch(config-if)# exit switch(config)#

Revert DHCP max bindings to its default on interface 1/1/1:

DHCP snooping commands | 695

switch(config)# interface 1/1/1 switch(config-if)# no dhcp-snooping max-bindings 256 switch(config-if)# exit switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14

10.09.1000 10.09

Command Information

Platforms
6300 6400

Command context config-if

Modification The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping. Command introduced for the 8360 Switch Series. Command introduced for the 6000 and 6100 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

dhcp-snooping option 82
dhcp-snooping option 82 [remote-id {mac | subnet-ip | mgmt-ip}] [untrusted-policy {drop | keep | replace}]
no dhcp-snooping option 82 [remote-id {mac | subnet-ip | mgmt-ip}] [untrusted-policy {drop | keep | replace}]
Description
Configures the addition of option 82 DHCP relay information to DHCP client packets that are being forwarded on trusted ports. DHCP relay is enabled by default. In the switch default state and when this command is entered without parameters (dhcp-snooping option 82), this default configuration is used: dhcp-snooping option 82 remote-id mac untrusted-policy drop When remote-id is omitted, its default (mac) is used. When untrusted-policy is omitted, its default (drop) is used. The no form of this command disables DHCP snooping option 82.

Parameter remote-id

Description
Specifies what address to use as the remote ID for the replace option of untrusted-policy. Specify one of these address types:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

696

Parameter mac subnet-ip untrusted-policy
drop
keep replace

Description
The default. Uses the switch MAC address as the remote ID.
Uses the IP address of the client VLAN as the remote ID.
Specifies what action to take for DHCP packets (with option 82) that are received on untrusted ports. Specify one of these actions:
The default. Drop DHCP packets (with option 82) without forwarding them.
Forward DHCP packets (with option 82).
Replace the option 82 information in the DHCP packets with whatever is set for remote-id (one of: mac, subnet-ip, or mgmtip) and forward the packets.

Examples
Configuring DHCP snooping option 82 with the keep action:

switch(config)# dhcp-snooping option 82 untrusted-policy keep

Configuring DHCP snooping option 82 with mgmt-ip as the remote-id and the replace action:

switch(config)# dhcp-snooping option 82 remote-id mgmt-ip untrusted-policy replace

Disabling DHCP snooping option 82:

switch(config)# no dhcp-snooping option 82 untrusted-policy keep

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14
10.09.1000 10.09 10.07 or earlier
Command Information

Modification
The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping.
Command introduced for the 8360 Switch Series.
Command introduced for the 6000 and 6100 Switch Series.

DHCP snooping commands | 697

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

dhcp-snooping static-attributes
dhcp-snooping static-attributes no dhcp-snooping static-attributes
Description
Enables storage of static attributes provided to the DHCP client by DHCP server during DHCP packet exchange. Disabled by default. When enabled, the following attributes are stored in OVSDB along with the client IP binding entry:
1. Name server IP addresses: DNS server IPs provided by the DHCP server to the client. Maximum: 3 per client.
2. Default gateway IP address: Router IP addresses provided by DHCP server to the client. Maximum: 3 per client.
3. Server IP address: IP address of the DHCP server that leased the IP to the client.
The no form of the command disables storing of client static attributes. After disabling, existing client static attributes will be flushed.
Examples
Enabling the storage of DHCP snooping static attributes:
switch(config)# dhcp-snooping static-attributes
Disabling the storage of DHCP snooping static attributes:
switch(config)# no dhcp-snooping static-attributes

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14 10.10
Command Information

Modification
The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping.
Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

698

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

dhcp-snooping trust
dhcp-snooping trust no dhcp-snooping trust
Description
Enables DHCP snooping trust on the selected port. Only server packets received on trusted ports are forwarded. All the ports are untrusted by default. The no form of the command disables DHCP snooping trust on the selected port.
Examples
On the 6400 Switch Series, interface identification differs. Enabling DHCP snooping trust on interface 2/2/1:
switch(config)# interface 2/2/1 switch(config-if)# dhcp-snooping trust switch(config-if)# exit switch(config)#
Disabling DHCP snooping trust on interface 2/2/1:
switch(config)# interface 2/2/1 switch(config-if)# no dhcp-snooping trust switch(config-if)# exit switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14
10.09.1000 10.09 10.07 or earlier
Command Information

Modification
The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping.
Command introduced for the 8360 Switch Series.
Command introduced for the 6000 and 6100 Switch Series.

DHCP snooping commands | 699

Platforms
6300 6400

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

dhcp-snooping tunnel vxlan trust
dhcp-snooping tunnel vxlan trust no dhcp-snooping tunnel vxlan trust
Description
Enables dhcp-snooping trust on all VxLAN tunnels. The no form of the command to marks all VxLAN tunnels as untrusted. By default, all VxLAN tunnel interfaces are trusted. When trust is disabled on VxLAN tunnel interfaces: n DHCP broadcast packets are not forwarded on VxLAN tunnels. n DHCP server packets received on VxLAN tunnel interfaces are discarded.
Examples
On the 6400 Switch Series, interface identification differs. Enabling trust on all VxLAN tunnel interfaces:
switch(config)# dhcp-snooping tunnel vxlan trust
Disabling trust on all VxLAN tunnel interfaces:
switch(config)# no dhcp-snooping tunnel vxlan trust

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14

10.11.1000

Command Information

Platforms
6300 6400

Command context config

Modification The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

700

dhcp-snooping verify mac
dhcp-snooping verify mac no dhcp-snooping verify mac
Description
This command enables verification of the hardware address field in DHCP client packets. When enabled, the DHCP client hardware address field and the source MAC address must be the same for packets received on untrusted ports or else the packet is dropped. This DHCP snooping MAC verification is enabled by default. The no form of the command disables DHCP snooping MAC verification.
Examples
Enabling DHCP snooping MAC verification:
switch(config)# dhcp-snooping verify mac
Disabling DHCP snooping MAC verification:
switch(config)# no dhcp-snooping verify mac

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14

10.09.1000 10.09 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping. Command introduced for the 8360 Switch Series. Command introduced for the 6000 and 6100 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

show dhcp-snooping
show dhcp-snooping [vsx-peer]
Description
Shows the DHCP snooping configuration.

DHCP snooping commands | 701

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing the DHCP snooping configuration:

switch# show dhcp-snooping

dhcp-snooping Information

dhcp-snooping Allow Overwrite Binding Static Attributes Client Event Logs

: Yes : No : Yes : Yes

Verify MAC Address : Yes

Enabled VLANs

: 1-100

Option 82 Configurations

Untrusted Policy Option 82 Remote-id

: replace : mac

Insertion

: Yes

External Storage Information

Volume Name : ipbinding

File Name

: ipv4Bindings

Inactive Since : 01:23:20 09/10/2021

Error

: File Write Failure

Flash Storage Information

File Write Delay : 300 seconds Active Storage : External

Authorized Server Configurations

VRF -----------default default default default green green green red red

Authorized Servers ----------------------
1.1.10.3 10.10.10.1 10.10.10.56 200.10.10.3 1.1.10.3 1.10.10.3 10.10.100.3 192.168.122.53 192.168.122.121

Port Information

Port -------1/1/2 1/1/3 1/1/5 1/1/16

Trust ----Yes Yes Yes No

Max Bindings
-------5000 8192 8192 100

Static Bindings --------
50 0 0 0

Dynamic Bindings
-------0 0 22 0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

702

10/10/10 No

8100

320

200

lag120

No

512

0

0

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14
10.09.1000 10.09 10.08 10.07 or earlier

Modification The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping. Command introduced for the 8360 Switch Series. Command introduced for the 6000 and 6100 Switch Series. Updated example with flash storage information.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show dhcp-snooping binding
show dhcp-snooping binding [vsx-peer][detail]
Description
Shows the DHCP snooping binding configuration.

Parameter vsx-peer
detail

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.
Shows detailed information for active IP bindings on the system.

Examples
On the 6400 Switch Series, interface identification differs. Showing the DHCP snooping binding configuration:

DHCP snooping commands | 703

switch(config)# show dhcp-snooping binding

MacAddress ----------------aa:b1:c1:dd:ee:ff aa:b2:c2:dd:ee:ff

IP --------------10.2.3.4 10.2.3.5

VLAN ---1 1

Interface --------1/1/2 1/1/2

Time-Left --------582 584

Showing detailed information for active IP bindings:

switch(config)# show dhcp-snooping binding detail

VLAN Id : 2, MAC : 00:50:56:96:74:46

IP

Interface Time-Left

--------------- --------- -------------------

100.1.2.100

1/1/23

194

Static Attributes:

Default Router : 100.1.2.1, 192.1.1.1, 1.1.1.2

Server IP

: 10.1.84.2

Name Servers : 192.1.1.2, 2.2.2.2, 1.1.1.1

VLAN Id : 3, MAC : 00:50:56:96:e5:8e

IP

Interface Time-Left

--------------- --------- -------------------

100.1.3.100

2/1/22

145

Static Attributes:

Default Router : 100.1.3.1, 192.1.1.1, 1.1.1.2

Server IP

: 10.1.84.2

Name Servers : 192.1.1.2, 2.2.2.2, 1.1.1.1

VLAN Id : 3, MAC : 00:11:01:00:00:03

IP

Interface Time-Left

--------------- --------- -------------------

100.1.3.99

2/1/24

137

Static Attributes:

Default Router : 100.1.3.1, 192.1.1.1, 1.1.1.2

Server IP

: 10.1.84.2

Name Servers :192.168.0.1, 192.168.1.1, 192.168.2.1

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14
10.10

Modification
The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping.
Detail parameter added.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

704

Release 10.09.1000 10.09 10.07 or earlier

Modification Command introduced for the 8360 Switch Series. Command introduced for the 6000 and 6100 Switch Series.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show dhcp-snooping statistics
show dhcp-snooping statistics [vsx-peer]
Description
Shows the DHCP snooping statistics.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing the DHCP snooping statistics:

switch(config)# show dhcp-snooping statistics

Packet-Type ----------server client server server client client client client client

Action ------forward forward drop drop drop drop drop drop drop

Reason ----------------------------from trusted port to trusted port received on untrusted port unauthorized server destination on untrusted port untrusted option 82 field bad DHCP release request failed verify MAC check failed on max-binding limit

Count --------5425 3895 117 214 78 85 0 5 15

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

DHCP snooping commands | 705

Release 10.14
10.09.1000 10.09 10.07 or earlier

Modification
The dhcpv4-snooping keyword is deprecated and replaced with dhcp-snooping.
Command introduced for the 8360 Switch Series.
Command introduced for the 6000 and 6100 Switch Series.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

706

Chapter 34 DHCPv6 snooping commands

DHCPv6 snooping commands

clear dhcpv6-snooping binding
clear dhcpv6-snooping binding {all | ip <IPV6-ADDR> vlan <VLAN-ID> | interface <IFNAME> | vlan <VLAN-ID>}
Description
Clears DHCPv6 snooping binding entries.

Parameter all ip <IPV6-ADDR> vlan <VLAN-ID>
interface <IFNAME>
vlan <VLAN-ID>

Description
Specifies that all DHCPv6 binding information is to be cleared.
Specifies the IPv6 address and VLAN for which all DHCPv6 binding information is to be cleared.
Specifies the interface for which all DHCPv6 binding information is to be cleared.
Specifies the VLAN for which all DHCPv6 binding information is to be cleared. Range: 1 to 4094.

Examples
On the 6400 Switch Series, interface identification differs. Clearing all DHCPv6 binding information for 5000::1 vlan 1:

switch(config)# clear dhcpv6-snooping binding ip 5000::1 vlan 1

Clearing all DHCPv6 binding information for interface 1/1/10:

switch(config)# clear dhcpv6-snooping binding interface 1/1/10

Clearing all DHCPv6 binding information for VLAN 10:

switch(config)# clear dhcpv6-snooping binding vlan 10

Clearing all DHCPv6 binding information:

switch(config)# clear dhcpv6-snooping binding all

For more information on features that use this command, refer to the IP Services Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide

707

Command History

Release 10.09.1000 10.09 10.07 or earlier

Modification Command introduced for the 8360 Switch Series. Command introduced for the 6000 and 6100 Switch Series.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

clear dhcpv6-snooping guard-policy statistics
clear dhcpv6-snooping guard-policy statistics [vlan <VLAN-ID> | interface <INTERFACENAME>]
Description
Clears all DHCPv6 snooping guard policy statistics from the specified VLAN or interface.

Parameter <VLAN-ID>

Description Specifies the VLAN ID. Range: 1-4094.

<INTERFACE-NAME>

Specifies the interface name.

Examples
Clearing all DHCPv6 snooping guard policy statistics from VLAN 100: switch# clear dhcpv6-snooping guard-policy statistics vlan 100
Clearing all DHCPv6 snooping guard policy statistics from interface 1/1/10: switch# clear dhcpv6-snooping guard-policy statistics interface 1/1/10

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

DHCPv6 snooping commands | 708

Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

clear dhcpv6-snooping statistics
clear dhcpv6-snooping statistics
Description
Clears all DHCPv6 snooping statistics.
Examples
Clear all DHCPv6 snooping statistics:
switch# clear dhcpv6-snooping statistics

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.09.1000 10.09 10.07 or earlier

Modification Command introduced for the 8360 Switch Series. Command introduced for the 6000 and 6100 Switch Series.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

dhcpv6-snooping
dhcpv6-snooping no dhcpv6-snooping

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

709

Description
Enables DHCPv6 snooping. DHCPv6 snooping is disabled by default. DHCPv6 snooping is not supported on the management interface. The no form of the command disables DHCPv6 snooping, flushing all the IP bindings learned since DHCPv6 snooping was enabled.
Examples
Enabling DHCPv6 snooping:
switch(config)# dhcpv6-snooping
Disabling DHCPv6 snooping:
switch(config)# no dhcpv6-snooping

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.09.1000 10.09 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced for the 8360 Switch Series. Command introduced for the 6000 and 6100 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

dhcpv6-snooping guard-policy
dhcpv6-snooping guard-policy <POLICY-NAME> no dhcpv6-snooping guard-policy <POLICY-NAME>
Description
Configures a DHCPv6 snooping guard policy with the given name and enters the guard policy configuration context. The no form of the command disables the specified guard policy.

Parameter <POLICY-NAME>

Description
Specifies the name of the DHCPv6 snooping guard policy. Maximum length: 64.

DHCPv6 snooping commands | 710

Examples
Creating the DHCPv6 snooping guard policy name pol1:
switch(config)# dhcpv6-snooping guard-policy pol1 switch(config-guard-policy-pol1)#
Deleting the DHCPv6 snooping guard policy named pol1:
switch(config)# no dhcpv6-snooping guard-policy pol1
Creating the DHCPv6 snooping guard policy name pol1 on interface 1/1/1: The DHCPv6 snooping guard policy applied on the port takes priority over the policy applied over VLAN.

switch(config)# interface 1/1/1 switch(config-if)# dhcpv6-snooping guard-policy pol1
Creating the DHCPv6 snooping guard policy name pol1 on a VLAN:
switch(config)# vlan 100 switch(config-vlan-100)# dhcpv6-snooping guard-policy pol1

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-if config-dhcpv6-guard-policy config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

dhcpv6-snooping (in config-vlan context)
dhcpv6-snooping no dhcpv6-snooping
Description
Enables DHCPv6 snooping in the config-vlan context. DHCPv6 snooping is disabled by default for all VLANs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

711

The no form of the command disables DHCPv6 snooping on the specified VLAN, flushing all the IPv6 bindings learned for this VLAN since DHCPv6 snooping was enabled for this VLAN.
Examples
Enabling DHCPv6 snooping on VLAN 100:
switch(config)# vlan 100 switch(config-vlan-100)# dhcpv6-snooping switch(config-vlan-100)# exit switch(config)#
Disabling DHCPv6 snooping on VLAN 100:
switch(config)# vlan 100 switch(config-vlan-100)# no dhcpv6-snooping switch(config-vlan-100)# exit switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.09.1000 10.09 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-vlan

Modification Command introduced for the 8360 Switch Series. Command introduced for the 6000 and 6100 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

dhcpv6-snooping authorized-server
dhcpv6-snooping authorized-server <IPV6-ADDR> [vrf <VRF-NAME>] no dhcpv6-snooping authorized-server <IPV6-ADDR> [vrf <VRF-NAME>]
Description
Adds an authorized (trusted) DHCPv6 server to a list of authorized servers for use by DHCPv6 snooping. This command can be issued multiple times, adding a maximum of 20 authorized servers per VRF. By default, with an empty list of authorized servers, all DHCPv6 servers are considered to be trusted for DHCPv6 snooping purposes.
The mgmt VRF cannot be used with this command.

DHCPv6 snooping commands | 712

Configure the link local IPv6 address instead of global IPv6 address of the DHCPv6 server as the authorizedserver. For example:
switch(config)# dhcpv6-snooping authorized-server fe80::2ca4:fa40:d4cd:bc2f

The no form of this command deletes the specified DHCPv6 server from the authorized list.

Parameter <IPV6-ADDR> vrf <VRF-NAME>

Description
Specifies the IPv6 address of the trusted DHCPv6 server.
Specifies the VRF name. The name can be default or a configured VRF instance but it cannot be mgmt.

Usage
For authorized server lookup, the VRF is derived from the Switch Virtual Interface (SVI) configured for the incoming VLAN. If the SVI is not configured, the default VRF is assumed.
Examples
Adding DHCP servers ABCD:5ACD::2000, and ABCD:5ACD::2010 to the authorized server list:

switch(config)# dhcpv6-snooping authorized-server ABCD:5ACD::2000 vrf default switch(config)# dhcpv6-snooping authorized-server ABCD:5ACD::2010 vrf default

Removing DHCP server ABCD:5ACD::2000 from the authorized server list:

switch(config)# no dhcpv6-snooping authorized-server ABCD:5ACD::2000 vrf default

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

dhcpv6-snooping event-log client

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

713

dhcpv6-snooping event-log client no dhcpv6-snooping event-log client
Description
This command enables or disables DHCPv6 snooping client level event logs that help with client telemetry on a remote management station such as Aruba Central. By default, client level event logs are disabled. The no form of this command disables client-level event logs for DHCPv6 snooping after they are enabled. View these logged DHCPv6 snooping events by issuing the command show events -c dhcpv6-snooping.
For additional information on DHCP-related event logging, please refer to the Event Log Message Reference Guide.
Examples
Enabling DHCPv6 client level event logs:
switch(config)# # dhcpv6-snooping event-log client
Disabling external storage:
witch(config)# # no dhcpv6-snooping event-log client

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

dhcpv6-snooping external-storage
dhcpv6-snooping external-storage volume <VOL-NAME> file <FILE-NAME> no dhcpv6-snooping external-storage volume <VOL-NAME> file <FILE-NAME>
Description
Configures external storage to be used for backing up IPv6 bindings (used by DHCPv6 snooping) to a file. When configured, the switch stores all the IP bindings in an external storage file so that they are retained after the switch restarts. When the switch restarts, it reads the IPv6 bindings from the configured external storage file to populate its local cache.

DHCPv6 snooping commands | 714

When both external storage and flash storage are configured to store DHCP snooping IP bindings, the external storage takes priority, and is used exclusively until it becomes unconfigured, at which time flash storage (if configured) is used. Later, if external storage is configured again, flash storage stops and external storage resumes.
The no form of this command disables the saving of IPv6 bindings in an external storage file.

Parameter volume <VOL-NAME>
file <FILE-NAME>

Description
Specifies the name of the existing external storage volume where the IPv6 bindings file will be saved. Before running the dhcpv6snooping external-storage volume command, first create the external storage volume using command external-storage <VOLUME-NAME>. See External storage commands in the CommandLine Interface Guide.
Specifies the file name to use for storing IPv6 bindings. Maximum 255 characters.

Examples
Configuring IPv6 bindings storage in file ipv6Bindings on existing volume dhcp_snoop:

switch(config)# dhcpv6-snooping external-storage volume dhcp_snoop file ipv6Bindings

Disabling external storage:

switch(config)# no dhcpv6-snooping external-storage volume dhcp_snoop

Disabling external storage when flash storage is also configured (note the message indicating that flash storage will be used):

switch(config)# no dhcpv6-snooping external-storage volume dhcp_snoop DHCPv6-Snooping will use flash storage to store IP Binding database switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.08 10.07 or earlier
Command Information

Modification Updated example with flash storage information. Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

715

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

dhcpv6-snooping flash-storage
dhcpv6-snooping flash-storage [delay <DELAY>] no dhcpv6-snooping flash-storage [delay <DELAY>]
Description
Configures switch flash storage to be used for backing up client IP bindings (used by DHCPv6 snooping). When flash storage is configured (and external storage is not already configured for this purpose), the switch stores the IP bindings in switch flash storage. When the switch restarts, it reads the IP bindings from the switch flash storage to populate its local cache. Writing the IP bindings to flash storage only occurs after the configured delay and if there has been a change in client IP bindings. Writing is skipped when client IP bindings have not changed since the previous write. Omitting delay <DELAY> sets the default delay of 900 seconds.
To reduce switch flash aging it is recommended that you use external storage (command dhcpv6-snooping external-storage) to backup DHCP snooping IP bindings. Alternatively, consider configuring flash storage with a substantial delay between writes.

When both external storage and flash storage are configured to store DHCP snooping IP bindings, the external storage takes priority, and is used exclusively until it becomes unconfigured, at which time flash storage (if configured) is used. Later, if external storage is configured again, flash storage stops and external storage resumes.
The no form of this command disables the saving of IP bindings in flash storage.

Parameter delay <DELAY>

Description
Specifies the delay in seconds between writes (when necessary) to the flash storage, Default: 900. Range: 300 to 86400.

Examples
Configuring switch flash storage for DHCP snooping IP binding storage with a write delay of 1200 seconds:

switch(config)# dhcpv6-snooping flash-storage delay 1200 Warning: Using flash storage reduces switch lifetime. It is recommended to use an external-storage. Do you want to continue (y/n)? y switch(config)#

Unconfiguring usage of switch flash storage for IP bindings :

DHCPv6 snooping commands | 716

switch(config)# no dhcpv6-snooping flash-storage

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

dhcpv6-snooping max-bindings
dhcpv6-snooping max-bindings <MAX-BINDINGS> no dhcpv6-snooping max-bindings <MAX-BINDINGS>
Description
Sets the maximum number of DHCPv6 bindings allowed on the selected interface. For all interfaces on which this command is not run, the default max binding is the maximum value of the range. The no form of the command reverts max bindings for the selected interface to its default.

Parameter <MAX-BINDINGS>

Description
Specifies the maximum number of DHCP bindings. Range 1 to 8192.

Examples
On the 6400 Switch Series, interface identification differs. Set the DHCPv6 max bindings to 256 on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# dhcpv6-snooping max-bindings 256 switch(config-if)# exit switch(config)#

Revert DHCPv6 max bindings to its default on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# no dhcpv6-snooping max-bindings 256 switch(config-if)# exit switch(config)#

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

717

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07

Command Information

Platforms
6300 6400

Command context config-if

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

dhcpv6-snooping trust
dhcpv6-snooping trust no dhcpv6-snooping trust
Description
Enables DHCPv6 snooping trust on the selected interface. Only server packets received on trusted interfaces are forwarded. All the interfaces are untrusted by default. The no form of the command disables DHCPv6 snooping trust on the selected interface. config-if
Examples
On the 6400 Switch Series, interface identification differs. Enabling DHCPv6 snooping trust on interface 2/2/1:
switch(config)# interface 2/2/1 switch(config-if)# dhcpv6-snooping trust switch(config-if)# exit switch(config)#
Disabling DHCPv6 snooping trust on interface 2/2/1:
switch(config)# interface 2/2/1 switch(config-if)# no dhcpv6-snooping trust switch(config-if)# exit switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

DHCPv6 snooping commands | 718

Release 10.07

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

dhcpv6-snooping tunnel vxlan trust
dhcpv6-snooping tunnel vxlan trust no dhcpv6-snooping tunnel vxlan trust
Description
Enables DHCPv6-snooping trust on all VxLAN tunnels. The no form of the command to marks all VxLAN tunnels as untrusted. By default, all VxLAN tunnel interfaces are trusted. When trust is disabled on VxLAN tunnel interfaces: n DHCP broadcast packets are not forwarded on VxLAN tunnels. n DHCP server packets received on VxLAN tunnel interfaces are discarded.
Examples
On the 6400 Switch Series, interface identification differs. Enabling trust on all VxLAN tunnel interfaces:
switch(config)# dhcpv6-snooping tunnel vxlan trust
Disabling trust on all VxLAN tunnel interfaces:
switch(config)# no dhcpv6-snooping tunnel vxlan trust

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.11.1000
Command Information

Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

719

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

match client prefix-list
match client prefix-list <PREFIX-LIST-NAME> no match client prefix-list <PREFIX-LIST-NAME>
Description
Configures a prefix-list for the DHCPv6 snooping guard policy enabling the policy to allow the assigned IPv6 addresses within a specific prefix range. The no form of the command removes a prefix list from the DHCPv6 snooping guard policy.

Parameter <PREFIX-LIST-NAME>

Description Specifies the name of the IPv6 prefix list.

Examples
Adding a prefix list named pref1 to the pol1 DHCPv6 snooping guard policy:
switch(config)# ipv6 prefix-list pref1 permit 2001:db8::/64 le 128 switch(config)# dhcpv6-snooping guard-policy pol1 switch(config-dhcpv6-guard-policy)# match client prefix-list pref1
Deleting the prefix list named prf1 from the pol1 DHCPv6 snooping guard policy:
switch(config)# dhcpv6-snooping guard-policy pol1 switch(config-dhcpv6-guard-policy)# no match client prefix-list <ipv6-prefix-listname>

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-dhcpv6-guard-policy

Authority
Administrators or local user group members with execution rights for this command.

DHCPv6 snooping commands | 720

match server access-list
match server access-list <ACL-NAME> no match server access-list <ACL-NAME>
Description
Configures an access list to a DHCPv6 snooping guard policy, enabling the DHCPv6 snooping guard policy to allow or deny the specific DHCP server to assign an IPv6 address. If no filters are applied, DHCP server traffic from any source IP address is allowed in the trusted port. The no form of the command removes the specified access list from the DHCPv6 snooping guard policy.

Parameter <ACL-NAME>

Description Specifies the name of the IPv6 access list to be matched.

Examples
Creating an access-list acl1 on DHCPv6 snooping guard policy pol1 :
switch(config)# dhcpv6-snooping guard-policy pol1 switch(config-dhcpv6-guard-policy)# match server access-list acl1
Deleting the access list acl1 from the DHCPv6 snooping guard policy pol1:
switch(config)# dhcpv6-snooping guard-policy pol1 switch(config-dhcpv6-guard-policy)# no match server access-list acl1

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-dhcpv6-guard-policy

Authority
Administrators or local user group members with execution rights for this command.

preference
preference [minimum | maximum ] <VALUE> no preference
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

721

Enables a DHCPv6 snooping guard policy to allow or deny the DHCPv6 servers in the specified server preference range. If not configured the minimum preference is set to 0 and maximum preference is set to 255.
The no form of the command removes the server preference limits on the specified DHCPv6 snooping guard policy.

Parameter minimum <VALUE>
maximum <VALUE>

Description
Specifies the minimum value for the server preference range. Range: 1-255.
Specifies the maximum value for the server preference range. Range: 1-255.

Examples
Setting the minimum and maximum server preference range to 6-250 on DHCPv6 snooping guard policy pol1:

switch(config)# dhcpv6-snooping guard-policy pol1 switch(config-dhcpv6-guard-policy)# preference min 6 switch(config-dhcpv6-guard-policy)# preference max 250

Disabling the server preference range on DHCPv6 snooping guard policy pol1:

switch(config)# dhcpv6-snooping guard-policy pol1 switch(config-dhcpv6-guard-policy)# no preference

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-dhcpv6-guard-policy

Authority
Administrators or local user group members with execution rights for this command.

show dhcpv6-snooping guard-policy
show dhcpv6-snooping guard-policy[<POLICY_NAME>] [vsx-peer]
Description
Shows the DHCPv6 snooping guard policy configuration.

DHCPv6 snooping commands | 722

Parameter <POLICY-NAME>
vsx-peer

Description
Specifies the DHCPv6 snooping guard policy for which the information is displayed.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing the DHCPv6 snooping guard policy configuration:

switch# show dhcpv6-snooping guard-policy

DHCPv6-Snooping guard-policy Information

DHCPV6 Guard Policy name Attached Access List Attached Prefix List Preference Range Applied on VLAN Applied on Port

: POL1 : ACL1 : PRF1 : 0-255 : 5,7

DHCPV6 Guard Policy name Attached Access List Attached Prefix List Preference Range Applied on VLAN Applied on Port

: POL2 : ACL2 : PRF2 : 2-20
: 1/1/1, 1/1/2

DHCPV6 Guard Policy name Attached Access List Attached Prefix List Preference Range Applied on VLAN Applied on Port

: POL3 : ACL3 : PRF3 : 3-60 : 4,6

Showing the DHCPv6 snooping guard policy configuration for the policy named POLICY_NAME1:

switch# show dhcpv6-snooping guard-policy POLICY_NAME1

DHCPv6-Snooping guard-policy Information

========================

DHCPV6 Guard Policy name : POLICY_NAME1

Attached Access List

: ACL1

Attached Prefix List

: PRF1

Preference Range

: 0-255

vsx-sync

Applied on VLAN

: 5,7

Applied on Port

: 1/1/1, 1/1/2

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

723

Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show dhcpv6-snooping guard-policy interface
show dhcpv6-snooping guard-policy [interface <INTERFACE-NAME>] [vsx-peer]
Description
Shows the DHCPv6 snooping guard policy configuration and statistics for the specified interface.

Parameter <INTERFACE-NAME>
vsx-peer

Description
Specifies the interface name for which the DHCPv6 guard counter information is displayed.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing the DHCPv6 snooping guard policy configuration and statistics for interface 1/1/1:

switch# show dhcpv6-snooping guard-policy int 1/1/1 DHCPv6 Guard Policy Applied : pol1 DHCPv6 Guard Policy Counters ==========================

DHCPv6 Packets Received DHCPv6 Packets Forwarded DHCPv6 Packets Dropped

: 20

:5

: 15 [Total]

Access list error

[7]

Prefix list error

[8]

Server preference error [0]

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

DHCPv6 snooping commands | 724

Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show dhcpv6-snooping guard-policy vlan
show dhcpv6-snooping guard-policy [vlan <VLAN-ID>] [vsx-peer]
Description
Shows the DHCPv6 snooping guard policy configuration and statistics for the specified VLAN.

Parameter <VLAN-ID>
vsx-peer

Description
Specifies the VLAN ID for which the DHCPv6 guard counter information is displayed.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing the DHCPv6 snooping guard policy configuration and statistics for VLAN 100:

switch# show dhcpv6-snooping guard-policy vlan 2 DHCPv6 Guard Policy Applied : pol1 DHCPv6 Guard Policy Counters ==========================

DHCPv6 Packets Received DHCPv6 Packets Forwarded DHCPv6 Packets Dropped

: 20

:5

: 15 [Total]

Access list error

[0]

Prefix list error

[8]

Server preference error [7]

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

725

Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show dhcpv6-snooping
show dhcpv6-snooping [vsx-peer]
Description
Shows the DHCPv6 snooping configuration.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing the DHCPv6 snooping configuration:

switch# show dhcpv6-snooping

DHCPv6-Snooping Information

DHCPv6-Snooping

: Yes Enabled VLANs

Trusted Port Bindings Enabled VLANs :

Client Event Logs

: Yes

: 1,5,7,100-110

External Storage Information

Volume Name File Name Inactive Since Error

: dhcp_snoop : ip_binding : 01:23:20 09/10/2021 : Failed to write external storage

Flash Storage Information File Write Delay Active Storage

: 300 seconds : External

Authorized Server Configurations VRF -----------default 2001:0db8:85a3:0000:0000:8a2e:0370:7334

Authorized Servers ------------------

DHCPv6 snooping commands | 726

default default red red red green green green green green

Port Information

Port -------1/1/2 1/1/3 1/1/5 1/1/16 10/10/10 lag120

Trust ----Yes Yes Yes No No No

2002::2 2004::1 2002::1 2002::2 2002::9 5000::1 5000::2 5000::3 5000::7 5000::8

Max Bindings -------0 0 0 256 256 256

Static

Dynamic

Bindings Bindings

-------- --------

0

0

3

0

22

0

0

20

12

7

3

0

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.08 10.07 or earlier

Modification Updated example with flash storage information. Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show dhcpv6-snooping binding
show dhcpv6-snooping binding [vsx-peer]
Description
Shows the DHCPv6 snooping binding configuration.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

727

Examples
On the 6400 Switch Series, interface identification differs. Showing the DHCPv6 snooping binding configuration:

switch# show dhcpv6-snooping binding

IP Binding Information

======================

MAC-ADDRESS

IPV6-ADDRESS

TIME-LEFT

---------------- ----------------------------------------

------

00:50:56:96:e4:cf aaaa:bbbb:cccc:dddd:eeee:1234:5678:abcd

584

00:50:56:96:04:4d 1000::3

435

00:50:56:96:d8:3d 2000:1000::4

21234

VLAN ----
1 134 2002

INTERFACE ---------
1/1/1 1/1/2 lag123

----

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.09.1000 10.09 10.07 or earlier

Modification Command introduced for the 8360 Switch Series. Command introduced for the 6000 and 6100 Switch Series.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show dhcpv6-snooping statistics
show dhcpv6-snooping statistics [vsx-peer]
Description
Shows the DHCPv6 snooping statistics.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

DHCPv6 snooping commands | 728

Examples
Showing the DHCPv6 snooping statistics:

switch(config)# show dhcpv6-snooping statistics

Packet-Type ----------server client server server client client server client

Action ------forward forward drop drop drop drop drop drop

Reason ----------------------------from trusted port to trusted port received on untrusted port unauthorized server destination on untrusted port bad DHCP release request relay reply on untrusted port failed on max-binding limit

Count --------12 20 5 4 2 5 2 5

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.09.1000 10.09 10.07 or earlier

Modification Command introduced for the 8360 Switch Series. Command introduced for the 6000 and 6100 Switch Series.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

729

Chapter 35 DHCP options commands

DHCP options commands

http-proxy
http-proxy {<FQDN | IPV4-ADDR> | IPV6-ADDR[:PORT]} [vrf <VRF-NAME>] no http-proxy [<FQDN | IPV4-ADDR>] [vrf <VRF-NAME>]
Description
Specifies HTTP proxy location and VRF. When HTTP proxy location and VRF are configured on the switch, it overrides any existing HTTP proxy location and VRF as this has the highest priority over the values obtained from other sources. Following locations can be used for the HTTP proxy location:
n A fully qualified domain name (FQDN). n An IPv4 address with colon separated port number n An IPv6 address with colon separated port number

When configuring an IPv6 address with a port number, the address must be specified inside square brackets. An example - [2001:0db8:85a3:0000:0000:8a2e:0370:7334]:8080.
If the command is entered without the VRF parameter, then the VRF used will be 'default' VRF. The no form of this command removes a specified HTTP proxy location.

Parameter <FQDN> <IPV4-ADDR> <IPV6-ADDR>

Description Specifies FQDN for HTTP proxy location. Specifies IPV4 address for HTTP proxy location. Specifies IPV6 address for HTTP proxy location.

<VRF-NAME>

Specifies VRF for HTTP proxy.

A FQDN or IPV4 address are optional in the no form of the command.
Examples
Specifying a FQDN for HTTP proxy location and MGMT VRF:
switch(config)# http-proxy http-proxy.aruba.com vrf mgmt switch(config)# http-proxy [2000::100]:8080 vrf mgmt

AOS-CX 10.14 Command-Line Interface Guide

730

Removing HTTP proxy location switch(config)# no http-proxy

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.13.1000 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Command updated to reflect OTP scenario. --
Authority Administrators or local user group members with execution rights for this command.

DHCP options commands | 731

Chapter 36 DNS client commands

DNS client commands

ip dns domain-list
ip dns domain-list <DOMAIN-NAME> [vrf <VRF-NAME>] no ip dns domain-list <DOMAIN-NAME> [vrf <VRF-NAME>]
Description
Configures one or more domain names that are appended to the DNS request. The DNS client appends each name in succession until the DNS server replies. Domains can be either IPv4 or IPv6. By default, requests are forwarded on the default VRF. The no form of this command removes a domain from the list.

Parameter list <DOMAIN-NAME>
vrf <VRF-NAME>

Description
Specifies a domain name. Up to six domains can be added to the list. Length: 1 to 256 characters.
Specifies a VRF name. Default: default.

Examples
This example defines a list with two entries: domain1.com and domain2.com.

switch(config)# ip dns domain-list domain1.com switch(config)# ip dns domain-list domain2.com

This example defines a list with two entries, domain2.com and domain5.com, with requests being sent on mainvrf.

switch(config)# ip dns domain-list domain2.com vrf mainvrf switch(config)# ip dns domain-list domain5.com vrf mainvrf

This example removes the entry domain1.com.

switch(config)# no ip dns domain-list domain1.com

For more information on features that use this command, refer to the Fundamentals Guide or the IP Services Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide

732

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip dns domain-name
ip dns domain-name <DOMAIN-NAME> [ vrf <VRF-NAME> ] no ip dns domain-name <DOMAIN-NAME> [ vrf <VRF-NAME> ]
Description
Configures a domain name that is appended to the DNS request. The domain can be either IPv4 or IPv6. By default, requests are forwarded on the default VRF. If a domain list is defined with the command ip dns domain-list, the domain name defined with this command is ignored. The no form of this command removes the domain name.

Parameter <DOMAIN-NAME>
vrf <VRF-NAME>

Description
Specifies the domain name to append to DNS requests. Length: 1 to 256 characters.
Specifies a VRF name. Default: default.

Examples
Setting the default domain name to domain.com:

switch(config)# ip dns domain-name domain.com

Removing the default domain name domain.com:

switch(config)# no ip dns domain-name domain.com

For more information on features that use this command, refer to the Fundamentals Guide or the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

DNS client commands | 733

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

ip dns host
ip dns host <HOST-NAME> <IP-ADDR> [ vrf <VRF-NAME> ] no ip dns host <HOST-NAME> <IP-ADDR> [ vrf <VRF-NAME> ]
Description
Associates a static IP address with a hostname. The DNS client returns this IP address instead of querying a DNS server for an IP address for the hostname. Up to six hosts can be defined. If no VRF is defined, the default VRF is used. The no form of this command removes a static IP address associated with a hostname.

Parameter host <HOST-NAME> <IP-ADDR>
vrf <VRF-NAME>

Description
Specifies the name of a host. Length: 1 to 256 characters.
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies a VRF name. Default: default.

Examples
This example defines an IPv4 address of 3.3.3.3 for host1.

switch(config)# ip dns host host1 3.3.3.3

This example defines an IPv6 address of b::5 for host 1.

switch(config)# ip dns host host1 b::5

This example defines removes the entry for host 1 with address b::5.

switch(config)# no ip dns host host1 b::5

For more information on features that use this command, refer to the Fundamentals Guide or the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

734

Command Information

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

ip dns server address
ip dns server-address <IP-ADDR> [ vrf <VRF-NAME> ] no ip dns server-address <IP-ADDR> [ vrf <VRF-NAME> ]
Description
Configures the DNS name servers that the DNS client queries to resolve DNS queries. Up to six name servers can be defined. The DNS client queries the servers in the order that they are defined. If no VRF is defined, the default VRF is used. The no form of this command removes a name server from the list.

Parameter <IP-ADDR>
vrf <VRF-NAME>

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies a VRF name. Default: default.

Examples
This example defines a name server at 1.1.1.1.

switch(config)# ip dns server-address 1.1.1.1

This example defines a name server at a::1.

switch(config)# ip dns server-address a::1

This example removes a name server at a::1.

switch(config)# no ip dns server-address a::1

For more information on features that use this command, refer to the Fundamentals Guide or the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

DNS client commands | 735

Command Information

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

show ip dns
show ip dns [vrf <VRF-NAME>][vsx-peer]
Description
Shows all DNS client configuration settings or the settings for a specific VRF.

Parameter vrf <VRF-NAME>
vsx-peer

Description
Specifies the VRF for which to show information. If no VRF is defined, the default VRF is used.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
These examples define DNS settings and then show how they are displayed with the show ip dns command.

switch(config)# ip dns domain-name domain.com switch(config)# ip dns domain-list domain5.com switch(config)# ip dns domain-list domain8.com switch(config)# ip dns server-address 4.4.4.4 switch(config)# ip dns server-address 6.6.6.6 switch(config)# ip dns host host3 5.5.5.5 switch(config)# ip dns host host2 2.2.2.2 switch(config)# ip dns host host3 c::12 switch(config)# ip dns domain-name reddomain.com vrf red switch(config)# ip dns domain-list reddomain5.com vrf red switch(config)# ip dns domain-list reddomain8.com vrf red switch(config)# ip dns server-address 4.4.4.5 vrf red switch(config)# ip dns server-address 6.6.6.7 vrf red switch(config)# ip dns host host3 5.5.5.6 vrf red switch(config)# ip dns host host2 2.2.2.3 vrf red switch(config)# ip dns host host3 c::13 vrf red switch# show ip dns VRF Name : default

Domain Name : domain.com DNS Domain list : domain5.com, domain8.com Name Server(s) : 4.4.4.4, 6.6.6.6

Host Name Address

-------------------------------

host2

2.2.2.2

host3

5.5.5.5

host3

c::12

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

736

VRF Name : red

Domain Name : reddomain.com DNS Domain list : reddomain5.com, reddomain8.com Name Server(s) : 4.4.4.5, 6.6.6.7

Host Name Address

-------------------------------

host2

2.2.2.3

host3

5.5.5.6

host3

c::13

switch(config)# ip dns domain-name domain.com vrf red switch(config)# ip dns domain-list domain5.com vrf red switch(config)# ip dns domain-list domain8.com vrf red switch(config)# ip dns server-address 4.4.4.4 vrf red switch(config)# ip dns server-address 6.6.6.6 vrf red switch(config)# ip dns host host3 5.5.5.5 vrf red switch(config)# no ip dns host host2 2.2.2.2 vrf red switch(config)# ip dns host host3 c::12 vrf red

switch# show ip dns vrf red VRF Name : red

Domain Name : domain.com DNS Domain list : domain5.com, domain8.com Name Server(s) : 4.4.4.4, 6.6.6.6

Host Name Address

-------------------------------

host3

5.5.5.5

host3

c::12

DNS client arbitration on the MGMT interface on a MGMT VRF can be updated via three different methods. 1. Using the domain-name <name> or nameservers <servers> commands in the command-line interface. 2. Using the ip dns domain-name <DOMAIN-NAME> vrf MGMT or ip dns server-address <SERVER> vrf MGMT commands in the command-line interface. 3. Using the ip dhcp command in the command-line interface (dynamic enties).
AOS-CX gives the following priority levels to the these three update mothods. n Priority 1 - standalone CLI configuration n Priority 2 - static ip dns configuration n Priority 3 - Dynamic config

For more information on features that use this command, refer to the Fundamentals Guide or the IP Services Guide for your switch model.
Command History

DNS client commands | 737

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

738

Chapter 37 ECMP commands

ECMP commands

show ip ecmp
show ip ecmp [vsx-peer]
Description
Displays the Equal Cost Multipath (ECMP) configuration.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

switch# show ip ecmp

ECMP Configuration ---------------------

ECMP Status

: Enabled

ECMP Load Balancing by

------------------------

Source IP

: Enabled

Destination IP

: Enabled

Source Port

: Enabled

Destination Port : Enabled

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide

739

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ECMP commands | 740

Chapter 38 ERPS Commands

ERPS Commands

clear erps ring <RINGID> instance <ID>
clear erps ring <RINGID> instance <ID>
Description
Removes the protection switching and triggers reversion both in revertive and non-revertive operation. This command will not change the configured revertive operation mode.

Parameter <RINGID> <ID>

Description Required, specifies the ID of the ring. Range: 1-239. Required, specifies the ID of the ring instance. Range: 1-2.

Examples
Removes the protection switching and triggers reversion for ring 3, instance 2:

switch# clear erps ring 3 instance 2

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

clear erps statistics
clear erps statistics [ring <ID>] [instance <ID>]
Description

AOS-CX 10.14 Command-Line Interface Guide

741

This command clears the ERPS statistics for a ring or a ring instance.

Parameter <RINGID> <ID>

Description Optional, specifies the ID of the ring. Range: 1-239. Optional, specifies the ID of the ring instance. Range: 1-64.

Examples
Clear ERPS statistics for ring 1:

switch# clear erps statistics ring 1

Clear ERPS statistics for instance 1 of ring 1:

switch# clear erps statistics ring 1 instance 1

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

erps ring
erps ring <RINGID> no erps ring <RINGID>
Description
This command creates an ERPS ring with a given ID. The no form of this command removes all the configurations of the ring, including instances.

Parameter <RINGID>

Description Required, specifies the ID of the ring. Range: 1-239

Examples

ERPS Commands | 742

Create an ERPS ring:
switch(config)# erps ring 2 switch(config-ring-2)#
Remove an ERPS ring:
switch(config)# no erps ring 2 switch(config-ring-2)#

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

erps ring <RINGID> <port0|port1> interface
erps ring <RINGID> <port0|port1> interface <ifname>
Description
This command configures the ERPS ring member port. An L2 interface in the switch is associated to one of the two member ports of an ERPS ring. In case of an interconnection node, only port0 is applicable for the sub-ring. The no form of this command removes the association of the ring port to the L2 interface on the switch.

Parameter <RINGID> <PORT0> <PORT1> <ifname>

Description Required, specifies the ID of the ring. Range: 1-239 Required, set port0 of the ring. Required, set port1 of the ring. Required, interface name (string).

Examples
Configure the ERPS ring member port:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

743

switch(config)# erps ring 3 switch(config-erps-ring-3)# port0 interface 1/1/1
Remove the association of the ring port to the L2 interface on the switch:
switch(config)# erps ring 3 switch(config-erps-ring-3)# no port0

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> description
erps ring <RINGID> description <LINE>
Description
This command adds descriptive information to help administrators and operators understand the purpose of a ring. 1-64 printable ASCII characters are allowed. The no form of this command removes the ring instance description.

Parameter <RINGID> <LINE>

Description
Required, specifies the ID of the ring. Range: 1-239
Required, specifies the description text. Maximum length is 64 characters.

Examples
Add descriptive information to a ring:

switch(config)# erps ring 3 switch(config-erps-ring-3) description HPE RnD ring

Remove descriptive information from a ring:

ERPS Commands | 744

switch(config)# erps ring 3 switch(config-erps-ring-3) no description

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> guard-interval
erps ring <RINGID> guard-interval <10 milliseconds>
Description
Guard timer is used in nodes recovering from a local failure to avoid loops due to earlier Signal Fail (SF) messages that may be in the ring. The configuration specifies the guard timer duration in units of 10 ms. The timer period must be greater than the maximum expected forwarding delay in which an R-APS message traverses the entire ring. The default value is 50. The no form of this command removes the configured value of the guard interval and sets it to the default value of 50.

Parameter <RINGID> <10 milliseconds>

Description
Required, specifies the ID of the ring. Range: 1-239
Required, specifies the guard timer duration in units of 10 ms. Default: 50.

Examples
Specify the guard timer duration:

switch(config)# erps ring 3 switch(config-erps-ring-3)# guard-interval 100

Remove the configured value of the guard interval and set it to the default value of 50:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

745

switch(config)# erps ring 3 switch(config-erps-ring-3)# no guard-interval

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> hold-off-interval
erps ring <RINGID> hold-off-interval <100 milliseconds>
Description
Specifies hold-off interval in units of 100 ms. If specified, a defect is not reported immediately. Instead, the hold-off timer is started. On expiration of the timer, if the defect still exists, it is reported to protection switching. The default value for hold-off timer is 0. The no form of this command removes the configured value of the hold-off interval and sets it to the default value of 0.

Parameter <RINGID> <100 milliseconds>

Description
Required, specifies the ID of the ring. Range: 1-239
Required, specifies the hold-off interval in units of 100 ms. Default: 0.

Examples
Specify the hold-off interval:

switch(config)# erps ring 3 switch(config-erps-ring-3)# hold-off-interval 100

Remove the configured value of the hold-off interval and set it to the default value of 0:

ERPS Commands | 746

switch(config)# erps ring 3 switch(config-erps-ring-3)# no hold-off-interval

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> instance
erps ring <RINGID> instance <ID>
Description
On a common ERPS network, a physical ring can be configured with a single ERPS ring, and only one blocked port can be specified in the ring. When the ERPS ring is in normal state, the blocked port prohibits all service packets from passing through. As a result, all service data is transmitted through one path over the ERPS ring, and the other link on the blocked port becomes idle, leading to ineffective use of bandwidth. To improve link use efficiency, logical rings can be configured in the same physical ring in the ERPS multi-instance. A port may have different roles in different ERPS rings and different ERPS rings use different control VLANs. An ERPS ring must be configured with an ERP instance, and each ERP instance specifies a range of VLANs. The topology calculated for a specific ERPS ring only takes effect in the ERPS ring. Different VLANs can use separate paths, implementing traffic load balancing and link backup. The no form of this command removes the instance of the ring.

Parameter <RINGID> <ID>

Description Required, specifies the ID of the ring. Range: 1-239 Required, specifies the ERPS ring instance identifier. Range: 1-2.

Examples
Create a ring instance:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

747

switch(config)# erps ring 3 switch(config-ring-3)# instance 2
Remove a ring instance:
switch(config)# erps ring 3 switch(config-ring-3)# no instance 2

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> instance <ID> control-vlan
erps ring <RINGID> instance <ID> control-vlan <VID>
Description
This command adds a control-channel VLAN to a ring instance. In an ERPS ring, the control VLAN should be used only to forward RAPS PDUs and not service packets. All the devices in an ERPS ring instance must be configured with the same control VLAN, and different ERPS ring instances must use different control VLANs. The no form of this command removes the control-channel VLAN of the ring instance.

Parameter <RINGID> <ID> <VID>

Description Required, specifies the ID of the ring. Range: 1-239 Required, specifies the ERPS ring instance identifier. Range: 1-2. Required, VLAN ID. Range: 1-4094.

Examples
Add a control-channel VLAN to a ring instance:

ERPS Commands | 748

switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 2 switch(config-erps-ring-3-inst-2) control-vlan 10
Remove the control-channel VLAN of the ring instance:
switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 2 switch(config-erps-ring-3-inst-2) no control-vlan

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> instance <ID> description
erps ring <RINGID> instance <ID> description <LINE>
Description
This command adds descriptive information to help administrators and operators understand the purpose of a ring instance. 1-64 printable ASCII characters are allowed. The no form of this command removes the ring instance description.
Command context

Parameter <RINGID> <ID> <LINE>

Description
Required, specifies the ID of the ring. Range: 1-239
Required, specifies the ERPS ring instance identifier. Range: 1-2.
Required, descriptive information about the ring instance. 1-64 printable ASCII characters allowed.

Examples
Add ring instance description:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

749

switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 2 switch(config-erps-ring-3-inst-2) description HPE RnD DataVlan
Remove ring instance description:
switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 2 switch(config-erps-ring-3-inst-2) no description

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> instance <ID> enable
erps ring <RINGID> instance <ID> enable
Description
This configuration enables protection switching on the given instance of the ring. It is disabled by default. The no form of this command disables protection switching on the given instance of the ring.

Parameter <RINGID> <ID>

Description Required, specifies the ID of the ring. Range: 1-239 Required, specifies the ERPS ring instance identifier. Range: 1-2.

Examples
Enable protection switching on the given instance of the ring:

ERPS Commands | 750

switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 2 switch(config-erps-ring-3-inst-2) enable
Disable protection switching on the given instance of the ring:
switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 2 switch(config-erps-ring-3-inst-2) no enable

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> instance <ID> protected-vlans
erps ring <RINGID> instance <ID> protected-vlans <VID-LIST>
Description
This command specifies the set of VLANs that are protected by this ring instance. The no form of this command removes a set of VLANs that are protected by this ring instance.

Parameter <RINGID> <ID> <VID-LIST>

Description
Required, specifies the ID of the ring. Range: 1-239
Required, specifies the ERPS ring instance identifier. Range: 1-2.
Required, range of VLANs to be protected by this ring instance. Range: 1-4094.

Examples
Specify a set of VLANs that are protected by this ring instance:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

751

switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 2 switch(config-erps-ring-3-inst-2) protected-vlans 1,10-50
Remove a set of VLANs that are protected by this ring instance:
switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 2 switch(config-erps-ring-3-inst-2) no protected-vlans 11,13

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> instance <ID> protection-switch {{manual|force} <PORT0>|<PORT1>}
erps ring <RINGID> instance <ID> protection-switch {{manual|force} <PORT0>|<PORT1>}
Description
Blocks a specific ring interface in one of the two following ways:
n Force: The switch blocks a specific ring interface regardless of the protection switching state of the ring instance.
n Manual: The switch blocks a specific ring interface if no other protection switch event is active on the ring instance.

ERPS Commands | 752

The user can verify whether the protection-switch is successful by verifying the status of instance and port state over which this command is executed.

switch# erps ring 1 instance 1 protection-switch force port0

switch# show erps status

Status for ERPS Ring 1 Instance 1:

====================================

Ring ID

:1

Instance ID

:1

Port0

: 1/1/5 (Block)

Port1

: 1/1/6 (Up)

Node Role (RPL)

: Owner (port0)

Control VLAN

: 50

Protected VLAN

: 1-49

Subring (TCN)

: No (No)

Revertive Operation

: Revertive

MEG Level

:7

Transmission Interval

: 5 sec

Guard Interval

: 0 sec 500 ms

Hold-Off Interval

: 0 sec 0 ms

WTR Interval

: 1 min

Status

: Forced-switch

Oper Down Reason

: None

Parameter <RINGID> <ID> manual
force

Description
Required, specifies the ID of the ring. Range: 1-239
Required, specifies the ERPS ring instance identifier. Range: 1-2.
A type of protection switch event in which the switch blocks a specific ring interface if no other protection switch event is active on the ring instance.
A type of protection switch event in which the switch blocks a specific ring interface regardless of the protection switching state of the ring instance.

Examples
Block ring 3, interface 2, port 0 if no other protection switch event is active on the ring instance:

switch# erps ring 3 instance 2 protection-switch manual port0

Block ring 3, instance 2, regardless of the protection switching state of the ring instance:

switch# erps ring 3 instance 2 protection-switch force port1

For more information on features that use this command, refer to the High Availability Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

753

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

erps ring <RINGID> instance <ID> revertive
erps ring <RINGID> instance <ID> revertive
Description
Configures the default revertive mode of operation for an ERPS ring. In revertive operation, after the conditions causing protection switching are cleared, traffic channels are restored to the recovered link blocking the RPL. This configuration is meaningful only on the RPL node. The no form of this command configures non-revertive mode of operation for an ERPS ring. In nonrevertive operation, the traffic channels continue to use the RPL, if it has not failed, after conditions causing protection switching are cleared. This configuration is meaningful only on the RPL node.

Parameter <RINGID> <ID>

Description Required, specifies the ID of the ring. Range: 1-239 Required, specifies the ERPS ring instance identifier. Range: 1-2.

Examples
Configuring the default revertive mode of operation for ERPS ring 3, instance 2:

switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 2 switch(config-erps-ring-3-inst-2)# revertive

Configuring non-revertive mode of operation for ERPS ring 3, instance 2:

switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 2 switch(config-erps-ring-3-inst-2)# no revertive

For more information on features that use this command, refer to the High Availability Guide for your switch model.
Command History

ERPS Commands | 754

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> instance <ID> role
erps ring <RINGID> instance <ID> role <RPL-OWNER|RPL-NEIGHBOR>
Description
In ERPS, there is a central node called RPL Owner Node which blocks one of the ports to ensure that there is no loop formed for the Ethernet traffic. The link blocked by the RPL owner node is called the Ring Protection Link or RPL. The node at the other end of the RPL is known as RPL Neighbor Node. It uses R-APS control messages to coordinate the activities of switching on/off the RPL link. This command specifies the role of the node as owner or neighbor. The no form of this command removes the configuration of the node role from the instance.

Parameter <RINGID> <ID> <RPL-OWNER>
<RPL-NEIGHBOR>

Description
Required, specifies the ID of the ring. Range: 1-239
Required, specifies the ERPS ring instance identifier. Range: 1-2.
Blocks traffic at one end of the RPL. The blocked end sends out periodic R-APS.
Blocks traffic at one end of the RPL. The blocked end does not generate periodic R-APS.

Examples
Specify the role of the node as owner:

switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 2 switch(config-erps-ring-3-inst-2) role rpl-owner

Specify the role of the node as neighbor:

switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 3 switch(config-erps-ring-3-inst-2) role rpl-neighbour

Remove the configuration of the node role from the instance:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

755

switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 2 switch(config-erps-ring-3-inst-2) no role

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> instance <ID> rpl
erps ring <RINGID> instance <ID> rpl <port0|port1>
Description
In ERPS, there is a central node called RPL Owner Node which blocks one of the ports to ensure that there is no loop formed for the Ethernet traffic. The link blocked by the RPL owner node is called the Ring Protection Link or RPL. The node at the other end of the RPL is known as RPL Neighbor Node. It uses R-APS control messages to coordinate the activities of switching the RPL link on and off. This command specifies which of the ERPS ring ports is the RPL. The no form of this command removes the RPL port configuration from the ERPS ring instance.

Parameter <RINGID> <ID> <PORT0>
<PORT1>

Description
Required, specifies the ID of the ring. Range: 1-239
Required, specifies the ERPS ring instance identifier. Range: 1-2.
Required, configure port0 to be RPL port in this ERPS ring instance.
Required, configure port1 to be RPL port in this ERPS ring instance.

Examples
Configure port0 to be RPL port in this ERPS ring instance:

ERPS Commands | 756

switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 2 switch(config-erps-ring-3-inst-2) role rpl-owner switch(config-erps-ring-3-inst-2) rpl port0
Configure port1 to be RPL port in this ERPS ring instance:
switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 3 switch(config-erps-ring-3-inst-2) role rpl-neighbour switch(config-erps-ring-3-inst-2) rpl port1
Remove the RPL port configuration from the ERPS ring Instance:
switch(config)# erps ring 3 switch(config-erps-ring-3)# instance 2 switch(config-erps-ring-3-inst-2) no rpl port0

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> meg-level
erps ring <RINGID> meg-level <-0-7>
Description
The R-APS messages transmitted by ERPS take the form of OAM PDUs as defined in G.8013. Each OAM PDU is transmitted at a specified level known as the Maintenance Entity Group (MEG) level. This command configures the level with which the ERPS packets must be transmitted. The no form of this command removes the configured MEG level and sets it to the default value of 7.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

757

Parameter <RINGID> <0-7>

Description Required, specifies the ID of the ring. Range: 1-239 Required, specifies the meg-level. Range: 0-7. Default: 7.

Examples
Specify the meg-level:

switch(config)# erps ring 3 switch(config-erps-ring-3)# meg-level 4

Remove the configured meg-level and set it to the default value of 7:

switch(config)# erps ring 3 switch(config-erps-ring-3)# no meg-level

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> parent-ring
erps ring <RINGID> parent-ring <RINGID>
Description
This command associates a sub-ring to a parent-ring and is required for the sub-ring to notify the parent-ring on change in topology. The no form of this command removes the parent ring identifier.

Parameter <RINGID> <RINGID>

Description Required, specifies the ID of the ring. Range: 1-239 Required, specifies the ID of the parent-ring. Range: 1-239

ERPS Commands | 758

Examples
Associate a sub-ring to a parent-ring:
switch(config)# erps ring 3 switch(config-erps-ring-3)# parent-ring 2
Remove a parent-ring identifier:
switch(config)# erps ring 3 switch(config-erps-ring-3)# no parent-ring 2

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> sub-ring
erps ring <RINGID> sub-ring
Description
This command is to configure a sub-ring. If not specified, the ring is a major-ring. The no form of this command removes the sub-ring configuration of the ring and configures it to be a major-ring.

Parameter <RINGID>

Description Required, specifies the ID of the ring. Range: 1-239

Examples
Configure a sub-ring:

switch(config)# erps ring 2 switch(config-erps-ring-2)# sub-ring

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

759

Remove the sub-ring configuration from ring 2 and configure it to be a major-ring:
switch(config)# erps ring 2 switch(config-erps-ring-2)# no sub-ring

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> tcn-propogation
erps ring <RINGID> tcn-propogation
Description
This command is to configure a sub-ring interconnection node to pass a topology change notification to the ring instance for the parent ring whenever the topology of the sub-ring changes. The parent ring instance performs a Forwarding Database (FDB) flush and sends a protocol message to ensure that other nodes on the parent ring also perform an FDB flush. The no form of this command disables topology change notifications.

Parameter <RINGID>

Description Required, specifies the ID of the ring. Range: 1-239

<RINGID> Required, specifies the ID of the ring. Range: 1-239
Examples
Configure topology change notifications:

switch(config)# erps ring 2 switch(config-erps-ring-2)# tcn-propogation

Disable topology change notifications:

ERPS Commands | 760

switch(config)# erps ring 2 switch(config-erps-ring-2)# no tcn-propogation

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> transmission-interval
erps ring <RINGID> transmission-interval <SECONDS>
Description
Specifies the R-APS periodic transmission interval in units of seconds. Default is 5 seconds. The no form of this command removes the configured value of the transmission interval and sets it to the default value of 5 seconds.

Parameter <RINGID> <SECONDS>

Description
Required, specifies the ID of the ring. Range: 1-239
Required, specifies the R-APS periodic transmission interval in units of seconds. Range: 5 seconds.

Examples
Specify the R-APS periodic transmission interval as 10 seconds:

switch(config)# erps ring 3 switch(config-erps-ring-3)# transmission-interval 10

Remove the configured value of the transmission interval and set it to the default value of 5 seconds:

switch(config)# erps ring 3 switch(config-erps-ring-3)# no transmission-interval

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

761

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

erps ring <RINGID> wtr-interval
erps ring <RINGID> wtr-interval <MINUTES>
Description
The RPL owner node uses a delay timer before initiating an RPL block in case of both revertive mode of operation or before reverting to idle state after clearing operator commands (FS, MS). The Wait to Restore (WTR) timer can be configured in 1-minute increments up to 12 minutes. The default value is 5 minutes. When recovering from an SF, the delay timer must be long enough to allow the recovering network to become stable. In the default revertive mode of operation, the WTR timer is used to prevent frequent operation of protection switching due to intermittent SF defects. The no form of this command removes the configured value of the wtr-interval and sets it to the default value of 5 minutes.

Parameter <RINGID> <MINUTES>

Description
Required, specifies the ID of the ring. Range: 1-239
Required, specifies the wtr-interval in minutes. Range: 1-12. Default: 5.

Examples
Specify the wtr-interval:

switch(config)# erps ring 3 switch(config-erps-ring-3)# wtr-interval 7

Remove the configured value of the wtr-interval and set it to the default value of 5 minutes:

ERPS Commands | 762

switch(config)# erps ring 3 switch(config-erps-ring-3)# no wtr-interval

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-erps-ring-<ringid>

Authority
Administrators or local user group members with execution rights for this command.

show erps statistics
show erps statistics [ring <RINGID>] [instance <ID> [<PORT0>|<PORT1>]]
Description
This command displays ERPS statistics. The statistics can be displayed for the ring, the instance, or the instance ports.

Parameter <RINGID> <ID> <PORT0> <PORT1>

Description Optional, specifies the ID of the ring. Range: 1-239. Optional, specifies the ID of the ring instance. Range: 1-2. Optional, specifies the ring member port 0. Optional, specifies the ring member port 1.

Examples

switch# show erps statistics ring 1

Statistics for ERPS ring 1 instance 1:

======================================

Port0

Port1

-----

-----

Local Failures 4

1

R-APS ----NR

Port0(Tx/Rx) -----------1/1

Port1(Tx/Rx) -----------1/1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

763

NR,RB SF MS FS

0/1 1/0 0/0 30/0

0/1 1/0 0/10 0/0

Statistics for ERPS ring 1 instance 2:

======================================

Port0

Port1

-----

-----

Local Failures 4

1

R-APS

Port0(Tx/Rx)

Port1(Tx/Rx)

-----

------------

------------

NR

1/1

1/1

NR,RB

0/1

0/1

SF

1/0

1/0

MS

0/0

0/10

FS

30/0

0/0

switch# show erps statistics

Statistics for ERPS Ring 1 Instance 1 :

==========================================

Port0

Port1

-----

-----

Local Failures 4

1

R-APS

Port0(Tx/Rx)

Port1(Tx/Rx)

-------

----------

-----------

NR

33/9

33/9

NR,RB

58/0

58/0

SF

4/0

4/0

MS

0/0

0/0

FS

0/0

0/0

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show erps status
show erps status [ring <RINGID>] [instance <ID>]
Description

ERPS Commands | 764

This command displays detailed information about a specific ring or all instances of a ring. The ring instance may be in one of the following states:
n Idle: The ring instance is operational. n Initializing: The ring instance is not operational. n Protection: Protection switching has been triggered by a local or remote link failure. n Pending: Pending clearance of a previous protection switch. n Down: Ring instance is not active. n Manual-switch: Manual protection switching triggered by Admin-down. n Force-switch: Forced protection switching triggered by admin.
A ring instance has the following reasons for "down" state:
n Disabled: Ring instance is administratively disabled. n Inconsistent Port Config: The same port is configured as port0 and port1 or RPL port is configured
by Admin-down. n Incomplete Port Config: Only one or no ring port is configured. n Protected VLANs Not Configured: Protected VLAN list is empty. n Control VLAN Not Configured: Control VLAN is not configured.
The ring ports can be in one of the following states:
n Up: Port forwards control and data traffic. n Blocked: Port blocks both control and data traffic.

Parameter <RINGID> <ID>

Description Optional, specifies the ID of the ring. Range: 1-239. Optional, specifies the ID of the ring instance. Range: 1-2.

Examples
Show ERPS status for ring 1 and instance 1:

Status for ERPS Ring 1 Instance 1

=================================

Ring ID

:1

Ring description

: ring_1

Instance ID

:1

Instance description

: inst_1

Port0

: 1/0/1 (Blocked)

Port1

: 1/0/2 (Up)

Node Role (RPL)

: Owner (Port0)

Control VLAN

: 100

Protected VLAN

: None

Subring (TCN)

: Yes (Yes)

Revertive Operation

: Revertive

MEG Level

:1

Transmission Interval

: 5 sec

Guard Interval

: 500 ms

Hold-Off Interval

: 1 sec

WTR Interval

: 5 min

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

765

Status Oper Down Reason

: Initializing : Protected Vlans Not Configured

Show ERPS status for ring 1:

switch# show erps status ring 1

Status for ERPS Ring 1 Instance 1

=================================

Ring ID

:1

Ring description

: ring_1

Instance ID

:1

Instance description

: inst_1

Port0

: 1/0/1 (Blocked)

Port1

: 1/0/2 (Up)

Node Role (RPL)

: Owner (Port0)

Control VLAN

: 100

Protected VLAN

: 1-10

Subring (TCN)

: Yes (Yes)

Revertive Operation

: Non-Revertive

MEG Level

:1

Transmission Interval

: 5 sec

Guard Interval

: 500 ms

Hold-Off Interval

: 1 sec

WTR Interval

: 5 min

Status

: Idle

Oper Down Reason

: None

Status for ERPS Ring 1 Instance 2

=================================

Ring ID

:1

Ring description

: ring_1

Instance ID

:2

Instance description

: inst_2

Port0

: 1/0/3 (Blocked)

Port1

: 1/0/4 (Up)

Node Role (RPL)

: Owner (Port0)

Control VLAN

: 110

Protected VLAN

: 20-30

Subring (TCN)

: No

Revertive Operation

: Revertive

MEG Level

:1

Transmission Interval

: 5 sec

Guard Interval

: 500 ms

Hold-Off Interval

: 1 sec

WTR Interval

: 5 min

Status

: Admin-Down

Oper Down Reason

: None

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

ERPS Commands | 766

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show erps summary
show erps summary
Description
This command displays a summary of the ERPS configuration and state for the ERPS ring instances.
Examples

switch# show erps summary

ERPS Summary ============

Flags: R - RPL, M - Major Ring, S - Sub Ring, T - TCN Enabled * - RPL port

Per-Instance Summary

====================

Ring Instance Port0

---- -------- -----

1

1

1/1/1

1

2

1/1/1

2

1

*1/1/3

2

2

1/1/3

3

1

1/1/4

3

2

1/1/4

Port1 ----*1/1/2 1/1/2
1/1/5 1/1/5

Status -----Pending Idle Protection Admin-down Manual-switch Force-switch

Flags ----R,M M R,S,T S,T M M

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

767

Chapter 39 EVPN commands

EVPN commands

active-gateway
active-gateway {ip | ipv6} [<IP-ADDRESS>] [mac <MAC-ADDRESS>] no active-gateway {ip | ipv6} [<IP-ADDRESS>] [mac]
Description
Configures an EVPN Anycast gateway that can be used on multiple VTEPs. The Active Gateway supports both IPv4 and IPv6 addresses. The Active Gateway MAC address used along with an IPv4 and IPv6 address must match on a given interface, for the EVPN Anycast Gateway solution to work as expected. Active Gateway and SVI sharing the same IP is supported for both IPv4 and IPv6 addresses. The Active Gateway IP for IPv6 should be a Link-Local IPv6 address if the default Gateway is learned via RA messages. The no form of this command removes the active gateway for active-active routing.

Parameter ip ipv6 <IP-ADDRESS>
<MAC-ADDRESS>

Description Specifies the configuration of an IPv4 address.
Specifies the configuration of an IPv6 address.
Specifies the IPv4 or IPv6 address. n Syntax for IPv4: A.B.C.D n Syntax for IPv6: A:B::C:D
Specifies the Virtual MAC address. Syntax: xx:xx:xx:xx:xx:xx

Usage
Before configuring active gateway, confirm that an IP address is on the SVI that is in the same subnet as the active gateway IP you are trying to configure. If an active gateway IP does not have an SVI IP with the same subnet, the CLI allows the configuration, but the active gateway IP will not be programmed in the kernel, resulting the active gateway to be unreachable.
Active forwarding cannot be configured when ICMP redirect is enabled. Enter the no ip icmp redirect command for disabling ICMP redirect.
It is highly recommended that you use an IPv6 link-local address as a gateway (VIP) on the active gateway IPv6 configuration.
If VRRP or active forwarding is configured on an SVI, active gateway cannot be configured. Active gateway with overlapping networks is not allowed. Maximum of 16 unique virtual MACs are supported in a system.
The maximum number of supported active gateways per switch is 4,000. Since a maximum of 31 secondary IPv4 addresses can be configured on an SVI, 32 IPv4 active gateways (along with the primary

AOS-CX 10.14 Command-Line Interface Guide

768

IPv4 address) can be configured per SVI with IP multinetting support. This support is also the same for IPv6 addresses.
Do not use peer system MAC address as an active-gateway VMAC. If same MAC address is used, the VSX synchronization will try to sync the configuration on secondary switch and cause traffic disruptions.
Examples
Configuring active-gateway when the IP address is different from the SVI IP address on both VSX peers (valid for IPv4 and IPv6): Switch 1:
switch1(config-if-vlan)# ip address 192.168.1.250/24 switch1(config-if-vlan)# active-gateway ip 192.168.1.253 mac 00:00:00:00:00:01 switch1(config-if-vlan)# active-gateway ipv6 fe80::01 mac 00:00:00:01:00:01
Switch 2:
switch2(config-if-vlan)# ip address 192.168.1.251/24 switch2(config-if-vlan)# active-gateway ip 192.168.1.253 mac 00:00:00:00:00:01 switch2(config-if-vlan)# active-gateway ipv6 fe80::01 mac 00:00:00:01:00:01
Configuring active-gateway when the IP address is the same as the SVI IP address on both VSX peers (valid for IPv4 and IPv6): Switch 1:
switch1(config-if-vlan)# ip address 192.168.1.250/24 switch1(config-if-vlan)# active-gateway ip 192.168.1.250 mac 00:00:00:00:00:01 switch1(config-if-vlan)# active-gateway ipv6 fe80::100 mac 00:00:00:00:00:01 switch1(config-if-vlan)# ipv6 address link-local fe80::100/64
Switch 2:
switch2(config-if-vlan)# ip address 192.168.1.250/24 switch2(config-if-vlan)# active-gateway ip 192.168.1.250 mac 00:00:00:00:00:01 switch2(config-if-vlan)# active-gateway ipv6 fe80::100 mac 00:00:00:00:00:01 switch2(config-if-vlan)# ipv6 address link-local fe80::100/64
Configuring only the active gateway address:
switch(config-if-vlan)# ip address 192.168.1.250/24 switch(config-if-vlan)# active-gateway ip 192.168.1.250
Configuring only the active gateway IP MAC address:
switch2(config-if-vlan)# ip address 192.168.1.250/24 switch2(config-if-vlan)# active-gateway ip mac 00:00:00:01:00:01
Removing the active gateway for active-active routing (IPv6 and IPv4):
EVPN commands | 769

switch(config-if-vlan)# no active-gateway ip switch(config-if-vlan)# no active-gateway ipv6
Removing the active gateway for active-active routing for an IP address:
switch(config-if-vlan)# no active-gateway ip 192.168.1.250
Removing the active gateway for active-active routing for virtual MAC addresses:
switch(config-if-vlan)# no active-gateway ip mac
When configuring the virtual active gateway for IPv6 on an SVI, it is recommended to use the same global IPv6 and active gateway IPv6 address. Similarly, if you want to use the IPv6 link-local address for the virtual active gateway then the same address should be configured for both the SVI and the active gateway. Global IPv6 address:
switch(config-if-vlan)# ipv6 address 1001::1/64 switch(config-if-vlan)# active-gateway ipv6 1001::1 switch(config-if-vlan)# active-gateway ipv6 mac 00:00:00:00:aa:01
IPv6-Link-Local address:
switch(config-if-vlan)# ipv6 address link-local fe80::1/64 switch(config-if-vlan)# active-gateway ipv6 fe80::1 switch(config-if-vlan)# active-gateway ipv6 mac 00:00:00:00:aa:01

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.09.0010

10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification Added IPv6 support for configuration of active gateway and SVI with the same IP address. --
Authority Administrators or local user group members with execution rights for this command.

arp-suppression
arp-suppression

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

770

no arp-suppression
Description
Enables ARP suppression for EVPN VXLAN globally across all Layer 2 VNIs configured on the VTEP. If the target address is present in the neighbor cache, the switch responds to the broadcast or unicast ARP request. ARP suppression is disabled by default. If the target IP/MAC is not present, the switch forwards arp request over the VXLAN data plane for neighbor resolution. The no form of this command disables the ARP suppression.
Examples
Configuring ARP suppression in EVPN:
switch(config-evpn)# arp-suppression switch(config-evpn)# no arp-suppression

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-evpn config-evpn-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

disable (evpn vlan-aware-bundles)
disable
Description
Disables the VLAN aware bundle instance.
Examples
Disabling the VLAN aware bundle instance bundle_1.
switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# disable

For more information on features that use this command, refer to the VXLAN Guide for your switch model.
Command History

EVPN commands | 771

Release 10.12

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-evpn-vlan-aware-bundle

Authority
Administrators or local user group members with execution rights for this command.

enable(evpn vlan-aware-bundles)
enable
Description
Enables the VLAN aware bundle instance.
Examples
Enabling the VLAN aware bundle instance bundle_1.
switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# enable

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.12

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-evpn-vlan-aware-bundle

Authority
Administrators or local user group members with execution rights for this command.

evpn
evpn no evpn
Description
Specifies the EVPN context which provides the configurations for VLAN-based EVPN service mode. The no form of this command removes this configuration.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

772

Examples
Configuring the EVPN context:
switch(config)# evpn switch(config-evpn)#
Removing the EVPN configuration context:
switch(config-evpn)# no evpn

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-evpn

Modification --
Authority Administrators or local user group members with execution rights for this command.

mac-move-detection count timer
mac-move-detection count <MAC-MOVE-COUNT> timer <MAC-MOVE-TIMER> no mac-move-detection count <MAC-MOVE-COUNT> timer <MAC-MOVE-TIMER>
Description
Configures EVPN MAC dampening for duplicate MAC and MAC-move count and timer across VTEPs. The no form of this command resets the value of the count and timer to the default values of 5 and 180 seconds respectively.
EVPN MAC dampening is always enabled. Links to the VTEPs must be always up for EVPN MAC dampening to be activated.

Parameter count <MAC-MOVE-COUNT> timer <MAC-MOVE-TIMER>
Examples

Description
Specifies the number of MAC-moves for MAC dampening to take effect. Range: 2 to 10. Default: 5.
Specifies the MAC-move time limit in seconds for MAC dampening to take effect. Range: 1 to 1000 seconds. Default: 180 seconds.

EVPN commands | 773

Configuring EVPN MAC dampening: switch(config-evpn)# mac-move-detection count 6 timer 199
The above command dampens a MAC if the MAC moves six times within 199 seconds. switch(config-evpn)# mac-move-detection count 8
The above command dampens a MAC if the MAC moves eight times within 180 seconds. switch(config-evpn)# mac-move-detection timer 255
The above command dampens a MAC if the MAC moves five times within 255 seconds. For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-evpn

Modification --
Authority Administrators or local user group members with execution rights for this command.

nd-suppression
nd-suppression no nd-suppression
Description
Enables ND suppression for EVPN VXLAN globally. If the target address is present in the NDMD cache, the switch responds to the IPv6 multicast or unicast neighbor solicitation. ND suppression is disabled by default. The no form of this command disables the ND suppression.
Examples
Configuring ND suppression in EVPN:
switch(config-evpn)# nd-suppression switch(config-evpn)# no nd-suppression

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

774

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-evpn

Modification --
Authority Administrators or local user group members with execution rights for this command.

rd
rd {auto | <AS-NUMBER:ID> | <IP-ADDRESS:ID>} no rd {auto | <AS-NUMBER:ID> | <IP-ADDRESS:ID>}
Description
Specifies a unique number prepended to the advertised routes within the VLAN. It ensures support for overlapping IP addresses and MACs across different tenants. The default value is NULL. Route Distinguisher (RD) has to be manually configured by a user. The no form of this command removes the currently configured value.

Parameter auto <AS-NUMBER:ID>
<IP-ADDRESS:ID>

Description
Specifies automatic route filtering.
Specifies the AS number. It can be a 1-byte or 4-byte value. If the AS number is a 2-byte value, the administrative number is a 4byte value and if the AS number is 4-byte value, the administrative number is a 2-byte value.
Specifies the IP address. It is a 4-byte value and the ID is 2 bytes.

Examples
Configuring Route Distinguisher for EVPN VLAN:

switch(config-evpn)# vlan 10 switch(config-evpn-vlan-10)# rd 6800:1 switch(config-evpn)# vlan 20 switch(config-evpn-vlan-20)# rd auto

For more information on features that use this command, refer to the VXLAN Guide for your switch model.
Command History

EVPN commands | 775

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-evpn-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

rd (evpn vlan-aware-bundles)
rd {<AS-NUMBER:NN> | <IP-ADDRESS:NN>} no rd {<AS-NUMBER:NN> | <IP-ADDRESS:NN>}
Description
Specifies a unique number prepended to the EVPN routes, advertised in the context of any VLAN configured under an EVPN VLAN aware bundle instance. The no form of this command removes this configuration.

Parameter <AS-NUMBER:NN>
<IP-ADDRESS:NN>

Description
Specifies the AS number. The AS number can be a 2-byte or 4-byte value. If the AS number is a 2-byte value, the administrative number is a 4-byte value and if the AS number is 4-byte value, the administrative number is a 2-byte value.
Specifies the IP address. The IP address is a 4-byte value and the ID is a 2--byte value.

Usage
This command ensures the support for overlapping IPs and MACs across different tenants. rd should be manually configured. rd should be unique acorss all VLAN-based (VLANs) and VLAN-aware (bundles) service instances.
Examples
Configuring rd 6800:1.

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# rd 6800:1

Removing rd 6800:1.

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# no rd 6800:1

Configuring rd 1.2.3.4:55.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

776

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# rd 1.2.3.4:55
Removing rd 1.2.3.4:55.
switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# no rd 1.2.3.4:55

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.12

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-evpn-vlan-aware-bundle

Authority
Administrators or local user group members with execution rights for this command.

redistribute host-route
redistribute host-route no redistribute host-route
Description
Enables type-2 route advertisement to include the L3VNI, RT, and router MAC of the associated IP-VRF. It is applicable only in Symmetric routing where L3VNI is configured. The no form of this command disables the redistribution of host routes.

Parameter host-route

Description Specifies redistribution of host routes.

Examples
Configuring Redistribute host-route in EVPN:

switch(config-evpn)# vlan 10 switch(config-evpn-vlan-10)# redistribute host-route

For more information on features that use this command, refer to the VXLAN Guide for your switch model.
Command History

EVPN commands | 777

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-evpn-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

redistribute host-route (evpn vlan-aware-bundles)
redistribute host-route no redistribute host-route
Description
Enables EVPN Route Type-2 advertisement to include L3VNI, Route Target, and Router MAC of the associated IP-VRF in the EVPN VLAN Aware Bundles. The no form of this command removes this configuration.
Usage
This is only applicable in cases of symmetric routing where L3VNI is configured.
Examples
Enabling route advertisement in VLAN aware bundle bundle_1.
switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# redistribute host-route
Removing the route advertisement in VLAN aware bundle bundle_1.
switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# no redistribute host-route

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.12
Command Information

Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

778

Platforms
6300 6400

Command context config-evpn-vlan-aware-bundle

Authority
Administrators or local user group members with execution rights for this command.

redistribute local-mac
redistribute local-mac no redistribute local-mac
Description
Enables Type-2 route advertisement for local MAC address of the SVI interfaces corresponding to the EVPN-enabled VLANs. The no form of this command disables the Type-2 route advertisement.
Examples
switch(config)# evpn switch(config)# redistribute local-mac switch(config)# vlan 20

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-evpn

Modification --
Authority Administrators or local user group members with execution rights for this command.

redistribute local-svi
redistribute local-svi no redistribute local-svi
Description
Enables type-2 route advertisement for the local IP address and MAC address of the SVI interfaces corresponding to the EVPN-enabled VLANs. The no form of this command disables type-2 route advertisement for the local IP address and MAC address of the SVI interfaces corresponding to the EVPN-enabled VLANs.
Examples

EVPN commands | 779

Enabling type-2 route advertisement:
switch(config)# evpn switch(config-evpn)# redistribute local-svi
Disabling type-2 route advertisement:
switch(config)# evpn switch(config-evpn)# no redistribute local-svi

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-evpn

Modification --
Authority Administrators or local user group members with execution rights for this command.

route-target
route-target {import | export | both} {auto | <AS-NUMBER:ID> | <IP-ADDRESS:ID>} no route-target {import | export | both} {auto | <AS-NUMBER:ID> | <IP-ADDRESS:ID>}
Description
Controls the import and export of VPN routes only to the systems in the network for which routes are needed. The default value is NULL. Route Targets (RT) have to be manually configured by a user. The no form of this command removes the currently configured value.

Parameter import export both auto <AS-NUMBER:ID>

Description
Configures the route-target to import EVPN routes.
Configures the route-target to export EVPN routes.
Configures the route-target to import and export EVPN routes.
Specifies automatic route filtering.
Specifies the AS number. It can be a 1-byte or 4-byte value. If the AS number is a 2-byte value, the administrative number is a 4-byte value and if the AS number is 4-byte value, the administrative number is a 2-byte value.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

780

Parameter <IP-ADDRESS:ID>

Description Specifies the IP address. It is a 4-byte value and the ID is 2 bytes.

Examples
Configuring Route Targets for EVPN VLAN:

switch(config-evpn)# vlan 10 switch(config-evpn-vlan-10)# route-target import 6800:1 switch(config-evpn-vlan-10)# route-target export 6800:1 switch(config-evpn)# vlan 20 switch(config-evpn-vlan-20)# route-target both 6900:1

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-evpn-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

route-target {evpn}
route-target {import | export | both} {auto | <AS-NUMBER:ID> | <IP-ADDRESS:ID>} evpn no route-target {import | export | both} {auto | <AS-NUMBER:ID> | <IP-ADDRESS:ID>} evpn
Description
Configures the route target (RT) for EVPN VRF to control the import and export of VPN routes only to the systems in the network for which routes are needed. The default value is NULL. Route targets have to be manually configured by a user. The no form of this command removes the RT in EVPN VRF.

Parameter import export both auto

Description Imports the VRF routes that match the RT. Exports the RT in the VRF routes. Configures both import and export of routes for the VRF. Specifies automatic route filtering.

EVPN commands | 781

Parameter <AS-NUMBER:ID>
<IP-ADDRESS:ID>

Description
Specifies the AS number. It can be a 1-byte or 4-byte value. If the AS number is a 2-byte value, the administrative number is a 4byte value and if the AS number is 4-byte value, the administrative number is a 2-byte value.
Specifies the IP address. It is a 4-byte value and the ID is 2 bytes.

Examples
Configuring Route Targets for EVPN VRF:

switch(config-vrf)# route-target import 6800:1 evpn switch(config-vrf)# route-target export 6800:1 evpn switch(config-vrf)# route-target both 6800:1 evpn

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-vrf

Modification --
Authority Administrators or local user group members with execution rights for this command.

route-target (evpn vlan-aware-bundles)
route-target {import | export | both} {<AS-NUMBER:ID> | <IP-ADDRESS:ID>} no route-target {import | export | both} {<AS-NUMBER:ID> | <IP-ADDRESS:ID>}
Description
Enables the import and export of EVPN routes only to the systems in the network for which routes are needed. The no form of this command removes this configuration.

Parameter import export both

Description Configures the route-target to import EVPN routes. Configures the route-target to export EVPN routes. Configures the route-target to import and export EVPN routes.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

782

Parameter <AS-NUMBER:ID>
<IP-ADDRESS:ID>

Description
Specifies the AS number. It can be a 2-byte or 4-byte value. If the AS number is a 2-byte value, the administrative number is a 4-byte value and if the AS number is 4-byte value, the administrative number is a 2-byte value.
Specifies the IP address. It is a 4-byte value and the ID is 2 bytes.

Usage
Route targets should be unique across all VLAN-based (VLANs) and VLAN-aware (bundles) service instances. rt should be manually configured.
Examples
Configuring the import of route target 6800:1.

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# route-target import 6800:1

Removing the import of route target 6800:1.

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# no route-target import 6800:1

Configuring the export of route target 6800:1.

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# route-target export 6800:1

Removing the export of route target 6800:1.

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# no route-target export 6800:1

Configuring the import and export of route target 6800:1.

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# route-target both 6800:1

Removing the import and export of route target 6800:1.

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# no route-target both 6800:1

For more information on features that use this command, refer to the VXLAN Guide for your switch model.
Command History

EVPN commands | 783

Release 10.12

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-evpn-vlan-aware-bundle

Authority
Administrators or local user group members with execution rights for this command.

show evpn evi
show evpn evi
Description
Shows the information of EVPN instances.
Examples
Showing information for EVPN instances:

switch# show evpn evi
L2VNI : 100 Route Distinguisher VLAN Status RT Import RT Export Local MACs Remote MACs Peer VTEPs
L2VNI : 200 Route Distinguisher VLAN Status RT Import
RT Export Local MACs Remote MACs Peer VTEPs
L2VNI : 300 Route Distinguisher VLAN Status RT Import RT Export Local MACs Remote MACs Peer VTEPs
L3VNI : 1000 Route Distinguisher

: 10.10.10.1:10 : 10 : Up : 1.1.1.1:1, 2.2.2.2:1, 3.3.3.3:1, 5:1 : 4.4.4.4:61, 1000:21 : 30 : 945 :8
: : 20 : Down, No RD : 1.1.1.1:2, 2.2.2.2:2, 3.3.3.3:2, 4.4.4.4:2,
5.5.5.5:2, 5:2 : 4.4.4.4:62, 1000:22 : : :
: 10.10.10.1:30 : 30 : Up : 1.1.1.1:3, 2.2.2.2:3, 3.3.3.3:3, 5:3 : 4.4.4.4:63, 1000:23 : 30 : 945 : 12
: 10.10.10.1:1000

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

784

VRF Status RT Import RT Export Local Type-5 Routes Remote Type-5 Routes Peer VTEPs

: vrf1000 : Up : 1.1.1.1:4, 2.2.2.2:4, 3.3.3.3:4, 5:4 : 4.4.4.4:64, 1000:24 :2 :3 :6

switch# show evpn evi 1001001

L2VNI : 1001001

Route Distinguisher

: 192.168.1.1:1001

VLAN

: 1001

Status

: up

RT Import

: 65001:269436457

RT Export

: 65001:269436457

Local MACs

:1

Remote MACs

:0

Peer VTEPs

:4

switch# show evpn mac-ip evi 1001001

Flags: Local(L), Remote(R), Sticky bit(S)

MAC

IP

Next-hop

Seq-Num Flags

-----------------------------------------------------------------------

00:50:56:8d:44:13

0

L

00:50:56:8d:44:13 100.1.250.50

0

L

00:50:56:8d:44:13 1000:1:1:1::250:50

0

L

00:aa:bb:cc:11:01 100.1.1.1

1

L,S

00:aa:bb:cc:11:01 1000:1:1:1::1

1

L,S

00:aa:bb:cc:11:01 fe80:0:1::1

1

L,S

switch# show evpn mac-ip evi 1001001

Flags: Local(L), Remote(R), Sticky bit(S)

MAC

IP

Next-hop

Seq-Num Flags

-----------------------------------------------------------------------

00:50:56:8d:44:13

0

L

00:50:56:8d:44:13 100.1.250.50

0

L

00:50:56:8d:44:13 1000:1:1:1::250:50

0

L

00:aa:bb:cc:11:01 100.1.1.1

1

L,S

00:aa:bb:cc:11:01 1000:1:1:1::1

1

L,S

00:aa:bb:cc:11:01 fe80:0:1::1

1

L,S

MACs

:2

Remote MACs : 0

switch# show evpn mac-ip evi 1001002

Flags: Local(L), Remote(R), Sticky bit(S)

MAC

IP

Next-hop

Seq-Num

Flags

----------------------------------------------------------------------------------

------------

00:50:56:8d:45:63

vxlan1(1920:1680:1:1::2)

0

R

00:50:56:8d:45:63 100.2.250.60

vxlan1(1920:1680:1:1::2)

0

R

00:50:56:8d:45:63 1000:2:1:1::250:60 vxlan1(1920:1680:1:1::2)

0

R

00:aa:bb:cc:11:01 100.2.1.1

0

L,S

00:aa:bb:cc:11:01 1000:2:1:1::1

0

L,S

EVPN commands | 785

00:aa:bb:cc:11:01 fe80:0:2::1

0

L,S

MACs

:2

Remote MACs : 1

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show evpn evi summary
show evpn evi summary
Description
Shows the summary information for EVPN instances.
Examples
Showing summary information for EVPN instances:

switch# show evpn evi summary

L2VNI VLAN

Status

-------------------------------------

100

10

Up

200

20

Down, RT conflict

210

21

Up

220

22

Down, No RT

230

23

Down, No RT

240

24

Up

250

25

Up

260

26

Up

270

27

Up

280

28

Up

290

29

Up

310

31

Up

L3VNI VRF

Status

-------------------------------------

1000

vrf1000

Up

1001

vrf1001

Down, RT conflict

1002

vrf1002

Down, No RD

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

786

1004 1005

vrf1003 vrf1003

EVPN instances

: 17

EVPN instances Up : 11

Down, Administratively down Up

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

show evpn evi <EVI-ID>
show evpn evi <EVI-ID>
Description
Shows the information for the particular EVPN instance.

Parameter <EVI-ID>

Description Specifies the EVPN instance ID.

Examples
Showing information for the particular EVPN instance:

switch# show evpn evi 100 L2VNI : 100
Route Distinguisher VLAN Status RT Import RT Export Local MACs Remote MACs Peer VTEPs

: 10.10.10.1:10 : 10 : Up : 1.1.1.1:1, 2.2.2.2:1, 3.3.3.3:1, 5:1 : 4.4.4.4:61, 1000:21 : 30 : 945 :8

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

EVPN commands | 787

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show evpn evi detail
show evpn evi detail
Description
Shows the detailed information for all EVPN instances.
Examples
Showing detailed information for EVPN instances:

switch# show evpn evi detail

L2VNI : 100 Route Distinguisher VLAN Status RT Import RT Export Local MACs Remote MACs Peer VTEPs

: 10.10.10.1:10 : 10 : Up : 1.1.1.1:1, 2.2.2.2:1, 3.3.3.3:1, 5:1 : 4.4.4.4:61, 1000:21 : 30 : 307 :8

Peer VTEPs

Remote MACs

------------------------------------------------------

10.10.10.2

40

10.10.10.3

22

10.10.10.4

15

10.10.10.5

155

10.10.10.6

25

10.10.10.7

35

10.10.10.8

50

10.10.10.9

55

L2VNI : 200 Route Distinguisher VLAN Status RT Import
RT Export Local MACs Remote MACs Peer VTEPs

: : 20 : Down, No RD : 1.1.1.1:2, 2.2.2.2:2, 3.3.3.3:2, 4.4.4.4:2,
5.5.5.5:2, 5:2 : 4.4.4.4:62, 1000:22 : : :

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

788

Peer VTEPs

Remote MACs

-------------------------------------------------------

L2VNI : 300 Route Distinguisher VLAN Status RT Import RT Export Local MACs Remote MACs Peer VTEPs

: 10.10.10.1:30 : 30 : Up : 1.1.1.1:3, 2.2.2.2:3, 3.3.3.3:3, 5:3 : 4.4.4.4:63, 1000:23 : 30 : 362 : 12

Peer VTEPs

Remote MACs

------------------------------------------------------

10.10.10.2

60

10.10.10.3

12

10.10.10.4

13

10.10.10.5

15

10.10.10.6

15

10.10.10.7

35

10.10.10.8

53

10.10.10.9

45

10.10.10.10

11

10.10.10.11

12

10.10.10.12

35

10.10.10.13

56

L3VNI : 1000 Route Distinguisher VRF Status RT Import RT Export Local Type-5 Routes Remote Type-5 Routes Peer VTEPs

: 10.10.10.1:1000 : vrf1000 : Up : 1.1.1.1:4, 2.2.2.2:4, 3.3.3.3:4, 5:4 : 4.4.4.4:64, 1000:24 :2 : 30 : 12

Peer VTEPs

Remote Type-5 Routes

------------------------------------------------------

10.10.10.2

2

10.10.10.3

1

10.10.10.4

1

10.10.10.5

1

10.10.10.6

1

10.10.10.7

3

10.10.10.8

5

10.10.10.9

4

10.10.10.10

1

10.10.10.11

3

10.10.10.12

3

10.10.10.13

5

For more information on features that use this command, refer to the VXLAN Guide for your switch model.
Command History

EVPN commands | 789

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show evpn evi <EVI-ID> detail
show evpn evi <EVI-ID> detail
Description
Shows the detailed information for the particular EVPN instance.

Parameter <EVI-ID>

Description Specifies the EVPN instance ID.

Examples
Showing detailed information for the particular EVPN instance:

switch# show evpn evi 100 detail

L2VNI : 100

Route Distinguisher

: 10.10.10.1:10

VLAN

: 10

Status

: Up

RT Import

: 1.1.1.1:1, 2.2.2.2:1, 3.3.3.3:1, 5:1

RT Export

: 4.4.4.4:61, 1000:21

Local MACs

: 30

Remote MACs

: 397

Peer VTEPs

:8

Peer VTEPs

Remote MACs

------------------------------------------------------

10.10.10.2

40

10.10.10.3

22

10.10.10.4

15

10.10.10.5

155

10.10.10.6

25

10.10.10.7

35

10.10.10.8

50

10.10.10.9

55

For more information on features that use this command, refer to the VXLAN Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

790

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

show evpn mac-ip
show evpn mac-ip
Description
Show the information about the EVPN MAC-IP for the EVPN instances.
Examples
Showing information about the EVPN MAC-IP for the EVPN instances:

switch# show evpn mac-ip Flags: Local(L), Remote(R)

EVI MAC

IP

Next-hop

Seq-Num Flags

--------------------------------------------------------------------------

100 14:50:56:96:76:56

vxlan1(11.1.1.3) 0

R

100 14:50:56:96:76:56 3.3.4.5 vxlan1(11.1.1.3) 0

R

100 14:50:56:96:76:56 3.3.5.5 vxlan1(11.1.1.3) 0

R

100 24:50:56:96:76:56 3.3.3.2 vxlan1(11.1.1.3) 1

R

100 34:50:56:96:76:56 3.3.6.2

2

L

100 44:50:56:96:76:56 3.3.7.3

2

L

200 52:50:56:96:76:56 5.5.5.2

0

L

MACs

:5

Remote MACs : 2

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

EVPN commands | 791

show evpn mac-ip evi
show evpn mac-ip evi <EVI-ID>
Description
Show the information about the EVPN MAC-IP for the particular EVPN instance.

Parameter <EVI-ID>

Description Specifies the EVPN instance ID.

Examples
Showing information about the EVPN MAC-IP for the particular EVPN instance:

switch# show evpn mac-ip evi 100 Flags: Local(L), Remote(R)

MAC

IP

Next-hop

Seq-Num Flags

------------------------------------------------------------------

14:50:56:96:76:56

vxlan1(11.1.1.2) 0

R

14:50:56:96:76:56 3.3.4.5 vxlan1(11.1.1.3) 0

R

14:50:56:96:76:56 3.3.5.4 vxlan1(11.1.1.2) 0

R

24:50:56:96:76:56 3.3.3.2 vxlan1(11.1.1.3) 1

R

34:50:56:96:76:56 3.3.6.2

2

L

44:50:56:96:76:56 3.3.7.3

2

L

MACs

:4

Remote MACs : 2

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show evpn vtep-neighbor
show evpn vtep-neighbor {all-vrfs | vrf <VRF-Name>}
Description
Shows the remote VTEPs MAC-IP binding. The state of the peer VTEP denotes whether VXLAN tunnel to the VTEP is Up or Down.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

792

Parameter all-vrfs vrf <vrf-name>

Description
Display information for all VRFs.
Specify a VRF by VRF name (if no <VRF-NAME> is specified, the default VRF is implied.

Examples
Showing EVPN VTEP neighbor information for all VRFs:

switch# show evpn vtep-neighbor all-vrfs

VTEP-IP

L3VNI MAC

VRF

State

------------------------------------------------------------------

2.2.2.2

1234 00:20:56:bd:27:bc VRF1234 Up

2.2.2.2

6789 00:20:56:bd:27:bc VRF6789 Up

3.3.3.3

1234 00:30:56:ef:aa:cc VRF1234 Down

4.4.4.4

6789 00:40:56:12:34:44 VRF6789 Up

5.5.5.5

6789 00:50:56:ab:11:ee VRF6789 Up

Showing EVPN VTEP neighbor information for the specified VRF name:

switch# show evpn vtep-neighbor vrf VRF1234

VTEP-IP

L3VNI MAC

VRF

State

-----------------------------------------------------------------

2.2.2.2

1234 00:20:56:bd:27:bc VRF1234 Up

3.3.3.3

1234 00:30:56:ef:aa:cc VRF1234 Down

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show running-config evpn
show running-config evpn
Description
Shows all EVPN configurations.
Examples

EVPN commands | 793

Showing all EVPN configurations:
switch# show running-config evpn evpn
vlan 10 rd 6800:1 route-target import 6800:1 route-target export 6800:1
vlan 20 rd 6900:1 route-target import 6900:1 route-target export 6900:1

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

virtual-mac
virtual-mac <MAC-ADDR> no virtual-mac <MAC-ADDR>
Description
Configures the virtual MAC address for EVPN. The no form of this command removes the virtual MAC address configuration.

Parameter <MAC-ADDR>

Description Specifies the virtual MAC address.

Examples
Configuring virtual MAC address for EVPN:

switch(config)# virtual-mac ab:12:33:33:03:22

Removing the configuration of the virtual MAC address for EVPN:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

794

switch(config)# no virtual-mac ab:12:33:33:03:22

For EVPN symmetric IRB to work, virtual-mac must be configured and it must be unique for all the VTEPs involved in EVPN except for VSX nodes. In case of VSX VTEP (logical VTEP), the same virtual-mac must be configured in both the VSX peers. For ease of troubleshooting, it is also recommended to configure the same value of VSX system MAC in VSX VTEP (logical VTEP) peers.

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

vlan
vlan <ID> no vlan <ID>
Description
Specifies the VLAN ID and enters the VLAN context under EVPN. The no form of this command removes this configuration.

Parameter <ID>

Description Specifies the VLAN ID. Range: 2 - 4040.

Examples

switch(config-evpn)# vlan 10 switch(config-evpn-vlan-10)#

For more information on features that use this command, refer to the VXLAN Guide for your switch model.
Command History

EVPN commands | 795

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-evpn-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

vlan-aware-bundle
vlan-aware-bundle<BUNDLE-NAME> no vlan-aware-bundle<BUNDLE-NAME>
Description
Creates the VLAN aware bundle instance and enters the VLAN Aware Bundle context. The no form of this command removes this configuration.

Parameter <BUNDLE-NAME>

Description Represents the VLAN Aware Bundle.

Usage
VLAN aware bundle and VLAN based service can coexist, but the same VLAN/VNI cannot be part of the VLAN aware bundle and VLAN based service. The VLAN/VNI part of the VLAN aware bundle should be part of the VLAN aware bundle on all vteps.
Examples
Creating the VLAN aware bundle instance bundle_1 and entering the VLAN Aware Bundle context.

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)#

Removing the VLAN aware bundle instance bundle_1 and exiting the VLAN Aware Bundle context.

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# no vlan-aware-bundle bundle_1

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.12

Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

796

Command Information

Platforms
6300 6400

Command context config-evpn-vlan-aware-bundle

Authority
Administrators or local user group members with execution rights for this command.

vlan-ethernet-tag (evpn vlan-aware-bundles)
vlan-ethernet-tag <VLAN-ID> {ethernet tag} no vlan-ethernet-tag <VLAN-ID> {ethernet tag}
Description
Associates the Ethernet Tag ID value to VLANs of the VLAN aware bundles. The no form of this command removes this configuration.

Parameter <VLAN-ID>
{ethernet tag}

Description
Specifies the VLAN to which the ethernet tag is configuring. Range: 1-4094.
Specifies the non-default ethernet tag for the VLAN. Range: 116777215.

Usage
The Ethernet Tag ID value should be unique and associated to only one VLAN of the VLAN aware bundle. The configuration of this command is not mandatory, but may be required for interoperability with some third-party vendors.
Examples
Associating the Ethernet tag ID value for vlan aware bundle bundle_1.

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# vlan-ethernet-tag 10 20

Removing the Ethernet tag ID value for vlan aware bundle bundle_1.

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# no vlan-ethernet-tag 10 20

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.12

Modification Command introduced.

EVPN commands | 797

Command Information

Platforms
6300 6400

Command context config-evpn-vlan-aware-bundle

Authority
Administrators or local user group members with execution rights for this command.

vlan <ID-RANGE>
vlan <ID-RANGE> no vlan <ID-RANGE>
Description
Specifies the list of VLANs that are part of the VLAN Aware Bundle. The no form of this command removes this configuration.

Parameter <ID-RANGE>

Description Specifies the VLANS that are part of the bundle. Range: 1-4094.

Usage
If a VLAN is already part of VLAN based service, it cannot be configured under vlan-aware-bundle service and vice versa. A VLAN cannot be part of more than one EVPN VLAN aware bundles.
Examples
Creating the VLAN aware bundle instance bundle_1 and entering the VLAN Aware Bundle context for vlan 5-10 and 15.

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# vlan 5-10, 15

Removing the VLAN aware bundle instance bundle_1and exiting the VLAN Aware Bundle context for vlan 5-10 and 15.

switch(config-evpn)# vlan-aware-bundle bundle_1 switch(config-evpn-vlan-aware-bundle-bundle_1)# no vlan 5-10, 15

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.12
Command Information

Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

798

Platforms
6300 6400

Command context config-evpn-vlan-aware-bundle

Authority
Administrators or local user group members with execution rights for this command.

EVPN commands | 799

Chapter 40 External storage commands

External storage commands

address
address {<IPV4-ADDR> | <IPV6-ADDR> | hostname <HOSTNAME>} no address {<IPV4-ADDR> | <IPV6-ADDR> | hostname <HOSTNAME>}
Description
Specifies the NAS IP address or hostname. The no form of this command deletes an IP address or hostname.

Parameter <IPV4-ADDR> <IPV6-ADDR> <HOSTNAME>

Description Specifies the NAS server IPv4 address, Global. Specifies the IPv6 address of the NAS server. Specifies the hostname of the NAS server. String.

Examples
Creating the logfiles storage volume with IP address 10.1.1.1:

switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# address 10.1.1.1

Deleting an external storage volume named logfiles:

switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# no address 10.1.1.1

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide

800

Platforms
6300 6400

Command context config-external-storage-<VOLUME-NAME>

Authority
Administrators or local user group members with execution rights for this command.

directory
directory <DIRECTORY-NAME> no directory <DIRECTORY-NAME>
Description
Selects an existing directory on the external storage volume. The no form of this command clears a directory of an external storage volume.

Parameter <DIRECTORY-NAME>

Description Specifies the external storage directory for mapping the volume.

Examples
Creating a volume named logfiles that is mapped under /home on the server:

switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# directory /home

Clearing the directory /home:

switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# no directory /home

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-external-storage-<VOLUME-NAME>

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

External storage commands | 801

disable
disable no disable
Description
Disables the external storage volume. The no form of this command enables the external storage volume. This is identical to the enable command.
Examples
Disabling a volume named logfiles:
switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# disable

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-external-storage-<VOLUME-NAME>

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

enable
enable no enable
Description
Enables the external storage volume. The no form of this command disables the external storage volume. This is identical to the disable command.
Examples
Creating and then enabling a volume named logfiles:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

802

switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# enable
Disables the external storage volume:
switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# disable

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-external-storage-<VOLUME-NAME>

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

external-storage
external-storage <VOLUME-NAME> no external-storage <VOLUME-NAME>
Description
Creates or updates an external storage volume. The no form of this command deletes an external storage volume.
Examples
Creating the logfiles storage volume:
switch(config)# external-storage logfiles switch(config-external-storage-logfiles)#
Deleting the logfiles storage volume:
switch(config)# no external-storage logfiles

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

External storage commands | 803

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

password (external-storage)
password [{plaintext | ciphertext} <PASSWORD>] no password {plaintext | ciphertext} <PASSWORD>
Description
Sets the password for network attached storage server login. The no form of this command clears the password for network attached storage server login.

Parameter {ciphertext | plaintext} <PASSWORD>

Description
Selects the password format.
Specifies the password.
NOTE: When the password is not provided on the command line, plaintext password prompting occurs upon pressing Enter. The entered password characters are masked with asterisks.

Examples
Creating a volume named logfiles with password Xj#9:
switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# password plaintext Xj#9
Creating a volume named bak1 with a prompted plaintext password:
switch(config)# external-storage bak1 switch(config-external-storage-bak1)# password Enter the NAS server password: ********** Re-Enter the NAS server password: **********
Clearing the password for volume logfiles:
switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# no password plaintext Xj#9

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

804

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-external-storage-<VOLUME-NAME>

Authority
Administrators or local user group members with execution rights for this command.

show external-storage
show external-storage [<VOLUME-NAME>]
Description
Shows external storage configuration and state for all volumes or for a specified volume.

Parameter <VOLUME-NAME>

Description
Specifies the external storage volume name that the show command will use.

Examples

switch# show external-storage

----------------------------------------------------------------------------------

--

Address

VRF

Username

Type

Directory

State

----------------------------------------------------------------------------------

--

nfsvol

10.1.1.1

nas

---

NFSv3

/home

operational

nfsfiles 20.1.1.1

nas

netstorage NFSv4

/netstor

disabled

scpdev

nasserver nas

scpstor

SCP

/scp

unaccessible

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

External storage commands | 805

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show running-config external-storage
show running-config external-storage
Description
Shows the running configuration of the external storage.
Examples

switch# show running-config external-storage

external-storage nfsvol

address 10.1.1.1

vrf

nas

type

nfsv4

directoty /home

enable

external-storage scpdev

address 30.1.1.1

vrf

nas

username switchuser

password ciphertext xxx

type

scp

directoty /home

enable

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

type
type {nfsv3 | nfsv4 | scp} no type {nfsv3 | nfsv4 | scp}

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

806

Description
Sets the network attached storage access type for reaching the external storage volume. The no form of this command deletes an external storage volume.

Parameter nfsv3 nfsv4 scp

Description Specifies the NFSv3 network access protocol. Specifies the NFSv4 network access protocol. Specifies the SCP network access protocol.

Examples
Creating the logfiles volume using NFSV4:

switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# type nfsv4

Clearing the external storage access type:

switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# no type nfsv4

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-external-storage-<VOLUME-NAME>

Authority
Administrators or local user group members with execution rights for this command.

username
username <USER-NAME> no username <USER-NAME>
Description
Sets the username for logging in to a network attached storage server. The no form of this command clears a username.

External storage commands | 807

Parameter <USER-NAME>

Description Specifies the username.

Examples
Creating a volume named logfiles with the user name nassuser:

switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# username nasuser

Clearing the user name nasuser from accessing the logfiles volume:

switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# no username nasuser

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-external-storage-<VOLUME-NAME>

Authority
Administrators or local user group members with execution rights for this command.

vrf
vrf <VRF-NAME> no vrf <VRF-NAME>
Description
Setting a VRF to reach network attached storage. The no form of this command clears access of a VRF to network attached storage.

Parameter <VRF-NAME>

Description Specifies the VRF name.

Examples
Creating the logfiles volume and setting a VRF named nas to access the network attached storage:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

808

switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# vrf nas
Clearing access of a VRF named nas to the network attached storage:
switch(config)# external-storage logfiles switch(config-external-storage-logfiles)# no vrf nas

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-external-storage-<VOLUME-NAME>

Authority
Administrators or local user group members with execution rights for this command.

External storage commands | 809

Chapter 41 Feature pack commands

Feature pack commands

erase feature-pack
erase feature-pack [reset]
Description
Remove the installed feature pack and delete the feature pack file.

Parameter reset

Description
Optional. Include this parameter if you do not want to use subscription features anymore and want to stop receiving honor mode warning logs messages. Running this command will disable all subscription features and stop honor warnings.

Example
Remove the feature pack. The switch will continue to operate in honor mode.
switch# erase feature-pack
Remove the feature pack and disable all subscription features.
switch# erase feature-pack reset
This operation will delete the feature pack subscription key and reset feature pack enforcement to a factory default state. This will disable advanced features that require a subscription to operate and may impact network operation if those features are in use.
After running this command, advanced features can only be re-enabled through one of the following: 1. Installing a new feature-pack subscription key. 2. Connecting to Aruba Central. 3. Configuring honor mode.
Continue (y/n)?

For more information on features that use this command, refer to the Feature Pack Configuration Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide

810

Release 10.14 10.13

Command Information

Platforms
6300 6400

Command context manager

Modification The reset parameter is introduced. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

feature-pack mode
feature-pack mode cloud-managed file-based honor no ...
Description
Set the operation mode for a feature pack deployment. HPE Aruba networking provides three modes for feature pack management: cloud-managed, filebased, and honor. In the event of a mismatch between the installed feature pack and the feature pack mode, the device will operate in honor mode.

Parameter cloud-managed file-managed
honor no ...

Description
The device uses cloud-based feature pack management
The device uses a manually installed feature pack file. This is the default feature pack mode.
A valid feature pack has been obtained, but is not yet installed.
Resets the configuration back to the default file-based feature pack mode.

Usage
Switches using feature pack subscription keys in cloud mode share a pool of one or more feature pack subscription keys managed using the HPE Aruba Networking support portal. By default, a switch using an HPE Aruba Networking CX feature pack in cloud mode will contact the HPE Aruba Networking support portal once a day to automatically synchronize with the feature pack subscription key management database. With this deployment type, the HPE Aruba Networking support site can automatically distribute and manage feature packs for all devices in a group, making it a scalable solution for larger deployments and for global accounts across geographies.
Networks with a single switch, or with multiple switches on isolated networks that cannot contact the HPE Aruba Networking support site should use feature pack subscription keys in file-based mode, where a feature pack is manually enabled on a switch using a non-sharable subscription key tied to that individual switch's serial number or MAC address.

Feature pack commands | 811

Honor mode is intended for cases where a valid feature pack for advanced features has been purchased, but is not yet installed on the device. Advanced features on this device will be operational in Honor mode, but a warning message may be seen until a valid feature pack is installed. Please note that HPE Aruba Networking will remove support for Honor mode in a future release and advanced features will only be operational if the applicable subscription fees are paid and a valid feature pack is installed.
Examples
switch(config)# feature pack mode cloud-managed

For more information on features that use this command, refer to the Feature Pack Configuration Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

feature-pack server
feature-pack server block <block> credentials user <USER> password [{plaintext <PASSWORD>}|{ciphertext <PASSWORD>}] location <LOCATION> [vrf <VRF>] pool <pool>
Description
If the switch is in cloud-managed feature pack mode, use this command to define the switch's feature pack profile. A switch in cloud-managed mode uses the information in this profile to contact the feature pack management server and download and install any allocated feature packs.

Parameter block <block>
credentials user <USER>

Description
If the subscription pool for the profile contains more than one subscription block, specify the subscription block within that pool to be assigned.
Configures the credentials used by the device to contact and authenticate to the feature pack server.
The user name of a feature pack server account.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

812

Parameter password
plaintext <PASSWORD> ciphertext <PASSWORD> location <LOCATION> [vrf <VRF>] pool <pool>

Description
Select a mode for entering the feature pack server password. If you press <enter> after the password parameter, you will enter a secure prompt that allows you to securely enter a hidden password. This is the recommended method for entering a plaintext password.
You can include the optional plaintext parameter to configure a plain text password (not recommended), or use the optional ciphertext parameter to enter previously encrypted ciphertext password.
Optional. Enter a password in plain text without the secure prompt. This option does not hide the password in the CLI, and is not recommended.
Optional. Enter a password as previously encrypted text. This is the recommended method for entering an encrypted password.
The FQDN of the feature pack server; https://cx-feature-pack.arubanetworks.com
(Optional) Specify the VRF used to contact the feature pack server.
Configures the feature pack server subscription pool. This information is used by the feature pack server to properly identify the subscription to be assigned to the device.

Examples
Defining a feature pack server by entering a hidden plain text user password.

switch(config)# feature-pack server switch(config-feature-pack-server)# location https://cx-featurepack.arubanetworks.com vrf mgmt switch(config-feature-pack-server)# credentials user myLMSUser1234 password Enter password: ***** Confirm password: *****

Defining a feature pack server with an encrypted ciphertext user password.

switch(config)# feature-pack server switch(config-feature-pack-server)# location https://cx-featurepack.arubanetworks.com vrf mgmt switch(config-feature-pack-server)# credentials user myLMSUser1234 password ciphertext AQBapcmUTsCVdaTGkLA3mN2sslLgsNOdqFUP0j+CaCxVdz7oEwAA2OmsmBmgPHavS+6Gkgm2twE4NU1Y=

For more information on features that use this command, refer to the Feature Pack Configuration Guide for your switch model.
Command History

Feature pack commands | 813

Release 10.13.1000
10.13

Modification
Plaintext passwords should now be configured using the secure prompt, which can be accessed by pressing <enter> after the password keyword. This makes the plaintext and ciphertext keywords optional. It is recommended to use either the secure prompt or the ciphertext option.
Command introduced

Command Information

Platforms
6300 6400

Command context
config config-feature-pack-server

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

feature-pack validate
feature-pack validate
Description
Manually trigger a feature pack validation on the HPE Aruba Networking support portal. (By default, automatic validation happens once every day.) This command is only applicable for feature packs in cloud-managed mode.
Examples
switch# feature-pack validate

For more information on features that use this command, refer to the Feature Pack Configuration Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms
6300 6400

Command context manager

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

814

show feature-pack
show feature-pack [server]

Description
Display the current feature pack summary and status, and feature status of features that require a feature pack.

Parameter server

Description
(Optional) For feature packs in cloud-managed mode, Include this parameter to display configuration settings used to connect to the feature pack management server, and display the connection status information.

Examples

switch# show feature-pack

Feature Pack Summary

===============

Name

: CX Software Advanced Feature Pack

Expiration Date : Thu May 4 2025

Serial Number(s) : TW13KM304V

MAC Address

: 90:20:c2:c4:98:00

Hostname

: 6405

Mode

: File based

Status

: feature pack installed and valid

Error Reason

: None

Subscription Feature

Feature

Status

Status

---------------------------------------------------------------------

Application Based Policy

active

allowed

Application Recognition

active

allowed

MACsec extensions for WAN

active

allowed

Reflexive Policies for Port Access GBP Clients active

allowed

Reflexive Policies for Port Access Clients

active

allowed

switch# switch# show feature-pack server

Profile

=======

Location URL

: https://cx-feature-pack.arubanetworks.com

Location VRF

: mgmt

User account

: customer@example.com

Subscription Pool

: default

Subscription Block

: 6300_test_block_2

Connection

==========

Status

: Validation success

Reason

: --

Last validation time : Tue Sep 12 09:27:42 UTC 2023

Success validation time : Tue Sep 12 09:27:42 UTC 2023

The output of the show feature-pack command include the following information:

Feature pack commands | 815

Value
Name Expiration Date Serial Numbers MAC address Hostname Type
Mode
Status

Description
Name of the feature pack
The date that the feature pack subscription expires
Serial numbers for that feature pack. If the feature pack is used by multiple switches (for example, in a VSF deployment) then the Serial Number(s) field displays all the switch serial numbers for that feature pack.
MAC address of the switch using the feature pack
Host name of the switch using the feature pack
Shows the feature pack file type: n Device specific: Feature pack was manually downloaded from
a feature pack server account in local mode. Use this feature pack with a switch in file-based mode.. n Floating: The feature pack was automatically downloaded from a cloud mode feature pack account on the HPE Aruba Networking support portal. This feature pack should be used with the switch in cloud-managed mode.
Shows the feature pack configuration mode: n Cloud management: Switches using feature pack
subscriptions in cloud-managed mode share a pool of one or more feature pack subscriptions. These subscriptions are managed through the HPE Aruba Networking support portal. n File Based: If a switch is using a feature pack in file-based mode, you must manually upload the feature pack using the copy command and enable it on a switch using a non-sharable subscription file tied to that individual switch's serial number or MAC address. n Honor: Honor mode is intended for cases where a valid feature pack for advanced features has been purchased, but is not yet installed on the device. Advanced features on this device will be operational in honor mode, but a warning message may be seen until a valid feature pack is installed. Please note that HPE Aruba Networking will remove support for Honor mode in a future release and advanced features will only be operational if the applicable subscription fees are paid and a valid feature pack is installed. This message is shown when the switch is configured to use a cloud-managed feature pack profile using the feature pack mode cloud-managed command.
This message displays the current status of the feature pack: n No feature pack installed: No feature pack is detected on the
switch. n Feature pack installed and valid: Feature pack installed with
no errors.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

816

Value

Description
n Feature pack install error: The feature pack has invalid data. n Feature pack expired: The feature pack subscription has
expired. n Feature pack removed: The feature pack was erased from
the switch using the erase command. n Subscription through Aruba Central is connected: Switch is
actively connected to HPE Aruba Networking Central. Subscription features are operational. The feature-pack on the switch will display this state only if all the following are true: o The switch has a connection to Central. o The switch is onboarded to the GreenLake for PrivateCloud
(GLPC) device inventory . o The switch is assigned to Central Application. o The switch has a valid Central License assigned. n Subscription through Aruba Central is disconnected: Switch is disconnected from HPE Aruba Networking Central. Subscription features are still operational. The switch will appear in this state if any of the requirements for the status is not currently true, A switch may also display this feature pack status if the switch has connection to Central, is assigned to the Central application, but has no Central License attached. In this case the switch will be in disconnected state even if it never was previously in connected state. n Feature pack mode honor configured: The switch does not have a valid feature pack. Subscription features are operational, and is operating in honor mode until the feature pack is installed. n Cloud managed server is disconnected: The switch is managing feature packs in cloud mode, but the switch is no longer able to reach the HPE Aruba Networking support portal. The switch will continue to operate in honor mode. n Cloud managed and subscription revoked from server: The switch is managing the feature pack in cloud mode, but feature pack has been revoked from the switch through the HPE Aruba Networking support portal.The switch will continue to operate in honor mode until the feature pack is removed from the switch. n Cloud managed server validation error: Server validation failed. Issue the command show feature pack server for more information. n Unexpected VSF member in stack: A feature pack intended for a VSF stack is installed on a VSF member whose serial number is not covered under the current feature pack. n Mode does not match installed feature pack type: The feature pack type (device-locked or floating) does not match the configured mode. Device-locked feature packs should be
Feature pack commands | 817

Value
Error Reason
Feature Subscription Status Feature Pack Status

Description
used in file-based deployments only, and floating feature packs should be used by cloud-managed deployments.
If the feature pack Status field displays an error status, this field displays details about possible causes for the issue. n Serial number mismatch: The serial number in the installed
feature pack does not match the switch's serial number. n MAC address mismatch: The MAC address in the installed
feature pack does not match the switch's serial number. n Feature pack file parsing error: The feature pack file has an
invalid format. n Feature pack file signature invalid: The feature pack file was
modified.
Feature supported by the feature pack.
Current subscription status; n active: Subscrition is active n inactive: Subscription is inactive or has expired n honor: Installed feature pack has expired or cloud managed
feature pack has encountered an error. Warnings will be logged periodically.
Current status of the feature pack: n allowed: Feature is functional n blocked: Feature is not functional and will require a valid
feature pack to be functional

The output of the show feature-pack server command include the following information:

Location URL
Location VRF User Account Subscription Pool
Subscription Block Status Reason
Last validation time

Fully qualified domain name of the feature pack subscription server, for example, https://cx-featurepack.arubanetworks.com
VRF used to access the feature pack subscription server.
User name of the user account at the HPE Aruba Networking support portal associated with the feature pack.
Name of the subcription pool associated with the feature pack. This can be the Default subscription pool, or a user-defined subscription pool.
Subscription block associated with the feature pack.
Indicates whether the switch was able to contact the feature pack server.
If the switch is unable to contact the feature pack server, this field can display information about the cause for the connection failure.
Timestamp showing the date and time the switch last contacted

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

818

Success Validation time

the feature pack server.
Timestamp showing the date and time of the last successful feature pack installation or validation against the feature pack server

For more information on features that use this command, refer to the Feature Pack Configuration Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms
6300 6400

Command context manager

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

Feature pack commands | 819

Chapter 42 Fault monitor commands

Fault monitor commands

(Fault enabling/disabling)
{all | <FAULT>} no {all | <FAULT>}
Description
Within the selected fault monitor profile context, enables all faults or specific faults for monitoring.

By default, all faults are disabled in a profile and remain disabled until enabled as described here. Configuring the action and threshold does not enable the fault.
Faults enabled with this command use default actions and thresholds unless the actions and thresholds are configured. For information on configuring actions and thresholds for a fault, respectively see action and threshold.

The no form of this command disables faults for monitoring.

Parameter all <FAULT>

Description
Selects all faults.
Selects a specific fault. Available fault names: excessive-broadcasts excessive-multicasts excessive-link-flaps excessive-oversize-packets excessive-jabbers excessive-fragments excessive-crc-errors excessive-late-collisions excessive-collisions excessive-tx-drops

Examples
Enabling all faults:

switch(config-fault-monitor-profile)# all

Disabling all faults:

AOS-CX 10.14 Command-Line Interface Guide

820

switch(config-fault-monitor-profile)# no all
Enabling individual faults:
switch(config-fault-monitor-profile)# excessive-broadcasts switch(config-fault-monitor-profile)# excessive-multicasts switch(config-fault-monitor-profile)# excessive-link-flaps switch(config-fault-monitor-profile)# excessive-oversize-packets switch(config-fault-monitor-profile)# excessive-jabbers switch(config-fault-monitor-profile)# excessive-fragments switch(config-fault-monitor-profile)# excessive-crc-errors switch(config-fault-monitor-profile)# excessive-late-collisions switch(config-fault-monitor-profile)# excessive-collisions switch(config-fault-monitor-profile)# excessive-tx-drops
Disabling individual faults:
switch(config-fault-monitor-profile)# no excessive-broadcasts switch(config-fault-monitor-profile)# no excessive-multicasts switch(config-fault-monitor-profile)# no excessive-link-flaps switch(config-fault-monitor-profile)# no excessive-oversize-packets switch(config-fault-monitor-profile)# no excessive-jabbers switch(config-fault-monitor-profile)# no excessive-fragments switch(config-fault-monitor-profile)# no excessive-crc-errors switch(config-fault-monitor-profile)# no excessive-late-collisions switch(config-fault-monitor-profile)# no excessive-collisions switch(config-fault-monitor-profile)# no excessive-tx-drops

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information
Platforms Command context All platforms config-fault-monitor-profile

Authority
Administrators or local user group members with execution rights for this command.

action
{all | <FAULT>} action {notify | notify-and-disable [auto-enable <TIMEOUT>]} no {all | <FAULT>} action {notify | notify-and-disable [auto-enable <TIMEOUT>]}
Description
Within the selected fault monitor profile context, configures the fault monitoring action for the specified fault. Default action: notify with auto-enable disabled.

Fault monitor commands | 821

The no form of this command removes the action and disables auto-enable.

Parameter all <FAULT>
notify notify-and-disable auto-enable <TIMEOUT>

Description
Selects all faults.
Selects a specific fault. Available fault names: excessive-broadcasts excessive-multicasts excessive-link-flaps excessive-oversize-packets excessive-jabbers excessive-fragments excessive-crc-errors excessive-late-collisions excessive-collisions excessive-tx-drops
Selects the notify action. Notifies through events, DLOGs, and SNMP trap. This action is enabled by default.
Selects the action as notify-and-disable. Notifies through events, DLOGs, and SNMP trap, and then disables the port.
Sets the number of seconds after which a port disabled by the notifyand-disable action is automatically re-enabled. Range: 1 to 604800 seconds.

The fault parameter values are saved even after a fault is disabled in the profile. The saved values will be used if the fault is later re-enabled in the profile again.
Examples
Configuring the notify action for all faults within a given profile: switch(config-fault-monitor-profile)# all action notify
Configuring the notify-and-disable action for all faults within a given profile: switch(config-fault-monitor-profile)# all action notify-and-disable
Configuring the notify-and-disable action for all faults with auto-enable within a given profile: switch(config-fault-monitor-profile)# all action notify-and-disable auto-enable 80
Disabling all fault monitoring for this profile: switch(config-fault-monitor-profile)# no all
Restoring all fault monitoring to the default action notify within a given profile:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

822

switch(config-fault-monitor-profile)# no all action
Unconfiguring the auto-enable timer for all fault monitoring within a given profile:
switch(config-fault-monitor-profile)# no all action notify-and-disable auto-enable
Configuring the notify action for specific faults within a given profile:
switch(config-fault-monitor-profile)# excessive-oversize-packets action notify switch(config-fault-monitor-profile)# excessive-late-collisions action notify-anddisable switch(config-fault-monitor-profile)# excessive-collisions action notify-anddisable
Configuring the notify-and-disable action for specific faults within a given profile:
switch(config-fault-monitor-profile)# excessive-link-flaps action notify-anddisable switch(config-fault-monitor-profile)# excessive-fragments action notify-anddisable switch(config-fault-monitor-profile)# excessive-crc-errors action notify-anddisable
Configuring the notify-and-disable action with auto-enable for specific faults within a given profile:
switch(config-fault-monitor-profile)# excessive-broadcasts action notify-anddisable auto-enable 80 switch(config-fault-monitor-profile)# excessive-multicasts action notify-anddisable auto-enable 100 switch(config-fault-monitor-profile)# excessive-tx-drops action notify-and-disable auto-enable 70 switch(config-fault-monitor-profile)# excessive-jabbers action notify-and-disable auto-enable 60
Restoring fault monitoring to the default action notify within a given profile:
switch(config-fault-monitor-profile)# no excessive-oversize-packets action switch(config-fault-monitor-profile)# no excessive-jabbers action switch(config-fault-monitor-profile)# no excessive-oversize-packets action notifyand-disable
Unconfiguring the auto-enable timer within a given profile:
switch(config-fault-monitor-profile)# no excessive-jabbers action notify-anddisable auto-enable switch(config-fault-monitor-profile)# no excessive-collisions action notify-anddisable auto-enable
For more information on features that use this command, refer to the Security Guide for your switch model.
Fault monitor commands | 823

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms Command context All platforms config-fault-monitor-profile

Authority
Administrators or local user group members with execution rights for this command.

apply fault-monitor profile
apply fault-monitor profile <PROFILE-NAME> no apply fault-monitor profile [<PROFILE-NAME>]
Description
Applies a fault monitoring profile to the selected interface or interface range. The no form of this command removes the fault monitoring profile from the selected interface or interface range.

Parameter <PROFILE-NAME>

Description
Specifies the fault monitor profile name. Range: Up to 64 alphanumeric and special characters.

Examples
Applying the fault monitoring profile to a interface:

switch(config)# interface 1/1/1 switch(config-if)# apply fault-monitor profile noisy-ports

Applying the fault monitoring profile to a interface range:

switch(config)# interface 1/1/2-1/1/24 switch(config-if)# apply fault-monitor profile quiet-ports

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08

Modification
Made the <PROFILE-NAME> parameter optional in the no form of the command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

824

Release 10.07 or earlier
Command Information
Platforms Command context All platforms config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

fault-monitor profile
fault-monitor profile <PROFILE-NAME> no fault-monitor profile <PROFILE-NAME>
Description
Creates a fault monitoring profile and enters its context which is indicated as (config-fault-monitorprofile). If the profile already exists, this command enters the profile context. A maximum of 16 fault monitoring profiles are supported. For information on enabling a fault within a fault monitor profile, see (Fault enabling/disabling). For information on configuring actions and thresholds for a fault, respectively see action and threshold. For information on applying a fault monitor profile to a interface or interface range, see apply faultmonitor profile. The no form of this command deletes the fault monitoring profile.
By default, all faults are disabled in a profile.

Parameter <PROFILE-NAME>

Description
Specifies the fault monitor profile name. Range: Up to 64 alphanumeric and special characters.

Examples
Creating a fault monitor profile and entering its context:

switch(config)# fault-monitor profile noisy-ports switch(config-fault-monitor-profile)#

Deleting a fault monitor profile:

switch(config)# no fault-monitor profile noisy-ports

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

Fault monitor commands | 825

Release 10.07 or earlier
Command Information
Platforms Command context All platforms config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show fault-monitor profile
show fault-monitor profile <PROFILE-NAME>
Description
Shows fault monitoring profile information for all profiles or a specific profile.

Parameter <PROFILE-NAME>

Description
Specifies the fault monitor profile name. Range: Up to 64 alphanumeric and special characters.

Example
Showing information for all fault monitoring profiles:

switch# show fault-monitor profile

-------------------------------------------------------------------------------

Fault monitor profile: noisy-ports

-------------------------------------------------------------------------------

Auto

Fault

Enabled Threshold Action

Enable

-------------------------------------------------------------------------------

excessive-broadcasts

yes

5%

notify-and-disable --

excessive-multicasts

yes

1000 pps notify-and-disable --

excessive-link-flaps

yes

7

notify-and-disable --

excessive-oversize-packets

yes

25

notify-and-disable --

excessive-jabbers

yes

25

notify-and-disable --

excessive-fragments

yes

25

notify-and-disable --

excessive-crc-errors

yes

25

notify-and-disable --

excessive-late-collisions

yes

25

notify-and-disable --

excessive-collisions

yes

25

notify-and-disable --

excessive-tx-drops

yes

25

notify-and-disable --

-------------------------------------------------------------------------------

Fault monitor profile: quiet-ports

-------------------------------------------------------------------------------

Auto

Fault

Enabled Threshold Action

Enable

-------------------------------------------------------------------------------

excessive-broadcasts

yes

20%

notify-and-disable --

excessive-multicasts

yes

25000 pps notify-and-disable 40

excessive-link-flaps

yes

7

notify

--

excessive-oversize-packets

yes

30

notify-and-disable --

excessive-jabbers

no

30

notify-and-disable 100

excessive-fragments

yes

30

notify-and-disable --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

826

excessive-crc-errors excessive-late-collisions excessive-collisions excessive-tx-drops

yes

30

yes

30

yes

30

yes

30

notify-and-disable -notify-and-disable -notify-and-disable -notify-and-disable --

Showing information for a particular fault monitoring profile:

switch# show fault-monitor profile noisy-ports

-------------------------------------------------------------------------------

Fault monitor profile: noisy-ports

-------------------------------------------------------------------------------

Auto

Fault

Enabled Threshold Action

Enable

-------------------------------------------------------------------------------

excessive-broadcasts

yes

5%

notify-and-disable --

excessive-multicasts

yes

1000 pps notify-and-disable --

excessive-link-flaps

yes

7

notify-and-disable --

excessive-oversize-packets

yes

25

notify-and-disable --

excessive-jabbers

yes

25

notify-and-disable --

excessive-fragments

yes

25

notify-and-disable --

excessive-crc-errors

yes

25

notify-and-disable --

excessive-late-collisions

yes

25

notify-and-disable --

excessive-collisions

yes

25

notify-and-disable --

excessive-tx-drops

yes

25

notify-and-disable --

-------------------------------------------------------------------------------

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information
Platforms Command context All platforms Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show interface fault-monitor profile
show interface [<INTERFACE>|<IF-RANGE>] fault-monitor profile
Description
Shows fault monitoring profile configuration information for all or specific interfaces.

Parameter <INTERFACE>

Description Specifies a single interface.

Fault monitor commands | 827

Parameter

Description

<IF-RANGE>

Specifies a interface range,

Example
Showing all interfaces with applied fault monitoring profiles:

switch# show interface fault-monitor profile

--------------------------------------------------------------------------

Port

Fault Monitor Profile

--------------------------------------------------------------------------

1/1/1 noisy-ports

1/1/2 quiet-ports

1/1/4 quiet-ports

1/1/5 noisy-ports

1/1/6 noisy-ports

1/1/7 quiet-ports

Showing a range of interfaces with applied fault monitoring profiles:

switch# show interface 1/1/1-1/1/2,1/1/6 fault-monitor profile

--------------------------------------------------------------------------

Port

Fault Monitor Profile

--------------------------------------------------------------------------

1/1/1 noisy-ports

1/1/2 quiet-ports

1/1/6 noisy-ports

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information
Platforms Command context All platforms Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show interface fault-monitor status
show interface [<INTERFACE>|<IF-RANGE>] fault-monitor status
Description
Shows active fault information for all or specific interfaces.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

828

Parameter <INTERFACE> <IF-RANGE>

Description Specifies a single interface. Specifies a interface range,

Example
Showing active fault information for all interfaces with applied fault monitoring profiles:

switch# show interface fault-monitor status

Port Time

Port Fault

Fault Elapsed Time

State Left

--------------------------------------------------------------------------------

1/1/1 excessive-broadcasts

Tue Apr 14 14:29:09 UTC 2020 down 60

excessive-jabbers

Tue Apr 15 14:29:09 UTC 2020 -- --

1/1/2 excessive-oversize-packets Tue Apr 16 14:29:09 UTC 2020 down --

Showing active fault information for a range of interfaces with applied fault monitoring profiles:

switch# show interface 1/3/1,1/3/3 fault-monitor status

Port Time

Port Fault

Occurring Since

State Left

--------------------------------------------------------------------------------

1/1/4 excessive-broadcasts

Tue Apr 14 14:29:09 UTC 2020 down 60

excessive-jabbers

Tue Apr 15 14:29:09 UTC 2020 -- 100

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information
Platforms Command context All platforms Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show running-config
show running-config [interface <IFNAME> | current-context | all]
Description
Shows the running configuration including any fault-monitor profile configurations and profile-names applied to an interface. The below examples focus on fault monitor-related configuration items. Other configuration items that may be present are represented by an ellipsis (...).

Fault monitor commands | 829

Parameter interface <IFNAME> current-context all

Description
Shows running configuration information for only the specified interface.
Shows running configuration information for only the current context.
Shows all running configuration information.

Examples
Showing the running configuration for a particular interface:

switch# show running-config interface 1/1/1 interface 1/1/1
... apply fault-monitor profile noisy-ports
...

Showing the running configuration for a particular fault monitor profile current context:

switch# fault-monitor profile noisy-ports switch(config-fault-monitor-profile)# show running-config current-context fault-monitor profile noisy-ports
excessive-broadcasts excessive-broadcasts threshold pps 10000 excessive-broadcasts action notify-and-disable auto-enable 2000 excessive-multicasts excessive-multicasts threshold pps 10000 excessive-link-flaps excessive-link-flaps action notify-and-disable auto-enable 2000

Showing all running configuration:

switch# show running-config all ... fault-monitor profile noisy-ports
excessive-broadcasts excessive-broadcasts threshold pps 10000 excessive-broadcasts action notify-and-disable auto-enable 2000 excessive-multicasts excessive-multicasts threshold pps 10000 excessive-multicasts action notify excessive-link-flaps excessive-link-flaps threshold count 7 excessive-link-flaps action notify-and-disable auto-enable 2000 no excessive-oversize-packets excessive-oversize-packets threshold value 25 excessive-oversize-packets action notify no excessive-jabbers excessive-jabbers threshold value 25 excessive-jabbers action notify no excessive-fragments excessive-fragments threshold value 25 excessive-fragments action notify no excessive-crc-errors excessive-crc-errors threshold value 25

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

830

excessive-crc-errors action notify no excessive-late-collisions excessive-late-collisions threshold value 25 excessive-late-collisions action notify no excessive-collisions excessive-collisions threshold value 25 excessive-collisions action notify no excessive-tx-drops excessive-tx-drops threshold value 25 excessive-tx-drops action notify ... interface 1/1/1 ... apply fault-monitor profile noisy-ports ...

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information
Platforms Command context All platforms Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

threshold
<FAULT> threshold value <VALUE> no <FAULT> threshold [value <VALUE>]
excessive-link-flaps threshold count <COUNT> no excessive-link-flaps threshold [count <COUNT>]
excessive-fc-watchdog-triggers threshold count <COUNT> no excessive-fc-watchdog-triggers threshold [count <COUNT>]
{excessive-broadcasts | excessive-multicasts} threshold {percent <BW-PERCENT> | pps <PPS>}
no {excessive-broadcasts | excessive-multicasts} threshold [{percent <BW-PERCENT> | pps <PPS>}]
no all threshold
Description
Within the selected fault monitor profile context, sets the specified fault threshold. The no form of this command resets the threshold to its default value.

Fault monitor commands | 831

Parameter
<FAULT> threshold value <VALUE>
With <FAULT> set to any of these names: excessive-oversize-packets excessive-jabbers excessive-fragments excessive-crc-errors excessive-late-collisions excessive-collisions excessive-tx-drops
excessive-link-flaps threshold count <COUNT>
{excessive-broadcasts | excessive-multicasts} threshold percent <BW-PERCENT>
{excessive-broadcasts | excessive-multicasts} threshold pps <PPS>

Description Sets the threshold number of bad frames per 10000 good frames received or per 10000 good frames sent (depending on the fault), to be considered a fault. Range: 1 to 10000. Default: 25.
Sets the threshold count of interface link flaps, during a 10 second sampling interval, to be considered a fault. Range: 1 to 100. Default: 7. Sets the fault threshold as a percentage of port bandwidth for minimum sized packets that is considered to be a fault. Range: 1 to 100. Default 5. Sets the fault threshold in packets per second. Range: 1 to 195312500.

If excessive-broadcast or excessive-multicast faults are configured with the threshold higher than the ratelimit threshold, the following occurs:
n Fault reporting still happens as the port has actually received packets at a rate that violated its threshold. n Traffic gets shaped as per rate-limit configuration and any packet exceeding the rate-limit threshold
gets dropped.
Examples
Setting thresholds:
switch(config-fault-monitor-profile)# excessive-oversize-packets threshold value 40 switch(config-fault-monitor-profile)# excessive-jabbers threshold value 30 switch(config-fault-monitor-profile)# excessive-fragments threshold value 50 switch(config-fault-monitor-profile)# excessive-crc-errors threshold value 35 switch(config-fault-monitor-profile)# excessive-late-collisions threshold value 30 switch(config-fault-monitor-profile)# excessive-collisions threshold value 40 switch(config-fault-monitor-profile)# excessive-tx-drops threshold value 20
switch(config-fault-monitor-profile)# excessive-link-flaps threshold count 14 switch(config-fault-monitor-profile)# excessive-broadcasts threshold percent 40 switch(config-fault-monitor-profile)# excessive-multicasts threshold pps 7500
Resetting all thresholds to their defaults:
switch(config-fault-monitor-profile)# no all threshold
Resetting individual thresholds to their defaults:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

832

switch(config-fault-monitor-profile)# no excessive-oversize-packets threshold switch(config-fault-monitor-profile)# no excessive-jabbers threshold switch(config-fault-monitor-profile)# no excessive-fragments threshold switch(config-fault-monitor-profile)# no excessive-crc-errors threshold switch(config-fault-monitor-profile)# no excessive-late-collisions threshold switch(config-fault-monitor-profile)# no excessive-collisions threshold switch(config-fault-monitor-profile)# no excessive-tx-drops threshold
switch(config-fault-monitor-profile)# no excessive-link-flaps threshold
switch(config-fault-monitor-profile)# no excessive-broadcasts threshold switch(config-fault-monitor-profile)# no excessive-multicasts threshold

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms Command context All platforms config-fault-monitor-profile

Authority
Administrators or local user group members with execution rights for this command.

vsx-sync (fault monitor)
vsx-sync no vsx-sync
Description
Within the selected fault monitor profile context, configures VSX synchronization for the selected fault monitoring profile. The no form of this command removes the VSX synchronization for a fault monitoring profile.
Example
Configuring VSX synchronization for a fault monitoring profile:
switch(config-fault-monitor-profile)# vsx-sync

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

Fault monitor commands | 833

Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context config-fault-monitor-profile

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

834

Chapter 43 Firmware management commands

Firmware management commands

copy {primary | secondary} <REMOTE-URL>
copy {primary | secondary} <REMOTE-URL> [vrf <VRF-NAME>]
Description
Uploads a firmware image to a TFTP or SFTP server.

Parameter {primary | secondary} <REMOTE-URL>
vrf <VRF-NAME>

Description
Selects the primary or secondary image profile to upload. Required
Specifies the URL to receive the uploaded firmware using SFTP , TFTP or SCP. TFTP format:
tftp://<IP-ADDR>[:<PORT-NUM>] [;blocksize=<Value>]/<FILENAME>
SFTP format: sftp://<USERNAME>@<IP-ADDR> [:<PORT-NUM>]/<FILENAME>
SCP format: scp://USER@{IP|HOST}[:PORT]/FILE
Specifies a VRF name. Default: default.

Examples
TFTP upload:

switch# copy primary tftp://192.0.2.0/00_10_00_0002.swi ######################################################################### 100.0% Verifying and writing system firmware...

SFTP upload:

switch# copy primary sftp://swuser@192.0.2.0/00_10_00_0002.swi

swuser@192.0.2.0's password:

Connected to 192.0.2.0.

sftp> put primary.swi XL_10_00_0002.swi

Uploading primary.swi to /users/swuser/00_10_00_0002.swi

primary.swi

100% 179MB 35.8MB/s 00:05

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide

835

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

copy {primary | secondary} <FIRMWARE-FILENAME>
copy {primary | secondary} <FIRMWARE-FILENAME>
Description
Copies a firmware image to USB storage.

Parameter {primary | secondary}
<FIRMWARE-FILENAME>

Description
Selects the primary or secondary image from which to copy the firmware. Required
Specifies the name of the firmware file to create on the USB storage device. Prefix the filename with usb:/. For example: usb:/firmware_v1.2.3.swi For information on how to format the path to a firmware file on a USB drive, see USB URL.

Examples

switch# copy primary usb:/11.10.00.0002.swi

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Firmware management commands | 836

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

copy primary secondary
copy primary secondary
Description
Copies the firmware image from the primary to the secondary location.
Examples
switch# copy primary secondary The secondary image will be deleted.
Continue (y/n)? y Verifying and writing system firmware...

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

copy <REMOTE-URL>
copy <REMOTE-URL> {hot-patch|primary|secondary} [vrf <VRF-NAME>]
Description
Downloads a hot-patch or firmware image from a TFTP or SFTP server.

Parameter <REMOTE-URL>

Description
Specifies the URL from which to download the firmware using SFTP or TFTP. TFTP format:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

837

Parameter {hot-patch|primary|secondary}

Description
tftp://<IP-ADDR>[:<PORT-NUM>] [;blocksize=<Value>]/<FILENAME>
SFTP format: sftp://<USERNAME>@<IP-ADDR> [:<PORT-NUM>]/<FILENAME>
SCP format: scp://USER@{IP|HOST}[:PORT]/FILE
Select a hot-patch or a primary or secondary image profile for receiving the downloaded firmware. Required.
NOTE: For more information about hot-patch, see hot-patch.

vrf <VRF-NAME>

Specifies the name of a VRF. Default: default.

TFTP usage
To specify a URL with:
n an IPv4 address: tftp://192.0.2.1/a.txt n an IPv6 address: tftp://[2000::2]/a.txt n a hostname: tftp://hpe.com/a.txt
To specify TFTP with:
n the port number of the server in the URL: tftp://192.0.2.1:12/a.txt n the blocksize in the URL: tftp://192.0.2.1;blocksize=1462/a.txt The valid blocksize range is 8 to 65464. n the port number of the server and blocksize in the URL: tftp://192.0.2.1:12;blocksize=1462/a.txt
To specify a file in a directory of URL: tftp://192.0.2.1/dir/a.txt
SFTP usage
To specify:
n A URL with an IPv4 address: sftp://user@192.0.2.1/a.txt n A URL with an IPv6 address: sftp://user@[2000::2]/a.txt n A URL with a hostname: sftp://user@hpe.com/a.txt n SFTP port number of a server in the URL: sftp://user@192.0.2.1:12/a.txt n A file in a directory of URL: sftp://user@192.0.2.1/dir/a.txt n To specify a file with absolute path in the URL: sftp://user@192.0.2.1//home/user/a.txt
SCP Usage
To specify:
n A username with an IP address: scp://user@192.0.2.1:12/a.txt n A username with a remote host: scp://user@hpe.com/a.txt
Examples
TFTP download for a hot-patch:

Firmware management commands | 838

switch# copy tftp://192.168.1.1/FL.10.12.0001-0002.patch hot-patch vrf vrf1

Fetching /users/swuser/FL.10.10.0001-0002.patch to hotpatch.dnld.uE2YT1

FL.10.12.0001-0002.patch

100% 62KB 12.4MB/s 00:00

Verifying and writing hot-patch...

TFTP download for primary software image:

switch# copy tftp://192.10.12.0/FL_10_12_0001.swi primary The primary image will be deleted.
Continue (y/n)? y ######################################################################### 100.0% Verifying and writing system firmware...

SFTP download:

switch# copy sftp://swuser@192.10.12.0/FL_10_12_0001.swi primary The primary image will be deleted.

Continue (y/n)? y

The authenticity of host '192.10.12.0 (192.10.12.0)' can't be established.

ECDSA key fingerprint is SHA256:L64khLwlyLgXlARKRMiwcAAK8oRaQ8C0oWP+PkGBXHY.

Are you sure you want to continue connecting (yes/no)? yes

Warning: Permanently added '192.10.12.0' (ECDSA) to the list of known hosts.

swuser@192.10.12.0's password:

Connected to 192.10.12.0.

Fetching /users/swuser/ss.10.00.0002.swi to ss.10.00.0002.swi.dnld

/users/swuser/ss.10.00.0002.swi

100% 179MB 25.6MB/s 00:07

Verifying and writing system firmware...

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.12 10.10

10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification The hot-patch parameter is supported on all platforms. The hot-patch parameter is introduced on the 6300 series switches. --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

839

copy secondary primary
copy secondary primary
Description
Copies the firmware image from the secondary to the primary location.
Examples
switch# copy secondary primary The primary image will be deleted.
Continue (y/n)? y Verifying and writing system firmware...

switch# copy sftp://stor@192.22.1.0/im-switch.swi primary vrf mgmt The primary image will be deleted.

Continue (y/n)? y

The authenticity of host '192.22.1.0 (192.22.1.0)' can't be established.

ECDSA key fingerprint is SHA256:MyI1xbdKnehYut0NLfL69gDpNzCmZqBVvBaRR46m7o8.

Are you sure you want to continue connecting (yes/no)? yes

Warning: Permanently added '192.22.1.0' (ECDSA) to the list of known hosts.

stor@192.22.1.0's password:

Connected to 192.22.1.0.

sftp> get c8d5b9f-topflite.swi c8d5b9f-topflite.swi.dnld

Fetching /home/dr/im-switch.swi to c8d5b9f-topflite.swi.dnld

/home/dr/im-switch.swi

100% 226MB 56.6MB/s 00:04

Verifying and writing system firmware...

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

copy <STORAGE-URL>
copy <STORAGE-URL> {hot-patch|primary|secondary}
Description

Firmware management commands | 840

Copies, verifies, and installs a hot-patch or firmware image from a USB storage device connected to the active management module.

Parameter <STORAGE-URL>
{hot-patch|primary|secondary}

Description
Specifies the name of the firmware file to copy from the storage device. Required. USB format:
usb:/<FILENAME>
Select a hot-patch image or a primary or secondary profile for receiving the copied firmware.
NOTE: For more information about hot-patch, see hot-patch.

USB usage
To specify a file: n In a USB storage device: usb:/a.txt n In a directory of a USB storage device: usb:/dir/a.txt
Examples
switch# copy usb:/FL.10.12.0001-0002.patch

switch# copy usb:/FL.10.12.0001.swi primary The primary image will be deleted.
Continue (y/n)? y
Verifying and writing system firmware...

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.12 10.10
10.07 or earlier
Command Information

Modification
The hot-patch parameter is supported on all platforms.
The hot-patch parameter is introduced on the 6300 series switches. --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

841

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

copy hot-patch
copy hot-patch <Word> {<REMOTE-URL>|<Storage-URL>} [vrf <VRF-NAME>]
Description
Copies a hot-patch from a switch to the specified remote URL or storage URL.

Parameter <Word> <REMOTE-URL>
vrf <VRF-NAME> <STORAGE-URL>

Description
Name of the hot-patch software to upload.
Specifies the URL to receive the uploaded patch using SFTP or TFTP. For information on how to format the remote URL, see URL formatting for copy commands.
[Optional] specify the VRF instance to use for upload.
Specifies the name of the patch file to create on the USB storage device. Prefix the filename with usb:/, for example, usb:/firmware_FL_10_12_0001-0002.patch.

Examples

switch# copy hot-patch FL_10_12_0001-0002.patch tftp:172.21.18.170/FL_10_12_00010002.patch vrf vrf1

Related Commands
Command copy <REMOTE-URL> hot-patch

Description Downloads a hot-patch image from a TFTP or SFTP server. Apply a hot-patch image or remove it from the switch.

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.12 10.10

Modification Hot-patch is now supported on all platforms. Command introduced

Firmware management commands | 842

Command Information

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

hot-patch
hot-patch apply|remove <name.patch> no hot-patch apply <name.patch>
Description
Apply hot-patch software or remove it from the switch. The no form of the hot-patch apply command disables the hot-patch image, but does not remove it from the switch. Rebooting the system after disabling or removing the patch is not required.

Profile names apply <name.patch>
remove <name.patch>

Description
Apply the specified hot-patch image to a standalone switch or VSF stack. AOS-CX hot-patch software images can be obtained from Aruba customer support, and are identified with a .patch extension.
Disables the hot-patch image and removes the patch from the switch. This removal will also disable the patch. Once removed, a hot-patch must be downloaded again in order to be applied.

Usage
A hot-patch can be downloaded from a remote server onto a switch then applied without rebooting the switch. When the hot-patch is disabled, the hot-patch will still remain on the system. The disabled hotpatch can be removed from the system without the need for a reboot of the system. If a checkpoint configuration that does not contain a hot-patch is restored to a running configuration that does have a hot-patch, the patch is not deleted, it remains as not applied but is present in the device memory.
Examples
switch(config)# hot-patch apply FL_10_12_0001-0002.patch

Related Commands
Command copy <REMOTE-URL>
copy hot-patch

Description
Downloads and installs a hot-patch image from a TFTP or SFTP server.
Copies a hot-patch software image from a switch to a specified remote URL or storage URL.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

843

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.12 10.10
Command Information
Platforms Command context All platforms config

Modification Hot-patch is now supported on all platforms. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

show hot-patch
show hot-patch [detail]

Parameter detail

Description
Displays the detailed status of all hot-patches present on the system.

Description
the show hot-patch command displays the status of all hot-patches present on the system. The show hot-patch detail command displays detailed information for all hot patches present on the system.
Examples

switch# show hot-patch

Name ----------------------FL_10_12_0001-0002.patch

Status ------Applied

switch# show hot-patch detail

Name Status Version Compatible Version Issues Fixed Patch Date Patch ID Patch SHA

: FL_10_12_0001-0002.patch : Applied : FL_10_12_0001-0002.patch : FL.10.12.0001 : CR1234, CR2345 : 2022-03-29 20:46:15 UTC : ArubaOS-CX:FL.10.12.0001-sp1-256-gd457e868d39:202204142009 : a40438d06a82e5fe7e30d457e868d39e8526185b

Related Commands

Firmware management commands | 844

Command copy <REMOTE-URL> hot-patch

Description Downloads a hot-patch image from a TFTP or SFTP server. Apply a hot-patch image or remove it from the switch.

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.12 10.10
Command Information
Platforms Command context All platforms Manager (#)

Modification Command supported on all platforms. Command introduced on 6300 Switch series.
Authority Administrators or local user group members with execution rights for this command.

Flow monitoring commands

diag-dump ipfix basic
diag-dump ipfix basic
Description
Displays diagnostic information for IPFIX.
Examples
diag-dump ipfix basic ========================================================================= [Start] Feature ipfix Time : Tue Apr 11 02:23:03 2023 ========================================================================= ------------------------------------------------------------------------[Start] Daemon ipfixd ------------------------------------------------------------------------- IPFIX Record Cache dump - IPFIX Record ipfix -
....
:- IPFIX Monitor v6ti completed - End of IPFIX Monitor Cache dump ------------------------------------------------------------------------[End] Daemon ipfixd

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

845

-------------------------------------------------------------------------

-------------------------------------------------------------------------

[Start] Daemon ops-switchd

-------------------------------------------------------------------------

Key format: <traffic_type>_<coalescence_id>_<agent_id>_<asic_port>

Key

TCAM Entry ID Count

-------------------------------- ---------------- -----

1_1532781829_3_20

0xffff7c7e7a00 1

1_3217499901_1_12

0xffff91187580 1

1_3217499901_1_13

0xffff91183d80 1

1_3217499901_1_14

0xffff91186e80 1

....

------------------------------------------------------------------------[End] Daemon ops-switchd ------------------------------------------------------------------------========================================================================= [End] Feature ipfix ========================================================================= Diagnostic-dump captured for feature ipfix

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms
6300 6400 (v2 profile only)

Command context Manager (#)

Modification Command introduced on 6300, 6400, 8100 and 8360 Switch series.
Authority Administrators or local user group members with execution rights for this command.

flow exporter
flow exporter <name> destination <hostname> [vrf vrfname] <ipaddr> [vrf vrfname] <ip6addr> [vrf vrfname] type traffic-insight no ..
Description
A flow exporter is the part of the IP Flow Information Export (IPFIX) feature that defines how a flow monitor exports flow reports. You can assign the same flow exporter configuration to more than one flow monitor. Each flow exporter includes a destination setting that identifies the device to which the

Flow monitoring commands | 846

flow reports are sent. 6300 and 6400 series support a maximum of sixteen flow monitors with a limit of two flow exporters that can be applied to a single flow monitor.

Parameter <name> dscp <0-63> export-protocol ipfix description <description> destination <hostname>|<IPaddr>|<ip6addr>
[vrf vrfname] destination type {hostname-or-ip-addr | traffic-insight} destination traffic-insight <name> no .. template data timeout <timeout>
transport udp <port>

Description
Name of the flow exporter, up to 64 characters.
DSCP value to be used by the flow exporter. The default value is 0.
Define an export protocol for the flow exporter.The default ipfix protocol is the only protocol currently available.
A description of the flow exporter, up to 256 characters and spaces.
The exporter sends flow records to this destination. The destination can be defined as a hostname, or an IPv4 or IPv6 IP address.
You can optionally include the name of the destination VRF in the destination definition.
The exporter sends flow reports to a traffic insight destination.
The exporter sends flow reports to a specific traffic insight destination.
Negate any configured parameter.
A flow exporter template describes the format of exported flow reports. Therefore, flow reports cannot be decoded properly without the corresponding templates. This setting defines how often the flow exporter will resend templates to the flow monitor. The supported range is 1-86400 seconds, and the default is 600 seconds.
Transport protocol and port for sending flow record reports. The default port is port 4739,

Examples
The following example creates a flow exporter configuration named exporter-1.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

847

switch(config)# flow exporter exporter-1 switch(config-flow-exporter)# dscp 34 switch(config-flow-exporter)# destination 192.0.2.1 vrf VRF1 switch(config-flow-exporter)# template data timeout 1200 switch(config-flow-exporter)# description Exports flows to 192.0.2.1

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Related Commands
Command flow record flow monitor show flow exporter

Description
Define data to be included in a flow record by configuring flow record match and collect fields
Define a flow monitor configuration, including the flow exporter and flow record associated to that monitor.
Display flow exporter configuration and status.

Command History
Release 10.11

Modification
Command introduced on 6300, 6400, 8100 and 8360 Switch series.

Command Information

Platforms
6300 6400 (v2 profile only)

Command context
config config-flow-exporter

Authority
Administrators or local user group members with execution rights for this command.

flow monitor
flow monitor <name> exporter <name> cache timeout active|inactive <timeout> description <description> record <name>
Description
On a 6300 and 6400 Switch series, a flow monitor is the part of the IP Flow Information Export (IPFIX) feature that performs network monitoring for the selected interface. A flow monitor configuration consists of a flow record, a flow cache, and one or more associated flow exporters. A flow monitor compiles data from the network traffic on the interface and stores it in the flow cache in a format defined by the flow record. The flow exporters associated with the monitor then export data from the flow cache to the flow exporter destination.

Flow monitoring commands | 848

6300 and 6400 series support a maximum of sixteen flow monitors with a limit of two flow exporters that can be applied to a single flow monitor. If no software augmentation of flows is required, there is no need to configure a flow collector or flow monitor.

Parameter <name>
cache timeout active|inactive <timeout>
description exporter <name>
record <name>

Description
Name of the flow monitor , up to 64 characters.
Use the cache timeout parameter to define an active or inactive timeout for the flow monitor. A flow monitor closes a flow session that is active for longer than the active timeout or inactive for longer than the inactive timeout. The supported timeout range for both the active timeout and inactive timeout is 30-120 seconds, and the default is 30 seconds.
A description up to 256 characters long, including spaces.
Assign a flow exporter to a flow monitor. Each flow monitor supports a maximum of two different flow exporters, sending flow records to up to two destinations.
) Assigns a flow record to a flow monitor.

Examples
The following example creates a flow monitor configuration named monitor-1.

switch(config)# flow monitor monitor-1 switch(config-flow-monitor)# description Monitor for analyzing basic ipv4 traffic switch(config-flow-monitor)# exporter flow-exporter-1 switch(config-flow-monitor)# exporter flow-exporter-2 switch(config-flow-monitor)# record flow-record-1 switch(config-flow-monitor)# cache timeout inactive 120 switch(config-flow-monitor)# cache timeout active 1500

The following workflow changes the flow record assigned to a flow monitor.

switch(config)# flow monitor flow-monitor-1 switch(config-flow-monitor)# record flow-record-2

For more information on features that use this command, refer to the Monitoring Guide for your switch model.
Related Commands

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

849

Command flow exporter flow record
show flow monitor

Description
Define how a flow monitor exports the flow reports.
Define data to be included in a flow record by configuring flow record match and collect fields
Displays flow monitor configuration and status

Command History
Release 10.11

Modification
Command introduced on 6400, 6400, 8200 and 8360 Switch series.

Command Information

Platforms
6300 6400 (v2 profile only)

Command context
config config-flow-monitor

Authority
Administrators or local user group members with execution rights for this command.

flow record
flow record <name> match ip|ipv6 {protocol|version}|{source|destination address} transport {source|destination} port collect application name application https url dns response-code counter {packets|bytes} timestamp absolute {first|last} description <description>
Description
Define data to be included in a flow record by configuring flow record match and collect fields. A flow record defines match (key) fields and collection (non-key) fields. Customers configure flow records with match (key) fields and collect (non-key) fields. Match fields are the set of fields that define a flow, such as IP address or UDP port. Collect fields are the set of fields that identify information to collect for a flow, such as packet and byte counters. Traffic with matching attributes (for example, traffic coming from the same interface, sent to the same destination with the same protocol) are classified as a single flow. Information for some or all of the matched settings can be collected and exported to a destination defined by the flow exporter assigned to the flow monitor.
Traffic must match a match rule definition before it can be collected and sent. You cannot collect and send data that is not matched.

Flow monitoring commands | 850

Parameter <name> match
description collect

Description
Name of the flow monitor, up to 64 characters.
match traffic according to one or more of the following key attributes: n ip: match traffic on an IPv4 network n ipv6: match traffic on an IPv6 network n protocol: Match traffic using the same IP protocol n version: Match traffic using the same IP version n source: Match traffic from the same source n destination: Match traffic to the same destination n address: Match traffic by source or destination IP address n transport: Match traffic by source or destination transport
type n port: Match traffic by source or destination transport port
A description for the flow record up to 256 characters long, including spaces.
Configures data fields to be included a flow record. n application name: Specify the application name as a non-key
field in a flow record. n application https url: Specify the HTTP/HTTPS application
URL as a non-key field in a flow record. n dns response-code: Specify the DNS parameters and DNS
response code as a non-key field in the flow record. n counter packets: Collect counter data for packets in the flow n counter bytes: Collect counter data for bytes in the flow n timestamp absolute first: Collect absolute timestamp of the
first packet observed. n timestamp absolute last: Collect absolute timestamp of the
last packet observed.

Examples
Adding IPv4 and transport match fields to flow-record-1:

switch(config)# flow record flow-record-1 switch(config-flow-record)# match ip source address switch(config-flow-record)# match ip destination address switch(config-flow-record)# match ip protocol switch(config-flow-record)# match ip version switch(config-flow-record)# match transport source port switch(config-flow-record)# match transport destination port switch(config-flow-record)# description Record used for basic ipv4 traffic analysis

Removing the IPv4 destination match field from the flow-record-1:

switch(config)# flow record flow-record-1 switch(config-flow-record)# no match ip destination address

Adding counter and timestamp collect fields to flow-record-1:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

851

switch(config)# flow record flow-record-1 switch(config-flow-record)# collect counter packets switch(config-flow-record)# collect counter bytes switch(config-flow-record)# collect timestamp absolute first switch(config-flow-record)# collect timestamp absolute last

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Add a application name to flow record 1 as a collect field:
switch(config)# flow record flow-record-1 switch(config-flow-record)# collect application name switch(config-flow-record)# collect application https url switch(config-flow-record)# collect application dns response-code switch(config-flow-record)# collect application tls-attributes

Related Commands
Command flow exporter flow monitor
show flow record

Description
Define how a flow monitor exports the flow reports.
Define a flow monitor configuration, including the flow exporter and flow record associated to that monitor.
Display flow record configuration and status.

Command History
Release 10.14 10.13
10.11

Modification
The ipv4 parameter is deprecated and replaced with ip.
Added application https url and dns response-code parameters.
Command introduced.

Command Information

Platforms
6300 6400 (v2 profile only)

Command context
config config-flow-record

Authority
Administrators or local user group members with execution rights for this command.

flow-tracking
flow-tracking enable icmp-ageout interface-flow-limit

Flow monitoring commands | 852

no ... tcp-ageout track icmp udp-ageout
Description
Configures flow tracking for TCP and UDP flows, and optionally, ICMP flows. The no form of this command deletes the flow tracking configuration context. In order to optimize the flow removal process, flows that have aged-out are flushed in batches. A flow that has aged out is flushed only when the next batch processes. This can cause some flows to stay inactive for a slightly longer time than the value configured here.

Parameter enable icmp-ageout interface-flow-limit tcp-ageout track icmp udp-ageout

Description
Enables flow tracking.
Configures an age-out time for ICMP flows, in seconds. Range: 1086400. Default: 15.
Configures global concurrent flow limit for flow tracking enabled interfaces. Range: 64-25000. Default: none.
Configures age-out time for established TCP flows in seconds. Range: 120-86400. Default: 600.
Enable tracking of ICMP flows, in addition to the TCP/UDP flows tracked by default.
Configures age-out time for established UDP flows in seconds. Range: 30-86400. Default: 30.

Examples
Configuring flow tracking:

switch(config)# flow-tracking switch(config-flow-tracking)#

Deleting flow tracking:

switch(config)# no flow-tracking switch(config)#

Enabling flow tracking:

switch(config)# flow-tracking switch(config-flow-tracking)# enable

Disabling flow tracking:

switch(config)# flow-tracking switch(config-flow-tracking)# no enable

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

853

Configuring an established ICMP flow age-out to 600 seconds: switch(config)# flow-tracking switch(config-flow-tracking)# icmp-ageout 600
Removing an established ICMP flow age-out of 600 seconds: switch(config)# flow-tracking switch(config-flow-tracking)# no icmp-ageout 600
Configuring an established TCP flow age-out to 1000 seconds: switch(config)# flow-tracking switch(config-flow-tracking)# tcp-ageout 1000
Removing an established TCP flow age-out of 1000 seconds: switch(config)# flow-tracking switch(config-flow-tracking)# no tcp-ageout 1000
Configuring an established UDP flow age-out to 1000 seconds: switch(config)# flow-tracking switch(config-flow-tracking)# udp-ageout 1000
Removing an established UDP flow age-out of 1000 seconds: switch(config)# flow-tracking switch(config-flow-tracking)# no udp-ageout 1000
Configuring global level interface flow limit to 256 interfaces: switch(config)# flow-tracking switch(config-flow-tracking)# interface-flow-limit 256
Removing global level interface flow limit to 256 interfaces: switch(config)# flow-tracking switch(config-flow-tracking)# no interface-flow-limit 256
For more information on features that use this command, refer to the Monitoring Guide for your switch model.
Related Commands
Flow monitoring commands | 854

Command IP source lockdown resource extended

Description
no ip source-lockdown resource-extended must be disabled to enable flow-tracking

Command History

Release 10.14 10.13

Modification The track icmp parameter is introduced. Command introduced.

Command Information

Platforms
6300 6400 (v2 profile only)

Command context config

Authority
Administrators or local user group members with execution rights for this command.

ipv4|ipv6 flow monitor (interface)
[no] ip|ipv6 flow monitor <name> in
Description
Enable flow monitoring on inbound and outbound interfaces by assigning a flow monitor to that interface. Only physical interfaces and LAG interfaces can be monitored. A flow monitor cannot be applied to an interface that is part of a LAG. If an unsupported application is attempted, an error message will be displayed. If the flow monitor is associated with a flow record that contains application fields as collect fields, then Application Recognition should be enabled on the same interface. The [no] form of command disables the flow monitoring.
Examples
Associate a flow monitor configuration named flow-monitor-1 and flow-monitor-2 for IPv4 or IPv6 traffic respectively on physical interface.
switch(config)# interface 1/1/1 switch(config-if)# ip flow monitor flow-monitor-1 in switch(config-if)# ipv6 flow monitor flow-monitor-2 in
Associate a flow monitor configuration named flow-monitor-3 and flow-monitor-4 for IPv4 or IPv6 traffic respectively on a Lag interface.
switch(config)# interface lag 1 switch(config-lag-if)# ip flow monitor flow-monitor-3 in switch(config-lag-if)# ipv6 flow monitor flow-monitor-4 in

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

855

Related Commands
Command flow exporter flow record
flow monitor

Description
Define how a flow monitor exports the flow reports.
Define data to be included in a flow record by configuring flow record match and collect fields
Define a flow monitor configuration, including the flow exporter and flow record associated to that monitor.

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400 (v2 profile only)

Command context
config config-flow-monitor

Authority
Administrators or local user group members with execution rights for this command.

show flow exporter
show flow exporter [<name>] [statistics]
Description
Displays flow exporter statistics, configuration and status. When no exporter name is specified, the output of this command displays information for all flow exporters. The output of this command can indicate the following status types:
n Accepted n Rejected (Internal error: exporter does not exist) n Rejected (Internal error: destination type does not exist) n Rejected (Destination type is hostname or IP address, but no destination is specified) n Rejected (Destination type is hostname or IP address, but the specified hostname or IP address is
invalid) n Rejected (Destination type is Traffic Insight, but no destination is specified) n Rejected (Destination type is Traffic Insight, but the specified Traffic Insight instance does not exist) n Rejected (Destination type is Traffic Insight, but the specified Traffic Insight instance is not enabled) n Rejected (Destination type is Traffic Insight, but the specified Traffic Insight instance source is not
IPFIX) n Rejected (Internal error: destination type is Traffic Insight, but the specified Traffic Insight instance is
invalid)

Flow monitoring commands | 856

Parameter <name> statistics

Description Name of the flow exporter.
The statistics parameter adds statistical information about the flow exporter to the output.

Examples
Display the configuration of a flow exporter named exporter-1.

switch# show flow exporter exporter-1

--------------------------------------------------------------------------------

Flow exporter 'exporter-1'

--------------------------------------------------------------------------------

Description

: Exports to the first collector

Status

: Accepted

Export Protocol

: ipfix

Destination Type

: Hostname or IP address

Destination

: 192.168.0.1

Transport Configuration

Protocol

: UDP

Port

: 9995

Display statistics information for all flow exporters

switch# show flow exporter exporter-1 statistics

--------------------------------------------------------------------------------

Flow exporter 'exporter-1'

--------------------------------------------------------------------------------

Reports sent

: 14961

--------------------------------------------------------------------------------

Flow exporter 'exporter-2'

--------------------------------------------------------------------------------

Reports sent

:5

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Related Commands
Command flow exporter
Command History
Release 10.11
Command Information

Description Define how a flow monitor exports the flow reports.
Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

857

Platforms
6300 6400 (v2 profile only)

Command context
config config-flow-exporter

Authority
Administrators or local user group members with execution rights for this command.

show flow monitor
show flow monitor [<name>]
Description
Displays flow monitor configuration and status. When no monitor name is specified, the output of this command displays information for all flow monitors. The output of this command can indicate the following status types:
n Accepted n Rejected (Internal error: monitor does not exist) n Rejected (The state of one or more of the assigned flow exporters is rejected)

Parameter <name>

Description Name of the flow monitor.

Examples
Display the configuration of a flow moitor named flow-monitor-1.

switch# show flow monitor monitor-1

--------------------------------------------------------------------------------

Flow monitor 'monitor-1'

--------------------------------------------------------------------------------

Description

: Used for IPv4 traffic analysis

Status

: Accepted

Flow Exporter(s)

: exporter-1, exporter-2

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Related Commands
Command flow monitor
Command History

Description
Define a flow monitor configuration, including the flow exporter and flow associated to that monitor.

Flow monitoring commands | 858

Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400 (v2 profile only)

Command context
config config-flow-exporter

Authority
Administrators or local user group members with execution rights for this command.

show flow record
show flow record [<name>]
Description
Display flow record configuration and status. When no record name is specified, the output of this command displays information for all flow records. The output of this command can indicate the following status types:
n Accepted n Rejected (Internal error: failed to process record) n Rejected (Mix of IPv4 and IPv6 match fields is not allowed. Specify match fields of the same IP version
(IPv4 or IPv6))

Parameter <name>

Description Name of the flow record.

Examples
Display the configuration of a flow record named flow-record-1.

switch# show flow record record-1

--------------------------------------------------------------------------------

Flow record 'record-1'

--------------------------------------------------------------------------------

Description

: Used for IPv4 traffic analysis

Status

: Accepted

Match Fields

ipv4 destination address

ipv4 protocol

ipv4 source address

ipv4 version

transport destination port

transport source port

Collect Fields

application name

counter bytes

counter packets

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

859

Display the information of a specific flow record.

switch# show flow record record-1

--------------------------------------------------------------------------------

Flow record 'record-1'

--------------------------------------------------------------------------------

Description

: Used for IPv4 traffic analysis

Status

: Accepted

Match Fields

ipv4 destination address

ipv4 protocol

ipv4 source address

ipv4 version

transport destination port

transport source port

Collect Fields

application name

counter bytes

counter packets

Display information for all flow records

switch# show flow record

--------------------------------------------------------------------------------

Flow record 'record-1'

--------------------------------------------------------------------------------

Description

: Used for IPv4 traffic analysis

Status

: Accepted

Match Fields

ipv4 destination address

ipv4 protocol

ipv4 source address

ipv4 version

transport destination port

transport source port

Collect Fields

application name

counter bytes

counter packets

--------------------------------------------------------------------------------

Flow record 'record-2'

--------------------------------------------------------------------------------

Description

: Used for IPv6 traffic analysis

Status

: Accepted

Match Fields

ipv6 destination address

ipv6 protocol

ipv6 source address

ipv6 version

transport destination port

transport source port

Collect Fields

application name

counter bytes

counter packets

Flow monitoring commands | 860

```
Display information with no flow records configured
switch# show flow record No flow records configured

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Related Commands
Command flow record

Description
Define data to be included in a flow record by configuring flow record match and collect fields

Command History
Release 10.11

Modification
Command introduced on 6400, 6400, 8100, and 8360 Switch series.

Command Information

Platforms
6300 6400 (v2 profile only)

Command context
config config-flow-exporter

Authority
Administrators or local user group members with execution rights for this command.

show flow-tracking
show flow-tracking
Description
Displays flow-tracking and statistics collection configurations and status.
Examples
Display the configuration of role based flow tracking.

switch(config)# show flow-tracking

Flow Tracking Global Configuration

Configuration status

: Enabled

Operational status

: Enabled

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

861

Failure Reason

: NA

UDP Ageout

: 30 (Seconds)

TCP Ageout

: 600 (Seconds)

ICMP Ageout

: 15 (Seconds)

Interface Flow limit

: None

Tracked Protocols

: TCP, UDP

Statistics Collection

Configuration Status

: Enabled

Operational Status

: Enabled

Failure Reason

: NA

Flow Tracking Port Configuration

Interface

App Recognition Reflexive ACL

Status

-----------

-----------

----------------

-

1/1/1

Enabled

Disabled

1/1/2

Enabled

Disabled

1/1/3

Enabled

Disabled

1/1/4

Enabled

Disabled

1/1/5

Enabled

Disabled

1/1/6

Enabled

Disabled

1/1/7

Enabled

Disabled

1/1/8

Enabled

Disabled

1/1/9

Enabled

Disabled

1/1/10

Disabled

Disabled

Disabled

1/1/13

Enabled

Disabled

1/1/14

Enabled

Disabled

1/1/15

Enabled

Disabled

1/1/16

Enabled

Disabled

1/1/17

Enabled

Disabled

1/1/18

Enabled

Disabled

1/1/19

Enabled

Disabled

1/1/20

Enabled

Disabled

1/1/21

Enabled

Disabled

1/1/23

Enabled

Disabled

1/1/24

Enabled

Disabled

1/1/28

Disabled

Disabled

Disabled

IPFIX
----------
Enabled Disabled Disabled Disabled Disabled Disabled Enabled Disabled Disabled Disabled
Enabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Enabled Disabled

Operation
---------
Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled
Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Related Commands
Command IP source lockdown resource extended
Command History

Description
IP source lockdown must be disabled with the no ip sourcelockdown resource-extended command before enabling flowtracking

Flow monitoring commands | 862

Release 10.14 10.14 10.13

Command Information

Platforms
6300 6400 (v2 profile only)

Command context config

Modification Added information related to role based IPFIX. The output of this command includes ICMP ageout information. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

show tech ipfix
show tech ipfix
Description
Shows the IPFIX configuration settings. If applicable source IP address or source interface is configured for the IPFIX protocol, that configuration is used. If a valid source is configured, the exporter sends flows to an external collector using the effective configured source IP address as the source IP address of the flow packets. In the context of this application, a valid source IP address is any IP address configured in the exporter's VRF namespace.
Examples
The example shows the IPFIX configuration settings.

switch#show tech ipfix

====================================================

Show Tech executed on Tue Apr 11 02:43:06 2023

====================================================

====================================================

[Begin] Feature ipfix

====================================================

*********************************

Command : show flow exporter

*********************************

--------------------------------------------------------------------------------

Flow exporter 'ipfix'

--------------------------------------------------------------------------------

Status

: Accepted

Export Protocol

: ipfix

Destination Type

: Traffic Insight

Destination

: t1

Transport Configuration

Protocol

: udp

Port

: 4739

--------------------------------------------------------------------------------

Flow exporter 'V6E1'

--------------------------------------------------------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

863

....
==================================================== [End] Feature ipfix ====================================================

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms
6300 6400 (v2 profile only)

Command context Manager (#)

Modification Command introduced on 6400, 6400, 8100, and 8360 Switch series.
Authority Administrators or local user group members with execution rights for this command.

Flow monitoring commands | 864

Chapter 44 Group based policy commands

Group based policy commands

class gbp-ip
[no] class gbp-ip <CLASS-NAME>
[no][<SEQUENCE-NUMBER>] {match | ignore} {any | <SRC-ROLE-NAME> | default} {any | <DST-ROLE-NAME>} [count]
[no][<SEQUENCE-NUMBER>] {match | ignore} {sctp | tcp | udp} {any | <SRC-ROLE-NAME> | default} [{eq | gt | lt} <PORT-NUMBER> | range <MIN-PORT> <MAX-PORT>] {any | <DST-ROLE-NAME>} [{eq | gt | lt} <PORT-NUMBER> | range <MIN-PORT> <MAX-PORT>] [count]
[no][<SEQUENCE-NUMBER>] {match | ignore} {icmp} {any | <SRC-ROLE-NAME> | default} {any | <DST-ROLE-NAME>} [icmp-type {echo | echo-reply | <ICMP-TYPE-VALUE>}] [icmp-code <ICMP-CODE-VALUE>] [count]
[no] [<SEQUENCE-NUMBER>] {match | ignore} {any | tcp | udp | icmp} {any | <SRC-ROLE-NAME> | default | infra| internet| intranet} {<DST-ROLE-NAME>} [app-category {any | <APP-CATEGORY-NAME>} app {any | <APP-NAME>}] [count]
[no] [<SEQUENCE-NUMBER>] comment <TEXT-STRING>
[no] class gbp-ip <CLASS-NAME> resequence <STARTING-SEQUENCE-NUMBER> <INCREMENT>
[no] class gbp-ip <CLASS-NAME> copy <DESTINATION-CLASS>

Description
Creates, deletes, or modifies an IPv4 Group-Based Policy (GBP) class to match specified protocol packets. A class consists of one or more class entries ordered and prioritized by sequence numbers. Each class can classify traffic based on IPv4 protocol header information. The no keyword deletes either a class or an individual class entry.
Usage

AOS-CX 10.14 Command-Line Interface Guide

865

n Entering an existing <CLASS-NAME> value modifies the existing class. n Any new <SEQUENCE-NUMBER> value creates an additional class entry. n Any existing <SEQUENCE-NUMBER> value replaces the existing class entry with the same sequence
number. n If no sequence number is specified, a new class entry will be appended with a sequence number
equal to the highest policy entry currently in the list plus 10. n Copying a class to an existing class overwrites the existing entries with new entries. n Removing a GBP class with entries removes all its entries as well. If a GBP class, that is currently
associated with a GBP policy, is attempted to be removed, then a warning message is presented to remove the association before removing the class. n You can reorder the sequence numbers with the class resequence command. n You can also create redundant class entries in a class that have the same match criteria and action. However, each redundant copy of the class entry will consume additional resources.

Parameter <CLASS-NAME> <SEQUENCE-NUMBER>
{match | ignore} <SRC-ROLE-NAME> <DST-ROLE-NAME> <PORT-NUMBER>

Description Specifies the class name. Specifies the class entry sequence number. Range: 1 to 4294967295. Creates a rule to ignore or match specified IPv4 packets. Specifies the source role name. Specifies the destination role name. Specifies the layer 4 port number. Range: 0 to 65535.

<MIN-PORT> <MAX-PORT> <ICMP-TYPE-VALUE> <ICMP-CODE-VALUE> <app-category-name>

Specifies the start port number in the range. Range: 0 to 65535.
Specifies the end port number in the range. Range: 0 to 65535.
Specifies a valid ICMP type number. Range: 0 to 255.
Specifies a valid ICMP code number. Range: 0 to 255.
(For 6300 and 6400 Switch series) Application-based policies can be applied to any of the following application types: n antivirus-- Antivirus updates n any-- Matches all recognized flows irrespective of their
application id n authentication-- Protocol used for authentification purposes n behavioral-- Protocol classified by non-deterministic criteria
based on statistical analysis of packet form and session behavior n cloud-file-storage-- Cloud File Storage related applications n collaboration-- Collaboration applications n encrypted-- Encryption protocol applications

Group based policy commands | 866

Parameter <app-name>

Description
n enterprise-apps--Enterprise applications n gaming--Gaming protocol and applications n im-file-transfer-- IM File Transfer application category n instant-messaging-- Instant Messaging applications n mail-protocols-- Email exchange protocol n mobile--Mobile applications n mobile-app-store--Mobile app store and applications n network-service--Low level network protocol and applications n peer-to-peer--Peer-to-Peer applications n social-networking--Social Networking applications n standard-- Standard applications n streaming-- Streaming applications n thin-client--Remote control protocol and applications n tunneling-- Tunneling protocol and applications n unified-communications--Unified Communication protocols
and applications n unknown--Unknown applications n web--Generic web traffic n webmail-- Web email applications
(For 6300 and 6400 Switch series) Configure a class for the specified application.
NOTE: The app <unknown> under the app-category <standard> matches all recognized flows whose application id is unknown or unmapped.

Examples
Creating a group based policy IPv4 class with three entries:
switch(config)# class gbp-ip my_gbp_ip_class switch(config-class-gbp-ip)# 1 match icmp any any switch(config-class-gbp-ip)# 2 ignore udp default any switch(config-class-gbp-ip)# 3 match tcp guest admin switch(config-class-gbp-ip)# 4 count
Adding a comment to an existing GBP IPv4 class entry:
switch(config)# class gbp-ip my_gbp_ip_class switch(config-class-gbp-ip)# 3 comment mygbpipClass
Removing a comment from an existing class entry:
switch(config)# class gbp-ip my_gbp_ip_class switch(config-class-gbp-ip)# no 3 comment
Replacing an IPv4 class entry in an existing GBP IPv4 class:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

867

switch(config)# class gbp-ip my_gbp_ip_class switch(config-class-gbp-ip)# 1 match igmp any any
Resequencing a GBP IPv4 class:
switch(config)# class gbp-ip my_gbp_ip_class resequence 1 10
Removing a GBP IPv4 class entry:
switch(config)# class gbp-ip my_gbp_ip_class switch(config-class-gbp-ip)# no 1
Copying a GBP class entries from the source to the destination:
switch(config)# class gbp-ip my_gbp_ip_class copy my_gbp_ip_class2
Removing a GBP IPv4 class:
switch(config)# no class gbp-ip my_gbp_ip_class
Configuring a GBP policy that allows an SSH connection from employee to admin but denies telnet and any other applications.
For more information on configuring a port-access GBP policy, refer to port-access gbp
class gbp-ip class-ssh 10 match any employee admin app-category any app ssh count
class gbp-ip class-telnet 10 match any employee admin app-category any app telnet count
class gbp-ip class-any-any 10 match any employee admin app-category any app any count
class gbp-ip class-network-service 10 match any employee admin app-category network-service app any count
class gbp-ip explicit-allow-for-app-rec 10 match any employee admin
port-access gbp policy 10 class gbp-ip class-ssh 20 class gbp-ip class-telnet action drop 30 class gbp-ip class-any-any action drop 40 class gbp-ip explicit-allow-for-app-rec
NOTE: Class entry with sequence number 40 is required to enable application recognition for any flow that is not assigned an application ID yet. Once the application ID is assigned, subsequent packets from the flow will match the corresponding app based entry in the policy (if one is configured).
Configuring a GBP policy that denies telnet connections from employee to admin but allows SSH and other applications.
Group based policy commands | 868

port-access gbp policy 10 class gbp-ip class-ssh 20 class gbp-ip class-telnet action drop 40 class gbp-ip explicit-allow-for-app-rec

NOTE: In this example, a class entry with sequence number 40 is required to enable application recognition for any flow that is not assigned an application ID yet. Once the application ID is assigned, subsequent telnet flows will match entry 20 and be dropped while SSH and other applications will match entry 10 and 40 respectively. Entry 40 in this example will also match flows that have the application recognized and are not SSH or telnet.
OR
port-access gbp policy 10 class gbp-ip class-ssh 20 class gbp-ip class-telnet action drop 30 class gbp-ip class-any-any 40 class gbp-ip explicit-allow-for-app-rec

NOTE: In this case, an explicit entry, 30, is added for allowing flows from any apps that are not SSH or telnet. Entry 40 will only be used when an application is yet to be recognised for a flow.
Configuring a GBP policy that denies telnet connections from employee to admin but allows SSH and other applications in the network service category.
port-access gbp policy 10 class gbp-ip class-ssh 20 class gbp-ip class-telnet action drop 30 class gbp-ip class-network-service 40 class gbp-ip explicit-allow-for-app-rec
Configuring a GBP policy that allows telnet connection from employee to admin but denies all other apps in the network service category.
port-access gbp policy 20 class gbp-ip class-telnet 30 class gbp-ip class-network-service action drop 40 class gbp-ip explicit-allow-for-app-rec

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.14
10.08

Modification
Added support for application-based roles for the 6300 and 6400 switch series
Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

869

Command Information

Platforms
6300 6400

Command context
config config-class-<CLASS-TYPE>

Authority
Administrators or local user group members with execution rights for this command.

class gbp-ipv6
class gbp-ipv6 <CLASS-NAME> [no][<SEQUENCE-NUMBER>] {match | ignore} {any | <SRC-ROLE-NAME> | default} {any | <DST-ROLE-NAME>} [count]
[no][<SEQUENCE-NUMBER>] {match | ignore} {sctp | tcp | udp} {any | <SRC-ROLE-NAME> | default} [{eq | gt | lt} <PORT-NUMBER> | range <MIN-PORT> <MAX-PORT>] {any | <DST-ROLE-NAME>} [{eq | gt | lt} <PORT-NUMBER> | range <MIN-PORT> <MAX-PORT>] [count]
[no][<SEQUENCE-NUMBER>] {match | ignore} {icmpv6} {any | <SRC-ROLE-NAME> | default} {any | <DST-ROLE-NAME>} [icmp-type {echo | echo-reply | <ICMP-TYPE-VALUE>}] [icmp-code <ICMP-CODE-VALUE>] [count]
[no]class gbp-ipv6 <CLASS-NAME> resequence <STARTING-SEQUENCE-NUMBER> <INCREMENT>
[no] class gbp-ipv6 <CLASS-NAME> copy <DESTINATION-CLASS>
Description
Creates, deletes, or modifies an IPv6 Group-Based Policy (GBP) class to match specified protocol packets.. A class consists of one or more class entries ordered and prioritized by sequence numbers. Each class can classify traffic based on IPv6 protocol header information. The no keyword deletes either a class or an individual class entry.
Usage
n Entering an existing <CLASS-NAME> value modifies the existing class. n Any new <SEQUENCE-NUMBER> value creates an additional class entry. n Any existing <SEQUENCE-NUMBER> value replaces the existing class entry with the same sequence
number. n If no sequence number is specified, a new class entry will be appended with a sequence number
equal to the highest policy entry currently in the list plus 10. n Copying a class to an existing class overwrites the existing entries with new entries.

Group based policy commands | 870

n Removing a GBP class with entries removes all its entries as well. If a GBP class, that is currently associated with a GBP policy, is attempted to be removed, then a warning message is presented to remove the association before removing the class.
n You can reorder the sequence numbers with the class resequence command.
n You can also create redundant class entries in a class that have the same match criteria and action. However, each redundant copy of the class entry will consume additional resources.

Parameter <CLASS-NAME> <SEQUENCE-NUMBER>
{match | ignore} <SRC-ROLE-NAME> <DST-ROLE-NAME> <PORT-NUMBER>

Description Specifies the class name. Specifies the class entry sequence number. Range: 1 to 4294967295. Creates a rule to ignore or match specified IPv6 packets. Specifies the source role name. Specifies the destination role name. Specifies the layer 4 port number. Range: 0 to 65535.

<MIN-PORT> <MAX-PORT> <ICMP-TYPE-VALUE> <ICMP-CODE-VALUE> <app-category-name>

Specifies the start port number in the range. Range: 0 to 65535.
Specifies the end port number in the range. Range: 0 to 65535.
Specifies a valid ICMP type number. Range: 0 to 255.
Specifies a valid ICMP code number. Range: 0 to 255.
(For 6300 and 6400 Switch series) Application-based policies can be applied to any of the following application types: n antivirus-- Antivirus updates n any-- Matches all recognized flows irrespective of their
application id n authentication-- Protocol used for authentification purposes n behavioral-- Protocol classified by non-deterministic criteria
based on statistical analysis of packet form and session behavior n cloud-file-storage-- Cloud File Storage related applications n collaboration-- Collaboration applications n encrypted-- Encryption protocol applications n enterprise-apps--Enterprise applications n gaming--Gaming protocol and applications n im-file-transfer-- IM File Transfer application category n instant-messaging-- Instant Messaging applications n mail-protocols-- Email exchange protocol n mobile--Mobile applications n mobile-app-store--Mobile app store and applications n network-service--Low level network protocol and applications

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

871

Parameter <app-name>

Description
n peer-to-peer--Peer-to-Peer applications n social-networking--Social Networking applications n standard-- Standard applications n streaming-- Streaming applications n thin-client--Remote control protocol and applications n tunneling-- Tunneling protocol and applications n unified-communications--Unified Communication protocols
and applications n unknown--Unknown applications n web--Generic web traffic n webmail-- Web email applications
(For 6300 and 6400 Switch series) Configure a class for the specified application.
NOTE: The app <unknown> under the app-category <standard> matches all recognized flows whose application id is unknown or unmapped.

Examples
Creating a group based policy IPv6 class with three entries:
switch(config)# class gbp-ipv6 my_gbp_ipv6_class switch(config-class-gbp-ipv6)# 10 match icmpv6 any any switch(config-class-gbp-ipv6)# 20 ignore udp default any
Adding a comment to an existing GBP IPv6 class entry:
switch(config)# class gbp-ipv6 my_gbp_ipv6_class switch(config-class-gbp-ipv6)# 10 match icmpv6 any any switch(config-class-gbp-ipv6)# 20 ignore udp default any switch(config-class-gbp-ipv6)# 20 comment myipv6Class
Removing a comment from an existing class entry:
switch(config)# class gbp-ipv6 my_gbp_ipv6_class switch(config-class-gbp-ipv6)# no 20 comment
Replacing an IPv6 class entry in an existing GBP IPv6 class:
switch(config)# class gbp-ipv6 my_gbp_ipv6_class switch(config-class-gbp-ipv6)# 10 match any any admin
Resequencing a GBP IPv6 class:
switch(config)# class gbp-ipv6 my_gbp_ipv6_class resequence 1 1
Removing a GBP IPv6 class entry:

Group based policy commands | 872

switch(config)# class gbp-ipv6 my_gbp_ipv6_class switch(config-class-gbp-ipv6)# no 1
Copying a GBP class entries from the source to the destination:
switch(config)# class gbp-ipv6 my_gbp_ipv6_class copy my_gbp_ipv6_class2
Removing a GBP IPv6 class:
switch(config)# no class gbp-ipv6 my_gbp_ipv6_class
Configuring a GBP policy that allows an SSH connection from employee to admin but denies telnet and any other applications. For more information on configuring a port-access GBP policy, refer to port-access gbp

class gbp-ipv6 class-ssh 10 match any employee admin app-category any app ssh count
class gbp-ipv6 class-telnet 10 match any employee admin app-category any app telnet count
class gbp-ipv6 class-any-any 10 match any employee admin app-category any app any count
class gbp-ipv6 class-network-service 10 match any employee admin app-category network-service app any count
class gbp-ipv6 explicit-allow-for-app-rec 10 match any employee admin
port-access gbp policy 10 class gbp-ipv6 class-ssh 20 class gbp-ipv6 class-telnet action drop 30 class gbp-ipv6 class-any-any action drop 40 class gbp-ipv6 explicit-allow-for-app-rec

NOTE: Class entry with sequence number 40 is required to enable application recognition for any flow that is not assigned an application ID yet. Once the application ID is assigned, subsequent packets from the flow will match the corresponding app based entry in the policy (if one is configured).

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.14 10.08
Command Information

Modification
Added support for application-based roles for the 6300 and 6400 switch series
Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

873

Platforms
6300 6400

Command context
config config-class-<CLASS-TYPE>

Authority
Administrators or local user group members with execution rights for this command.

class gbp-mac
class gbp-mac <CLASS-NAME> [<SEQUENCE-NUMBER>] {match | ignore} {any | <SRC-ROLE-NAME> | default} {any | <DST-ROLE-NAME>} {any | aarp | appletalk | arp | fcoe | fcoe-init | ip | ipv6 | ipx-arpa | ipx-nonarpa |is-is | lldp | mpls-multicast | mpls-unicast | q-in-q | rbridge | trill |wakeon-lan | <NUMERIC-ETHERTYPE>} [count]
[<SEQUENCE-NUMBER>] comment <TEXT-STRING>
class gbp-mac <CLASS-NAME> resequence <STARTING-SEQUENCE-NUMBER> <INCREMENT>
class gbp-mac <CLASS-NAME> copy <DESTINATION-CLASS>
no class gbp-mac <CLASS-NAME> no [<SEQUENCE-NUMBER>] {match | ignore} {any | <SRC-ROLE-NAME> | default} {any | <DST-ROLE-NAME>} {any | aarp | appletalk | arp | fcoe | fcoe-init | ip | ipv6 | ipx-arpa | ipx-nonarpa |is-is | lldp | mpls-multicast | mpls-unicast | q-in-q | rbridge | trill |wakeon-lan | <NUMERIC-ETHERTYPE>}[ count] no [<SEQUENCE-NUMBER>] comment <TEXT-STRING>
Description
Creates, deletes, or modifies class to match specified protocol packets. A class consists of one or more class entries ordered and prioritized by sequence numbers. Each class can classify traffic based on MAC information. The no keyword deletes either a class or an individual class entry.
Usage
n Entering an existing <CLASS-NAME> value modifies the existing class. n Any new <SEQUENCE-NUMBER> value creates an additional class entry. n Any existing <SEQUENCE-NUMBER> value replaces the existing class entry with the same sequence
number. n If no sequence number is specified, a new class entry will be appended with a sequence number
equal to the highest policy entry currently in the list plus 10. n Copying a class to an existing class overwrites the existing entries with new entries. n Removing a GBP class with entries removes all its entries as well. If a GBP class, that is currently
associated with a GBP policy, is attempted to be removed, then a warning message is presented to remove the association before removing the class. n You can reorder the sequence numbers with the class resequence command.

Group based policy commands | 874

n You can also create redundant class entries in a class that have the same match criteria and action. However, each redundant copy of the class entry will consume additional resources.

Parameter <CLASS-NAME> <SEQUENCE-NUMBER>
{match | ignore} <SRC-ROLE-NAME> <DST-ROLE-NAME> <NUMERIC-ETHERTYPE>

Description Specifies the class name. Specifies the class entry sequence number. Range: 1 to 4294967295. Creates a rule to ignore or match specified packets. Specifies the source role name. Specifies the destination role name. Specifies the EtherType number. Range: 0x600 to 0xffff.

Examples
Creating a GBP MAC class with three entries:
switch(config)# class gbp-mac my_gbp_mac_class switch(config-class-gbp-mac)# 1 match any any lldp switch(config-class-gbp-mac)# 2 ignore default any arp
Adding a comment to an existing GBP MAC class entry:
switch(config)# class gbp-mac my_gbp_mac_class switch(config-class-gbp-mac)# 10 comment myGbpMacClass
Removing a comment from an existing class entry:
switch(config)# class gbp-mac my_gbp_mac_class switch(config-class-gbp-mac)# no 10 comment myGbpMacClass
Replacing a MAC class entry in an existing GBP MAC class:
switch(config)# class gbp-mac my_gbp_mac_class switch(config-class-gbp-mac)# 10 match any any any
Resequencing a GBP MAC class:
switch(config)# class gbp-mac my_gbp_mac_class resequence 1 1
Removing a GBP MAC class entry:
switch(config)# class gbp-mac my_gbp_mac_class switch(config-class-gbp-mac)# no 1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

875

Copying a GBP class entries from the source to the destination: switch(config)# class gbp-mac my_gbp_mac_class copy my_gbp_mac_class2
Removing a GBP MAC class: switch(config)# no class gbp-mac my_gbp_mac_class

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.08

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
config config-class-<CLASS-TYPE>

Authority
Administrators or local user group members with execution rights for this command.

clear port-access gbp hitcounts
clear port-access gbp [<POLICY-NAME>] hitcounts {client}
Description
Clears the statistics of the group based policy applied on the client.

Parameter <TLV-NUMBER>

Description
Specifies the CDP TLV number. Supported values are 1 to 6, 10, and 11.

Examples
Clearing statistics of GBP applied on the client:

switch(config)# clear port-access gbp policy01 hitcounts {client}

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

Group based policy commands | 876

Release 10.08

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
config config-class-<CLASS-TYPE>

Authority
Administrators or local user group members with execution rights for this command.

gbp enable
gbp enable no gbp enable
Description
Enables group based policy (GBP). The no form of this command disables group based policy (GBP).
Examples
Enabling group based policy:
switch(config)# gbp enable
Disabling group based policy:
switch(config)# no gbp enable

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-class-<CLASS-TYPE>

Authority
Administrators or local user group members with execution rights for this command.

gbp role
gbp role <ROLE_NAME> <ROLE_ID>

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

877

no gbp role <ROLE_NAME> <ROLE_ID>

Description
Maps the role name to the role ID. This mapping is used in the GBP encapsulation.
Starting from 10.13, for 6300 and 6400 switch series, new default roles, internet and intranet are introduced to differentiate traffic from different fabrics or networks. It is necessary to ensure that the reserved system role names are available before upgrading to AOS-CX 10.13. Any existing user defined system roles that use the role names, internet and intranet should be removed and reconfigured with a different role name.
The no form of this command removes the mapping between the role name and ID.

Parameter <ROLE_NAME>

Description Specifies the role name to be mapped.

<ROLE_ID>

Specifies the role ID. Range: 100 to 8191.

Examples
Mapping the employee role to the role ID 130:

switch(config)# gbp role employee 130

Removing the mapping for the role employee:

switch(config)# no gbp role employee 130

The following error message is displayed when user attempts to delete a GBP role which is used inside a policy:

switch(config)# no gbp role finance Role 'finance' is present inside a class. Deletion of role mapping will impact the traffic flow. Do you want to continue (y/n)? y

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08
Command Information

Modification Command introduced

Group based policy commands | 878

Platforms
6300 6400

Command context
config config-class-<CLASS-TYPE>

Authority
Administrators or local user group members with execution rights for this command.

gbp role infra
gbp role infra <TAG-VALUE> no gbp role infra [<TAG-VALUE>]
Description
Sets the GBP infra (infrastructure) role tag value for CPU-generated packets. Prior to AOS-CX 10.09, CPU generated traffic and non-secure port traffic was tagged with a default tag of 0. This does not apply to CPU re-forwarded packets (DHCP snooping (v4, v6), ND snooping, RA guard, captive portal, IGMP, MLD, and mDNS). The no form of this command resets the GBP infra tag value to its default of 2.
The same GBP infra role tag value must be used across the VXLAN network fabric.

Parameter <TAG-VALUE>

Description
Specifies the infra tag value to use for CPU-generated packets. Range: 1 to 8191. Default: 2.

Examples
Setting the GBP infra tag value to 10:

switch(config)# gbp role infra 10

Resetting the GBP infra tag value to its default of 2:

switch(config)# no gbp role infra

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08
Command Information

Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

879

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

port-access gbp
port-access gbp <POLICY-NAME> [<SEQUENCE-NUMBER>] class {gbp-ip | gbp-ipv6 | gbp-mac} <CLASS-NAME> [action {drop | reflect}] [<SEQUENCE-NUMBER>] comment <TEXT-STRING>
port-access gbp <POLICY-NAME> resequence <STARTING-SEQUENCE-NUMBER> <INCREMENT> port-access gbp <POLICY-NAME> copy <DESTINATION-POLICY> port-access gbp <POLICY-NAME> reset
[no] [<SEQUENCE-NUMBER>] class {gbp-ip | gbp-ipv6 | gbp-mac} <CLASS-NAME> [action {drop | reflect}]
[no] [<SEQUENCE-NUMBER>] comment <TEXT-STRING>
Description
Creates, deletes, or modifies a group based policy and its entries. Group based policy consists of one or more policy entries that are ordered and prioritized by sequence numbers. Each entry has a GBP-IPv4, GBP-IPv6, or a GBP-MAC class, and corresponding drop or permit policy actions associated with it. A group-based policy has an implicit permit rule to allow any traffic originating from the source role infra. The no form of the command deletes either a group based policy or an individual policy entry. When configuring GBP-MAC class along with other classes, you must configure the GBP-MAC class entry at the end. For example, if you configure as shown below: port-access gbp gbp1
class gbp-mac class1 class gbp-ip class2 action drop Although, you would want to drop GBP-IPv4 traffic, it will be allowed because traffic will be allowed because of the MAC rule. In order to drop traffic, you must configure as show below: port-access gbp gbp1 class gbp-ip class2 action drop class gbp-mac class1
Usage
To use a GBP, you must associate the policy with a role using the associate gbp command.
n A group based policy that is in use cannot be removed from the configuration. To remove, the policy must be unassociated with the roles currently using the policy.
n Entering an existing <POLICY-NAME> value modifies the existing policy, with any new sequence number creating an additional policy entry, and any existing sequence number replacing the existing policy entry with the same sequence number.
n If no sequence number is specified, a new policy entry will be appended with a sequence number equal to the highest policy entry currently in the list plus 10.
n You can reorder the sequence numbers with the class resequence command.

Group based policy commands | 880

Parameter <POLICY-NAME>
<SEQUENCE-NUMBER>
class-type <CLASS-NAME> action

Description
Specifies the class name.
Specifies the policy entry sequence number. Range: 1 to 4294967295.
Specifies the type of class to associate with the policy.
Specifies the class name.
Specifies the action for the class. The default action is to permit all traffic, if the action is not specified as drop explicitly. Other available actions are: drop
Selects drop of all traffic. reflect
Enables the switch to allow a packet destined to the client only if the flow is learned (the flow is initiated by the client).

Examples
Creating a policy and associating it with GBP IPv4 class to permit all traffic:
switch(config)# port-access gbp policy01 switch(config-pa-role)# 10 class my_gbp_ip_class
Creating a policy and associating it with GBP MAC class to deny all traffic:
switch(config)# port-access gbp policy01 switch(config-pa-role)# 10 class my_gbp_mac_class action drop

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13 10.08

Modification Added support for reflexive policies. Command introduced

Command Information

Platforms
6300 6400

Command context
config config-class-<CLASS-TYPE>

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

881

port-access reflexive
port-access reflexive {gbp|policy} enable no...
Description
This command enables the use of reflexive port access and group-based policies. Regular stateless policies allow or deny traffic in the ingress or the egress direction. As a result, reverse traffic that belongs to the same flow will require a separate policy in the opposite direction. This can require complex policies that can be difficult to manage. When reflexive port access policies are enabled, the switch maintains an internal flow table for permitted traffic, and automatically allows return traffic for permitted flows. When reflexive port access or group-based policies are enabled using this command, all existing portaccess clients associated with a reflexive port-access policy, application based policy or group-based policy are logged off from the system. The no form of the command disables reflexive policies and returns port access and group-based policies to the regular stateless status.
This feature can only be used with TCP/UDP Unicast traffic protocols. Protocols like TFTP, DHCP, and ICMP that use a different IP address or port in the request and the corresponding response must not be configured as a reflect entry.

Parameter gbp policy

Description Enables reflexive group-based policies. Enables reflexive port access policies.

Prerequisites
Before you can enable reflexive policies, you must first configure a role ID using the following command:

switch(config)# gbp role <ROLE_NAME> <ROLE_ID>

Next,, enable flow tracking using the following commands:

switch(config)# no ip source-lockdown resource-extended Do you want to continue (y/n)? y
switch(config)# flow-tracking switch(config-flow-tracking)# enable

Examples
Enable reflexive port-access policies:

switch(config)# port-access reflexive policy enable

Enable reflexive group-based policies:

Group based policy commands | 882

switch(config)# port-access reflexive gbp enable

Creating a policy with two entries with reflexive action:

switch(config)# port-access policy CPPM switch(config-pa-policy)# 10 class ip dns action reflect switch(config-pa-policy)# 20 class ip ssh action reflect switch(config-pa-policy)# 30 class ip clearpass-web action cir kbps 1024 cbs 2048 exceed drop switch(config-pa-policy)# 40 class ip web-traffic action redirect captive-portal switch(config-pa-policy)# exit switch(config)# show port-access policy

Access Policy Details: ======================

Policy Name : CPPM Policy Type : Local Policy Status : Applied

SEQUENCE

CLASS

TYPE ACTION

-------- ------------ ---- ---------------------------

10

dns

ipv4 reflect

20

ssh

ipv4 reflect

30

clearpass-web

ipv4 cir kbps 1024 cbs 2048 exceed drop

40

web-traffic

ipv4 redirect captive-portal

The Reflect action enables the switch to allow a packet destined to the client only if the flow is learned, that is, the flow is initiated by the client.

Command History

Release 10.13

Modification Command introduced.

Command Information

Platforms
6300 6400v2

Command context
config config-class-<CLASS-TYPE>

Authority
Administrators or local user group members with execution rights for this command.

port-access role associate gbp
port-access role <ROLE-NAME> associate gbp <POLICY-NAME>
no port-access role <ROLE-NAME> no associate gbp <POLICY-NAME>
Description
Associates a group based policy with a role. The no form of this command dissociates the policy from the role.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

883

Parameter <ROLE-NAME> <POLICY-NAME>

Description Specifies the role name. Specifies the group based policy name to associate with the role.

Examples
Associating a policy with a role:
switch(config)# port-access role EMPLOYEE switch(config-pa-role)# associate gbp GROUPPOLICY
Dissociating a policy from the role:
switch(config)# port-access role EMPLOYEE switch(config-pa-role)# no associate GBP

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
config config-class-<CLASS-TYPE>

Authority
Administrators or local user group members with execution rights for this command.

show class
show class {gbp-ip | gbp-ipv6 | gbp-mac} <CLASS-NAME> [commands] [configuration]
Description
Shows details of class configuration and its entries. Displays the active configuration providing the list of classes that have been configured and accepted by the system.
Usage
The show class command along with the configuration option displays the classes that are configured. The output of this command may not be the same as what is active due to unsupported command parameters or if the class was modified after the GBP policy was applied and might have been unsuccessful due to a lack of hardware resources. To determine if there is a discrepancy between what was configured and what is active, compare the output of the show class and the show class

Group based policy commands | 884

configuration commands. If the active class configuration and the configured class is not the same, a warning message is displayed to help troubleshoot the difference.

Parameter <CLASS-NAME>

Description Specifies the class name.

Examples
Showing configured GBP classes:

switch# show classshow class gbp-ip my_gbp_ip_class

Type

Name

Sequence Comment

Action

L3 Protocol

Source Role Name

Source L4 Port(s)

Destination Role Name

Destination L4 Port(s)

Additional Parameters

-------------------------------------------------------------------------------

GBP-IPv4 my_gbp_ip_class

1 match

icmp

any

admin

2 ignore

udp

default

admin

3 match

tcp

guest

admin

4 match

tcp

guest

admin

App-Category: social-networking

App-Name: facebook

Hit-counts: enabled

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
config config-class-<CLASS-TYPE>

Authority
Administrators or local user group members with execution rights for this command.

show gbp role-mapping
show gbp role-mapping

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

885

Description
Shows the list of default and configured mappings between role name and role ID.
Examples
Showing details of role name to role iD mapping:

switch (config)# show gbp role-mapping

GBP status : Enabled

GBP_ROLE

GBP_ROLE_ID

-------------

---------------

employee

130

admin

200

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.08

Modification Command introduced

Command Informations

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show port-access gbp
show port-access gbp [<POLICY-NAME>]
Description
Shows details of the group based policies and its current usage.

Parameter <POLICY-NAME>

Description Specifies the GBP policy name.

Examples
Showing details of group based policy:

switch (config)# show port-access gbp
Port Access GBP Details: ======================

Group based policy commands | 886

GBP Name : plcy GBP Type : Local GBP Status : Rejected

SEQUENCE CLASS

TYPE

ACTION

----------- ---------------------------- -------- --------------------------------

--

10

cs

gbp-ipv4 drop

20

cls6

gbp-ipv6 permit

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.08

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
config config-class-<CLASS-TYPE>

Authority
Administrators or local user group members with execution rights for this command.

show port-access gbp hitcounts
show port-access gbp [<POLICY-NAME>] hitcounts {client}
Description
Shows statistics of the group based policy applied on the client. The output of this command helps to identify the group based policy entries that are currently matched.

Parameter <POLICY-NAME>

Description Specifies the GBP policy name.

Examples
Showing GBP statistics:

switch (config)# show port-access gbp gbp2000 hitcounts

Port Access GBP Hit-Counts Details: ======================================

GBP Name : gbp2000 GBP Type : Local GBP Status : Applied

SEQUENCE CLASS

TYPE

ACTION

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

887

----------- -------------------------------- -------- -----------------------

10

class2000

gbp-ipv4 permit

15

classinfra

gbp-ipv4 permit

30

classmacinfra

gbp-mac permit

Class Name : class2000 Class Type : gbp-ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match tcp Role6 Role1 count

10

20

match udp default Role1 count

0

Class Name : classinfra Class Type : gbp-ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match udp infra Role1 count

4

20

match icmp infra Role1 count

5

Class Name : classmacinfra Class Type : gbp-mac

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match arp infra Role1 count

0

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.08

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Group based policy commands | 888

Chapter 45 High Availability Commands

High Availability Commands
redundancy switchover
redundancy switchover
Description
Causes the switch to immediately switch over to the Standby Management Module. This command must be executed from the Active Management Module and will fail if the Standby Management Module is in a failed state or not present.
Examples
This example shows the redundancy switchover command on an active management module with a standby management module that is present.
switch#redundancy switchover This command causes the switch to immediately switchover to the Standby Management Module. Do you want to continue [y/n]?
This example shows the redundancy switchover command on an active management module with a standby management module that is absent.
switch#redundancy switchover Standby Management Module not found, switchover request ignored.
This example shows the redundancy switchover command on a standby management module.
switch#redundancy switchover Redundancy switchover must be performed from the Active Management Module, switchover request ignored.

For more information on features that use this command, refer to the High Availability Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide

889

Platforms
6300 6400

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

High Availability Commands | 890

Chapter 46 HTTPS server commands

HTTPS server commands
https-server authentication certificate
https-server authentication certificate [authorization radius] [username {<CERT-FIELD>}]
Description
Enables authentication using an x509 certificate for authentication. When this option is configured, the https-server uses the user specified certificate for authentication, and the specified authorization mechanism is used to obtain the corresponding user role. The username embedded in the certificate is used for authorization with a remote user database. Enabling password authentication is the only way of disabling certificate authentication.
Only one authentication method can be enabled at a time. If you want to disable certificate-based authentication, then the password-based authentication must be enabled.

Parameter <AUTHORIZATION-RADIUS>

Description
Specifies that after certificate authentication succeeds, instead of prompting for a password, the HTTPS server checks the RADIUS server only for authorization. When this parameter is omitted, authorization radius is still the assumed active setting.

<CERT-FIELD>

Selects which certificate username field is to be used for authorization. n Specify user_pincipal_name to use the certificate
UserPrincipalName (UPN) field. This is the default. n Specify common_name to use the certificate CommonName
(CN) field.
When this parameter is omitted, user_pincipal_name is assumed.

Example
Enabling authentication using the certificate:

switch(config)# https-server authentication certificate authorization radius username common_name

Command History

AOS-CX 10.14 Command-Line Interface Guide

891

Release 10.11

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

https-server authentication password
https-server authentication password
Description
Enables authentication using username and password, which corresponds to the default authentication mechanism. Enabling the password authentication mode disables the certificate authentication mode.
Only one authentication method can be enabled at a time.

Example
Enabling authentication using the password:
switch(config)# https-server authentication password

Command History
Release 10.11

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

https-server max-user-sessions
https-server max-user-sessions <SESSION-AMT>
Description
Sets the maximum amount of concurrent open sessions for any given user through the HTTPS server. The amount of concurrent open sessions may have an impact on system performance, so it is recommended to set this value to the minimum necessary.

HTTPS server commands | 892

Parameter <SESSION-AMT>

Description
Specifies the maximum number of user sessions allowed. Default: 6. Maximum value: 8.

Example
Set the maximum number of concurrent user sessions to the maximum of 8:

switch(config)# https-server max-user-sessions 8

For more information on features that use this command, refer to the Network Analytics Engine Guide or the REST API Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms All platforms

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

https-server rest access-mode
https-server rest access-mode {read-only | read-write}
Description
Changes the REST API access mode. The default mode is read-write. This command does not affect Central connections, which have permission to alter configurations regardless of the access mode set on the switch.

Parameter read-write
read-only

Description
Selects the read/write mode. Allows POST, PUT, PATCH, and DELETE methods to be called on all configurable elements in the switch database.
Selects the read-only mode. Write access to most switch resources through the REST API is disabled.

Usage
Setting the mode to read-write on the REST API allows POST, PUT, PATCH, and DELETE methods to be called on all configurable elements in the switch database.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

893

By default, REST APIs in the device are in the read-write mode. Some switch resources allow POST, PUT, PATCH, and DELETE regardless of REST API mode. REST APIs that are required to support the Web UI or the Network Analytics Engine expose POST, PUT, PATCH, or DELETE operations, even if the REST API access mode is set to read-only. The REST API in read/write mode is intended for use by advanced programmers who have a good understanding of the system schema and data relationships in the switch database.
Because the REST API in read/write mode can access every configurable element in the database, it is powerful but must be used with extreme caution: No semantic validation is performed on the data you write to the database, and configuration errors can destabilize the switch.
On 6300 switches or 6400 switches, by default, the HTTPS server is enabled in read-write mode on the mgmt VRF. If you enable the HTTPS server on a different VRF, the HTTPS server is enabled in read-only mode.
Example
switch(config)# https-server rest access-mode read-only

For more information on features that use this command, refer to the Network Analytics Engine Guide or the REST API Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

https-server rest firmware-site-distribution
https-server rest firmware-site-distribution no https-server rest firmware-site-distribution
Description
Enables the firmware site distribution server. The firmware site distribution allows you to use a switch to distribute a firmware image file to other switches in the same network. This prevents the switches from connecting to the cloud or an external network to download a firmware image file.

HTTPS server commands | 894

On enabling the firmware site distribution, it exposes a REST endpoint that allows the switches to download a switch primary or secondary firmware image.
As per the limitation, up to two switches can download the firmware image simultaneously.
This endpoint is to be used along with REST /firmware endpoint to handle the firmware download and installation process. The no form of this command disables the firmware site distribution server.
Example
Enabling the firmware site distribution server:
switch(config)# https-server rest firmware-site-distribution
Disabling the firmware site distribution server:
switch(config)# no https-server rest firmware-site-distribution

For more information on features that use this command, refer to the Network Analytics Engine Guide or the REST API Guide for your switch model.

Command History

Release 10.10

Command Information

Platforms All platforms

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

https-server session close all
https-server session close all
Description
Invalidates and closes all HTTPS sessions. All existing WebUI sessions (including sessions used for Central connections) will be logged out. REST and WebUI users will have to reauthenticate. and all realtime notification feature WebSocket connections are closed and must be resubscribed.
Usage
Typically, a user that has consumed the allowed concurrent HTTPS sessions and is unable to access the session cookie to log out manually must wait for the session idle timeout to start another session. This command is intended as a workaround to waiting for the idle timeout to close an HTTPS session. This

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

895

command stops and starts the hpe-restd service, so using this command affects all existing REST sessions, Web UI sessions, and real-time notification subscriptions.
Example
switch# https-server session close all

For more information on features that use this command, refer to the Network Analytics Engine Guide or the REST API Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

https-server session-timeout
https-server session-timeout <MINUTES>
Description
Configures the timeout, in minutes, for any given HTTPS server session. A value of 0 disables the timeout. This command does not affect sessions used for Central connections.

Parameter <MINUTES>

Description
Specifies the maximum idle time, in minutes for an HTTPS session. Default: 20. Maximum: 480 (8 hours). 0 disables the timeout, but the maxium is still enforced.

Example

switch(config)# https-server session-timeout 10

For more information on features that use this command, refer to the Network Analytics Engine Guide or the REST API Guide for your switch model.
Command History

HTTPS server commands | 896

Release 10.08

Command Information

Platforms All platforms

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

https-server vrf
https-server vrf <VRF-NAME> no https-server vrf <VRF-NAME>
Description
Configures and starts the HTTPS server on the specified VRF, allowing access to REST and the WebUI from ports assigned to that VRF. This command does not affect access to Central instances, as this feature has its own dedicated connection channel. The no form of the command stops any HTTPS servers running on the specified VRF and removes the HTTPS server configuration.

Parameter <VRF-NAME>

Description
Specifies the VRF name. Required. Length: Up to 32 alpha numeric characters.

Usage
By using this command, you enable access to both the Web UI and to the REST API on the specified VRF. You can enable access on multiple VRFs. By default, the 6200, 6300, and 6400 Switch Series have an HTTPS server enabled on the mgmt VRF and on the default VRF. When the HTTPS server is not configured and running, attempts to access the Web UI or REST API result in 404 Not Found errors. The VRF you select determines from which network the Web UI and REST API can be accessed. For example:
n If you want to enable access to the REST API and Web UI through the OOBM port (management IP address), specify the built-in management VRF (mgmt).
n If you want to enable access to the REST API and Web UI through the data ports (for "inband management"), specify the built-in default VRF (default).
n If you want to enable access to the REST API and Web UI through only a subset of data ports on the switch, specify other VRFs you have created.
Aruba Network Analytics Engine scripts run in the default VRF, but you do not have to enable HTTPS server access on the default VRF for the scripts to run. If the switch has custom Aruba Network Analytics Engine scripts that require access to the Internet, then for those scripts to perform their functions, you must configure a DNS name server on the default VRF.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

897

Examples
Enabling access on all ports on the switch, specify the default VRF:
switch(config)# https-server vrf default
Enabling access on the OOBM port (management interface IP address), specify the management VRF:
switch(config)# https-server vrf mgmt
Enabling access on ports that are members of the VRF named vrfprogs, specify vrfprogs:
switch(config)# https-server vrf vrfprogs
Enabling access on the management port and ports that are members of the VRF named vrfprogs, enter two commands:
switch(config)# https-server vrf mgmt switch(config)# https-server vrf vrfprogs

For more information on features that use this command, refer to the Network Analytics Engine Guide or the REST API Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show https-server
show https-server [vsx-peer]
Description
Shows the status and configuration of the HTTPS server. The REST API and web user interface are accessible only on VRFs that have the HTTPS server features configured.

HTTPS server commands | 898

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
Shows the configuration of the HTTPS server features. VRF Shows the VRFs, if any, for which HTTPS server features are configured. REST Access Mode Shows the configuration of the REST access mode: read-write POST, PUT, and DELETE methods can be called on all configurable elements in the switch database. This is the default value. read-only Write access to most switch resources through the REST API is disabled.
Examples

switch# show https-server

HTTPS Server Configuration ----------------------------

VRF

: default, mgmt

REST Access Mode : read-write

Max sessions per user : 6

Session timeout

: 20

For more information on features that use this command, refer to the Network Analytics Engine Guide or the REST API Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show https-server authentication
show https-server authentication

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

899

Description
Shows the https-server authentication mode status.
Examples
Showing the authentication method with the password mode enabled:

switch# show https-server authentication

Authentication Modes Status

----------------------------

Password Status

: enabled

Certificate Status

: disabled

Showing the authentication method with the certificate mode enabled:

switch# show https-server authentication

Authentication Modes Status

----------------------------

Password Status

: disabled

Certificate Status

: enabled

Command History
Release 10.11

Modification Command Introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

HTTPS server commands | 900

Chapter 47 ICMP commands

ICMP commands
ip icmp redirect
ip icmp redirect no ip icmp redirect
Description
Enables the sending of ICMPv4 and ICMPv6 redirect messages to the source host. Enabled by default. The no form of this command disables ICMPv4 and ICMPv6 redirect messages to the source host.
Examples
Enabling ICMP redirect messages:
switch(config)# ip icmp redirect
Disabling ICMP redirect messages:
switch(config)# no ip icmp redirect

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip icmp throttle
ip icmp throttle <PACKET-INTERVAL> no ip icmp throttle [<PACKET-INTERVAL>]
Description

AOS-CX 10.14 Command-Line Interface Guide

901

Used to configure the throttle parameter for both ICMPv4 and ICMPv6 error messages and redirect messages.
The no form of this command disables the throttle parameter for both ICMPv4 and ICMPv6 error messages and redirect messages.

Parameter <PACKET-INTERVAL>

Description
Specifies the ICMPv4/v6 packet interval in seconds. Default: 1 second. Range: 1-86400.

Examples
Enabling the throttle parameter for both ICMPv4 and ICMPv6 error messages and redirect messages:

switch(config)# ip icmp throttle 3000

Disabling the throttle parameter for both ICMPv4 and ICMPv6 error messages and redirect messages:

switch(config)# no ip icmp throttle

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.8

10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Added the optional <PACKET-INTERVAL> parameter to the no form of the command. --
Authority Administrators or local user group members with execution rights for this command.

ip icmp unreachable
ip icmp unreachable no ip icmp unreachable
Description
Enables the sending of ICMPv4 and ICMPv6 destination unreachable messages on the switch to a source host when a specific host is unreachable. The unreachable host address originates from the failed packed. Default setting.

ICMP commands | 902

The no form of this command disables the sending of ICMPv4 and ICMPv6 destination unreachable messages from the switch to a source host when a specific host is unreachable. This command does not prevent other hosts from sending an ICMP unreachable message.
Examples
Enabling ICMPv4 and ICMPv6 destination unreachable messages to a source host:
switch(config)# ip icmp unreachable
Disabling ICMPv4 and ICMPv6 destination unreachable messages to a source host:
switch(config)# no ip icmp unreachable

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

903

Chapter 48 IGMP commands

IGMP commands
For commands in the interface configuration context, the interface must be an L3 interface. The supported contexts include: config-if, config-if-vlan, config-lag-if,config-sub-if.
The sub-interface related configuration examples provided in this section apply only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

ip igmp
ip igmp {enable | disable} no ip igmp [enable | disable]
Description
Enables or disables IGMP on the current interface. IGMP is disabled by default. The no form of this command disables IGMP on the current interface.

Parameter enable disable

Description Enable IGMP. Disable IGMP.

Examples
Enabling IGMP on interface VLAN 2:

switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp enable Disabling IGMP on interface VLAN 2:

switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp disable
Enabling IGMP on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no shutdown switch(config-if)# routing switch(config-subif)# ip igmp enable
Disabling IGMP on interface 1/1/1:

AOS-CX 10.14 Command-Line Interface Guide

904

switch(config)# interface 1/1/1 switch(config-subif)# ip igmp disable
switch(config)# interface 1/1/1 switch(config-subif)# no ip igmp enable
Enabling IGMP on sub-interface 1/1/1.1: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.1 switch(config-subif)# no shutdown switch(config-subif)# ip igmp enable
Disabling IGMP on sub-interface 1/1/1.1:
Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.1 switch(config-subif)# ip igmp disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if-vlan config-if config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ip igmp apply access-list
ip igmp apply access-list <ACL-NAME> no ip igmp apply access-list <ACL-NAME>
Description

IGMP commands | 905

Configures the ACL on a particular interface to filter the IGMP join or leave packets based on rules set in the particular ACL name. The no form of this command unconfigures the rules set for the ACL.
This configuration will override the ACL associated with IGMP snooping on the corresponding L2 VLAN.

Parameter access-list <ACL-NAME>

Description Associates an ACL with the IGMP. Specifies the name of the ACL.

Usage
n Existing classifier commands are used to configure the ACL. n In case an IGMPv3 packet with multiple group addresses is received, the switch only processes the
permitted group addresses based on the ACL rule set. The packet is forwarded to querier and PIM router even though one of the groups present in the packet is blocked by ACL. This avoids the delay in learning of the permitted groups. Since the access switch configured with ACL blocks the traffic for the groups which are denied, forwarding of joins has no impact. If all the groups in the packet are denied by the ACL rule, the packet is not forwarded to the querier and PIM router. Existing joins will timeout. n In case of IGMPv2, if there is no match or if there is a deny rule match, the packet is dropped.
Examples
Configuring the ACL on a VLAN to filter IGMP packets based on permit/deny rules set in access list mygroup:

switch(config)# access-list ip mygroup switch(config-acl-ip)# 10 deny igmp any 239.255.255.250 switch(config-acl-ip)# 20 deny igmp any 239.255.255.253 switch(config-acl-ip)# 30 permit igmp any 239.1.1.1 switch(config-acl-ip)# exit switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp apply access-list mygroup

Configuring the ACL to remove the rules set in access list mygroup:

switch(config-if-vlan)# no ip igmp apply access-list mygroup

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

906

Platforms All platforms

Command context config-if-vlan

Authority
Administrators or local user group members with execution rights for this command.

ip igmp last-member-query-interval
ip igmp last-member-query-interval <INTERVAL-VALUE> no ip igmp last-member-query-interval <INTERVAL-VALUE>
Description
Configures an IGMP last member query interval value in seconds on an interface, depending on the command context you are in. The no form of this command sets the value to a default of 1 second on an interface.

Parameter <INTERVAL-VALUE>

Description
Specifies an IGMP last-member-query-interval on the interface. Default: 1 second. Range: 1-2 seconds.

Examples
Configuring an IGMP last member query interval of 2 on interface VLAN 2:

switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp last-member-query-interval 2 switch(config-if-vlan)# no ip igmp last-member-query-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if-vlan config-if config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip igmp querier
ip igmp querier no ip igmp querier
Description

IGMP commands | 907

Configures an IGMP querier on an interface, depending on the command context you are in. This functionality will allow an interface to join in the querier-election process. The no form of this command disables IGMP querier on an interface.
Examples
Configuring an IGMP querier on interface VLAN 2:
switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp querier
Disabling an IGMP querier on interface VLAN 2:
switch(config)# interface vlan 2 switch(config-if-vlan)# no ip igmp querier
Configuring an IGMP querier on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no shutdown switch(config-if)# routing switch(config-subif)# ip igmp querier
Disabling an IGMP querier on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-subif)# no ip igmp querier
Configuring an IGMP querier on sub-interface 1/1/1.1 Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.
switch(config)# interface 1/1/1.1 switch(config-subif)# no shutdown switch(config-subif)# ip igmp querier
Disabling an IGMP querier on sub-interface 1/1/1.1: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.
switch(config)# interface 1/1/1.1 switch(config-subif)# no ip igmp querier
For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

908

Release 10.11 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if-vlan config-if config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ip igmp querier interval
ip igmp querier interval <INTERVAL-VALUE> no ip igmp querier interval
Description
Configures the interval between IGMP queries on an interface, depending on the command context you are in. The no form of this command sets the IGMP querier interval to the default value of 125 seconds on an interface.

Parameter <INTERVAL-VALUE>

Description
Specifies the IGMP querier interval in seconds on the interface. Default: 125 seconds. Range: 5-300.

Examples
Configuring an IGMP querier interface interval of 100 on interface VLAN 2:

switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp querier interval 100

Resetting an IGMP querier interval to the default value:

switch(config-if-vlan)# no ip igmp querier interval

Configuring an IGMP querier interface interval of 100 on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# no shutdown switch(config-if)# routing switch(config-subif)# ip igmp querier interval 100

Configuring an IGMP querier interface interval of 100 on sub-interface 1/1/1.1:

IGMP commands | 909

Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.1 switch(config-subif)# no shutdown switch(config-subif)# ip igmp querier interval 100

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if-vlan config-if config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ip igmp querier-wait-time
ip igmp querier-wait-time <QUERIER-WAIT-TIME> no ip igmp querier-wait-time <QUERIER-WAIT-TIME>
Description
Configures initial IGMP querier-wait-time value in seconds. The no form of this command sets the IGMP querier-wait-time to the default value of 260 seconds. Note that the wait timer can be configured to any numbers within the 1-300 second range.

Parameter <QUERIER-WAIT-TIME>

Description Configures IGMP querier-wait-time to desired value.

Examples
Configuring IGMP querier-wait-time:

6200-1(config-if-vlan)# ip igmp querier-wait-time <1-300> Querier Wait value (Default: 260) 6200-1(config-if-vlan)#

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

910

When PIM is enabled, automated election will override querier-wait-time configuration. When PIM is disabled and [no] igmp querier-wait-time is configured, the initial wait timer will be configured at desired value.
For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms All platforms

Command context
config-if-vlan config-if config-lag-if

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

ip igmp querier query-max-response-time
ip igmp querier query-max-response-time <RESPONSE-TIME> no ip igmp querier query-max-response-time <RESPONSE-TIME>
Description
Configures the IGMP querier max response time value in seconds on an interface, depending on the command context you are in. The no form of this command sets the querier max response time value to the default of 10 seconds on an interface.

Parameter <RESPONSE-TIME>

Description
Specifies the IGMP querier max response time value on the interface. Default: 10 seconds. Range: 10-128 seconds.

Examples
Configuring the IGMP querier maximum response time of 50 for interface VLAN 2:

switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp query-max-response-time 50

Resetting an IGMP querier interval to the default value:

switch(config-if-vlan)# no ip igmp query-max-response-time

For more information on features that use this command, refer to the Multicast Guide for your switch model.

IGMP commands | 911

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if-vlan config-if config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip igmp robustness
ip igmp robustness <VALUE> no ip igmp robustness <VALUE>
Description
Configures IGMP robustness on an interface, depending on the command context. The robustness parameter allows tuning for the expected packet loss on a subnet. The no form of this command sets the robustness value to the default of 2 on an interface.

Parameter <VALUE>

Description
Specifies an IGMP robustness value on the interface. Default: 2. Range: 1-7.

Examples
Configuring an IGMP robustness of 5 on interface VLAN 2:

switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp robustness 5

Resetting the IGMP robustness to the default:

switch(config-if-vlan)# no ip igmp robustness

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

912

Platforms All platforms

Command context
config-if-vlan config-if config-lag-if

Authority
Administrators or local user group members with execution rights for this command.

ip igmp router-alert-check
ip igmp router-alert-check [enable | disable] no ip igmp router-alert-check [enable | disable]
Description
Enables or disables IGMP router alert check for IGMP packets. IGMP packets without the router alert field set are dropped if router alert check is enabled. Router alert check is disabled by default. The no form of this command disables router alert check for IGMP packets.

Parameter enable disable

Description Enable IGMP router alert check. Disable IGMP router alert check.

Examples
Enabling IGMP router alert check on interface VLAN 2:

switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp router-alert-check enable

Disabling IGMP router alert check on interface VLAN 2:

switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp router-alert-check disable

switch(config)# interface vlan 2 switch(config-if-vlan)# no ip igmp router-alert-check enable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.08
Command Information

Modification Command introduced.

IGMP commands | 913

Platforms All platforms

Command context
config-if-vlan config-if config-lag-if

Authority
Administrators or local user group members with execution rights for this command.

ip igmp static-group
ip igmp static-group <MULTICAST-GROUP-IP> no ip igmp static-group <MULTICAST-GROUP-IP>
Description
Configures an IGMP static multicast group on an interface, depending on the command context you are in. You can configure a maximum of 32 IGMP static groups. The no form of the command unconfigures IGMP static multicast group on an interface.

Parameter <MULTICAST-GROUP-IP>

Description
Specifies an IGMP static multicast group IP address on the interface. Format: A.B.C.D

Examples
Administrators or local user group members with execution rights for this command. Configuring an IGMP static group on interface VLAN 2:

switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp static-group 239.1.1.1

Resetting an IGMP static group on an interface to the default (none):

switch(config-if)# no ip igmp static-group 239.1.1.10

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms All platforms

Command context
config-if-vlan config-if config-lag-if

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

914

ip igmp version
ip igmp version <VERSION> no ip igmp version <VERSION>
Description
Configures the IGMP version on an interface, depending on the command context you are in. The no form of the command configures the default IGMP version, 3, on the interface.

Parameter <VERSION>

Description
Specifies the IGMP version on the interface. Select 2 for IGMPv2 (RFC2236). Select 3 for IGMPv3 (RFC3376). Values: 2 or 3.

Examples
Configuring an IGMP version on interface VLAN 2:

switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp version 2

Configuring an IGMP version on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# ip igmp version 2

Removing an IGMP version on interface VLAN 2:

switch(config)# interface vlan 2 switch(config-if-vlan)# no ip igmp version 2

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if-vlan config-if config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip igmp version strict

IGMP commands | 915

ip igmp version <VERSION> strict no ip igmp version <VERSION> strict
Description
Configures an IGMP strict version on an interface, depending on the command context you are in. Drops packets that do not match the configured version. The no form of the command removes the strict version configuration from the interface.

Parameter <VERSION>

Description
Specifies the IGMP version on the interface. Select 2 for IGMPv2 (RFC2236). Select 3 for IGMPv3 (RFC3376). Values: 2 or 3.

Examples
Configuring the IGMP strict version to 2 on interface VLAN 2:

switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp version 2 strict

Resetting the IGMP strict version to the default (none):

switch(config-if)# no ip igmp version 2 strict

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if-vlan config-if config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

no ip igmp
no ip igmp
Description
Disables all IGMP configurations on an interface or sub-interface, depending on the command context you are in.
Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

916

Removing IGMP on interface VLAN 2: switch(config)# interface vlan 2 switch(config-if-vlan)# no ip igmp
Removing IGMP on interface 1/1/1: switch(config)# interface 1/1/1 switch(config-subif)# no ip igmp
Removing IGMP on sub-interface 1/1/1.1: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.1 switch(config-subif)# no ip igmp

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if-vlan config-if config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

show ip igmp
show ip igmp [vrf <VRF-NAME> | all-vrfs] [vsx-peer]
Description
Shows IGMP configuration information and status, or shows information by VRF.

Parameter

vrf <VRF-NAME> | all-vrfs

Description Optional. Used to show information

IGMP commands | 917

Parameter vsx-peer

Description
by VRF. Specify the VRF by VRF name. With no <VRF-NAME> specified, the default VRF is implied. To show information for all VRFs, specify all-vrfs.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing IGMP configuration and status:

switch# show ip igmp

VRF Name : default

Interface : vlan2

IGMP Configured Version : 3

IGMP Operating Version

:3

Querier State

: Querier

Querier IP [this switch] : 20.1.1.1

Querier Uptime

: 1m 4s

Querier Expiration Time : 0m 1s

IGMP Snoop Enabled on VLAN : True

Showing IGMP information for VRF test:

switch# show ip igmp vrf test

VRF Name : test

Interface : 1/1/2

IGMP Configured Version : 3

IGMP Operating Version : 2

Querier State

: Querier

Querier IP [this switch] : 100.1.1.1

Querier Uptime

: 2m 55s

Querier Expiration Time : 0m 16s

Active Group Address Vers Mode Uptime Expires

---------------------- ---- ---- --------- ---------

240.100.3.194

3 INC 0m 30s 3m 50s

IGMP is not enabled on interface 1/1/3

VRF Name : test Interface : vlan2 IGMP Configured Version IGMP Operating Version Querier State Querier IP [this switch]

:3 :3 : Querier : 20.1.1.1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

918

Querier Uptime

: 1m 4s

Querier Expiration Time : 0m 1s

IGMP Snoop Enabled on VLAN : True

Active Group Address Vers Mode Uptime Expires

---------------------- ---- ---- --------- ---------

238.224.153.165

2

0m 38s 3m 42s

VRF Name : test

Interface : vlan10

IGMP Configured Version : 3

IGMP Operating Version

:3

Querier State

: Querier

Querier IP [this switch] : 10.1.1.1

Querier Uptime

: 1m 4s

Querier Expiration Time : 0m 1s

IGMP Snoop Enabled on VLAN : True

Active Group Address Vers Mode Uptime Expires

---------------------- ---- ---- --------- ---------

239.209.3.194

3 INC 0m 38s 3m 42s

Showing IGMP information for all VRFs:

switch# show ip igmp all-vrfs

VRF Name : test

Interface : 1/1/2

IGMP Configured Version : 3

IGMP Operating Version : 2

Querier State

: Querier

Querier IP [this switch] : 100.1.1.1

Querier Uptime

: 2m 55s

Querier Expiration Time : 0m 16s

Active Group Address Vers Mode Uptime Expires

---------------------- ---- ---- --------- ---------

240.100.3.194

3 INC 0m 30s 3m 50s

VRF Name : test

Interface : vlan2

IGMP Configured Version : 3

IGMP Operating Version

:3

Querier State

: Querier

Querier IP [this switch] : 20.1.1.1

Querier Uptime

: 1m 4s

Querier Expiration Time : 0m 1s

IGMP Snoop Enabled on VLAN : True

Active Group Address Vers Mode Uptime Expires

---------------------- ---- ---- --------- ---------

238.224.153.165

2

0m 38s 3m 42s

VRF Name : default

Interface : vlan5

IGMP Configured Version : 3

IGMP Operating Version

:2

Querier State

: Querier

Querier IP [this switch] : 50.1.1.1

Querier Uptime

: 1m 1s

Querier Expiration Time : 0m 4s

IGMP Snoop Enabled on VLAN : False

VRF Name : test

IGMP commands | 919

Interface : vlan10

IGMP Configured Version : 3

IGMP Operating Version

:3

Querier State

: Querier

Querier IP [this switch] : 10.1.1.1

Querier Uptime

: 1m 4s

Querier Expiration Time : 0m 1s

IGMP Snoop Enabled on VLAN : True

Active Group Address Vers Mode Uptime Expires

---------------------- ---- ---- --------- ---------

239.209.3.194

3 INC 0m 38s 3m 42s

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip igmp counters
show ip igmp counters [vrf <VRF-NAME> | all-vrfs] [vsx-peer]
Description
Shows IGMP counter details, or shows counters by VRF.

Parameter vrf <VRF-NAME> | all-vrfs
vsx-peer

Description
Optional. Used to show information by VRF. Specify the VRF by VRF name. With no <VRF-NAME> specified, the default VRF is implied. Specify all-vrfs to show information for all VRFs.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing IGMP counters:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

920

switch# show ip igmp counters

IGMP Counters

Interface Name

: vlan2

VRF Name

: default

Membership Timeout : 0

V1 All Hosts Queries V2 All Hosts Queries V3 All Hosts Queries V2 Group Specific Queries V3 Group Specific Queries Group And Source Specific Queries V3 Member Reports V2 Member Reports V1 Member Reports V2 Member Leaves Packets dropped by ACL

Rx

Tx

------------- -------------

0

0

0

12

0

0

0

0

0

0

0

0

0

N/A

0

N/A

0

N/A

0

N/A

0

N/A

Showing IGMP counters for the default VRF:

switch# show ip igmp counters vrf default

IGMP Counters

Interface Name

: vlan2

VRF Name

: default

Membership Timeout : 0

V1 All Hosts Queries V2 All Hosts Queries V3 All Hosts Queries V2 Group Specific Queries V3 Group Specific Queries Group And Source Specific Queries V3 Member Reports V2 Member Reports V1 Member Reports V2 Member Leaves Packets dropped by ACL

Rx

Tx

------------- -------------

0

0

0

12

0

0

0

0

0

0

0

0

0

N/A

0

N/A

0

N/A

0

N/A

0

N/A

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

IGMP commands | 921

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip igmp group
show ip igmp group <GROUP-IP> [source <SOURCE-IP>] [vrf <VRF-NAME> | all-vrfs] [vsx-peer]
Description
Shows IGMP joined group information for the specified group, or shows joined group source and display information by VRF.

Parameter <GROUP-IP> source <SOURCE-IP> vrf <VRF-NAME> | all-vrfs
vsx-peer

Description
Specifies the IP address of the group. Format: A.B.C.D
Specifies the IP address of the source. Format: A.B.C.D
Optional. Used to show information by VRF. Specify the VRF by VRF name. With no <VRF-NAME> specified, the default VRF is implied. Specify all-vrfs to show information for all VRFs.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing IGMP joined group details for group 239.1.1.10:

switch# show ip igmp group 239.1.1.10

IGMP group information for group 239.1.1.10

Interface Name : vlan2

VRF Name

: default

Group Address Last Reporter

: 239.1.1.10 : 100.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 EXC 16m 34s 2m 27s

Showing IGMP joined group details for group 239.1.1.10 and source 10.1.1.10:

switch# show ip igmp group 239.1.1.10 source 10.1.1.10
Interface Name : vlan2 VRF Name : default Group Address : 239.1.1.10

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

922

Source Address : 10.1.1.10
Mode Uptime Expire ---- --------- -------
0m 13s 4m 7s

Showing IGMP joined group details for group 239.1.1.10 for all VRFs:

switch# show ip igmp group 239.1.1.10 all-vrfs

IGMP group information for group 239.1.1.10

Interface Name : vlan10

VRF Name

: default

Group Address Last Reporter

: 239.1.1.10 : 100.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 EXC 17m 5s 4m 2s

Showing IGMP joined group details for group 239.1.1.10 source 10.1.1.10 for all VRFs:

switch# show ip igmp group 239.1.1.10 source 10.1.1.10 all-vrfs
Interface Name : vlan10 VRF Name : default Group Address : 239.1.1.10 Source Address : 10.1.1.10
Mode Uptime Expire ---- --------- -------
0m 39s 3m 41s

Showing IGMP joined group details group 239.1.1.10 for the default VRF:

switch# show ip igmp group 239.1.1.10 vrf default

IGMP group information for group 239.1.1.10

Interface Name : vlan2

VRF Name

: default

Group Address Last Reporter

: 239.1.1.10 : 100.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 EXC 17m 35s 3m 32s

Showing IGMP joined group details group 239.1.1.10 source 10.1.1.10 for the default VRF:

IGMP commands | 923

switch# show ip igmp group 239.1.1.10 source 10.1.1.10 vrf default
Interface Name : vlan10 VRF Name : default Group Address : 239.1.1.10 Source Address : 10.1.1.10
Mode Uptime Expire ---- --------- -------
0m 59s 3m 21s

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip igmp groups
show ip igmp groups [vrf <VRF-NAME> | all-vrfs] [vsx-peer]
Description
Shows IGMP group information, or you can display group information by VRF.

Parameter vrf <VRF-NAME> | all-vrfs
vsx-peer

Description
Optional. Used to show information by VRF. Specify the VRF by VRF name. With no <VRF-NAME> specified, the default VRF is implied. Specify all-vrfs to show information for all VRFs.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing IGMP group information:

switch# show ip igmp groups

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

924

IGMP group information for group 239.1.1.10

Interface Name : vlan2

VRF Name

: default

Group Address Last Reporter

: 239.1.1.10 : 100.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 EXC 0m 36s 3m 44s

IGMP group information for group 239.1.1.11

Interface Name : vlan2

VRF Name

: default

Group Address Last Reporter

: 239.1.1.11 : 100.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 EXC 0m 36s 3m 44s

Showing IGMP groups for all VRFs:

switch# show ip igmp groups all-vrfs IGMP group information for group 239.1.1.1

Interface Name : vlan10

VRF Name

: test

Group Address Last Reporter

: 239.1.1.1 : 100.1.1.20

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 EXC 0m 13s 4m 7s

IGMP group information for group 239.1.1.2

Interface Name : vlan10

VRF Name

: test

Group Address Last Reporter

: 239.1.1.2 : 100.1.1.20

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 EXC 0m 13s 4m 7s

IGMP group information for group 239.1.1.1

Interface Name : vlan10

VRF Name

: test

Group Address : 239.1.1.1

IGMP commands | 925

Last Reporter : 100.1.1.20

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 EXC 0m 13s 4m 7s

IGMP group information for group 239.1.1.2

Interface Name : vlan10

VRF Name

: test

Group Address Last Reporter

: 239.1.1.2 : 100.1.1.20

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 EXC 0m 13s 4m 7s

IGMP group information for group 239.1.1.1

Interface Name : vlan20

VRF Name

: default

Group Address Last Reporter

: 239.1.1.1 : 200.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 EXC 0m 13s 4m 7s

IGMP group information for group 239.1.1.2

Interface Name : vlan20

VRF Name

: default

Group Address Last Reporter

: 239.1.1.2 : 200.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 EXC 0m 13s 4m 7s

Showing IGMP groups for the default VRF:

switch# show ip igmp groups vrf default

IGMP group information for group 239.1.1.10

Interface Name : vlan2

VRF Name

: default

Group Address Last Reporter

: 239.1.1.10 : 100.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

926

3 EXC 9m 23s 3m 20s

IGMP group information for group 239.1.1.11

Interface Name : vlan2

VRF Name

: default

Group Address Last Reporter

: 239.1.1.11 : 100.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 EXC 9m 23s 3m 20s

IGMP group information for group 239.1.1.10

Interface Name : vlan2

VRF Name

: default

Group Address Last Reporter

: 239.1.1.10 : 100.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 EXC 9m 23s 3m 20s

IGMP group information for group 239.1.1.11

Interface Name : vlan2

VRF Name

: default

Group Address Last Reporter

: 239.1.1.11 : 100.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 EXC 9m 23s 3m 20s

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

IGMP commands | 927

show ip igmp interface
show ip igmp interface [{<INTF-ID>|<INTF-ID.ID>|{vlan <VLAN-ID>}] counters [vsx-peer] group <A.B.C.D> [{source <A.B.C.D>}| [vsx-peer] groups [vsx-peer] statistics [vsx-peer] [vsx-peer]
Description
Shows IGMP configuration information for a specific interface (VLAN, port or LAG).

Parameter <INTF-ID>
<INTF-ID.ID>
vlan <VLAN-ID> vsx-peer

Description
Specifies an interface (such as 1/1/2 or LAG10).
Required. Specifies a sub-interface. (Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.)
Specifies a VLAN. Values: 1-4094.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing IGMP configuration information for interface VLAN 2:

switch# show ip igmp interface vlan 2

IGMP Configured Version : 3

IGMP Operating Version : 3

Querier State

: Querier

Querier IP [this switch] : 20.1.1.1

Querier Uptime

: 1m 46s

Querier Expiration Time : 0m 1s

Snoop Enabled on VLAN : True

switch# show ip igmp interface vlan 10

IGMP is not enabled

Showing IGMP configuration information for the specified interface 1/1/2:

switch# show ip igmp interface 1/1/2

IGMP Configured Version IGMP Operating Version Querier State Querier IP [this switch] Querier Uptime Querier Expiration Time

:3 :3 : Querier : 100.1.1.1 : 51m 44s : 1m 51s

Showing IGMP configuration information for sub-interface 1/1/5.10:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

928

Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch# show ip igmp interface 1/1/5.10

IGMP Configured Version IGMP Operating Version Querier State Querier IP [this switch] Querier Uptime Querier Expiration Time

:3 :3 : Querier : 200.1.1.1 : 11m 44s : 1m 51s

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip igmp interface counters
show ip igmp interface {<INTF-ID> | <INTF-ID.ID>| vlan <VLAN-ID>} counters [vsx-peer]
Description
Shows IGMP counter details for a specific interface or VLAN interface.

Parameter <INTF-ID> <INTF-ID.ID>
vlan <VLAN-ID> vsx-peer

Description
Specifies an interface (such as 1/1/2).
Required: Specifies a sub-interface. (Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.)
Specifies a VLAN. Values: 1-4094.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

IGMP commands | 929

Showing IGMP counters for interface VLAN 2:

switch# show ip igmp interface vlan 2 counters

IGMP Counters

Interface Name

: vlan2

VRF Name

: default

Membership Timeout : 0

V1 All Hosts Queries V2 All Hosts Queries V3 All Hosts Queries V2 Group Specific Queries V3 Group Specific Queries Group And Source Specific Queries V3 Member Reports V2 Member Reports V1 Member Reports V2 Member Leaves Packets dropped by ACL

Rx

Tx

------------- -------------

0

0

0

0

0

29

0

0

0

2

0

2

0

N/A

0

N/A

0

N/A

0

N/A

0

N/A

Showing IGMP counters for sub-interface 10: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch# show ip igmp interface 1/1/5.10 counters

IGMP Counters

Interface Name

: 1/1/5.10

VRF Name

: default

Membership Timeout : 0

V1 All Hosts Queries V2 All Hosts Queries V3 All Hosts Queries V2 Group Specific Queries V3 Group Specific Queries Group And Source Specific Queries V3 Member Reports V2 Member Reports V1 Member Reports V2 Member Leaves Packets dropped by ACL

Rx

Tx

------------- -------------

0

0

0

0

0

9

0

0

0

0

0

0

3

N/A

4

N/A

0

N/A

0

N/A

0

N/A

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

930

Release 10.11 10.07 or earlier

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip igmp interface group
show ip igmp [interface {<INTF-ID> | <INTF-ID.ID> | vlan <VLAN-ID>} [group <GROUP-IP> [source <SOURCE-IP>] [vsx-peer]]]
Description
Shows IGMP joined group information for a specific interface or VLAN interface, or specify a source IP.

Parameter <INTF-ID> <INTF-ID.ID>
vlan <VLAN-ID> <GROUP-IP> source <SOURCE-IP> vsx-peer

Description
Specifies an interface (such as 1/1/2).
Required: Specifies the sub-interface. (Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.)
Specifies a VLAN. Values: 1-4094.
Specifies the IP address of the group. Format: A.B.C.D
Specifies the IP address of the source. Format: A.B.C.D
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing IGMP joined group details for group 239.1.1.1 for interface VLAN 10:

switch# show ip igmp interface vlan 10 group 239.1.1.1

IGMP group information for group 239.1.1.1

Interface Name : vlan10

VRF Name

: default

Group Address Last Reporter

: 239.1.1.1 : 100.1.1.10

V1

V2

Sources Sources

IGMP commands | 931

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 INC 8m 10s 2m 21s

1

Group Address : 239.1.1.1 Source Address : 10.1.1.1

Mode Uptime Expire ---- --------- ------INC 8m 10s 2m 21s

Showing IGMP joined group details for group 239.1.1.1 for interface VLAN 10 with source details for 10.1.1.1:

switch# show ip igmp interface vlan 10 group 239.1.1.1 source 10.1.1.1
Interface Name : vlan10 VRF Name : default Group Address : 239.1.1.1 Source Address : 10.1.1.1
Mode Uptime Expire ---- --------- ------INC 8m 52s 3m 51s

Showing IGMP joined group details for group 239.1.1.1 for sub-interface 1/1/1.10: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch# show ip igmp interface 1/1/5.10 group 239.1.1.1

IGMP group information for group 239.1.1.1

Interface Name : 1/1/5.10

VRF Name

: default

Group Address Last Reporter

: 239.1.1.1 : 10.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 INC 1m 49s 1m 31s

1

Group Address : 239.1.1.1 Source Address : 10.1.1.1

Mode Uptime Expire ---- --------- ------INC 1m 49s 1m 31s

Showing IGMP joined group details for group 239.1.1.1 for sub-interface 1/1/1.10 with source details for 10.1.1.1:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

932

switch# show ip igmp interface 1/1/5.10 group 239.1.1.1 source 10.1.1.1

Interface Name : 1/1/5.10 VRF Name : default Group Address : 239.1.1.1 Source Address : 10.1.1.1

Mode Uptime Expire

---- --------- -------

INC 1m 3s

4m 25s

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip igmp interface groups
show ip igmp [interface {<INTF-ID> | <INTF-ID.ID> | vlan <VLAN-ID>} [groups] [vsx-peer]]
Description
Shows IGMP group information for a specific interface or VLAN interface.

Parameter <INTF-ID> <INTF-ID.ID>
vlan <VLAN-ID> <GROUP-IP> vsx-peer

Description
Specifies an interface (such as 1/1/2).
Required: Specifies the sub-interface. (Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.)
Specifies a VLAN. Values: 1-4094.
Specifies the IP address of the group. Format: A.B.C.D
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

IGMP commands | 933

Showing IGMP groups for interface VLAN 2:

switch# show ip igmp interface vlan 2 groups

IGMP group information for group 239.1.1.1

Interface Name : vlan2

VRF Name

: default

Group Address Last Reporter

: 239.1.1.1 : 100.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 INC 4m 40s 3m 51s

1

Group Address : 239.1.1.1 Source Address : 10.1.1.1

Mode Uptime Expire ---------------------INC 4m 40s 3m 51s

IGMP group information for group 239.1.1.2

Interface Name : vlan2

VRF Name

: default

Group Address Last Reporter

: 239.1.1.2 : 100.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

3 INC 4m 40s 3m 51s

1

Group Address : 239.1.1.2 Source Address : 10.1.1.1

Mode Uptime Expire ---- --------- ------INC 4m 40s 3m 51s

Showing IGMP groups for sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch# show ip igmp interface 1/1/5.10 groups

IGMP group information for group 239.1.1.1

Interface Name : 1/1/5.10

VRF Name

: default

Group Address Last Reporter

: 239.1.1.10 : 10.1.1.1

V1

V2

Sources Sources

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

934

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

2

11m 59s 1m 44s

1m 44s

IGMP group information for group 239.1.1.2

Interface Name : 1/1/5.10

VRF Name

: default

Group Address Last Reporter

: 239.1.1.20 : 10.1.1.10

V1

V2

Sources Sources

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------- --------

2

11m 59s 1m 44s

1m 44s

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip igmp interface statistics
show ip igmp interface {<INTF-ID> | <INTF-ID.ID> | vlan <VLAN-ID>} statistics [vsx-peer]
Description
Shows IGMP statistics for a specific interface or VLAN interface, including groups joined.

Parameter <INTF-ID> <INTF-ID.ID>
vlan <VLAN-ID> vsx-peer

Description
Specifies an interface (such as 1/1/2 or LAG1).
Required: Specifies the sub-interface. (Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.)
Specifies a VLAN. Values: 1-4094.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

IGMP commands | 935

Examples
Showing IGMP statistics for interface VLAN 2:

switch# show ip igmp interface vlan 2 statistics

IGMP statistics

Interface Name : vlan2

VRF Name

: default

Number of Include Groups

:2

Number of Exclude Groups

:0

Number of Static Groups

:0

Total Multicast Groups Joined : 2

Showing IGMP statistics for the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch# show ip igmp interface 1/1/5.10 statistics

IGMP statistics

Interface Name : 1/1/5.10

VRF Name

: default

Number of Include Groups

:0

Number of Exclude Groups

:2

Number of Static Groups

:0

Total Multicast Groups Joined : 2

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.11 10.07 or earlier

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip igmp static-groups
show ip igmp static-groups [vrf <VRF-NAME> | all-vrfs] [vsx-peer]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

936

Description
Shows IGMP static groups, or shows information by VRF.

Parameter vrf <VRF-NAME> | all-vrfs
vsx-peer

Description
Optional. Used to show information by VRF. Specify the VRF by VRF name. With no <VRF-NAME> specified, the default VRF is implied. Specify all-vrfs to show information for all VRFs.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing IGMP static-group information:

switch# show ip igmp static-groups

IGMP Static Group Address Information

VRF Name default

Interface Name Group Address

--------------- -----------------

vlan10

238.1.1.1

Showing IGMP statics-group information for all VRFs:

switch# show ip igmp static-groups all-vrfs

IGMP Static Group Address Information

VRF Name :test

Interface Name Group Address

--------------- -----------------

vlan20

239.1.1.1

VRF Name :default

Interface Name Group Address

--------------- -----------------

vlan10

238.1.1.1

Showing IGMP static-group information for VRF test: switch# show ip igmp static-groups vrf test

IGMP Static Group Address Information

VRF Name :test

Interface Name Group Address

--------------- -----------------

vlan20

239.1.1.1

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

IGMP commands | 937

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip igmp statistics
show ip igmp statistics [vrf <VRF-NAME> | all-vrfs] [vsx-peer]
Description
Shows IGMP statistics, including groups joined, or shows statistics by VRF.

Parameter vrf <VRF-NAME> | all-vrfs
vsx-peer

Description
Optional. Used to show information by VRF. Specify the VRF by VRF name. With no <VRF-NAME> specified, the default VRF is implied. Specify all-vrfs to show information for all VRFs.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing IGMP statistics:

switch# show ip igmp statistics IGMP statistics

VRF Name

: default

Number of Include Groups

:1

Number of Exclude Groups

:0

Number of Static Groups

:0

Total Multicast Groups Joined : 1

Showing IGMP statistics for all VRFs:

switch# show ip igmp statistics all-vrfs

IGMP statistics

VRF Name

: test

Number of Include Groups Number of Exclude Groups Number of Static Groups

:2 :0 :0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

938

Total Multicast Groups Joined : 2

VRF Name

: default

Number of Include Groups

:1

Number of Exclude Groups

:0

Number of Static Groups

:0

Total Multicast Groups Joined : 1

Showing IGMP statistics for VRF test:

switch# show ip igmp statistics vrf test IGMP statistics

VRF Name

: test

Number of Include Groups

:2

Number of Exclude Groups

:0

Number of Static Groups

:0

Total Multicast Groups Joined : 2

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

IGMP commands | 939

Chapter 49 IGMP snooping commands

IGMP snooping commands

ip igmp snooping apply access list
ip igmp snooping apply access list <ACL-NAME> no ip igmp snooping apply access list <ACL-NAME>
Description
Configures the access list (ACL) in a particular interface to filter IGMP join or leave packets based on rules set in a particular access list name. The no form of this command removes the configuration.

Parameter <ACL-NAME>

Description Specifies the access list name.

Usage
Existing classifier commands are used to configure ACL. In case of IGMPv3 packets with multiple group addresses received, only permitted group addresses based on the ACL rule set are proccessed. The packet is forwarded to querier and PIM router even though one of the groups present in the packet is blocked by ACL to avoid the delay in learning of the permitted groups because the access switch configured with the ACL blocks the traffic for the groups which are denied forwarding of joins have no impact. If all of the groups in a packet are denied by the ACL rule packet, it is not forwarded to the querier and PIM router. If the ACE has the source address configured, the source address in the IGMPv3 report is matched against the ACL and corresponding action is taken. Existing joins timeout. With IGMPv2, if there is no match or if there is a deny rule match, the packet is dropped.
If the access list is configured for both L2 VLAN and L3 VLAN, then the L3 VLAN configuration is applied.

Example
Configure the access list:
switch(config)# vlan 2 switch(config-vlan-2)# ip igmp snooping apply access-list mygroup
Remove the access list:
switch(config)# vlan 2 switch(config-vlan-2)# no ip igmp snooping apply access-list mygroup

For more information on features that use this command, refer to the Multicast Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide

940

Command History

Release 10.13

Command Information

Platforms All platforms

Command context config-vlan

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

ip igmp snooping (config mode)
ip igmp snooping drop-unknown vlan-shared|vlan-exclusive fastlearn <PORT-LIST>
Description
Configures drop-unknown and fastlearn modes on the ports. While IGMP snooping is enabled, the traffic will be forwarded only to ports that made an IGMP request for the multicast. Drop unknown filters ensure that packets are not forwarded to ports that did not make a request for the traffic stream. This could either be a filter across all VLANs (vlan-shared) or per VLAN (vlan-exclusive). The default is vlan-shared. Fast learn enables the port to learn group information when receiving a topology change notification. By default, fast learn is not enabled on ports.

Parameter drop-unknown
vlan-shared vlan-exclusive fastlearn <PORT-LIST>
no ...

Description
Drop unknown filters ensure that packets are not forwarded to ports that did not make a request for the traffic stream.
Enables a shared VLAN filter on the switch. Default is vlanshared.
Enables an exclusive drop unknown filter per VLAN.
Enable fast learn on ports. This parameter specifies a list of one or more ports to be configured as fast learn ports. You can specify a single port, a comma-separated list of ports or a range of ports such as 1/1/1-1/1/3. You may also enter an L2 LAG (1-128)
Negates any configured parameter.

Example
On the 6400 Switch Series, interface identification differs. Configuring fast learn ports:

switch(config)# ip igmp snooping fastlearn 1/1/3 switch(config)# ip igmp snooping fastlearn 1/1/1-1/1/2 switch(config)# ip igmp snooping fastlearn 1/1/5,1/1/6

IGMP snooping commands | 941

Configuring a shared VLAN filter on the switch: switch(config)# ip igmp snooping drop-unknown vlan-shared
Configuring a exclusive drop unknown filter per VLAN: switch(config)# ip igmp snooping drop-unknown vlan-exclusive
Disabling drop unknown on the switch: switch(config)# no ip igmp snooping drop-unknown

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip igmp snooping filter unknown mcast
ip igmp snooping filter-unknown-mcast no ip igmp snooping filter-unknown-mcast
Description
Enables the avoidance of initial flooding of unknown multicast traffic on IGMP-snooping-enabled VLANs. The no form of this command returns to the default behavior of initial flooding of unknown multicast traffic.
Usage
In the default behavior, the unknown multicast traffic is flooded until the IP Multicast Flow programming is done on the hardware. This is known as initial flooding of unknown multicast. Use this command to filter unknown multicast instead of flooding.
Initial flooding of multicast traffic is observed for a few seconds after the device comes up from a reboot. This issue is only seen when the multicast source connected device is rebooted. Once the device is up after a reboot, it takes a few seconds for the CPU Rx rule to be programmed during the timeframe that the initial flooding is observed. This is an expected behavior.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

942

Example
Configure the unknown multicast to steal globally on IGMP snooping enabled VLANs.

switch# configure terminal switch(config)# ip igmp snooping filter-unknown-mcast

Removing the configuration of the unknown multicast to steal globally on IGMP snooping enabled VLANs.

switch# configure terminal switch(config)# no ip igmp snooping filter-unknown-mcast

Command History
Release 10.11

Modification Command introduced on the 6200, 6300, 6400, 8100, and 8360.

Command Information

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

ip igmp snooping (interface mode)
ip igmp snooping auto vlan <VLAN-LIST> blocked vlan <VLAN-LIST> fastleave vlan <VLAN-LIST> forced-fastleave vlan <VLAN-LIST> forward vlan <VLAN-LIST> no ...
Description
Configure IP IGMP snooping for the VLAN on the interface. When IGMP snooping is enabled, the L2 snooping switch forwards multicast packets of known multicast groups to only the receivers. When IGMP snooping is not enabled, the snooping switch floods multicast packets to all hosts on the VLAN.

Parameter auto vlan <VLAN-LIST>
blocked vlan <VLAN-LIST>

Description
Instruct the device to monitor incoming multicast traffic on the specified ports on a VLAN or VLAN range. This is the default behavior. Enter the number of a single VLAN or a series of numbers for a range of VLANs, separated by commas (10, 20, 30, 40), dashes (10-40), or both (10-40,60).
Configures the specified ports in blocked mode for the specified VLAN list. In blocked mode, joins and traffic are always

IGMP snooping commands | 943

Parameter fastleave vlan <VLAN-LIST>
forced-fastleave vlan <VLAN-LIST> forward vlan <VLAN-LIST> no ...

Description
blocked on this port. Enter the number of a single VLAN or a series of numbers for a range of VLANs, separated by commas (10, 20, 30, 40), dashes (10-40), or both (10-40,60).
IGMP fastleave is configured for ports on a per-VLAN basis. Upon receiving a Leave Group message, the querier sends an IGMP Group-Specific Query message out of the interface to ensure that no other receivers are connected to the interface. If receivers are directly attached to the switch, it is inefficient to send the membership query as the receiver wanting to leave is the only connected host. When a fastleave-enabled switch port is connected to a single host and receives a leave, the switch does not wait for the querier status update interval, but instead immediately removes the IGMP client from its IGMP table and ceases transmitting multicast traffic to the client. (If the switch detects multiple end nodes on the port, Fastleave does not activate regardless of whether one or more of these end nodes are IGMP clients.) This processing speeds up the overall leave process and also eliminates the CPU overhead of having to generate an IGMP Group-Specific Query message. This parameter specifies a list of VLANs on which the port should be configured as a fastleave port. Specifies the number of a single VLAN or a series of numbers for a range of VLANs, separated by commas (10, 20, 30, 40), dashes (10-40), or both (10-40,60).
With forced fastleave enabled, IGMP speeds up the process of blocking unnecessary multicast traffic to a switch port that is connected to multiple end nodes. When a port having multiple end nodes receives a leave group request from one end node for a given multicast group, forced fastleave activates and waits for a second to receive a join request from any other member of the same group on that port. If the port does not receive a join request for that group within the forced fastleave interval, the switch then blocks any further traffic to that group on that port. This parameter specifies a list of VLANs on which the port should be configured as a forced fastleave port. Specifies the number of a single VLAN or a series of numbers for a range of VLANs, separated by commas (10, 20, 30, 40), dashes (10-40), or both (10-40,60). This command is available in config-if mode.
Configures the specified ports in forward mode in the given VLAN list. In forward mode, traffic is always forwarded on this port, irrespective of joins. Specify a list of VLANs on which the port should be configured as a forward port. Specifies the number of a single VLAN or a series of numbers for a range of VLANs, separated by commas (10, 20, 30, 40), dashes (10-40), or both (10-40,60). This command is available in config-if mode.
Negates any configured parameter.

Example
On the 6400 Switch Series, interface identification differs. Configure auto ports for VLAN on the interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

944

switch# configure terminal switch(config)# int 1/1/1 switch(config-if)# no shut switch(config-if)# no routing switch(config-if)# vlan trunk allowed 10-20 switch(config-if)# ip igmp snooping auto vlan 10 switch(config-if)# ip igmp snooping auto vlan 10-20
Configuring fastleave ports for the VLAN on the interface:
switch# configure terminal switch(config)# int 1/1/1 switch(config-if)# no shut switch(config-if)# no routing switch(config-if)# vlan trunk allowed 10-20 switch(config-if)# ip igmp snooping fastleave vlan 10 switch(config-if)# ip igmp snooping fastleave vlan 10-20
Configuring blocked ports for the VLAN on the interface:
switch# configure terminal switch(config)# int 1/1/1 switch(config-if)# no shut switch(config-if)# no routing switch(config-if)# vlan trunk allowed 10-20 switch(config-if)# ip igmp snooping blocked vlan 10 switch(config-if)# ip igmp snooping blocked vlan 10-20

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip igmp snooping preprogram-starg-flow
ip igmp snooping preprogram-starg-flow {enable | disable}
Description
Configures preprogramming of the starg flow feature on the IGMP snooping enabled VLAN.

IGMP snooping commands | 945

Parameter enable disable

Description Enables preprogramming starg flows on the VLAN. Disables preprogramming starg flows on the VLAN.

Usage
When this feature is enabled, a summarized multicast bridge entry is programmed into the hardware table when an IGMPv2 or IGMPv3 join is received on the IGMP snooping enabled VLAN. This enables multicast flow to be programmed in the hardware before the data packet arrives for a multicast flow. If an unknown packet is received for a multicast flow, having this feature enabled triggers programming of starg entry in the hardware on selected platforms, which is helpful in optimizing hardware resource utilization and PIM registration in deployments where a L2 device is connected along the PIM registration path.
This feature is currently supported for IGMPv2 and IGMPv3 joins, so IGMPv3 joins that are sent for a specific source are treated as IGMPv2 joins and summarized entry is programmed in the corresponding hardware.
Preprogramming of starg flows is supported only on the IGMP snooping enabled VLANs. If IGMP snooping is disabled on a VLAN, this feature is auto-disabled.
This feature is currently supported for IGMPv2 and IGMPv3 joins, as a result, summarized multicast flow is programmed in advance when an IGMPv2 join or IGMPv3 join for a specific group is received. For IGMPv3 deployments, traffic from all sources for a specific multicast group is sent to all clients, regardless of whether they send IGMPv2 or IGMPv3 joins for this group. Keeping this feature disabled is recommended on VLANs where traffic from the specific source is only expected for the IGMPv3 clients.
On the 6200, 6300, 6400, 8100, and 8360 switch series, a single starg entry is programmed in advance for each join received. Data driven programming of SG entries does not occur when traffic is received from a specific source for this group. A single starg entry is used to forward the traffic to the clients for all of the active joins in the feature enabled VLANs.
When an unknown multicast packet is received on a VLAN where this feature is enabled, it triggers programming of a starg entry in the hardware instead of the SG.
It is highly recommended to not enable this feature on devices where PIM or L3 multicast routing is enabled as it can lead to issues like permanent traffic loss.
Configuring this feature on devices where there are multiple sources sending traffic for the same group address is recommended.
This feature is mutually exclusive with the IGMP snooping static group feature.
Example
Enable preprogramming multicast starg flows:

switch(config)# vlan 2 switch(config-vlan-2)# ip igmp snooping preprogram-starg flow enable

Disable preprogramming multicast starg flows:

switch(config)# vlan 2 switch(config-vlan-2)# ip igmp snooping preprogram-starg flow disable

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

946

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms
6300 6400

Command context config-vlan

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

ip igmp snooping static group
ip igmp snooping static group <GROUP-NAME> no ip igmp snooping static group <GROUP-NAME>
Description
Configures static multicast group. The no form of this command removes the configuration.

Parameter <GROUP-NAME>

Description Specifies the group name.

Example
Configure static multicast group on group 239.1.1.1:

switch(config)# vlan 2 switch(config-vlan-2)# ip igmp snooping static-group 239.1.1.1

Remove static multicast group on group 239.1.1.1:

switch(config)# vlan 2 switch(config-vlan-2)# no ip igmp snooping static-group 239.1.1.1

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13

Modification Command introduced.

IGMP snooping commands | 947

Command Information

Platforms All platforms

Command context config-vlan

Authority
Administrators or local user group members with execution rights for this command.

ip igmp snooping (vlan mode)
ip igmp snooping apply access-list <ACL-NAME> enable|disable no ... static-group <MULTICAST-IP-ADDRESS> version <2-3> (vlan interface mode)
Description
These commands enable or disable IP IGMP snooping on the VLAN, create IGMP snooping static multicast groups, set the IGMP snooping version and configurethe ACL on a particular interface.
Disabling and enabling IGMP snooping on a VLAN causes IGMP querier re-election.

Parameter access-list enable|disable no ... static-group <MULTICAST-IP-ADDRESS>
version <2-3>

Description
Associates an ACL with the IGMP.
Enables or disables IGMP snooping on the VLAN. By default, IGMP snooping is disabled.
Negates any configured parameter.
This parameter configures an IGMP snooping static multicast group. Specify the IGMP static multicast group IP address in A.B.C.D format. You can configure a maximum of 32 IGMP snooping static
Configures the IGMP snooping version on the VLAN. Select 2 for IGMPv2 (RFC2236). Select 3 for IGMPv3 (RFC3376).

Usage
n Existing classifier commands are used to configure the ACL. n In case an IGMPv3 packet with multiple group addresses is received, the switch only processes the
permitted group addresses based on the ACL rule set. The packet is forwarded to querier and PIM router even though one of the groups present in the packet is blocked by the ACL. This avoids the delay in learning of the permitted groups. Since the access switch configured with ACL blocks the traffic for the groups which are denied, forwarding of joins has no impact. If all the groups in the packet are denied by the ACL rule, the packet is not forwarded to the querier and PIM router. Existing joins will timeout. n In case of IGMPv2, if there is no match or if there is a deny rule match, the packet is dropped.

If the access list is configured for both L2 VLAN and L3 VLAN, the L3 VLAN configuration will be applied.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

948

Example
On the 6400 Switch Series, interface identification differs. Enable IGMP snooping on a VLAN:
switch(config)# vlan 2 switch(config-vlan)# ip igmp snooping enable
Disable IGMP snooping on a VLAN:
switch(config)# vlan 2 switch(config-vlan)# ip igmp snooping disable
Configuring an IGMP snooping static group:
switch(config)# vlan 2 switch(config-vlan)# ip igmp snooping static-group 239.1.1.1 switch(config-vlan)# no ip igmp snooping static-group 239.1.1.1
Configuring IGMP snooping version on the VLAN:
switch(config)# vlan 2 switch(config-vlan)# ip igmp snooping version 2

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

show ip igmp snooping
show ip igmp snooping counters detail groups [vlan <vlan-id>] no ... packet-exceptions static-groups statistics

IGMP snooping commands | 949

vlan <vlan-id> [group {<ip-addr> [client_details]}|{port <IF-NAME>}|{vtep-peer <A.B.C.D>}] vsx-peer
NOTE: The vsx-peer parameter is not supported by the 6300 Series Switch

Description
Shows IGMP snooping configuration information and status for all VLANs. Specify a VLAN ID or a VLAN and a group to display details for only that VLAN or VLAN group.

Parameter counters detail groups
no ... packet-exceptions static-groups statistics vlan <vlan-id>
group
<ip-addr> [client-details]
port <IF-NAME> vtep-peer <A.B.C.D> vsx-peer

Description
Shows IGMP query packets transmitted (Tx), received (Rx), and error packet counters.
Shows IGMP Snooping details for all VLANs, including joined ports or VXLAN tunnel endpoints (VTEPs) for each group in the VLAN.
Shows IGMP snooping groups information. Include the optional vlan <vlan-id> parameter to display information for groups on a specific VLAN.
Negates any configured parameter.
Troubleshoot issues in L2 multicast bridge entries for data packets forwarded to the CPU.
Shows MLD snooping static group details, including the number of static groups joined.
Shows MLD snooping statistics.
Shows IGMP snooping protocol information and number of different groups joined for the VLAN.
Shows IGMP snooping group information for the specified VLAN, including the number of different groups joined for the VLAN. Identify the group by IP address or interface name.
Shows IGMP snooping group address information. Include the optional client details parameter to display IGMP snooping client details.
Shows IGMP snooping group information for the interface name in member/slot/port format.
Shows IGMP snooping info for the specified VTEP.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing IGMP snooping configuration and status:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

950

switch# show ip igmp snooping
IGMP Snooping Protocol Info
Total VLANs with IGMP enabled IGMP Drop Unknown Multicast

:1 : Global

VLAN ID : 1 VLAN Name : DEFAULT_VLAN_1 IGMP Snooping is not enabled
VLAN ID : 2 VLAN Name : VLAN2 IGMP Configured Version : 3 IGMP Operating Version : 3 IGMP preprogram-starg-flow is operational Querier Address [this switch] : 20.1.1.1 Querier Port : Querier UpTime :0m 21s Querier Expiration Time :0m 2s

Include the detail parameter for additional information on joined ports or VTEPs, as shown in the example below:

switch# show ip igmp snooping detail

IGMP Snooping Protocol Info

Total VLANs with IGMP enabled

:1

Current count of multicast groups joined : 4

IGMP Drop Unknown Multicast

: Global

VLAN ID : 100

VLAN Name : VLAN100

IGMP Configured Version : 3

IGMP Operating Version : 3

IGMP preprogram-starg-flow is not operational

Querier Address [this switch] : 15.1.1.1

Querier Port :

Querier UpTime :9m 32s

Querier Expiration Time :0m 10s

Router Detected Port(s) :

Active Group Address Tracking Vers Mode Uptime Expires Ports/Vteps

--------------------- ---------- ---- ---- --------- ---------- ------------------

------------

225.1.1.1

Filter 3 EXC 1m 2s

3m 19s

200.1.1.1,200.1.1.2

1/6/22

225.1.1.2

Filter 3 EXC 1m 2s

3m 19s

200.1.1.1,200.1.1.2

1/6/22

226.1.1.1

Filter 3 EXC 1m 4s

3m 16s

200.1.1.3

226.1.1.2

Filter 3 EXC 1m 4s

3m 16s

200.1.1.3

Showing IGMP snooping packet exceptions:

IGMP snooping commands | 951

switch# show ip igmp snooping packet-exceptions List of L2 Multicast Bridge entries for which data packets are hitting CPU

VRF: default

Vlan Group Address

Time

---- --------------------

------------

10

232.2.2.2/32

10

232.2.2.3/32

10

232.2.2.3/32

20

232.2.2.2/32

20

233.2.2.2/32

0001y:02m:02w:05d

Source-Address
---------------------
100.100.1.10/32 100.100.1.10/32 100.100.1.11/32 50.1.1.10/32 50.1.1.10/32

Packet Count
------------
19 42 32 31 38

Last Seen
-------------
00h:02m:03s 01h:01m:59s 28d:10h:01m 01m:02w:01d

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.13 10.10 10.07 or earlier

Modification Programming starg flow is now supported. The packet-exceptions parameter is introduced. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

952

Chapter 50 In-System Programming commands

In-System Programming commands

clear update-log
clear update-log
Description
Clears stored log files of any In-System Programming updates on the system.
For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show needed-updates
show needed-updates [next-boot [primary|secondary]]
Description
Displays whether any programmable devices are in need of an update. Without the next-boot parameter, this command displays needed updates relative to the currently running AOS-CX image. With the next-boot parameter, this command displays needed updates relative to an AOS-CX image file in the persistent storage of the switch, which might be different from the currently running image. If either the primary or secondary parameter is specified, this command queries that specific AOS-CX image file. Otherwise, it queries the default AOS-CX image file as set by the most recent boot system or boot set-default command.
For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History

AOS-CX 10.14 Command-Line Interface Guide

953

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

In-System Programming commands | 954

Chapter 51 Interface commands

Interface commands
allow-unsupported-transceiver
allow-unsupported-transceiver [confirm | log-interval {none | <INTERVAL>}] no allow-unsupported-transceiver
Description
Allows unsupported transceivers to be enabled or establish connections. Transceivers with speeds up to 100G are enabled by this command.
The following models will enable unsupported transceivers for speeds up to 100G when running AOS-CX 10.10 or later:
n 6300 Series Switches--Up to 50G n 6400 Series Switches--Up to 100G

This command is enabled by default, allowing the use of third party transceiver products without adding the command in the configuration. Disabling this command with the no form will now disable the command in the running and stored configurations.
The no form of this command disallows using unsupported transceivers.

Parameter confirm
log-interval none log-interval <INTERVAL>

Description
Specifies that unsupported transceiver warnings are to be automatically confirmed.
Disables unsupported transceiver logging.
Sets the unsupported transceiver logging interval in minutes. Default: 1440 minutes. Range: 1440 to 10080 minutes.

Usage
When none of the parameters are specified it will display a warning message to accept the warranty terms. With confirm option the warning message is displayed but the user is not prompted to (y/n) answering. Warranty terms must be agreed to as part of enablement and the support is on best effort basis.
Examples
Allowing unsupported transceivers with follow-up confirmation:

AOS-CX 10.14 Command-Line Interface Guide

955

switch(config)# allow-unsupported-transceiver Warning: The use of unsupported transceivers, DACs, and AOCs is at your own risk and may void support and warranty. Please see HPE Warranty terms and conditions. Do you agree and do you want to continue (y/n)? y
Allowing unsupported transceivers with confirmation in command syntax:
switch(config)# allow-unsupported-transceiver confirm Warning: The use of unsupported transceivers, DACs, and AOCs is at your own risk and may void support and warranty. Please see HPE Warranty terms and conditions.
Configuring unsupported transceiver logging with an interval of every 48 hours:
switch(config)# allow-unsupported-transceiver log-interval 2880
Disabling unsupported transceiver logging:
switch(config)# allow-unsupported-transceiver log-interval none
Disallowing unsupported transceivers with follow-up confirmation:
switch(config)# no allow-unsupported-transceivers Warning: Unsupported transceivers, DACs, and AOCs will be disabled, which could impact network connectivity. Use 'show allow-unsupported-transceiver' to identify unsupported transceivers, DACs, and AOCs. Ccontinue (y/n)? y
Disallowing unsupported transceivers with confirmation in command syntax:
switch(config)# no allow-unsupported-transceiver confirm Warning: Unsupported transceivers, DACs, and AOCs will be disabled, which could impact network connectivity. Use 'show allow unsupported-transceiver' to identify unsupported transceivers, DACs, and AOCs. switch(config)#
For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History
Interface commands | 956

Release 10.10

10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Up to 100G support enabled for unsupported transceivers on 6300 (up to 50G) and 6400 (up to 100G) series switches in UT mode. --
Authority Administrators or local user group members with execution rights for this command.

default interface
default interface <INTERFACE-ID>
Description
Sets an interface (or a range of interfaces) to factory default values.

Parameter <INTERFACE-ID>

Description
Specifies the ID of a single interface or range of interfaces. Format: member/slot/port or member/slot/port-member/slot/port to specify a range.

Examples
On the 6400 Switch Series, interface identification differs. Resetting an interface:

switch(config)# default default interface 1/1/1

Resetting an range of interfaces:

switch(config)# default default interface 1/1/1-1/1/10

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

957

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

description
description <DESCRIPTION> no description
Description
Associates descriptive information with an interface to help administrators and operators identify the purpose or role of an interface. The no form of this command removes a description from an interface.

Parameter <DESCRIPTION>

Description
Specify a description for the interface. Range: 1 to 64 ASCII characters (including space, excluding question mark).

Examples
Setting the description for an interface to DataLink 01:

switch(config-if)# description DataLink 01

Removing the description for an interface.

switch(config-if)# no description

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

energy-efficient-ethernet

Interface commands | 958

energy-efficient-ethernet
Description
Enables auto-negotiation of Energy-Efficient Ethernet (EEE) on an interface. EEE Negotiation is established only on auto-link negotiation with supported link partners.
Examples
Configuring an interface:
switch(config)# interface 1/1/1 switch(config-if)# energy-efficient-ethernet
Disabling Energy Efficient Ethernet on an interface:
switch(config)# interface 1/1/1 switch(config-if)# no energy-efficient-ethernet

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

error-control
error-control {auto | none | base-r-fec | rs-fec} no error-control {auto | none | base-r-fec | rs-fec}
Description
Configures the forward error correction (FEC) mode to use for an interface. When not configured, the system will automatically select the FEC mode based on the installed transceiver. In most cases, the standard FEC mode will work best, but certain link partners may require a non-standard mode. The no and auto forms of this command configure the interface to automatically use the standard FEC mode of the currently installed transceiver.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

959

FEC configuration only applies to transceivers, DACs, or AOCs running at 25G or 100G. 100G DACs are a special case. They can only set FEC to none when auto-negotiation is disabled through the speed override command. The default for the installed transceiver is used in all other cases.

Transceivers for which FEC is auto-negotiated will request the mode configured by this command, but may resolve to a different mode. The applied FEC mode is displayed as a commented line in the configuration shown with the show run command. It is also displayed with show interface command.

Parameter auto none base-r-fec rs-fec

Description Use the transceiver default. Do not use any FEC. Use IEEE BASE-R (Firecode) FEC. Use IEEE RS (Reed-Solomon) FEC.

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.11 10.08.1021

Command Information

Platforms
6300 6400

Command context config-if

Modification Command enabled on 6400 and 8400 Switch Series. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

flow-control
flow-control rxtx no flow-control rxtx
Description
Command flow-control enables negotiation of IEEE 802.3x link-level flow control on the current interface. The switch advertises link-level flow control support to the link partner. The final configuration is determined based on the capabilities of both partners. Each invocation of this command replaces the previous configuration.

Interface commands | 960

The no form of these commands disables any configured flow control on the selected interface.

Parameter rxtx

Description
Enables the ability to honor received and to transmit IEEE 802.3x LLFC pause frames to the remote device.

Usage (flow control)
n For interfaces that auto-negotiate, link-level flow control is subject to negotiation, plus speed and other parameters. Both ends of the link must negotiate the same flow control mode for it to be applied.
n For interfaces that do not auto-negotiate, the configured link-level flow control mode is always applied and the user is responsible for ensuring that both ends of the link are configured for the same mode.
n All members of a LAG must have the same flow control configuration. n Lossless flow control is only supported for single destination unicast traffic. Replicated traffic (for
example, broadcast, multicast, mirroring) cannot be guaranteed to be lossless. n Lossless behavior is not supported when operating in a VSF stack configuration. n Lossless flow control will only operate correctly when both the ingress and egress interfaces have
flow control enabled.
Examples
Enabling support for RXTX flow control:

switch(config)# interface 1/1/1 switch(config-if)# flow-control txrx

Disabling support for RXTX flow control:

switch(config)# interface 1/1/1 switch(config-if)# no flow-control txrx

hat use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

961

interface
interface <PORT-NUM>
Description
Switches to the config-if context for a physical port. This is where you define the configuration settings for the logical interface associated with the physical port.

Parameter <PORT-NUM>

Description Specifies a physical port number. Format: member/slot/port.

Examples
On the 6400 Switch Series, interface identification differs. Configuring an interface:

switch(config)# interface 1/1/1 switch(config-if)#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

interface loopback
interface loopback <ID> no interface loopback <ID>
Description
Creates a loopback interface and changes to the config-loopback-if context. Loopback interfaces are layer 3. The no form of this command deletes a loopback interface.

Parameter <INSTANCE>

Description Specifies the loopback interface ID. Range: 1 to 256

Interface commands | 962

Examples
switch# config switch(config)# interface loopback 1 switch(config-loopback-if)#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

interface vlan
interface vlan <VLAN-ID> no interface vlan <VLAN-ID>
Description
Creates an interface VLAN also know as an SVI (switched virtual interface) and changes to the config-ifvlan context. The specified VLAN must already be defined on the switch. The no form of this command deletes an interface VLAN.

Parameter <VLAN-ID> none

Description Specifies the loopback interface ID. Do not reserve any internal VLANs.

Examples

switch# config switch(config)# vlan 10 switch(config-vlan-10)# exit switch(config)# interface vlan 10 switch(config-if-vlan)#

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

963

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip address
ip address <IP-ADDR>/<MASK> [secondary] no ip address <IP-ADDR>/<MASK> [secondary]
Description
Sets an IPv4 address for the current layer 3 interface. The no form of this command removes the IPv4 address from the interface.

Parameter <IP-ADDR>
<MASK> secondary

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. You can remove leading zeros. For example, the address 192.169.005.100 becomes 192.168.5.100.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies a secondary IP address.

Examples
On the 6400 Switch Series, interface identification differs. Creating a layer 3 interface setting its IP address to 192.168.100.1 with a mask of 24 bits.

switch(config)# interface 1/1/1 switch(config-if)# routing switch(config-if)# ip address 192.168.100.1/24

Assigning the IP address 192.168.20.1 with a mask of 24 bits to loopback interface 1:

switch(config)# interface loopback 1 switch(config-loopback-if)# routing

Interface commands | 964

switch(config-loopback-if)# ip address 192.168.20.1/24
Assigning the IP address 192.168.199.1 with a mask of 24 bits to interface VLAN 10:
switch(config)# interface vlan 10 switch(config-if-vlan)# ip address 192.168.199.1/24
Removing the IP address 192.168.199.1 with a mask of 24 bits from interface VLAN 10:
switch(config)# interface vlan 10 switch(config-if-vlan)# no ip address 192.168.199.1/24

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
config-if config-loopback-if config-if-vlan

Authority
Administrators or local user group members with execution rights for this command.

ip mtu
ip mtu <VALUE>
no ip mtu
Description
Sets the IP MTU (maximum transmission unit) for an interface. This defines the largest IP packet that can be sent or received by the interface. This value should be less than or equal to the overall MTU for the interface. The no form of this command sets the IP MTU to the default value 1500. This command is only allowed when routing is enabled on the interface.

Parameter <VALUE>

Description Specifies the IP MTU in bytes. Range: 68 to 9198. Default: 1500.

Usage

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

965

The IP MTU value for subinterface must be less than or equal to the parent MTU for the subinterface. The subinterface uses its IP MTU value and not the parent IP MTU value.
Examples
Setting the IP MTU to 576 bytes:
switch(config-if)# ip mtu 576
Setting the IP MTU to the default value:
switch(config-if)# no ip mtu
Setting the IP MTU value on a subinterface:
switch(config)# interface 1/1/1.10 switch(config-subif)# ip mtu 6000

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if config-if-vlan config-subif

Modification Subinterface support added. --
Authority Administrators or local user group members with execution rights for this command.

ipv6 address
ipv6 address <IPV6-ADDR>/<MASK>{eui64 | [tag <ID>]} no ipv6 address <IPV6-ADDR>/<MASK>
Description
Sets an IPv6 address on the interface. The no form of this command removes the IPv6 address on the interface.

Interface commands | 966

This command automatically creates an IPv6 link-local address on the interface. However, it does not add the ipv6 address link-local command to the running configuration. If you remove the IPv6 address, the link-local address is also removed. To maintain the link-local address, you must manually execute the ipv6 address linklocal command.

Parameter <IPV6-ADDR>
<MASK> eui64 tag <ID>

Description
Specifies the IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. You can use two colons (::) to represent consecutive zeros (but only once), remove leading zeros, and collapse a hextet of four zeros to a single 0. For example, this address 2222:0000:3333:0000:0000:0000:4444:0055 becomes 2222:0:3333::4444:55.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Configure the IPv6 address in the EUI-64 bit format.
Configure route tag for connected routes. Range: 0 to 4294967295. Default: 0.

Examples
Setting the IPv6 address 2001:0db8:85a3::8a2e:0370:7334 with a mask of 24 bits:

switch(config-if)# ipv6 address 2001:0db8:85a3::8a2e:0370:7334/24

Removing the IP address 2001:0db8:85a3::8a2e:0370:7334 with mask of 24 bits:

switch(config-if)# no ipv6 address 2001:0db8:85a3::8a2e:0370:7334/24

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

967

l3-counters
l3-counters [rx | tx] no l3-counters [rx | tx]
Description
Enables counters on a layer 3 interface. By default, all interfaces are layer 3. To change a layer 2 interface to layer 3, use the routing command. The no form of this command, with no specification, disables both transmit and receive counters on a layer 3 interface. To disable transmit (tx) or receive (rx) counters only, specify the counter type you want to disable.

Parameter rx tx

Description Specifies receive counters. Specifies transmit counters.

Examples
Enabling layer 3 transmit counters On the 6300 Switch Series:

switch(config)# interface 1/1/1 switch(config-if)# routing switch(config-if)# l3-counters

On the 6400 Switch Series:

switch(config)# interface 1/3/1 switch(config-if)# routing switch(config-if)# l3-counters

Enabling layer 3 transmit counters on subinterfaces On the 6300 Switch Series:

switch(config)# interface 1/1/1.10 switch(config-if)# routing switch(config-if)# l3-counters tx

On the 6400 Switch Series:

switch(config)# interface 1/3/1.10 switch(config-if)# routing switch(config-if)# l3-counters tx

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

Interface commands | 968

Release 10.08 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-subif

Modification Added support for 13 counters on subinterfaces --
Authority Administrators or local user group members with execution rights for this command.

mtu
mtu <VALUE> no mtu
Description
Sets the MTU (maximum transmission unit) for an interface. This defines the maximum size of a layer 2 (Ethernet) frame. Frames larger than the MTU (1500 bytes by default) are dropped and cause an ICMP fragmentation-needed message to be sent back to the originator. To support jumbo frames (frames larger than 1522 bytes), increase the MTU as required by your network. A frame size of up to 9198 bytes is supported. The largest possible layer 1 frame will be 18 bytes larger than the MTU value to allow for link layer headers and trailers. The no form of this command sets the MTU to the default value 1500.

Parameter <VALUE>

Description Specifies the MTU in bytes. Range: 46 to 9198. Default: 1500.

Examples
On the 6400 Switch Series, interface identification differs. Setting the MTU on interface 1/1/1 to 1000 bytes:

switch(config)# interface 1/1/1 switch(config-if)# no routing switch(config-if)# mtu 1000

Setting the MTU on interface 1/1/1 to the default value:

switch(config)# interface 1/1/1 switch(config-if)# no routing switch(config-if)# no mtu

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

969

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

persona
persona {access | uplink | custom <PERSONA-NAME>} [copy | attach] no persona {access | uplink | custom <PERSONA-NAME>} [copy | attach]
Description
Associates one of three persona types with an interface to classify the purpose or role of an interface. On the 10000 Switch Series, "access" persona ports are typically connected to workloads / VMs, and the "uplink" (fabric) persona ports are connected to the core / spine. The no form of this command removes the interface persona.

Parameter access uplink custom <PERSONA-NAME>
copy
attach

Description
Selects the access persona type.
Selects the uplink persona type.
Selects the custom persona type with a user-provided name. Range: 1 to 64 printable ASCII characters including space.
Specifies the mode: copies settings from the persona interface of the same name.
Specifies the mode: attaches the specified interface to the persona interface of the same name.

Usage
n If the mode is specified, either copy or attach, the interface configuration is dependent on the interface template whose name is "access", "uplink", or "<PERSONA-NAME>". On the other hand, if the mode is not specified, then the persona is just a label in the interface, and its configuration is not modified even if the interface persona exists. When configuring the mode, one of the following options is possible:

Interface commands | 970

o The copy option performs a one-time copy of the template interface. Subsequent changes to the template are not copied and the 'persona' setting is just a label. If the mode is set to copy and the interface persona does not exist, then the CLI command fails with the message "Interface persona not found".
o The attach option performs a copy of the template interface, and subsequent changes to the template interface configuration are immediately applied to all attached interfaces. The template interface does not need to exist before attaching other interfaces to it. After attaching a template, the copied settings can be modified for an individual interface. However, any change in the attached template will overwrite the modified values with the new template values.
n When a mode is specified, it should match an interface created with the command interface persona <PERSONA-NAME>. The only exception to this rule is when the mode is set to attach and the persona does not already exist.
n The mode is only available to be configured for an interface that meets the following conditions: o IS a physical interface o IS NOT a LAG member o IS NOT a persona interface
Examples
Configuring an access persona:
switch(config)# interface 1/1/1 switch(config-if)# persona access
Configuring an uplink persona:
switch(config)# interface 1/1/1 switch(config-if)# persona uplink
Configuring a custom persona named "mypersona":
switch(config)# interface 1/1/1 switch(config-if)#persona custom mypersona
Removing the persona setting.
switch(config-if)# no persona
Copying a predefined persona name configuration to an interface: 1. Configuring the interface persona:
switch(config)# interface persona uplink switch(config-if)# no shutdown switch(config-if)# no routing switch(config-if)# vlan access 100 switch(config-if)# exit
2. Applying the configuration from the persona named "mypersona" with copy mode:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

971

switch(config)# interface 1/1/1 switch(config-if)# persona custom mypersona copy switch(config-if)# exit
Attaching a custom persona name named "mypersona" to several interfaces simultaneously: 1. Configuring an interface persona named "mypersona":
switch(config)# interface persona mypersona switch(config-if)# no shutdown switch(config-if)# vrf attach upstream switch(config-if)# exit
2. Applying the "mypersona" configuration with attach mode:
switch(config)# interface 1/1/1-1/1/24 switch(config-if)# persona custom mypersona attach switch(config-if)# exit

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10 10.09

Command Information

Platforms All platforms

Command context config-if

Modification Added optional parameters: attach, copy. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

rate-interval
rate-interval <VALUE> no rate-interval
Description
This command sets the time interval to calculate interface rates. Lower intervals are more useful for detecting traffic bursts, but may increase computation load to the overall system. Intervals must be a multiple of five seconds. The command-line interface will not accept a rate interval value that is not a multiple of five. The no form of this command sets the rate collection interval to the default value of 300 seconds.

Interface commands | 972

Parameter <VALUE>

Description
The statistics rate collection interval in seconds. The supported range is 5-300 seconds, where the number of seconds is a multiple of five.
NOTE: The supported range for 6400 and 8400 switch series is 30 - 300 seconds.

Examples
Setting the rate collection interval to 50 seconds
switch(config)# interface 1/1/1 switch(config-if)# rate-interval 50
Setting the rate collection interval to the default value:
switch(config-if)# no rate-interval
The following example shows the command-line interface warning that appears while configuring an invalid rate-interval.
switch(config)# interface 1/1/1 switch(config-if)# rate interval 6 The interval must be a multiple of 5.

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Usage
The rate collection interval must be configured in the multiples of 5. Any other value will be rejected and the CLI will display the error message, The interval must be a multiple of 5.
Command History

Release 10.12.1000 10.12

Modification Command supported on all platforms. Command Introduced on 6300 and 8360 Switch series.

Command Information
Platforms Command context All platforms config-if

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

973

routing
routing no routing
Description
Enables routing support on an interface, creating a L3 (layer 3) interface on which the switch can route IPv4/IPv6 traffic to other devices. By default, routing is disabled on all interfaces. The no form of this command disables routing support on an interface, creating a L2 (layer 2) interface.
If you enable this configuration, collection of flow tracking statistics is disabled.

Examples
Enabling routing support on an interface: switch(config-if)# routing
Disabling routing support on an interface: switch(config-if)# no routing

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

show allow-unsupported-transceiver
show allow-unsupported-transceiver
Description
Displays configuration and status of unsupported transceivers.

Interface commands | 974

Examples
Showing unallowed unsupported transceivers:

switch(config)# show allow-unsupported-transceiver

Allow unsupported transceivers : no

Logging interval

: 1440 minutes

---------------------------------------------

Port

Type

Status

---------------------------------------------

1/1/31

SFP-SX

unsupported

1/1/32

SFP-1G-BXD

unsupported

1/1/2

SFP28DAC3

unsupported

Showing allowed unsupported transceivers:

switch# show allow-unsupported-transceiver

Allow unsupported transceivers : yes

Logging interval

: 1440 minutes

---------------------------------------------

Port

Type

Status

---------------------------------------------

1/1/31

SFP-SX

unsupported-allowed

1/1/32

SFP-1G-BXD

unsupported-allowed

1/1/2

SFP28DAC3

unsupported

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

show interface
show interface [<IFNNAME>|<IFRANGE>] [brief | physical] show interface [<IFNNAME>|<IFRANGE>] [extended [non-zero] | [human-readable]] show interface [<IFNNAME>] monitor [human-readable] show interface [lag | loopback | tunnel | vlan ] [<ID>] [brief] show interface lag [<LAG-ID>] [extended [non-zero] | [human-readable]] show interface lag [<LAG-ID>] monitor [human-readable]
Description
Shows active configurations and operational status information for interfaces.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

975

Parameter <IFNAME> <IFRANGE> brief physical extended
human-readable
non-zero LAG monitor LOOPBACK TUNNEL VLAN <LAG-ID> <LOOPBACK-ID> <TUNNEL-ID> <VLAN-ID> VXLAN <VXLAN-ID>

Description
Specifies a interface name.
Specifies the port identifier range.
Shows brief info in tabular format.
Shows the physical connection info in tabular format.
Shows additional statistics, including the tx filtered and rx filtered counters. n Rx filter packets are protocol packets received when the
protocol is disabled on the switch and there is only one port in the VLAN. Protocols include OSPF, PIM, RIP, LACP, and LLDP. n An example of a Tx filtered packet would be a multicast packet being filtered from going out of the ingress port.
Shows statistics rounded to the nearest power of 1000, for example, 1K, 345M, 2G. This is available only in the CLI interface output.
Shows only non zero statistics.
Shows LAG interface information.
Continuously monitor interface statistics.
Shows loopback interface information.
Shows tunnel interface information.
Shows VLAN interface information.
Specifies the LAG number. Range: 1-256
Specifies the LOOPBACK number. Range: 0-255
Specifies the tunnel ID. Range: 1-255
Specifies the VLAN ID. Range: 1-4094
Shows the VXLAN interface information.
Specifies the VXLAN interface identifier. Default: 1

Examples
Showing interface information when it is configured as a route-only port:

switch# show interface 1/1/1 Interface 1/1/1 is up Admin state is up Link state: up for 2 days (since Sun Jun 21 05:30:22 UTC 2020) Link transitions: 1 Description: backup data center link Hardware: Ethernet, MAC Address: 70:72:cf:fd:e7:b4

Interface commands | 976

MTU 1500

Type 1GbT

Full-duplex

qos trust none

Speed 1000 Mb/s

Auto-negotiation is on

Flow-control: off

Error-control: off

Energy-Efficient Ethernet is enabledMDI mode: MDIX

L3 Counters: Rx Enabled, Tx Enabled

Rate collection interval: 300 seconds

Rates

RX

TX

Total (RX+TX)

------------- -------------------- -------------------- --------------------

Mbits / sec

0.00

0.00

0.00

KPkts / sec

0.00

0.00

0.00

Unicast

0.00

0.00

0.00

Multicast

0.00

0.00

0.00

Broadcast

0.00

0.00

0.00

Utilization %

0.00

0.00

0.00

Statistics

RX

TX

Total

------------- -------------------- -------------------- --------------------

Packets

0

0

0

Unicast

0

0

0

Multicast

0

0

0

Broadcast

0

0

0

Bytes

0

0

0

Jumbos

0

0

0

Dropped

0

0

0

Filtered

0

0

0

Pause Frames

0

0

0

L3 Packets

0

0

0

L3 Bytes

0

0

0

Errors

0

0

0

CRC/FCS

0

n/a

0

Collision

n/a

0

0

Runts

0

n/a

0

Giants

0

n/a

0

Other

0

0

0

Showing information when the interface is currently linked at a downshifted speed:
switch(config-if)# show interface 1/1/1 Interface 1/1/1 is up ... Auto-negotiation is on with downshift active
Showing information when the interface is currently linked with energy-efficient-ethernet negotiated:
switch(config-if)# show interface 1/1/1 Interface 1/1/1 is up ... Energy-Efficient Ethernet is enabled and active
Showing information when the interface is shut down during a VSX split:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

977

switch(config-if)# show interface 1/1/1 Interface 1/1/1 is down Admin state is up State information: Disabled by VSX Link state: down for 3 days (since Tue Mar 16 05:20:47 UTC 2021) Link transitions: 0 Description: Hardware: Ethernet, MAC Address: 04:09:73:62:90:e7 MTU 1500 Type SFP+DAC3 Full-duplex qos trust none Speed 0 Mb/s Auto-negotiation is off Flow-control: off Error-control: off VLAN Mode: native-untagged Native VLAN: 1 Allowed VLAN List: 1502-1505 Rate collection interval: 300 seconds

Rate

RX

TX

Total (RX+TX)

---------------- -------------------- -------------------- --------------------

Mbits / sec

0.00

0.00

0.00

KPkts / sec

0.00

0.00

0.00

Unicast

0.00

0.00

0.00

Multicast

0.00

0.00

0.00

Broadcast

0.00

0.00

0.00

Utilization

0.00

0.00

0.00

Statistic

RX

TX

Total

---------------- -------------------- -------------------- --------------------

Packets

0

0

0

Unicast

0

0

0

Multicast

0

0

0

Broadcast

0

0

0

Bytes

0

0

0

Jumbos

0

0

0

Dropped

0

0

0

Pause Frames

0

0

0

Errors

0

0

0

CRC/FCS

0

n/a

0

Collision

n/a

0

0

Runts

0

n/a

0

Giants

0

n/a

0

Showing information when the interface is configured with EEE and the EEE has auto-negotiated:

switch(config-if)# show interface 1/1/1 physical

----------------------------------------------------------------------------------

----------------------------------------------------------

Link Admin

Speed

Flow-Control

EEE

PoE Power

Port

Port

Type

Status Config Status | Config Status | Config

Status | Config (Watts) State Information Description

----------------------------------------------------------------------------------

----------------------------------------------------------

1/1/1

1GbT

up

up

1G

auto

off

off

on

on

--

10M/100M/1G

--

Showing the monitor information:

Interface commands | 978

In monitor mode, the CLI refreshes data automatically until it is exited by entering q. Pressing ? opens the help menu to display which options are available in this context.

Interface 1/1/1 is up

Rate

RX

TX

Total (RX+TX)

---------------- -------------------- -------------------- --------------------

MBits / sec

30196.43

30196.43

60392.85

MPkts / sec

58977.39

58977.40

117954.79

Unicast

0.00

0.00

0.00

Multicast

58977.39

58977.40

117954.79

Broadcast

0.00

0.00

0.00

Utilization %

75.49

75.49

150.98

Statistic

RX

TX

Total (RX+TX)

---------------- -------------------- -------------------- --------------------

Packets

4756527649

4756527865

9513055514

Unicast

0

0

0

Multicast

4756527649

4756527865

9513055514

Broadcast

2

0

2

Bytes

304417778668

304417795428

608835574096

Jumbos

0

0

0

Dropped

0

19028847730

19028847730

Pause Frames

0

0

0

Errors

0

0

0

CRC/FCS

0

n/a

0

help: ?, quit: q

Help for Interface Monitor h Toggle human-readable mode c Clear interface statistics Does not apply to rates Arrows, PgUp, PgDn, Home, End Navigate interface statistics Delay: 2 help: ?, quit: q
Showing the output for interface 1/1/1 in human-readable format:
In human-readable format, the < 1 symbol for Utilization indicates that the amount of packets is between zero and one. This is true in cases where the number of bytes increases but the number of packets and the Utilization value is not displayed even in the normal output, where the human-readable parameter is not included in the command.

switch(config-if)# show interface 1/1/1 human-readable

Interface 1/1/1 is up

Rate

RX

TX

Total (RX+TX)

---------------- -------------------- -------------------- --------------------

Bits / sec

3M

3M

6M

Pkts / sec

316

316

633

Unicast

319

319

638

Multicast

0

0

0

Broadcast

0

0

0

Utilization %

<1

<1

<1

Statistic

RX

TX

Total

---------------- -------------------- -------------------- --------------------

Packets

577K

577K

1M

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

979

Unicast Multicast Broadcast Bytes Jumbos Dropped Filtered Pause Frames Errors CRC/FCS Collision Runts Giants

577K

577K

1M

0

51

51

0

15

15

744M

745M

1G

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

n/a

0

n/a

0

0

0

n/a

0

0

n/a

0

Showing information about extended counters:
The output of the show interface extended command varies depending on the switch model and configuration.

switch(config-if)# show interface 1/1/17 extended

-------------------------------------------------------------------

Interface 1/1/17

-------------------------------------------------------------------

Statistics

Value

-------------------------------------------------------------------

Dot1d Tp Port In Frames

547

Dot1d Tp Port Out Frames

608

Dot3 In Pause Frames

0

Dot3 Out Pause Frames

0

Ethernet Stats Broadcast Packets

19

Ethernet Stats Bytes

40162

Ethernet Stats Packets

342

...

-------------------------------------------------------------------

Error-Statistics

Value

-------------------------------------------------------------------

Dot1d Base Port MTU Exceeded Discards

0

Dot3 Control In Unknown Opcodes

0

Dot3 Stats Alignment Errors

0

Dot3 Stats FCS Errors

0

Dot3 Stats Frame Too Longs

0

Dot3 Stats Internal Mac Transmit Errors

0

Ethernet RX Oversize Packets

0

...

Showing interface link-status:

switch# show interface link-status -------------------------------------------------------------

Port

Type

Physical Link

Last

Link State Transitions Change

-------------------------------------------------------------

1/1/1

1G-BT

down

0

--

1/1/2

1G-BT

up

1

1 minute ago (Fri Mar 09

12:36:56 UTC 2018)

Interface commands | 980

1/1/3

1G-BT

12:36:56 UTC 2018)

1/1/4

--

1/1/5

--

up

1

down

0

down

0

1 minute ago (Fri Mar 09
---

Showing interface loopback 1 link-status:

-------------------------------------------------------------

Physical Link

Last

Port

Type

Link State Transitions Change

-------------------------------------------------------------

loopback1

--

up

--

--

Showing interface 1/1/2-1/1/3 link-status:

-------------------------------------------------------------

Physical Link

Last

Port

Type

Link State Transitions Change

-------------------------------------------------------------

1/1/2

1G-BT

up

1

1 minute ago (Fri Mar 09

12:36:56 UTC 2018)

1/1/3

1G-BT

up

1

1 minute ago (Fri Mar 09

12:36:56 UTC 2018)

Showing interface link-status:

switch# show interface link-status

-------------------------------------------------------------------------

Port

Type

Physical Link

Link Flaps Last

Link State Transitions Ignored

Change

-------------------------------------------------------------------------

1/1/1

1G-BT

down

0

0

--

1/1/2

1G-BT

up

1

0

1 minute ago

(Fri Mar 09 12:36:56 UTC 2018)

1/1/3

1G-BT

up

1

0

1 minute ago

(Fri Mar 09 12:36:56 UTC 2018)

1/1/4

--

down

0

0

--

1/1/5

--

down

0

0

--

For more information on features that use this command, refer to the Fundamentals Guide or the Monitoring Guide for your switch model.

Command History
Release 10.11 10.10 10.07 or earlier
Command Information

Modification Added monitor parameter. Added human-readable parameter. --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

981

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show interface dom
show interface [<INTERFACE-ID>] dom [detail] [vsx-peer]
Description
Shows diagnostics information and alarm/warning flags for the optical transceivers (SFP, SFP+, QSFP+). This information is known as DOM (Digital Optical Monitoring). DOM information also consists of vendor determined thresholds which trigger high/low alarms and warning flags.

Parameter <INTERFACE-ID> detail vsx-peer

Description
Specifies an interface. Format: member/slot/port.
Show detailed information.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
On the 6400 Switch Series, interface identification differs.

switch# show interface dom

----------------------------------------------------------------------------------

Port Type

Channel Temperature Voltage Tx Bias Rx Power

Tx Power

(Celsius) (Volts) (mA)

(mW/dBm)

(mW/dBm)

----------------------------------------------------------------------------------

1/1/1 SFP+SR

47.65

3.31

8.40

0.08, -10.96 0.63, -2.49

1/1/2 SFP+SR

n/a

n/a

n/a

n/a

n/a

1/1/3 SFP+DA3

42.10

3.24

n/a

n/a

n/a

1/1/4 QSFP+SR4 1

44.46

3.30

6.12

0.08, -10.96 0.63, -1.95

2

44.46

3.30

6.04

0.08, -10.96 0.63, -2.00

3

44.46

3.30

6.51

0.08, -10.96 0.60, -2.16

4

44.46

3.30

6.19

0.08, -10.96 0.63, -1.94

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Interface commands | 982

Platforms All platforms

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show interface energy-efficient ethernet
show interface [<IFNAME>|<IFRANGE>] energy-efficient-ethernet
Description
Displays Energy-Efficient Ethernet information for the interface.

Parameter <IFNAME>
<IFRANGE>

Description
Specifies the name of an interface on the switch. Use the format member/slot/port (for example, 1/1/1).
Specifies the port identifier range of an interface on the switch. Use the format member/slot/port (for example, 1/1/1).

Example
The following example shows when the interfaces are Energy-Efficient Ethernet capable.

switch# show interface energy-efficient-ethernet

-------------------------------------------------------------------

Port

Enabled Negotiated Speed

TX Wake

RX Wake

(MB/s)

Time(us) Time (us)

-------------------------------------------------------------------

1/1/1 no

no

--

--

--

1/1/2 yes

yes

100

36

36

1/1/3 yes

yes

1000

17

17

1/1/4 no

no

--

--

--

1/1/5 yes

no

1000

--

--

The following example shows when the interface is not Energy-Efficient Ethernet capable :
switch# show interface 1/1/1 energy-efficient-ethernet Port 1/1/1 does not support Energy-Efficient-Ethernet

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

983

Command Information

Platforms
6300 6400

Command context config

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show interface flow-control
show interface [<IFNNAME>|<IFRANGE>] flow-control [detail]
Description
Shows the flow control configuration, status, and statistics of the specified interface for interfaces on which flow control is enabled.
If detail is not specified, this command shows a summary of all flow controlled interfaces with one interface per line. If detail is specified, this command shows flow control detailed statistics.

As of AOS-CX 10.10, the separate show flow-control command has been removed, with it being effectively replaced by this command.

Parameter <IFNNAME>|<IFRANGE>
detail

Description
Specifies the interface (port) name or range. When no interface range is specified, only interfaces with flow control enabled in the configuration or status are shown.
Shows detailed information.

Examples
Showing summary flow control information:

switch# show interface flow-control

----------- -------------------------------------

Port

Flow

Control

----------- -------------------------------------

1/1/1

config: llfc rx

status: llfc rx

1/1/2

config: llfc rx

status: none

Showing summary flow control information with PFC:

switch# show interface flow-control

----------- -------------------------------------

Port

Flow

Control

----------- -------------------------------------

Interface commands | 984

1/1/1 1/1/2

config: pfc rxtx-1,2 status: pfc rxtx-1,2 config: pfc rxtx-5 status: none

Showing summary flow control information with PFC:

switch# show interface flow-control

Flow Control Watchdog Settings

Trigger Timeout: 100 milliseconds

Resume Time:

100 milliseconds

----------- ------------------------------------- ------------- --------

Port

Flow

Watchdog

Watchdog

Control

Status

Timeouts

----------- ------------------------------------- ------------- --------

1/1/1

config: llfc rx

status: llfc rx

1/1/2

config: llfc rx

incompatible

0

status: llfc rx

1/1/10

config: pfc rxtx-1,2

enabled

1234

status: pfc rxtx-1,2

1/1/12

config: pfc rxtx-1,2

error

0

status: pfc rxtx-1,2

1/1/32:4 config: pfc rxtx-5

status: pfc rxtx-5

Showing summary flow control information where the configuration does not match status due to a reboot required to apply PFC configuration in hardware:

switch# show interface flow-control

Flow Control Watchdog Settings

Trigger Timeout: 100 milliseconds (actual: not applied)

Resume Time:

100 milliseconds (actual: not applied)

----------- ------------------------------------- ------------- --------

Port

Flow

Watchdog

Watchdog

Control

Status

Timeouts

----------- ------------------------------------- ------------- --------

1/1/1

config: llfc rx

status: llfc rx

1/1/2

config: llfc rx

incompatible

0

status: llfc rx

1/1/10

config: pfc rxtx-1,2

pending

1234

status: none

1/1/12

config: pfc rxtx-1,2

pending

0

status: none

1/1/32:4 config: pfc rxtx-5

status: none

Showing detailed flow control information with RX flow control enabled:
switch# show interface 1/1/1 flow-control detail Interface 1/1/1 is up

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

985

Admin state is up Link state: up for 3 minutes (since Thu Apr 07 16:38:02 UTC 2022) Flow-control: llfc rx

Statistics

RX

-------------------- --------------------

Dot3 Pause Frames

0

Showing detailed flow control information with RX flow control enabled:

switch# show interface 1/1/1 flow-control detail Interface 1/1/1 is up
Admin state is up Link state: up for 3 minutes (since Thu Apr 07 16:38:02 UTC 2022) Flow-control: llfc rx Flow-control watchdog: disabled

Statistics

RX

-------------------- --------------------

Dot3 Pause Frames

0

Showing detailed flow control information with RXTX flow control enabled:

switch# show interface 1/1/1 flow-control detail Interface 1/1/1 is up
Admin state is up Link state: up for 3 minutes (since Thu Apr 07 16:38:02 UTC 2022) Flow-control: llfc rxtx

Statistics

RX

TX

-------------------- -------------------- --------------------

Dot3 Pause Frames

0

0

Showing detailed flow control information with PFC enabled:

switch# show interface 1/1/1 flow-control detail Interface 1/1/1 is up
Admin state is up Link state: up for 3 minutes (since Thu Apr 07 16:38:02 UTC 2022) Flow-control: pfc rxtx-4,5

Statistics

RX

TX

-------------------- -------------------- --------------------

Priority 0 Pauses

0

0

Priority 1 Pauses

0

0

Priority 2 Pauses

0

0

Priority 3 Pauses

0

0

Priority 4 Pauses

0

0

Priority 5 Pauses

0

0

Priority 6 Pauses

0

0

Priority 7 Pauses

0

0

Total Pause Frames

0

0

Interface commands | 986

Showing detailed flow control information with PFC enabled and flow control watchdog disabled:

switch# show interface 1/1/1 flow-control detail Interface 1/1/1 is up
Admin state is up Link state: up for 3 minutes (since Thu Apr 07 16:38:02 UTC 2022) Flow-control: pfc rxtx-4,5 Flow-control watchdog: disabled

Statistics

RX

TX

-------------------- -------------------- --------------------

Priority 0 Pauses

0

0

Priority 1 Pauses

0

0

Priority 2 Pauses

0

0

Priority 3 Pauses

0

0

Priority 4 Pauses

0

0

Priority 5 Pauses

0

0

Priority 6 Pauses

0

0

Priority 7 Pauses

0

0

Total Pause Frames

0

0

Interface 1/1/1 is up

Admin state is up

Link state: up for 3 minutes (since Thu Apr 07 16:38:02 UTC 2022)

Flow-control: pfc rxtx-4,5

Flow-control watchdog: disabled

Statistics

RX

TX

-------------------- -------------------- --------------------

Priority 0 Pauses

0

0

Priority 1 Pauses

0

0

Priority 2 Pauses

0

0

Priority 3 Pauses

0

0

Priority 4 Pauses

0

0

Priority 5 Pauses

0

0

Priority 6 Pauses

0

0

Priority 7 Pauses

0

0

Total Pause Frames

0

0

Showing detailed flow control information with both PFC and flow control watchdog enabled:

switch# show interface 1/1/1 flow-control detail Interface 1/1/1 is up
Admin state is up Link state: up for 3 minutes (since Thu Apr 07 16:38:02 UTC 2022) Flow-control: pfc rxtx-4,5 Flow-control watchdog: enabled

Statistics

RX

TX

-------------------- -------------------- --------------------

Priority 0 Pauses

0

0

Priority 1 Pauses

0

0

Priority 2 Pauses

0

0

Priority 3 Pauses

0

0

Priority 4 Pauses

0

0

Priority 5 Pauses

0

0

Priority 6 Pauses

0

0

Priority 7 Pauses

0

0

Total Pause Frames

0

0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

987

Queue

Watchdog Timeouts

------------ -----------------

Queue 0

0

Queue 1

0

Queue 2

0

Queue 3

0

Queue 4

0

Queue 5

0

Queue 6

0

Queue 7

0

Showing detailed flow control information when flow control watchdog is enabled in the configuration but it could not be applied because the configured flow control mode is not compatible with watchdog:
switch# show interface 1/1/1 flow-control detail Interface 1/1/1 is up
Admin state is up Link state: up for 3 minutes (since Thu Apr 07 16:38:02 UTC 2022) Flow-control: llfc rx Flow-control watchdog: incompatible

Showing detailed flow control information when flow control watchdog is enabled in the configuration but could not be applied because a compatible flow control mode first requires a reboot:
switch# show interface 1/1/1 flow-control detail Interface 1/1/1 is up
Admin state is up Link state: up for 3 minutes (since Thu Apr 07 16:38:02 UTC 2022) Flow-control: off Flow-control watchdog: pending

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10 10.08

Modification Examples updated with new and changed output elements. Command introduced.

Command Information

Platforms Command context

Authority

All platforms

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Interface commands | 988

show interface statistics
show interface [<IFNAME>|<IFRANGE>] statistics [non-zero] [human-readable] show interface [<IFNAME>|<IFRANGE>] statistics monitor [non-zero] [human-readable] show interface [<IFNAME>|<IFRANGE>] error-statistics [non-zero] [human-readable] show interface [<IFNAME>|<IFRANGE>] error-statistics monitor [non-zero] [human-readable] show interface lag [<LAG-ID>] statistics [non-zero] [human-readable] show interface lag [<LAG-ID>] statistics monitor [non-zero] [human-readable] show interface lag [<LAG-ID>] error-statistics [non-zero] [human-readable] show interface lag [<LAG-ID>] error-statistics monitor [non-zero] [human-readable] show interface vxlan <VXLAN-ID> statistics [non-zero] [human-readable]
Description
Shows statistics for switch interfaces such as packets transmitted and received, bytes transmitted and received, broadcast and multicast packets.

Parameter <IFNAME> <IFRANGE> LAG <LAG-ID> VXLAN <VXLAN-ID> monitor human-readable
non-zero

Description Specifies a interface name. Specifies the port identifier range. Shows LAG interface information. Specifies the LAG number. Range: 1-256 Shows the VXLAN interface information. Specifies the VXLAN interface identifier. Default: 1 Continuously monitor interface statistics. Shows statistics rounded to the nearest power of 1000, for example, 1K, 345M, 2G. Shows only non zero statistics.

Examples
Showing statistics of all interfaces:

Showing statistics of all interfaces with only non-zero statistics:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

989

Showing statistics of all interfaces in the human-readable format: Showing statistics of a single interfaces: Showing statistics of all members of a LAG interface: Showing error statistics of all interfaces:
Showing monitor statistics: The rows and columns of show interface monitor statistics depends on the length of width of the client terminal. The CLI can be navigated using the arrow keys as well as the PageUp, PageDown, Home, and End keys.
Interface commands | 990

Showing monitor error statistics in human-readable format:

For more information on features that use this command, refer to the Fundamentals Guide or the Monitoring Guide for your switch model.

Command History
Release 10.11 10.10 10.07 or earlier

Modification Added moitor parameter. Added human-readable parameter. --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

991

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show interface transceiver
show interface [<INTERFACE-ID>] transceiver [detail | threshold-violations] [vsx-peer]
Description
Displays information about transceivers present in the switch. The information shown varies for different transceiver types and manufacturers. Only basic information is shown for unsupported HPE and third-party transceivers installed in the switch and they are also identified with an asterisk in the output.

Parameter <INTERFACE-ID>
detail threshold-violations vsx-peer

Description
Specifies the name or range of an interface on the switch. Use the format member/slot/port (for example, 1/3/1).
Show detailed information for the interfaces.
Show threshold violations for transceivers.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
On the 6400 Switch Series, interface identification differs. Showing summary transceiver information with identification of unsupported transceivers:

switch(config)# show interface transceiver

-------------------------------------------------------------------

Port

Type

Product

Serial

Part

Number

Number

Number

-------------------------------------------------------------------

1/1/1

SFP+SR

J9150A

MYxxxxxxxx

1990-3657

1/1/2

SFP+ER*

--

--

--

1/2/1

QSFP+SR4

JH233A

MYxxxxxxxx

2005-1234

1/2/2

QSFP+ER4*

--

--

--

1/3/1

SFP28DAC3

844477-B21 MYxxxxxxxx

77fc-7ce7

* unsupported transceiver

Showing detailed transceiver information: switch(conf#) show interface transceiver detailing

Interface commands | 992

Transceiver in 1/1/1

Interface Name

: 1/1/1

Type

: SFP+SR

Connector Type

: LC

Wavelength

: 850nm

Transfer Distance : 0m (SMF), 30m (OM1), 80m (OM2), 300m (OM3)

Diagnostic Support : DOM

Product Number

: J9150A

Serial Number

: MYxxxxxxx

Part Number

: 1990-3657

Status

Temperature : 47.65C

Voltage

: 3.31V

Tx Bias

: 8.40mA

Rx Power : 0.08mW, -10.96dBm

Tx Power : 0.56mW, -2.49dBm

Recent Alarms : Rx power low alarm Rx power low warning Recent Errors : Rx loss of signal

Transceiver in 1/1/2

Interface Name

: 1/1/2

Type

: unknown

Connector Type

: ??

Wavelength

: ??

Transfer Distance : ??

Diagnostic Support : ??

Product Number

: ??

Serial Number

: ??

Part Number

: ??

Transceiver in 1/2/1

Interface Name

: 1/2/1

Type

: QSFP+SR4

Connector Type

: MPO

Wavelength

: 850nm

Transfer Distance : 0m (SMF), 0m (OM1), 0m (OM2), 100m (OM3)

Diagnostic Support : DOM

Product Number

: JH233A

Serial Number

: MYxxxxxxx

Part Number

: 2005-1234

Status

Temperature : 44.46C

Voltage

: 3.30V

----------------------------------------------

Tx Bias Rx Power

Tx Power

Channel# (mA)

(mW/dBm)

(mW/dBm)

----------------------------------------------

1

6.12

0.00, -inf 0.63, -1.95

2

6.04

0.00, -inf 0.63, -2.00

3

6.51

0.00, -inf 0.60, -2.16

4

6.19

0.00, -inf 0.63, -1.94

Recent Alarms : Channel 1 : Rx power low alarm

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

993

Rx power low warning Channel 2 :
Rx power low alarm Rx power low warning Channel 3 : Rx power low alarm Rx power low warning Channel 4 : Rx power low alarm Rx power low warning

Recent Errors : Channel 1 : Rx Loss of Signal Channel 2 : Rx Loss of Signal Channel 3 : Rx Loss of Signal Channel 4 : Rx Loss of Signal

Transceiver in 1/2/2

Interface Name

: 1/2/2

Type

: unknown

Connector Type

: ??

Wavelength

: ??

Transfer Distance : ??

Diagnostic Support : ??

Product Number

: ??

Serial Number

: ??

Part Number

: ??

Transceiver in 1/3/1

Interface Name

: 1/3/1

Type

: SFP28DAC3

Connector Type

: Copper Pigtail

Transfer Distance : 0.00km (SMF), 0m (OM1), 0m (OM2), 0m (OM3)

Diagnostic Support : None

Product Number

: 844477-B21

Serial Number

: MYxxxxxxx

Part Number

: 77fc-7ce7

Showing detailed transceiver information with identification of unsupported transceivers:

Transceiver in 1/1/2

Interface Name

: 1/1/2

Type

: SFP+ER (unsupported)

Connector Type

: LC

Wavelength

: 3590nm

Transfer Distance : 80m (SMF), 0m (OM1), 0m (OM2), 0m (OM3)

Diagnostic Support : DOM

Vendor Name

: INNOLIGHT

Vendor Part Number : TR-PX15Z-NHP

Vendor Part Revision: 1A

Vendor Serial number: MYxxxxxxx

Status

Temperature : 28.88C

Voltage

: 3.30V

Tx Bias

: 65.53mA

Rx Power : 0.00mW, -inf

Interface commands | 994

Tx Power : 1.47mW, 1.67dBm
Recent Alarms: Rx Power low alarm Rx Power low warning Recent Errors:
Showing transceiver threshold-violations:

switch(config)# show interface transceiver threshold-violations

-----------------------------------------------------

Port

Type

Channel Type(s) of Recent

Threshold Violation(s)

-----------------------------------------------------

1/1/1

SFP+SR

Tx bias high warning

50.52 mA > 40.00 mA

1/1/2

SFP+ER*

??

1/2/1

QSFP+SR4 1

Tx power low alarm

-17.00 dBm < -0.50 dBm

2

Tx bias low warning

3.12 mA < 4.00 mA

1/2/2

QSFP+ER4*

??

1/3/1

SFP28DAC3

n/a

* unsupported transceiver

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show interface utilization
show interface [<IFNNAME>|<IFRANGE>] utilization [non-zero]
Description
Displays physical port throughput and utilization.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

995

Parameter <IFNAME> <IFRANGE> utilization non-zero

Description Specifies an interface name. Specifies the port identifier range. Displays utilization statistics. Displays non-zero statistics

Examples
The following example shows port utilization of all interfaces:

switch# show interface utilization

-------------------------|------------------------|------------------------|----------------

-----------|----------------------

Interval |

RX

|

TX

| Total (RX+TX)

|

Interface

seconds | Mbps KPkt/s Util % | Mbps KPkt/s Util % | Mbps

KPkt/s Util % | Description

-------------------------|------------------------|------------------------|----------------

-----------|----------------------

1/1/1

300 9578.02 788.70 95.78 25.70 45.89 0.26 9603.72

834.59 96.04 Aruba-AP

1/1/2

300 25.71 45.90 0.26 9581.09 788.96 95.81 9606.80

834.86 96.07 Aruba2530-AP-conce...

1/1/3 - lag123

300

0.00 0.00 0.00

0.00 0.00 0.00

0.00

0.00

0.00 ISL: SWRTS-0064-1

1/1/4

300 9261.79 804.52 92.62 9496.70 823.97 94.97 18758.50

1628.48 187.58 Backup data center...

1/1/5

300 9496.70 823.97 94.97 9261.79 804.52 92.62 18758.50

1628.48 187.58 --

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip interface
show ip interface <INTERFACE-ID> [vsx-peer]

Interface commands | 996

Description
Shows status and configuration information for an IPv4 interface.

Parameter <INTERFACE-ID> vsx-peer

Description
Specifies the name of an interface. Format: member/slot/port.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
On the 6400 Switch Series, interface identification differs.

switch# show ip interface 1/1/1 Interface 1/1/1 is up
Admin state is up Hardware: Ethernet, MAC Address: 70:72:cf:fd:e7:b4 IPv4 address 192.168.1.1/24 MTU 1500 RX
0 packets, 0 bytes TX
0 packets, 0 bytes

switch# show interface <intfid>.id Interface 1/1/14.1 is up Admin state is up IP MTU 1500 Description: Hardware: Ethernet, MAC Address: b8:6a:97:22:2f:42 Encapsulation dot1q ID: 20 IPv4 address 30.0.0.1/24 L3 Counters: Rx Disabled, Tx Disable
switch# show interface lag2.1 Interface lag2.1 is up Admin state is up IP MTU 1500 Description: Hardware: Ethernet, MAC Address: b8:6a:97:22:2f:42 Encapsulation dot1q ID: 30 L3 Counters: Rx Disabled, Tx Disabled

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

997

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip source-interface
show ip source-interface {sflow | tftp | radius | tacacs | all} [vrf <VRF-NAME>] [vsx-peer]
Description
Shows single source IP address configuration settings.

Parameter sflow | tftp | radius | tacacs | all
vrf <VRF-NAME> vsx-peer

Description
Shows single source IP address configuration settings for a specific protocol. The all option shows the global setting that applies to all protocols that do not have an address set.
Specifies the name of a VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs.

Showing single source IP address configuration settings for sFlow:

switch# show ip source-interface sflow

Source-interface Configuration Information

----------------------------------------

Protocol

Source Interface

--------

----------------

sflow

10.10.10.1

Showing single source IP address configuration settings for all protocols:

switch# show ip source-interface all

Source-interface Configuration Information

----------------------------------------

Protocol

Source Interface

--------

----------------

all

1/1/1

Interface commands | 998

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show ipv6 interface
show ipv6 interface <INTERFACE-ID> [vsx-peer]
Description
Shows status and configuration information for an IPv6 interface.

Parameter <INTERFACE-ID> vsx-peer

Description
Specifies an interface ID. Format: member/slot/port.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs.

switch# switch# show ipv6 interface 1/1/1 Interface 1/1/1 is up
Admin state is up IPv6 address:
2001:0db8:85a3:0000:0000:8a2e:0370:7334/24 [VALID] IPv6 link-local address: fe80::1e98:ecff:fee3:e800/64 (default)[VALID] IPv6 virtual address configured: none IPv6 multicast routing: disable IPv6 Forwarding feature: enabled IPv6 multicast groups locally joined:
ff02::ff70:7334 ff02::ffe3:e800 ff02::1 ff02::1:ff00:0 ff02::2 IPv6 multicast (S,G) entries joined: none IPv6 MTU: 1524 (using link MTU) IPv6 unicast reverse path forwarding: none

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

999

IPv6 load sharing: none RX
0 packets, 0 bytes TX
0 packets, 0 bytes

switch# show ipv6 interface <intfid>.id Interface 1/1/14.1 is up
Admin state is up IPv6 address: 30::1/64 [VALID] IPv6 link-local address: fe80::b86a:97c0:122:2f42/64 [VALID] IPv6 virtual address configured: none IPv6 multicast routing: disable IPv6 Forwarding feature: enabled IPv6 multicast groups locally joined: ff02::1 ff02::1:ff22:2f42 ff02::1:ff00:1 ff02::1:ff00:0 ff02::2 IPv6 multicast (S,G) entries joined: none IPv6 MTU 1500 IPv6 unicast reverse path forwarding: none IPv6 load sharing: none
Encapsulation dot1q ID: 20
switch# show ipv6 interface lag2.1 Interface lag2.1 is up
Admin state is up IPv6 address: 40::1/64 [VALID] IPv6 link-local address: fe80::b86a:97c0:122:2f42/64 [VALID] IPv6 virtual address configured: none IPv6 multicast routing: disable IPv6 Forwarding feature: enabled IPv6 multicast groups locally joined: ff02::1 ff02::1:ff22:2f42 ff02::1:ff00:1 ff02::1:ff00:0 ff02::2 IPv6 multicast (S,G) entries joined: none IPv6 MTU 1500 IPv6 unicast reverse path forwarding: none IPv6 load sharing: none
Encapsulation dot1q ID: 30

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Interface commands | 1000

Platforms All platforms

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 source-interface
show ipv6 source-interface {sflow | tftp | radius | tacacs | all} [vrf <VRF-NAME>] [vsx-peer]
Description
Shows single source IP address configuration settings.

Parameter sflow | tftp | radius | tacacs | all
vrf <VRF-NAME> vsx-peer

Description
Shows single source IP address configuration settings for a specific protocol. The all option shows the global setting that applies to all protocols that do not have an address set.
Specifies the name of a VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing single source IP address configuration settings for sFlow:

switch# show ipv6 source-interface sflow

Source-interface Configuration Information

----------------------------------------

Protocol

Source Interface

--------

----------------

sflow

2001:DB8::1

Showing single source IP address configuration settings for all protocols:

switch# show ipv6 source-interface all

Source-interface Configuration Information

----------------------------------------

Protocol

Source Interface

--------

----------------

all

1/1/1

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1001

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

shutdown
shutdown no shutdown
Description
Disables an interface. Interfaces are disabled by default when created. The no form of this command enables an interface.
Examples
Disabling an interface:
switch(config-if)# shutdown
Enabling an interface:
switch(config-if)# no shutdown

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

Interface commands | 1002

speed
speed {<SPEED> | <SPEED-DUPLEX> | auto [<SPEED>] } no speed
Description
Configures the link speed, duplex, and auto-negotiation settings for an interface. The no form of this command removes the configurations and returns to the defaults.

Parameter Speed

Description Configures interface speed, duplex, and auto-negotiation.

10-full 10-half 100-full 100-half 1000-full 10g 25g 40g 50g 100g 200g
400g
auto
10m 100m 1g 2.5g 5g 10g

10 Mbps, full duplex, no auto-negotiation 10 Mbps, half duplex, no auto-negotiation 100 Mbps, full duplex, no auto-negotiation 100 Mbps, half duplex, no auto-negotiation 1000 Mbps, full duplex, no auto-negotiation 10 Gbps, full duplex, no auto-negotiation 25 Gbps, full duplex, no auto-negotiation 40 Gbps, full duplex, no auto-negotiation 50 Gbps, full duplex, no auto-negotiation 100 Gbps, full duplex, no auto-negotiation 200 Gbps, full duplex, no auto-negotiation NOTE: Not applicable for override.
400 Gbps, full duplex, no auto-negotiation NOTE: Not applicable for override.
Auto-negotiate speed and duplex. More than one speed can be set at a time. Allow interface to link at 10 Mbps. Allow interface to link at 100 Mbps. Allow interface to link at 1 Gbps. Allow interface to link at 2.5 Gbps. Allow interface to link at 5 Gbps. Allow interface to link at 10 Gbps.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1003

Parameter 25g 40g 50g 100g 200g 400g

Description Allow interface to link at 25 Gbps. Allow interface to link at 40 Gbps. Allow interface to link at 50 Gbps. Allow interface to link at 100 Gbps. Allow interface to link at 200 Gbps. Allow interface to link at 400 Gbps.

Usage
The following options can be configured for an interface. The option available is based on the interface type. speed <SPEED-DUPLEX>
Uses a fixed speed and duplex mode with no auto-negotiation. Half-duplex is only supported for 10 Mbps and 100 Mbps link speeds. speed <SPEED>
Uses a fixed speed with no auto-negotiation. If the currently installed transceiver does not support the speed, the setting is ignored and the port will use the highest speed that is supported. speed auto
Uses auto-negotiation and offers all speeds supported by the port and transceiver. This is the default. If the link technology does not support auto-negotiation this setting is ignored, and the port uses the highest possible fixed speed. speed auto <SPEED>
Uses auto-negotiation and offers the specified speeds only. For ports that support pluggable transceivers, only speeds supported by the transceiver are offered and other speeds are ignored. If the link technology does not support auto-negotiation, this setting is ignored and the port uses the highest possible fixed speed.
Examples
Configuring an interface to operate at a fixed speed of 1000 Mbps with full duplex and no autonegotiation:

switch(config)# interface 1/1/1 switch(config-if)# speed 1000-full

Configuring an interface to operate at a fixed speed of 10 Gbps with no auto-negotiation:

switch(config)# interface 1/1 switch(config-if)# speed 10g

Configuring an interface to auto-negotiate and advertise only 1 Gbps and 2.5 Gbps speeds:

switch(config)# interface 1/1/1 switch(config-if)# speed auto 1g 2.5g

Interface commands | 1004

Configuring an interface to override the detected transceiver speed and use the configured speed if the installed transceiver does not support auto-negotiation:
switch(config)# interface 1/1/1 switch(config-if)#speed auto 50g override
Configuring an interface to use default settings for speed, duplex, and auto-negotiation:
switch(config)# interface 1/1/1 switch(config-if)#no speed

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.09.0001 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification Speeds not supported by hardware hidden by CLI. --
Authority Administrators or local user group members with execution rights for this command.

system interface-group
This command only applies to the following 6400 Switch Series modules: R0X44A Aruba 6400 48p 10G/25G SFP28 Module R0X44C Aruba 6400 48p 1G/10G/25G SFP28 v2 Module
system interface-group <GROUP> line-module <SLOT-ID> speed <SPEED> no system interface-group <GROUP> line-module <SLOT-ID> speed <SPEED> system interface group member <MEMBER-ID> no system interface group member <MEMBER-ID>
Description
Configures the speed for an interface group. After changing group speed, only transceivers compatible with the new speed will be enabled.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1005

n (Applies to the 6400 Switch Series): R0X44C (version 2) is the only module that can apply 50G speed as an option. If the command is attempted to any other type of module, the command is ignored.
n All speed-mismatched interfaces in the group will be disabled. n This command can interrupt active network links, user confirmation is required to proceed.

The no form of this command resets the specified interface group to its default.

Parameter <GROUP> <SPEED>
<SLOT-ID>

Description
Specifies the interface group to configure.
Configures transceiver speed (10g, 25g or 50g) for a group. Default is 25g (see the Transceiver Guide for further detail). On 6400 Switch Series:
25g allows transceivers up to 25Gbps. 50g allows 50Gbps transceivers and DACs on the R0X44C version 2 module. This command is ignored on any other type of module (including R0X44A version 1).
Specifies the slot ID of the line module.

member <MEMBER-ID>

Specifies the VSF member ID of the VSF member of the group. (For 6300 Switch Series only.)

Examples
Configuring interface group 1 on line-module 1/1 to allow 10Gbps and slower transceivers:

switch(config)# system interface-group 1 line-module 1/1 speed 10g Changing the group speed will disable all member interfaces that do not match the new speed.
Continue (y/n)? y

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.11 10.09.0002
Command Information

Modification Command introduced on 6300 Switch series. Command introduced on 6400 and 8400 Switch series.

Interface commands | 1006

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

client track ip
client track ip
Description
Enables client IP address tracking on the switch. The default is disabled on global and VLAN levels. Admin users can enable client IP address tracking at the VLAN level.
Tracking enabling will take effect only if the client IP address tracking is enabled at system and VLAN level.
The no form of the command disables client IP address tracking. If tracking is disabled at switch level, it will be stopped even if it is enabled at VLAN or port level.
Example
Enable client IP address tracking at switch level:
switch(config)# client track ip
Enable client IP address tracking on VLAN 100:
switch(config)# vlan 100 switch(config-vlan-100)# client track ip
Enable client IP address tracking on VLANs 10 to 100:
switch(config)# vlan 10-100 switch(config-vlan-<10-100>)# client track ip

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6300

Command context config

Modification --
Authority Operators or Administrators or local user group members with

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1007

Platforms 6400

Command context

Authority
execution rights for this command. Operators can execute this command from the operator context (>) only.

client track ip { enable | disable | auto }
client track ip { enable | disable | auto }
Description
Enables client IP address tracking on the specified set of interfaces. Tracking will take effect only if client IP address tracking is enabled at both the system level and for the VLAN to which the port belongs. Default: auto. The no form of the command disables client IP address tracking on the specified set of interfaces.

Parameter enable disable auto

Description
Specifies that all client IP addresses will be tracked in the port.
Specifies that client IP addresses will not be tracked in the port.
Specifies the following: For LLDP devices: Only the specified client IP address will be tracked in the port and other client IP addresses will not be tracked. For non-LLDP devices: All client IP addresses will be tracked in the port.

Example
Enable client IP address tracking on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# client track ip enable

Enable client IP address tracking on interfaces 1/1/1 to 1/1/5:

switch(config)# interface 1/1/1-1/1/5 switch(config-if-<1/1/1-1/1/5>)# client track ip enable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Interface commands | 1008

Platforms
6300 6400

Command context config-if

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

client track ip client-limit
client track ip client-limit <CLIENT-LIMIT>
Description
Configures the maximum number of clients to be tracked on the specified set of interfaces. The no form of the command resets the client limit to the default value. Default values vary according to switch model:
n 6300: 2048 n 6400: 4096

Parameter CLIENT-LIMIT

Description
Specifies the maximum number of clients tracked on a port. Required. Range: 1-2048 (6300) 1-4096 (6400). Default: 2048 (6300) 4096 (6400)..

Example
Configure the maximum number of clients to be tracked on interface 1/1/5:

switch(config)# interface 1/1/5 switch(config-if)# client track ip client-limit 32

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

client track ip update-interval

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1009

client track ip update-interval <INTERVAL>
Description
Configures how often client IP addresses are updated. The no form of the command resets the update interval to the default of 1800 seconds.

Parameter INTERVAL

Description
Specifies the update interval in seconds. Required. Range: 6028000. Default: 1800.

Example
Configure the update interval for an interface:

switch(config)# interface 1/1/1 switch(config-if)# client track ip update-interval 600

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

client track ip update-method probe
client track ip update-method probe
Description
Enables probing the client to update the IP address. The probe is sent to all clients on the tracking list that have an IP address in the following scenarios:
1. IP packets are not received from the clients during the IP address update cycle. 2. There is no IP packet from a learned IP address. In this case, a probe will be sent for the IP
address to confirm if it is still owned by that client.
The no form of the command disables probing.
Example
Disable probing to update the client IP address:

Interface commands | 1010

switch(config)# no client track ip update-method probe

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show capacities
show capacities
Description
Shows the capacities configured on the switch.
Example

switch# show capacities

System Capacities:

Capacities Name

Value

----------------------------------------------------------------------------------

Maximum number of Access Control Entries configurable in a system

14336

Maximum number of Access Control Lists configurable in a system

1024

Maximum number of class entries configurable in a system

1024

Maximum number of classes configurable in a system

512

Maximum number of entries in an Access Control List

1024

Maximum number of entries in a class

1024

Maximum number of entries in a policy

1024

Maximum number of classifier policies configurable in a system

512

Maximum number of policy entries configurable in a system

1024

Maximum number of clients supported for tracking the IP address in the system 128

switch# show capacities client-track-ip-client-limit

System Capacities: Filter Client Track IP Client Limit Capacities Name Value ---------------------------------------------------------------------------------Maximum number of clients supported for tracking the IP address in the system

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1011

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Operator (>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show client ip { count | port | vlan }
show client ip { count | port | vlan }
Description
Shows number of client IP addresses or information about client IP addresses tracked on ports and VLANs.

Parameter count port vlan

Description Displays number of clients tracked. Displays client IP addresses tracked on the ports. Displays client IP addresses tracked on the VLANs.

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Operator (>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

Interface commands | 1012

Chapter 52 IP Directed Broadcast commands

IP Directed Broadcast commands
copy support-file feature
copy support-file feature l3
Description
Captures support logs to debug any IP Directed Broadcast issues. IP Directed Broadcast is not supported on subinterfaces on 8100, 6300, 6400, 8325, 8360 and 10000 Switch series.
Examples
Capturing the support logs into a local file:
switch# copy support-file feature l3 sftp

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip directed-broadcast
ip directed-broadcast no ip directed-broadcast
Description
Turns on IP Directed Broadcast for the specified interface. The no form of this command turns it off. This command is disabled by default.
IP Directed Broadcast is not supported on subinterfaces on 6300, 6400, 8100, 8325, 8360 and 10000 Switch series.

AOS-CX 10.14 Command-Line Interface Guide

1013

Examples
Enabling and disabling IP Directed Broadcast on an physical interface:
switch(config)# interface 1/1/1 switch(config-if)# ip directed-broadcast switch(config-if)# no ip directed-broadcast
Enabling and disabling IP Directed Broadcast on a VLAN interface:
switch(config)# interface vlan 100 switch(config-if-vlan)# ip directed-broadcast switch(config-if-vlan)# no ip directed-broadcast

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show arp
show arp
Description
Shows IP directed broadcast verification.
IP Directed Broadcast is not supported on subinterfaces on 8100, 6300, 6400, 8325, 8360 and 10000 Switch series.

Examples
Showing IP directed broadcast verification:

switch# show arp

IPv4 Address

MAC

Port

Physical Port

State

----------------------------------------------------------------------------------

1.1.1.255

FF:FF:FF:FF:FF:FF 1/1/1

1/1/1

permanent

3.1.1.255

FF:FF:FF:FF:FF:FF vlan10

permanent

IP Directed Broadcast commands | 1014

Total Number Of ARP Entries Listed: 2. ----------------------------------------------------------------------------------

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip interface
show ip interface <INTERFACE-NAME>
Description
Displays the status of IP Directed Broadcast on the specified interface along with other interface related attributes.

Parameter <INTERFACE-NAME>

Description
Specifies the interface to use as a source for displaying the status of the IP Directed Broadcast.

Examples
Displaying the IP Directed Broadcast status on the specified interface:

switch# show ip interface vlan30

Interface vlan30 is up Admin state is up Hardware: Ethernet, MAC Address: 94:f1:28:21:63:00 IP MTU 1500 IP Directed Broadcast is Enabled IPv4 address 192.168.3.1/24 L3 Counters: Rx Disabled, Tx Disabled

Statistics

RX

TX

Total

------------- -------------------- -------------------- --------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1015

L3 Packets L3 Bytes

0

0

0

0

0

0

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip directed-broadcast
show ip directed-broadcast
Description
Displays the summary of the interfaces on which IP Directed Broadcast is enabled.
Examples
On the 6400 Switch Series, interface identification differs. Displaying the summary of the interfaces on which IP Directed Broadcast is enabled:

switch# show ip directed-broadcast

IPv4 Directed Broadcast Configuration

Interface ---------1/1/1 vlan10 vlan30

Status --------
Enabled Enabled Enabled

Displaying IP Directed Broadcast Host entries installed in Neighbor cache:

switch# show arp state permanent

IPv4 Address

MAC

Port

Physical Port State

---------------------------------------------------------------------------

52.1.1.255

FF:FF:FF:FF:FF:FF 1/1/1

1/1/1

permanent

40.0.0.255

FF:FF:FF:FF:FF:FF vlan20

vlan20

permanent

Total Number Of ARP Entries Listed- 2.

-------------------------------------------------------------------------------

IP Directed Broadcast commands | 1016

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1017

Chapter 53 IP Neighbor Flood commands

IP Neighbor Flood commands
ip neighbor-flood
ip neighbor-flood
Description
Enables VLAN flooding for the specified VLAN interface when a neighbor link goes down. The no form of this command disables VLAN flooding for the specified VLAN interface.
Examples
Enabling IP Neighbor Flood on a VLAN interface:
switch(config)# interface vlan 3 switch(config-if-vlan)# ip neighbor-flood
Disabling IP Neighbor Flood on a VLAN interface.
switch(config)# interface vlan 3 switch(config-if-vlan)# no ip neighbor-flood

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

show ip interface
show ip interface <IFNAME>
Description

AOS-CX 10.14 Command-Line Interface Guide

1018

Displays the status of IP Neighbor Flood on the specified interface along with other interface-related attributes.

Parameter <IFNAME>

Description Specifies the interface name (for example, vlan30). Optional.

Examples

switch# show ip interface vlan30
Interface vlan30 is up Admin state is up Hardware: Ethernet, MAC Address: 94:f1:28:21:63:00 IP MTU 1500 IP Neighbor Flood is Enabled IPv4 address 192.168.3.1/24 L3 Counters: Rx Disabled, Tx Disabled

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip neighbor-flood
show ip neighbor-flood
Description
Displays the interfaces on which IP Neighbor Flood is enabled.
Examples

switch# show ip neighbor-flood

IP Neighbor Flood Configuration

Interface ---------

Status -------

IP Neighbor Flood commands | 1019

vlan10 vlan30

Enabled Enabled

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config
show running-config
Description
Displays the current running configuration.
Examples
switch# show running-config interface vlan10
ip neighbor-flood interface vlan30
ip neighbor-flood

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1020

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

IP Neighbor Flood commands | 1021

Chapter 54 IP Prefix priority commands

IP Prefix priority commands

ip prefix-priority
ip prefix-priority <PREFIX-LENGTHS> no ip prefix-priority [<PREFIX-LENGTHS>>]
Description
Configures custom IPv4 route prefix lengths for the exact prefix match tables of the switch. The switch must be rebooted to apply the change.

Following the reboot, IPv4 prefix priorities will remain in a pending state until at least one route is learned. A connected route counts so this can be as simple as having an L3 interface with an IP address in the up state.
The no form of this command resets the prefix lengths to their default

Parameter <PREFIX-LENGTHS>>

Description
Specifies a space-separated list of exactly five or six prefix lengths, in descending order. Range: 8 to 31.
On the 6300 Switch Series, six prefix lengths are used. On the 6400 Switch Series, six prefix lengths are used for profiles default and V2-default, and five prefix lengths are used for profile v2-CoreHigh-Bandwidth.

Examples
Configuring custom IPv4 route prefix lengths:

switch(config)# ip prefix-priority 29 28 27 24 23 16 Save this config and reboot the switch for the changes to take effect ...

Resetting IPv4 route prefix lengths to their default:

switch(config)# no ip prefix-priority Save this config and reboot the switch for the changes to take effect ...

Attempting to configure custom IPv4 route prefix lengths with some lengths not in descending order:

switch(config)# ip prefix-priority 28 29 27 23 24 16 Prefix lengths must be specified in descending order

Attempting to configure eight prefix lengths:

AOS-CX 10.14 Command-Line Interface Guide

1022

switch(config)# ip prefix-priority 29 28 27 24 23 16 12 8 Invalid input: 12
Attempting to configure three prefix lengths:
switch(config)# ip prefix-priority 29 28 27 % Command incomplete.

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

ipv6 prefix-priority
ipv6 prefix-priority <PREFIX-LENGTHS> no ipv6 prefix-priority [<PREFIX-LENGTHS>>]
Description
Configures custom IPv6 route prefix lengths for the exact prefix match tables of the switch. The switch must be rebooted to apply the change.
Following the reboot, IPv6 prefix priorities will remain in a pending state until at least one route is learned. A connected route counts so this can be as simple as having an L3 interface with an IP address in the up state.
The no form of this command resets the prefix lengths to their default

Parameter <PREFIX-LENGTHS>>

Description
Specifies a space-separated list of exactly five or six prefix lengths, in descending order. Range: 8 to 64.
On the 6300 Switch Series, six prefix lengths are used. On the 6400 Switch Series, six prefix lengths are used for profiles default and V2-default, and five prefix lengths are used for profile v2Core-High-Bandwidth.

Examples

IP Prefix priority commands | 1023

Configuring custom IPv6 route prefix lengths:
switch(config)# ipv6 prefix-priority 64 63 62 32 31 28 Save this config and reboot the switch for the changes to take effect ...
Resetting IPv6 route prefix lengths to their default:
switch(config)# no ipv6 prefix-priority Save this config and reboot the switch for the changes to take effect ...
Attempting to configure custom IPv6 route prefix lengths with some lengths not in descending order:
switch(config)# ipv6 prefix-priority 64 62 63 31 32 28 Prefix lengths must be specified in descending order
Attempting to configure eight prefix lengths:
switch(config)# ipv6 prefix-priority 64 63 62 32 31 28 24 23 Invalid input: 24
Attempting to configure three prefix lengths:
switch(config)# ipv6 prefix-priority 64 63 31 % Command incomplete.

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

show ip prefix-priority
show ip prefix-priority
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1024

Shows the configuration, status, and defaults of the IPv4 route prefix lengths for the exact prefix match tables of the switch.
Examples
Showing configured IPv4 route prefix lengths that are pending until the switch is rebooted and at least one route is learned:

switch# show ip prefix-priority

IP Exact-Prefix Table Information

Configuration Status: Ready to apply on next reboot

Default Current Pending

Table Length Length Length

-----------------------------------

1

24

24

29*

2

23

23

28*

3

22

22

27*

4

21

21

24*

5

16

16

23*

6

8

8

16*

* Pending values will be applied on the next reboot

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 prefix-priority
show ipv6 prefix-priority
Description
Shows the configuration, status, and defaults of the IPv6 route prefix lengths for the exact prefix match tables of the switch.
Examples

IP Prefix priority commands | 1025

Showing configured IPv6 route prefix lengths that are pending until the switch is rebooted and at least one route is learned:

switch# show ipv6 prefix-priority

IPv6 Exact-Prefix Table Information

Configuration Status: Ready to apply on next reboot

Default Current Pending

Table Length Length Length

-----------------------------------

1

64

64

64

2

48

48

63*

3

46

46

62*

4

44

44

32*

5

40

40

31*

6

36

36

28*

* Pending values will be applied on the next reboot

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1026

Chapter 55 IP-SLA commands

IP-SLA commands

http
http {get | raw} URL [source {<SOURCE-IPV4-ADDR> | <IFNAME>} source-port <PORT-NUM>] [proxy proxy-url] [cache disable] [name-server <IPV4-ADDR-DNS-SERVER>] [probe-interval <30-604800>] [version<VERSION-NUMBER>] [http-raw-request <RAW-
PAYLOAD>]
Description
Configures HTTP as the IP-SLA test mechanism. Requires destination URL and type of HTTP request (raw/get).

Parameter {get | raw} URL source {<SOURCE-IPV4-ADDR> | <IFNAME>} source-port <PORT-NUM> cache disable name-server <IPV4-ADDR-DNS-SERVER> probe-interval <PROBE-INTERVAL> version <VERSION-NUMBER> http-raw-request <RAW-PAYLOAD>

Description
Selects HTTP request type as get or raw where the system will generate or provide HTTP payload.
Specifies HTTP URL address of syntax. http://<HOST NAME/IP-ADDRESS>:<PORT>/<PATH>.
Selects the source IPv4 address for SLA probes or the source interface to use for sending IP-SLA probes.
Specifies the value of the source port for the IP-SLA probes.
Selects cache option for the HTTP server. By default the option is enabled.
Specifies the IPv4 address of DNS server.
Specifies the probe interval in seconds. Range: 30 to 604800.
Specifies the source interface to use for sending IP-SLA probes.
HTTP raw request. String.

Examples

switch(config-ipsla-1)# http get http://device.arubanetworks.com/root/home.html switch(config-ipsla-1)# http raw http://device.arubanetworks.com/root/home.html switch(config-ipsla-1)# http 2.2.2.2 source 1/1/1 switch(config-ipsla-1)# http http://device.arubanetworks.com source 2.2.2.1 switch(config-ipsla-1)# http http://device.arubanetworks.com/root/home.html source-interface 1/1/1 switch(config-ipsla-1)# http http://device.arubanetworks.com name-server

AOS-CX 10.14 Command-Line Interface Guide

1027

10.10.10.2 switch(config-ipsla-1)# http raw raw-request "GET /en/US/hmpgs/index.html HTTP/1.0\r\n\r\n"

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ip-sla-<IP-SLA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

https
https {get | raw} URL [source {<SOURCE-IPV4-ADDR> | <IFNAME>} source-port <PORT-NUM>] [proxy proxy-url] [cache disable] [name-server <IPV4-ADDR-DNS-SERVER>] [probe-interval <<PROBE-INTERVAL>>] [version <VERSION-NUMBER>] [https-raw-request
<RAW-PAYLOAD>] no https {get | raw} URL [source {<SOURCE-IPV4-ADDR> | <IFNAME>} source-port <PORT-NUM>]
[proxy proxy-url] [cache disable] [name-server <IPV4-ADDR-DNS-SERVER>] [probe-interval <<PROBE-INTERVAL>>] [version <VERSION-NUMBER>] [https-raw-request <RAW-PAYLOAD>]
Description
Configures HTTPS as the IP-SLA test mechanism. Requires destination URL and type of HTTPS request (get/raw). The no form of this command removes the configuration.
For HTTPS IP-SLA sessions, it is not required to install a certificate on the switch.

Parameter {get | raw} URL source {<SOURCE-IPV4-ADDR> | <IFNAME>} source-port <PORT-NUM>

Description
Selects HTTPS request type as get or raw where the system will generate or provide HTTPS payload.
Specifies HTTPS URL address of syntax. https://<HOST NAME/IP-ADDRESS>:<PORT>/<PATH>.
Selects the source IPv4 address for SLA probes or the source interface to use for sending IP-SLA probes.
Specifies the value of the source port for the IP-SLA probes.

IP-SLA commands | 1028

Parameter cache disable name-server <IPV4-ADDR-DNS-SERVER> probe-interval <PROBE-INTERVAL> version <VERSION-NUMBER> https-raw-request <RAW-PAYLOAD>

Description
Selects cache option for the HTTPS server. By default the option is enabled.
Specifies the IPv4 address of DNS server.
Specifies the probe interval in seconds. Range: 30 to 604800.
Specifies the source interface to use for sending IP-SLA probes.
HTTPS raw request. String.

Examples

switch(config-ipsla-1)# https get https://device.arubanetworks.com/root/home.html switch(config-ipsla-1)# https get https://2.2.2.2 source 1/1/1 switch(config-ipsla-1)# https get https://device.arubanetworks.com source 2.2.2.1 switch(config-ipsla-1)# https get https://device.arubanetworks.com/root/home.html source-interface 1/1/1 switch(config-ipsla-1)# https get https://device.arubanetworks.com name-server 10.10.10.2 switch(config-ipsla-1)# https raw https://device.arubanetworks.com/root/home.html raw-request "GET /en/US/hmpgs/index.html" switch(config-ipsla-1)# no https get https://2.2.2.2 source 1/1/1 switch(config-ipsla-1)# no https raw https://device.arubanetworks.com/root/home.html raw-request "GET /en/US/hmpgs/index.html"

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.12.1000

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-ip-sla-<IP-SLA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

icmp-echo
icmp-echo {<DEST-IPV4-ADDR>|<HOSTNAME>} [source {<SOURCE-IPV4-ADDR> | <IFNAME>}] [name-server <IPV4-ADDR-DNS-SERVER>] [payload-size <PAYLOAD-SIZE>] [tos <TYPE-OF-SERVICE>] [probe-interval <PROBE-INTERVAL>]
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1029

Configures ICMP echo as the IP-SLA test mechanism. Requires destination address for the IP-SLA test.

Parameter {<DEST-IPV4-ADDR> | <HOSTNAME>} [source {<SOURCE-IPV4-ADDR> | <IFNAME>}] name-server <IPV4-ADDR-DNS-SERVER> payload-size <PAYLOAD-SIZE> tos <TYPE-OF-SERVICE> probe-interval <PROBE-INTERVAL>

Description
Selects the destination IPv4 address for the IP-SLA or the hostname of the destination.
Selects the source IPv4 address for SLA probes or the source interface to use for sending IP-SLA probes.
Specifies the DNS server for destination hostname resolution.
Specifies the payload size of an SLA probe. Range: 0 to 1440.
Specifies the type of serve to be used in the probe packets. Range: 0 to 255.
Specifies the probe interval in seconds. Range: 5 to 604800.

Examples

switch(config)# ip-sla test switch(config-ip-sla-test)# icmp-echo 2.2.2.2 switch(config-ip-sla-test)# icmp-echo 2.2.2.2 source 3.3.3.3
switch(config-ip-sla-test)# icmp-echo 2.2.2.2 source 3.3.3.3 payload-size 400 switch(config-ip-sla-test)# icmp-echo 2.2.2.2 source 3.3.3.3 payload-size 400 name-server 4.4.4.4 switch(config-ip-sla-test)# icmp-echo 2.2.2.2 source 3.3.3.3 payload-size 400 name-server 4.4.4.4 probe-interval 80

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ip-sla-<IP-SLA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

ip-sla
ip-sla <IP-SLA-NAME> no ip-sla <IP-SLA-NAME>

IP-SLA commands | 1030

Description
Creates an IP Service Level Agreement (SLA) profile and switches to the config-ip-sla context. The no form of this command deletes an IP-SLA profile. By default, all profile use the default VRF (default).

Parameter <IP-SLA-NAME>

Description Specifies an IP-SLA profile name. Length: 1 to 64 characters.

Examples
Creating an IP-SLA:

switch(config)# ip-sla 1 switch(config-ip-sla-1)#

Deleting an IP-SLA:

switch(config)# no ip-sla 1 switch(config)#

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip-sla responder
ip-sla responder <SLA-NAME> {udp-echo | tcp-connect | udp-jitter-voip} <PORT-NUM> [source {<SOURCE-IPV4-ADDR> | <IFNAME>}][vrf <VRF-NAME>]
no ip-sla responder <SLA-NAME> {udp-echo | tcp-connect | udp-jitter-voip} <PORT-NUM> [source {<SOURCE-IPV4-ADDR> | <IFNAME>}][vrf <VRF-NAME>]
Description
Selects the IP-SLA responder. The responder can be configured for udp-echo, tcp-connect, udp-jittervoip type. It requires the SLA name, SLA type, and port number as arguments. Source IP/interface ID is a must for type udp-jitter-voip and optional for other types. The no form of this command removes the IP-SLA responder.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1031

Parameter <SLA-NAME> udp-echo tcp-connect vrf <VRF-NAME> udp-jitter-voip <PORT-NUM>
[source {<SOURCE-IPV4-ADDR> | <IFNAME>}]

Description Specifies the SLA name. Length: 1 to 64 characters. Enables responder for udp-echo probes. Selects TCP connect as the IP-SLA test mechanism. Specifies the name of the VRF to use. Selects VOIP jitter as the IP-SLA test mechanism. Specifies the port number to listen for IP-SLA probes. Range: 1 to 65535. Selects the source IPv4 address for SLA probes or the source interface to use for sending IP-SLA probes.

Examples

switch(config)# ip-sla responder SLA1 udp-echo 8000 source 2.2.2.2 switch(config)# ip-sla responder SLA1 udp-echo 8000 source 1/1/1

switch(config)# no ip-sla responder SLA1 udp-echo 8000 source 2.2.2.2

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show ip-sla responder
show ip-sla responder <SLA-NAME>
Description
Shows the given IP-SLA responder configuration and operation status.

Parameter <SLA-NAME>

Description Specifies the SLA name.

IP-SLA commands | 1032

Examples

switch(config)# show ip-sla responder SLA3

SLA Name

: SLA3

IP-SLA Type

: Udp-echo

VRF

: Default

Responder Port

: 8000

Responder IP

: 2.2.2.3

Responder Interface : 1/1/1

Responder Status : Running

switch(config)# show ip-sla responder 1

SLA Name

: 1 (non-persistent)

SLA Type

: udp-echo

VRF Name

: default

Responder Port

: 10

Responder IP

:

Responder Interface :

Responder Status : Running

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show ip-sla responder results
show ip-sla responder <SLA-NAME> <SOURCE-IPV4-ADDR> <PORT-NUM> results
Description
Shows the given ip-sla responder statistics for a given source IP and port. This command is only applicable for the sources where source IP and port are configured.

Parameter <SLA-NAME> <SOURCE-IPV4-ADDR> <PORT-NUM>

Description Specifies the SLA name. Specifies the source IPV4 address. Specifies the port number. Range: 1 to 65535.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1033

Examples

switch# show ip-sla responder SLA1 2.2.2.1 8000 results

IP-SLA Type

: Udp-echo

VRF Name

: Default

Source IP

: 2.2.2.1

Source Port

: 8000

Responder Port

: 8888

Responder IP

: 2.2.2.3

Responder Interface :

Responder Status : Running

Packets Received : 2

Packets Sent

:2

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show ip-sla
show ip-sla {<SLA-NAME> [results] | all}
Description
Shows the given IP-SLA source configuration and status.

Parameter <SLA-NAME> results all

Description Specifies the SLA name. Shows the statistics calculated for an SLA type. Shows all ip-sla source configurations and status.

Examples

switch# show ip-sla xyz results IP-SLA session status

IP-SLA commands | 1034

IP-SLA Name

: xyz

IP-SLA Type

: tcp-connect

Destination Host Name/IP Address: 2.2.2.1

Destination Port

: 8888

Source IP Address/IFName

: 2.2.2.2

Source Port

: 5555

Status

: running

IP-SLA session cumulative counters

Total Probes Transmitted

:1

Probes Timed-out

:0

Bind Error

:0

Destination Address Unreachable : 0

DNS Resolution Failures

:0

Reception Error

:0

Transmission Error

:0

IP-SLA Latest Probe Results Last Probe Time Packets Sent Packets Received Packet Loss in Test

: 2018 Jul 13 02:00:35 :1 :1 : 0.0000%

Minimum RTT(ms) Maximum RTT(ms) Average RTT(ms) DNS RTT(ms) TCP RTT(ms)

: 12 : 12 : 12 :0 : 12

switch(config)# show ip-sla xyz

IP-SLA Name

: xyz

Status

: scheduled

IP-SLA Type

: tcp-connect

VRF

: ipslasrc

Source Port

: 5555

Source IP

: 2.2.2.2

Source Interface

:

Domain Name Server

:

Probe interval(seconds) : 90

switch(config)# show ip-sla jitter-sla results

IP-SLA session status

IP-SLA Name

: jitter-sla

IP-SLA Type

: udp-jitter-voip

Destination Host Name/IP Address: 2.2.2.1

Destination Port

: 8888

Source IP Address/IFName

:

Source Port

: 5555

Status

: running

IP-SLA Session Cumulative Counters

Total Probes Transmitted

:1

Probes Timed-out

:0

Bind Error

:0

Destination Address Unreachable : 0

DNS Resolution Failures

:0

Reception Error

:0

Transmission Error

:0

IP-SLA Latest Probe Results Last Probe Time

: 2018 Jul 13 02:02:48

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1035

Packets Sent Packets Received Packet Loss in Test
Minimum RTT(ms) Maximum RTT(ms) Average RTT(ms) DNS RTT(ms)
Min Positive SD Max Positive SD Positive SD Number Positive SD Sum Positive SD Average Min Negative SD Max Negative SD Negative SD Number Negative SD Sum Negative SD Average
Max SD Delay Min SD Delay Average SD Delay
Voice Scores: MOS Score

:1 :1 : 0.0000%

:1 :1 :1 :0

:1

Min Positive DS

:2

:1

Max Positive DS

:2

:2

Positive DS Number

:2

:2

Positive DS Sum

:4

:5

Positive DS Average : 5

:1

Min Negative DS

:1

:1

Max Negative DS

:1

:2

Negative DS Number

:4

:2

Negative DS Sum

:4

:5

Negative DS Average : 5

:0

Max DS Delay

:0

:0

Min DS Delay

:0

:0

Average DS Delay

:0

: 4.38 ICPIF

:0

switch(config)# show ip-sla m3op

IP-SLA Name

: jitter-sla

Status

: running

IP-SLA Type

: udp-jitter-voip

VRF

: ipslasrc

Source IP

: 2.2.2.2

Source Interface

:

Domain Name Server

:

TOS

: 10

Probe Interval(seconds) : 90

Advantage Factor

:0

Codec Type

: g711a

switch(config)# show ip-sla https-sla

SLA Name

: https-sla

Status

: running

SLA Type

: https

VRF

: default

Source Port

: 1027

Source IP

: 1.1.1.1

Source Interface

:

Domain Name Server

:

Probe Interval(seconds) : 60

HTTPS Request Type

: raw

HTTPS URL

: https://1.1.1.2

Cache

: Enabled

HTTPS Proxy URL

:

HTTP Version Number

:

switch(config)# show ip-sla all

IP-SLA session status IP-SLA Name

: 707 (non-persistent)

IP-SLA commands | 1036

IP-SLA Type Destination Host Name/IP Address Destination Port Source IP Address/IFName Source Port Status

: https : NA : NA : : : running

IP-SLA Session Cumulative Counters

Total Probes Transmitted

:1

Probes Timed-out

:0

Bind Error

:0

Destination Address Unreachable

:0

DNS Resolution Failures

:0

Reception Error

:0

Transmission Error

:0

IP-SLA Latest Probe Results Last Probe Time Packets Sent Packets Received Packet Loss in Test

: 2023 Jun 05 13:10:19 :1 :1 : 0.0000%

Minimum RTT(ms) Maximum RTT(ms) Average RTT(ms) DNS RTT(ms) TCP RTT(ms) TLS RTT(ms)

: 20 : 20 : 20 :0 : 12 :8

switch(config)# show ip-sla http-sla

IP-SLA Name

: http-sla

Status

: running

IP-SLA Type

: http

VRF

: ipslasrc

Source IP

: 2.2.2.2

Source Interface

:

Domain Name Server

: 10.10.10.2

Probe Interval(seconds) : 90

HTTP Request Type

: get

HTTP/HTTPS URL

: abcd.com/ws/home

Cache

: Enabled

HTTP Proxy URL

:

HTTP Version Number

: 1.1

```

##### IP-SLA status description

```

| Status

| Description

|

|-------------------------|------------------------------------------------|

| running

| SLA is fully operational

|

| Bind Error

| Another service is using the same source port |

| Interface Down

| Interface status is not up

| Dns Resolution Error | Failed to resolve destination hostname

|

| No Route

| No available route to the responder

|

| Internal Error

| Unexpected error prevents SLA session

|

| Disabled

| SLA is disabled

|

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1037

|Configuration Incomplete | Configuration is not complete to enable the SLA|

```

##### IP SLA session cumulative counters description

```

| Status

| Description

|

|--------------------------------|--------------------------------------------

------------------------------|

|Probes Timed-out

| Total numbers of probes failed to receive

response.

|

|Bind Error

| Total numbers of probes transmission failed

as source port not available.|

|Destination Address Unreachable | Total numbers of probes transmission failed

due to route unavailable. |

|DNS Resolution Failures

| Total numbers of probes failed due to DNS

resolution failure.

|

|Reception Error

| Total numbers of probes failed due to

internal error in reception.

|

|Transmission Error

| Total numbers of probes failed due to

internal errr in transmission.

|

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History

Release 10.12.1000 10.07 or earlier

Modification Updated to display https as an IP-SLA type. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

start-test
start-test
Description
Starts the IP-SLA probes.
Examples
switch(config)# ip-sla test switch(config-ip-sla-test)# start-test

IP-SLA commands | 1038

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ip-sla-<IP-SLA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

stop-test
stop-test
Description
Stops the IP-SLA probes.
Examples
switch(config)# ip-sla test switch(config-ip-sla-test)# stop-test

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ip-sla-<IP-SLA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

tcp-connect
tcp-connect {<DEST-IPV4-ADDR> | <HOSTNAME>} <PORT-NUM> [source {<SOURCE-IPV4-ADDR> | <IFNAME>} [source-port <PORT-NUM>]] [name-server <IPV4-ADDR-DNS-SERVER>] [probe-interval <PROBE-INTERVAL>]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1039

Description
Configures TCP connect as the IP-SLA test mechanism. Requires destination address/hostname and destination port for the IP-SLA of tcp-connect IP-SLA type.

Parameter {<DEST-IPV4-ADDR> | <HOSTNAME>}
<PORT-NUM> [source {<SOURCE-IPV4-ADDR> | <IFNAME>}]
[source-port <PORT-NUM>] [name-server <IPV4-ADDR-DNS-SERVER>]
[probe-interval <PROBE-INTERVAL>]

Description
Selects the destination IPv4 address for the IP-SLA or the hostname of the destination.
Destination port for the IP-SLA. Range: 1 to 65535.
Selects the source IPv4 address for SLA probes or the source interface to use for sending IP-SLA probes.
Specifies the port for the IP-SLA test.
Specifies the DNS server for destination hostname resolution.
Probe interval in seconds. Range: 30 to 604800.

Examples

switch(config-ipsla-1)# tcp-connect 2.2.2.2 8080 switch(config-ipsla-1)# tcp-connect 2.2.2.2 8080 source 2.2.2.1 source-port 6000 switch(config-ipsla-1)# tcp-connect 2.2.2.2 8080 source 1/1/1 source-port 6000 switch(config-ipsla-1)# tcp-connect https://device.arubanetworks.com 8080 switch(config-ipsla-1)# tcp-connect https://device.arubanetworks.com 8080 source 2.2.2.1 source-port 6000 switch(config-ipsla-1)# tcp-connect https://device.arubanetworks.com 8080 source 1/1/1 source-port 6000 switch(config-ipsla-1)# tcp-connect https://device.arubanetworks.com 8080 nameserver 10.10.10.2

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ip-sla-<IP-SLA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

udp-echo
udp-echo {<DEST-IPV4-ADDR>|<HOSTNAME>} <PORT-NUM> [source {<SOURCE-IPV4-ADDR> | <IFNAME>} [source-port <PORT-NUM>]] [name-server <IPV4-ADDR-DNS-SERVER>] [payload-

IP-SLA commands | 1040

size <PAYLOAD-SIZE>] [tos <TYPE-OF-SERVICE>] [probe-interval <PROBE-INTERVAL>]
Description
Configures UDP echo as the IP-SLA test mechanism. Requires destination address/hostname and destination port number for the IP-SLA of udp-echo SLA type.

Parameter {<DEST-IPV4-ADDR> | <HOSTNAME>} <PORT-NUM> [source {<SOURCE-IPV4-ADDR> | <IFNAME>}] [source-port <PORT-NUM>] [name-server <IPV4-ADDR-DNS-SERVER>] [payload-size <PAYLOAD-SIZE>] [<TYPE-OF-SERVICE>] probe-interval <PROBE-INTERVAL>

Description
Selects the destination IPv4 address for the IP-SLA or the hostname of the destination.
Specifies the destination port for the IP-SLA. Range: 1 to 65535.
Selects the source IPv4 address for SLA probes or the source interface to use for sending IP-SLA probes.
Specifies source port for the IP-SLA test. Range: 1 to 65535.
Specifies the DNS server for destination hostname resolution.
Specifies the payload size of an SLA probe. Range: 28 to 1440.
Type of service. Range: 0 to 255.
Probe interval in seconds. Range: 5 to 604800.

Examples

switch(config-ipsla-1)# udp-echo 2.2.2.2 8080 switch(config-ipsla-1)# udp-echo 2.2.2.2 8080 source 2.2.2.1 switch(config-ipsla-1)# udp-echo https://device.arubanetworks.com 8080 switch(config-ipsla-1)# udp-echo 2.2.2.2 8080 source 1/1/1 switch(config-ipsla-1)# udp-echo 2.2.2.2 8080 source 2.2.2.1 payload-size 50 switch(config-ipsla-1)# udp-echo 2.2.2.2 8080 source 1/1/1 payload-size 50 switch(config-ipsla-1)# udp-echo 2.2.2.2 8080 payload-size 50 switch(config-ipsla-1)# udp-echo https://device.arubanetworks.com 8080 source
2.2.2.1 payload-size 50
switch(config-ipsla-1)# udp-echo https://device.arubanetworks.com 8080 source 1/1/1
payload-size 50 switch(config-ipsla-1)# udp-echo https://device.arubanetworks.com 8080
name-server 10.10.10.2

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1041

Command Information

Platforms
6300 6400

Command context config-ip-sla-<IP-SLA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

udp-jitter-voip
udp-jitter-voip {<DEST-IPV4-ADDR> | <HOSTNAME>} <PORT-NUM> [codec-type <CODEC-TYPE>] [advantage-factor <VALUE>] [source {<SOURCE-IPV4-ADDR> | <IFNAME>} [source-port
<PORT-NUM>]] [name-server <IPV4-ADDR-DNS-SERVER>][probe-interval <PROBE-INTERVAL>] [tos <TYPE-OF-
SERVICE>]
Description
Configure UDP jitter voip as the IP-SLA test mechanism. Requires destination address/hostname and source address/interface for the IP-SLA of udp-jitter-voip IP-SLA type.

Parameter {<DEST-IPV4-ADDR>|<HOSTNAME>} <PORT-NUM> [codec-type <CODEC-TYPE>] [advantage-factor <ADVANTAGE-FACTOR>] [source {<SOURCE-IPV4-ADDR> | <IFNAME>}] [source-port <PORT-NUM>] [name-server <IPV4-ADDR-DNS-SERVER>] tos <TYPE-OF-SERVICE> probe-interval <PROBE-INTERVAL>

Description
Selects the destination IPv4 address for the IP-SLA or the hostname of the destination.
Selects the port number for the IP-SLA. Range: 1 to 65535.
Selects the codec-type for the Voip IP-SLA test.
Selects the value for the advantage factor. Default value is 0.
Selects the source IPv4 address for SLA probes or the source interface to use for sending IP-SLA probes.
Specifies the value of source port for the IP-SLA probes.
Specifies the DNS server for destination hostname resolution.
Specifies the type of service. Range: 0 to 255.
Specifies the probe interval in seconds. Range: 120 to 604800.

Examples

switch(config-ipsla-1)# udp-jitter-voip 2.2.2.2 8080 advantage-factor 10 codectype g711a
switch(config-ipsla-1)# udp-jitter-voip 2.2.2.2 8080 advantage-factor 10 codec-type g711a source 2.2.2.1
switch(config-ipsla-1)# udp-jitter-voip https://device.arubanetworks.com 8080 advantage-factor 10 codec-type g711a
switch(config-ipsla-1)# udp-jitter-voip 2.2.2.2 8080 advantage-factor 10

IP-SLA commands | 1042

codec-type g711a source 1/1/1 switch(config-ipsla-1)# udp-jitter-voip https://device.arubanetworks.com 8080
advantage-factor 10 codec-type g711a source 2.2.2.1 switch(config-ipsla-1)# udp-jitter-voip https://device.arubanetworks.com 8080
advantage-factor 10 codec-type g711a source 1/1/1 switch(config-ipsla-1)# udp-jitter-voip https://device.arubanetworks.com 8080
advantage-factor 10 codec-type g711a name-server 10.10.10.2 probe-interval 120 source 10.1.1.1 source-port 8888 tos 10

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ip-sla-<IP-SLA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

vrf
vrf <VRF-NAME> no vrf [<VRF-NAME>]
Description
Configures the VRF on which the SLA will send or receive packets. By default, the default VRF is used. The no form of the command removes VRF from SLA.

Parameter <VRF-NAME>

Description Specifies a VRF name. Length: Default: default.

Examples

switch(config-ip-sla-test)# vrf ipslasrc

switch(config-ip-sla-test)# no vrf

For more information on features that use this command, refer to the Monitoring Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1043

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ip-sla-<IP-SLA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

IP-SLA commands | 1044

Chapter 56 IP tunnels commands

IP tunnels commands

description
description <DESC> no description
Description
Associates a text description with an IP tunnel for identification purposes. The no form of this command removes the description from an IP tunnel.

Parameter <DESC>

Description
Specifies the descriptive text to associate with the IP tunnel. Range: 1 to 64 printable ASCII characters.

Examples
Defines a description for GRE tunnel 33.

switch(config)# interface tunnel 33 mode gre ipv4 switch(config-gre-if)# description Network A Tunnel C

Removes the description for GRE tunnel 33.

switch(config)# interface tunnel 33 switch(config-gre-if)# no description

Defines a description for IPv6 in IPv4 tunnel 27.

switch(config)# interface tunnel 27 mode ip 6in4 switch(config-ip-if)# description Network 3 Tunnel 27

Removes the description for IPv6 in IPv4 tunnel 27.

switch(config)# interface tunnel 27 switch(config-ip-if)# no description

Defines a description for IPv6 in IPv6 tunnel 8.

switch(config)# interface tunnel 8 mode ip 6in6 switch(config-ip-if)# description Network 4 Tunnel 8

AOS-CX 10.14 Command-Line Interface Guide

1045

Removes the description for IPv6 in IPv6 tunnel 8.
switch(config)# interface tunnel 8 switch(config-ip-if)# no description

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-gre-if config-ip-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

destination ip
destination ip <IPV4-ADDR> no destination ip <IPV4-ADDR>
Description
Sets the destination IP address for an IP tunnel. Specify the address of the interface on the remote device to which the tunnel will be established. The no form of this command deletes the destination IP address from an IP tunnel.

Parameter <IPV4-ADDR>

Description
Specifies the destination IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.

Examples
Defines the destination IP address to be 10.10.10.1 for GRE tunnel 33.

switch(config)# interface tunnel 33 mode gre ipv4 switch(config-gre-if)# destination ip 10.10.10.1

Deletes the destination IP address 10.10.10.1 from GRE tunnel 33.

switch(config)# interface tunnel 33 switch(config-gre-if)# no destination ip 10.10.10.1

IP tunnels commands | 1046

Defines the destination IP address to be 10.10.20.1 for IPv6 in IPv4 tunnel 27.
switch(config)# interface tunnel 27 mode ip 6in4 switch(config-ip-if)# destination ip 10.10.20.1
Deletes the destination IP address 10.10.20.1 from IPv6 in IPv4 tunnel 27.
switch(config)# interface tunnel 27 switch(config-ip-if)# no destination ip 10.10.20.1

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-gre-if config-ip-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

destination ipv6
destination ipv6 <IPVv6-ADDR> no destination ipv6 [IPV6-ADDR]
Description
Sets the destination IPv6 address for an IP tunnel. Specify the address of the interface on the remote device to which the tunnel will be established. The no form of this command deletes the destination IPv6 address from an IP tunnel.

Parameter <IPV6-ADDR>

Description
Specifies the tunnel IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. This is optional in the no form of the command.

Examples
Defines the destination IPv6 address to be 2001:DB8::1 for IPv6 in IPv6 tunnel

switch(config)# interface tunnel 8 mode ip 6in6 switch(config-ip-if)# destination ipv6 2001:DB8::1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1047

Deletes the destination IPv6 address 2001:DB8::1 from IPv6 in IPv6 tunnel 8.
switch(config)# interface tunnel 8 switch(config-ip-if)# no destination ipv6 2001:DB8::1

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-ip-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

interface tunnel
interface tunnel <TUNNEL-NUMBER> mode {gre ip | ip 6in4 | ip 6in6 |ipsec ipv4} interface tunnel <EXISTING-TUNNEL-NUMBER> no interface tunnel <EXISTING-TUNNEL-NUMBER> [mode {gre ip | ip 6in4 | ip 6in6}]
Description
Creates or updates an IP tunnel. After you enter the command, the firmware switches to the configuration context for the tunnel. If the specified tunnel exists, this command switches to the context for the tunnel. By default, all tunnels are automatically assigned to the default VRF when they are created. The no form of this command deletes an existing IP tunnel. It is optional to include a mode in the no form, but if a mode has been entered, selecting a mode is required.

Parameter mode {gre ip | ip 6in4 | ip 6in6}
<TUNNEL-NUMBER> <EXISTING-TUNNEL-NUMBER>

Description
Creates an IP tunnel. Choose one of the following options: n gre ip: Creates a GRE tunnel. n ip 6in4: Creates an IPv4 tunnel for IPv6 traffic. n ip 6in6: Creates an IPv6 tunnel for IPv6 traffic. This is optional in the no form, unless a mode has already been entered.
Specifies the number for a new tunnel. Range: 1 to 127. Numbering is shared between all tunnels, so the same tunnel number cannot be used for an IPv6 in IPv4 tunnel and a GRE tunnel.
Specifies the number for an existing IP tunnel. Range: 1 to 127.

IP tunnels commands | 1048

Examples
Defines a new GRE tunnel with number 27.
switch(config)# interface tunnel 27 mode gre ip switch(config-gre-if)#
Switches to the config-gre-if context for existing tunnel 33.
switch(config)# interface tunnel 33 switch(config-gre-if)#
Deletes GRE tunnel 33.
switch(config)# no interface tunnel 33
Defines a new IPv6 in IPv4 tunnel with number 27.
switch(config)# interface tunnel 27 mode ip 6in4 switch(config-ip-if)#
Switches to the config-ip-if context for existing tunnel 27.
switch(config)# interface tunnel 27 switch(config-ip-if)#
DeletesIPv6 in IPv4 tunnel 27.
switch(config)# no interface tunnel 27
Defines a new IPv6 in IPv6 tunnel with number 8.
switch(config)# interface tunnel 8 mode ip 6in6 switch(config-ip-if)#
Deletes IPv6 in IPv6 tunnel with number 3.
switch(config)# no interface tunnel 3 mode gre ip

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14

Modification The ipv4 parameter is deprecated and replaced with ip.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1049

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-gre-if config-ip-if config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip address
ip address <IPV4-ADDR>/<MASK> no ip address <IPV4-ADDR>/<MASK>
Description
Sets the local IP address of a GRE tunnel. This address identifies the tunnel interface for routing. It must be on the same subnet as the tunnel address assigned on the remote device. The no form of this command deletes the local IP address assigned to a GRE tunnel.

Parameter <IPV4-ADDR>
<MASK>

Description
Specifies the tunnel IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. You can remove leading zeros. For example, the address 192.169.005.100 becomes 192.168.5.100.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 32.

Examples
Defines the local IP address 10.10.10.1 for GRE tunnel 33.

switch(config)# interface tunnel 33 mode gre ipv4 switch(config-gre-if)# ip address 10.10.10.1/24

Deletes the local IP address 10.10.10.1 for GRE tunnel 33.

switch(config)# interface tunnel 33 switch(config-gre-if)# no ip address 10.10.10.1/24

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

IP tunnels commands | 1050

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-gre-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 address
ipv6 address <IPV6-ADDR>/<MASK> no ipv6 address <IPV6-ADDR>/<MASK>
Description
Sets the local IP address of an IPv6 to IPv4 tunnel or of an IPv6 to IPv6 tunnel. This address identifies the tunnel interface for routing. It must be on the same subnet as the tunnel address assigned on the remote device. The no form of this command deletes the local IP address assigned to an IPv6 to IPv4 tunnel.

Parameter <IPV6-ADDR>
<MASK>

Description
Specifies the tunnel IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 32.

Examples
Defines the local IP address 2001:DB8:5::1/64 for tunnel 8 for an IPv6 to IPv6 tunnel.

switch(config)# interface tunnel 8 mode ip 6in6 switch(config-ip-if)# ipv6 address 2001:DB8:5::1/64

Deletes the local IP address 2001:DB8::1/32 for tunnel 8.

switch(config)# interface tunnel 8 switch(config-ip-if)# no ipv6 address 2001:DB8:5::1/64

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1051

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-ip-if config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip mtu
ip mtu <VALUE>
Description
Sets the MTU (maximum transmission unit) for an IP interface. The default value is 1500 bytes. The no form of this command sets the MTU to the default value of 1500 bytes.

Parameter <VALUE>

Description Specifies the MTU in bytes. Range: 1,280 bytes to 9,192 bytes.

Usage
The IP MTU is the largest IP packet that can be sent or received by the interface. For a tunnel, the IP MTU is the maximum size of the IP payload. To enable jumbo packet forwarding through the tunnel, set the IP MTU of the tunnel to a value greater than 1500. Also set the MTU and the IP MTU values for the underlying physical interface that the tunnel is using to a value greater than 1,500 bytes. The IP MTU of the tunnel must also be greater than or equal to the MTU of the ingress interface on the switch. The IP MTU value of the tunnel must also be less than or equal to the IP MT of the underlying interface that the tunnel is using. When defining a GRE tunnel, the MTU has to account for 28 bytes of IP layer overhead, plus a GRE header. It must be larger than the MTU of the interface that the tunnel is using. Packets larger than the MTU are dropped.
Examples
Sets the MTU on GRE interface 33 to 1300 bytes.

switch(config)# interface tunnel 33 mode gre ipv4 switch(config-gre-if)# mtu 1300

Sets the MTU on GRE interface 33 to the default value.

switch(config)# interface tunnel 33 mode gre ipv4 switch(config-gre-if)# ip mtu

Sets the MTU on IPv6 in IPv4 tunnel 27 to 1000 bytes.

IP tunnels commands | 1052

switch(config)# interface tunnel 27 mode ip 6in4 switch(config-ip-if)# mtu 1000
Sets the MTU onIPv6 in IPv4 tunnel 27 to the default value.
switch(config)# interface tunnel 27 mode ip 6in4 switch(config-ip-if)# ip mtu
Sets the MTU on IPv6 in IPv6 tunnel 8 to 900 bytes.
switch(config)# interface tunnel 8 mode ip 6in6 switch(config-ip-if)# ip mtu 9000
Sets the MTU on IPv6 in IPv6 tunnel 8 to the default value.
switch(config)# interface tunnel 8 mode ip 6in6 switch(config-ip-if)# ip mtu

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-gre-if config-ip-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

show interface tunnel
show interface tunnel[<TUNNEL-NUMBER>] [vsx-peer]
Description
Shows configuration settings for all IP tunnels, or a specific tunnel.

Parameter <TUNNEL-NUMBER> vsx-peer

Description
Specifies the number of an IP tunnel. Range: 1 to 127.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1053

Examples
Shows configuration settings for tunnel 10, which is a GRE tunnel in the following example.

switch# show interface tunnel10

Interface tunnel10 is up Admin state is up tunnel type GRE IP tunnel interface IP address 192.0.2.0/24 tunnel source IP address 1.1.1.1 tunnel destination IP address 2.2.2.2 tunnel ttl 60

Statistics

RX

TX

Total

------------- -------------------- -------------------- --------------------

L3 Packets

0

0

0

L3 Bytes

0

0

0

Shows configuration settings for tunnel 12, which is an IPv6 in IPv6 tunnel in the following example.

switch# show interface tunnel12

Interface tunnel12 is up Admin state is up tunnel type IPv6 in IPv6 tunnel interface IPv6 address 4::1/64 tunnel source IPv6 address 2::1 tunnel destination IPv6 address 2::2 tunnel ttl 60 Description: Network2 Tunnel

Statistics

RX

TX

Total

------------- -------------------- -------------------- --------------------

L3 Packets

0

0

0

L3 Bytes

0

0

0

Shows configuration settings for all tunnels.

switch# show interface tunnel

Interface tunnel10 is up Admin state is up tunnel type GRE IP tunnel interface IP address 192.0.2.0/24 tunnel source IP address 1.1.1.1 tunnel destination IP address 2.2.2.2 tunnel ttl 60

Statistics

RX

TX

Total

------------- -------------------- -------------------- --------------------

L3 Packets

0

0

0

L3 Bytes

0

0

0

Interface tunnel11 is up Admin state is up tunnel type IPv6 in IPv4 tunnel source IPv4 address 198.51.100.0 tunnel destination IPv4 address 198.51.200.5

IP tunnels commands | 1054

tunnel ttl 80 Description: Network11

Statistics

RX

TX

Total

------------- -------------------- -------------------- --------------------

L3 Packets

0

0

0

L3 Bytes

0

0

0

Interface tunnel12 is up Admin state is up tunnel type IPv6 in IPv6 tunnel interface IPv6 address 4::1/64 tunnel source IPv6 address 2::1 tunnel destination IPv6 address 2::2 tunnel ttl 60 Description: Network2 Tunnel

Statistics

RX

TX

Total

------------- -------------------- -------------------- --------------------

L3 Packets

0

0

0

L3 Bytes

0

0

0

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config interface tunnel
show running-config interface tunnel<TUNNEL-NUMBER> [vsx-peer]
Description
Shows the commands used to configure a tunnel.

Parameter <TUNNEL-NUMBER> vsx-peer

Description
Specifies the number of an IP tunnel. Range: 1 to 127.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1055

Examples
Shows the configuration for a GRE tunnel.
switch# show running-config interface tunnel2 interface tunnel 2 mode gre ipv4 source ip 10.10.20.11 destination ip 10.20.1.2 ip address 10.10.10.1/24 ttl 60
Shows the configuration for IPv6 in IPv4 tunnel.
switch# show running-config interface tunnel5 interface tunnel5 mode ip 6in4 source ip 10.10.10.12 destination ip 22.20.20.20 ip6 address 2001:DB8:5::1/64 ttl 60 no shutdown description Network10
Shows the configuration for IPv6 in IPv6 tunnel.
switch# show running-config interface tunnel1 interface tunnel 1 mode ip 6in6 description Network2 Tunnel source ipv6 2::1 destination ipv6 2::2 ipv6 address 4::1/64 ttl 60

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

shutdown
shutdown no shutdown

IP tunnels commands | 1056

Description
This command disables an IP interface. IP interfaces are disabled by default when created. The no form of this command enables an IP interface.
Examples
Enables GRE interface 33.
switch(config)# interface tunnel 33 mode gre ipv4 switch(config-gre-if)# no shutdown
Disables GRE interface 33.
switch(config)# interface tunnel 33 mode gre ipv4 switch(config-gre-if)# shutdown
Enables IPv6 in IPv4 interface 27.
switch(config)# interface tunnel 27 mode ip 6in4 switch(config-ip-if)# no shutdown
Disables IPv6 in IPv4 interface 27.
switch(config)# interface tunnel 27 mode ip 6in4 switch(config-ip-if)# shutdown

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-gre-if config-ip-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

source ip
source ip <IPV4-ADDR> no source ip <IPV4-ADDR>
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1057

Sets the source IP address for an IP tunnel. Specify the IP address of a layer 3 interface on the switch. Tunnels can have the same source IP address and different destination IP addresses.
The no form of this command deletes the source IP address for an IP tunnel.

Parameter <IPV4-ADDR>

Description
Specifies the source IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.

Examples
Defines the source IP address to be 10.10.20.1 for GRE tunnel 33.

switch(config)# interface tunnel 33 mode gre ipv4 switch(config-gre-if)# source ip 10.10.20.1

Deletes the source IP address 10.1.20.1 from GRE tunnel 33.

switch(config)# interface tunnel 33 switch(config-gre-if)# no source ip 10.10.20.1

Defines the source IP address to be 10.10.10.1 for IPv6 in IPv4 tunnel 27.

switch(config)# interface tunnel 27 mode ip 6in4 switch(config-ip-if)# source ip 10.10.10.1

Deletes the source IP address 10.1.10.1 from IPv6 in IPv4 tunnel 27.

switch(config)# interface tunnel 27 switch(config-ip-if)# no source ip 10.10.10.1

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-gre-if config-ip-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

source ipv6

IP tunnels commands | 1058

source ipv6 <IPV6-ADDR> no source ipv6 [IPV6-ADDR]
Description
Sets the source IPv6 address to be used for the encapsulation. The no form of this command deletes the source IPv6 address for an IP tunnel.

Parameter <IPV6-ADDR>

Description
Specifies the tunnel IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. This is optional in the no form of the command.

Examples
Defines the source IPv6 address to be 2001:DB8::1 for IPv6 in IPv6 tunnel 8.

switch(config)# interface tunnel 8 mode ip 6in6 switch(config-ip-if)# source ipv6 2001:DB8::1

Deletes the source IP address 2001:DB8::1 from IPv6 in IPv6 tunnel 8.

switch(config)# interface tunnel 8 switch(config-ip-if)# no source ipv6 2001:DB8::1

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-ip-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ttl
ttl <COUNT> no ttl
Description
Sets the TTL (time-to-live), also known as the hop count, for tunneled packets. If not configured, the default value of 64 is used for the tunnel. (The hop count of the original packets is not changed.) A

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1059

maximum of four different TTL values can be used at the same time by all tunnels on the switch. For example, if tunnel-1 has TTL 10, tunnel-2 has TTL 20, tunnel-3 has TTL 30, and tunnel-4 has TTL 40, then tunnel-5 cannot have a unique TTL value, it must reuse one of the values assigned to the other tunnels (10, 20, 30, 40).
The no form of this command sets TTL to the default value of 64.

Parameter <COUNT>

Description Specifies the hop count. Range: 1 to 255. Default: 64.

Examples
Defines a TTL of 99 for GRE tunnel 33.

switch(config)# interface tunnel 33 mode gre ipv4 switch(config-gre-if)# ttl 99

Sets the TTL for GRE tunnel 33 to the default value of 64.

switch(config)# interface tunnel 33 switch(config-gre-if)# no ttl

Defines a TTL of 55 for IPv6 in IPv4 tunnel 27.

switch(config)# interface tunnel 27 mode ip 6in4 switch(config-ip-if)# ttl 55

Sets the TTL for IPv6 in IPv4 tunnel 27 to the default value of 64.

switch(config)# interface tunnel 27 switch(config-ip-if)# no ttl

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-gre-if config-ip-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

IP tunnels commands | 1060

vrf attach
vrf attach <VRF-NAME> no vrf attach <VRF-NAME>
Description
Assigns an IP tunnel to a VRF. By default, all tunnels are automatically assigned to the default VRF when they are created. The no form of this command assigns a tunnel to the default VRF (default).

Parameter <VRF-NAME>

Description Specifies the VRF name to which to assign the tunnel.

Examples
Assigns GRE tunnel 33 to vrf1.

switch(config)# interface tunnel 33 mode gre ipv4 switch(config-gre-if)# vrf attach vrf1

Reassigns GRE tunnel 33 to the default VRF.

switch(config)# interface tunnel 33 switch(config-gre-if)# no vrf attach vrf1

Assigns IPv6 in IPv4 tunnel 27 to vrf2.

switch(config)# interface tunnel 27 mode gre ipv4 switch(config-ip-if)# vrf attach vrf2

Reassigns IPv6 in IPv4 tunnel 27 to the default VRF.

switch(config)# interface tunnel 27 switch(config-ip-if)# no vrf attach vrf2

Assigns IPv6 in IPv6 tunnel 8 to vrf3.

switch(config)# interface tunnel 8 mode ip 6in6 switch(config-ip-if)# vrf attach vrf3

Reassigns IPv6 in IPv6 tunnel 8 to the default VRF.

switch(config)# interface tunnel 8 switch(config-ip-if)# no vrf attach vrf3

For more information on features that use this command, refer to the IP Services Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1061

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-gre-if config-ip-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

IP source lockdown commands

IP source lockdown resource extended
[no] ip source-lockdown resource-extended
Description
Enables and disables IP source lockdown resource extended on the device. It supports dynamically sharing hardware resources of IP source lockdown with other features. For example, on AOS-CX 6300 switches, 8000 IP source lockdown entries can be programmed in the hardware by default. By disabling IP resource-extended, the supported value will reduce to 4000, and the remaining resources are shared with other features. If the resource-extended feature is disabled, all the existing IP source-bindings are flushed from the hardware and reprogrammed. As a result, some existing bindings do not get programmed to hardware, which existed before the configuration change. There is a disruption in traffic flow from the client during this transition.
The command is supported on 6300, 6400v1, and 6400v2 but not supported on 6400v2 extended profile.
Examples
The following example enables IP source lockdown resource extended globally:
switch(config)# ip source-lockdown resource-extended Do you want to continue (y/n)? y
On enabling IP source lockdown resource extended , application recognition gets disabled and stops sharing IP lockdown hardware resources. The following example disables IP source lockdown resource extended globally:
switch(config)# no ip source-lockdown resource-extended Do you want to continue (y/n)? y

For more information on features that use this command, refer to the IP Services Guide for your switch model.

IP source lockdown commands | 1062

Command History

Release 10.11

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced for 6300 and 6400 series switches.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1063

Chapter 57 IPv4 source lockdown commands

IPv4 source lockdown commands

ipv4 source-binding
ipv4 source-binding <VLAN-ID> <IPV4-ADDR> <MAC-ADDR> <IFNAME> no ipv4 source-binding <VLAN-ID> <IPV4-ADDR> <MAC-ADDR> <IFNAME>
Description
Adds static IPv4 client source binding information to the switch IP binding database. Although DHCPv4 snooping is often used to dynamically populate the binding database, this command is available for manually adding entries to the switch IP binding database.

Statically configured IP binding information supersedes any dynamically collected binding information for the same client.
The no form of this command removes the specified binding that was statically configured with the ipv4 source-binding command. The no form has no effect on bindings that were dynamically configured with DHCPv4 snooping.

Parameter <VLAN-ID>
<IPV4-ADDR> <MAC-ADDR> <IFNAME>

Description Specifies the ID of an existing VLAN on which the client is connected. Range: 1 to 4094. Specifies the client IPv4 unicast address. Specifies the client MAC address. Specifies the interface on which the client is connected.

Examples
On the 6400 Switch Series, interface identification differs. Adding a static IPv4 binding:

switch(config)# ipv4 source-binding 1 10.2.1.4 00:50:56:96:e4:cf 1/1/1

Removing a IPv4 binding:

switch(config)# no ipv4 source-binding 1 10.2.1.4 00:50:56:96:e4:cf 1/1/1

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

AOS-CX 10.14 Command-Line Interface Guide

1064

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv4 source-lockdown
ipv4 source-lockdown no ipv4 source-lockdown
Description
Enables IPv4 source lockdown for all VLANs on the selected interface (port). The no form of this command disables IPv4 source lockdown for the selected interface (port).
This configuration will disable flow tracking statistics collection.

Examples
On the 6400 Switch Series, interface identification differs. Enabling IPv4 source lockdown on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# ipv4 source-lockdown
Enabling IPv4 source lockdown on interface lag112:
switch(config)# interface lag112 switch(config-if)# ipv4 source-lockdown
Disabling IPv4 source lockdown on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no ipv4 source-lockdown
For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

IPv4 source lockdown commands | 1065

Release 10.14 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification Added information related to role based IPFIX. --
Authority Administrators or local user group members with execution rights for this command.

ipv4 source-lockdown hardware retry
ipv4 source-lockdown hardware retry <VLAN-ID> <IPV4-ADDR>
Description
Retries the IPv4 source lockdown hardware programming for a client identified by VLAN and IPv4 address.

Parameter <VLAN-ID>
<IPV4-ADDR>

Description
Specifies the ID of an existing VLAN on which the client is connected. Range: 1 to 4094.
Specifies the client IPv4 unicast address.

Example
Configure IPv4 source lockdown hardware retry for the client on VLAN 10.

switch(config)# ipv4 source-lockdown hardware retry 10 1.1.2.1

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1066

show ipv4 source-binding
show ipv4 source-binding [vsx-peer]
Description
Shows all IPv4 static source binding information irrespective of source lockdown configuration..

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing all IPv4 source binding information:

switch# show ipv4 source-binding

PORT -------------1/1/1 1/1/2

VLAN --------2 12

MAC-ADDRESS ----------------aa:bb:cc:dd:ee:ff aa:ab:cc:dd:ee:ff

HW-STATUS --------Yes Yes

FROM -------static static

IPv4-ADDRESS ------------1.2.3.4 10.20.30.40

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv4 source-lockdown
show ipv4 source-lockdown [binding [interface <IFNAME> | ip <IPV4-ADDR> | mac <MAC-ADDR> | vlan <VLAN-ID>] | interface <IFNAME>] [vsx-peer]
Description
Shows summary or detailed IPv4 source lockdown information. When entered without parameters, summary status information for all interfaces (ports) in the binding database is shown.

IPv4 source lockdown commands | 1067

Parameter binding
interface <IFNAME>
ip <IPV4-ADDR> mac <MAC-ADDR> vlan <VLAN-ID> vsx-peer

Description
Specifies that detailed lockdown binding record information is to be displayed. The binding database record can be identified by any one of interface (port), ip, mac, or vlan.
Specifies the client interface (port). When entered without the binding parameter, the summary status information is displayed for the specified interface.
Specifies the client IPv4 unicast address.
Specifies the client MAC address.
Specifies the ID of an existing VLAN on which the client is connected. Range: 1 to 4094.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing the summary status information for all interfaces in the binding database:

switch# show ipv4 source-lockdown

INTERFACE --------1/1/1 1/1/2 lag112

LOCKDOWN -------Yes Yes Yes

HW-STATUS --------Yes No Yes

Showing the summary status information for the specified interface in the binding database:

switch# show ipv4 source-lockdown interface 1/1/2

INTERFACE LOCKDOWN HW-STATUS

--------- -------- ---------

1/1/2

Yes

No

Showing the detailed binding record and related information for all interfaces in the binding database:

switch# show ipv4 source-lockdown binding

Interface Name

: 1/1/1

VLAN Id

: 2000

MAC Address

: 00:50:56:96:e4:cf

IP Address

: 192.168.142.113

Time Remaining

: static

Lockdown Status

: Yes

Hardware Status

: Yes

Hardware Error Reason : --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1068

Interface Name

: 1/1/2

VLAN Id

: 100

MAC Address

: 00:50:56:96:04:4d

IP Address

: 120.168.43.52

Time Remaining

: 115 seconds

Lockdown Status

: Yes

Hardware Status

: No

Hardware Error Reason : Resource unavailable

Interface Name

: lag112

VLAN Id

: 12

MAC Address

: 00:50:56:96:d8:3d

IP Address

: 120.168.76.182

Time Remaining

: static

Lockdown Status

: Yes

Hardware Status

: Yes

Hardware Error Reason : --

Interface Name

: 1/1/1

VLAN Id

: 2000

MAC Address

: 00:50:56:96:e4:cf

IP Address

: 192.168.142.113

Time Remaining

: static

Lockdown Status

: Yes

Hardware Status

: Yes

Hardware Error Reason : --

Interface Name

: 1/1/2

VLAN Id

: 100

MAC Address

: 00:50:56:96:04:4d

IP Address

: 120.168.43.52

Time Remaining

: 115 seconds

Lockdown Status

: Yes

Hardware Status

: No

Hardware Error Reason : Resource unavailable

Interface Name

: lag112

VLAN Id

: 12

MAC Address

: 00:50:56:96:d8:3d

IP Address

: 120.168.76.182

Time Remaining

: static

Lockdown Status

: Yes

Hardware Status

: Yes

Hardware Error Reason : --

Showing the detailed binding record and related information for interface 1/1/2:

switch# show ipv4 source-lockdown binding interface 1/1/2

Interface Name

: 1/1/2

VLAN Id

: 100

MAC Address

: 00:50:56:96:04:4d

IP Address

: 120.168.43.52

Time Remaining

: 115 seconds

Lockdown Status

: Yes

Hardware Status

: No

Hardware Error Reason : Resource unavailable

Interface Name VLAN Id MAC Address

: 1/1/2 : 100 : 00:50:56:96:04:4d

IPv4 source lockdown commands | 1069

IP Address

: 120.168.43.52

Time Remaining

: 115 seconds

Lockdown Status

: Yes

Hardware Status

: No

Hardware Error Reason : Resource unavailable

Showing the detailed binding record and related information for interface lag112 (identified in this example command by the IP address):

switch# show ipv4 source-lockdown binding ip 120.168.76.182

Interface Name

: lag112

VLAN Id

: 12

MAC Address

: 00:50:56:96:d8:3d

IP Address

: 120.168.76.182

Time Remaining

: static

Lockdown Status

: Yes

Hardware Status

: Yes

Hardware Error Reason : --

Showing the detailed binding record and related information for interface 1/1/1 (identified in this example command by the MAC address):

switch# show ipv4 source-lockdown binding mac 00:50:56:96:e4:cf

Interface Name

: 1/1/1

VLAN Id

: 2000

MAC Address

: 00:50:56:96:e4:cf

IP Address

: 192.168.142.113

Time Remaining

: static

Lockdown Status

: Yes

Hardware Status

: Yes

Hardware Error Reason : --

Showing the detailed binding record and related information for interface 1/1/2 (identified in this example command by the VLAN):

switch# show ipv4 source-lockdown binding vlan 100

Interface Name

: 1/1/2

VLAN Id

: 100

MAC Address

: 00:50:56:96:04:4d

IP Address

: 120.168.43.52

Time Remaining

: 115 seconds

Lockdown Status

: Yes

Hardware Status

: No

Hardware Error Reason : Resource unavailable

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1070

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

IPv4 source lockdown commands | 1071

Chapter 58 IPv6 destination guard commands

IPv6 destination guard commands
ipv6 destination guard
ipv6 destination-guard no ipv6 destination-guard
Description
Enables IPv6 destination guard on a VLAN. The no form of the command removes the IPv6 destination guard from a VLAN.
To avoid dropping valid packets when destination guard is enabled, it is recommended to configure DHCPv6 snooping and ND snooping to populate the binding database.
Examples
Enabling IPv6 destination guard policy on a VLAN:
switch(config)# vlan 10 switch(config-vlan-10)# ipv6 destination-guard
Disabling IPv6 destination guard policy on a VLAN:
switch(config-vlan-10)# no ipv6 destination-guard

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

show ipv6 destination-guard

AOS-CX 10.14 Command-Line Interface Guide

1072

show ipv6 destination-guard
Description
Shows the ipv6 destination-guard configuration.
Examples
Showing the IPv6 destination-guard configuration:

switch# show ipv6 destination-guard

IPv6 Destination-Guard information

Enabled VLANs

: 10,20,31-35

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 destination-guard statistics vlan
show ipv6 destination-guard statistics {vlan <VLAN-ID>}
Description
Shows IPv6 destination guard statistics for the specified VLAN.
Command context

Parameter vlan <VLAN-ID>

Description
Specifies the VLAN for which all destination guard statisics are to be displayed. Range: 1 to 4094.

Examples
Showing IPv6 destination-guard statistics for VLAN 10:

IPv6 destination guard commands | 1073

switch# show ipv6 destination-guard statistics vlan 10 Packets dropped for VLAN 10 : 25467
Showing IPv6 destination-guard statistics for all VLANs:
switch# show ipv6 destination-guard statistics Packets dropped for VLAN 10 : 25467 Packets dropped for VLAN 30 : 434 Packets dropped for VLAN 50 : 8767

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

clear ipv6 destination-guard statistics vlan
clear ipv6 destination-guard statistics vlan <VLAN-ID>
Description
Clears IPv6 destination guard statistics from the specified VLAN.
Command context

Parameter vlan <VLAN-ID>

Description
Specifies the VLAN for which all destination guard statistics are to be cleared. Range: 1 to 4094.

Examples
Clearing all ipv6 destination-guard statistics for VLAN 10:

switch# clear ipv6 destination-guard statistics vlan 10

For more information on features that use this command, refer to the IP Services Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1074

Command History

Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

IPv6 destination guard commands | 1075

Chapter 59 IPv6 RA commands

IPv6 RA commands
ipv6 address <global-unicast-address>
ipv6 address <global-unicast-address> no ipv6 address <global-unicast-address>
Description
Sets a global unicast address on the interface. The no form of this command removes the global unicast address on the interface.
This command automatically creates an IPv6 link-local address on the interface. However, it does not add the ipv6 address link-local command to the running configuration. If you remove the IPv6 address, the link-local address is also removed. To maintain the link-local address, you must manually execute the ipv6 address link-local command.
Example
On the 6400 Switch Series, interface identification differs. Enabling a global unicast address:
switch(config)# interface 1/1/1 switch(config-if)# ipv6 address 3731:54:65fe:2::a7
Disabling a global unicast address:
switch(config)# interface 1/1/1 switch(config-if)# no ipv6 address 3731:54:65fe:2::a7

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide

1076

Platforms All platforms

Command context config-if

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ipv6 address autoconfig
ipv6 address autoconfig no ipv6 address autoconfig
Description
Enables the interface to automatically obtain an IPv6 address using router advertisement information and the EUI-64 identifier. The no form of this command disables address auto-configuration.
n A maximum of 15 autoconfigured addresses are supported. n This command automatically creates an IPv6 link-local address on the interface. However, it does not add
the ipv6 address link-local command to the running configuration. If you remove the IPv6 address, the link-local address is also removed. To maintain the link-local address, you must manually execute the ipv6 address link-local command.
Usage
The IPv6 SLAAC feature lets the router obtain the IPv6 address for the interface it is configured through the SLAAC method. This feature is not available on the mgmt VRF.
Example
On the 6400 Switch Series, interface identification differs. Enabling unicast autoconfiguring:
switch(config)# interface 1/1/1 switch(config-if)# ipv6 address autoconfig
Disabling unicast autoconfiguring:
switch(config)# interface 1/1/1 switch(config-if)# no ipv6 address autoconfig

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

IPv6 RA commands | 1077

Command Information

Platforms All platforms

Command context config-if

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ipv6 address link-local
ipv6 address link-local [<IPV6-ADDR>/<MASK>]
Description
Enables IPv6 on the current interface. If no address is specified, an IPv6 link-local address is autogenerated for the interface. If an address is specified, auto-configuration is disabled and the specified address/mask is assigned to the interface. To disable IPv6 link-local on the interface, remove ipv6 address link-local, ipv6 address <global-ipv6address>, and ipv6 address autoconfig from the interface.
This feature is not available on the management VRF.

Parameter <IPV6-ADDR>
<MASK>

Description
Specifies the IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. You can use two colons (::) to represent consecutive zeros (but only once), remove leading zeros, and collapse a hextet of four zeros to a single 0. For example, this address 2222:0000:3333:0000:0000:0000:4444:0055 becomes 2222:0:3333::4444:55.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.

Example
On the 6400 Switch Series, interface identification differs. Enabling IPv6 link-local on the interface:

switch(config)# interface 1/1/1 switch(config-if)# ipv6 address link-local

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1078

Command Information

Platforms All platforms

Command context config-if

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ipv6 nd cache-limit
ipv6 nd cache-limit <CACHELIMIT> no ipv6 nd cache-limit [<CACHELIMIT>]
Description
Configures the limit on the number of neighbor entries in the ND cache. The no form of this command sets the cache limit to the default value.

Parameter <CACHELIMIT>

Description
Specifies the neighbor cache entries limit. Range: 1-131072. Default: 131072.

Examples
Setting the cache limit to 20.

switch(config)# ipv6 nd cache-limit 20

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 nd dad attempts
ipv6 nd dad attempts <NUM-ATTEMPTS> no ipv6 nd dad attempts [<NUM-ATTEMPTS>]
Description

IPv6 RA commands | 1079

Configures the number of neighbor solicitations to be sent when performing duplicate address detection (DAD) for a unicast address configured on an interface. If the active gateway is configured with the same IP as an SVI IP, then IPv6 DAD cannot be configured.
The no form of this command sets the number of attempts to the default value.

Parameter dad attempts <NUM-ATTEMPTS>

Description
Specifies the number of neighbor solicitations to send. Range: 015. Default: 1.

Examples
On the 6400 Switch Series, interface identification differs.

switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd dad attempts 5

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 nd hop-limit
ipv6 nd hop-limit <HOPLIMIT> no ipv6 nd hop-limit [<HOPLIMIT>]
Description
Configures the hop limit to be sent in RAs. The no form of this command resets the hop limit to 0. This reset eliminates the hop limit from the RAs that originate on the interface, so the host determines the hop limit.

Parameter hop-limit <HOPLIMIT>

Description Specifies the hop limit. Range: 0-255. Default: 64.

Examples
On the 6400 Switch Series, interface identification differs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1080

switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd hop-limit 64

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 nd mtu
ipv6 nd mtu <MTU-VALUE> no ipv6 nd mtu [<MTU-VALUE>]
Description
Configures the MTU size to be sent in the RA messages. The no form of this command sets hop limit to the default value.

Parameter <MTU-VALUE>

Description
Specifies the MTU size. Range: 1280-65535 bytes. Default: 1500 bytes.

Examples
On the 6400 Switch Series, interface identification differs.

switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd mtu 1300

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

IPv6 RA commands | 1081

Command Information

Platforms All platforms

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

ipv6 nd ns-interval
ipv6 nd ns-interval <TIME> no ipv6 nd ns-interval [<TIME>]
Description
Configures the ND time in milliseconds between DAD neighbor solicitations sent for an unresolved destination. Increase the ns-interval time if the network is slow or if there are persistent retry failures. If the active gateway is configured with the same IP as an SVI IP, then IPv6 DAD cannot be configured The no form of this command sets the ns-interval to the default value.

Parameter <TIME>

Description
Specifies the neighbor solicitation interval. Range: 1000-3600000 milliseconds. Default: 1000 milliseconds.

Examples
On the 6400 Switch Series, interface identification differs.

switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd ns-interval 1200

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 nd prefix
ipv6 nd prefix <IPV6-ADDR>/<PREFIX-LEN> [no-advertise | [valid <LIFETIME-VALUE> preferred

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1082

<LIFETIME-VALUE>] | no-autoconfig | no-onlink]
no ipv6 nd prefix <IPV6-ADDR>/<PREFIX-LEN> [no-advertise | [valid <LIFETIME-VALUE> preferred <LIFETIME-VALUE> ] | no-autoconfig | no-onlink]
ipv6 nd prefix default [no-advertise | [valid <LIFETIME-VALUE> preferred <LIFETIME-VALUE>] | no-autoconfig | no-onlink]}
no ipv6 nd prefix default [no-advertise | [valid <LIFETIME-VALUE> preferred <LIFETIME-VALUE>] | no-autoconfig | no-onlink]}
Description
Specifies prefixes for the routing switch to include in RAs transmitted on the interface. IPv6 hosts use the prefixes in RAs to autoconfigure themselves with global unicast addresses. The autoconfigured address of a host is composed of the advertised prefix and the interface identifier in the current linklocal address of the host. By default, advertise, autoconfig, and onlink are set. The no form of this command removes the configuration on the interface.

Parameter <IPV6-ADDR>/<PREFIX-LEN> default
no-advertise valid <LIFETIME-VALUE>
preferred <LIFETIME-VALUE>
no-autoconfig no-onlink

Description
Specifies the IPv6 prefix to advertise in RA. Format: X:X::X:X/M
Specifies apply configuration to all on-link prefixes that are not individually set by the ipv6 ra prefix <IPV6-ADDR>/<PREFIX-LEN> command. It applies the same valid and preferred lifetimes, link state, autoconfiguration state, and advertise options to the advertisements sent for all on-link prefixes that are not individually configured with a unique lifetime. This also applies to the prefixes for any global unicast addresses configured later on the same interface. Using default once, and then using it again with any new parameter values results in the new values replacing the former values in advertisements. If default is used without the no­ advertise, no­autoconfig, or no-onlink parameter, the advertisement setting for the absent parameter is returned to its default setting.
Specifies do not advertise prefix in RA.
Specifies the total time, in seconds, the prefix remains available before becoming unusable. After preferred-lifetime expiration, any autoconfigured address is deprecated and used only for transactions only before preferred-lifetime expires. If the valid lifetime expires, the address becomes invalid. You can enter a value in seconds or enter valid infinite which sets infinite lifetime. Default: 2,592,000 seconds which is 30 days. Range: 0­4294967294 seconds.
Specifies the span of time during which the address can be freely used as a source and destination for traffic. This setting must be less than or equal to the corresponding valid­lifetime setting. You can enter a value in seconds or enter preferred infinite which sets infinite lifetime. Default: 604,800 seconds which is seven days. Range: 0­4294967294 seconds.
Specifies do not use prefix for autoconfiguration.
Specifies do not use prefix for onlink determination.

IPv6 RA commands | 1083

Examples
On the 6400 Switch Series, interface identification differs.
switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd prefix 4001::1/64 valid 30 preferred 10 no-autoconfig no-onlink

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 nd ra dns search-list
ipv6 nd ra dns search-list <DOMAIN-NAME> [lifetime <TIME>] no ipv6 nd ra dns search-list <DOMAIN-NAME>
Description
Configures the DNS Search List (DNSSL) to include in Router Advertisements (RAs) transmitted on the interface. The no form of this command removes the DNS Search List from the RAs transmitted on the interface.

Parameter <DOMAIN-NAME> lifetime <TIME>

Description
Specifies the domain names for DNS queries.
Specifies lifetime in seconds. Range: 4-4294967295 seconds. Default: 1800 seconds.

Usage
n DNSSL contains the domain names of DNS suffixes or IPv6 hosts to append to short, unqualified domain names for DNS queries.
n Multiple DNS domain names can be added to the DNSSL by using the command repeatedly. n A maximum of eight server addresses are allowed.
Examples
On the 6400 Switch Series, interface identification differs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1084

switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd ra dns search-list test.com lifetime 500

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 nd ra dns server
ipv6 nd ra dns server <IPV6-ADDR> [lifetime <TIME>] no ipv6 nd ra dns server <IPV6-ADDR>
Description
Configures the IPv6 address of a preferred Recursive DNS Server (RDNSS) to be included in Router Advertisements (RAs) transmitted on the interface. The no form of this command removes the configured DNS server from the RAs transmitted on the interface.

Parameter <IPV6-ADDR>
lifetime <TIME>

Description
Specifies the RDNSS address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. You can use two colons (::) to represent consecutive zeros (but only once), remove leading zeros, and collapse a hextet of four zeros to a single 0. For example, this address 2222:0000:3333:0000:0000:0000:4444:0055 becomes 2222:0:3333::4444:55.
Specifies IPv6 DNS server lifetime in seconds. Range: 44294967295 seconds. Default: 1800 seconds.

Usage
n Including RDNSS information in RAs provides DNS server configuration for connected IPv6 hosts without requiring DHCPv6.
n Multiple servers can be configured on the interface by using the command repeatedly. n A maximum of eight server addresses are allowed.
Examples

IPv6 RA commands | 1085

On the 6400 Switch Series, interface identification differs.
switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd ra dns server 2001::1 lifetime 400

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 nd ra lifetime
ipv6 nd ra lifetime <TIME> no ipv6 nd ra lifetime [<TIME>]
Description
Configures the lifetime, in seconds, for the routing switch to be used as a default router by hosts on the current interface. The no form of this command sets lifetime to the default of 1800 seconds.

Parameter <TIME>

Description
Specifies lifetime in seconds of a default router. A setting of 0 for default router lifetime in an RA indicates that the routing switch is not a default router on the interface. Range: 0-9000 seconds. Default: 1800 seconds.

Usage
n A given host on an interface refreshes the default router lifetime for a specific router each time the host receives an RA from that router.
n A specific router ceases to be a default router candidate for a given host if the default router lifetime expires before the host is updated with a new RA from the router.
Examples
On the 6400 Switch Series, interface identification differs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1086

switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd ra lifetime 1200

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 nd ra managed-config-flag
ipv6 nd ra managed-config-flag no ipv6 nd ra managed-config-flag
Description
Controls the M flag setting in RAs the router transmits on the current interface. Enable the M flag to indicate that hosts can obtain IP address through DHCPv6. The M flag is disabled by default. The no form of this command turns off (disables) the M flag.
Usage
n Enabling the M flag directs hosts to acquire their IPv6 addressing for the current interface from a DHCPv6 server.
n When the M-bit is enabled, receiving hosts ignore the O flag setting, which is configured using the command ipv6 nd ra other-config-flag.
n When the M-bit is disabled (the default), receiving hosts expect to receive their IPv6 addresses from RA.

M flag 0
0

O flag 0
1

Description
Indicates that no information is available via DHCPv6.
Indicates that other configuration information is available via DHCPv6. Examples of such information are DNSrelated information or information on other servers within the network.

IPv6 RA commands | 1087

M flag 1
1

O flag 0
1

Description
Indicates that addresses are available via Dynamic Host Configuration Protocol (DHCPv6).
If the M flag is set, the O flag is redundant and can be ignored because DHCPv6 will return all available configuration information.

Examples
On the 6400 Switch Series, interface identification differs.

switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd ra managed-config-flag

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 nd ra max-interval
ipv6 nd ra max-interval <TIME> no ipv6 nd ra max-interval [<TIME>]
Description
Configures the maximum interval between transmissions of IPv6 RAs on the interface. The interval between RA transmissions on an interface is a random value that changes every time an RA is sent. The interval is calculated to be a value between the current max-interval and min-interval settings. The no form of this command returns the setting to its default, provided the default value is less than the default lifetime value.

Parameter <TIME>

Description
Specifies the maximum advertisement time in seconds. Range: 41800. Default: 600 seconds.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1088

Usage
n This value has one setting per interface. The setting does not apply to RAs sent in response to a router solicitation received from another device.
n Attempting to set max-interval to a value that is not sufficiently larger than the current min-interval also results in an error message.
Examples
On the 6400 Switch Series, interface identification differs.
switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd ra max-interval 30

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 nd ra min-interval
ipv6 nd ra min-interval <TIME> no ipv6 nd ra min-interval [<TIME>]
Description
Configures the minimum interval between transmissions of IPv6 RAs on the interface. The interval between RA transmissions on an interface is a random value that changes every time an RA is sent. The interval is calculated to be a value between the current max-interval and min-interval settings. The no form of this command returns the setting to its default, provided the default value is less than the current max-interval setting.

Parameter <TIME>

Description
Specifies a minimum advertisement time in seconds. Range: 31350. Default: 200 seconds.

Usage

IPv6 RA commands | 1089

n This value has one setting per interface and does not apply to RAs sent in response to a router solicitation received from another device.
n The min-interval must be less than the max-interval. Attempting to set min-interval to a higher value results in an error message.
Examples
On the 6400 Switch Series, interface identification differs.
switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd ra min-interval 25

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 nd ra other-config-flag
ipv6 nd ra other-config-flag no ipv6 nd ra other-config-flag
Description
Controls the O-bit in RAs the router transmits on the current interface; but is ignored unless the M-bit is disabled in RAs. Configure to set the O-bit in RA messages for host to obtain network parameters through DHCPv6. The other-config-flag is disabled by default. For more information on configuring the M-bit, see ipv6 nd ra managed-config-flag. The no form of this command turns off (disables) the setting for this command in RAs.
Usage
Enabling the O-bit while the M-bit is disabled directs hosts on the interface to acquire their other configuration information from DHCPv6. Examples of such information are DNS-related information or information on other servers within the network.
Examples
On the 6400 Switch Series, interface identification differs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1090

switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd ra other-config-flag

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 nd ra reachable-time
ipv6 nd ra reachable-time <TIME> no ipv6 nd ra reachable-time [<TIME>]
Description
Sets the amount of time that the interface considers a device to be reachable after receiving a reachability confirmation from the device. The no form of this command sets the reachable time to the default value of 0. (no limit).

Parameter <TIME>

Description
Specifies the reachable time in milliseconds. Range: 10003600000. Default: 0 (no limit).

Examples
On the 6400 Switch Series, interface identification differs.

switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd ra reachable-time 2000

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

IPv6 RA commands | 1091

Command Information

Platforms All platforms

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

ipv6 nd ra retrans-timer
ipv6 nd ra retrans-timer <TIME> no ipv6 nd ra retrans-timer [<TIME>]
Description
Configures the period (retransmit timer) between ND solicitations sent by a host for an unresolved destination, or between DAD neighbor solicitation requests. By default, hosts on the interface use their own locally configured NS-interval settings instead of using the value received in the RAs. Increase this timer when neighbor solicitation retries or failures are occur, or in a "slow" (WAN) network. The no form of this command sets the value to the default of 0.

Parameter <TIME>

Description
Specifies the retransmit timer value in milliseconds. Range: 0 4294967295 milliseconds. Default: 0 (Use locally configured NSinterval).

Examples
On the 6400 Switch Series, interface identification differs.

switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd ra retrans-timer 400

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 nd route

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1092

ipv6 nd route <IPV6-ADDR>/<PREFIX-LEN> [no-advertise | lifetime {<SECONDS> | infinite} | preference {low | medium | high}] no ipv6 nd route <IPV6-ADDR>/<PREFIX-LEN> [no-advertise | lifetime {<SECONDS> | infinite} | preference {low | medium | high}]
Description
Configures the routing switch to include the routing information in the RAs transmitted on the interface. The routing switch includes the route information in the RA packets only if the configured routes are present in the routing table. After receiving the RA packets carrying the route information, the IPv6 host updates its routing table. The hosts lookup their routing table and selects the best possible route to forward packets.
The no form of this command removes the settings for including the routing information in the RA packets.

Parameter <IPV6-ADDR>/<PREFIX-LEN> no-advertise lifetime {<SECONDS> | infinite}
preference {low | medium | high}

Description
Specifies the IPv6 route prefix to advertise in RA. Format: X:X::X:X/M
Specifies to not advertise the route information.
Specifies the duration in seconds that the route is valid for the route determination. If this parameter is configured with 0, the route becomes invalid. Default: 1800. Range: 0-4294967295.
Specifies the preference for the hosts to choose the router associated with the route over other routers when multiple identical route prefixes from different routers are received. Default: medium

Examples
On the 6400 Switch Series, interface identification differs. Configuring routing information on interface 1/1/1.

switch(config)# int 1/1/1 switch(config-if)# ipv6 nd route 1::1/64 lifetime 200 preference high

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10
Command Information

Modification Command introduced

IPv6 RA commands | 1093

Platforms All platforms

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

ipv6 nd router-preference
ipv6 nd router-preference {high | medium | low} no ipv6 nd router-preference [high | medium | low]
Description
Specifies the value that is set in the Default Router Preference (DRP) field of Router Advertisements (RAs) that the switch sends from an interface. An interface with a DRP value of high will be preferred by other devices on the network over interfaces with an RA value of medium or low. The no form of this command set the value to the default of medium.

Parameter high medium low

Description Sets DRP to high. Sets DRP to medium. Default. Sets DRP to low.

Examples
On the 6400 Switch Series, interface identification differs.

switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd router-preference high

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 nd suppress-ra
ipv6 nd suppress-ra [<SUPPRESS-OPTION>]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1094

no ipv6 nd ra supress-ra [<SUPPRESS-OPTION>]
Description
Configures suppression of IPv6 Router Advertisement transmissions on an interface. The no form of this command restores transmission of IPv6 Router Advertisement and options.

Parameter suppress-ra [<SUPPRESS-OPTION>]
dnssl mtu rdnss

Description
Specifies suppressing RA transmissions. Entering suppress-ra without any options, suppresses all RA messages (default). Or you can enter one of the following options.
Specifies suppressing DNSSL options in RA messages.
Specifies suppressing MTU options in RA messages.
Specifies suppressing RDNSS options in RA messages.

Examples
On the 6400 Switch Series, interface identification differs.

switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd suppress-ra mtu dnssl rdnss switch(config-if)# no ipv6 nd suppress-ra mtu dnssl rdnss

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

show ipv6 nd global traffic
show ipv6 nd global traffic [vsx-peer]
Description
Displays IPV6 Neighbor Discovery traffic details on a device.

IPv6 RA commands | 1095

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

switch# show ipv6 nd global traffic

ICMPv6 packet Statistics (sent/received)

Total Messages

:

18/0

Error Messages

:

0/0

Destination Unreachables

:

0/0

Time Exceeded

:

0/0

Parameter Problems

:

0/0

Echo Request

:

0/0

Echo Replies

:

0/0

Redirects

:

0/0

Packet Too Big

:

0/0

Router Advertisements

:

4/0

Router Solicitations

:

0/0

Neighbor Advertisements

:

0/0

Neighbor Solicitations

:

3/0

Duplicate router RA received :

0/0

ICMPv6 MLD Statistics (sent/received)

V1 Queries :

0/0

V2 Queries :

0/0

V1 Reports :

0/0

V2 Reports :

11/0

V1 Leaves :

0/0

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 nd interface
show ipv6 nd interface [<IF-NAME> | all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1096

Displays neighbor discovery information for an interface. If no options are specified, displays information for the default VRF.

Parameter <IF-NAME> all-vrfs vrf <VRF-NAME>
vsx-peer

Description
Displays information about the specified IPv6 enabled interface.
Displays information about interfaces in all VRFs.
Displays information about interfaces in a particular VRF. Or, if <VRF-NAME> is not specified, information for the default VRF is displayed.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs.
Showing information for all VRFs:
switch# show ipv6 nd interface all-vrfs
List of IPv6 Interfaces for VRF default Interface 1/1/1 is up
Admin state is up IPv6 address: IPv6 link-local address: fe80::7272:cfff:fee7:a8b9/64 [VALID] ICMPv6 active timers:
Last Router-Advertisement sent: Next Router-Advertisement sent in: Router-Advertisement parameters: Periodic interval: 200 to 600 secs Router Preference: medium Send "Managed Address Configuration" flag: false Send "Other Stateful Configuration" flag: false Send "Current Hop Limit" field: 64 Send "MTU" option value: 1500 Send "Router Lifetime" field: 1800 Send "Reachable Time" field: 0 Send "Retrans Timer" field: 0 Suppress RA: true Suppress MTU in RA: true ICMPv6 error message parameters: Send redirects: false ICMPv6 DAD parameters: Current DAD attempt: 1

List of IPv6 Interfaces for VRF red Interface 1/1/2 is up
Admin state is up IPv6 address:
2001::1/64 [VALID] IPv6 link-local address: fe80::7272:cfff:fee7:a8b9/64 [VALID] ICMPv6 active timers:
Last Router-Advertisement sent: Next Router-Advertisement sent in:

IPv6 RA commands | 1097

Router-Advertisement parameters: Periodic interval: 200 to 600 secs Router Preference: medium Send "Managed Address Configuration" flag: false Send "Other Stateful Configuration" flag: false Send "Current Hop Limit" field: 64 Send "MTU" option value: 1500 Send "Router Lifetime" field: 1800 Send "Reachable Time" field: 0 Send "Retrans Timer" field: 0 Suppress RA: true Suppress MTU in RA: true
ICMPv6 error message parameters: Send redirects: false
ICMPv6 DAD parameters: Current DAD attempt: 1
switch# show ipv6 nd interface all-vrfs
List of IPv6 Interfaces for VRF default Interface vlan2 is up
Admin state is up IPv6 address: IPv6 link-local address: fe80::7272:cfff:fee7:a8b9/64 [VALID] ICMPv6 active timers:
Last Router-Advertisement sent: Next Router-Advertisement sent in: Router-Advertisement parameters: Periodic interval: 200 to 600 secs Router Preference: medium Send "Managed Address Configuration" flag: false Send "Other Stateful Configuration" flag: false Send "Current Hop Limit" field: 64 Send "MTU" option value: 1500 Send "Router Lifetime" field: 1800 Send "Reachable Time" field: 0 Send "Retrans Timer" field: 0 Suppress RA: true Suppress MTU in RA: true ICMPv6 error message parameters: Send redirects: false ICMPv6 DAD parameters: Current DAD attempt: 1
List of IPv6 Interfaces for VRF red Interface vlan3 is up
Admin state is up IPv6 address:
2001::1/64 [VALID] IPv6 link-local address: fe80::7272:cfff:fee7:a8b9/64 [VALID] ICMPv6 active timers:
Last Router-Advertisement sent: Next Router-Advertisement sent in: Router-Advertisement parameters: Periodic interval: 200 to 600 secs Router Preference: medium Send "Managed Address Configuration" flag: false Send "Other Stateful Configuration" flag: false Send "Current Hop Limit" field: 64 Send "MTU" option value: 1500
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1098

Send "Router Lifetime" field: 1800 Send "Reachable Time" field: 0 Send "Retrans Timer" field: 0 Suppress RA: true Suppress MTU in RA: true ICMPv6 error message parameters: Send redirects: false ICMPv6 DAD parameters: Current DAD attempt: 1
Showing information for interface 1/1/1:
switch# show ipv6 nd interface 1/1/1 Interface 1/1/1 is up
Admin state is up IPv6 address: IPv6 link-local address: fe80::7272:cfff:fee7:a8b9/64 [VALID] ICMPv6 active timers:
Last Router-Advertisement sent: Next Router-Advertisement sent in: Router-Advertisement parameters: Periodic interval: 200 to 600 secs Router Preference: high Send "Managed Address Configuration" flag: false Send "Other Stateful Configuration" flag: false Send "Current Hop Limit" field: 64 Send "MTU" option value: 1500 Send "Router Lifetime" field: 1800 Send "Reachable Time" field: 0 Send "Retrans Timer" field: 0 Suppress RA: true Suppress MTU in RA: true ICMPv6 error message parameters: Send redirects: false ICMPv6 DAD parameters: Current DAD attempt: 1
switch# show ipv6 nd interface vlan 2 Interface vlan2 is up
Admin state is up IPv6 address: IPv6 link-local address: fe80::7272:cfff:fee7:a8b9/64 [VALID] ICMPv6 active timers:
Last Router-Advertisement sent: Next Router-Advertisement sent in: Router-Advertisement parameters: Periodic interval: 200 to 600 secs Router Preference: high Send "Managed Address Configuration" flag: false Send "Other Stateful Configuration" flag: false Send "Current Hop Limit" field: 64 Send "MTU" option value: 1500 Send "Router Lifetime" field: 1800 Send "Reachable Time" field: 0 Send "Retrans Timer" field: 0 Suppress RA: true Suppress MTU in RA: true ICMPv6 error message parameters: Send redirects: false
IPv6 RA commands | 1099

ICMPv6 DAD parameters: Current DAD attempt: 1
Showing information for the default VRF:
switch# show ipv6 nd interface
List of IPv6 Interfaces for VRF default Interface 1/1/1 is up
Admin state is up IPv6 address:
2001::1/64 [VALID] IPv6 link-local address: fe80::7272:cfff:fee7:a8b9/64 [VALID] ICMPv6 active timers:
Last Router-Advertisement sent: 6 Secs Next Router-Advertisement sent in: 7 Secs Router-Advertisement parameters: Periodic interval: 3 to 13 secs Router Preference: medium Send "Managed Address Configuration" flag: false Send "Other Stateful Configuration" flag: false Send "Current Hop Limit" field: 64 Send "MTU" option value: 1500 Send "Router Lifetime" field: 1900 Send "Reachable Time" field: 0 Send "Retrans Timer" field: 0 Suppress RA: true Suppress MTU in RA: true ICMPv6 error message parameters: Send redirects: false ICMPv6 DAD parameters: Current DAD attempt: 1
switch# show ipv6 nd interface
List of IPv6 Interfaces for VRF default Interface vlan2 is up
Admin state is up IPv6 address:
2001::1/64 [VALID] IPv6 link-local address: fe80::7272:cfff:fee7:a8b9/64 [VALID] ICMPv6 active timers:
Last Router-Advertisement sent: 6 Secs Next Router-Advertisement sent in: 7 Secs Router-Advertisement parameters: Periodic interval: 3 to 13 secs Router Preference: medium Send "Managed Address Configuration" flag: false Send "Other Stateful Configuration" flag: false Send "Current Hop Limit" field: 64 Send "MTU" option value: 1500 Send "Router Lifetime" field: 1900 Send "Reachable Time" field: 0 Send "Retrans Timer" field: 0 Suppress RA: true Suppress MTU in RA: true ICMPv6 error message parameters: Send redirects: false ICMPv6 DAD parameters:
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1100

Current DAD attempt: 1

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 nd interface prefix
show ipv6 nd interface prefix [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows IPv6 prefix information for all VRFs or a specific VRF. If no options are specified, shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows prefix information for all VRFs.
Name of a VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing prefix information for the default VRF:

switch# show ipv6 nd interface prefix
List of IPv6 Interfaces for VRF default List of IPv6 Prefix advertised on 1/1/1
Prefix : 4545::/65 Enabled : Yes Validlife time : 2592000 Preferred lifetime : 604800

IPv6 RA commands | 1101

On-link : Yes Autonomous : Yes
switch# show ipv6 nd interface prefix
List of IPv6 Interfaces for VRF default List of IPv6 Prefix advertised on vlan2
Prefix : 4545::/65 Enabled : Yes Validlife time : 2592000 Preferred lifetime : 604800 On-link : Yes Autonomous : Yes
Showing information for VRF red:
switch# show ipv6 nd interface prefix vrf red
List of IPv6 Interfaces for VRF red List of IPv6 Prefix advertised on 1/1/2
Prefix : 2001::/64 Enabled : Yes Validlife time : 2592000 Preferred lifetime : 604800 On-link : Yes Autonomous : Yes
switch# show ipv6 nd interface prefix vrf red
List of IPv6 Interfaces for VRF red List of IPv6 Prefix advertised on vlan3
Prefix : 2001::/64 Enabled : Yes Validlife time : 2592000 Preferred lifetime : 604800 On-link : Yes Autonomous : Yes

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1102

show ipv6 nd interface route
show ipv6 nd interface route [all-vrfs | vrf <VRF-NAME>]
Description
Displays route information of all interfaces in the default VRF.

Parameter all-vrfs vrf <VRF-NAME>

Description
Displays information about interfaces in all VRFs.
Displays information about interfaces in a particular VRF. Or, if <VRF-NAME> is not specified, displays information for the default VRF.

Examples
On the 6400 Switch Series, interface identification differs. Showing routing information for interface 1/1/1 in the default VRF:

switch# show ipv6 nd interface route
List of IPv6 Interfaces for VRF default List of IPv6 Routes advertised on 1/1/1
Route : 1::/64 Enabled : Yes Route lifetime : 200 Route preference : high

Showing routing information for interface 1/1/1 in VRF red:

switch# show ipv6 nd interface route vrf red
List of IPv6 Interfaces for VRF red List of IPv6 Routes advertised on 1/1/2
Route : 2::/64 Enabled : No Route lifetime : 1800 Route preference : low

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10
Command Information

Modification Command introduced

IPv6 RA commands | 1103

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 nd ra dns search-list
show ipv6 nd ra dns search-list [vsx-peer]
Description
Displays domain name information on all interfaces.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs.

switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd ra dns search-list test.com switch# show ipv6 nd ra dns search-list Recursive DNS Search List on: 1
Suppress DNS Search List: Yes DNS Search 1: test.com lifetime 1800

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 nd ra dns server
show ipv6 nd ra dns server [vsx-peer]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1104

Description
Displays DNS server information on all interfaces.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs.

switch(config)# interface 1/1/1 switch(config-if)# ipv6 nd ra dns server 2001::1 switch# show ipv6 nd ra dns server Recursive DNS Server List on: 1
Suppress DNS Server List: Yes DNS Server 1: 2001::1 lifetime 1800

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

IPv6 RA commands | 1105

Chapter 60 IPv6 source lockdown commands

IPv6 source lockdown commands

ipv6 source-binding
ipv6 source-binding <VLAN-ID> <IPV6-ADDR> <MAC-ADDR> <IFNAME> no ipv6 source-binding <VLAN-ID> <IPV6-ADDR> <MAC-ADDR> <IFNAME>
Description
Adds static IPv6 client source binding information to the switch IPv6 binding database. Although DHCPv6 snooping is often used to dynamically populate the binding database, this command is available for manually adding entries to the switch IPv6 binding database.

Statically configured IPv6 binding information supersedes any dynamically collected binding information for the same client.
The no form of this command removes the specified binding that was statically configured with the ipv6 source-binding command. The no form has no effect on bindings that were dynamically configured with DHCPv6 snooping.

Parameter <VLAN-ID>
<IPV6-ADDR> <MAC-ADDR> <IFNAME>

Description Specifies the ID of an existing VLAN on which the client is connected. Range: 1 to 4094. Specifies the client IPv6 address. Specifies the client MAC address. Specifies the interface on which the client is connected.

Examples
On the 6400 Switch Series, interface identification differs. Adding a static IPv6 binding:

switch(config)# ipv6 source-binding 2 2000::2 00:12:11:44:55:12 1/1/28

Removing a IPv6 binding:

switch(config)# no ipv6 source-binding 2 2000::2 00:12:11:44:55:12 1/1/28

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

AOS-CX 10.14 Command-Line Interface Guide

1106

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 source-lockdown
ipv6 source-lockdown no ipv6 source-lockdown
Description
Enables IPv6 source lockdown for all VLANs on the selected interface (port). The no form of this command disables IPv6 source lockdown for the selected interface (port).
This configuration will disable flow tracking statistics collection.

Examples
On the 6400 Switch Series, interface identification differs. Enabling IPv6 source lockdown on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# ipv6 source-lockdown
Enabling IPv6 source lockdown on interface lag112:
switch(config)# interface lag112 switch(config-if)# ipv6 source-lockdown
Disabling IPv6 source lockdown on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no ipv6 source-lockdown
For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

IPv6 source lockdown commands | 1107

Release 10.14 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification Added information related to role based IPFIX. --
Authority Administrators or local user group members with execution rights for this command.

ipv6 source-lockdown hardware retry
ipv6 source-lockdown hardware retry <VLAN-ID> <IPV6-ADDR>
Description
Retries the IPV6 source lockdown hardware programming for a client identified by VLAN and IPv6 address.

Parameter <VLAN-ID>
<IPV6-ADDR>

Description
Specifies the ID of an existing VLAN on which the client is connected. Range: 1 to 4094.
Specifies the client IPv6 address.

Example
Configure IPv6 source lockdown hardware retry for the client on VLAN 1.

switch(config)# ipv6 source-lockdown hardware retry 1 2000::2

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1108

show ipv6 source-binding
show ipv6 source-binding [vsx-peer]
Description
Shows all IPv6 static source binding information irrespective of source lockdown configuration.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing all IPv6 source binding information:

switch# show ipv6 source-binding

PORT

VLAN

MAC-ADDRESS

HW-STATUS FROM

IPv6-ADDRESS

-------------- --------- ----------------- --------- -------- -------------

1/1/1

1234

00:50:56:96:e4:cf Yes/No

static 3000::1

1/1/1

1

1/1/24

1

00:50:56:96:04:4d Yes/No 00:01:01:00:00:01 Yes

static static

3000::2 1001::1

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 source-lockdown
show ipv6 source-lockdown [binding [interface <IFNAME> | ip <IPV6-ADDR> | mac <MAC-ADDR> | vlan <VLAN-ID>] | interface <IFNAME>] [vsx-peer]
Description

IPv6 source lockdown commands | 1109

Shows summary or detailed IPv6 source lockdown information. When entered without parameters, summary status information for all interfaces (ports) in the binding database is shown.

Parameter binding
interface <IFNAME>
ip <IPV6-ADDR> mac <MAC-ADDR> vlan <VLAN-ID> vsx-peer

Description
Specifies that detailed lockdown binding record information is to be displayed. The binding database record can be identified by any one of interface (port), ip, mac, or vlan.
Specifies the client interface (port). When entered without the binding parameter, the summary status information is displayed for the specified interface.
Specifies the client IPv6 address.
Specifies the client MAC address.
Specifies the ID of an existing VLAN on which the client is connected. Range: 1 to 4094.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing the summary status information for all interfaces in the binding database:

switch# show ipv6 source-lockdown

INTERFACE --------1/1/1 1/1/2 lag112

LOCKDOWN -------Yes Yes Yes

HW-STATUS --------Yes Yes Yes

Showing the summary status information for the specified interface in the binding database:

switch# show ipv6 source-lockdown interface 1/1/2

INTERFACE LOCKDOWN HW-STATUS

--------- -------- ---------

1/1/2

Yes

No

Showing the detailed binding record and related information for all interfaces in the binding database:

switch# show ipv6 source-lockdown binding

Interface Name VLAN Id MAC Address IP Address Time Remaining Lockdown Status

: 1/1/1 : 1234 : 00:50:56:96:e4:cf : aaaa:bbbb:cccc:dddd:eeee:1234 : static : Yes

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1110

Hardware Status

: Yes

Hardware Error Reason : --

Interface Name

: 1/1/2

VLAN Id

: 1234

MAC Address

: 00:50:56:96:04:4d

IP Address

: 4000::1

Time Remaining

: 3290 seconds

Lockdown Status

: Yes

Hardware Status

: No

Hardware Error Reason : Resource unavailable

Interface Name

: lag112

VLAN Id

: 151

MAC Address

: 00:50:56:96:d8:3d

IP Address

: 1001::5

Time Remaining

: 1200 seconds

Lockdown Status

: No

Hardware Status

: Yes

Hardware Error Reason : --

Interface Name

: 1/1/1

VLAN Id

: 1234

MAC Address

: 00:50:56:96:e4:cf

IP Address

: aaaa:bbbb:cccc:dddd:eeee:1234

Time Remaining

: static

Lockdown Status

: Yes

Hardware Status

: Yes

Hardware Error Reason : --

Interface Name

: 1/1/2

VLAN Id

: 1234

MAC Address

: 00:50:56:96:04:4d

IP Address

: 4000::1

Time Remaining

: 3290 seconds

Lockdown Status

: Yes

Hardware Status

: No

Hardware Error Reason : Resource unavailable

Interface Name

: lag112

VLAN Id

: 151

MAC Address

: 00:50:56:96:d8:3d

IP Address

: 1001::5

Time Remaining

: 1200 seconds

Lockdown Status

: No

Hardware Status

: Yes

Hardware Error Reason : --

Showing the detailed binding record and related information for interface 1/1/2:

switch# show ipv6 source-lockdown binding interface 1/1/2

Interface Name

: 1/1/2

VLAN Id

: 1234

MAC Address

: 00:50:56:96:04:4d

IP Address

: 4000::1

Time Remaining

: 3290 seconds

Lockdown Status

: Yes

Hardware Status

: No

Hardware Error Reason : Resource unavailable

IPv6 source lockdown commands | 1111

Interface Name

: 1/1/2

VLAN Id

: 1234

MAC Address

: 00:50:56:96:04:4d

IP Address

: 4000::1

Time Remaining

: 3290 seconds

Lockdown Status

: Yes

Hardware Status

: No

Hardware Error Reason : Resource unavailable

Showing the detailed binding record and related information for interface 1/1/2 (identified in this example command by the IP address):

switch# show ipv6 source-lockdown binding ip 4000::1

Interface Name

: 1/1/2

VLAN Id

: 1234

MAC Address

: 00:50:56:96:04:4d

IP Address

: 4000::1

Time Remaining

: 515 seconds

Lockdown Status

: No

Hardware Status

: Yes

Hardware Error Reason : --

Showing the detailed binding record and related information for interface 1/1/1 (identified in this example command by the MAC address):

switch# show ipv6 source-lockdown binding mac 00:50:56:96:e4:cf

Interface Name

: 1/1/1

VLAN Id

: 1234

MAC Address

: 00:50:56:96:e4:cf

IP Address

: aaaa:bbbb:cccc:dddd:eeee:1234

Time Remaining

: static

Lockdown Status

: Yes

Hardware Status

: Yes

Hardware Error Reason : --

Showing the detailed binding record and related information for interface lag112 (identified in this example command by the VLAN):

switch# show ipv6 source-lockdown binding vlan 151

Interface Name

: lag112

VLAN Id

: 151

MAC Address

: 00:50:56:96:d8:3d

IP Address

: 1001::5

Time Remaining

: 1200 seconds

Lockdown Status

: No

Hardware Status

: Yes

Hardware Error Reason : --

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1112

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

IPv6 source lockdown commands | 1113

Chapter 61 IRDP commands

IRDP commands
diag-dump irdp basic
diag-dump irdp basic
Description
Displays diagnostic information for IRDP.
Example
On the 6400 Switch Series, interface identification differs.
switch# diag-dump irdp basic ========================================================================= [Start] Feature irdp Time : Thu Jun 8 09:50:28 2017
========================================================================= ------------------------------------------------------------------------[Start] Daemon hpe-rdiscd ------------------------------------------------------------------------Interface: 1/1/1 (state : Up) rdisc ipv4 (enabled: 0, max:600, min:450, hold:1800, pref:0, isBcast:0) Router IPs - 192.168.1.2, Interface: 1/1/2 (state : Up) rdisc ipv4 (enabled: 0, max:600, min:450, hold:1800, pref:0, isBcast:0) Router IPs - 192.168.2.2,
------------------------------------------------------------------------[End] Daemon hpe-rdiscd ------------------------------------------------------------------------========================================================================= [End] Feature irdp ========================================================================= Diagnostic dump captured for feature irdp
switch# diag-dump irdp basic ========================================================================= [Start] Feature irdp Time : Thu Jan 7 04:46:25 2021 ========================================================================= ------------------------------------------------------------------------[Start] Daemon hpe-rdiscd ------------------------------------------------------------------------Interface: vlan2 (state : Down) rdisc ipv4 (enabled: 1, max:600, min:450, hold:1800, pref:0, isBcast:0) No advertisable IPv4 addresses on the interface Interface: vlan1 (state : Down) rdisc ipv4 (enabled: 0, max:600, min:450, hold:1800, pref:0, isBcast:0) No advertisable IPv4 addresses on the interface
-------------------------------------------------------------------------
AOS-CX 10.14 Command-Line Interface Guide

1114

[End] Daemon hpe-rdiscd ------------------------------------------------------------------------========================================================================= [End] Feature irdp ========================================================================= Diagnostic-dump captured for feature irdp

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ip irdp
ip irdp [broadcast | multicast] no ip irdp
Description
Enables IRDP on an interface and specifies the packet type that is used to send advertisements. By default, the packet type is set to multicast. IRDP is only supported on layer 3 interfaces. The no form of this command disables IRDP on an interface.

Parameter broadcast
multicast

Description
Advertisements are sent as broadcast packets to IP address 255.255.255.255.
Advertisements are sent as multicast packets to the multicast group with IP address 24.0.0.1. Default.

Examples
On the 6400 Switch Series, interface identification differs. Enabling IRDP on interface 1/1/1 with packet type set to the default value (multicast).

switch(config)# interface 1/1/1 switch(config-if)# ip irdp

Enabling IRDP on interface 1/1/1 with packet type set to broadcast.

IRDP commands | 1115

switch(config)# interface 1/1/1 switch(config-if)# ip irdp broadcast
Disabling IRDP.
switch(config)# interface 1/1/1 switch(config-if)# no ip irdp

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip irdp holdtime
ip irdp holdtime <TIME> no ip irdp holdtime <TIME>
Description
Specifies the maximum amount of time the host will consider an advertisement to be valid until a newer advertisement arrives. When a new advertisement arrives, hold time is reset. Hold time must be greater than or equal to the maximum advertisement interval. Therefore, if the hold time for an advertisement expires, the host can reasonably conclude that the router interface that sent the advertisement is no longer available. The default hold time is three times the maximum advertisement interval. The no form of this command removes the specified maximum amount of time the host will consider an advertisement to be valid until a newer advertisement arrives and update it to the default value.

Parameter <TIME>

Description
Specifies the lifetime of router advertisements sent from this interface. Range: 4 to 9000 seconds. Default: 1800 seconds.

Example
On the 6400 Switch Series, interface identification differs. Setting the hold time for interface 1/1/1 to 5000 seconds:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1116

switch(config)# interface 1/1/1 switch(config-if)# ip irdp holdtime 5000
Removing the the hold time for interface 1/1/1 to 5000 seconds:
switch(config)# interface 1/1/1 switch(config-if)# no ip irdp holdtime 5000

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip irdp maxadvertinterval
ip irdp maxadvertinterval <TIME> no ip irdp maxadvertinterval <TIME>
Description
Specifies the maximum router advertisement interval. The no form of this command removes the specified maximum router advertisement interval and reverts to the default value.

Parameter <TIME>

Description
Specifies the maximum time allowed between the sending of unsolicited router advertisements. Range: 4 to 1800 seconds. Default: 600 seconds.

Example
On the 6400 Switch Series, interface identification differs. Setting the advertisement interval for interface 1/1/1 to 30 seconds:

switch(config)# interface 1/1/1 switch(config-if)# ip irdp maxadvertinterval 30

Removing the advertisement interval for interface 1/1/1 to 30 seconds:

IRDP commands | 1117

switch(config)# interface 1/1/1 switch(config-if)# no ip irdp maxadvertinterval 30

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip irdp minadvertinterval
ip irdp minadvertinterval <TIME> no ip irdp minadvertinterval <TIME>
Description
Specifies the minimum amount of time the switch waits between sending router advertisements. By default, this value is automatically set by the switch to be 75% of the value configured for maximum router advertisement interval. Use this command to override the automatically configured value. The no form of this command removes the specified minimum amount of time the switch waits between sending router advertisements and reverts to the default value.

Parameter <TIME>

Description
Specifies the minimum time allowed between the sending of unsolicited router advertisements. Range: 3 to 1800 seconds. Default: 450 seconds (75% of the default value for maximum router advertisement interval).

Example
On the 6400 Switch Series, interface identification differs. Setting the minimum advertisement interval for interface 1/1/1 to 25 seconds:

switch(config)# interface 1/1/1 switch(config-if)# ip irdp minadvertinterval 25

Removing the minimum advertisement interval for interface 1/1/1 to 25 seconds:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1118

switch(config)# interface 1/1/1 switch(config-if)# no ip irdp minadvertinterval 25

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip irdp preference
ip irdp preference <LEVEL> no ip irdp preference <LEVEL>
Description
Specifies the IRDP preference level. If a host receives multiple router advertisement messages from different routers, the host selects the router that sent the message with the highest preference as the default gateway. The no form of this command removes the specified IRDP preference level and reverts to the default value.

Parameter <LEVEL>

Description
Specifies the IRDP preference level. Range: -2147483648 to 2147483647. Default: 0.

Example
On the 6400 Switch Series, interface identification differs. Setting the IRDP preference level for interface 1/1/1 to 25.

switch(config)# interface 1/1/1 switch(config-if)# ip irdp preference 25

Removing the IRDP preference level for interface 1/1/1 to 25.

switch(config)# interface 1/1/1 switch(config-if)# no ip irdp preference 25

IRDP commands | 1119

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

show ip irdp
show ip irdp [vsx-peer]
Description
Displays IRDP configuration settings.
Parameter <location>

Description
Specifies one of these values: n <FQDN>: a fully qualified domain name. n <IPV4>: an IPv4 address. n <IPV6>: an IPv6 address.

vsx-peer Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.
Example
On the 6400 Switch Series, interface identification differs.

switch# show ip irdp

ICMP Router Discovery Protocol

Interface Status Advertising Minimum Maximum Holdtime Preference

Address

Interval Interval

--------- -------- ----------- -------- -------- -------- -----------

1/1/1

Enabled multicast 6

8

10

10

1/1/2

Disabled multicast 450

600

1800

0

1/1/3

Enabled broadcast 450

600

1800

115

switch# sh ip irdp

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1120

ICMP Router Discovery Protocol

Interface

Status Advertising Minimum Maximum Holdtime Preference

Address

Interval Interval

--------------- -------- ----------- -------- -------- -------- -----------

vlan1

Disabled multicast 450

600

1800

0

bridge_normal Disabled multicast 450

600

1800

0

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

IRDP commands | 1121

Chapter 62 IVRF commands

IVRF commands

address-family
address-family [<AFI> | <SAFI>] [ip | ipv6] [unicast] [no] address-family <AFI> | <SAFI>
Description
Initializes the appropriate address-family and enters address-family configuration mode for IPv4 or IPv6. The unicast option is available to configure the subaddress family identifier. The no form of the command removes the association of the specified address-family. The addressfamily specific routes that are leaked from this VRF will be withdrawn.

Parameter AFI SAFI ip ipv6 unicast

Description Required: Specifies address family identifier. Required: Specifies subaddress family identifier. Optional: IPv4 address family Optional: IPv6 address family The subaddress family identifier. When the unicast option is used, the command context changes to config-vrf-af-ipv4-uc.

Examples
Address family command for IPv4 unicast:

switch(config-vrf)# address-family ipv4 unicast switch(config-vrf)#no address-family ipv4 unicast

Address family command for IPv6 unicast:

switch(config-vrf)# address-family ipv6 unicast switch(config-vrf)#no address-family ipv6 unicast

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide

1122

Release 10.14 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-vrf

Modification The ipv4 keyword is deprecated and replaced with ip. --
Authority Administrators or local user group members with execution rights for this command.

ip|ipv6 vrf
[ip|ipv6] route <PREFIX> <SRC-VRF-LOCAL-IFACE><SRC-VRF-NEXTHOP-IP> vrf <DST-VRF-NAME> no [ip|ipv6] route <PREFIX> <SRC-VRF-LOCAL-IFACE><SRC-VRF-NEXTHOP-IP> vrf <DST-VRF-NAME>
Description
The IP/IPv6 route command sets the subnet mask, the reachable network interface, the next-hop IP for the reachable network, and the VRF route leak destination.

Parameter <PREFIX> <SRC-VRF-LOCAL-IFACE> <SRC-VRF-NEXTHOP-IP> <DST-VRF-NAME>

Description The subnet mask (prefix of the network). The interface which is reachable by the network. The next-hop IP for the reachable network. The VRF route leak destination.

Examples
Using the command, leak the named route Blue VRF, using prefix 100.0.0.0/24 which is reachable by the next-hop IP 20.0.0.1 on the interface 1/1/1 from VRF Red:

switch(config)# ip route 100.0.0.0/24 1/1/1 20.0.0.1 vrf blue

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

IVRF commands | 1123

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

ipv6 route source interface
ipv6 route <IPv6 ADDR/MEMBER><IPv6 ADDR> source <INTERFACE> [<DISTANCE> | <VRF INSTANCE-NAME>]
no ipv6 route
Description
Creates a route leak between the source VRF and destination VRF. Using the static method, the route must first be added to the destination VRF. The route is added to the local interface of the source VRF with a next-hop interface. The existing IPv6 route command takes the source interface only when nexthop IP is link-local. To support VRF route leaking for global IPv6 unicast addresses, the command takes next-hop interface information along with next-hop IP regardless of next-hop IP is link-local or not.
n Users must provide both the next-hop IP and the interface information to leak the global unicast IPv6 network routes (route that is not directly reachable).
n The next-hop IP information is not required to leak connected global unicast IPv6 routes (route that is directly reachable).
The no form of command deletes the static VRF leaked route.

Parameter <IPv6 ADDR/MEMBER> <IPv6 ADDR> <INTERFACE>
<DISTANCE> <VRF INSTANCE-NAME>

Description Required: IPv6 IP-Address route destination. Required: IPv6 route destination Required: The outgoing interface. Use the format member/slot/port (for example, 1/3/1). Optional: administrative distance of static route Optional: VRF instance

Options
nullroute Discard packets to the destined route silently.
reject Discard packets to the destined route and return ICMP error to the sender.
Examples
Configures a route leak between the source VRF and destination VRF:

switch(config)# show runn Current configuration: !

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1124

vrf blue vrf green
vrf red !

vlan 1

interface 1/1/1 no shutdown
vrf attach red ip address 2000::1/64
interface 1/1/2 no shutdown vrf attach green ip address 3000::1/64 interface 1/1/3 no shutdown vrf attach blue ip address 4000::1/64

switch(config)# ipv6 route 5000::0/64 3000::2 source 1/1/2 vrf red switch(config)# ipv6 route 6000::0/64 3000::3 source 1/1/2 vrf blue

switch(config)# show runn Current configuration: ! vrf blue
vrf green vrf red
!

vlan 1

interface 1/1/1 no shutdown
vrf attach red ip address 2000::1/64
interface 1/1/2 no shutdown vrf attach green ip address 3000::1/64 interface 1/1/3 no shutdown vrf attach blue ip address 4000::1/64

ipv6 route 5000::0/64 3000::2 source 1/1/2 vrf red ipv6 route 6000::0/64 3000::3 source 1/1/2 vrf blue

switch(config)# no ipv6 route 5000::0/64 3000::2 source 1/1/2 vrf red switch(config)# no ipv6 route 6000::0/64 3000::3 source 1/1/2 vrf blue

switch(config)# show runn Current configuration: !
vrf blue vrf green vrf red !

vlan 1

interface 1/1/1

IVRF commands | 1125

no shutdown vrf attach red
ip address 2000::1/64 interface 1/1/2 no shutdown
vrf attach green ip address 3000::1/64
interface 1/1/3 no shutdown vrf attach blue ip address 4000::1/64

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.10 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Inclusive language update. --
Authority Administrators or local user group members with execution rights for this command.

ip route interface
ip route <IPv4 ADDR/MEMBER> interface <IPv4 ADDR> [<DISTANCE> | <VRF INSTANCE-NAME>]
no ip route
Description
Creates a route leak between the SRC-VRF and DST-VRF. Using the static method, the route must first be added to the destination VRF. The route is added to the local interface of the source VRF with a next-hop interface. The existing IP route command can then take either the next-hop IP or the next-hop interface.
n INTERFACE refers to the outgoing interface in an m/s/p format n Users must provide both the next-hop IP and the interface information to leak network routes. n The next-hop IP information is not required to leak connected routes.
The [no] form of command deletes the static VRF leaked route.

Parameter <IPv4 ADDR/MEMBER>

Description Required: IPv4 IP-Address route destination.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1126

Parameter <IPv4 ADDR> <DISTANCE> <VRF INSTANCE-NAME>

Description Required: IPv4 route destination Optional: administrative distance of static route Optional: VRF instance

Options
nullroute Discard packets to the destined route silently.
reject Discard packets to the destined route and return ICMP error to the sender.
Example
Configures a route leak between the SRC-VRF and DST-VRF:

switch(config)# show runn Current configuration: ! vrf blue
vrf green vrf red
!
vlan 1 interface 1/1/1 no shutdown vrf attach red ip address 10.0.0.1/24 interface 1/1/2 no shutdown vrf attach green ip address 20.0.0.1/24 interface 1/1/3 no shutdown vrf attach blue ip address 40.0.0.1/24
switch(config)# ip route A.B.C.D/M IPv4 route destination switch(config)# ip route A.B.C.D/M IPv4 route destination switch(config)# ip route 30.0.0.0/24 A.B.C.D Nexthop IPv4 address switch(config)# ip route 30.0.0.0/24 1/1/2 A.B.C.D Nexthop IPv4 address switch(config)# ip route 30.0.0.0/24 20.0.0.2 vrf green switch(config)# ip route 30.0.0.0/24 1/1/2 20.0.0.2 vrf red switch(config)# ip route 50.0.0.0/24 1/1/2 20.0.0.2 vrf blue switch(config)# ip route 50.0.0.0/24 20.0.0.2 vrf green switch(config)# ip route 60.0.0.0/24 1/1/2 vrf red
switch(config)# show runn Current configuration: ! vrf blue
vrf green vrf red
!
vlan 1

IVRF commands | 1127

interface 1/1/1 no shutdown
vrf attach red ip address 10.0.0.1/24
interface 1/1/2 no shutdown vrf attach green ip address 20.0.0.1/24 interface 1/1/3 no shutdown vrf attach blue ip address 40.0.0.1/24 ip route 30.0.0.0/24 1/1/2 20.0.0.2 vrf red ip route 50.0.0.0/24 1/1/2 20.0.0.3 vrf blue ip route 60.0.0.0/24 1/1/2 vrf red
switch(config)# no ip route 30.0.0.0/24 1/1/2 20.0.0.2 vrf red switch(config)# no ip route 50.0.0.0/24 1/1/2 20.0.0.3 vrf blue switch(config)# no ip route 60.0.0.0/24 1/1/2 vrf red
switch(config)# show runn Current configuration: !
vrf blue vrf green vrf red !
vlan 1 interface 1/1/1 no shutdown vrf attach red ip address 10.0.0.1/24 interface 1/1/2 no shutdown vrf attach green ip address 20.0.0.1/24 interface 1/1/3 no shutdown vrf attach blue ip address 40.0.0.1/24

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.10 10.07 or earlier
Command Information

Modification Inclusive language update. --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1128

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

rd
rd <AS-NUMBER:NN> no rd <AS-NUMBER:NN>
Description
Configures VRF table with specified route-distinguisher value. An RD ensures uniqueness of a route between multiple VRFs. The no form of the command will delete RD from a specified VRF table. The VRF instance goes down when RD is deleted. All routes that are exported or leaked from the deleted VRF will be withdrawn.

Parameter <AS-NUMBER:NN>

Description Required: Enter an AS number and an arbitrary number.

Examples
Configures VRF for RD with an AS number 100:1.

switch(config-vrf)# rd 100:1

Deletes the RD from the specified VRF.

switch(config-vrf)# no rd

Deletes the RD and AS number from the specified VRF.

switch(config-vrf)# no rd 100:1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

IVRF commands | 1129

Platforms
6300 6400

Command context config-vrf

Authority
Administrators or local user group members with execution rights for this command.

redistribute
redistribute <protocol> [route-map <route-map-name>] [no] redistribute <protocol> [route-map <route-map-name>]
Description
Specifies the protocol routes to redistribute to BGP VRF context. Any routes existing in the BGP VRF context are leaked as a VPNv4 or VPNv6 prefixes to other VRFs based on BGP route-targets. The no form of this command removes the protocol.

Parameter redistribute connected ospfv3 static route-map

Description Required: redistributes routes from another routing protocol. Optional: redistribute directly attached networks. Optional: redistributes OSPFv3 routes. Optional: redistributes static routes. Optional: applies route map policy for redistribution.

Examples
The following is an example of redistributing OSPFv2 routes to a BGP vrf cust_a instance by creating a router BGP instance for cust_a.
1. Creating the router BGP instance for cust_a.

switch(config)# router bgp 1 switch(config-router) # vrf cust_a

2. Redistributing the router to BGP. switch(config-router-bgp)# redistribute ospf

The following is an example of redistributing OSPFv3 routes to a BGP vrf cust_a instance by creating a router BGP instance for cust_a.
1. Creating the router BGP instance for cust_a
switch(config)# router bgp 100 switch(config-router)# vrf cust_a

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1130

2. Configuring the address family IPv6 unicast to the router switch(config-router-bgp)# address-family ipv6 unicast
3. Redistributing the router to OSPFv3 switch(config-router-ipv6-uc)# redistribute ospfv3
4. Redistributing the router configured with ipv6-af-us to OSPFv3 switch(config-router-bgp-vrf-ipv6-af-uc)# redistribute ospfv3

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

route-target
route-target [import | export | both] <AS-NUMBER:NN> no route-target [import | export | both] <AS-NUMBER:NN>
Description
BGP route targets are extended BGP communities that identify the VPNv4 or VPNv6 routes that are associated with a VRF. This command specifies the route targets used on the import or export of the routes to other VRFs. Multiple route targets can be associated with a VRF. The no form of the command removes the association.

Parameter import
export

Description
Specifies the RTs imported to the VRF. Import or export or both required Literal Specifies the route-target type.
Specifies the RT on VPNv4 or VPNv6 prefixes that are leaked to other VRFs.

IVRF commands | 1131

Parameter both <AS-NUMBER:NN>

Description Specifies the RT for both export and import types. Specifies an AS number and an arbitrary number for the RT value.

Examples
Configuring route targets for several VRFs.

switch(config)# vrf default switch(config-vrf)# rd 192.168.2.1:0 switch(config-vrf)# address-family ipv4 unicast switch(config-vrf-ipv4-af-uc)# route-target export 65001:0 switch(config-vrf-ipv4-af-uc)# route-target import 65001:1 switch(config-vrf-ipv4-af-uc)# route-target import 65001:2 switch(config-vrf-ipv4-af-uc)# exit-address-family switch(config-vrf)# exit switch(config)# vrf VRF1 switch(config-vrf)# rd 192.168.2.1:1 switch(config-vrf)# address-family ipv4 unicast switch(config-vrf-ipv4-af-uc)# route-target export 65001:1 switch(config-vrf-ipv4-af-uc)# route-target import 65001:0 switch(config-vrf-ipv4-af-uc)# exit-address-family switch(config-vrf)# exit switch(config)# vrf VRF2 switch(config-vrf)# rd 192.168.2.1:2 switch(config-vrf)# address-family ipv4 unicast switch(config-vrf-ipv4-af-uc)# route-target export 65001:2 switch(config-vrf-ipv4-af-uc)# route-target import 65001:0 switch(config-vrf-ipv4-af-uc)# exit-address-family switch(config-vrf)# exit

Configuring the route target for export. Removing the configuration for export.

switch(config-vrf-ipv4-af-uc)# route-target export 100:1 switch(config-vrf-ipv4-af-uc)# no route-target export 100:1

Configuring the route target for import. Removing the configuration for import.

switch(config-vrf-ipv4-af-uc)# route-target import 100:2 switch(config-vrf-ipv4-af-uc)# no route-target import 100:2

Configuring the route target for both import and export. Removing the configuration for import and export.

switch(config-vrf-ipv4-af-uc)# route-target both 100:3 switch(config-vrf-ipv4-af-uc)# no route-target both 100:3

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1132

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

route-target export
route-target export route-map <ROUTE-MAP-NAME> no route-target export route-map <ROUTE-MAP-NAME>
Description
This command specifies the route-map to be used while exporting routes to VRF. Route target export route-map is configured to filter the routes those are leaked to VRF. The no form of the command removes the specification.

Parameter route-map <ROUTE-MAP-NAME>

Description Specifies route-map policy for export. Specifies route-map policy name

VPNv4 SAFI is not supported.
Examples
Configuring route-map for route target export in IPv4:
switch(config)# vrf cust_a switch(config-vrf)# address-family ipv4 unicast switch(config-vrf-ipv4-af-uc)# route-target export route-map rmap
Removing the configuration for export in IPv4:
switch(config)# vrf cust_a switch(config-vrf)# address-family ipv4 unicast switch(config-vrf-ipv4-af-uc)# no route-target export route-map rmap
Configuring route-map for route target export in IPv6:
switch(config)# vrf cust_a switch(config-vrf)# address-family ipv6 unicast switch(config-vrf-ipv6-af-uc)# route-target export route-map rmap

IVRF commands | 1133

Removing the configuration for export in IPv6:
switch(config)# vrf cust_a switch(config-vrf)# address-family ipv6 unicast switch(config-vrf-ipv6-af-uc)# no route-target export route-map rmap
Match prefix-list and set metric is only supported for route-target export route-map:
route-map rmap permit seq 1 match ip address prefix-list prefx set metric 400
ip prefix-list seq 1 permit 14.1.1.0/24

Applies to both IPv4 and IPv6 address family only. Only one route-target export route-map per VRF can be configured.

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.12.1000

Command Information

Platforms
6300 6400

Command context config-vrf

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

router bgp
router bgp <AS-NUMBER> no router bgp <AS-NUMBER>
Description
This command configures the BGP instance on the router, configures the AS (Autonomous System) the router belongs to, and enters into the BGP router configuration mode. Only a single BGP AS number can be assigned for the entire system. The no form of the command deletes the BGP instance from the router.

Parameter AS-NUMBER

Description
Specifies a 4-byte AS number in the range 1-4294967295 in integer format or from 0.1-65535.65535 in dotted format.

Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1134

Configuring the BGP instance with the AS number:

Deleting BGP configurations:
switch(config)# no router bgp 100 This will delete all BGP configurations on this device. Continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

router bgp vrf
router bgp <AS-NUMBER> [vrf <VRF-NAME>] [no] router bgp <AS-NUMBER> [vrf <VRF-NAME>]
Description
This command configures VRF for the BGP instance. The no form of this command removes the configuration.

Parameter AS-NUMBER
<VRF-NAME>

Description
Specifies a 4-byte AS number in the range 1-4294967295 in integer format or from 0.1-65535.65535 in dotted format.
String VRF name for the VRF.

Usage
n Use the command vrf vrf-name within the router BGP context. n address-family {ipv4 | ipv6} nodes are only supported within the VRF context. n address-family {ipv4 | ipv6} nodes are required to redistribute the OSPF static/connected IPv4 or
IPv6 routes.
Examples

IVRF commands | 1135

Configure the VRF for customer A, on the BGP instance 100:
switch(config)# router bgp 100 switch(config)# vrf cust_a

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show bgp vpn unicast
show bgp [vrf <VRF-NAME>][{ipv4 unicast | ipv6 unicast| ipv4 unicast| all unicast}] [vsxpeer]
Description
Shows the BGP-VPN per VRF routes with additional route information like RD and extended community route targets. Displays the BGP neighbor information for the specified VRF.
By default the default_vrf BGP instance information is displayed if the VRF is not specified.

Parameter unicast all vrf vpn-addr-family vrf-name vsx-peer
Examples

Description
Selects the subaddress family identifier
Displays VPNv4 address family routes for all VRFs
Displays VPNv4 address-family routes for specified VRF
Required: Literal Select the VPNv4 or VPNv6 address family
Required: Literal or string. Specify all or vrf-name.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1136

Required use of vpn-addr-family:

switch# show bgp <vpn-addr-family> unicast {all | [vrf <vrf-name> | A.B.C.D/M}

Show BGP VRF ipv4 unicast routes for vrf-name

switch# show bgp vrf Red ipv4 unicast Status codes: s suppressed, d damped, h history, * valid, > best, = multipath i internal, e external, S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete

VRF: Red Local Router-ID 172.16.3.1

Network

Nexthop

Route Distinguisher: 65000:1

*> 172.16.0.0/24 0.0.0.0

*> 172.16.1.0/24 0.0.0.0

*> 172.16.2.0/24 172.16.0.2

*> 172.16.3.0/24 172.16.0.3

Metric LocPrf Weight Path

0

100

32768

?

0

100

32768

?

0

100

32768

?

0

100

32768

?

Total number of entries 4

switch# show bgp vrf Green ipv4 unicast Status codes: s suppressed, d damped, h history, * valid, > best, = multipath i internal, e external, S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete

VRF: Green Local Router-ID 172.17.2.1

Network

Nexthop

Route Distinguisher: 65000:2

*> 172.17.0.0/24 0.0.0.0

*> 172.17.1.0/30 0.0.0.0

*> 172.17.2.0/24 172.17.0.2

Metric LocPrf Weight Path

0

100

32768

?

0

100

32768

?

0

100

32768

?

Total number of entries 3

switch# show bgp vrf Blue ipv4 unicast Status codes: s suppressed, d damped, h history, * valid, > best, = multipath i internal, e external, S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete

VRF: Blue Local Router-ID 172.18.3.1

Network Route Distinguisher: 65000:3 *> 172.18.0.0/24 0.0.0.0 *> 172.18.1.0/30 0.0.0.0 *> 172.18.3.0/24 172.18.0.3

Nexthop

Metric LocPrf Weight Path

0

100

32768

?

0

100

32768

?

0

100

32768

?

Total number of entries 3

IVRF commands | 1137

switch# show bgp vrf Shared ipv4 unicast Status codes: s suppressed, d damped, h history, * valid, > best, = multipath i internal, e external, S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete

VRF: Shared Local Router-ID 192.168.99.1

Network Route Distinguisher: 65000:99 *> 192.168.99.0/24 0.0.0.0

Nexthop

Metric LocPrf Weight Path

0

100

32768

?

Total number of entries 1

Show BGP VRF ipv6 unicast routes for vrf-name:

switch# show bgp vrf Red ipv6 unicast Status codes: s suppressed, d damped, h history, * valid, > best, = multipath i internal, e external, S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete

VRF: Red Local Router-ID 172.16.3.1

Network

Nexthop

Route Distinguisher: 65000:1

* 2001:100:1:1000:/56

2001:100:1:1000::72a

*> 2001:100:1:1000::/56

::

* 2001:100:1:2000::/56

::FFFF:200.10.10.1 0

Metric LocPrf Weight Path

0

0

200

?

0

100

32768 ?

0

100

32768 ?

Total number of entries 3

Show BGP VRF routes for all vrfs and all address-families:

switch# show bgp all-vrf all Status codes: s suppressed, d damped, h history, * valid, > best, = multipath i internal, e external, S Stale, R Removed Origin codes: i - IGP, e - EGP, ? - incomplete

VRF: Blue Local Router-ID 172.18.3.1

Address-family: IPv4 Unicast

----------------------------

Network

Nexthop

Metric LocPrf

*> 172.18.0.0/24 0.0.0.0

0

100

*> 172.18.1.0/30 0.0.0.0

0

100

*> 172.18.3.0/24 172.18.0.3 0

100

Weight Path 32768 ? 32768 ? 32768 ?

Total number of entries 3

Address-family: IPv6 Unicast

----------------------------

Network

Nexthop

Metric LocPrf Weight Path

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1138

Toatl number of entries 0

VRF: Green Local Router-ID 172.17.2.1

Address-family: IPv4 Unicast

----------------------------

Network

Nexthop

Metric LocPrf

*> 172.17.0.0/24 0.0.0.0

0

100

*> 172.17.1.0/30 0.0.0.0

0

100

*> 172.17.2.0/24 172.17.0.2 0

100

Weight Path 32768 ? 32768 ? 32768 ?

Total number of entries 3

Address-family: IPv6 Unicast

----------------------------

Network

Nexthop

Metric LocPrf Weight Path

Total number of entries 0

VRF: Red Local Router-ID 172.16.3.1

Address-family: IPv4 Unicast

----------------------------

Network

Nexthop

Metric LocPrf

*> 172.16.0.0/24 0.0.0.0

0

100

*> 172.16.1.0/24 0.0.0.0

0

100

*> 172.16.2.0/24 172.16.0.2 0

100

*> 172.16.3.0/24 172.16.0.3 0

100

Weight Path 32768 ? 32768 ? 32768 ? 32768 ?

Total number of entries 4

Address-family: IPv6 Unicast

----------------------------

Network

Nexthop

Metric LocPrf

* 2001:100:1:1000::/56

2001:100:1:1000::72a

0

0

*> 2001:100:1:1000::/56

::

0

100

* 2001:100:1:2000::/56

::FFFF:200.10.10.1 0

0

100

Weight Path

200

?

32768 ?

32768 ?

Total number of entries 3

VRF: Shared Local Router-ID 192.168.99.1

Address-family: IPv4 Unicast

----------------------------

Network

Nexthop

Metric LocPrf

*> 192.168.99.0/24 0.0.0.0

0

100

Weight Path 32768 ?

Total number of entries 1

Address-family: IPv6 Unicast

----------------------------

Network

Nexthop

Metric LocPrf Weight Path

Total number of entries 0

IVRF commands | 1139

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Operator (>)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show bgp info vrf
show bgp info vrf <vrf-name> [vsx-peer]
Description
Displays BGP route-targets information for specified VRF.

Parameter info vrf-name vsx-peer

Description
Display BGP RT information.
Required string VRF name for the vrf.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Show BGP VRF information.
switch# show bgp info vrf red VRF : red VRF RD : 100:1
Address-family IPv4 unicast info Redistribution : ospf Export RT list : 100:1 100:2 Import RT list : 100:3

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1140

Address-family IPv6 unicast info Redistribution : connected Export RT list : 100:11 100:12 Import RT list : 100:15

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip route vrf
show ip route vrf <vrf-name> [vsx-peer]
Description
Shows route information for specified VRF.

Parameter vrf-name vsx-peer

Description
Required: string VRF name for the VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
switch# show ip route vrf green
Displaying ipv4 routes selected for forwarding '[x/y]' denotes [distance/metric] 10.0.0.0/24, vrf green via 20.0.0.1[vrf red], [1/0], static 30.0.0.0/24, vrf green via 1/1/2, [0/0], connected
30.0.0.2/32, vrf green via 1/1/2, [0/0], local

IVRF commands | 1141

60.0.0.0/24, vrf green via 1/1/1[vrf red], [1/0], static

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 route vrf
show ipv6 route vrf <VRF-NAME> [vsx-peer]
Description
Shows the route information for specified VRF.

Parameter <VRF-NAME> vsx-peer

Description
Required: String VRF name for the VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Displaying ipv6 routes selected for forwarding:
switch# show ipv6 route vrf red '[x/y]' denotes [distance/metric] 1000::/64, vrf red via 1/1/1[vrf green], [0/0], connected 1000::1/128, vrf red via 1/1/1[vrf green], [0/0], local 3005::/64, vrf red via 1000::2[vrf green], [2/0], static

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1142

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

vrf
vrf <VRF-NAME> no vrf <VRF-NAME>
Description
Creates a VRF instance named <VRF-NAME> and then enters its context. Use default for <VRF-NAME> to enter the default VRF configure context. Except for the default VRF, the no form of the command deletes the named VRF instance and any IP configuration for interfaces or SVI linked to default VRF. The default VRF cannot be deleted and a warning is given if attempted. To erase the Route-Distinguisher and Route-Targets, enter the default VRF context and delete them manually one by one.

Parameter <VRF-NAME>

Description
Specifies the VRF name. Range: Up to 32 alphanumeric characters. The mgmt VRF cannot be used.

Examples
Creating the VRF named cust_A and then entering its context:

switch(config)# vrf cust_A

Entering the default VRF context:

switch(config)# vrf default

Deleting the VRF named test:

switch(config)# no vrf test

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

IVRF commands | 1143

Command History

Release 10.09 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Added default VRF information. --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1144

Chapter 63 Job Scheduler commands

Job Scheduler commands

job
In the config context: job <JOB-NAME> no job [<JOB-NAME>]

Subcommands available In the job config context (config-job): [no] enable [no] desc <DESCRIPTION> [no] [<SEQ-NUM>] [delay <DELAY>] cli <COMMAND> resequence <START-SEQ-NUM> <INCREMENT>
Description
If <JOB-NAME> does not exist, this command creates a job and then enters its context. The no form of this command deletes the specified job. If no job is specified, all jobs are deleted.

Deleting a job also removes it from any schedule that uses the job, preventing further attempts to execute the job.
If <JOB-NAME> exists, this command enters the config-job-<NAME> context for the specified job.

Parameter <JOB-NAME>

Description
Specifies the job name. Range 1 to 64 characters (alphanumeric and "_" (underscore)

Subcommands
These subcommands are available within the config-job-<NAME> context for configuring the job: enable
Enables the job (the default). no enable disables the job. [no] desc <DESCRIPTION>
Specifies a user-defined job description. no desc removes the description. Range: 1 to 128 characters. For example:

switch(config-job-PTog1)# desc Toggle port 1/1/1
[no] [<SEQ-NUM>] [delay <DELAY>] cli <COMMAND> Adds a CLI command to the job. The no form removes the command from the job. When executed, commands with simple (y/n) prompts (such as boot system) will be automatically confirmed with "y." Other commands requiring more complex user input (such as password change) cannot be used. <SEQ-NUM> specifies the job CLI command sequence number to facilitate ordering of commands within a job. When omitted, a sequence number that is 10 greater the highest existing sequence

AOS-CX 10.14 Command-Line Interface Guide

1145

number is auto-assigned. The first auto-assigned sequence number is 10. Range: 1 to 4294967295. [delay <DELAY>] specifies the delay in seconds before this CLI command is executed. The cumulative delay for all commands in a job must be no more than 300 seconds. Range 1 to 300. cli <COMMAND> specifies the CLI command to be executed. Range 1 to 4096 characters. These commands must not be used in a job: copy, repeat, show boot-history, show coredump, show events, show job, show tech, sleep, terminal-monitor. For example, adding a command as line 18 to a job:
switch(config-job-PTog1)# 18 cli interface 1/1/1
resequence <START-SEQ-NUM> <INCREMENT> Resequences the CLI command line sequence numbers. Both <START-SEQ-NUM> and <INCREMENT> default to 10. For example, resequencing the CLI command list to start at 10 with an increment of 5.
switch(config-job-PTog1)# resequence 10 5 switch(config-job-PTog1)# show job PTog1
Job Name : PTog1 ...
Job CLI commands ---------------10 cli config 15 cli interface 1/1/1 20 cli shutdown ...
Usage
n A maximum of 20 commands can be used in a job. n To see the maximum number of jobs and job execution output preserved instances for your
particular switch, use command show capacities job. n Jobs must complete execution in under five minutes and are force-stopped after five minutes if they
do not.
Examples
Creating a port toggle job named PTog1:
switch(config)# job PTog1 switch(config-job-PTog1)# desc Toggle port 1/1/1 switch(config-job-PTog1)# 10 cli config switch(config-job-PTog1)# 20 cli interface 1/1/1 switch(config-job-PTog1)# 30 cli shutdown switch(config-job-PTog1)# 40 delay 10 cli no shutdown switch(config-job-PTog1)# 50 cli end switch(config-job-PTog1)# exit switch(config)#
Creating a job named Reboot_sw1 that saves the running configuration and then reboots the switch:
Job Scheduler commands | 1146

switch(config)# job Reboot_Sw1 switch(config-job-Reboot_sw1)# desc Save config then reboot switch switch(config-job-Reboot_Sw1)# 10 cli config switch(config-job-Reboot_Sw1)# 20 cli write mem switch(config-job-Reboot_Sw1)# 30 cli boot system switch(config-job-Reboot_Sw1)# exit switch(config)#

For more information on features that use this command, refer to the Job Scheduler Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms All platforms

Command context
config config-job-<NAME>

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

schedule
In the config context: schedule <SCHEDULE-NAME> [transient] no schedule [<SCHEDULE-NAME>]
Subcommands available In the schedule config context (config-schedule): [no] enable [no] desc <DESCRIPTION> [no] [<SEQ-NUM>] job <JOB-NAME> resequence <START-SEQ-NUM> <INCREMENT> [no] trigger on HH:MM {daily | weekly <1-7> | monthly <1-31>}
[count <1-1000>] [start YYYY-MM-DD] [no] trigger every {days <1-365> | hours <1-8760> | minutes <30-525600>}
[count <1-1000> ] [start HH:MM [YYYY-MM-DD]] [no] trigger at HH:MM [YYYY-MM-DD]
Description
If <SCHEDULE-NAME> does not exist, this command creates a job schedule and then enters its context. The no form of this command deletes the specified schedule. If no schedule is specified, all schedules are deleted. If <SCHEDULE-NAME> exists, this command enters the config-schedule-<NAME> context for the specified job schedule.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1147

Parameter <SCHEDULE-NAME> [transient]

Description
Specifies the schedule name. Range 1 to 64 characters (alphanumeric and "_" (underscore)).
Causes the schedule to be cleared upon switch reboot. By default, schedules are maintained after switch reboots.

Subcommands
These subcommands are available within the config-schedule-<NAME> context for scheduling jobs and controlling the order in which the jobs are executed: enable
Enables the schedule (the default). no enable disables the schedule. [no] desc <DESCRIPTION>
Specifies a user-defined schedule description. no desc removes the description. Range: 1 to 128 characters. For example:

switch(config-schedule-Monthly)# desc Monthly schedule

[no] [<SEQ-NUM>] job <JOB-NAME>
Associates an existing job with this schedule. The no form removes the job from the schedule. <JOB-NAME> specifies an existing job name. Range: 1 to 64 characters (alphanumeric and "_" (underscore)). <SEQ-NUM> specifies the job name sequence number to facilitate ordering of jobs within a schedule. When omitted, a sequence number that is 10 greater the highest existing sequence number is auto-assigned. The first auto-assigned sequence number is 10.
For example, associating two jobs with the selected schedule:

switch(config-schedule-Monthly)# 10 job PTog1 switch(config-schedule-Monthly)# 20 job PTog2

resequence <START-SEQ-NUM> <INCREMENT>
Resequences the job name sequence numbers in the schedule. Both <START-SEQ-NUM> and <INCREMENT> default to 10. For example, resequencing the job list to start at 5 with an increment of 10.

switch(config-schedule-Monthly)# resequence 5 10 switch(config-schedule-Monthly)# show schedule Monthly
Schedule Name: Monthly ...
Scheduled Jobs -------------5 : PTog1 15 : PTog2

[no] trigger on HH:MM {daily | weekly <1-7> | monthly <1-31>} [count <1-1000>] [start YYYY-MM-DD]
Sets the job to trigger at a specific time. The no form removes the trigger. HH:MM selects the time using a 24-hour clock (switch local time). Range: 00:00 to 23:59. daily selects daily.

Job Scheduler commands | 1148

weekly <1-7> selects specific days of week or days-of-week ranges (with comma or hyphen separators) using numeric day-of-week numbers with Sunday equal 1. For example: 1,3,5-7 for Sunday, Tuesday, Thursday, Friday, Saturday. monthly <1-31> selects specific days of month or days of month ranges (with comma or hyphen separators) using numeric day-of-month numbers. For example: 5,14-21,25,31. For months with fewer days than the specified day number, the last day of the month is selected. count <1-1000> selects the number of times the job will be executed. When omitted, job execution triggering is indefinite. start YYYY-MM-DD selects the schedule first trigger date. When omitted, today's date is used for times at least 5 minutes into the future, otherwise tomorrow is selected as the first trigger date. For example, setting the schedule to trigger monthly on the 15th, at 11:45 PM, starting on August 15, with an execution limit of 200:
switch(config-schedule-M)# trigger on 23:45 monthly 15 count 200 start 2021-08-15
[no] trigger every {days <1-365> | hours <1-8760> | minutes <30-525600>} [count <1-1000>] [start HH:MM [YYYY-MM-DD]]
Sets the job trigger to a specific periodic interval. The no form removes the trigger. By default, the schedule is activated within 5 minutes from the configuration time. If the start time is specified, then the job is executed beginning at the specified start time and thereafter at the specified interval.
days <1-365> selects the interval in days. Range: 1 to 365. hours <1-8760> selects the interval in minutes. Range: 1 to 8760. minutes <30-525600> selects the interval in seconds. Range: 30 to 525600. count <1-1000> selects the number of times the job will be executed. When omitted, job execution triggering is indefinite. start HH:MM [YYYY-MM-DD] selects the schedule first trigger time and date. For example, setting the schedule to trigger once every 14 days, starting on January 1, with an execution limit of 500:
switch(config-schedule-Ev14D)# trigger every days 14 count 500 start 2022-01-01
[no] trigger at HH:MM [YYYY-MM-DD] Sets the job to trigger one time only on a specific date and time. When the date is omitted, today's date is used for times at least 5 minutes into the future, otherwise tomorrow is selected. The no form removes the trigger. For example, setting the schedule to trigger once only on August 26 at midnight:
switch(config-schedule-Aug26)# trigger at 00:00 2021-08-26
Usage
n A job can be used only once per schedule. n To see the maximum number of schedules and jobs per schedule for your particular switch, use
command show capacities schedule. n Configure the jobs to be executed (using the job command) before configuring a schedule. n Jobs must complete execution in under five minutes and are force-stopped after five minutes if they
do not.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1149

n A job must be scheduled to execute at least five minutes after its previous execution. If the same job is scheduled to be executed again within less than five minutes, the execution is skipped.
Examples
Creating a schedule named PT2xW that runs the port toggle job PTog1 on Mondays and Fridays at 11:45 PM, starting on August 2 2021, with a one-year duration:
switch(config)# schedule PT2xW switch(config-schedule-PT2xW)# desc Monday & Friday 11:45 PM port toggles switch(config-schedule-PT2xW)# 10 job PTog1 switch(config-schedule-PT2xW)# trigger on 23:45 weekly 2,6 count 104 start 202108-02 switch(config-schedule-PT2xW)# exit switch(config)#
Creating a schedule named RB_LDM that runs the switch reboot job on the last day of the month at 3:00 AM, starting on January 31 2022, with a two-year duration:
switch(config)# schedule RB_LDM switch(config-schedule-RB_LDM)# desc Monthly reboot 3:00 AM switch(config-schedule-RB_LDM)# 10 job Reboot_sw1 switch(config-schedule-RB_LDM)# trigger on 3:00 monthly 31 count 24 start 2022-0131 switch(config-schedule-RB_LDM)# exit

For more information on features that use this command, refer to the Job Scheduler Guide for your switch model.

Command History
Release 10.08

Modification Command introduced.

Command Information

Platforms All platforms

Command context
config config-schedule-<NAME>

Authority
Administrators or local user group members with execution rights for this command.

show job
show job [<JOB-NAME>] [execution-output <INSTANCE-ID>]
Description
Shows information about a specific job or every job. Optionally shows the job execution output log.

Job Scheduler commands | 1150

Parameter <JOB-NAME>
<INSTANCE-ID>

Description
Specifies an existing job name. When omitted, information is shown for every job. Range: 1 to 64 characters (alphanumeric and "_" (underscore)).
Selects the job execution output instance with 1 selecting the most recent. To see the maximum number of job execution output instances for your particular switch, use command show capacities job.

Usage
Job execution statistics such as execution counts are reset to zero upon switch reboot.
Examples
Showing port toggle job information before execution has occurred:

switch# show job PTog1 Job Name : PTog1

Enabled

: Yes

Description

: Toggle port 1/1/1

Status

: waiting

Number of commands

:5

Total execution count : 0

Failed execution count : 0

Job CLI commands ---------------10 cli config 20 cli interface 1/1/1 30 cli shutdown 40 delay 10 cli no shutdown 50 cli end

Showing port toggle job information after execution has occurred: switch# show job PTog1 Job Name : PTog1

Enabled

: Yes

Description

: Toggle port 1/1/1

Status

: waiting

Number of commands

:5

Total execution count : 1

Failed execution count : 0

Job execution history ---------------------

Instance number Execution status Execution start time

:1 : success : Mon Aug 2 23:45:00 2021

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1151

Execution duration

: 10s

Job CLI commands ---------------10 cli config 20 cli interface 1/1/1 30 cli shutdown 40 delay 10 cli no shutdown 50 cli end

Showing port toggle job most recent execution output:

switch# show job PTog1 execution-output 1 ================================================================================= Command: config time: Mon Aug 2 23:45:00 2021 =================================================================================
================================================================================= Command: interface 1/1/1 time: Mon Aug 2 23:45:00 2021 =================================================================================
================================================================================= Command: shutdown time: Mon Aug 2 23:45:00 2021 =================================================================================
================================================================================= Command: cli no shutdown time: Mon Aug 2 23:45:10 2021 =================================================================================
================================================================================= Command: end time: Mon Aug 2 23:45:10 2021 =================================================================================

For more information on features that use this command, refer to the Job Scheduler Guide for your switch model.

Command History
Release 10.08

Modification Command introduced.

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Job Scheduler commands | 1152

show capacities (job, schedule)
show capacities {job | schedule}
Description
Shows either job or schedule capacities information for your switch model.
Examples
Showing job capacities information (8320 example shown):

switch# show capacities job

System Capacities: Filter Job

Capacities Name

Value

----------------------------------------------------------------------------------

Maximum number of job execution output preserved per job

10

Maximum number of jobs configurable in a system

32

Showing schedule capacities information (8320 example shown):

switch# show capacities Schedule

System Capacities: Filter Schedule

Capacities Name

Value

----------------------------------------------------------------------------------

Maximum number of jobs configurable in a schedule

10

Maximum number of schedules configurable in a system

32

For more information on features that use this command, refer to the Job Scheduler Guide for your switch model.

Command History
Release 10.08

Modification Command introduced.

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config (job, schedule)
show running-config [current-context]
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1153

Shows the entire running configuration for the switch, including configuration details for the Job Scheduler job and schedule configuration.

Parameter current-context

Description
When included from within the Job Scheduler job or schedule context, shows only the job or schedule configuration information for the selected job or schedule.

Examples
Showing the running configuration information for all jobs and schedules with unrelated configuration information omitted for clarity (omitted portions represented by ellipses("..."):

switch# show running-config
Current configuration: ... ! job PTog1
desc Toggle port 1/1/1 10 cli config 20 cli interface 1/1/1 30 cli shutdown 40 delay 10 cli no shutdown 50 cli end job Reboot_sw1 desc Save config then reboot switch 10 cli config 20 cli write mem 30 cli boot system schedule PT2xW desc Monday & Friday 11:45 PM port toggles trigger on 23:45 weekly 2,6 count 104 start 2021-08-02 10 job PTog1 schedule RB_LDM desc Monthly reboot 3:00 AM trigger on 3:00 monthly 31 count 24 start 2022-01-31 10 job Reboot_sw1 ...

From within the job PTog1 context, showing the running configuration information for the job:

switch(config-job-PTog1)# show running-config current-context
Current configuration: job PTog1
desc Toggle port 1/1/1 10 cli config 20 cli interface 1/1/1 30 cli shutdown 40 delay 10 cli no shutdown 50 cli end

From within the schedule PT2xW context, showing the running configuration information for the schedule:

Job Scheduler commands | 1154

switch(config-schedule-PT2xW)# show running-config current-context
Current configuration: schedule PT2xW
desc Monday & Friday 11:45 PM port toggles trigger on 23:45 weekly 2,6 count 104 start 2021-08-02 10 job PTog1

For more information on features that use this command, refer to the Job Scheduler Guide for your switch model.

Command History
Release 10.08

Modification Command introduced.

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#) config-job-<NAME> config-schedule-<NAME>

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show schedule
show schedule [<SCHEDULE-NAME>]
Description
Shows information about a specific schedule or every schedule.

Parameter <SCHEDULE-NAME>

Description
Specifies an existing job schedule name. When omitted, information is shown for every schedule. Range: 1 to 64 characters (alphanumeric and "_" (underscore)).

Usage
Schedule statistics such as Triggered count are reset to zero upon switch reboot.
Examples
Showing port toggle job schedule information before execution has occurred:

switch# show schedule PT2xW Schedule Name: PT2xW

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1155

Schedule config --------------Description Enabled Trigger type Transient Max trigger count Trigger start date

: Monday & Friday 11:45 PM port toggles : Yes : calendar : No : 104 : 2021-08-02 23:45

Schedule Status --------------Trigger status Next trigger time

: active : Mon Aug 2 23:45:00 2021

Scheduled Jobs -------------10 : PTog1

Showing port toggle job schedule information after execution has occurred: switch# show schedule PT2xW

Schedule Name: PT2xW

Schedule config --------------Description Enabled Trigger type Transient Max trigger count Trigger start date

: Monday & Friday 11:45 PM port toggles : Yes : calendar : No : 104 : 2021-08-02 23:45

Schedule Status --------------Trigger status Next trigger time Triggered count

: active : Fri Aug 6 23:45:00 2021 :1

Scheduled Jobs -------------10 : PTog1

For more information on features that use this command, refer to the Job Scheduler Guide for your switch model.

Command History
Release 10.08
Command Information

Modification Command introduced.

Job Scheduler commands | 1156

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1157

Chapter 64 Key chain commands

Key chain commands

accept-lifetime
accept-lifetime [start-time <time> <month>/<day>/<year>] {duration {<seconds> | infinite} | end-time <time> <month>/<day>/<year>}
Description
Configures the duration for which the key is valid for receiving packets. The no form of this command configures the key packet receiving duration to the default value of an infinite time.

Parameter start-time
end-time
day month year duration infinite

Description Time at which the key chain lifetime starts. Required. Format: HH:MM:SS Time at which the key chain lifetime expires. Required. Format: HH:MM:SS Day of the month. Required. Range: 1-31. Month of the year. Required. Year. Required. Range: 2020-2050 Time in seconds. Optional. Range: 1-2147483646. Specifies infinite time for the key. Optional.

Examples
Configuring the duration for which the key is valid for receiving packets:

switch# configure terminal switch(config)# keychain ospf_keys switch(config-keychain)# key 1 switch(config-keychain-key)# accept-lifetime start-time 10:10:10 10/25/2020 endtime 10:10:10 11/25/2020 switch(config-keychain-key)# accept-lifetime start-time 10:10:10 10/25/2020 duration 1000 switch(config-keychain-key)# accept-lifetime start-time 10:10:10 10/25/2020 duration infinite switch(config-keychain-key)# accept-lifetime end-time 10:10:10 11/25/2020 switch(config-keychain-key)# accept-lifetime duration 1000 switch(config-keychain-key)# accept-lifetime duration infinite

Configuring the key packet receiving duration to the default value of an infinite time:

AOS-CX 10.14 Command-Line Interface Guide

1158

switch# configure terminal switch(config)# keychain ospf_keys switch(config-keychain)# key 1 switch(config-keychain-key)# no accept-lifetime

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-keychain-key

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

cryptographic-algorithm
recv-id cryptographic-algorithm {aes-cmac-128 |hmac-sha-1 | hmac-sha-256 | hmac-sha-384 | hmac-sha-512 | md5} no cryptographic-algorithm
Description
Configures the recv-id cryptographic algorithm for the key. The key will not be valid until the receive ID, the send ID, and send lifetime is configured for TCP-AO, Choose one of the authentication algorithms from the following parameters. The no form of this command configures the default cryptographic algorithm for a key, md5.
TCP Authentication Option (TCP-AO) authentication supports only the aes-cmac-128 and hmac-sha-1 algorithms. If you are configuring TCP-AO, you must select one of these options.

Parameter aes-cmac-128
hmac-sha-1
hmac-sha-256 hmac-sha-384 hmac-sha-512

Description
Sets the authentication algorithm for the key to AES-CMAC-128. This parameter is only supported for TCP-AO.
Sets the authentication algorithm for the key to SHA-1. This parameter is also supported for TCP-AO.
Sets the authentication algorithm for the key to SHA-256.
Sets the authentication algorithm for the key to SHA-384.
Sets the authentication algorithm for the key to SHA-512.

Key chain commands | 1159

Parameter md5

Description
Sets the authentication algorithm for the key to md5. Maximum length of the key string supported: 16 bytes (config-if context), 64 bytes (config-keychain-key context).

Examples
Set the authentication algorithm for the key to SHA-384:

switch(config)# keychain ospf_keys switch(config-keychain)# key 1 switch(config-keychain-key)# recv-id cryptographic-algorithm hmac-sha-384

Set the authentication algorithm to the default, md5:

switch(config)# keychain ospf_keys switch(config-keychain)# key 1 switch(config-keychain-key)# no recv-id cryptographic-algorithm

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Modification The aes-cmac-128 parameter is introduced. --

Command Information

Platforms
6300 6400

Command context config-keychain-key

Authority
Administrators or local user group members with execution rights for this command.

key
key <KEY-ID>
Description
Creates the key for a key chain and enters the key chain key context. A maximum of 64 keys can be configured per key chain. The no form of this command deletes the key from the key chain.

Parameter <KEY-ID>

Description ID of the key. Required. Range: 1-255.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1160

Examples
Creating a key for a key chain:
switch# configure terminal switch(config)# keychain ospf_keys switch(config-keychain)# key 1
Deleting a key from a key chain:
switch# configure terminal switch(config)# keychain ospf_keys switch(config-keychain)# no key 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-keychain

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

keychain
keychain <KEYCHAIN-NAME>
Description
Creates the key chain and enters the key chain context. A maximum of 64 key chains can be configured in the system. The no form of this command removes the key chain if it is not used by any subscribers.

Parameter <KEYCHAIN-NAME>

Description Name of the key chain. Required.

Examples
Creating a key chain:

switch# configure terminal switch(config)# keychain ospf_keys

Key chain commands | 1161

Removing a key chain:
switch# configure terminal switch(config)# keychain ospf_keys

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

key-string
key-string [{ciphertext | plaintext} <PASSWORD>]
Description
Sets the key password. The password is internally stored in encrypted form. The key is not valid until its password has been set. The no form of this command deletes the password used for the key.

Parameter ciphertext plaintext <PASSWORD>

Description Specifies that the key password is provided as ciphertext. Specifies that the key password is provided as plaintext. Specifies the key password.

When the key password is not provided on the command line, plaintext password prompting occurs upon pressing Enter. The entered password characters are masked with asterisks.
Examples
Setting the key password with plaintext:
switch(config)# keychain ospf_keys switch(config-keychain)# key 1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1162

switch(config-keychain-key)# key-string plaintext F82#450bHP
Setting the key password with plaintext prompting:
switch(config)# keychain ospf_keys switch(config-keychain)# key 1 switch(config-keychain-key)# key-string Enter the key password: ************* Re-Enter the key password: *************
Setting the key password with ciphertext:
switch(config)# keychain ospf_keys switch(config-keychain)# key 1 switch(config-keychain-key)# key-string ciphertext AQBpfciFZ/P...biAAAOjc0a8=
Deleting the password for the key:
switch(config)# keychain ospf_keys switch(config-keychain)# key 1 switch(config-keychain-key)# no key-string

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-keychain-key

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

name
name <KEY-NAME> no name <KEY-NAME>
Description
Configures a name for a numbered key in a key chain. The no form of this command removes the name of the key.

Key chain commands | 1163

Parameter <KEY-NAME>

Description
Specifies the name of the key in alphanumeric characters. Range: 1-64.

Examples
Creating a name for a key in a key chain called abcdef123456:

switch# configure terminal switch(config)# keychain macsec_keys switch(config-keychain)# key 1 switch(config-keychain-key)# name abcdef123456

Removing the name of the key named abcdef123456:

switch# configure terminal switch(config)# keychain macsec_keys switch(config-keychain)# key 1 switch(config-keychain-key)# no name abcdef123456

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.11

Modification Command added.

Command Information

Platforms All platforms

Command context config-keychain-key

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

recv-id
recv-id <0-255>
Description
Configures the receive ID for a keychain key. The receive ID has to be unique across keys in the keychain. The no form of this command configures removes the recv-id value. The receive ID can not be changed for an active key of a keychain which is associated with BGP neighbor.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1164

Parameter <0-255>

Description
Set the receive ID corresponding to the keychain key. Supported values are 0-255.

Examples
Configuring the receive ID for the keychain key.

switch# configure terminal switch(config)# keychain ospf_keys switch(config-keychain)# key 1 switch(config-keychain-key)# recv-id 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms All platforms

Command context config-keychain-key

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

send-lifetime
send-lifetime [start-time <time> <month>/<day>/<year>] {duration {<seconds> | infinite} | end-time <time> <month>/<day>/<year>}
Description
Configures the duration for which the key is valid for sending packets. The no form of this command configures the key packet sending duration to the default value of an infinite time.

Parameter start-time end-time day

Description
Time at which the key chain lifetime starts. Required. Format: HH:MM:SS
Time at which the key chain lifetime expires. Required. Format: HH:MM:SS
Day of the month. Required. Range: 1-31.

Key chain commands | 1165

Parameter month year duration infinite

Description Month of the year. Required. Year. Required. Range: 2020-2050 Time in seconds. Optional. Range: 1-2147483646. Specifies infinite time for the key. Optional.

Examples
Configuring the duration for which the key is valid for sending packets:

switch# configure terminal switch(config)# keychain ospf_keys switch(config-keychain)# key 1 switch(config-keychain-key)# send-lifetime start-time 10:10:10 10/25/2020 end-time 10:10:10 11/25/2020 switch(config-keychain-key)# send-lifetime start-time 10:10:10 10/25/2020 duration 1000 switch(config-keychain-key)# send-lifetime start-time 10:10:10 10/25/2020 duration infinite switch(config-keychain-key)# send-lifetime end-time 10:10:10 11/25/2020 switch(config-keychain-key)# send-lifetime duration 1000 switch(config-keychain-key)# send-lifetime duration infinite

Configuring the key packet sending duration to the default value of an infinite time:

switch# configure terminal switch(config)# keychain ospf_keys switch(config-keychain)# key 1 switch(config-keychain-key)# no send-lifetime

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-keychain-key

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

send-id
send-id <0-255>

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1166

Description
Configures the send ID for a keychain key. The send ID has to be unique across keys in the keychain. The no form of this command configures removes the send-id value. The send id can not be changed for an active key of a keychain which is associated with BGP neighbor.

Parameter <0-255>

Description
Set the send IDcorresponding to the keychain key. Supported values are 0-255.

Examples
Configuring the send ID for the keychain key.

switch# configure terminal switch(config)# keychain ospf_keys switch(config-keychain)# key 1 switch(config-keychain-key)# send-id 218

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.11

Modification Command introduced.

Command Information

Platforms All platforms

Command context config-keychain-key

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show capacities keychain
show capacities keychain
Description
Shows the maximum number of key chains and keys configurable in a key chain.
Example
switch# show capacities keychain
System Capacities: Filter Keychain Capacities Name
Value

Key chain commands | 1167

---------------------------------------------------------------------------------------------------------Maximum number of keychains supported in the system
64 Maximum number of Keys supported in a single Keychain
64

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Operator (>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show keychain
show keychain [<KEYCHAIN-NAME>]
Description
Shows information about configured and active keys of a named key chain or (if keychain-name is not specified) all configured key chains.

Parameter <KEYCHAIN-NAME>

Description Name of the key chain. Optional.

Example

switch# show keychain

Keychain Name : macsec_keys

Number of Keys

:1

Active Send Key ID :

Active Recv Key IDs :

Key ID : 1

Key name

: abcdef123456

Key string

:

AQBapYa+0qQDzcakbB1TopeX0AMYDDWDW015orkH5mY3qJDaBAAAADASiBQ=

Send Key Validity : 00:00:00 01/01/2020 to Infinite

Recv Key Validity : 00:00:00 01/01/2020 to Infinite

Keychain Name : ospf_keys

Number of Keys

:2

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1168

Active Send Key ID : 7 Active Recv Key IDs : 7, 200

Key ID

:7

Key name

:-

Key string

:

AQBapZ1OHiO9W3JwRqnjtLfbV73BPLS1S6TGVg+Lzl7N4e5eBAAAAPWaPBE=

Crypto-Algorithm : sha256

Send Key Validity : 00:00:01 10/1/2020 to 23:59:01 10/1/2021

Recv Key Validity : 00:00:01 10/1/2020 to infinite

Key ID

: 200

Key name

:-

Key string

:

AQBapZ1OHiO9W3JwRqnjtLfbV73BPLS1S6TGVg+Lzl7N4e5eBAAAAPWaPBE=

Crypto-Algorithm : sha512

Send Key Validity : 00:00:01 10/1/2020 to 23:59:01 10/1/2021

Recv Key Validity : 00:00:01 10/1/2020 to 23:59:01 10/1/2021

Keychain Name : bgp_keys

Number of Keys

:2

Active Send Key ID : 7

Active Recv Key IDs : 7

Key ID

:7

Key name

:-

Key string

:

AQBapZ1OHiO9W3JwRqnjtLfbV73BPLS1S6TGVg+Lzl7N4e5eBAAAAPWaPBE=

Crypto-Algorithm : md5

Send Key Validity : 00:00:01 10/26/2020 to 23:59:01 10/1/2021

Recv Key Validity : 00:00:01 10/22/2020 to infinite

Key ID

:8

Key name

:-

Key string

:

AQBapZ1OHiO9W3JwRqnjtLfbV73BPLS1S6TGVg+Lzl7N4e5eBAAAAPWaPBE=

Crypto-Algorithm : sha384

Send Key Validity : 00:00:01 10/1/2021 to 23:59:01 10/1/2021

Recv Key Validity : 00:00:01 10/1/2021 to 23:59:01 10/1/2021

```

```

Keychain Name : ospf_keys

Number of Keys

:2

Active Send Key ID : 7

Active Recv Key IDs : 7, 200

Key ID

:7

Key name

:-

Key string

:

AQBapZ1OHiO9W3JwRqnjtLfbV73BPLS1S6TGVg+Lzl7N4e5eBAAAAPWaPBE=

Crypto-Algorithm : sha256

Send Key Validity : 00:00:01 10/1/2020 to 23:59:01 10/1/2021

Recv Key Validity : 00:00:01 10/1/2020 to infinite

Key ID

: 200

Key name

:-

Key string

:

AQBapZ1OHiO9W3JwRqnjtLfbV73BPLS1S6TGVg+Lzl7N4e5eBAAAAPWaPBE=

Crypto-Algorithm : sha512

Send Key Validity : 00:00:01 10/1/2020 to 23:59:01 10/1/2021

Recv Key Validity : 00:00:01 10/1/2020 to 23:59:01 10/1/2021

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

Key chain commands | 1169

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Operator (>)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show running-config keychain
show runnning-config keychain
Description
Shows the configurations for key chain protocol.
Example
switch# show running-config keychain keychain ospf_keys
key 1 key-string ciphertext
AQBapZ1OHiO9W3JwRqnjtLfbV73BPLS1S6TGVg+Lzl7N4e5eBAAAAPWaPBE= cryptographic-algorithm md5 accept-lifetime start-time 10:10:10 10/25/2020 end-time 10:10:10 11/25/2020 send-lifetime start-time 10:10:10 10/25/2020 end-time 10:10:10 11/25/2020
key 45 key-string ciphertext
AQBapZ1OHiO9W3JwRqnjtLfbV73BPLS1S6TGVg+Lzl7N4e5eBAAAAPWaPBE= accept-lifetime start-time 10:10:10 10/25/2020 end-time 10:10:10 11/25/2020
key 33 keychain macsec_keys
key 1 name abcdef123456 key-string ciphertext
AQBapYa+0qQDzcakbB1TopeX0AMYDDWDW015orkH5mY3qJDaBAAAADASiBQ=

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1170

Platforms All platforms

Command context Operator (>)

Authority
Administrators or local user group members with execution rights for this command.

Key chain commands | 1171

Chapter 65 L1-100Mbps downshift commands

L1-100Mbps downshift commands
downshift enable
downshift-enable no downshift-enable
Description
Enables/disables automatic speed downshift on an interface that supports downshift, generally 1GBASET ports. When enabled, downshift allows an interface to link at a lower advertised speed when unable to establish a stable link at the maximum speed. Downshifting only applies to physical interfaces that are not members of a LAG and is only available when auto-negotiation is enabled. When only one speed is advertised, downshift will not be triggered.
Examples
switch(config-if)# interface 1/1/1 switch(config-if)# downshift-enable
Warning: this is a non-standard mode for use only when standards-based auto-negotiation is not able to establish a stable link. Enabling this may cause the port to link at a lower than expected speed and should not be used on ports that are members of a LAG. Support calls may require this feature to be disabled
Continue (y/n)?
switch(config-if)#

When automatic downshift is enabled:
switch(config-if)# show running-config interface interface 1/1/1
downshift-enable

Disabling automatic speed downshift:
switch(config-if)# interface 1/1/1 switch(config-if)# no downshift-enable

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History

AOS-CX 10.14 Command-Line Interface Guide

1172

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

show interface
show interface [<IFNNAME>|<IFRANGE>] [brief | physical] show interface [<IFNNAME>|<IFRANGE>] [extended [non-zero] | [human-readable]] show interface [<IFNNAME>] monitor [human-readable] show interface [lag | loopback | tunnel | vlan ] [<ID>] [brief] show interface lag [<LAG-ID>] [extended [non-zero] | [human-readable]] show interface lag [<LAG-ID>] monitor [human-readable]
Description
Shows active configurations and operational status information for interfaces.

Parameter <IFNAME> <IFRANGE> brief physical extended
human-readable
non-zero LAG monitor LOOPBACK

Description
Specifies a interface name.
Specifies the port identifier range.
Shows brief info in tabular format.
Shows the physical connection info in tabular format.
Shows additional statistics, including the tx filtered and rx filtered counters. n Rx filter packets are protocol packets received when the
protocol is disabled on the switch and there is only one port in the VLAN. Protocols include OSPF, PIM, RIP, LACP, and LLDP. n An example of a Tx filtered packet would be a multicast packet being filtered from going out of the ingress port.
Shows statistics rounded to the nearest power of 1000, for example, 1K, 345M, 2G. This is available only in the CLI interface output.
Shows only non zero statistics.
Shows LAG interface information.
Continuously monitor interface statistics.
Shows loopback interface information.

L1-100Mbps downshift commands | 1173

Parameter TUNNEL VLAN <LAG-ID> <LOOPBACK-ID> <TUNNEL-ID> <VLAN-ID> VXLAN <VXLAN-ID>

Description Shows tunnel interface information. Shows VLAN interface information. Specifies the LAG number. Range: 1-256 Specifies the LOOPBACK number. Range: 0-255 Specifies the tunnel ID. Range: 1-255 Specifies the VLAN ID. Range: 1-4094 Shows the VXLAN interface information. Specifies the VXLAN interface identifier. Default: 1

Examples
Showing interface information when it is configured as a route-only port:

switch# show interface 1/1/1

Interface 1/1/1 is up

Admin state is up

Link state: up for 2 days (since Sun Jun 21 05:30:22 UTC 2020)

Link transitions: 1

Description: backup data center link

Hardware: Ethernet, MAC Address: 70:72:cf:fd:e7:b4

MTU 1500

Type 1GbT

Full-duplex

qos trust none

Speed 1000 Mb/s

Auto-negotiation is on

Flow-control: off

Error-control: off

Energy-Efficient Ethernet is enabledMDI mode: MDIX

L3 Counters: Rx Enabled, Tx Enabled

Rate collection interval: 300 seconds

Rates

RX

TX

Total (RX+TX)

------------- -------------------- -------------------- --------------------

Mbits / sec

0.00

0.00

0.00

KPkts / sec

0.00

0.00

0.00

Unicast

0.00

0.00

0.00

Multicast

0.00

0.00

0.00

Broadcast

0.00

0.00

0.00

Utilization %

0.00

0.00

0.00

Statistics

RX

TX

Total

------------- -------------------- -------------------- --------------------

Packets

0

0

0

Unicast

0

0

0

Multicast

0

0

0

Broadcast

0

0

0

Bytes

0

0

0

Jumbos

0

0

0

Dropped

0

0

0

Filtered

0

0

0

Pause Frames

0

0

0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1174

L3 Packets L3 Bytes Errors CRC/FCS Collision Runts Giants Other

0

0

0

0

0

0

0

0

0

0

n/a

0

n/a

0

0

0

n/a

0

0

n/a

0

0

0

0

Showing information when the interface is currently linked at a downshifted speed:
switch(config-if)# show interface 1/1/1 Interface 1/1/1 is up ... Auto-negotiation is on with downshift active
Showing information when the interface is currently linked with energy-efficient-ethernet negotiated:
switch(config-if)# show interface 1/1/1 Interface 1/1/1 is up ... Energy-Efficient Ethernet is enabled and active

Showing information when the interface is shut down during a VSX split:

switch(config-if)# show interface 1/1/1 Interface 1/1/1 is down Admin state is up State information: Disabled by VSX Link state: down for 3 days (since Tue Mar 16 05:20:47 UTC 2021) Link transitions: 0 Description: Hardware: Ethernet, MAC Address: 04:09:73:62:90:e7 MTU 1500 Type SFP+DAC3 Full-duplex qos trust none Speed 0 Mb/s Auto-negotiation is off Flow-control: off Error-control: off VLAN Mode: native-untagged Native VLAN: 1 Allowed VLAN List: 1502-1505 Rate collection interval: 300 seconds

Rate

RX

TX

Total (RX+TX)

---------------- -------------------- -------------------- --------------------

Mbits / sec

0.00

0.00

0.00

KPkts / sec

0.00

0.00

0.00

Unicast

0.00

0.00

0.00

Multicast

0.00

0.00

0.00

Broadcast

0.00

0.00

0.00

Utilization

0.00

0.00

0.00

L1-100Mbps downshift commands | 1175

Statistic

RX

TX

Total

---------------- -------------------- -------------------- --------------------

Packets

0

0

0

Unicast

0

0

0

Multicast

0

0

0

Broadcast

0

0

0

Bytes

0

0

0

Jumbos

0

0

0

Dropped

0

0

0

Pause Frames

0

0

0

Errors

0

0

0

CRC/FCS

0

n/a

0

Collision

n/a

0

0

Runts

0

n/a

0

Giants

0

n/a

0

Showing information when the interface is configured with EEE and the EEE has auto-negotiated:

switch(config-if)# show interface 1/1/1 physical

----------------------------------------------------------------------------------

----------------------------------------------------------

Link Admin

Speed

Flow-Control

EEE

PoE Power

Port

Port

Type

Status Config Status | Config Status | Config

Status | Config (Watts) State Information Description

----------------------------------------------------------------------------------

----------------------------------------------------------

1/1/1

1GbT

up

up

1G

auto

off

off

on

on

--

10M/100M/1G

--

Showing the monitor information:
In monitor mode, the CLI refreshes data automatically until it is exited by entering q. Pressing ? opens the help menu to display which options are available in this context.

Interface 1/1/1 is up

Rate

RX

TX

Total (RX+TX)

---------------- -------------------- -------------------- --------------------

MBits / sec

30196.43

30196.43

60392.85

MPkts / sec

58977.39

58977.40

117954.79

Unicast

0.00

0.00

0.00

Multicast

58977.39

58977.40

117954.79

Broadcast

0.00

0.00

0.00

Utilization %

75.49

75.49

150.98

Statistic

RX

TX

Total (RX+TX)

---------------- -------------------- -------------------- --------------------

Packets

4756527649

4756527865

9513055514

Unicast

0

0

0

Multicast

4756527649

4756527865

9513055514

Broadcast

2

0

2

Bytes

304417778668

304417795428

608835574096

Jumbos

0

0

0

Dropped

0

19028847730

19028847730

Pause Frames

0

0

0

Errors

0

0

0

CRC/FCS

0

n/a

0

help: ?, quit: q

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1176

Help for Interface Monitor h Toggle human-readable mode c Clear interface statistics Does not apply to rates Arrows, PgUp, PgDn, Home, End Navigate interface statistics Delay: 2 help: ?, quit: q
Showing the output for interface 1/1/1 in human-readable format:
In human-readable format, the < 1 symbol for Utilization indicates that the amount of packets is between zero and one. This is true in cases where the number of bytes increases but the number of packets and the Utilization value is not displayed even in the normal output, where the human-readable parameter is not included in the command.

switch(config-if)# show interface 1/1/1 human-readable

Interface 1/1/1 is up

Rate

RX

TX

Total (RX+TX)

---------------- -------------------- -------------------- --------------------

Bits / sec

3M

3M

6M

Pkts / sec

316

316

633

Unicast

319

319

638

Multicast

0

0

0

Broadcast

0

0

0

Utilization %

<1

<1

<1

Statistic

RX

TX

Total

---------------- -------------------- -------------------- --------------------

Packets

577K

577K

1M

Unicast

577K

577K

1M

Multicast

0

51

51

Broadcast

0

15

15

Bytes

744M

745M

1G

Jumbos

0

0

0

Dropped

0

0

0

Filtered

0

0

0

Pause Frames

0

0

0

Errors

0

0

0

CRC/FCS

0

n/a

0

Collision

n/a

0

0

Runts

0

n/a

0

Giants

0

n/a

0

Showing information about extended counters:
The output of the show interface extended command varies depending on the switch model and configuration.

switch(config-if)# show interface 1/1/17 extended

-------------------------------------------------------------------

Interface 1/1/17

-------------------------------------------------------------------

Statistics

Value

-------------------------------------------------------------------

Dot1d Tp Port In Frames

547

L1-100Mbps downshift commands | 1177

Dot1d Tp Port Out Frames

608

Dot3 In Pause Frames

0

Dot3 Out Pause Frames

0

Ethernet Stats Broadcast Packets

19

Ethernet Stats Bytes

40162

Ethernet Stats Packets

342

...

-------------------------------------------------------------------

Error-Statistics

Value

-------------------------------------------------------------------

Dot1d Base Port MTU Exceeded Discards

0

Dot3 Control In Unknown Opcodes

0

Dot3 Stats Alignment Errors

0

Dot3 Stats FCS Errors

0

Dot3 Stats Frame Too Longs

0

Dot3 Stats Internal Mac Transmit Errors

0

Ethernet RX Oversize Packets

0

...

Showing interface link-status:

switch# show interface link-status -------------------------------------------------------------

Port

Type

Physical Link

Last

Link State Transitions Change

-------------------------------------------------------------

1/1/1

1G-BT

down

0

--

1/1/2

1G-BT

up

1

1 minute ago (Fri Mar 09

12:36:56 UTC 2018)

1/1/3

1G-BT

up

1

1 minute ago (Fri Mar 09

12:36:56 UTC 2018)

1/1/4

--

down

0

--

1/1/5

--

down

0

--

Showing interface loopback 1 link-status:

-------------------------------------------------------------

Physical Link

Last

Port

Type

Link State Transitions Change

-------------------------------------------------------------

loopback1

--

up

--

--

Showing interface 1/1/2-1/1/3 link-status:

-------------------------------------------------------------

Physical Link

Last

Port

Type

Link State Transitions Change

-------------------------------------------------------------

1/1/2

1G-BT

up

1

1 minute ago (Fri Mar 09

12:36:56 UTC 2018)

1/1/3

1G-BT

up

1

1 minute ago (Fri Mar 09

12:36:56 UTC 2018)

Showing interface link-status:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1178

switch# show interface link-status

-------------------------------------------------------------------------

Port

Type

Physical Link

Link Flaps Last

Link State Transitions Ignored

Change

-------------------------------------------------------------------------

1/1/1

1G-BT

down

0

0

--

1/1/2

1G-BT

up

1

0

1 minute ago

(Fri Mar 09 12:36:56 UTC 2018)

1/1/3

1G-BT

up

1

0

1 minute ago

(Fri Mar 09 12:36:56 UTC 2018)

1/1/4

--

down

0

0

--

1/1/5

--

down

0

0

--

For more information on features that use this command, refer to the Fundamentals Guide or the Monitoring Guide for your switch model.

Command History

Release 10.11 10.10 10.07 or earlier

Modification Added monitor parameter. Added human-readable parameter. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show interface downshift-enable
show interface [<IFNNAME>|<IFRANGE>] downshift-enable
Description
Displays speed downshift information, including the interface speed status and configuration.

Parameter <IFNAME> <IFRANGE>

Description Specifies a interface name. Specifies the port identifier range.

Examples
Showing automatic downshift information:

L1-100Mbps downshift commands | 1179

switch(config-if)# show interface downshift-enable

-------------------------------------------------

Downshift

Speed

Port

Enabled | Active Status | Config

-------------------------------------------------

1/1/1

yes

yes

100M-FDx auto

1/1/2

yes

no

1G

auto

1/1/3

yes

no

100M-FDx 100M-FDx

1/1/4

no

no

--

auto

Showing automatic downshift information on per interface:

switch(config-if)# show interface 1/1/2 downshift-enable

-------------------------------------------------

Downshift

Speed

Port

Enabled | Active Status | Config

-------------------------------------------------

1/1/2

yes

no

1G

auto

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config interface
show running-config interface [<IFNNAME>|<IFRANGE>] show running-config interface [lag | loopback | tunnel | vlan ] [<ID>]
Description
Displays active configurations of various switch interfaces.

Parameter <IFNAME> <IFRANGE>

Description Specifies a interface name. Specifies the port identifier range.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1180

Parameter LAG LOOPBACK TUNNEL VLAN <LAG-ID> <LOOPBACK-ID> <TUNNEL-ID> <VLAN-ID> VXLAN <VXLAN-ID>

Description Specifies LAG interface information Specifies loopback interface information. Specifies tunnel interface information. Specifies VLAN interface information. Specifies the LAG number. Range: 1-256. Specifies the LOOPBACK number. Range: 0-255. Specifies the tunnel ID. Range: 1-255. Specifies the VLAN ID. Range: 1-4094. Specifies the VXLAN interface information. Specifies the VXLAN interface identifier. Default: 1.

Examples
Showing 1/1/2 interface configuration:

switch(config-if)# show running-config interface 1/1/2
interface 1/1/2 no shutdown description DC-23 exit

Showing loopback interfaces configured:

switch(config-if)# show running-config interface loopback
interface loopback 1 description lb interface 1 exit
interface loopback 2 description lb interface 2 exit

Showing loopback interfaces not configured:

switch(config-if)# show running-config interface loopback No loopback interfaces configured.

For more information on features that use this command, refer to the Monitoring Guide for your switch model.
Command History

L1-100Mbps downshift commands | 1181

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1182

Chapter 66 LACP and LAG commands

LACP and LAG commands

description
description <TEXT> no description <TEXT>
Description
Provides a brief description of the LAG interface. The description text is saved in the configuration of the LAG. It is available even after a reboot. The no form of this command removes the description of the LAG interface from the configuration.

Parameter <TEXT>

Description Specifies the description of the LAG interface.

Example

switch(config)# interface lag 10 switch(config-lag-if)# description This LAG is used for an example. switch(config-lag-if)# show running-config ... vlan 1 interface lag 10
description This LAG is used for an example. interface lag 60 switch(config-lag-if)#

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide

1183

hash
hash [l2-src-dst | l3-src-dst | l4-src-dst]
Description
This command controls the selection of an interface in a group of aggregate interfaces. The hash type value helps transmit a frame. This configuration must be done at the LAG interface level.

Parameter l2-src-dst l3-src-dst
l4-src-dst

Description
Specifies the load-balancing calculation to include only layer 2 items, such as source and destination MAC addresses.
Specifies the load-balancing calculation to include only layer 3 items, such as source and destination IP addresses. Default setting.
Specifies the load-balancing calculation to include only layer 4 items, such as source and destination UDP/TCP ports.

Example

switch(config-lag-if)# hash l2-src-dst

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

interface lag
interface lag <ID> no interface lag <ID>
Description
Creates a Link Aggregation Group (LAG) interface represented by an ID. The no form of this command deletes a LAG interface represented by an ID.

LACP and LAG commands | 1184

Parameter <ID>

Description Specifies a LAG interface ID.

Usage
Keep in mind the following requirements when adding interfaces to a LAG:
n To determine the maximum number of LAG interfaces for your type of switch, look at the output from the show capacities lag command; however, the number of LAGs that can be created depends on the availability of the physical interface since each LAG interface needs at least one physical interface as a member link.
n After the maximum limit of members is reached in a LAG, an additional port cannot be added to the aggregation group. If a port belongs to a card type with a different speed than the other aggregation members, the port can still be added to the aggregation group. If dynamic LAG is enabled, any port member with a speed different than other aggregation members is blocked or ineligible from the same aggregation group. Any operational keys/attributes or configuration changes might affect the aggregation states of the member ports.
n The nondefaults configuration on an interface is removed automatically when the interface is added to a link aggregation. For example: Assume that you remove a member interface from an existing LAG and add it to another LAG. The software removes the nondefault configurations on the interface when it is added to the new LAG.
Examples
Creating a Link Aggregation Group (LAG) interface represented by an ID of 100:

switch(config)# interface lag 100

Deleting a Link Aggregation Group (LAG) interface represented by an ID of 100:

switch(config)# no interface lag 100

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1185

ip address
ip address <IPV4-ADDR>/<MASK> [secondary] no ip address <IPV4-ADDR>/<MASK> [secondary]
Description
Sets an IPv4 address and subnet mask to a LAG interface. One primary and up to 31 secondary address can be configured per interface. The no form of this command removes the IPv4 address from the interface.

Parameter <IPV4-ADDR>
<MASK> secondary

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. You can remove leading zeros. For example, the address 192.169.005.100 becomes 192.168.5.100.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 32.
Specifies a secondary IP address.

Examples
Setting an IP address on the LAG interface 1 to 198.51.100.1 with a mask of 24 bits:

switch(config)# interface lag 1 switch(config-lag-if)# ip address 198.51.100.1/24

Removing the IP address 198.51.100.1 with a mask of 24 bits from LAG interface 1:

switch(config)# interface lag 1 switch(config-lag-if)# no ip address 198.51.100.1/24

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 address

LACP and LAG commands | 1186

ipv6 address <IPV6-ADDR>/<MASK> no ipv6 address <IPV6-ADDR>/<MASK>
Description
Sets an IPv6 address and subnet mask to a LAG interface. The no form of this command removes the IPv6 address from the interface.

Parameter <IPV6-ADDR>
<MASK>

Description
Specifies the IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. You can use two colons (::) to represent consecutive zeros (but only once), remove leading zeros, and collapse a quartet of four zeros to a single 0. For example, this address 2222:0000:3333:0000:0000:0000:4444:0055 becomes 2222:0:3333::4444:55.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.

Examples
Setting the IPv6 address on LAG interface 1 to 2001:0db8:85a3::8a2e:0370:7334 with a mask of 24 bits:

switch(config)# interface lag 1 switch(config-lag-if)# ipv6 address 2001:0db8:85a3::8a2e:0370:7334/24

Removing the IP address 2001:0db8:85a3::8a2e:0370:7334 with mask of 24 bits with a mask of 24 bits from LAG interface 1:

switch(config)# interface lag 1 switch(config-lag-if)# no ipv6 address 2001:0db8:85a3::8a2e:0370:7334/24

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

lacp fallback

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1187

lacp fallback no lacp fallback
Description
Configures the LACP fallback on LAG port. The no form of this command sets the LAG to BLOCK state if no LACP partner is detected.
Usage
This makes members of the LAG function as non-bonded interfaces when no LACP partner is detected. This configuration is only applicable when the LAG is of type MCLAG. If the member port does not get an LACP frame, the port is in IE state.
Examples
Configuring LACP fallback on LAG port.
switch(config)# int lag 1 multi-chassis switch(config-lag-if)# no sh switch(config-lag-if)# lacp mode active switch(config-lag-if)# lacp fallback
Configuring the LAG to BLOCK state when no LACP partner is detected.
switch(config)# int lag 1 multi-chassis switch(config-lag-if)# no sh switch(config-lag-if)# lacp mode active switch(config-lag-if)# no lacp fallback

Release 10.07 or earlier

Command Information

Platforms 6400

Command context
config-if config-lag-if

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

lacp fallback-static
lacp fallback-static no lacp fallback-static
Description
Configures the LACP fallback-static on LAG port. The no form of this command sets the LAG to BLOCK state if no LACP partner is detected.
Usage

LACP and LAG commands | 1188

This makes members of the LAG function as non-bonded interfaces when no LACP partner is detected. One member interface that is part of the LAG stays up and forwards traffic, while the other members are in lacp-block state. This configuration is applicable when the lag is of type LACP and ignored in other cases. When this command is configured, only one member of LAG is selected to be UP. Enabling multiple members results in configuration mismatch on peer, loop, mac-learning issues, and more.
Examples
Configuring LACP fallback-static on LAG port.
switch(config)# interface lag 1 switch(config-lag-if)# lacp mode active switch(config-lag-if)# lacp fallback-static
Configuring the LAG to BLOCK state when no LACP partner is detected.
switch(config)# interface lag 1 switch(config-lag-if)# no lacp fallback-static
Configuring LACP fallback-static on static port.
switch(config-lag-if)# lacp fallback-static Cannot enable LACP fallback-static on static LAG.

Release 10.11

Command Information

Platforms All platforms

Command context
config-if config-lag-if

Modification Command introduced.
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

lacp mode
lacp mode {active | passive} no lacp mode {active | passive}
Description
Sets an LACP mode to active or passive. The no form of this command sets the LACP mode to off, returning the LAG to a static mode aggregation.

Parameter active

Description Specifies that the local switch will transmit LACP Data Units

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1189

Parameter passive

Description
(LACPDUs) to attempt to negotiate with the remote device.
Specifies that the local switch will listen for LACPDUs from the remote device for LACP negotiation.
NOTE: A momentary traffic drop occurs because LACP partners reconverge when changing the mode from active to passive or from passive to active.

Examples
Setting the LACP mode to active:
switch(config)# interface lag 1 switch(config-lag-if)# lacp mode active
Setting the LACP mode to off:
switch(config)# interface lag 1 switch(config-lag-if)# no lacp mode active

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

lacp port-id
lacp port-id <PORT-ID> no lacp port-id
Description
Sets the LACP port ID value of the member interface of the LAG. The no form of this command removes the LACP port ID value from the interface.

LACP and LAG commands | 1190

Parameter <PORT-ID>

Description Specifies a port ID value. Range: 1 to 65535.

Examples
Setting an LACP port ID to a value of 10:

switch(config-if)# lacp port-id 10

Removing the LACP port ID value:

switch(config-if)# no lacp port-id

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

lacp port-priority
lacp port-priority <PORT-PRIORITY> no lacp port-priority
Description
Sets an LACP port priority value for the member interface of the LAG. The no form of this command reverts the LACP port priority to the default, which is 1.

Parameter <PORT-PRIORITY>

Description Specifies a port priority value. Range: 1 to 65535.

Examples
Setting a LACP port priority value of 10:

switch(config-if)# lacp port-priority 10

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1191

Reverting the LACP port ID to the default: switch(config-if)# no lacp port-priority

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

lacp rate
lacp rate {fast | slow} no lacp rate {fast | slow}
Description
Sets an LACP heartbeat request time to fast or slow. The no form of the command sets an LACP rate to slow.

Parameter fast
slow

Description
Specifies the heartbeat request to every second, and the timeout period is a three-consecutive heartbeat loss that is 3 seconds.
Specifies the heartbeat request to every 30 seconds. The timeout period is three-consecutive heartbeat loss that is 90 seconds. Default setting.

Examples
Setting the LACP heartbeat request time to fast:

switch(config)# interface lag 1 switch(config-lag-if)# lacp rate fast

LACP and LAG commands | 1192

Resetting the LACP heartbeat request time to the default, which is slow:
switch(config)# interface lag 1 switch(config-lag-if)# no lacp rate
Another way to set the LACP heartbeat request time to the default, which is slow:
switch(config)# interface lag 1 switch(config-lag-if)# lacp rate slow

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

lacp system-priority
lacp system-priority <SYSTEM-PRIORITY-VALUE> no lacp system-priority <SYSTEM-PRIORITY-VALUE>
Description
Sets a Link Aggregation Control Protocol (LACP) system priority. The no form of this command sets an LACP system priority to the default, which is 65534.

Parameter <SYSTEM-PRIORITY-VALUE>

Description Specifies a system priority value. Range: 0 to 65535.

Examples
Setting a Link Aggregation Control Protocol (LACP) system priority to 100:

switch(config)# lacp system-priority 100

Setting an LACP system priority to the default (65534):

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1193

switch(config)# no lacp system-priority
A momentary traffic drop can be seen in case the LACP state machine must renegotiate. For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

lag
lag <ID> no lag <ID>
Description
Adds an interface to a specified LAG interface ID. The no form of this command removes an interface from a specified LAG interface ID. The member loses its LACP configuration when removed from the LAG. The member also reaches the default state with an administrative shutdown. For 6300 and 6400 series switches, the administrative state is enabled. Configurations, such as MTU and UDLD, are retained.

Parameter <ID>

Description Specifies a LAG interface ID. Range: 1 to 256.

Usage
n All members of the LAG must have the same speed. If a member comes up late with a different speed, it will not participate in the LAG/LACP. The hardware restriction is applied before adding an interface to LAG. The member belongs to the card type that has the same maximum speed as the reference port card type.
n To move an interface from LagA to LagB, first remove the interface from LagA and then add it to LagB. When a member is attached to a LAG, the nondefault configurations on the member are removed silently.
n After removing a physical interface from a LAG, the interface associated with the LAG becomes L3 ports with default L3 configurations and administrative down. For example, suppose interface 1/1/1 was part of LAG 3 and you had administratively enabled the interface. If you later remove interface

LACP and LAG commands | 1194

1/1/1 from LAG 3, the administrative status automatically changes to down. If you want to use the interface again, you must administratively enable it again.
Examples
Adding an interface to a Link Aggregation Group (LAG) represented by an ID of 100:
switch(config)# interface 1/1/1 switch(config-if)# lag 100
Deleting an interface from a Link Aggregation Group (LAG) represented by an ID of 100:
switch(config)# interface 1/1/1 switch(config-if)# no lag 100

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

show interface
show interfaces <LAG-NAME> [vsx-peer]
Description
Displays information about a specific LAG.

Parameter <LAG-NAME> vsx-peer

Description
Specifies a LAG name.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Displaying information about LAG 100:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1195

switch# show interface lag100

Aggregate lag100 is up

Admin state is up

Description :

MAC Address

: 48:0f:cf:af:43:9c

Aggregated-interfaces

: 1/1/2

Aggregation-key

: 100

Aggregate mode

: active

Speed

: 2000 Mb/s

L3 Counters: Rx Disabled, Tx Disabled

qos trust none

VLAN Mode: access

Access VLAN: 1

Statistics

RX

TX

Total

------------- -------------------- -------------------- --------------------

Packets

20

45

65

Unicast

5

5

10

Multicast

5

15

20

Broadcast

10

25

35

Bytes

5658

2584

8242

Jumbos

0

0

0

Dropped

0

0

0

Filtered

0

0

0

Pause Frames

0

0

0

Errors

0

0

0

CRC/FCS

0

n/a

0

Collision

n/a

0

0

Runts

0

n/a

0

Giants

0

n/a

0

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show lacp aggregates
show lacp aggregates [<LAG-NAME>] [vsx-peer]
Description
Displays all LACP aggregate information configured for all LAGs, or for a specific LAG.

LACP and LAG commands | 1196

Parameter <LAG-NAME> vsx-peer

Description
Optional: Specifies a lag name.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Displaying LACP aggregate information configured for lag10:

switch# show lacp aggregates lag10

Aggregate-name

: lag10

Aggregated-interfaces : 1/1/1 1/1/2

Heartbeat rate

: slow

Hash

: l3-src-dst

Aggregate mode

: active

Displaying LACP aggregates:

switch# show lacp aggregates

Aggregate-name

: lag1

Aggregated-interfaces : 1/1/27 1/1/28 1/1/29

Heartbeat rate

: slow

Hash

: l3-src-dst

Aggregate mode

: active

Aggregate-name

: lag2

Aggregated-interfaces : 1/1/48

Heartbeat rate

: slow

Hash

: l2-src-dst

Aggregate mode

: passive

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1197

show lacp configuration
show lacp configuration [vsx-peer]
Description
Displays global LACP configuration.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Displaying global LACP configuration:

switch# show lacp configuration

System-id

: 98:f2:b3:68:40:a0

System-priority : 65534

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show lacp interfaces
show lacp interfaces [<IFNAME>] [vsx-peer]
Description
Displays an LACP configuration of the physical interfaces, including VSXs. If an interface name is passed as argument, it only displays an LACP configuration of a specified interface.

LACP and LAG commands | 1198

Parameter <IFNAME> vsx-peer

Description
Optional: Specifies an interface name.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
This example displays an LACP configuration of the physical interfaces. One of the interfaces has the lacp-block forwarding state. If a VSX switch has loop protect enabled on an interface and a loop occurs, VSX blocks the interface to stop the loop. The forwarding state of the blocked interface is set to lacpblock.

switch# show lacp interfaces

State abbreviations :

A - Active

P - Passive

F - Aggregable I - Individual

S - Short-timeout L - Long-timeout N - InSync

O - OutofSync

C - Collecting D - Distributing

X - State m/c expired

E - Default neighbor state

Actor details of all interfaces:

----------------------------------------------------------------------------------

--

Intf Aggr Port Port State System-id

System Aggr Forwarding

name id

Pri

Pri

Key State

----------------------------------------------------------------------------------

--

1/1/1 lag10 17

1

ALFOE 70:72:cf:37:a3:5c 20

10 lacp-block

1/1/2 lag128 69

1

ALFNCD 70:72:cf:37:a3:5c 20

128 up

1/1/3 lag128 14

1

ALFNCD 70:72:cf:37:a3:5c 20

128 up

1/1/4 lag128

down

1/1/5 lag20

up

Partner details of all interfaces:

------------------------------------------------------------------------------

Intf Aggr Partner Port

State

System-id

System Aggr

name Port-id Pri

Priority Key

------------------------------------------------------------------------------

1/1/1 lag10 0

65534 PLFOEX 00:00:00:00:00:00 65534 0

1/1/2 lag128 69

1

PLFNCD 70:72:cf:8c:60:a7 65534 128

1/1/3 lag128 14

1

PLFNCD 70:72:cf:8c:60:a7 65534 128

1/1/4 lag128

1/1/5 lag20

Displaying static LAG:
lacp fallback-staticcannot be configured on static lag. Attempts to configure lacp fallback-static on a static LAG results in the following message: Cannot enable LACP-fallback static on static LAG.

switch# show lacp interfaces

State abbreviations :

A - Active

P - Passive

F - Aggregable I - Individual

S - Short-timeout L - Long-timeout N - InSync

O - OutofSync

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1199

C - Collecting D - Distributing

X - State m/c expired

E - Default neighbor state

Actor details of all interfaces:

------------------------------------------------------------------------------

Intf Aggr Port Port State System-id

System Aggr Forwarding

Name Id

Pri

Pri

Key State

------------------------------------------------------------------------------

1/1/1 lag10

up

1/1/2 lag10

up

Partner details of all interfaces:

------------------------------------------------------------------------------

Intf Aggr Port Port State System-id

System Aggr

Name Id

Pri

Pri

Key

------------------------------------------------------------------------------

1/1/1 lag10

1/1/2 lag10

Displaying an LACP configuration of the 1/1/1 interface:

switch# show lacp interfaces 1/1/1

State abbreviations :

A - Active

P - Passive

F - Aggregable I - Individual

S - Short-timeout L - Long-timeout N - InSync

O - OutofSync

C - Collecting D - Distributing

X - State m/c expired

E - Default neighbor state

Aggregate-name : lag1

-------------------------------------------------

Actor

Partner

-------------------------------------------------

Port-id

| 28

| 31

Port-priority

|1

|1

Key

|1

|1

State

| ALFNCD

| ALFNCD

System-id

| 98:f2:b3:68:40:a0 | 98:f2:b3:68:60:a6

System-priority | 65534

| 65534

Displaying an LACP configuration after loop-protect is enabled on the primary VSX switch:

switch# show lacp interfaces

State abbreviations :

A - Active

P - Passive

F - Aggregable I - Individual

S - Short-timeout L - Long-timeout N - InSync

O - OutofSync

C - Collecting D - Distributing

X - State m/c expired

E - Default neighbor state

Actor details of all interfaces:

------------------------------------------------------------------------------

Intf Aggr

Port Port State System-ID

System Aggr Forwarding

Name

Id Pri

Pri Key State

------------------------------------------------------------------------------

1/4/14 lag1(mc) 206 1

ALFNCD f8:60:f0:06:49:00 65534 1 up

1/5/15 lag2(mc)

down

LACP and LAG commands | 1200

Partner details of all interfaces:

------------------------------------------------------------------------------

Intf Aggr

Port Port State System-ID

System Aggr

Name

Id Pri

Pri Key

------------------------------------------------------------------------------

1/4/14 lag1(mc) 130 1

ALFNCD f8:60:f0:06:87:00 65534 1

1/5/15 lag2(mc)

Displaying an LACP configuration after loop-protect is enabled on the secondary VSX switch:

switch# show lacp interfaces

State abbreviations :

A - Active

P - Passive

F - Aggregable I - Individual

S - Short-timeout L - Long-timeout N - InSync

O - OutofSync

C - Collecting D - Distributing

X - State m/c expired

E - Default neighbor state

Actor details of all interfaces:

------------------------------------------------------------------------------

Intf Aggr

Port Port State System-ID

System Aggr Forwarding

Name

Id Pri

Pri Key State

------------------------------------------------------------------------------

1/3/2 lag1(mc) 1130 1

ALFNCD f8:60:f0:06:49:00 65534 1 up

1/9/3 lag2(mc)

down

Partner details of all interfaces:

------------------------------------------------------------------------------

Intf Aggr

Port Port State System-ID

System Aggr

Name

Id Pri

Pri Key

------------------------------------------------------------------------------

1/3/2 lag1(mc) 131 1

ALFNCD f8:60:f0:06:87:00 65534 1

1/9/3 lag2(mc)

Displaying an LACP configuration with LACP fallback:

switch# show lacp interfaces

State abbreviations :

A - Active

P - Passive

F - Aggregable I - Individual

S - Short-timeout L - Long-timeout N - InSync

O - OutofSync

C - Collecting D - Distributing

X - State m/c expired

E - Default neighbor state

Actor details of all interfaces:

----------------------------------------------------------------------------------

Intf

Aggr

Port Port State System-ID

System Aggr Forwarding

Name

Id Pri

Pri Key State

----------------------------------------------------------------------------------

1/1/4

lag10

5

1

IE

ec:eb:b8:e4:29:00 65534 10 up

1/1/5

lag10

6

1

IE

ec:eb:b8:e4:29:00 65534 10 lacp-block

1/1/6

lag10

7

1

IE

ec:eb:b8:e4:29:00 65534 10 lacp-block

1/3/27

lag10

156 1

IE

ec:eb:b8:e4:29:00 65534 10 lacp-block

1/1/9

lag20(mc) 9

1

IE

ec:eb:b8:e4:29:00 65534 10 up

Partner details of all interfaces:

----------------------------------------------------------------------------------

Intf

Aggr

Port Port State System-ID

System Aggr

Name

Id Pri

Pri Key

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1201

----------------------------------------------------------------------------------

1/1/4

lag10

0

0

IE

00:00:00:00:00:00 0

0

1/1/5

lag10

0

0

IE

00:00:00:00:00:00 0

0

1/1/6

lag10

0

0

IE

00:00:00:00:00:00 0

0

1/3/27

lag10

0

0

IE

00:00:00:00:00:00 0

0

1/1/9

lag20(mc) 0

0

IE

00:00:00:00:00:00 0

0

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History

Release 10.11 10.11 10.07 or earlier

Modification LACP fallback-static added. LACP fallback added on VSX-supported platforms. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show lag
show lag <LAG-ID>
Description
Displays the lag.
Parameter <LAG-ID>

Description Specifies the lag ID.

Examples
Displaying the lag.

switch# show lag

System-ID

: f4:03:43:80:4a:00

System-priority : 65534

Hash

: l3-src-dst

Aggregate lag1 is down

Admin state is down

Description :

LACP and LAG commands | 1202

Type Lacp Fallback MAC Address Aggregated-interfaces Aggregation-key Aggregate mode LACP rate Speed Mode

: normal : n/a : f4:03:43:80:4a:00 : :1 : static : n/a : 0 Mb/s : routed

Aggregate lag128 is down

Admin state is down

Description :

Type

: normal

Lacp Fallback

: n/a

MAC Address

: f4:03:43:80:4a:00

-- MORE --, next page: Space, next line: Enter, quit: q

Displaying the lag when lacp fallback-static is enabled.

switch# show lag

System-ID

: 90:20:c2:24:60:00

System-priority : 65534

Aggregate lag1 is up Admin state is up Description : Type Lacp Fallback MAC Address Aggregated-interfaces Aggregation-key Aggregate mode Hash LACP rate Speed Mode

: normal : Enabled : 90:20:c2:24:60:00 : 1/1/1 1/1/2 1/1/3 1/1/46 1/1/47 1/1/48 :1 : active : l3-src-dst : slow : 1000 Mb/s : trunk

Release 10.11 10.07 or earlier

Modification LACP fallback-static added. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config interface lag
show running-config interface lag

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1203

Description
Displays the running configuration for interface lag.
Examples
Displaying the running configuration for interface lag.
switch# show running-config interface lag interface lag 10 multi-chassis
no shutdown no routing vlan trunk native 1 vlan trunk allowed 10-12 lacp mode active exit interface lag 11 multi-chassis no shutdown no routing vlan trunk native 1 vlan trunk allowed 10-12,2001 lacp mode active exit interface lag 256 description VSX_ISL no shutdown no routing vlan trunk native 1 tag vlan trunk allowed all lacp mode active exit
Displaying the running configuration for interface lag with lacp fallback-static configured.
switch# show running-config interface lag interface lag 1
no shutdown no routing vlan trunk native 1 vlan trunk allowed all lacp mode active lacp fallback-static
shutdown
shutdown no shutdown
Description
Sets every interface in the LAG operationally down. The no form of this command sets every interface operationally up.
Examples
Setting every interface in the LAG to shutdown:
LACP and LAG commands | 1204

switch(config)# interface lag 1 switch(config-lag-if)# shutdown
Resetting every interface in the LAG to the default (up):
switch(config)# interface lag 1 switch(config-lag-if)# no shutdown

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

vlan trunk native
vlan trunk native <VLAN-ID> no vlan trunk native [<VLAN-ID>]
Description
Assigns a native VLAN ID to a LAG interface. The no form of this command removes a native VLAN from a LAG interface and assigns VLAN ID 1 as its native VLAN.

Parameter <VLAN-ID>

Description
Specifies the number of the VLAN ID to assign. The VLAN ID must exist. Maximum number of VLANs supported: 4096 (6300, 6400) VLAN ID range: 2 to 4094.

Usage
By default, VLAN ID 1 is assigned as the LAG VLAN ID for all LAG interfaces. VLANs can only be assigned to a nonrouted (layer 2) interface or LAG interface.
Only one VLAN ID can be assigned as the native VLAN. For the interface to forward the native VLAN traffic, the interface has to be allowed explicitly by entering vlan trunk allowed <ID> where the ID is the native VLAN ID. This setting is also applicable to the physical interface.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1205

Examples
Configuring a layer 2 dynamic aggregation group with native VLAN ID 1 assigned to LAG 1: For 6300, 6400, 8100, 8320, 8325, 8360, 8400, 9300, and 10000 switch series:
switch(config)# interface lag 1 switch(config-lag-if)# no shutdown switch(config-lag-if)# no routing switch(config-lag-if)# lacp mode active switch(config-lag-if)# vlan trunk native 1 switch(config-lag-if)# vlan trunk allowed 1
Configuring a layer 2 dynamic aggregation group with native VLAN ID 20 assigned to LAG 1: For 6300, 6400, 8100, 8320, 8325, 8360, 8400, 9300, and 10000 switch series:
switch(config)# interface lag 1 switch(config-lag-if)# no shutdown switch(config-lag-if)# no routing switch(config-lag-if)# lacp mode active switch(config-lag-if)# vlan trunk native 20 switch(config-lag-if)# vlan trunk allowed 20
Removing a native VLAN from LAG 1:
switch(config)# interface lag 1 switch(config-lag-if)# no vlan trunk native

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

LACP and LAG commands | 1206

Chapter 67 LLDP commands

LLDP commands
clear lldp neighbors
clear lldp neighbors
Description
Clears all LLDP neighbor details.
Examples
Clearing all LLDP neighbor details:
switch# clear lldp neighbors

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

clear lldp statistics
clear lldp statistics
Description
Clears all LLDP neighbor statistics.
Examples
Clearing all LLDP neighbor statistics:

AOS-CX 10.14 Command-Line Interface Guide

1207

switch# clear lldp statistics

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

lldp
lldp no lldp
Description
Enables LLDP support globally on all active interfaces. By default, LLDP is enabled. The no form of this command disables LLDP support globally on all active interfaces. It does not remove any LLDP configuration settings.
Examples
Enabling LLDP:
switch(config)# lldp
Disabling LLDP:
switch(config)# no lldp

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

LLDP commands | 1208

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

lldp dot3
lldp dot3 {poe | macphy} no lldp dot3 {poe | macphy}
Description
Sets the 802.3 TLVs to be advertised. By default, advertisement of both POE and MAC/PHY TLVs is enabled. Not supported on the OOBM interface. The no form of this command disables advertisement of 802.3 TLVs.

Parameter poe
macphy

Description
Specifies advertisement of power over Ethernet data link classification.
Specifies advertisement of media access control and physical layer information.

Examples
Enabling advertisement of the POE TLV:

switch(config-if)# lldp dot3 poe

Disabling advertisement of the POE TLV:

switch(config-if)# no lldp dot3 poe

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1209

Platforms All platforms

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

lldp dot3 eee
lldp dot3 eee no lldp dot3 eee
Description
Sets the 802.3 TLVs for Energy-Efficient Ethernet (EEE) to be advertised. By default, advertisement of EEE TLVs is enabled. Not supported on the OOBM interface. The no form of this command disables advertisement of 802.3 TLVs.

Parameter eee

Description Specifies advertisement of 802.3 TLVs for EEE.

Examples
Enabling advertisement of the EEE TLVs:

switch(config-if)# lldp dot3 eee

Disabling advertisement of the EEE TLVs:

switch(config-if)# no lldp dot3 eee

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

lldp dot3 mfs
lldp dot3 mfs

LLDP commands | 1210

no lldp dot3 mfs
Description
Enables the 802.3 TLV list in LLDP to advertise for maximum frame size (MFS). Enabled by default. The no form of this command disables the advertisement of maximum frame size TLVs.
Examples
Enabling advertisement of maximum frame size TLVs:

switch(config)# interface 1/1/1 switch(config-if)# lldp dot3 mfs

Disabling advertisement of maximum frame size TLVs:

switch(config)# interface 1/1/1 switch(config-if)# no lldp dot3 mfs

Command History
Release 10.11
Command Information
Platforms Command context All platforms config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

lldp holdtime-multiplier
lldp holdtime-multiplier <multiplier> no lldp holdtime-multiplier
Description
Sets the holdtime TTL multiplier value that is used to calculate the LLDP Time-to-Live value. Time-to-Live defines the length of time that neighbors consider LLDP information sent by this agent as valid. When Time-to-Live expires, the information is deleted by the neighbor. Time-to-live is calculated by multiplying holdtime by the value of lldp timer. The no form of this command sets the holdtime TTL multiplier to its default value of 4.

Parameter <multiplier>

Description Specifies the TTL multiplier in the range of 2 to 10. Default: 4.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1211

Formula
TTL = Holdtime-multiplier x lldp timer where: TTL = Time-to-Live Holdtime-multiplier = Multiplying holdtime value lldp timer = Message transmission interval
Examples
Setting the holdtime to 8 times of the value of lldp timer:

switch(config)# lldp holdtime-multiplier 8

Setting the holdtime to the default value of 4 times of the value of lldp timer:

switch(config)# no lldp holdtime-multiplier

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

lldp management-address vlan
lldp management-address vlan <VLAN-ID> no lldp management-address vlan <VLAN-ID>
Description
Sets the VLAN whose IPv4 or IPv6 address is advertised as the LLDP management authority. The no form of this command removes the VLAN whose IPv4 or IPv6 address is advertised as the LLDP management authority. The following is the precedence for the management IP address TLV in the LLDP packet (in order):
n LLDP management-IP-address and management-ipv6-address, if configured. n LLDP management VLAN's IPv4 and IPv6 address, if configured. n Loopback IP address from the smallest configured loopback interface identifier. n Route-only-port IP address (Layer-3 interface) or IP address of the SVI (Layer-2 interface). n OOBM IP address. n Base MAC address of the switch.

LLDP commands | 1212

Parameter <VLAN-ID>

Description Specifies the VLAN ID.

Examples
Setting the management authority for VLAN 10:

switch(config)# lldp management-address vlan 10

Removing the management authority for VLAN 10:

switch(config)# no lldp management-address vlan 10

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.12

Command Information

Platforms All platforms

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

lldp management-ip-address
lldp management-ip-address <IPV-ADDR> no lldp management-ip-address
Description
Defines the IP management address of the switch which is sent in the management address TLV. One IPv4 and one IPv6 management address can be configured. If you do not define an LLDP management address, then LLDP uses one of the following (in order):
n IP address of the port n IP address of the management interface n Base MAC address of the switch
The no form of this command removes the IPv4 management address of the switch.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1213

Parameter <IPV4-ADDR>

Description
Specifies the management address of the switch as an IPv4 format (x.x.x.x), where x is a decimal value from 0 to 255.

Examples
Setting the management address to 10.10.10.2:

switch(config)# lldp management-ip-address 10.10.10.2

Removing the management address:

switch(config)# no lldp management-ip-address

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.14

10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification The management-ipv4-address keyword is deprecated and replaced with management-ip-address. --
Authority Administrators or local user group members with execution rights for this command.

lldp management-ipv6-address
lldp management-ipv6-address <IPV6-ADDR> no lldp management-ipv6-address
Description
Defines the IPv6 management address of the switch. The management address is encapsulated in the management address TLV. If you do not define an LLDP management address, then LLDP uses one of the following (in order):
n IP address of the port n IP address of the management interface n Base MAC address of the switch
The no form of this command removes the IPv6 management address of the switch.

LLDP commands | 1214

Parameter <IPV6-ADDR>

Description
Specifies an IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.

Examples
Setting the management address to 2001:db8:85a3::8a2e:370:7334:

switch(config)# lldp management-ipv6-address 2001:0db8:85a3::8a2e:0370:7334

Removing the management address:

switch(config)# no lldp management-ipv6-address

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

lldp med
lldp med [poe [priority-override] | capability | network-policy] no med [poe [priority-override] | capability | network-policy]
Description
Configures support for the LLDP-MED TLV. LLDP-MED (media endpoint devices) is an extension to LLDP developed by TIA to support interoperability between VoIP endpoint devices and other networking enddevices. The switch only sends the LLDP MED TLV after receiving a MED TLV from and connected endpoint device. Not supported on the OOBM interface. The no form of this command disables support for the LLDP MED TLV.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1215

Parameter poe [priority-override]
capability network-policy

Description
Specifies advertisement of power over Ethernet data link classification. The priority-override option overrides userconfigured port priority for Power over Ethernet. When both lldp dot3 poe and lldp med poe are enabled, the lldp dot3 poe3 setting takes precedence. Default: enabled.
Specifies advertisement of supported LLDP MED TLVs. The capability TLV is always sent with other MED TLVs, therefore it cannot be disabled when other MED TLVs are enabled. Default: enabled.
Network policy discovery lets endpoints and network devices advertise their VLAN IDs, and IEEE 802.1p (PCP and DSCP) values for voice applications. This TLV is only sent when a voice VLAN policy is present. Default: enabled.

Examples
Enabling advertisement of the network policy TLV:

switch(config-if)# lldp med network-policy

Disabling advertisement of the network policy TLV:

switch(config-if)# no lldp med network-policy

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

lldp med location
lldp med location {civic-addr elin-addr } no med location {civic-addr elin-addr }
Description

LLDP commands | 1216

Configures support for the LLDP-MED TLV. Supports only civic address and emergency location information number (ELIN). Coordinate-based location is not supported.
The no form of this command disables support for the LLDP MED TLV.

Parameter civic-addr elin-addr

Description
Configures the LLDP MED civic location TLV.
Configures support for the LLDP MED emergency location TLV. This feature is intended for use in ECS applications to support class 3 LLDP-MED VoIP telephones connected to a switch in an MLTS infrastructure. An ELIN is a valid NANP format telephone number assigned to MLTS operators in North America by the appropriate authority. The ELIN is used to route emergency (E911) calls to a PSAP. (Range: 1-15 numeric characters)

The lldp med location civic-addr command requires a minimum of one type/value pair, but typically includes multiple type/value pairs as needed to configure a complete set of data describing a given location.
CAn-TYPE: This is the first entry in a type/value pair and is a number defining the type of data contained in the second entry in the type/value pair (CA-VALUE.) Some examples of CA-TYPE specifiers include: 3=city 6=street (name) 25=building name (Range: 0 - 255)
CAn-VALUE: This is the second entry in a type/value pair and is an alphanumeric string containing the location information corresponding to the immediately preceding CA-TYPE entry. Strings are delimited by either blank spaces, single quotes (' ... '), or double quotes ("... ".) Each string should represent a specific data type in a set of unique type/value pairs comprising the description of a location, and each string must be preceded by a CA-TYPE number identifying the type of data in the string.
The following LLDP-MED TLV values are supported. For details on these value types, refer to RFC 4776
n 1: national subdivisions (state, canton, region, province, prefecture) n 2: county, parish, gun (JP), district (IN) n 3: city, township, shi (JP) n 4: city division, borough, city district, ward, chou (JP) n 5: neighborhood, block n 6: group of streets below the neighborhood level n 16: leading street direction N n 17: trailing street suffix SW n 18: street suffix or type n 19: house number n 20: house number suffix n 21: landmark or vanity n 22: location n 23: name n 24: postal/zip code n 25: building (structure) n 26: unit (apartment, suite)

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1217

n 27: floor n 28: room n 29: type of place n 30: postal community name n 31: post office box n 32: additional code 13203000003 n 33: seat (desk, cubicle workstation) n 34: primary road name 35 road section n 36: branch road name n 37: sub-branch road name n 38: street name pre-modifier n 39: street name post-modifier
Examples
Enabling support for the LLDP MED emergency location TLV:
switch(config-if)# lldp med location elin-addr 408-555-1212
Disabling support for the LLDP MED emergency location TLV:
switch(config-if)# no lldp med location elin-addr 408-555-1212
Enabling support for the LLDP MED civic address TLV:
switch(config-if)# lldp med location civic-addr US 1 19 123 6 Fake 18 Street
Disabling support for the LLDP MED civic address TLV:
switch(config-if)# no lldp med location civic-addr US 1 19 123 6 Fake 18 Street

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

LLDP commands | 1218

lldp receive
lldp receive no lldp receive
Description
Enables reception of LLDP information on an interface. By default, LLDP reception is enabled on all active interfaces, including the OOBM interface. The no form of this command disables reception of LLDP information on an interface.
Examples
On the 6400 Switch Series, interface identification differs. Enabling LLDP reception on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# lldp receive
Disabling LLDP reception on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no lldp receive
Enabling LLDP reception on the OOBM interface:
switch(config)# interface mgmt switch(config-if)# lldp receive
Disabling LLDP reception on the OOBM interface:
switch(config)# interface mgmt switch(config-if)# no lldp receive

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1219

lldp reinit
lldp reinit <TIME> no lldp reinit
Description
Sets the amount of time (in seconds) to wait before performing LLDP initialization on an interface. The no form of this command sets the reinitialization time to its default value of 2 seconds.

Parameter <TIME>

Description
Specifies the reinitialization time in seconds. Range: 1 to 10. Default: 2 seconds.

Examples
Setting the reinitialization time to 5 seconds:

switch(config)# lldp reinit 5

Setting the reinitialization time to the default value of 2 seconds:

switch(config)# no lldp reinit

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

lldp select-tlv
lldp select-tlv <TLV-NAME> no lldp select-tlv <TLV-NAME>
Description
Selects a TLV that the LLDP agent will send and receive. By default, all supported TLVs are sent and received. The no form of this command stops the LLDP agent from sending and receiving a specific TLV.

LLDP commands | 1220

LLDP supports Organization Unique Identifiers (OUI) with the following Organization-specific TLVs: n IEEE 802.1 (DOT1) (oui:0x00, 0x80, 0xc2) n IEEE 802.3 (DOT3) (oui:0x00, 0x12, 0x0f) n Aruba, a Hewlett Packard Enterprise Company (oui:0x88, 0x3a, 0x30)

Parameter select-tlv <TLV-NAME>

Description
Specifies the TLV name to send. The following TLV names are supported:
n management-address: Selection is based on priority in the following list (for example if first TLV name isn't selected, the next will be, progressing through this list until a selection is made): 1. IPv4 or IPV6 management address. 2. IP address of the lowest configured loopback interface. 3. If layer 3, then the route-only port IP address. If layer 2, the IP address of the SVI. 4. OOBM interface IP address. 5. Base MAC address of the switch.
n port-description: Select port-description TLV. n port-vlan-id: Select port-vlan-id TLV. n port-vlan-name: Select port-vlan-name TLV. n system-capabilities: Select system-capabilities TLV. n system-description: Select system-description TLV. n system-name: Select system-name TLV.

Examples
Stopping the LLDP agent from sending the port-description TLV: switch(config)# no lldp select-tlv port-description
Enabling the LLDP agent to send the port-description TLV: switch(config)# lldp select-tlv oui

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1221

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

lldp timer
lldp timer <TIME> no lldp timer
Description
Sets the interval (in seconds) at which local LLDP information is updated and TLVs are sent to neighboring network devices by the LLDP agent. The minimum setting for this timer must be four times the value of lldp txdelay. For example, this is a valid configuration:
n lldp timer = 16 n lldp txdelay = 4
And, this is an invalid configuration:
n lldp timer = 5 n lldp txdelay = 2
When copying a saved configuration to the running configuration, the value for lldp timer is applied before the value of lldp txdelay. This can result in a configuration error if the saved configuration has a value of lldp timer that is not four times the value of lldp txdelay in the running configuration. For example, if the saved configuration has the settings:
n lldp timer = 16 n lldp txdelay = 4
And the running configuration has the settings: n lldp timer = 30 n lldp txdelay = 7
Then you will see an error indicating that certain configuration settings could not be applied, and you will have to manually adjust the value of lldp txdelay in the running configuration.
The no form of this command sets the update interval to its default value of 30 seconds.

LLDP commands | 1222

Parameter <TIME>

Description
Specifies the update interval (in seconds). Range: 5 to 32768. Default: 30.

Examples
Setting the update interval to 7 seconds:

switch(config)# lldp timer 7

Setting the update interval to the default value of 30 seconds:

switch(config)# no lldp timer

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

lldp transmit
lldp transmit no lldp transmit
Description
Enables transmission of LLDP information on specific interface. By default, LLDP transmission is enabled on all active interfaces, including the OOBM interface. The no form of this command disables transmission of LLDP information on an interface.
Examples
On the 6400 Switch Series, interface identification differs. Enabling LLDP transmission on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# lldp transmit

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1223

Disabling LLDP transmission on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no lldp transmit
Enabling LLDP transmission on the OOBM interface:
switch(config)# interface mgmt switch(config-if)# lldp transmit
Disabling LLDP transmission on the OOBM interface:
switch(config)# interface mgmt switch(config-if)# no lldp transmit

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

lldp txdelay
lldp txdelay <TIME> no lldp txdelay
Description
Sets the amount of time (in seconds) to wait before sending LLDP information from any interface. The maximum value for txdelay is 25% of the value of lldp tx timer. The no form of this command sets the delay time to its default value of 2 seconds.

Parameter <TIME>

Description Specifies the delay time in seconds. Range: 0 to 10. Default: 2.

Examples
Setting the delay time to 8 seconds:

LLDP commands | 1224

switch(config)# lldp txdelay 8 Setting the delay time to the default value of 2 seconds:
switch(config)# no lldp txdelay

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

lldp trap enable
lldp trap enable no lldp trap enable
Description
Enables sending SNMP traps for LLDP related events from a particular interface. LLDP trap generation is enabled by default on all the interfaces and has to be disabled for interfaces on which traps are not required to be generated. The no form of this command disables the LLDP trap generation.
LLDP trap generation is disabled by default at the global level and must be enabled before any LLDP traps are sent.
Examples
Enabling LLDP trap generation on global level:
switch(config)# lldp trap enable
Enabling LLDP trap generation on interface level:
switch(config-if)# lldp trap enable

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1225

Disabling LLDP trap generation on global level:

switch(config)# no lldp trap enable

Disabling LLDP trap generation on interface level:

switch(config-if)# no lldp trap enable

Displaying LLDP global configuration:

switch# show lldp configuration

LLDP Global Configuration

=========================

LLDP Enabled

: No

LLDP Transmit Interval

: 30

LLDP Hold Time Multiplier : 4

LLDP Transmit Delay Interval : 2

LLDP Reinit Timer Interval : 2

LLDP Trap Enabled

: No

TLVs Advertised =============== Management Address Port Description Port VLAN-ID System Description System Name

LLDP Port Configuration

=======================

PORT

TX-ENABLED

RX-ENABLED

INTF-TRAP-ENABLED

--------------------------------------------------------------------------

1/1/1

Yes

Yes

Yes

1/1/2

Yes

Yes

Yes

1/1/3

Yes

Yes

Yes

1/1/4

Yes

Yes

Yes

1/1/5

Yes

Yes

Yes

1/1/6

Yes

Yes

Yes

...........

...........

mgmt

Yes

Yes

Yes

Displaying LLDP Configuration for the interface:

switch# show lldp configuration 1/1/1

LLDP Global Configuration

=========================

LLDP Enabled

: Yes

LLDP Transmit Interval

: 30

LLDP Hold Time Multiplier : 4

LLDP Transmit Delay Interval : 2

LLDP Reinit Timer Interval : 2

LLDP Trap Enabled

: No

LLDP commands | 1226

LLDP Port Configuration

=======================

PORT

TX-ENABLED

RX-ENABLED

INTF-TRAP-ENABLED

--------------------------------------------------------------------------

1/1/1

Yes

Yes

Yes

Displaying LLDP Configuration for the management interface:

switch# show lldp configuration mgmt

LLDP Global Configuration

=========================

LLDP Enabled

: Yes

LLDP Transmit Interval

: 30

LLDP Hold Time Multiplier : 4

LLDP Transmit Delay Interval : 2

LLDP Reinit Timer Interval : 2

LLDP Trap Enabled

: Yes

LLDP Port Configuration

=======================

PORT

TX-ENABLED

RX-ENABLED

INTF-TRAP-ENABLED

--------------------------------------------------------------------------

mgmt

Yes

Yes

Yes

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config and config-if

Authority
Administrators or local user group members with execution rights for this command.

show lldp configuration
show lldp configuration [<INTERFACE-ID>][vsx-peer]
Description
Shows LLDP configuration settings for all interfaces or a specific interface.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1227

Parameter <INTERFACE-ID> vsx-peer

Description
Specifies an interface. Format: member/slot/port.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
On the 6400 Switch Series, interface identification differs. Showing configuration settings for all interfaces:

switch# show lldp configuration

LLDP Global Configuration

=========================

LLDP Enabled

: No

LLDP Transmit Interval

: 30

LLDP Hold Time Multiplier : 4

LLDP Transmit Delay Interval : 2

LLDP Reinit Timer Interval : 2

LLDP Trap Enabled

: No

TLVs Advertised =============== Management Address Port Description Port VLAN-ID System Description System Name

LLDP Port Configuration

=======================

PORT

TX-ENABLED

RX-ENABLED

INTF-TRAP-ENABLED

--------------------------------------------------------------------------

1/1/1

Yes

Yes

Yes

1/1/2

Yes

Yes

Yes

1/1/3

Yes

Yes

Yes

1/1/4

Yes

Yes

Yes

1/1/5

Yes

Yes

Yes

1/1/6

Yes

Yes

Yes

...........

...........

mgmt

Yes

Yes

Yes

This example shows configuration settings for interface 1/1/1.

switch# show lldp configuration 1/1/1

LLDP Global Configuration

=========================

LLDP Enabled

: Yes

LLDP Transmit Interval

: 30

LLDP Hold Time Multiplier : 4

LLDP Transmit Delay Interval : 2

LLDP Reinit Timer Interval : 2

LLDP commands | 1228

LLDP Trap Enabled

: No

LLDP Port Configuration

=======================

Auto Flush On Link Down

: Yes

Med Location Civic-addr

: US 1 4 ret 6 tyu 7 tiyuo

Med Location Elin-addr

: gher

PORT

TX-ENABLED

RX-ENABLED

INTF-TRAP-ENABLED

--------------------------------------------------------------------------

1/1/1

Yes

Yes

Yes

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show lldp configuration mgmt
show lldp configuration mgmt
Description
Shows LLDP configuration settings for the OOBM interface.
Example
Showing configuration settings for all interfaces:

switch# show lldp configuration mgmt

LLDP Global Configuration

=========================

LLDP Enabled

: Yes

LLDP Transmit Interval

: 30

LLDP Hold Time Multiplier : 4

LLDP Transmit Delay Interval : 2

LLDP Reinit Timer Interval : 2

LLDP Trap Enabled

: Yes

LLDP Port Configuration

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1229

=======================

PORT

TX-ENABLED

RX-ENABLED

INTF-TRAP-ENABLED

--------------------------------------------------------------------------

mgmt

Yes

Yes

Yes

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show lldp local-device
show lldp local-device[vsx-peer]
Description
Shows global LLDP information advertised by the switch, as well as port-based data. If VLANs are configured on any active interfaces, the VLAN ID is only shown for trunk native or untagged VLAN IDs on access interfaces.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing global LLDP information only (all ports including OOBM port are administratively down):

switch# show lldp local-device

Global Data ===========

Chassis-ID System Name System Description

: 1c:98:ec:e3:45:00 : switch : Aruba JL375A 8400X XL.01.01.0001

LLDP commands | 1230

Management Address

: 192.168.10.1

Capabilities Available : Bridge, Router

Capabilities Enabled : Bridge, Router

TTL

: 120

Showing all ports except 1/1/11 and OOBM as administratively down:

switch# show lldp local-device

Global Data ===========

Chassis-ID

: 1c:98:ec:e3:45:00

System Name

: switch

System Description

: Aruba

Management Address

: 192.168.10.1

Capabilities Available : Bridge, Router

Capabilities Enabled : Bridge, Router

TTL

: 120

Port Based Data ===============

Port-ID

: 1/1/11

Port-Desc

: "1/1/11"

Port Mgmt-Address : 164.254.21.220

Port VLAN ID

:1

Port-ID

: mgmt

Port-Desc

: "mgmt"

Port Mgmt-Address : 164.254.21.220

In this example, all the ports except 1/1/11 are administratively down, and VLAN ID 100 is configured on this access interface.

switch# show lldp local-device

Global Data ===========

Chassis-ID

: 1c:98:ec:e3:45:00

System Name

: switch

System Description

: Aruba

Management Address

: 192.168.10.1

Capabilities Available : Bridge, Router

Capabilities Enabled : Bridge, Router

TTL

: 120

Port Based Data ===============

Port-ID Port-Desc Port VLAN ID Parent Interface

: 1/1/11 : "1/1/11" : 100 : interface 1/1/11

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1231

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show lldp neighbor-info
show lldp neighbor-info [<INTERFACE-NAME>][vsx-peer]
Description
Displays information about neighboring devices for all interfaces or for a specific interface. The information displayed varies depending on the type of neighbor connected and the type of TLVs sent by the neighbor.

Parameter <INTERFACE-NAME>
vsx-peer

Description
Specifies the interface for which to show information for neighboring devices. Use the format member/slot/port (for example, 1/3/1).
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing LLDP information for all interfaces:

switch# show lldp neighbor-info

LLDP Neighbor Information =========================

Total Neighbor Entries

:3

Total Neighbor Entries Deleted : 0

Total Neighbor Entries Dropped : 0

Total Neighbor Entries Aged-Out : 0

LLDP commands | 1232

LOCAL-PORT CHASSIS-ID

PORT-ID

PORT-DESC

TTL

SYS-NAME

--------------------------------------------------------------------------------

1/1/1

70:72:cf:a4:7d:50 1/1/1

1/1/1

32

switch

1/1/2

48:0f:cf:af:73:80 1/1/2

1/1/2

120

switch

1/1/46

48:0f:cf:af:73:80 1/1/46

1/1/46

120

switch

mgmt

48:0f:cf:af:73:80 mgmt

mgmt

120

switch

Showing information for interface 1/3/1 when it has only one switch connected as a neighbor:

switch# show lldp neighbor-info 1/3/1

Port

: 1/1/1

Neighbor Entries

:1

Neighbor Entries Deleted

:0

Neighbor Entries Dropped

:0

Neighbor Entries Aged-Out

:0

Neighbor Chassis-Name

: HP-3800-24G-PoEP-2XG

Neighbor Chassis-Description : HP J9587A 3800-24G-PoE+-2XG Switch, revision...

Neighbor Chassis-ID

: 10:60:4b:39:3e:80

Neighbor Management-Address : 192.168.1.1

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge

Neighbor Port-ID

: 1/1/1

Neighbor Port-Desc

: 1/1/1

Neighbor Port VLAN ID

:1

Neighbor Port VLAN Name

: DEFAULT_VLAN_1

Neighbor Port MFS

: 1500

TTL

: 120

Showing information for interface 1/3/10 when the neighbor sends a DOT3 power TLV:

switch# show lldp neighbor-info 1/3/10

Port

: 1/3/10

Neighbor Entries

:1

Neighbor Entries Deleted

:0

Neighbor Entries Dropped

:0

Neighbor Entries Aged-Out

:0

Neighbor Chassis-Name

: 84:d4:7e:ce:5d:68

Neighbor Chassis-Description : ArubaOS (MODEL: 325), Version Aruba IAP

Neighbor Chassis-ID

: 84:d4:7e:ce:5d:68

Neighbor Management-Address : 169.254.41.250

Chassis Capabilities Available : Bridge, WLAN

Chassis Capabilities Enabled : WLAN

Neighbor Port-ID

: 84:d4:7e:ce:5d:68

Neighbor Port-Desc

: eth0

TTL

: 120

Neighbor Port VLAN ID

:1

Neighbor Port VLAN Name

: DEFAULT_VLAN_1

Neighbor Port MFS

: 1500

Neighbor PoE information

: DOT3

Neighbor Power Type

: TYPE2 PD

Neighbor Power Priority

: Unkown

Neighbor Power Source

: Primary

PD Requested Power Value

: 25.0 W

PSE Allocated Power Value: 25.0 W

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1233

Neighbor Power Supported Neighbor Power Enabled Neighbor Power Class Neighbor Power Paircontrol PSE Power Pairs

: Yes : Yes :5 : No : Signal

Showing information for interface 1/1/1 when it has multiple neighbors (displays a maximum of four):

switch# show lldp neighbor-info 1/1/1

Port

: 1/1/1

Neighbor Entries

:4

Neighbor Entries Deleted

:0

Neighbor Entries Dropped

:0

Neighbor Entries Aged-Out

:0

Neighbor Chassis-Name

: switch

Neighbor Chassis-Description : Aruba JL375A 8400X XL.01.01.0001

Neighbor Chassis-ID

: 1c:98:ec:fe:25:00

Neighbor Management-Address : 10.1.1.2

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge, Router

Neighbor Port-ID

: 1/1/1

Neighbor Port-Desc

: 1/1/1

Neighbor Port VLAN ID

:1

Neighbor Port VLAN Name

: DEFAULT_VLAN_1

Neighbor Port MFS

: 1500

TTL

: 120

Neighbor Chassis-Name

: switch

Neighbor Chassis-Description : Aruba JL375A 8400X XL.01.01.0001

Neighbor Chassis-ID

: 1c:98:ec:fe:25:01

Neighbor Management-Address : 10.1.1.3

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge, Router

Neighbor Port-ID

: 1/1/1

Neighbor Port-Desc

: 1/1/1

Neighbor Port VLAN ID

:1

Neighbor Port VLAN Name

: DEFAULT_VLAN_1

Neighbor Port MFS

: 1500

TTL

: 120

Neighbor Chassis-Name

: switch

Neighbor Chassis-Description : Aruba JL375A 8400X XL.01.01.0001

Neighbor Chassis-ID

: 1c:98:ec:fe:25:02

Neighbor Management-Address : 10.1.1.4

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge, Router

Neighbor Port-ID

: 1/1/1

Neighbor Port-Desc

: 1/1/1

Neighbor Port VLAN ID

: 50

Neighbor Port VLAN Name

: VLAN_50

Neighbor Port MFS

: 1500

TTL

: 120

Neighbor Chassis-Name

: switch

Neighbor Chassis-Description : Aruba JL375A 8400X XL.01.01.0001

Neighbor Chassis-ID

: 1c:98:ec:fe:25:03

Neighbor Management-Address : 10.1.1.5

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge, Router

Neighbor Port-ID

: 1/1/1

Neighbor Port-Desc

: 1/1/1

LLDP commands | 1234

Neighbor Port VLAN ID Neighbor Port VLAN Name Neighbor Port MFS TTL

: 100 : VLAN_100 : 1500 : 120

Showing neighbor information for interface 1/3/2 when it has EEE enabled and successfully autonegotiated:

switch# show lldp neighbor-info 1/3/2

Port

: 1/3/2

Neighbor Entries

:1

Neighbor Entries Deleted

:1

Neighbor Entries Dropped

:0

Neighbor Entries Aged-Out

:1

Neighbor Chassis-Name

: BLDG01-F1-6300

Neighbor Chassis-Description : Aruba JL668A FL.10.07.0001BN

Neighbor Chassis-ID

: 88:3a:30:92:a5:c0

Neighbor Management-Address : 10.6.9.15

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge, Router

Neighbor Port-ID

: 1/1/1

Neighbor Port-Desc

: 1/1/1

Neighbor Port VLAN ID

:1

Neighbor Port VLAN Name

: DEFAULT_VLAN_1

Neighbor Port MFS

: 1500

TTL

: 120

Neighbor Mac-Phy details Neighbor Auto-neg Supported Neighbor Auto-Neg Enabled Neighbor Auto-Neg Advertised Neighbor MAU type

: true : true : 1000 BASE_TFD, 100 BASE_T4, 10 BASET_FD : 1000 BASETFD

Neighbor EEE information Neighbor TX Wake time Neighbor RX Wake time Neighbor Fallback time Neighbor TX Echo time Neighbor RX Echo time

: DOT3 : 17 us : 17 us : 17 us : 17 us : 17 us

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1235

Platforms All platforms

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show lldp neighbor-info detail
show lldp neighbor-info detail [vsx-peer]
Description
Shows detailed LLDP neighbor information for all LLDP neighbor connected interfaces.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing detailed LLDP information for all interfaces:

switch# show lldp neighbor-info detail

LLDP Neighbor Information =========================

Total Neighbor Entries

:6

Total Neighbor Entries Deleted : 2

Total Neighbor Entries Dropped : 0

Total Neighbor Entries Aged-Out : 2

--------------------------------------------------------------------------------

Port

: 1/1/1

Neighbor Entries

:1

Neighbor Entries Deleted

:0

Neighbor Entries Dropped

:0

Neighbor Entries Aged-Out

:0

Neighbor Chassis-Name

: 6300

Neighbor Chassis-Description : Aruba ...

Neighbor Chassis-ID

: 38:11:17:1a:d5:00

Neighbor Management-Address : 38:11:17:1a:d5:00

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge, Router

Neighbor Port-ID

: 1/1/4

Neighbor Port-Desc

: 1/1/4

Neighbor Port VLAN ID

:1

Neighbor Port VLAN Name

: DEFAULT_VLAN_1

Neighbor Port MFS

: 1500

TTL

: 120

Neighbor Mac-Phy details Neighbor Auto-neg Supported

: true

LLDP commands | 1236

Neighbor Auto-Neg Enabled Neighbor Auto-Neg Advertised Neighbor MAU type

: true : 1000 BASE_TFD, 100 BASE_T4, 10 BASET_FD : 1000 BASETFD

--------------------------------------------------------------------------------

Port

: 1/1/2

Neighbor Entries

:1

Neighbor Entries Deleted

:0

Neighbor Entries Dropped

:0

Neighbor Entries Aged-Out

:0

Neighbor Chassis-Name

: 6300

Neighbor Chassis-Description : Aruba ...

Neighbor Chassis-ID

: 38:11:17:1a:d5:00

Neighbor Management-Address : 38:11:17:1a:d5:00

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge, Router

Neighbor Port-ID

: 1/1/5

Neighbor Port-Desc

: 1/1/5

Neighbor Port VLAN ID

:1

Neighbor Port VLAN Name

: DEFAULT_VLAN_1

Neighbor Port MFS

: 1500

TTL

: 120

Neighbor Mac-Phy details Neighbor Auto-neg Supported Neighbor Auto-Neg Enabled Neighbor Auto-Neg Advertised Neighbor MAU type

: true : true : 1000 BASE_TFD, 100 BASE_T4, 10 BASET_FD : 1000 BASETFD

--------------------------------------------------------------------------------

Port

: 1/1/3

Neighbor Entries

:1

Neighbor Entries Deleted

:0

Neighbor Entries Dropped

:0

Neighbor Entries Aged-Out

:0

Neighbor Chassis-Name

: 6300

Neighbor Chassis-Description : Aruba ...

Neighbor Chassis-ID

: 38:11:17:1a:d5:00

Neighbor Management-Address : 38:11:17:1a:d5:00

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge, Router

Neighbor Port-ID

: 1/1/6

Neighbor Port-Desc

: 1/1/6

Neighbor Port VLAN ID

:1

Neighbor Port VLAN Name

: DEFAULT_VLAN_1

Neighbor Port MFS

: 1500

TTL

: 120

Neighbor Mac-Phy details Neighbor Auto-neg Supported Neighbor Auto-Neg Enabled Neighbor Auto-Neg Advertised Neighbor MAU type

: true : true : 1000 BASE_TFD, 100 BASE_T4, 10 BASET_FD : 1000 BASETFD

--------------------------------------------------------------------------------

Port Neighbor Entries Neighbor Entries Deleted Neighbor Entries Dropped

: 1/1/46 :1 :0 :0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1237

Neighbor Entries Aged-Out

:0

Neighbor Chassis-Name

: 6300

Neighbor Chassis-Description : Aruba ...

Neighbor Chassis-ID

: 38:11:17:1a:d5:00

Neighbor Management-Address : 38:11:17:1a:d5:00

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge, Router

Neighbor Port-ID

: 1/1/19

Neighbor Port-Desc

: 1/1/19

Neighbor Port VLAN ID

:1

Neighbor Port VLAN Name

: DEFAULT_VLAN_1

Neighbor Port MFS

: 1500

TTL

: 120

Neighbor Mac-Phy details Neighbor Auto-neg Supported Neighbor Auto-Neg Enabled Neighbor Auto-Neg Advertised Neighbor MAU type

: true : true : 1000 BASE_TFD, 100 BASE_T4, 10 BASET_FD : 1000 BASETFD

--------------------------------------------------------------------------------

Port Neighbor Entries Neighbor Entries Deleted Neighbor Entries Dropped Neighbor Entries Aged-Out Neighbor Chassis-Name Neighbor Chassis-Description Neighbor Chassis-ID Neighbor Management-Address Chassis Cap

: 1/1/47 :1 :0 :0 :0 : 6300 : Aruba ... : 38:11:17:1a:d5:00 : 38:11:17:1a:d5:00

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show lldp neighbor-info mgmt
show lldp neighbor-info mgmt
Description

LLDP commands | 1238

Displays information about neighboring devices connected to the OOBM interface.
Examples
Showing LLDP information for the OOBM interface:

switch# show lldp neighbor-info mgmt

Port

: mgmt

Neighbor Entries

:1

Neighbor Entries Deleted

:0

Neighbor Entries Dropped

:0

Neighbor Entries Aged-Out

:0

Neighbor Chassis-Name

: HP-3800-24G-PoEP-2XG

Neighbor Chassis-Description : HP J9587A 3800-24G-PoE+-2XG Switch, revision...

Neighbor Chassis-ID

: 10:60:4b:39:3e:80

Neighbor Management-Address : 192.168.1.1

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge

Neighbor Port-ID

: mgmt

Neighbor Port-Desc

: mgmt

TTL

: 120

Showing LLDP information for the OOBM interface when there are four neighbors:

switch# show lldp neighbor-info mgmt

Port

: mgmt

Neighbor Entries

:4

Neighbor Entries Deleted

:0

Neighbor Entries Dropped

:0

Neighbor Entries Aged-Out

:0

Neighbor Chassis-Name

: switch

Neighbor Chassis-Description : Aruba JL375A 8400X XL.01.01.0001

Neighbor Chassis-ID

: 1c:98:ec:fe:25:00

Neighbor Management-Address : 10.1.1.2

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge, Router

Neighbor Port-ID

: 1/1/1

Neighbor Port-Desc

: 1/1/1

TTL

: 120

Neighbor Chassis-Name

: switch

Neighbor Chassis-Description : Aruba JL375A 8400X XL.01.01.0001

Neighbor Chassis-ID

: 1c:98:ec:fe:25:01

Neighbor Management-Address : 10.1.1.3

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge, Router

Neighbor Port-ID

: 1/1/1

Neighbor Port-Desc

: 1/1/1

TTL

: 120

Neighbor Chassis-Name

: switch

Neighbor Chassis-Description : Aruba JL375A 8400X XL.01.01.0001

Neighbor Chassis-ID

: 1c:98:ec:fe:25:02

Neighbor Management-Address : 10.1.1.4

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge, Router

Neighbor Port-ID

: 1/1/1

Neighbor Port-Desc

: 1/1/1

TTL

: 120

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1239

Neighbor Chassis-Name

: switch

Neighbor Chassis-Description : Aruba JL375A 8400X XL.01.01.0001

Neighbor Chassis-ID

: 1c:98:ec:fe:25:03

Neighbor Management-Address : 10.1.1.5

Chassis Capabilities Available : Bridge, Router

Chassis Capabilities Enabled : Bridge, Router

Neighbor Port-ID

: 1/1/1

Neighbor Port-Desc

: 1/1/1

TTL

: 120

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show lldp statistics
show lldp statistics [<INTERFACE-ID>][vsx-peer]
Description
Shows global LLDP statistics or statistics for a specific interface.

Parameter <INTERFACE-ID> vsx-peer

Description
Specifies an interface. Format: member/slot/port.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
On the 6400 Switch Series, interface identification differs. Showing global statistics for all interfaces:

LLDP commands | 1240

switch# show lldp statistics LLDP Global Statistics ======================

Total Packets Transmitted

: 19

Total Packets Received

: 19

Total Packets Received And Discarded : 0

Total TLVs Unrecognized

:0

LLDP Port Statistics ====================

PORT-ID

TX-PACKETS

RX-PACKETS

RX-DISCARDED TLVS-UNKNOWN

-------------------------------------------------------------------------

1/1/1

7

7

0

0

1/1/2

7

7

0

0

1/1/3

0

0

0

0

1/1/4

0

0

0

0

1/1/5

0

0

0

0

...

mgmt

5

5

0

0

```

Showing statistics for interface 1/1/1:

switch# show lldp statistics 1/1/1

LLDP Statistics ===============

Port Name

: 1/1/1

Packets Transmitted

: 159

Packets Received

: 163

Packets Received And Discarded : 0

Packets Received And Unrecognized : 0

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1241

show lldp statistics mgmt
show lldp statistics mgmt
Description
Shows LLDP statistics for the OOBM interface.
Example
Showing LLDP statistics for the OOBM interface:

switch# show lldp statistics mgmt

LLDP Statistics ===============

Port Name

: mgmt

Packets Transmitted

: 20

Packets Received

: 23

Packets Received And Discarded : 0

Packets Received And Unrecognized : 0

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show lldp tlv
show lldp tlv[vsx-peer]
Description
Shows the LLDP TLVs that are configured for send and receive.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

LLDP commands | 1242

Example
switch# show lldp tlv
TLVs Advertised ===============
Management Address Port Description Port VLAN-ID System Capabilities System Description System Name VLAN Name MFS OUI

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1243

Chapter 68 Local AAA commands

Local AAA commands

aaa accounting all-mgmt
aaa accounting all-mgmt <CONNECTION-TYPE> start-stop {local | group <GROUP-LIST>} no aaa accounting all-mgmt <CONNECTION-TYPE>
Description
Defines accounting as being local (with the name local) (the default). Or defines a sequence of remote AAA server groups to be accessed for accounting purposes. For remote accounting, the information is sent to the first reachable remote server that was configured with this command for remote accounting. If no remote server is reachable, local accounting remains available. Each available connection type (channel) can be configured individually as either local or using remote AAA server groups. All server groups named in your command, must exist. This command can be issued multiple times, once for each connection type. Local is always available for any connection type not configured for remote accounting.

The system accounting log is not associated with any connection type (channel) and is therefore sent to the accounting method configured on the default connection type (channel) only.
The no form of this command removes for the specified connection type, any defined remote AAA server group accounting sequence. Local accounting is available for connection types without a configured remote AAA server group list (whether default or for the specific connection type).

Parameter <CONNECTION-TYPE>
start-stop

Description
One of these connection types (channels): default
Defines a list of accounting server groups to be used for the default connection type. This configuration applies to all other connection types (console, https-server, ssh) that are not explicitly configured with this command. For example, if you do not use aaa accounting all-mgmt console... to define the console accounting list, then this default configuration is used for console.
console Defines a list of accounting server groups to be used for the console connection type.
https-server Defines a list of accounting server groups to be used for the https-server (REST, Web UI) connection type.
ssh Defines a list of accounting server groups to be used for the ssh connection type.
Selects accounting information capture at both the beginning and

AOS-CX 10.14 Command-Line Interface Guide

1244

Parameter local group <GROUP-LIST>

Description
end of a process.
Selects local-only accounting when used without the group parameter.
Specifies the list of remote AAA server group names. Each name can be specified one time. Predefined remote AAA group names tacacs and radius are available. Although not a group name, predefined name local is available. User-defined TACACS+ and RADIUS server group names may also be used. The remote AAA server groups are accessed in the order that the group names are listed in this command. Within each group, the servers are accessed in the order in which the servers were added to the group. Server groups are defined using command aaa group server and servers are added to a server group with the command server. If the AAA server(s) in the group are not reachable, or the if there is a key mismatch error between the server and the switch, the next accounting method is attempted.

Usage
Local accounting is always active. It cannot be turned off.
Examples
Setting local accounting for the default connection type:
switch(config)# aaa accounting all-mgmt default start-stop local
Setting local accounting for the console connection type:
switch(config)# aaa accounting all-mgmt console start-stop local

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

Local AAA commands | 1245

aaa authentication console-login-attempts
aaa authentication console-login-attempts <ATTEMPTS> console-lockout-time <LOCKOUT-TIME> no aaa authentication console-login-attempts
Description
For the console interface (channel) only, enables console login attempt limiting. If the number of failed console login attempts equals the configured threshold, the user is locked out for the configured duration. The no form of this command disables console login attempt limits.
Important: If you enable the lockout using this command and also enable the SSH, REST, and Telnet lockout using command aaa authentication limit-login-attempts, and then enter too many consecutive wrong passwords, you may become locked out, and will have to wait for the configured lockout time to elapse before logging in on any interface.

This console login attempt limiting feature is only available when not using remote authentication through AAA servers (TACACS+ or RADIUS) on any interface. Remote authentication through AAA servers (TACACS+ or RADIUS) is not possible when limit login attempts is configured on any interface.

Parameter <ATTEMPTS>
<LOCKOUT-TIME>

Description
Specifies the threshold of failed console login attempts that triggers user lockout. Range: 1 to 10. For example, if <ATTEMPTS> is set to 1, a single failed login attempt triggers immediate user lockout.
Specifies the amount of time a user is locked out. Range: 1 to 3600 seconds.

Examples
Enabling console login attempt failure limiting with a 60 second lockout being triggered upon the third consecutive login attempt failure.

switch(config)# aaa authentication console-login-attempts 3 console-lockout-time 60

Disabling console login attempt failure limiting:

switch(config)# no aaa authentication console-login-attempts

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1246

Command Information

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

aaa authentication limit-login-attempts
aaa authentication limit-login-attempts <ATTEMPTS> lockout-time <LOCKOUT-TIME> no aaa authentication limit-login-attempts <ATTEMPTS> lockout-time <LOCKOUT-TIME>
Description
For the SSH, REST, and Telnet interface (channel), enables local login attempt limiting. If the number of failed local login attempts equals the configured threshold, the user is locked out for the configured duration. The no form of this command disables local login attempt limits.
Important: If you enable the lockout using this command and also enable the console lockout using command aaa authentication console-login-attempts, and then enter too many consecutive wrong passwords, you may become locked out, and will have to wait for the configured lockout time to elapse before logging in on any interface.

This local login attempt limiting feature is only available when not using remote authentication through AAA servers (TACACS+ or RADIUS) on any interface. Remote authentication through AAA servers (TACACS+ or RADIUS) is not possible when limit login attempts is configured on any interface.

Parameter <ATTEMPTS>
<LOCKOUT-TIME>

Description
Specifies the threshold of failed local login attempts that triggers user lockout. Range: 1 to 10. For example, if <ATTEMPTS> is set to 1, a single failed login attempt triggers immediate user lockout.
Specifies the amount of time a user is locked out. Range: 1 to 3600 seconds.

Examples
Enabling local login attempt failure limiting with a 20 second lockout being triggered upon the fourth consecutive login attempt failure.

switch(config)# aaa authentication limit-login-attempts 4 lockout-time 20

Disabling login attempt failure limiting:

switch(config)# no aaa authentication limit-login-attempts

For more information on features that use this command, refer to the Security Guide for your switch model.

Local AAA commands | 1247

Command History
Release 10.09

10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Added Telnet lockout support on the 6200, 6300, 6400 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication login
aaa authentication login <CONNECTION-TYPE> {local | group <GROUP-LIST>} no aaa authentication login <CONNECTION-TYPE> {local | group <GROUP-LIST>}
Description
Defines authentication as being local (with the name local) (the default). Or defines a sequence of remote AAA server groups to be accessed for authentication purposes. Each available connection type (channel) can be configured individually as either local or using remote AAA server groups. All server groups named in your command, must exist. This command can be issued multiple times, once for each connection type. Local is always available for any connection type not configured for remote AAA authentication. The no form of this command removes for the specified connection type, any defined remote AAA server group authentication sequence. Local authentication is available for connection types without a configured remote AAA server group list (whether default or for the specific connection type).

Parameter <CONNECTION-TYPE>

Description
One of these connection types (channels): default
Defines a list of accounting server groups to be used for the default connection type. This configuration applies to all other connection types (console, https-server, ssh) that are not explicitly configured with this command. For example, if you do not use aaa accounting all-mgmt console... to define the console accounting list, then this default configuration is used for console.
console Defines a list of accounting server groups to be used for the console connection type.
https-server Defines a list of accounting server groups to be used for the https-server (REST, Web UI) connection type.
ssh Defines a list of accounting server groups to be used for the ssh connection type.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1248

Parameter local
group <GROUP-LIST>

Description
Selects local-only accounting when used without the group parameter.
Specifies the list of remote AAA server group names. Each name can be specified one time. Predefined remote AAA group names tacacs and radius are available. Although not a group name, predefined name local is available. User-defined TACACS+ and RADIUS server group names may also be used. The remote AAA server groups are accessed in the order that the group names are listed in this command. Within each group, the servers are accessed in the order in which the servers were added to the group. Server groups are defined using command aaa group server and servers are added to a server group with the command server. If no AAA server(s) in the group are reachable, or if there is a key mismatch error between the server and the switch, the next authentication method is attempted.

Examples
Setting local authentication for the default connection type: switch(config)# aaa authentication login default local
Setting local authentication for the console connection type: switch(config)# aaa authentication login console local

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication minimum-password-length
aaa authentication minimum-password-length <LENGTH> no aaa authentication minimum-password-length <LENGTH>
Description

Local AAA commands | 1249

Enables minimum password length checking. Existing passwords shorter than the minimum length are unaffected. Length checking does not apply to ciphertext passwords. Length checking applies both to local and remote authentication.
The no form of this command disables minimum password length checking.

Parameter <LENGTH>

Description Specifies the minimum password length. Range: 1 to 32.

Examples
Enabling password length checking, with a minimum length of 12.

switch(config)# aaa authentication minimum-password-length 12

Disabling minimum password length checking:

switch(config)# no aaa authentication minimum-password-length

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authorization commands (local)
aaa authorization commands <CONNECTION-TYPE> {local | none} no aaa authorization commands <CONNECTION-TYPE> {local | none} aaa authorization commands <CONNECTION-TYPE> group <GROUP-LIST> no aaa authorization commands <CONNECTION-TYPE> group <GROUP-LIST>
Description
Defines authorization as being basic local RBAC (specified as none), or as full-fledged local RBAC specified as local (the default), or as remote TACACS+ (specified with group <GROUP-LIST>). Each available connection type (channel) can be configured individually. All server groups named in the command, must exist. This command can be issued multiple times, once for each connection type. The no form of this command unconfigures authorization for the specified connection type, reverting to the default of local.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1250

Although only TACACS+ servers are supported for remote authorization, local authorization (basic or full-fledged) can be used with remote RADIUS authentication. If your switch uses command authorization, best practices is to configure authorization fail-through before configuring authentication fail-through. If not, the switch may fall into an unusable state where authorization will fail for all commands.

Parameter <CONNECTION-TYPE>
local
none group <GROUP-LIST>

Description
One of these connection types (channels): default
Selects the default connection type for configuration. This configuration applies to all other connection types (console, ssh) that are not explicitly configured with this command. For example, if you do not use aaa authorization commands console... to define the console authorization list, then this default configuration is used for console.
console Selects the console connection type for configuration.
ssh Selects the ssh connection type for configuration.
When used alone without group <GROUP-LIST>, selects local authorization which can be used to provide authorization for a purely local setup without any remote AAA servers and also for when RADIUS is used for remote Authentication and Accounting but Authorization is local. When used after group, provides for fallback (to full-fledged local authorization) when every server in every specified TACACS+ server group cannot be reached.
NOTE: If any TACACS+ server in the specified groups is reachable, but the command fails to be authorized by that server, the command is rejected and local authorization is never attempted. Local authorization is only attempted if every TACACS+ server cannot be reached.
When used alone without group <GROUP-LIST>, selects basic local RBAC authorization, for use with the built-in user groups (administrators, operators, auditors). When used after group, provides for fallback (to basic local RBAC authorization) when every server in every specified TACACS+ server group cannot be reached.
NOTE: With none, for users belonging to user-defined user groups, all commands can be executed regardless of what authorization rules are defined in such groups. For per-command local authorization, use local instead.
Specifies the list of remote AAA server group names. Predefined remote AAA group name tacacs is available. User-defined TACACS+ server group names may also be used. The remote AAA server groups are accessed in the order that the group names are listed in this command. Within each group, the servers are accessed in the order in which the servers were added to the group. Server groups are defined using command aaa server group and servers are added to a server group using command server. It is recommended to always include either the special name local

Local AAA commands | 1251

Parameter

Description
or none as the last name in the group list. If both local or none are omitted, and no remote AAA server is reachable (or the first reachable server cannot authorize the command), command execution for the current user will not be possible. If no AAA server(s) in the group are reachable, or if there is a key mismatch error between the server and the switch, the next authorization method is attempted.

Examples
Setting the authorization for default to local:

switch(config)# aaa authorization commands default local

Setting the authorization for the SSH interface to none:

switch(config)# aaa authorization commands ssh none

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show aaa accounting
show aaa accounting [vsx-peer]
Description
Shows the accounting configuration per connection type (channel).

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1252

Configuring and then showing local accounting for the default and console connection types:

switch(config)# aaa accounting all default start-stop local

switch(config)# aaa accounting all console start-stop local

switch(config)# exit

switch# show aaa accounting

AAA Accounting:

Accounting Type

: all

Accounting Mode

: start-stop

Accounting for default channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

local

|0

---------------------------------------------------------------------------------

Accounting for console channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

local

|0

---------------------------------------------------------------------------------

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show aaa authentication
show aaa authentication [vsx-peer]
Description
Shows the authentication configuration per connection type (channel).

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Local AAA commands | 1253

Example
Configuring and then showing local authentication for the default and console connection types (channels):

switch(config)# aaa authentication login default local switch(config)# aaa authentication login console local switch(config)# exit switch# show aaa authentication

AAA Authentication: Fail-through Limit Login Attempts Lockout Time Minimum Password Length

: Disabled : Not set : 300 : Not set

Authentication for default channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

local

|0

---------------------------------------------------------------------------------

Authentication for console channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

local

|0

---------------------------------------------------------------------------------

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show aaa authorization
show aaa authorization [vsx-peer]
Description
Shows the authorization configuration per connection type (channel).

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1254

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Configuring and then showing full-fledged local RBAC authorization for the default and console connection types (channels):

switch(config)# aaa authorization commands default none

switch(config)#

switch(config)# aaa authorization commands console none

switch(config)# exit

switch#

switch# show aaa authorization

Authorization for default channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

none

|0

---------------------------------------------------------------------------------

Authorization for console channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

none

|0

---------------------------------------------------------------------------------

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show authentication locked-out-users
show authentication locked-out-users
Description

Local AAA commands | 1255

Shows a list of users currently locked out due to excessive failed login attempts. This applies to console, REST, SSH, WebUI, and telnet logins.
Example
Showing locked-out users.

switch# show authentication locked-out-users

USER

GROUP

---------------------------------------

admin

administrators

admin-1

administrators

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

10.09

Command Information

Platforms All platforms

Command context Manager (#)

Modification The output of this command now also includes information for users locked out due to excessive REST login attempts. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

show ssh authentication-method
show ssh authentication-method
Description
Shows the status of the SSH public key method and the local password-based (through SSH client) authentication method.
Example
Showing the authentication methods.
switch# show ssh authentication-method SSH publickey authentication : Enabled SSH password authentication : Enabled

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1256

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show user
show user <USERNAME> authorized-key
Description
Shows the SSH client public key list for a specified user.

Parameter <USERNAME>

Description
Specifies the username for which you want to show the SSH client public key list.

Usage
Any user can show their own public key list; however, administrators can also show a public key list of other users.
Examples
Showing a client public key:

switch# show user admin authorized-key

1. Key Type : RSA

Key size : 2048

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMtyMBmmAaF6r1zxf3DZNHSYVHBJhlbBlyAIqQ8DSHK

...

U+aE14UW/ifIukmK67sIHwK+FhhRYwPztQc5pjyOPk128a4pgKQaHCcOF169Z admin@switch

Showing two client public keys:

switch# show user admin authorized-key

1. Key Type : ECDSA

Curve : nistp256

ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEqEFevZ0

...

l76V+D0svdCJ9Wo32zqI9OeAdTJw/eZYp5qknhNgS81HjAI6J/4/kAqdZAjbqQUiCAk= admin@switch

2. Key Type : RSA

Key size : 2048

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXQHrqV7+/GcMdOhr//IRjJkX7TQKupW89j80bL7xq8

...

j8qKuHWSN0/h/HxjzQJuYDVmZN5vG3DhpXbBZUlZNnchVod13QLCesqA3VLKN admin@switch

Local AAA commands | 1257

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ssh password-authentication
ssh password-authentication no ssh password-authentication
Description
Enables the password-based authentication method for use with SSH clients. The no form of this command disables the password-based authentication method for use with SSH clients.
Usage
The switch ships with password-based authentication (for SSH clients) enabled. The maximum number of password retries is three.
Examples
Enabling password authentication for use with SSH clients:
switch(config)# ssh password-authentication
Disabling password authentication for use with SSH clients:
switch(config)# no ssh password-authentication

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1258

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ssh public-key-authentication
ssh public-key-authentication no ssh public-key-authentication
Description
Enables the SSH public key authentication method. The switch ships with SSH public key authentication enabled. The no form of this command disables the SSH public key authentication method.
Although SSH public key authentication is enabled by default, it cannot be used until SSH public keys are added with the user authorized-key command.
Examples
Enabling SSH public key authentication:
switch(config)# ssh public-key-authentication
Disabling SSH public key authentication:
switch(config)# no ssh public-key-authentication

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Local AAA commands | 1259

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

user authorized-key
user <USERNAME> authorized-key <PUBKEY> no user <USERNAME> authorized-key [<KEYNUM>]
Description
Copies an SSH client public key into the key list. If the key list and the public key do not exist, it creates a list with the public key. If the SSH client public key exists, the command appends the new key to the existing list. The client public key list holds a maximum of 32 client keys. The no form of the command removes either one or all SSH public keys from the key list.

Parameter <USERNAME> <PUBKEY> <KEYNUM>

Description
Specifies the name of the user.
Specifies the SSH client public key to be copied into the key list.
Specifies the key number. The range is 1 to 32. Use the show user <USERNAME> authorized-key command to find the key number associated with the key.

Usage
Each key on the key list has a key identifier. The show user <USERNAME> authorized-key command displays the key identifier associated with the key. Administrators can add and remove the public keys of themselves and other users. Operators can add and remove only their own public keys. If the public key authentication method is enabled, the client public key present is used by the SSH server to authenticate the client. The authentication method reverts to the password authentication method and prompts for a client password when one of the following occurs:
n The client public keys are not present. n The server does not have the keys enabled. n The public key method is disabled.
You can either remove all keys or a specific key. Each key on the key list has a key identifier. If you provide the key identifier in this command, the command removes the corresponding key from the list. If you provide no key identifier, the command removes all keys from the key list.
Examples
Adding a public key:

switch(config)#user admin authorized-key ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTIt bmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEqEFevZ0l76V+D0svdCJ9Wo32zqI9OeAIdTJwT/eZYp50qkA nhZNgS81HBjAI6QJ/4/kAyqdZ9oAjbiqQUiCAk= root@switch

Removing all SSH public keys from the list:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1260

switch(config)# no user admin authorized-key Removing the specified SSH public key from the list:
switch(config)# no user admin authorized-key 2

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Local AAA commands | 1261

Chapter 69 Log rotation commands

Log rotation commands
logging threshold
logging threshold {audit-log | auth-log | commands-log |event-log | security-log | httpsserver-log} <THRESHOLD%> no logging threshold {audit-log | auth-log | commands-log | event-log | security-log | https-server-log} [<THRESHOLD%>]
Description
Selects the logging buffer notification threshold for the specified logging buffer. Whenever the logging buffer space consumption exceeds the selected threshold (percent of buffer capacity), a LOG_BUFFER_ ALMOST_FULL event and SNMP RMON trap is triggered. This gives you the opportunity to save the logs elsewhere before the buffers are rotated with the oldest data being overwritten. Also, a LOG_BUFFER_WRAPPED event and SNMP RMON trap is triggered if the logging buffer capacity is fully consumed and the log buffer is rotated with the oldest data being overwritten. The no form of this command resets the logging buffer warning threshold to its default. All logs except audit-log have a default of 90 (percent) and audit-log has a default of 50 (percent).
The largest REST payload that can be sent to RADIUS/TACACS servers is 1024 characters, and the maximum REST payload that can be sent to syslog servers is 3500 characters. Once this limit is exceeded, the log will display three dots ( ...) to indicate the the message has exceeded the character limit and is incomplete. .

Parameter audit-log auth-log commands-log event-log https-server-log security-log <THRESHOLD%>
Examples
Setting the audit log threshold:

Description
Selects the audit log.
Selects the authentication log.
Configure the logging threshold for commands log buffer
Selects the event log.
Selects the HTTPS server log.
Selects the security log.
Selects the notification threshold as a percent that the selected logging buffer is full. Available percent values for all logs except audit-log: 15 30 50 70 90 100 Available percent values for audit-log: 50 100

AOS-CX 10.14 Command-Line Interface Guide

1262

switch(config)# logging threshold audit-log 100 Setting the authentication log threshold:
switch(config)# logging threshold auth-log 50 Setting the event log threshold:
switch(config)# logging threshold event-log 70 Setting the HTTPS server log threshold:
switch(config)# logging threshold https-server-log 50 Setting the security log threshold:
switch(config)# logging threshold security-log 70 Resetting the audit log threshold to its default of 50:
switch(config)# no logging threshold audit-log Resetting the authentication log threshold to its default of 90:
switch(config)# no logging threshold auth-log Resetting the event log threshold to its default of 90:
switch(config)# no logging threshold event-log Resetting the HTTPS server log threshold to its default of 90:
switch(config)# no logging threshold https-server-log Resetting the security log threshold to its default of 90:
switch(config)# no logging threshold security-log
For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.
Command History
Log rotation commands | 1263

Release 10.11 10.09

Command Information

Platforms All platforms

Command context config

Modification Introduced the commands-log parameter. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

logrotate maxsize
logrotate maxsize <MAX-SIZE> no logrotate maxsize
Description
Specifies the maximum allowed log file size. A log file that exceeds either the logrotate maxsize or the logrotate period (whichever happens first), triggers rotation of the log file. The no form of this command resets the size of the log file to the default (100 MB).

Parameter <MAX-SIZE>

Description
Specifies the allowed size the log file can reach before it is compressed and stored locally or transferred to a remote host. Range: 10 to 200 MB. Default: 100 MB.

Examples
Setting the maximum log file size:

switch(config)# logrotate maxsize 24

Resetting the maximum log file size to its default of 100 MB:

switch(config)# no logrotate maxsize

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1264

Command Information

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

logrotate period
logrotate period {daily | hourly | monthly | weekly} no logrotate period
Description
Sets the log file rotation time period. Defaults to daily. A log file that exceeds either the logrotate maxsize or the logrotate period (whichever happens first), triggers rotation of the log file. The no form of this command resets the log rotation period to the default of daily.

Parameter daily hourly monthly weekly

Description Rotates log files on a daily basis (default) at 0:01. Rotates log files every hour at the first second of the hour. Rotates log files monthly on the first day of the month at 00:01. Rotates log files once a week on Sunday at 00:01.

Examples
Setting a weekly period:

switch(config)# logrotate period weekly

Resetting the period to its default of daily:

switch(config)# no logrotate period

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Log rotation commands | 1265

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

logrotate target
logrotate target <URI> [vrf <VRF_NAME>] no logrotate target [<URI>] [vrf <VRF_NAME>]
Description
Using TFTP, sends the rotated log files to a specified remote host identified by Universal Resource Identifier (URI). The no form of this command resets the target to the default, which stores the rotated and compressed log files locally in /var/log/.
Command context

Parameter <URI>
<VRF_NAME>

Description
Specifies the URI of the remote host. The default directory is local. tftp://{{<IPV4_ADDR>|IPV6_ADDR>}|HOST} [/<DIRECTORY>]
Specifies the VRF name (Default: default).

Usage
n Rotated log files are compressed and stored locally in the path /var/log/ regardless of the remote host configuration.
Examples
Setting an IPv4 target:

switch(config)# logrotate target tftp://192.168.1.132

Setting an IPv4 target with a directory:

switch(config)# logrotate target tftp://192.168.1.132/logrotate/

Setting an IPv4 target with the default VRF:

switch(config)# logrotate target tftp://192.168.1.132 vrf mgmt

Setting an IPv6 target with the default VRF:

switch(config)# logrotate target tftp://2001:db8:0:1::128 vrf default

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1266

Resetting the target to local: switch(config)# no logrotate target

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.09 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Updated the syntax and examples. --
Authority Administrators or local user group members with execution rights for this command.

show logrotate
show logrotate [vsx-peer]
Description
Shows the log rotate configuration.
Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

switch# show logrotate

Logrotate configurations :

Period

: weekly

Maxsize

: 20MB

Target

: tftp://2001:db8:0:1::128 vrf mgmt

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.
Command History

Log rotation commands | 1267

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1268

Chapter 70 Loop protect commands

Loop protect commands
loop-protect
loop-protect no loop-protect
Description
Enables loop protection on a layer 2 interface, VXLAN interface, or LAG. Loop protection packets are sent/received on the LAG and not the interface which are members of the LAG. Loop protection only works on layer 2 interfaces. If a layer 2 interface is changed to a layer 3 interface, all loop protection configuration settings are lost for that interface. If loop protection is enabled on a VXLAN interface, the local VTEP will generate loop protect packets on the VXLAN tunnel. Remote VTEP will hardware forward the same loop protect packet. If a local VTEP receives its own packet on any L2 interface, it will be detected as a loop and will bring down the L2 interface on which the loop protect control packet was received. The no form of this command disables loop protection on a layer 2 interface, VXLAN interface, or LAG.
Loop protection on VXLAN interfaces is supported only on AOS-CX 6200,6300,6400,8360,8325,8400,9300,8100,10000 switch series.
Examples
On the 6400 Switch Series, interface identification differs. Enabling loop protection on interface 1/1/1:
switch# config switch(config)# interface 1/1/1 switch(config-if)# loop-protect
Enabling loop protection on LAG 25:
switch# config switch(config)# interface lag 25 switch(config-lag-if)# loop-protect
Enabling loop protection on VXLAN interface:
switch# config switch(config)# interface vxlan 1 switch(config-vxlan-if)# loop-protect

AOS-CX 10.14 Command-Line Interface Guide

1269

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.12 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if config-lag-if config-vxlan-if

Modification Loop protection supported on VXLAN interfaces. --
Authority Administrators or local user group members with execution rights for this command.

loop-protect action
loop-protect action {do-not-disable | tx-disable | tx-rx-disable} no loop-protect action {do-not-disable | tx-disable | tx-rx-disable}
Description
Sets the action to be taken when a loop protection packet is received on a port. If an action is configured after a loop is detected, then the new action only takes effect after the reenable timer expires. To have the action take effect immediately, disable and then re-enable loop protect. The no form of this command resets the action to the default (tx-disable).
This command is not supported on a VXLAN interface and the default action for a VXLAN interface is rx-disable .

Parameter do-not-disable tx-disable
tx-rx-disable
Example

Description
No ports are disabled. On every transmit interval, the loop will be detected and the detection will be reported via an SNMP trap and an event log message.
The port that transmitted the loop detection packet is disabled. When this setting is enabled, environments with N loops, must have loop protection be configured on at least N-1 ports to have a loop free topology. Default.
The ports that transmitted and received the loop detection packet are disabled.

Loop protect commands | 1270

switch(config-if)# loop-protect action do-not-disable switch(config-if)# no loop-protect action do-not-disable

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

loop-protect re-enable-timer
loop-protect re-enable-timer <TIME> no loop-protect re-enable-timer <TIME>
Description
Configures the time interval after which an interface disabled by loop protection is re-enabled. The loop protection timer is disabled by default. The no form of this command disables the loop protect timer.

Parameter <TIME>

Description
Specify the number of seconds after which a disabled interface is re-enabled. Range: 15 to 604800.

Example

switch# config switch(config)# loop-protect re-enable-timer 60

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1271

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

loop-protect transmit-interval
loop-protect transmit-interval <TIME> no loop-protect transmit-interval [<TIME>]
Description
Configures the time interval between successive loop protect packets sent on an interface. The no form of this command sets the time interval to the default value of 5 seconds.

Parameter <TIME>

Description
Configures the transmit interval in seconds. Range: 5 to 10. Default: 5.

Examples

switch(config)# loop-protect transmit-interval 10 switch(config)# no loop-protect transmit-interval

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

loop-protect trap loop-detected

Loop protect commands | 1272

loop-protect trap loop-detected no loop-protect trap loop-detected
Description
Enables sending SNMP traps for loop-protect related events. The no form of this command disables sending SNMP traps for loop-protect related events.
Examples
Enabling the sending of SNMP traps:
switch# loop-protect trap loop-detected
Disabling the sending of SNMP traps:
switch# no loop-protect trap loop-detected

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

loop-protect vlan
loop-protect vlan <VLAN-LIST> no loop-protect vlan
Description
Specifies the trunk allowed VLANs on which loop protection packets are sent. By default, loop protection packets are only sent on access VLANs and native VLANs on a port. To send loop protection packets on trunk allowed VLANs, the VLANs must be explicitly added using this command. When loop protection is enabled on VXLAN interfaces, the switch will start transmitting loop protect packets to each VTEP peer that are part of a VNI. Loop protection can be configured on a maximum of 4094 VLANs across all interfaces. Loop protection on VXLAN interfaces can be enabled on a maximum of 5000 (total of number of VTEPs * number of loop protect enabled VLANs). Loop protection will generate a maximum 5000 VXLAN encapsulated packets within the default loop protect time interval of 5 seconds.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1273

The no form of this command removes loop protection from all VLANs on the interface.

Parameter <VLAN-LIST>

Description
Specifies the number of a single VLAN, or a series of numbers for a range of VLANs, separated by commas (1, 2, 3, 4), dashes (1-4), or both (1-4, 6).

Example

switch(config-if)# loop-protect vlan 2-6,10,15-20

Enabling loop protection on VXLAN interface:

switch# config switch(config)# interface vxlan 1 switch(config-lag-if)# loop-protect vlan 10

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.12 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if config-vxlan-if

Modification Loop protection supported on VXLAN interfaces. --
Authority Administrators or local user group members with execution rights for this command.

show loop-protect
Description
show loop-protect [<INTERFACE-NAME>] [vsx-peer] This command shows the following global configurations.
n Transmit interval. n Re-enable timer. n Per-port configurations. n Loop-protect enable or disable status. n Loop detection.

Loop protect commands | 1274

n Loop detected count. n Timestamp of latest loop detection. n Loop is detected on VLAN. n Interface status. n List of configured VLAN's for that port. n VTEP port information
Specify the interface name on display for the filter. When rebooting the switch or after switchover, The loop-detected count on the loop detected port is reset to zero.

Parameter <INTERFACE-NAME>
vsx-peer

Description
Specifies the name of a logical interface on the switch. This can be one of the following: n An Ethernet interface associated with a physical port. Format:
member/slot/port. n A LAG (link aggregation group). Specify the ID of LAG . For
example: lag100. n A VXLAN interface. Specify the VXLAN ID. For example: vxlan 1.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Loop protection on VXLAN interfaces is supported on AOS-CX 6200, 6300, 6400, 8360, 8325, 8400, 9300, 8100, 10000 switch series.

Examples
On the 6400 Switch Series, interface identification differs.

switch# show loop-protect

Transmit Interval (sec) Port Re-enable Timer (sec) Loop Detected Trap

:5 : Disabled : Enabled

Interface 1/1/1 Loop-protect enabled Loop-Protect enabled VLANs Action on loop detection Loop detected count Loop detected Interface status

: Yes : : TX disable :0 : No : up

Interface 1/1/2 Loop-protect enabled Loop-Protect enabled VLANs Action on loop detection Loop detected count Loop detected Interface status
Interface vxlan 1

: Yes : : TX disable :0 : No : up

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1275

Loop-protect enabled Loop-Protect enabled VLANs Action on loop detection Loop detected count Loop detected Interface status

: Yes : : RX disable :0 : No : up

switch# show loop-protect 1/1/3

Status and Counters - Loop Protection Information

Transmit Interval (sec) Port Re-enable Timer (sec) Loop Detected Trap

:5 :0 : Disabled

Interface 1 Loop-protect enabled Loop-Protect enabled VLANs Action on loop detection Loop detected count Loop detected Interface status

: Yes : : TX disable :0 : No : up

switch# show loop-protect Status and Counters - Loop Protection Information

Transmit Interval Port Re-enable Timer Loop Detected Trap

: 5 (sec) : Disabled : Disabled

Interface 1/5/48 Loop-protect enabled Action on loop detection Loop detected count Loop detected Detected on VLAN Detected at Interface status Tx_port

: No : TX disable :1 : Yes : 100 : 2023-03-20T00:01:17 : down : VTEP_100.1.1.2

Interface vxlan1 Loop-protect enabled Loop-Protect enabled VLANs Action on loop detection Loop detected count Loop detected Interface status

: Yes : 100 : RX disable :0 : No : up

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

Loop protect commands | 1276

Release 10.12 10.07 or earlier

Modification Loop protection supported on VXLAN interfaces. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1277

Chapter 71 Loopback commands

Loopback commands

interface loopback
interface loopback <INSTANCE> no interface loopback <INSTANCE>
Description
Creates a loopback interface and enters loopback configuration mode. The no form of this command deletes a loopback interface.

Parameter <INSTANCE>

Description Selects the loopback interface ID. Range: 0 to 255

Examples

switch(config)# interface loopback switch(config-loopback-if)#

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ip address
ip address <IPV4-ADDR/MASK> [secondary] no ip address <IPV4-ADDR/MASK> [secondary]
Description
Sets the IPv4 address for a loopback interface.

AOS-CX 10.14 Command-Line Interface Guide

1278

The no form of this command reverses the set of the IPv4 address for a loopback interface.

Parameter <IPV4-ADDR> <MASK> secondary

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Indicates that the IPv4 address is a secondary address.

Examples

switch(config)# interface loopback 1 switch(config-loopback-if)# ip address 16.93.50.2/24 switch(config-loopback-if)# ip address 20.1.1.1/24 secondary

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ipv6 address
ipv6 address <IPV6-ADDR/MASK>
Description
Sets the IPv6 address for a loopback interface.

Parameter <IPV6-ADDR>
<MASK>

Description
Specifies an IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.

Examples

Loopback commands | 1279

switch(config)# interface loopback 1 switch(config-loopback-if)# ipv6 address fd00:5708::f02d:4df6/64
For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

vrf attach
vrf attach <VRF-NAME> no vrf attach <VRF-NAME>
Description
Attaches a non-default VRF to a loopback. The no form of this command deletes a non-default VRF from a loopback and reattaches the default VRF.

Parameter <VRF-NAME>

Description
Specifies the name of the non-default VRF to be attached/deleted to/from a loopback.

Examples

switch(config)# interface loopback 1 switch(config-loopback-if)#vrf attach test

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1280

Command Information

Platforms
6300 6400

Command context config

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show interface loopback
show interface loopback [brief | instance <ID>] [vsx-peer]
Description
This command displays the configuration and status of loopback interfaces.

Parameter brief instance <ID> vsx-peer

Description
Displays brief information about all configured loopback interfaces.
Displays the configuration and status of a loopback interface ID. Range: 1-255
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
switch# show interface loopback Interface loopback1 is up IPv4 address 192.168.1.1/24 Interface loopback2 is up IPv4 address 182.168.1.1/24

switch# show interface loopback brief

---------------------------------------------------------------------

Loopback

IP Address

Status

Interface

---------------------------------------------------------------------

loopback1 10.1.1.1/24

up

loopback1 1111:2222:3333:4444::6666/128

up

switch# show interface loopback 1 Interface loopback1 is up IPv4 address 192.168.1.1/24

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Loopback commands | 1281

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1282

Chapter 72 MAC address table commands

MAC address table commands

clear mac-address
clear mac-address {interface <INTERFACE> | port <PORT-NUM> [vlan <VLAN-ID>] | vlan <VLANID> [port <PORT-NUM>] | <MAC-ADDR> [vlan <VLAN-ID>] [force]| <mac-address mac-move [address <mac-address> vlan <vlan>] | [vlan <VLAN>] <VLAN-ID>]}
Description
Clears the dynamic learned MAC addresses on the specified interface, combination of interface and VLAN, port, VLAN, combination of port and VLAN, MAC address, or combination of MAC address and VLAN. The command does not clear any port-security learned MAC addresses. Port-security MAC addresses are cleared when the port on which the MAC addresses were learned are shut down or the port-access-security feature is disabled on the port or the switch.

Parameter <INTERFACE> <PORT-NUM> <VLAN-ID> <MAC-ADDR> <mac-address mac-move>
force

Description
Specifies the list of interfaces, for example, 1/1/1 or 1/1/1-1/1/3 or lag1 or vxlan1.
Specifies a physical port on the switch. Format: member/slot/port.
Specifies the number of a VLAN.
Specifies the MAC address.
Clears the MAC move count and move history for a specified list or range of VLANs, or for a specific MAC address and VLANs. When the MAC address and VLANs are not mentioned, the statistics for all MAC addresses are cleared.
Clears the specified MAC address even if the MAC address is internally programmed by MAC management.

Examples
On the 6400 Switch Series, interface identification differs. Clearing the learned MAC addresses on a port:

switch# clear mac-address port 1/1/1

Clearing the learned MAC addresses on a combination of a VLAN and a port:

switch# clear mac-address port 1/1/1 vlan 20

AOS-CX 10.14 Command-Line Interface Guide

1283

switch# clear mac-address vlan 2 port 1/1/3 Clearing the learned MAC addresses on a combination of a VLAN and an interface or a list of interfaces:
switch# clear mac-address interface 1/1/1 vlan 10
switch# clear mac-address vlan 1 interface 1/1/1-1/1/3 Clearing the specified MAC addresses entry on the VLAN:
switch# clear mac-address 14:FA:01:F1:8B:8F vlan 1 Clearing the specified MAC addresses entry by force:
switch# clear mac-address 14:FA:01:F1:8B:8F force Clearing the learned MAC move addresses on a port:
switch# clear mac-address mac-move Clearing the learned MAC move addresses on a combination of a VLAN and an interface or a list of interfaces:
switch# clear mac-address mac-move address 00:00:00:00:00:01 vlan 10 Clearing the MAC move addresses entries on the VLAN:
switch# clear mac-address mac-move vlan 10-20

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.13 10.09 10.07 or earlier
Command Information

Modification The mac-address mac-move parameter was introduced. Added parameters for interface and MAC address. --

MAC address table commands | 1284

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

clear mac address mac move
clear mac-address mac-move [address <mac-address> vlan <vlan>] | [vlan <VLAN>]
Description
Clears the MAC move count and move history for a specified list or range of VLANs, or for a specific MAC and VLAN. When MAC and VLAN are not mentioned, it clears statistics for all MACs.

Parameter <address>

Description Clears information for a specific MAC address.

<vlan>

Clears mac-move entries on VLANs.

Examples
Clearing the learned MAC move addresses on a port:

switch# clear mac-address mac-move

Clearing the learned MAC move addresses on a combination of a VLAN and an interface or a list of interfaces:

switch# clear mac-address mac-move address 00:00:00:00:00:01 vlan 10

Clearing the MAC move addresses entries on the VLAN:

switch# clear mac-address mac-move vlan 10-20

Command History
Release 10.13

Modification Command introduced

Command Information

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1285

clear mac-address-table
clear mac-address-table address <mac-address> vlan <1-4094>
Description
This command is used to clear the MAC move count and move history for a single MAC address or VLAN, or for a range of VLANs. If no specific MAC address or VLAN is specified, this command clears statistics for all MAC addresses.

Parameter address vlan <1-4094>

Description (Optional) Clear information for a specific MAC address. (Optional) Clear move information for specific VLAN.

Examples
Clearing MAC move statistics for all MAC addresses.

switch# clear mac-address mac-move

Clearing MAC move statistics for MAC addresses in a range of VLANs.

switch# clear mac-address mac-move vlan 10-20

Clearing MAC move addresses from a specific MAC address and VLAN:

switch# clear mac-address mac-move address 00:00:00:00:00:01 vlan 10

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.13 or earlier

Modification Command introduced.

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

MAC address table commands | 1286

mac-address-table age-time
mac-address-table age-time <SECONDS> no mac-address-table age-time [<SECONDS>]
Description
Sets the maximum amount of time a MAC address remains in the MAC address table. When this time expires, the MAC address is removed. The no form of this command resets the MAC aging timer to the default value (300 seconds).

Parameter age-time <SECONDS>

Description
Specifies the MAC address aging time in seconds. Range: 60 to 3600. Default: 300.

Example

switch(config)# mac-address-table age-time 120

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

mac-lockout
mac-lockout <MAC-ADDR> no mac-lockout <MAC-ADDR>
Description
Locks a MAC address globally on the switch and all VLANS. The switch drops all data packets addressed to or from the given address. The no form of this command unlocks the MAC address globally on the switch and all VLANs.
This configuration will disable flow tracking statistics collection.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1287

Parameter <MAC-ADDR>

Description Specifies the MAC address.

Usage
MAC lockout is implemented on each switch individually. MAC lockout overrides MAC lockdown, port security (secure MAC), and 802.1X authentication. The MAC lockout feature is not intended to lock broadcast/multicast MAC addresses and switch agent MACs. A maximum of 200 MAC lockouts can be configured on a switch.
Example
Enabling MAC lockout:

switch(config)# mac-lockout 00:00:00:00:00:01

Disabling MAC lockout:

switch(config)# no mac-lockout 00:00:00:00:00:01

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Command Information

Platforms
6300 6400 (v2 profile only)

Command context config

Modification Added information related to role based IPFIX. --
Authority Administrators or local user group members with execution rights for this command.

show mac-address-table
show mac-address-table [hsc] [vsx-peer]
Description
Shows MAC address table information. If HSC is enabled, MAC addresses discovered by the HSC manager are also displayed.

MAC address table commands | 1288

Parameter [hsc]
vsx-peer

Description
Displays only MAC address discovered by the HSC manager on the remote controller.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing output when table entries exist:

switch# show mac-address-table

MAC age-time

: 300 seconds

Number of MAC addresses : 5

MAC Address

VLAN

Type

Port

--------------------------------------------------

00:00:00:00:00:05 1

dynamic 1/1/2

00:00:00:00:00:06 2

dynamic 1/1/1

00:00:00:00:00:08 3

hsc

vxlan1(10.1.1.1)

00:00:00:00:00:12 3

hsc

vxlan1(10.1.1.3)

00:00:00:00:00:34 3

hsc

vxlan1(10.1.1.4)

Showing output that includes information about an IPv6 VXLAN:

3C-T-6300-27# show mac-address-table

MAC age-time

: 300 seconds

Number of MAC addresses : 2

MAC Address

VLAN

Type

Port

--------------------------------------------------------------

00:50:56:8d:44:13 1001

dynamic

1/1/2

00:50:56:8d:45:63 1002

evpn

vxlan1(1920:1680:1:1::2)

Showing output when there are no MAC table entries:

switch# show mac-address-table No MAC entries found.

Showing only MAC address discovered by the HSC manager:

switch# show mac-address-table hsc

Number of MAC addresses : 3

MAC Address

VLAN

Type

Port

---------------------------------------------------------

00:00:00:00:00:08 3

hsc

vxlan1(10.1.1.1)

00:00:00:00:00:12 3

hsc

vxlan1(10.1.1.3)

00:00:00:00:00:34 3

hsc

vxlan1(10.1.1.4)

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1289

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mac-address-table address
show mac-address-table address <MAC-ADDR> [vsx-peer]
Description
Shows MAC address table information for a specific MAC address.

Parameter <MAC-ADDR> vsx-peer

Description
Specifies the MAC address.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
On the 6400 Switch Series, interface identification differs.

switch# show mac-address-table address 00:00:00:00:00:01

MAC age-time

: 300 seconds

Number of MAC addresses : 2

MAC Address

VLAN

Type

Port

--------------------------------------------------

00:00:00:00:00:01 2

dynamic 1/1/1

00:00:00:00:00:01 1

dynamic 1/1/1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

MAC address table commands | 1290

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mac-address-table count
show mac-address-table count [dynamic | port <PORT-NUM> | vlan <VLAN-ID>] [vsx-peer]
Description
Displays the number of MAC addresses.

Parameter dynamic <PORT-NUM>
vlan <VLAN-ID> vsx-peer

Description
Show the count of dynamically learned MAC addresses.
Specifies a physical port on the switch. Format: member/slot/port.
Specifies the number of a VLAN.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing the number of MAC addresses:

switch# show mac-address-table count Number of MAC addresses : 8

Showing the number of dynamically learned MAC addresses:

switch# show mac-address-table count dynamic Number of MAC addresses : 8

Showing the number of MAC addresses per physical port on the switch:

switch# show mac-address-table count port 1/1/1 Number of MAC addresses : 2

Showing the number of MAC addresses per VLAN:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1291

switch# show mac-address-table count vlan 100 Number of MAC addresses : 5
Showing the number of MAC addresses on the VSX primary and secondary (peer) switch:
vsx-primary# show mac-address-table count Number of MAC addresses : 26114 vsx-primary# show mac-address-table count vsx-peer Number of MAC addresses : 26113

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mac-address-table dynamic
show mac-address-table dynamic [port <PORT-NUM> | vlan <VLAN-ID>] [vsx-peer]
Description
Shows MAC address table information about dynamically learned MAC addresses.

Parameter <PORT-NUM>
<VLAN-ID> vsx-peer

Description
Specifies a physical port on the switch. Format: member/slot/port.
Specifies the number of a VLAN.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing all dynamic MAC address table entries:

MAC address table commands | 1292

switch# show mac-address-table dynamic

MAC age-time

: 300 seconds

Number of MAC addresses : 2

MAC Address

VLAN

Type

Port

--------------------------------------------------

00:00:00:00:00:05 1

dynamic 1/1/2

00:00:00:00:00:06 2

dynamic 1/1/1

Showing dynamic MAC address table entries for VLAN 1:

switch# show mac-address-table dynamic vlan 1

MAC age-time

: 300 seconds

Number of MAC addresses : 1

MAC Address

VLAN

Type

Port

--------------------------------------------------

00:00:00:00:00:05 1

dynamic 1/1/2

Showing dynamic MAC address table entries for port 1/1/1:

switch# show mac-address-table dynamic port 1/1/1

MAC age-time

: 300 seconds

Number of MAC addresses : 1

MAC Address

VLAN

Type

Port

--------------------------------------------------

00:00:00:00:00:06 2

dynamic 1/1/1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mac-address-table interface
show mac-address-table interface <INTERFACE>
Description
Shows the MAC address table entries for the specified interface.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1293

Parameter <INTERFACE>

Description Specifies an interface or a list of interfaces on the switch.

Examples
On the 6400 Switch Series, interface identification differs. Showing the MAC address table entries for interface 1/1/1:

switch# show mac-address-table interface 1/1/1

MAC age-time

: 300 seconds

Number of MAC addresses : 1

MAC Address

VLAN

Type

Interface

--------------------------------------------------

00:00:00:00:00:01 2

dynamic 1/1/1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.09

Modification Command introduced

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mac-address-table lockout
show mac-address-table lockout [vsx-peer]
Description
Shows MAC lockout table information.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

MAC address table commands | 1294

switch# show mac-address-table lockout Number of MAC lockout addresses :

2MAC Address

Type

------------------------------------------

00:00:00:00:01:10 static

00:00:00:00:10:03 static

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mac address table mac move
show mac-address-table mac-move [address <mac-address> vlan <vlan>] | [vlan <vlan>]
Description
Displays the MAC entries in the MAC address table that have moved at least once. The output can be filtered based on a specific VLAN or specific MAC address and VLAN.

Parameter <address>

Description Displays information for a specific MAC address.

<vlan>

Displays information for specific VLANs.

Examples
Displaying the moved MAC addresses:

switch# show mac-address-table mac-move Number of MAC addresses : 2

MAC Address

VLAN Current Port Previous Port Move Count Last Move

----------------------------------------------------------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1295

-------------

00:00:00:00:00:bb 10

1/1/28

1/1/27

2

19:11:52 2023

00:00:00:00:00:aa 10

1/1/27

1/1/28

2

19:11:51 2023

Fri Sep 15 Fri Sep 15

switch# show mac-address-table mac-move address 00:00:00:00:00:aa vlan 10 Number of MAC Move addresses : 1

MAC Address

VLAN Current Port Previous Port Move Count Last Move

----------------------------------------------------------------------------------

------------

00:00:00:00:00:aa 10

1/1/27

1/1/28

2

Fri Sep 15

19:11:51 2023

switch# show mac-address-table mac-move vlan 10 Number of MAC Move addresses : 2

MAC Address

VLAN Current Port Previous Port Move Count Last Move

----------------------------------------------------------------------------------

------------

00:00:00:00:00:bb 10

1/1/28

1/1/27

2

Fri Sep 15

19:11:52 2023

00:00:00:00:00:aa 10

1/1/27

1/1/28

2

Fri Sep 15

19:11:51 2023

In case of MACs learnt on VXLAN tunnels or "port-access port-security" enabled ports, move scenario is handled by EVPN/port-access feature respectively and it performs the move by deleting the MAC from old port and installing it on new port. Thus, the MAC move data will be removed for the deleted MAC addresses.

Command History
Release 10.13

Command Information

Platforms All platforms

Command context Manager (#)

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

show mac-address-table mac-move
show mac-address-table mac-move address <mac-address> vlan <1-4094>
Description
This command displays the MAC entries in the MAC address table that have moved at least one time. The output of this command can be filtered to display information for a specific VLAN or for a specific MAC address and VLAN.

MAC address table commands | 1296

Users will not be able to view mac-move count for clients that are transitioning between mac-auth enabled ports; however, users will be able to view the mac-move count when clients are transitioning from a mac-auth enabled port to a non-authenticated port.

Parameter address vlan <1-4094>

Description (Optional) Show move information for a specific MAC address. (Optional) Show move information for specific VLAN.

Examples
Showing the total number of MAC move addresses:

switch# show mac-address-table mac-move Number of MAC Move addresses : 2

MAC Address

VLAN Current Port Previous Port Move Count Last Move

----------------------------------------------------------------------------------

------------

00:00:00:00:00:bb 10

1/1/28

1/1/27

2

Fri Sep 15

19:11:52 2023

00:00:00:00:00:aa 10

1/1/27

1/1/28

2

Fri Sep 15

19:11:51 2023

Showing the number MAC move addresses on a specific VLAN:

switch# show mac-address-table mac-move vlan 10 Number of MAC Move addresses : 2

MAC Address

VLAN Current Port Previous Port Move Count Last Move

----------------------------------------------------------------------------------

------------

00:00:00:00:00:bb 10

1/1/28

1/1/27

2

Fri Sep 15

19:11:52 2023

00:00:00:00:00:aa 10

1/1/27

1/1/28

2

Fri Sep 15

19:11:51 2023

Showing the number MAC move addresses on a specific MAC address and VLAN:

switch# show mac-address-table mac-move address 00:00:00:00:00:aa vlan 10 Number of MAC Move addresses : 1

MAC Address

VLAN Current Port Previous Port Move Count Last Move

----------------------------------------------------------------------------------

------------

00:00:00:00:00:aa 10

1/1/27

1/1/28

2

Fri Sep 15

19:11:51 2023

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1297

Release 10.13 or earlier

Modification Command introduced.

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mac-address-table port
show mac-address-table port <PORT-NUM> [vsx-peer]
Description
Shows the MAC address table entries for the specified port.

Parameter <PORT-NUM>
vsx-peer

Description
Specifies a physical port on the switch. Format: member/slot/port.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing the MAC address table entries for port 1/1/1:

switch# show mac-address-table port 1/1/1

MAC age-time

: 300 seconds

Number of MAC addresses : 1

MAC Address

VLAN

Type

Port

--------------------------------------------------

00:00:00:00:00:01 2

dynamic 1/1/1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

MAC address table commands | 1298

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mac-address-table static
show mac-address-table static
Description
Shows all statically configured MAC addresses.
Examples
On the 6400 Switch Series, interface identification differs.

switch# show mac-address-table static Number of MAC addresses : 2

MAC Address

VLAN

Port

--------------------------------------

00:00:00:00:10:02 1

1/1/1

00:00:00:00:10:03 1

1/1/1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mac-address-table vlan
show mac-address-table vlan <VLAN-ID> [vsx-peer]
Description
Shows MAC addresses learned by or configured on the specified VLAN.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1299

Parameter vlan <VLAN-ID> vsx-peer

Description
Specifies the VLAN ID.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs.

switch# show mac-address-table vlan 1

MAC age-time

: 300 seconds

Number of MAC addresses : 1

MAC Address

VLAN

Type

Port

--------------------------------------------------

00:00:00:00:00:01 1

dynamic 1/1/1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mac address table mac move
show mac-address-table mac-move [address <mac-address> vlan <vlan>] | [vlan <vlan>]
Description
Displays the MAC entries in the MAC address table that have moved at least once. The output can be filtered based on a specific VLAN or specific MAC address and VLAN.

Parameter <address>

Description Displays information for a specific MAC address.

MAC address table commands | 1300

Parameter <vlan>

Description Displays information for specific VLANs.

Examples
Displaying the moved MAC addresses:

switch# show mac-address-table mac-move Number of MAC addresses : 2

MAC Address

VLAN Current Port Previous Port Move Count Last Move

----------------------------------------------------------------------------------

-------------

00:00:00:00:00:bb 10

1/1/28

1/1/27

2

Fri Sep 15

19:11:52 2023

00:00:00:00:00:aa 10

1/1/27

1/1/28

2

Fri Sep 15

19:11:51 2023

switch# show mac-address-table mac-move address 00:00:00:00:00:aa vlan 10 Number of MAC Move addresses : 1

MAC Address

VLAN Current Port Previous Port Move Count Last Move

----------------------------------------------------------------------------------

------------

00:00:00:00:00:aa 10

1/1/27

1/1/28

2

Fri Sep 15

19:11:51 2023

switch# show mac-address-table mac-move vlan 10 Number of MAC Move addresses : 2

MAC Address

VLAN Current Port Previous Port Move Count Last Move

----------------------------------------------------------------------------------

------------

00:00:00:00:00:bb 10

1/1/28

1/1/27

2

Fri Sep 15

19:11:52 2023

00:00:00:00:00:aa 10

1/1/27

1/1/28

2

Fri Sep 15

19:11:51 2023

In case of MACs learnt on VXLAN tunnels or "port-access port-security" enabled ports, move scenario is handled by EVPN/port-access feature respectively and it performs the move by deleting the MAC from old port and installing it on new port. Thus, the MAC move data will be removed for the deleted MAC addresses.

Command History
Release 10.13
Command Information

Modification Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1301

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

static-mac
static-mac <MAC-ADDR> vlan <VLAN-ID> port <PORT-NUM> workload no...
Description
Adds a static MAC address to the MAC address table and associates it with a port or existing VLAN. Static MAC addresses can only be assigned to layer 2 (non-routed) interfaces. Static MAC addresses are not affected by the MAC address aging time. The no form of this command deletes a static MAC address.

Parameter <MAC-ADDR>
vlan <VLAN-ID> port <PORT-NUM>

Description
Specifies a MAC address (xx:xx:xx:xx:xx:xx), where x is a hexadecimal number from 0 to F.
Specifies number of an existing VLAN.
Specifies a physical port on the switch. Format: member/slot/port.

Examples
On the 6400 Switch Series, interface identification differs.

switch(config)# static-mac 00:00:00:00:00:01 vlan 1 port 1/1/1 switch(config)# no static-mac 00:00:00:00:00:01 vlan 1 port 1/1/1
switch(config)# static-mac 00:00:00:00:00:01 vlan 1 port 1/1/2 1/1/2 is not an L2 port
switch(config)# static-mac 00:00:00:00:00:01 vlan 2 port 1/1/1 VLAN 2 not found

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

MAC address table commands | 1302

Command Information

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1303

Chapter 73 MACsec commands

MACsec commands

apply macsec policy
apply macsec policy <MACSEC-POLICY-NAME> no apply macsec policy
Description
Within the selected interface context, applies the specified MACsec policy to the selected port. When a MACsec policy is applied to a port, MACsec is enabled on the port and all data traffic is blocked on the port until a secure channel is successfully established.
A MACsec policy can be applied to a physical interface port that is not part of any LAG ports or to a lag port. It can also be applied to an interface that is configured as an MCLAG, VSX keep-alive, or VSX inter-switch-link.
If a MACsec policy is already applied to the selected port, this command replaces the existing policy application.
For MACsec to work, an MKA policy must also be configured and applied to the same ports.
The no form of this command dissociates the specified policy from the port.

Parameter <MACSEC-POLICY-NAME>

Description
Specifies the MACsec policy name. Range: 1 to 128 alphanumeric characters including only the three special characters "." (period), "-" (hyphen), and "_" (underscore).

Usage
n When any MACsec or MKA policy parameter is updated, any active MACsec session on all interfaces running the MACsec or MKA policy is terminated and restarted. This is indicated with the following prompt that provides an opportunity to not execute the apply command.

This policy is currently in use by one or more interfaces. Updating the policy will cause existing MACsec sessions using the policy to restart. Continue (y/n)?

n For non-LAG ports, a range of ports can be specified in the interface command used to enter the interface context. For example, entering the interface context for ports 1/1/1 through 1/1/2:

switch(config)# interface 1/1/1-1/1/2 switch(config-if-<1/1/1-1/1/2>)# apply macsec policy MS_Policy1

AOS-CX 10.14 Command-Line Interface Guide

1304

n Not all interfaces on a switch may support the MACsec capability. An error will be generated when a policy is applied to a physical interface that is not capable of MACsec. For LAG ports, any non-MACsec capable interfaces that are part of the LAG will be blocked.
Examples
Applying a MACsec policy to a range of two ports:
switch(config)# interface 1/1/1-1/1/2 switch(config-if-<1/1/1-1/1/2>)# apply macsec policy MS_Policy1
Attempting to apply a MACsec policy to a port that is not MACsec capable:
switch(config)# interface 1/1/25 switch(config-if)# apply macsec policy MS_Policy1 MACsec is not supported on the interface. switch(config-if)#
Removing MACsec policy association from a port:
switch(config)# interface 1/1/1 switch(config-if)# no apply macsec policy
Applying a MACsec policy to a LAG port:
switch(config)# interface lag 1 switch(config-if)# apply macsec policy MS_Policy1

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms 6300

Command context config-if

Modification Command introduced on the 6300.
Authority Administrators or local user group members with execution rights for this command.

bypass
bypass {ieee-bpdu} no bypass {ieee-bpdu}

MACsec commands | 1305

Description
Configures the MACsec policy to bypass MACsec for specific features. When bypass is enabled on the BPDU, packets with a destination MAC matching the IEEE BPDU MAC (01:80:c2:00:00:0*) will bypass MACsec on both the egress and ingress directions. By default, when MACsec is enabled on an interface, all BPDU frames except EAPoL are protected by MACsec. However, when an interface configured is configured to initiate a MACsec tunnel, the BPDU frames that are essential to the next hop device are sent with MACsec protection. This causes protocols such as LLDP and LACP to fail on the local link since the next hop device will fail to read the MACsec protected frames. To enable these protocols to operate on such links, you must enable BPDU bypass in the MACsec policy. The no form of the command disables MACsec bypass for the specified feature. When no feature is specified, MACsec bypass is disabled for all the features.
Examples
Enabling the MACsec bypass for IEEE BPDUs:
switch(config)# macsec policy Aggregator-Connect switch(config-macsec-policy)# bypass ieee-bpdu OR switch(config)# macsec policy Aggregator-Connect bypass ieee-bpdu
Disabling the MACsec bypass for IEEE BPDU:
switch(config)# macsec policy Aggregator-Connect switch(config-macsec-policy)# no bypass ieee-bpdu OR switch(config)# no macsec policy Aggregator-Connect bypass ieee-bpdu

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.13.1000 10.13

Modification Added support for the 6400 Switch Series. Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-macsec-policy

Authority
Administrators or local user group members with execution rights for this command.

cipher-suite
cipher-suite {<CIPHER-SUITE>} [<CIPHER-SUITE>] ... [<CIPHER-SUITE>] no cipher-suite [<CIPHER-SUITE>] ... [<CIPHER-SUITE>]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1306

Description
Within the MACsec policy context, configures one or more cipher suites to be used to generate the SAK (Secure Authentication Key) for when the switch is the key server. When multiple cipher suites are configured, the most secure cipher suite is considered first during negotiation.
The no form of this command (without the <CIPHER-SUITE> parameter) resets to the default of considering (during negotiation) all supported cipher suites while giving priority to the most secure suite gcm-aes-xpn-256. Include the <CIPHER-SUITE> parameter to disable a particular cipher suite.

Parameter <CIPHER-SUITE>

Description
Selects the cipher suite. Available cipher suites are: n gcm-aes-128: AES-128 encryption with Galois/Counter mode. n gcm-aes-256: AES-256 encryption with Galois/Counter mode. n gcm-aes-xpn-128: AES-128 encryption with Galois/Counter
mode and extended packet numbering. n gcm-aes-xpn-256: AES-128 encryption with Galois/Counter
mode and extended packet numbering. (The default and the most secure.)

Examples
Enabling a single cipher suite:

switch(config-macsec-policy)# cipher-suite gcm-aes-128

Enabling two cipher suites:

switch(config-macsec-policy)# cipher-suite gcm-aes-256 gcm-aes-xpn-256

Disabling a particular cipher suite:

switch(config-macsec-policy)# no cipher suite gcm-aes-128

Resetting to the default of considering all available cipher suites while giving priority to gcm-aes-xpn256:

switch(config-macsec-policy)# no cipher-suite

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10
Command Information

Modification Command introduced on the 6300.

MACsec commands | 1307

Platforms 6300

Command context config-macsec-policy

Authority
Administrators or local user group members with execution rights for this command.

clear macsec statistics
clear macsec statistics [interface <IF-RANGE>]
Description
Clears MACsec statistics on all MACsec-enabled interfaces or on a specific interface or interface range. MACsec statistics are cleared for the entire switch rather than just in the current user session.

Parameter interface <IF-RANGE>

Description
Specifies one or more interfaces for which MACsec statistics information is to be cleared.

Examples
Clearing MACsec statistics on an interface range:

switch# clear macsec statistics interface 1/1/1-1/1/4

Clearing MACsec statistics on all MACsec-enabled interfaces:

switch# clear macsec statistics

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.10

Command Information

Platforms 6300

Command context Manager (#)

Modification Command introduced on the 6300.
Authority Administrators or local user group members with execution rights for this command.

clear tag mode
clear tag mode {dot1q | none} no clear tag mode {dot1q | none}
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1308

Configures the part of the Ethernet payload in a MACsec protected frame that must precede the Security TAG (SecTAG) header in clear text. The dot1q mode allows the 802.1q tag of a MACsec protected frame to be sent in clear text and placed before the MACsec SecTAG header. This enables the establishment of a MACsec tunnel between two MACsec endpoints over a non-MACsec Layer 2 network. The no form of the command will configure the device to place the SecTAG header immediately after the destination and source MAC addresses.
Untagged traffic is not supported on a MACsec channel running clear-tag mode as dot1q. All untagged frames will be dropped on ingress.

Parameter dot1q
none

Description
Specifies the encoding of a single 802.1q tag in clear text before Security TAG (SecTAG).
Specfies that the Security TAG (SecTAG) directly follows the Ethernet addresses. This is the default option.

Examples
Configuring the clear-tag mode as dot1q.:

switch(config)# macsec policy Aggregator-Connect switch(config-macsec-policy)# clear-tag-mode dot1q OR switch(config)# macsec policy Aggregator-Connect clear-tag-mode dot1q

Resetting the clear-tag mode:

switch(config)# macsec policy Aggregator-Connect switch(config-macsec-policy)# no clear-tag-mode dot1q OR switch(config)# no macsec policy Aggregator-Connect clear-tag-mode dot1q

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13.1000 10.13
Command Information

Modification Added support for the 6400 Switch Series. Command introduced.

MACsec commands | 1309

Platforms
6300 6400

Command context
config config-macsec-policy

Authority
Administrators or local user group members with execution rights for this command.

confidentiality
confidentiality [offset {0|30|50}] no confidentiality
Description
Within the MACsec policy context, enables Ethernet packet encryption after the MACsec header, optionally including a start-of-encryption offset. Confidentiality is enabled by default with an offset of 0 bytes after the MACsec header. An offset of 0 causes the entire packet (after the MACsec header) to be encrypted. It is sometimes desirable to offset the start of the encryption deeper into the packet to allow for fields such as MPLS labels and 802.1Q tags to remain unencrypted. Omitting the offset parameter enables confidentiality with whatever offset was configured previously. The no form of this command disables confidentiality.

Parameter offset {0|30|50}

Description
Selects the start-of-encryption offset (in bytes) into the packet after the MACsec header. Default 0 bytes.

Examples
Enabling confidentiality with an offset of 30 bytes:

switch(config-macsec-policy)# confidentiality offset 30

Disabling confidentiality

switch(config-macsec-policy)# no confidentiality

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10
Command Information

Modification Command introduced on the 6300.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1310

Platforms 6300

Command context config-macsec-policy

Authority
Administrators or local user group members with execution rights for this command.

include-sci-tag
include-sci-tag no include-sci-tag
Description
Within the MACsec policy context, enables inclusion of the Secure Channel Identifier (SCI) tag in the Security TAG (SecTAG) field of the MACsec header. This is the default. Inclusion of the SCI tag is not required on point-to-point links if the transmitting link has only one MACsec peer.
On the 8360 Switch Series models JL700A and JL701A, inclusion (or exclusion) of the SCI tag must be set identically at both ends of a MACsec channel. Asymmetric SCI tag settings are not supported.
The no form of this command disables inclusion of the Secure Channel Identifier (SCI) tag in the Security TAG (SecTAG) field of the MACsec header.
Examples
Enabling the SCI tag:
switch(config-macsec-policy)# include-sci-tag
Disabling the SCI tag:
switch(config-macsec-policy)# no include-sci-tag

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Modification Command introduced on the 6300.

Command Information

Platforms 6300

Command context config-macsec-policy

Authority
Administrators or local user group members with execution rights for this command.

MACsec commands | 1311

macsec policy
macsec policy <MACSEC-POLICY-NAME> no macsec policy <MACSEC-POLICY-NAME>
Description
Creates the specified MACsec policy and then enters its context (displayed in the CLI as config-macsecpolicy). If the MACsec policy already exists, this command enters the specified MACsec policy context. A MACsec policy can be applied to one or more switch ports, enabling MACsec on the ports. An MKA (MACsec Key Agreement) policy must be applied to the same ports. The no form of this command deletes the MACsec policy.

6300 Switch Series models that support MACsec:

6300 model

Ports

Speed

R8S89A

Downlinks: 1/1/1-1/1/24

100M/1G/2.5G/5G/10G

Uplinks: 1/1/27-1/1/28

10G/25G

R8S90A

Downlinks: 1/1/1-1/1/48

100M/1G/2.5G/5G

Uplinks: 1/1/51-1/1/52

10G/25G

R8S91A

Downlinks: 1/1/1-1/1/48

100M/1G/2.5G/5G

Uplinks: 1/1/51-1/1/52

10G

R8S92A

Downlinks: 1/1/1-1/1/24

1G/10G

Uplinks: 1/1/27-1/1/28

100M / 1G / 10G

A MACsec policy cannot be deleted if it is currently applied to any ports. All application of the policy must be removed before the policy can be deleted.

Parameter <MACSEC-POLICY-NAME>

Description
Specifies the MACsec policy name. Range: 1 to 128 alphanumeric characters including only the three special characters "." (period), "-" (hyphen), and "_" (underscore).

Examples
Creating a MACsec policy:

switch(config)# macsec policy MS_Policy1 switch(config-macsec-policy)#

Deleting a MACsec policy (the policy cannot be currently applied to any ports):

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1312

switch(config)# no macsec policy MS_Policy1

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms 6300

Command context config

Modification Command introduced on the 6300.
Authority Administrators or local user group members with execution rights for this command.

macsec selftest
macsec selftest no macsec selftest
Description
Configures the system to run a self test for MACsec on all MACsec-capable interfaces. The no form of the command disables the MACsec self test on the device. When enabled, the system will drop traffic on all MACsec capable interfaces until the MACsec selftest completes successfully on the interface. A MACsec selftest will be run in the following scenarios: n On a VSF stack, the self test will run on a newly added switch n When member is removed and re-added to stack n When interface is removed from VSF link n After every reboot (if enabled)
Examples
Running a MACsec self test:
switch(config)# macsec selftest
Disabling the MACsec self test:
switch(config)# no macsec selftest

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

MACsec commands | 1313

Release 10.11

Command Information

Platforms 6300

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

replay-protection
replay-protection [window-size <WINDOW-SIZE>] no replay-protection
Description
Within the MACsec policy context, enables replay protection with the default or specified window size. With replay protection enabled, packets are expected to arrive within the replay protection window number of packets. For example with a window size of 10, any packet arriving out-of-sequence by more than 10 packets will be discarded. A window size of 0 (the default) enforces strict order of packet reception, discarding all packets not received in perfect sequence. The no form of this command disables replay protections and resets the window size to its 0 default.

Parameter <WINDOW-SIZE>

Description
Specifies the replay protection window size in packets. Default 0 packets. Range: 0 to 4294967295 packets.

Examples
Enabling replay protection with the default window size of 0 (strict order of packet reception):

switch(config-macsec-policy)# replay-protection

Enabling replay protection with a windows size of 100 packets:

switch(config-macsec-policy)# replay-protection window-size 100

Disabling replay protection.

switch(config-macsec-policy)# no replay-protection

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1314

Release 10.10

Modification Command introduced on the 6300.

Command Information

Platforms 6300

Command context config-macsec-policy

Authority
Administrators or local user group members with execution rights for this command.

secure-mode
secure-mode {should-secure|must-secure} no secure-mode [should-secure|must-secure]
Description
Configures the MACsec protection behavior on the interface when a MACsec Key Agreement (MKA) session is not established. Use should-secure to enable fail open mode for MACsec. Fail open mode ensures that traffic continues to flow if the MKA session is not established. Use must-secure (the default) to use MACsec in fail closed mode. The no form of the command resets the behavior to the default, must-secure.

Parameter {should-secure | must-secure}

Description
With should-secure set: n If the MKA session is not established, traffic is still allowed in
clear text without the MACsec header. n If the MKA session is established successfully, traffic is allowed
with the MACsec header.
With must-secure set: n If the MKA session is not established, traffic is blocked on the
data-plane. n If the MKA session is established successfully, traffic is allowed
with the MACsec header.

Examples
Configuring should-secure:

switch(config)# macsec policy Aggregator-Connect switch(config-macsec-policy)# secure-mode should-secure OR switch(config)# macsec policy Aggregator-Connect secure-mode should-secure

Configuring must-secure:

switch(config)# macsec policy Aggregator-Connect switch(config-macsec-policy)# secure-mode must-secure

MACsec commands | 1315

OR switch(config)# macsec policy Aggregator-Connect secure-mode must-secure
Resetting to the default (must-secure):
switch(config)# macsec policy Aggregator-Connect switch(config-macsec-policy)# no secure-mode OR switch(config)# no macsec policy Aggregator-Connect secure-mode

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms 6300

Command context
config config-macsec-policy

Authority
Administrators or local user group members with execution rights for this command.

show macsec policy
show macsec policy [<MACSEC-POLICY-NAME>]
Description
Shows information for one or all MACsec policies.

Parameter <MACSEC-POLICY-NAME>

Description
Specifies the MACsec policy name. Range: 1 to 128 alphanumeric characters including only the three special characters "." (period), "-" (hyphen), and "_" (underscore).

Examples
Showing information for a specific MACsec policy:

switch# show macsec policy Aggregator-Connect

MACsec Policy Details

Policy Name: Aggregator-Connect

----------------------------------------------------------------------------

Cipher suite

: GCM-AES-128

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1316

Include SCI

: Yes

Confidentiality

: Enabled

Confidentiality offset : 0

Replay protection

: Enabled

Replay protection window : 0

Data delay protection : Enabled

Secure mode

: Must-Secure

Bypass

: IEEE-BPDU

Clear tag mode

: 802.1q

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13.1000 10.13
10.10

Modification
Command introduced on the 6400 Switch Series.
Command output updated to display Bypass and Clear tag mode information.
Command introduced on the 6300.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show macsec selftest
show macsec selftest [interface <IFRANGE>]
Description
Shows the status of the MACsec selftest for MACsec capable interfaces. If an interface fails the self test then MACsec selftest should be disabled.

Parameter <IFRANGE>

Description
Specifies the interface(s) for which to show MACsec selftest information.

Examples
Showing MACsec self test information for all interfaces that are MACsec capable:

switch# show macsec selftest MACsec selftest status

MACsec commands | 1317

Interface --------1/1/1 1/1/2 1/1/3 1/1/4 1/1/5 1/1/6 1/1/7 1/1/8 1/1/9

Status ----------Initializing Passed Queued for run Running Failed Failed Failed Failed Initialized

Failure Reason --------------------------
Encryption test failed Decryption test failed Initialization failed Time out

Showing MACsec self test information for a specific interface:

switch# show macsec selftest interface 1/1/1

MACsec selftest status

Interface Status Failure Reason

--------- ------ -----------------------------

1/1/1

Passed --

Showing MACsec self test information for an interface range:

switch# show macsec selftest interface 1/1/1-1/1/3

MACsec selftest status

Interface --------1/1/1 1/1/2 1/1/3

Status ----------Passed Running Failed

Failure Reason --------------------------Decryption test failed

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms 6300

Command context Manager (#)

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

show macsec statistics
show macsec statistics [interface <IF-RANGE>]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1318

Description
Shows MACsec statistics for all MACsec-enabled interfaces or a specific interface or interface range.

Parameter interface <IF-RANGE>

Description
Specifies one or more interfaces for which MACsec statistics information is to be shown.

Examples
Showing MACsec statistics for a specific interface:

switch# show macsec statistics interface 1/1/1

MACsec Statistics

Interface 1/1/1 ================

Rx Statistics

--------------

Unicast Uncontrolled Packets : 170438363226

Multicast Uncontrolled Packets : 66586

Broadcast Uncontrolled Packets : 4399

Rx Uncontrolled Drop Packets : 0

Rx Uncontrolled Error Packets : 0

Rx Controlled Unicast Packets : 170438369232

Rx Controlled Multicast Packets : 31298

Rx Controlled Broadcast Packets : 4399

Rx Controlled Drop Packets

:0

Rx Controlled Error Packets

:0

Uncontrolled Octets

: 27270198219337

Controlled Octets

: 21816165353719

Tx Statistics --------------
Unicast Uncontrolled Packets Multicast Uncontrolled Packets Broadcast Uncontrolled Packets Rx Uncontrolled Drop Packets Rx Uncontrolled Error Packets Unicast Controlled Packets Multicast Controlled Packets Broadcast Controlled Packets Rx Controlled Drop Packets Rx Controlled Error Packets Uncontrolled Octets Controlled Octets Common Octets

:0 : 33756 :0 :0 :0 : 171226945517 : 98215 : 71894 :0 :0 : 4658308 : 21917110733304 : 27396383670012

SecY Statistics ----------------
Port Identifier : 1

Rx Statistics

--------------

Transform Error Packets : 0

Control Packets

: 35288

Untagged Packets

:0

No Tag Packets

:0

MACsec commands | 1319

Bad Tag Packets No SCI Packets Unknown SCI Packets Tagged Control Packets Overrun Packets

: 39 :0 :0 :0 :0

Tx Statistics

--------------

Transform Error Packets : 0

Control Packets

: 33756

Untagged Packets

:0

Transmit Secure Channel ------------------------
SCI : ec0273f72f4d0001

Statistics -----------
Encrypted Packets : 171227173728 Protected Packets : 0

Secure Association -------------------
Association Number : 0

Statistics -----------
Encrypted Packets Encrypted Octets Protected Packets Protected Octets Too Long Packets SA Not In Use Packets

: 171227173728 : 19862392663792 :0 :0 :0 :0

Receive Secure Channel ------------------------
SCI : 00fd4568f4110001

Statistics

-----------

Late Packets

:0

Not Valid Packets : 0

Delayed Packets : 0

Ok Packets

: 170438441668

Secure Association -------------------
Association Number : 0

Statistics -----------
Unchecked Packets Delayed Packets Late Packets Ok Packets Invalid Packets Not Valid Packets Not Using SA Packets Unused SA Packets Decrypted Octets Validated Octets

:0 :0 :0 : 170438441668 :0 :0 :0 :0 : 19770908750641 :0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1320

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Modification Command introduced on the 6300.

Command Information

Platforms 6300

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show macsec status
show macsec status [interface <IF-RANGE>] [detailed]
Description
Shows MACsec status information for all MACsec-enabled interfaces or a specific interface or interface range.

Parameter interface <IF-RANGE>
detailed

Description
Specifies one or more interfaces for which MACsec status information is to be shown.
Specifies that detailed status information is to be shown.

Usage
Applicable to when the detailed parameter is included: The stop time for the MACsec secure channel and secure association is updated only when the secure channel or association entry is being deleted. Therefore, it is never shown as set in the show macsec status detailed command output.
Examples
Showing MACsec summary information for all interfaces:

switch# show macsec status

MACsec Protocol Status

Interface Port ID Policy

Protection

Status State

---------- -------- ------------------------- ----------------- ------- ------

1/1/1

0

MS_Policy1

Conf, Offset 0 Up

Retire

1/1/2

0

MS_Policy1

IC

Down Init

...

Showing detailed MACsec information for a specific interface:

MACsec commands | 1321

switch# show macsec status interface 1/1/1 detailed

Interface 1/1/1 ================

Port Identifier: 0 ===========================

Policy Status State Cipher Suite Protection Bypass Clear Tag Mode

: MS_Policy1 : Up : Retire : GCM-AES-128 : Conf, Offset 0 : IEEE-BPDU : None

Transmit Secure Channel ------------------------
SCI : 000C29F6A4380004C SSCI : 1

Secure Association -------------------
Association Number Key Identifier Packet Number SA-Start-Time SA-Stop-Time

: 0 (old) : 4F18CE25228178FD15976E4C : 9500 : Sun Oct 18 04:05:11 UTC 2020 : Sun Oct 18 04:10:12 UTC 2020

Association Number Key Identifier Packet Number SA-Start-Time SA-Stop-Time

: 1 (current) : 4F18CE25228178FD15976E4C : 19000 : Sun Oct 18 04:10:13 UTC 2020 :-

Receive Secure Channel -----------------------
SCI : 000C29F6A4360003B SSCI : 2

Secure Association

-------------------

Association Number : 0 (old)

Key Identifier

: 4F18CE25228178FD15976E4C

Lowest Packet Number : 9500

SA-Start-Time

: Sun Oct 18 04:05:12 UTC 2020

SA-Stop-Time

: Sun Oct 18 04:10:12 UTC 2020

Association Number : 1 (current)

Key Identifier

: 4F18CE25228178FD15976E4C

Lowest Packet Number : 19000

SA-Start-Time

: Sun Oct 18 04:10:13 UTC 2020

SA-Stop-Time

:-

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1322

Release 10.13.1000 10.13
10.10

Modification Command Introduced on the 6400 Switch Series.
Command output updated to display Bypass and Clear tag mode information. Command introduced on the 6300.

Command Information

Platforms 6300

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

MACsec commands | 1323

Chapter 74 Management interface commands

Management interface commands

default-gateway
default-gateway <IP-ADDR> no default-gateway <IP-ADDR>
Description
Assigns an IPv4 or IPv6 default gateway to the management interface. An IPv4 default gateway can only be configured if a static IPv4 address was assigned to the management interface. An IPv6 default gateway can only be configured if a static IPv6 address was assigned to the management interface. The default gateway should be on the same network segment. The no form of this command removes the default gateway from the management interface.

Parameter <IP-ADDR>

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.

Examples
Setting a default gateway with the IPv4 address of 198.168.5.1:

switch(config)# interface mgmt switch(config-if-mgmt)# default-gateway 198.168.5.1

Setting an IPv6 address of 2001:DB8::1:

switch(config)# interface mgmt switch(config-if-mgmt)# default-gateway 2001:DB8::1

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide

1324

Platforms
6300 6400

Command context config-if-mgmt

Authority
Administrators or local user group members with execution rights for this command.

ip static
ip static <IP-ADDR>/<MASK> no ip static <IP-ADDR>/<MASK>
Description
Assigns an IPv4 or IPv6 address to the management interface. The no form of this command removes the IP address from the management interface and sets the interface to operate as a DHCP client.

Parameter <IP-ADDR>
<MASK>

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the number of bits in an IPv4 or IPv6 address mask in CIDR format (x), where x is a decimal number from 0 to 32 for IPv4, and 0 to 128 for IPv6.

Examples
Setting an IPv4 address of 198.51.100.1 with a mask of 24 bits:

switch(config)# interface mgmt switch(config-if-mgmt)# ip static 198.51.100.1/24

Setting an IPv6 address of 2001:DB8::1 with a mask of 32 bits:

switch(config)# interface mgmt switch(config-if-mgmt)# ip static 2001:DB8::1/32

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Management interface commands | 1325

Platforms
6300 6400

Command context config-if-mgmt

Authority
Administrators or local user group members with execution rights for this command.

nameserver
nameserver <PRIMARY-IP-ADDR> [ <SECONDARY-IP-ADDR> ] no nameserver <PRIMARY-IP-ADDR> [ <SECONDARY-IP-ADDR> ]
Description
Assigns a primary or secondary IPv4 or IPv6 DNS server to the management interface. IPv4 DNS servers can only be configured if a static IPv4 address was assigned to the management interface. IPv6 DNS servers can only be configured if a static IPv6 address was assigned to the management interface. The default gateway should be on the same network segment. The no form of this command removes the DNS servers from the management interface.

Parameter <PRIMARY-IP-ADDR>
<SECONDARY-IP-ADDR>

Description
Specifies the IP address of the primary DNS server. Specify the address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the IP address of the secondary DNS server. Specify the address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.

Examples
Setting primary and secondary DNS servers with the IPv4 addresses of 198.168.5.1 and 198.168.5.2 :

switch(config)# interface mgmt switch(config-if-mgmt)# nameserver 198.168.5.1 198.168.5.2

Setting primary and secondary DNS servers with the IPv6 addresses of 2001:DB8::1 and 2001:DB8::2:

switch(config)# interface mgmt switch(config-if-mgmt)# nameserver 2001:DB8::1 2001:DB8::2

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1326

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if-mgmt

Modification --
Authority Administrators or local user group members with execution rights for this command.

show interface mgmt
show interface mgmt [vsx-peer]
Description
Shows status and configuration information for the management interface.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

switch# show interface mgmt

Address Mode

: static

Admin State

: up

Mac Address

: 02:42:ac:11:00:02

IPv4 address/subnet-mask

: 192.168.1.10/16

Default gateway IPv4

: 192.168.1.1

IPv6 address/prefix

: 2001:db8:0:1::129/64

IPv6 link local address/prefix: fe80::7272:cfff:fefd:e485/64

Default gateway IPv6

: 2001:db8:0:1::1

Primary Nameserver

: 2001::1

Secondary Nameserver

: 2001::2

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Management interface commands | 1327

Platforms
6300 6400

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1328

Chapter 75 mDNS gateway commands

mDNS gateway commands

debug mdns
debug mdns {all | config | init | packet | timer}
Description
Enables mDNS gateway debug logs for all or specific debug modules.

Parameter all config
init packet timer

Description Enables debug logs for all mDNS gateway modules. Enables debug logs to trace mDNS gateway configuration changes. Enables debug logs to trace mDNS gateway initialization. Enables debug logs to trace mDNS gateway packet processing. Enables debug logs to trace mDNS gateway timer events.

Examples
Enabling debug logs for all modules:

switch# debug mdns all

Enabling debug logs for config module:

switch# debug mdns config

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide

1329

Platforms
6300 6400

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

description
description <SERVICE-DESCRIPTION> no description <SERVICE-DESCRIPTION>
Description
Adds description to a service. The no form of this command deletes the description of a service.

Parameter <SERVICE-DESCRIPTION>

Description Specifies the service description. Maximum 128 characters.

Examples
Add a service description:

switch(config-mdns-sd-service)# description students-airplay-service

Remove the service description from a service:

switch(config-mdns-sd-service)# no description students-airplay-service

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-mdns-sd-service

Authority
Administrators or local user group members with execution rights for this command.

id
id <SERVICE-ID> no id <SERVICE-ID>

mDNS gateway commands | 1330

Description
Adds a service identifier to a service. The service ID configured here must be same as the service ID that is present in the packet. The no form of this command removes a service ID from the service.

Parameter <SERVICE-ID>

Description Specifies the service ID. Maximum 128 characters.

Examples
Add a service ID:

switch(config-mdns-sd-service)# id _appletv-v2._tcp

Remove a service ID from a service:

switch(config-mdns-sd-service)# no id _appletv-v2._tcp

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-mdns-sd-service

Authority
Administrators or local user group members with execution rights for this command.

mdns-sd
mdns-sd no mdns-sd
Description
Enables mDNS gateway on a VLAN interface. The no form of this command disables mDNS gateway on a VLAN interface.
This command is applicable only to VLAN interfaces. The switch will not process mDNS packets until the mDNS gateway is enabled globally.
Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1331

Enabling mDNS gateway on VLAN 10:
switch(config)# interface vlan 10 switch(config-if-vlan)# mdns-sd
Disabling mDNS gateway on VLAN 10:
switch(config)# interface vlan 10 switch(config-if-vlan)# no mdns-sd

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

mdns-sd apply-profile tx
mdns-sd apply-profile <PROFILE-NAME> tx no mdns-sd apply-profile <PROFILE-NAME> tx
Description
Configures mDNS gateway profile on the VLAN interface. When a profile is applied in the transmit direction, all the mDNS traffic transmitted on the VLAN interface will be filtered based on the rules specified in the transmit profile. The no form of this command deletes the profile configuration from the VLAN interface in the transmit direction.
This command is applicable only to VLAN interfaces. When no profile is configured on an interface then the default action is permit.

Parameter <PROFILE-NAME>

Description Specifies the profile name. Maximum 32 characters.

Examples
Configuring mDNS gateway profile on VLAN 10:

mDNS gateway commands | 1332

switch(config)# interface vlan 10 switch(config-if-vlan)# mdns-sd switch(config-if-vlan)# mdns-sd apply-profile student tx
Deleting mDNS gateway profile on VLAN 10:
switch(config)# interface vlan 10 switch(config-if-vlan)# no mdns-sd apply-profile student tx

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

mdns-sd enable
mdns-sd enable no mdns-sd enable
Description
Enables mDNS gateway. The no form of this command disables mDNS gateway. Once the no form of this command is executed, all the SVI VLANs, even though enabled with mDNS gateway, will stop reflecting mDNS packets to the enabled VLANs.
Examples
Enable mDNS gateway:
switch(config)# mdns-sd enable
Disable mDNS gateway:
switch(config)# no mdns-sd enable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1333

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

mdns-sd profile
mdns-sd profile <PROFILE-NAME>
Description
Creates a profile that can be applied on one or more L3 VLAN interfaces. The profile contains a set of rules that define various match parameters such as service-name and service-instance-name.

Parameter <PROFILE-NAME>

Description Specifies the name of the profile. Maximum 32 characters.

Examples
Creating a profile:

switch(config)# mdns-sd profile student

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

mDNS gateway commands | 1334

mdns-sd service
mdns-sd service <SERVICE-NAME> no mdns-sd service
Description
Configures a service for mDNS gateway. You can group multiple service IDs into a single user-defined service name. The no form of this command deletes a service.
A service cannot be deleted if it is being used as a match parameter in a filter rule in any profile.

Parameter <SERVICE-NAME>

Description Specifies the name of the service. Maximum 32 characters.

Examples
Configure a service for mDNS gateway:

switch(config)# mdns-sd service students

Delete a service:

switch(config)# no mdns-sd service students

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

clear mdns-sd statistics
clear mdns-sd statistics
Description
Clears all mDNS gateway statistics.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1335

Examples
Clear mDNS gateway statistics:
switch(config)# clear mdns-sd statistics

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

sequence-number
<SEQUENCE_NUMBER> {permit | deny} {service-name <SERVICE-NAME> | service-instance-name <SERVICE-INSTANCE-NAME>}
no <SEQUENCE-NUMBER> {permit | deny} {service-name <SERVICE-NAME> | service-instance-name <SERVICE-INSTANCE-NAME>}
Description
Adds a filter rule to the service profile. The sequence number configured determines the priority with which the rule is matched. Lower the sequence number, higher is the priority. Following are the filter match parameters:
n Service-name: mDNS packets are matched against the service IDs configured under the service name.
n Service-instance-name: mDNS packets are matched against the service instance name present in the mDNS packets.
When no match criteria is specified in the rule, then the rule can be matched against any mDNS packet. Once the match is found then either the packet can be permitted or denied based on the action specified in the rule. The no form of this command deletes the filter configured in the service profile.
When an mDNS packet does not match any of the filters configured in the profile, then the packet is denied.

mDNS gateway commands | 1336

Parameter <SERVICE-NAME> <SERVICE-INSTANCE-NAME>

Description Specifies the service name. Maximum 32 characters. Specifies the service instance name. Maximum 128 characters.

Examples
Adding filter rules to a service profile:

switch(config)# mdns-sd profile student switch(config-mdns-sd-profile)# 10 permit service-name default-appletv switch(config-mdns-sd-profile)# 20 deny service-name default-appletv serviceinstance-name office._pdl-datastream._tcp.local switch(config-mdns-sd-profile)# 30 permit service-instance-name library._pdldatastream._tcp.local switch(config-mdns-sd-profile)# 40 deny

Deleting filter rules to a service profile:

switch(config)# mdns-sd profile student switch(config-mdns-sd-profile)# 10 permit service-name default-appletv switch(config-mdns-sd-profile)# 20 deny service-name default-appletv serviceinstance-name office._pdl-datastream._tcp.local switch(config-mdns-sd-profile)# 30 permit service-instance-name library._pdldatastream._tcp.local switch(config-mdns-sd-profile)# no 30 permit service-instance-name library._pdldatastream._tcp.local switch(config-mdns-sd-profile)# 40 deny

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-mdns-sd-profile

Authority
Administrators or local user group members with execution rights for this command.

show mdns-sd service-entries
show mdns-sd service-entries {service-id <SERVICE-ID> | record-type <RECORD-TYPE>}
Description
Shows all the services exchanged in the mDNS gateway enabled VLANs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1337

Parameter <SERVICE-ID> <RECORD-TYPE>

Description
Specifies the service ID. Maximum 128 characters
Specifies the type of record. Record can be one of the following values:
PTR SRV TXT A

Examples
Displaying service entries learnt from mDNS gateway enabled VLANS:

switch# show mdns-sd service-entries

MAC-Address : 01:00:00:0e:21:23

VLAN Id

: 10

Record Name : _touch-able._tcp.local

Record Type : PTR

TTL

: 4500

MAC-Address : 01:00:00:0e:21:23

VLAN Id

: 10

Record Name : 523899E219D4C562._touch-able._tcp.local

Record Type : SRV

TTL

: 4500

MAC-Address : 01:00:00:0e:21:23

VLAN Id

: 10

Record Name : 523899E219D4C562._touch-able._tcp.local

Record Type : TXT

TTL

: 4500

Displaying service entries for a service and record type:

switch# show mdns-sd service-entries service-id _touch-able._tcp record-type ptr

MAC-Address : 01:00:00:0e:21:23

VLAN Id

: 10

Record Name : _touch-able._tcp.local

Record Type : PTR

TTL

: 4500

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

mDNS gateway commands | 1338

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mdns-sd statistics
show mdns-sd statistics [vlan [<VLAN-ID>]]
Description
Shows the mDNS packets received and sent globally, and per VLAN.

Parameter <VLAN-ID>

Description Specifies the VLAN ID. Required. Range 1 to 4094.

Examples
Displays total packets:

switch# show mdns-sd statistics

Packets Recieved : 100

Packets Sent

: 150

Packets Dropped

: 50

Displays total packets for all VLANs:

switch# show mdns-sd statistics vlan

VLAN 10

Packets Recieved : 100

Packets Sent

: 100

Packets Dropped

:0

VLAN 20 Packets Recieved Packets Sent Packets Dropped

:0 : 50 : 50

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1339

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mdns-sd statistics profile
show mdns-sd statistics profile <PROFILE-NAME>
Description
Displays the number of packets permitted or denied by various filter rules in a profile.

Parameter <PROFILE-NAME>

Description Specifies the profile name. Maximum 32 characters.

Examples
Displaying statistics for a profile:

switch# show mdns-sd statistics profile student

--------------------------

Sequence-Number Hit-Count

--------------------------

10

100

20

25

30

150

Total number of packets permitted by the profile : 250 Total number of packets denied by the profile : 50

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mdns-sd summary
show mdns-sd summary

mDNS gateway commands | 1340

Description
Shows whether mDNS gateway is enabled globally and at the VLAN interface level. It also shows the profile applied on various VLAN interfaces.
Examples
Displaying mDNS gateway summary:

switch# show mdns-sd summary

global mdns-sd status: enabled

----------------------------

VLAN-Id Status Tx-Profile

----------------------------

1

enabled student

2

enabled employee

3

disabled teacher

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config interface
show running-config interface <INTERFACE-NAME>
Description
Shows the configuration of profiles for an interface.

Parameter <INTERFACE-NAME>

Description Specifies the interface name.

Examples
Displaying configuration of profile at VLAN 10:

switch# show running-config interface vlan10 interface vlan10

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1341

mdns-sd mdns-sd apply-profile teacher tx ip address 10.1.1.1/24

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config mdns-sd profile
show running-config mdns-sd profile <PROFILE-NAME>
Description
Shows the configuration of all or a specific profile.

Parameter <PROFILE-NAME>

Description Specifies the profile name. Maximum 32 characters.

Examples
Displaying configuration of all profiles:

switch# show running-config mdns-sd profile mdns-sd profile student
10 deny service-type default-print service-instance-name office._pdldatastream._tcp.local
50 permit service-type default-airplay 51 permit service-type default-print
mdns-sd profile teacher 10 deny service-type default-print service-instance-name office._pdl-
datastream._tcp.local 50 permit service-type default-airplay 51 permit service-type default-print

For more information on features that use this command, refer to the Multicast Guide for your switch model.

mDNS gateway commands | 1342

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config mdns-sd service
show running-config mdns-sd service <SERVICE-NAME>
Description
Shows the running configuration of all or a specific mDNS service.

Parameter <SERVICE-NAME>

Description Specifies the service name. Maximum 32 characters.

Examples
Displaying running configuration of all mDNS services:

switch# show running-config mdns-sd service mdns-sd service default-airplay
id _airplay._tcp id _appletv-v2._tcp id _roap._tcp
mdns-sd service itunes id _home-sharing._tcp id _apple-mobdev._dev

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1343

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

mDNS gateway commands | 1344

Chapter 76 Mirroring commands

Mirroring commands

clear mirror
clear mirror [all | <SESSION-ID>]
Description
Clears the mirror statistics for all configured mirror sessions or a specified session

Parameter all <SESSION-ID>

Description Specifies all configured sessions. Specifies a numeric identifier for the session. Range: 1 to 4

Examples
Clearing mirror statistics for all configured mirror sessions:

switch# clear mirror all

Clearing mirror statistics for mirror session 1:

switch# clear mirror 1

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

clear mirror endpoint
clear mirror endpoint [<NAME>]

AOS-CX 10.14 Command-Line Interface Guide

1345

Description
Clears mirror endpoint statistics for all configured mirror endpoints. The optional parameter can be added to clear a specific mirror endpoint.

Parameter <NAME>

Description Specifies name of the mirror endpoint instance to be cleared.

Examples
Clearing statistics for all configured mirror endpoints:

switch# clear mirror endpoint

Clearing mirror statistics for mirror endpoint test:

switch# clear mirror endpoint test

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

comment
comment <COMMENT> no comment
Description
Specifies a comment for the mirroring session. When used in mirror endpoint command context, specifies a comment for the mirror endpoint. The no form of this command removes the comment.

Mirroring commands | 1346

Parameter <COMMENT>

Description
A comment string of up to 64 characters composed of letters, numbers, underscores, dashes, spaces, and periods.

Usage
Comments are optional and can be added or removed at any time without affecting the state of the mirroring session. Adding a comment to a session that already has a comment replaces the existing comment.
Examples
Adding a comment to a mirror session:

switch(config-mirror-3)# comment This Mirror will be removed during next maintenance window

Removing the comment from mirror session 3:

switch(config-mirror-3)# no comment

Adding a comment to a mirror endpoint:

switch(config-mirror-endpoint-test)# comment Monitor endpoint traffic

Replacing the existing comment for mirror endpoint:

switch(config-mirror-endpoint-test)# comment Monitor statistics on each endpoint interfaces

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
config-mirror-<SESSION-ID> config-mirror-endpoint

Authority
Administrators or local user group members with execution rights for this command.

copy tcpdump-pcap

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1347

copy tcpdump-pcap <FILE-NAME> <REMOTE-URL>
Description
Saves packet capture files to external storage.

Parameter <FILE-NAME> <REMOTE-URL>

Description
Specifies the packet capture file to save.
Specifies the external storage to which the packet capture file will be saved.

Usage
Only four files can be saved at any point on the switch. Packet capture files are not saved after a failover or reboot. View a list of saved files using diag utilities list-files.
Examples
Saving my_capture_file.pcap to sftp://root@10.0.0.2/file.pcap:

switch# copy tcpdump-pcap my_capture_file.pcap sftp://root@10.0.0.2/file.pcap

root@10.0.0.2's passowrd:

Connected to 10.0.0.2.

sftp > put my_capture_file.pcap file.pcap

Uploading my_capture_file.pcap to /root/file.pcap

my_capture_file.pcap

100% 156 219.8KB/s 00:00

Copied successfuly.

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

copy tshark-pcap
copy tshark-pcap <REMOTE-URL> [vrf <VRF-NAME>]
Description
Copies the tshark capture data to a file on a TFTP or SFTP server.

Mirroring commands | 1348

Parameter <REMOTE-URL>
vrf <VRF-NAME>

Description
Specifies the capture file on a remote TFTP or SFTP server. The URL syntax is: {tftp:// | sftp://<USER>@} {<IP>|<HOST>} [:<PORT>] [;blocksize=<SIZE>]/<FILE>
Specifies the name of a VRF. Default: default.

Example
Copying the capture data to a file on SFTP server 10.0.0.2:

switch# copy tshark-pcap sftp://root@10.0.0.2/file.pcap

root@10.0.0.2's password: Connected to 10.0.0.2. sftp> put packets.pcap file.pcap Uploading packets.pcap to /root/file.pcap packets.pcap Copied successfully.

100% 156 219.8KB/s 00:00

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

destination cpu
destination cpu no destination cpu
Description
The command causes the mirror session to transmit mirrored packets to the switch CPU. This destination may be configured for multiple sessions, however only one such configured session may be active at a given time. The diagnostic utility Tshark may be used to view and capture packets transmitted to the CPU through this route. Ctrl+C must be entered to terminate a Tshark capture session. More details can be found in the Supportability Guide. The no form of this command will immediately stops mirroring traffic to the CPU, but will not remove any sources from the mirror configuration.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1349

Examples
Configuring a mirror session with CPU as the destination.
switch# config switch(config)# mirror session 1 switch(config-mirror-1)# destination cpu
Removing the destination entirely.
switch(config-mirror-1)# no destination cpu

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-mirror-<SESSION-ID>

Authority
Administrators or local user group members with execution rights for this command.

destination interface
destination interface {<INTERFACE-ID>|<LAG-NAME>} no destination interface {<INTERFACE-ID>|<LAG-NAME>}
Description
Configures the specified interface as the destination of the mirrored traffic. The no form of this command immediately disables the mirroring session and removes the specified destination interface from the configuration.

Parameter <INTERFACE-ID> <LAG-NAME>

Description Specifies a interface. Format: member/slot/port. Specifies a LAG (link aggregation group) identifier.

Usage
Configuring a different destination interface in an enabled mirroring session causes all mirrored traffic to use the new destination interface. This action might cause a temporary suspension of mirrored source traffic during the reconfiguration.
Examples

Mirroring commands | 1350

On the 6400 Switch Series, interface identification differs. Configuring a mirroring session and adding an interface as a destination:
switch(config)# mirror session 1 switch(config-mirror-1)# destination interface 1/1/1
Replacing the existing destination with different interface:
switch(config-mirror-1)# destination interface 1/1/12
Removing a destination:
switch(config-mirror-1)# no destination interface 1/1/12

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Switch 6300 6400

Destination interface limit per mirror session (4 possible sessions) 64 64

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-mirror-<SESSION-ID>

Authority
Administrators or local user group members with execution rights for this command.

destination tunnel
destination tunnel <TUNNEL-IPV4> source <SOURCE-IPv4-ADDR> dscp <DSCP-VALUE> vrf <VRF-NAME>
no destination tunnel
Description
Specifies the tunnel where all mirrored traffic for the session is transmitted. Only one tunnel destination is allowed per session. You may configure multiple mirror sessions with the same source/destination IP address pair, however, only one of those sessions sharing the same source/destination IP address pair can be enabled at a given time.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1351

ERSPAN is not supported leaving the switch by the OOB port. If VRF management is configured for an ERSPAN session, the session will be in "mirror_err_tunnel_oob_port_not_supported" operation status.
ERSPAN is not supported leaving the switch encapsulated within another tunnel (e.g. GRE IPv4). When the path to the destination IP address will leave via a tunnel, the session will be in "tunnel_route_ resolution_not_populated" operation status.

The interface/LAG used to transmit ERSPAN packets should not be a source in the same mirror session. The no form of this command will cease the use of the tunnel and disable the session.

Parameter <TUNNEL-IPV4-ADDR> <SOURCE-IPv4-ADDR> <DSCP-VALUE> <VRF-NAME>

Description
Specifies the tunnel address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the source address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the DSCP value to be carried within the DS field of ERSPAN packet header. Range: 0 to 63. Default: 0.
Specifies a VRF name. Default: default.

Examples
Creating a Mirror Session and adding tunnel destination, source, dscp, and VRF:

switch# config switch(config)# mirror session 1 switch(config-mirror-1)# destination tunnel 1.1.1.1 source 2.2.2.2 dscp 10 vrf default

Replacing the existing tunnel destination:

switch(config-mirror-1)# destination tunnel 11.12.13.14 source 2.2.2.2 dscp 10 vrf default

Replacing the existing destination with a different DSCP value:

switch(config-mirror-1)# destination tunnel 11.12.13.14 source 2.2.2.2 dscp 2 vrf default

Removing the destination:

switch(config-mirror-1)# no destination tunnel

For more information on features that use this command, refer to the Monitoring Guide for your switch model.
Command History

Mirroring commands | 1352

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-mirror-<SESSION-ID>

Authority
Administrators or local user group members with execution rights for this command.

diagnostic
diagnostic
diag utilities tshark [file] diag utilities tshark [delete-file]
Description
Captures packets from a mirror-to-cpu session, and save the most recent 32MB to pcap file which can then be copied and analyzed. When capturing a mirror-to-cpu session to a file, packets will not be dumped to the console.
The diagnostic command must be entered prior to the diag utilities tshark command.
Use the delete-file form of this command to delete the most recent capture file. Since file and delete-file are optional, the behavior of the base command diag utilities tshark does not save anything to a file, and instead dumps the tshark session to the console until CTRL + c is entered.

Parameter file delete-file

Description Saves captured packets to a temporary file. Deletes the most recent captured file.

Example
Performing diagnostic:

switch# diagnostic
switch# diagnostic utilities tshark file Inspecting traffic mirrored to the CPU until Ctrl-C is entered ^CEnding traffic inspection.

For more information on features that use this command, refer to the Monitoring Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1353

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

diag utilities tcpdump
diag utilities tcpdump [command <TEXT> | delete file <FILE-NAME> | list-files | vrf <VRF-NAME> | count <COUNT-NUM> | proto <PROTO-NUM> | host-ip <IP-ADDR> | source-ip <IP-ADDR> | destination-ip <IP-ADDR> | host-port <PORT> | source-port <PORT> | destination-port <PORT> | verbosity <LEVEL> | print <DATA> | ethernet-type <ETH-NUM>]
Description
Captures traffic received or transmitted over a network.

Parameter command <TEXT> delete file <FILE-NAME> list-files vrf <VRF-NAME>
count <COUNT-NUM>
proto <PROTO-NUM>
host-ip <IP-ADDR>
source-ip <IP-ADDR> destination-ip <IP-ADDR> host-port <PORT> source-port <PORT> destination-port <PORT> verbosity <LEVEL>
print <DATA>

Description
Captures packets based on a specified tcpdump command string.
Deletes specified tcpdump list files.
Lists all the tcpdump capture files saved on the device.
Captures packets on the specified VRF. If no VRF is named, the default is used.
Runs the tcpdump command until the specified number of packets are captured. Range: 1-2147483647.
Captures packets of a particular type based on IP protocol number. Range: 0-255.
Captures packets matching with the source or destination IP address.
Captures packets from the specified IP address.
Captures packets sent to the specified IP address.
Captures packets matching with the source or destination port.
Captures packets from the specified IP port.
Captures packets sent to the specified IP port.
Captures packets of the specified verbosity. Range: level1-level4. If no verbosity is specified, the default is level1.
Captures the data of each packet. The maximum is 262144 bytes

Mirroring commands | 1354

Parameter ethernet-type <ETH-NUM>

Description
Captures packets based on the particular ethernet type. Range: 065535.

Usage
n When using the command option, the only traffic captured will be packets that have been mirrored to the CPU.
n When using the command option, command line sanitization is performed to prevent options that may cause harm or security issues. The following options are blocked: o -i/--interface o -Z o -B/--buffer-size o -C o -W o -Z/--relinquish privileges
n Non-word operators such as "&" or "|" are not allowed. Use boolean keywords such as "and," "or," and "not."
n When using command -r to read a file, do not provide any directory path characters. Use list-files command to get the list of file names currently saved on the device, and then use those file names.
n A total of four files can be saved at any given point on the device. Packet capture files are not saved after a failover or reboot, but can be saved to external storage using the copy tcpdump-pcap command.
Examples
Inspecting traffic mirrored to the CPU via tcpdump and saving the output to my_capture_file.pcap:

switch# diag utilities tcpdump command -c 2 -x -w my_capture_file.pcap Inspecting traffic mirrored to the CPU via tcpdump until Ctrl-C is entered. 2 packets captured 2 packets received by filter 0 packets dropped by kernel Ending traffic capture.

Listing saved capture files:

switch# diag utilities tcpdump list-files my_capture_file.pcap

Reading my_capture_file.pcap:

switch# diag utilities tcpdump command -r my_capture_file.pcap reading from file /tmp/tcpdump/my_capture_file1.pcap, link-type EN10MB (Ethernet)
1 11:59:34.047867 IP6 localhost.40318 > localhost.ntp: NTPv2, Reserved, length 12
0x0000: 0000 0304 0006 0000 0000 0000 0000 86dd ................ 0x0010: 600a 7e47 0014 1140 0000 0000 0000 0000 `.~G...@........ 0x0020: 0000 0000 0000 0001 0000 0000 0000 0000 ................

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1355

0x0030: 0000 0000 0000 0001 9d7e 007b 0014 0027 .........~.{...'

0x0040: 1601 0001 0000 0000 0000 0000

............

2 11:59:34.047915 IP6 localhost.ntp > localhost.40318: NTPv2, Reserved, length

12

0x0000: 0000 0304 0006 0000 0000 0000 0000 86dd ................

0x0010: 6b8d 23c5 0014 1140 0000 0000 0000 0000 k.#....@........

0x0020: 0000 0000 0000 0001 0000 0000 0000 0000 ................

0x0030: 0000 0000 0000 0001 007b 9d7e 0014 0027 .........{.~...'

0x0040: d681 0001 c016 0000 0000 0000

Removing my_capture_file.pcap:

switch# diag utilities tcpdump delete-file my_capture_file.pcap Successfully removed file

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History

Release 10.08

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

disable
disable
Description
Disables the mirroring session specified by the current command context.
Usage
By default, mirroring sessions are disabled. When a mirroring session is disabled, the show mirror command for that session ID shows an Admin Status of disable and an Operation Status of disabled.
Example
Disabling a mirroring session:
switch(config)# mirror session 3 switch(config-mirror-3)# disable

Mirroring commands | 1356

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-mirror-<SESSION-ID>

Authority
Administrators or local user group members with execution rights for this command.

enable
enable
Description
Enables the mirroring session for the current command context.
Usage
By default, mirroring sessions are disabled. When a mirroring session is enabled, the show mirror command for that session ID shows an Admin Status of enable and an Operation Status of enabled. If sFlow is enabled on an interface and a mirroring session specifies the same interface as the source of received traffic (the source is configured with a direction of rx or both):
n The attempt to enable the mirroring session fails and an error is returned.
When adding, removing, or changing the configuration of a source interface in an enabled mirroring session, packets from other mirror sources using the same destination interface might be interrupted.
Example
On the 6400 Switch Series, interface identification differs. Configuring and enabling a mirroring session:
switch(config)# mirror session 3 switch(config-mirror-3)# source interface 1/1/2 rx switch(config-mirror-3)# destination interface 1/1/3 switch(config-mirror-3)# comment Monitor router port ingress-only traffic switch(config-mirror-3)# enable

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1357

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-mirror-<SESSION-ID>

Authority
Administrators or local user group members with execution rights for this command.

mirror endpoint
mirror endpoint <NAME> no mirror endpoint <NAME>
Description
Creates the specified mirror endpoint or enters its context if it already exists. The specifics of a mirror endpoint are created or altered while in the mirror endpoint context and the mirror endpoint is enabled or disabled from this context. It may be possible to support different encapsulations by different ASICs. For example, UDP for PVOS compatibility. Termination of GRE encapsulation is also supported. The no form of this command removes an existing mirror endpoint. An enabled mirror endpoint is automatically disabled first before removal.

Parameter <NAME>

Description Specifies mirror endpoint name.

Examples
Creating a mirror endpoint named test :

switch(config)# mirror endpoint test

Deleting mirror endpoint named test:

switch(config)# no mirror endpoint test

Configuring a mirror endpoint named test :

6100(config)# mirror endpoint test 6100(config-mirror-endpoint-test)# 6100(config-mirror-endpoint-test)# destination
interface Specify interfaces to send traffic 6100(config-mirror-endpoint-test)# destination interface
IFNAMELIST An interface, a range or a comma seperated list of interfaces 6100(config-mirror-endpoint-test)# destination interface 1/1/3

Mirroring commands | 1358

<cr> 6100(config-mirror-endpoint-test)# destination interface 1/1/3 6100(config-mirror-endpoint-test)# 6100(config-mirror-endpoint-test)# source 1.1.1.1 destination 1.1.1.2 id 1 vrf default 6100(config-mirror-endpoint-test)#

Only physical ports can be configured as interface for mirror-endpoint destination. LAG port is not supported as interface for mirror-endpoint destination.

The maximum allowed number of destination interfaces for both mirror-session and mirror-endpoint is 1.

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.13.1000 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Added support for 4100i, 6000, and 6100 switches. --
Authority Administrators or local user group members with execution rights for this command.

mirror session
mirror session <SESSION-ID> no mirror session <SESSION-ID>
Description
Creates a mirroring session configuration context or enters an existing mirroring session configuration context. From this context, you can enter commands to configure and enable or disable the mirroring session. The no form of this command removes an existing mirroring session from the configuration.

Parameter <SESSION-ID>

Description Specifies the session identifier. Range: 1 to 4

Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1359

switch(config)# mirror session 1 switch(config-mirror-1)#
switch(config)# mirror session 3 switch(config-mirror-3)#
switch(config)# no mirror session 1 switch(config)#

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show mirror
show mirror [<SESSION-ID>] [vsx-peer]
Description
Shows information about mirroring sessions. If <SESSION-ID> is not specified, then the command shows a summary of all configured mirroring sessions. If <SESSION-ID> is specified, then the command shows detailed information about the specified mirroring session.

Parameter <SESSION-ID> vsx-peer

Description
Specifies the session identifier. Range: 1 to 4
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
Admin Status indicates the configured status. Admin Status is one of the following values: enable The mirroring session is enabled. disable The mirroring session has been configured but not yet enabled, or has been disabled.
Operation Status indicates the status of the mirroring session. Operation Status is one of the following values: dest_doesnt_exist

Mirroring commands | 1360

The configured destination interface is not found in the system. The mirroring session cannot be enabled. destination_shutdown The mirroring session is enabled, but the destination interface is shut down. No traffic can be monitored. disabled The mirroring session is disabled and is not in an error condition. enabled The mirroring session is enabled. external/driver_error An internal ASIC hardware error occurred. hit_active_sessions_capacity The mirroring session could not be enabled because the maximum number of supported mirroring sessions are already enabled. internal_error An invalid parameter was passed to the ASIC software layer. no_dest_configured The mirroring session does not have a destination interface configured. no_name_configured A software error occurred. The mirroring session does not have a session ID in its configuration. null_mirror A software error occurred. The session object reference is invalid. out_of_memory The system is out of memory, reboot recommended. tunnel_route_resolution_not_populated If the destination tunnel IP address is not reachable. unknown_error An unexpected error occurred.
Examples
On the 6400 Switch Series, interface identification differs.
Showing summary information about all configured mirroring sessions:

switch# show mirror

ID Admin Status Operation Status

--- ------------- ----------------------------------------------------

1 enable

enabled

2 disable

disabled

3 disable

disabled

4 enable

internal_error

Showing detailed information about a single mirroring session:

switch# show mirror 3 Mirror Session: 3 Admin Status: disable Operation Status: disabled Comment: Monitor router port ingress-only traffic Source: interface 1/1/2 rx Destination: interface 1/1/3 Output Packets: 0 Output Bytes: 0
switch#

For more information on features that use this command, refer to the Monitoring Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1361

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mirror endpoint
show mirror endpoint [<NAME>]
Description
Shows a list of all configured mirror endpoints, their Admin Status and their Operation Status. The optional parameter will display the details of the specified mirror endpoint if it exists.

Parameter <NAME>

Description Specifies name of the mirror endpoint instance to be displayed.

Examples
Showing a summary of all configured mirror endpoints on the switch:

switch# show mirror endpoint

Name Admin Status Operation Status

----- -------------- ----------------------------------------------------

test enable

enabled

monitor disable

disabled

Showing the details of enabled mirror endpoint test:

switch# show mirror endpoint test Mirror Endpoint: audit Admin Status: enable Operation Status: enabled Comment: Mirror Endpoint Audit Type: gre Tunnel: source 1.1.1.1 destination 1.1.1.2 id 1 vrf default Interface: 1/1/3 Output Packets: 123456789 Output Bytes: 0

"Output Packets" in "show mirror endpoint [name]" is only supported for statistics. "Output Bytes" in "show mirror endpoint [name]" is not supported due to ASIC limitation.

Mirroring commands | 1362

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

shutdown
shutdown no shutdown
Description
Enables mirror endpoint from its default disabled state. To verify the mirror endpoint was successfully activated, run the show mirror endpoint NAME command and verify that the Admin Status and Operational Status has changed from disabled to enabled. If the status value remains disabled, consult the system logs to determine the reason for activation failure. To disable the mirror endpoint, first disable the remote mirror session on the switch that's originating the data. Next, use the shutdown command to disable the mirror endpoint.
Examples
Enabling a mirror endpoint:
switch(config)# mirror endpoint test switch(config-mirror-endpoint-test)# no shutdown
Disabling a mirror endpoint:
switch(config)# mirror endpoint test switch(config-mirror-endpoint-test)# shutdown

For more information on features that use this command, refer to the Monitoring Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1363

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

source
source <SOURCE-IP> destination <DESTINATION-IP> id <1-4294967295> [vrf <VRF_NAME>] [type {gre}] no source
Description
Configures tunnel parameters of the mirror endpoint. Configuring a tunnel parameter to a mirror endpoint will replace the existing configuration. By default the VRF is default, users can also explicitly provide a custom VRF. The default tunnel type is considered to be GRE and users also have the option to explicitly give type as GRE. The no form removes the tunnel parameters of the mirror endpoint.

Parameter <SOURCE-IP> <DESTINATION-IP> id <VRF_NAME>

Description Specifies L3 encapsulated IPv4 source in the form A.B.C.D. Specifies L3 encapsulated IPv4 destination in the form A.B.C.D. Specifies tunnel identifier from the encapsulated packet. Specifies the name of VRF for which the tunnel belongs to.

Examples
Configuring a tunnel parameter to a mirror endpoint:

switch(config-mirror-endpoint-test)# source 1.1.1.1 destination 7.7.7.7 id 1 vrf default type gre

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Mirroring commands | 1364

Command Information

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

source interface
source interface {<PORT-NUM> | <LAG-NAME>} [<DIRECTION>] no source interface {<PORT-NUM> | <LAG-NAME>} [<DIRECTION>]
Description
Configures the specified interface (either an Ethernet port or a LAG) as a source of traffic to be mirrored. The no form of this command ceases mirroring traffic from the specified source interface and removes the source interface from the mirroring session configuration.

Parameter <PORT-NUM>
<LAG-NAME> <DIRECTION>
both rx tx

Description
Specifies a physical port on the switch. Use the format member/slot/port (for example, 1/3/1).
Specifies the identifier for the LAG (link aggregation group).
Selects the direction of traffic to be mirrored from this source interface. There is no default for this parameter. Valid values are the following:
Mirror both transmitted and received packets.
Mirror only received packets.
Mirror only transmitted packets.

Usage
There is a limit of source interfaces in each direction of a given mirror session:

Switch 6300 6400

Source interface limit per mirror session (4 possible sessions)
64
64

However, there is a practical limit to the amount of traffic that a mirror destination can transmit. For example, mirroring session with multiple 10G sources can overwhelm a single 10G destination.
When adding, removing, or changing the configuration of a source port in an enabled mirroring session, packets from other mirror sources using the same destination port might be interrupted.

Examples
Configuring a mirrored traffic source interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1365

switch(config-mirror-1)# source interface

LAG-NAME

Enter a LAG name. For example, lag10

PORT-NUM

Enter a port number

Creating a mirroring session and configuring a source interface to mirror both transmitted and received packets:

switch(config)# mirror session 1 switch(config-mirror-1)# source interface 1/1/1 both

Creating a second mirroring session and configuring two source interfaces. One port mirroring only transmitted packets and the other mirroring both transmitted and received packets:

switch(config)# mirror session 2 switch(config-mirror-2)# source interface 1/1/3 tx switch(config-mirror-2)# source interface 1/2/1 both

Removing the first source interface:

switch(config-mirror-2)# no source interface 1/2/3

Configuring a source interface to mirror received packets only:

switch(config-mirror-3)# source interface 1/1/2 rx

Configuring a source interface to mirror both transmitted and received packets:

switch(config-mirror-1)# source interface 1/1/1 both

Configuring a LAG as source interface to mirror both transmitted and received packets:

switch(config-mirror-4)# source interface lag1 both

Stopping the mirroring of received packets from a configured source interface:

switch(config-mirror-4)# no source interface lag1 rx

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Mirroring commands | 1366

Platforms All platforms

Command context config-mirror-<SESSION-ID>

Authority
Administrators or local user group members with execution rights for this command.

source vlan
source vlan <VLAN-NUM> {rx | tx | both} no source vlan <VLAN-NUM> {rx | tx | both}
Description
Mirroring with VLAN as a source is supported in the following traffic directions:
n both - traffic received and transmitted n rx - only received traffic n tx - only transmitted traffic
More than one source VLAN can be configured in a mirror session. Each such VLAN may specify its own direction. There is a limit of 1024 source VLANs for a given mirror session. There is also a limit of 4096 source VLANs across all mirror sessions. Same VLAN can be configured as a mirror source for multiple sessions.
When changing a source VLAN in an enabled mirror session (i.e. adding, changing direction, or removing) mirrored packets being transmitted out of the mirror destination port from other mirror sources may be briefly interrupted during the reconfiguration.
Direction of an existing source VLAN can be updated in one of two ways.
n Reenter the source vlan <VLAN-NUM> <direction> command with the new preferred direction. n Use the no source vlan <VLAN-NUM> <direction> form of the command with a direction (rx or tx)
to selectively remove the specified direction.
Specifying the last remaining direction for that VLAN will remove the VLAN from the configuration entirely. Mirroring allows configuration of VLAN as a source. When VLAN source is configured in the rx direction, all packets are mirrored as they are received in the switch. When VLAN source is configured in tx direction, all packets are mirrored as they are transmitted out of the switch. For packets bridged through the switch:
n If the mirror is configured in 'both' direction, two copies of packets are mirrored, otherwise one copy of the packet will be mirrored.
For routed packets:
n If the mirror is configured in rx direction, packets are mirrored in the pre-routed form with the Destination MAC address as the switch address.
n If the mirror is configured in tx direction, packets are mirrored in post-routed form with the source MAC as the switch address. Destination MAC is the nexthop gateway or station.
n If the mirror is configured in both direction, one copy of the packet will be mirrored.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1367

Control plane packets generated by the switch's CPU are processed both in theingress and the egress packet processing pipeline. The following are the behavior for mirroring with VLAN as source:
n If the mirror is configured in the rx or tx direction, the packets are mirrored to the mirror destination.
n If the mirror is configured in the both direction, two copies of the packets are mirrored to the mirror destination.
The no form command will cease mirroring traffic from the specified source VLAN and remove the source from the mirror configuration.

Parameter VLAN-NUM direction

Description
Selects the VLAN number.
Specifies the direction of mirroring. tx (transmit), rx (receive), or both.

Examples
Creating a mirror session and adding a VLAN as a source of traffic in both directions on that port:

switch# configure terminal switch(config)# mirror session 1 switch(config-mirror-1)# source vlan 10 both

Creating a mirror session and adding two VLANs as sources of traffic: directions:

switch# configure terminal switch(config)# mirror session 2 switch(config-mirror-2)# source vlan 10 tx switch(config-mirror-2)# source vlan 20 both

Configuring the source in session 2 to receive by specifying the source interface configuration:

switch(config-mirror-2)# source vlan 10 rx

Removing the first source interface in session 2 entirely, and removing the transmit direction from the other so that mirroring only occurs in the receive direction:

switch(config-mirror-2)# source vlan 10 rx switch(config-mirror-2)# source vlan 20 tx

Showing maximum of 1024 mirror source VLANs allowed:

switch(config-mirror-2)# source vlan 2000 rx The maximum number of source VLANs per mirror session is 1024 in each direction

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Mirroring commands | 1368

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1369

Chapter 77 MKA commands (MACsec)

MKA commands (MACsec)

apply mka policy
apply mka policy <MKA-POLICY-NAME> no apply mka policy
Description
Within the selected interface context, applies the specified MKA policy to the selected port. To start the MKA protocol on the port, a MACsec policy must also be applied to the port.

An MKA policy can be applied to a physical interface port that is not part of any LAG ports or to a lag port. It can also be applied to an interface that is configured as an MCLAG, VSX keep-alive, or VSX inter-switch-link.
If an MKA policy is already applied to the selected port, this command replaces the existing policy application. The no form of this command dissociates the specified policy from the port.

Parameter <MKA-POLICY-NAME>

Description
Specifies the MKA policy name. Range: 1 to 32 alphanumeric characters including only the three special characters "." (period), "-" (hyphen), and "_" (underscore).

Usage
n When any MACsec or MKA policy parameter is updated, any active MACsec session on all interfaces running the MACsec or MKA policy is terminated and restarted. This is indicated with the following prompt that provides an opportunity to not execute the apply command.

This policy is currently in use by one or more interfaces. Updating the policy will cause existing MACsec sessions using the policy to restart. Continue (y/n)?

n For non-LAG ports, a range of ports can be specified in the interface command used to enter the interface context. For example, entering the interface context for ports 1/1/1 through 1/1/4:
switch(config)# interface 1/1/1-1/1/4 switch(config-if-<1/1/1-1/1/4>)# apply mka policy MKA_Policy1

n Not all interfaces on a switch may support the MACsec capability. An error will be generated when a policy is applied to a physical interface that is not capable of MACsec. For LAG ports, any non-MACsec capable interfaces that are part of the LAG will be blocked.

AOS-CX 10.14 Command-Line Interface Guide

1370

Examples
Applying an MKA policy to a range of two ports:
switch(config)# interface 1/1/1-1/1/2 switch(config-if-<1/1/1-1/1/2>)# apply mka policy MKA_Policy1
Attempting to apply an MKA policy to a port that is not MACsec capable:
switch(config)# interface 1/1/25 switch(config-if)# apply mka policy MKA_Policy1 MACsec is not supported on the interface. switch(config-if)#
Removing MKA policy association from a port:
switch(config)# interface 1/1/1 switch(config-if)# no apply mka policy
Applying an MKA policy to a LAG port:
switch(config)# interface lag 1 switch(config-if)# apply mka policy MKA_Policy1

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms 6300

Command context config-if

Modification Command introduced on the 6300.
Authority Administrators or local user group members with execution rights for this command.

clear mka statistics
clear mka statistics [interface <IF-RANGE>]
Description
Clears MKA statistics on all MACsec-enabled interfaces or on a specific interface or interface range. MKA statistics are cleared for the entire switch rather than just in the current user session.

MKA commands (MACsec) | 1371

Parameter interface <IF-RANGE>

Description
Specifies one or more interfaces (ports) for which MKA statistics information is to be cleared.

Examples
Clearing MKA statistics on an interface range:

switch# clear mka statistics interface 1/1/1-1/1/4

Clearing MKA statistics on all MACsec-enabled interfaces:

switch# clear mka statistics

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.10

Modification Command introduced on the 6300.

Command Information

Platforms 6300

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

data-delay-protection
data-delay-protection no data-delay-protection
Description
Configures the MACsec policy to use data delay protection. Data delay protection allows MKA participants to ensure that the data frames protected by MACsec are not delayed by more than 2 seconds. Enabling data delay protection necessitates transmission of MKPDUs at a frequency of 0.5 second to meet a maximum data delay of 2 seconds while minimizing connectivity interruption due to the possibility of lost or delayed MKPDUs. Data delay protection should be enabled only when there is a need to drop MACsec protected frames that are delayed by more than 2 seconds on the wire. It is recommended to not enable data delay protection unless absolutely required as it adds extra load on the system. Disabled by default.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1372

When data delay protection is enabled, a default of 0.5 second is used as transmit-interval and transmit-interval configuration under MKA policy is ignored.
Examples
Enabling data delay protection:
switch(config)# macsec policy Aggregator-Connect data-delay-protection
or
switch(config)# macsec policy Aggregator-Connect switch(config-macsec-policy)# data delay protection
Disabling data delay protection:
switch(config)# no macsec policy Aggregator-Connect data-delay-protection
or
switch(config)# macsec policy Aggregator-Connect switch(config-macsec-policy)# no data delay protection

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms 6300

Command context
config config-macsec-policy

Authority
Administrators or local user group members with execution rights for this command.

eapol-destination-mac
eapol-destination-mac <MAC-ADDRESS> no eapol-destination-mac <MAC-ADDRESS>
Description
Configures the destination MAC address to use in EAPoL frames for MKA. When not configured, the switch uses the default EAPoL multicast address (01:80:C2:00:00:03) for MKA.

MKA commands (MACsec) | 1373

The no form of the command configures the switch to use the default EAPoL multicast address for MKA.

Parameter <MAC-ADDRESS>

Description Specifies the EAPoL destination MAC address for MKA.

Examples
Configuring the broadcast MAC as EAPoL destination address:

switch(config)# mka policy Agg-To-Agg switch(config-mka-policy)# eapol-destination-mac ff:ff:ff:ff:ff:ff OR switch(config)# mka policy Agg-To-Agg eapol-destination-mac ff:ff:ff:ff:ff:ff

Resetting MKA policy to use untagged EAPoL MKA frames:

switch(config)# mka policy Agg-To-Agg switch(config-mka-policy)# no eapol-destination-mac OR switch(config-if)# no mka policy Agg-To-Agg eapol-destination-mac

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13.1000 10.13

Command Information

Platforms
6300 6400

Command context
config-if config-mka-policy

Modification Command introduced on the 6400 Switch Series. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

eapol-dot1q-tagged
eapol-dot1q-tagged no eapol-dot1q-tagged
Description
Configures the EAPoL frames for MKA to be transmitted with an 802.1q tag. The native VLAN associated with the port is used in the MKA frames. This configuration enables the switch to establish a MACsec tunnel over a Layer 2 network with the next hop connected over non-MACsec, 802.1q tagged only link. The no form of command configures the switch to send MKA frames as untagged.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1374

n When the configuration is enabled, MKA is restarted on the port if the native VLAN associated with the port is updated.
n The 802.1q tag added to the MKA frame is also used in the computation of the ICV for the MKA frame. If the 802.1q tag is removed or modified in any way along the path, including changes in VLAN ID or PCP, the MKA frame will be discarded at the destination.
Examples
Configuring the MKA policy to use 802.1q tagged EAPoL MKA frames:
switch(config)# mka policy Agg-To-Agg switch(config-mka-policy)# eapol-dot1q-tagged OR switch(config)# mka policy Agg-To-Agg eapol-dot1q-tagged
Resetting MKA policy to use untagged EAPoL MKA frames:
switch(config)# mka policy Agg-To-Agg switch(config-mka-policy)# no eapol-dot1q-tagged OR switch(config-if)# no mka policy Agg-To-Agg eapol-dot1q-tagged

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13.1000 10.13

Command Information

Platforms
6300 6400

Command context
config-if config-mka-policy

Modification Command introduced on the 6400 Switch Series. Command introduced on the 8360 and 6300 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

eapol-eth-type
eapol-eth-type <ETH-TYPE> no eapol-eth-type <ETH-TYPE>
Description
Configures the Ether-Type for use in frames for MKA. The no form of the command uses the default EAPoL ether-type 0x888e for MKA.

MKA commands (MACsec) | 1375

n Only values 0x876f and 0x888e are supported. n Refer to the MACsec WAN extension

Parameter <ETH-TYPE>

Description Configures the Ether-Type in EAPoL frames for MKA.

Examples
Configuring the custom Ethernet type for MKA:

switch(config)# mka policy Agg-To-Agg eapol-eth-type 876f OR switch(config)# mka policy Agg-To-Agg switch(config-mka-policy)# eapol-eth-type 876f

Resetting the custom EAPoL Ethernet Type:

switch(config)# no mka policy Agg-To-Agg eapol-eth-type 876f OR switch(config)# mka policy Agg-To-Agg switch(config-mka-policy)# no eapol-eth-type 876f

Using an Ethernet Type value other than 876f or 888e:

switch(config)# mka policy Agg-To-Agg switch(config-mka-policy)# eapol-eth-type 999F Unsupported Ether-Type. Supported values are 888e and 876f

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.14

Command Information

Platforms
6300 6400

Command context config-mka-policy

Modification Command introduced on the 6300, 6400, and 8360 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

key-server-priority
key-server-priority <PRIORITY>

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1376

no key-server-priority
Description
In the config-mka-policy policy context, configures the MKA key server priority. The highest priority is 0 and indicates that this switch strongly wants to be the MKA key server. The lowest priority is 255 and indicates that switch does not want to be the MKA key server, allowing the switch at the other end of the link to be the key server. Set this priority on the switches at either end of the link to achieve the desired effect. If the key server priority is 0 on both switches then the switch with the lowest system MACsec address is elected as key server. The no form of this command resets the MKA key server priority to its default of 0.

Parameter <PRIORITY>

Description
Selects the MKA key server priority for this switch. Default 0 (highest priority). Range: 0 to 255.

Examples
Setting the MKA key server priority:

switch(config-mka-policy)# key-server-priority 5

Resetting the MKA key server priority to its default of 0:

switch(config-mka-policy)# no key-server-priority

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms 6300

Command context config-mka-policy

Modification Command introduced on the 6300.
Authority Administrators or local user group members with execution rights for this command.

pre-shared-key
pre-shared-key keychain <NAME> pre-shared-key ckn <CA-KEY-NAME> cak {plaintext [<PLAINTEXT-CAK>] | ciphertext <CIPHERTEXT-CAK>}
Description

MKA commands (MACsec) | 1377

Configures the Pre-Shared Key (PSK) to use for an MKA policy. A PSK can be configured one of two ways:
1. Configure the Connectivity Association Key Name (CKN) and Connectivity Association Key (CAK) directly in the PSK.
2. Configure the PSK to use an existing keychain for the CKN (key name) and CAK (key-string).
If both a key chain and a static CKN/CAK are configured in the PSK, then the key chain will be used for MKA operations.

When using a PSK with a key chain, only the send lifetime is considered for CAK lifetime. It is recommended to not configure an accept lifetime in the key chain used for MACsec.
The no form of this command deletes the PSK configuration including the key chain association, the CKN and the CAK.

Parameter <CA-KEY-NAME>
<PLAINTEXT-CAK>
<CIPHERTEXT-CAK> <NAME>

Description
Specifies the CKN (Connectivity Association Key Name). Range: 1 to 64 hexadecimal characters.
Specifies the CAK (Connectivity Association Key) in plaintext. Range: 1 to 64 hexadecimal characters.
Specifies the CAK (Connectivity Association Key) as ciphertext.
Specifies the keychain name.

Examples
Configuring the pre-shared key with a specified plaintext CAK:

switch(config-mka-policy)# pre-shared-key ckn abcdef12 cak plaintext 123abcdef

Configuring the pre-shared key with a prompted plaintext CAK:

switch(config-mka-policy)# pre-shared-key ckn abcdef12 cak plaintext Enter CAK: ****** Confirm CAK: ******

Configuring the pre-shared key with a ciphertext CAK:

switch(config-mka-policy)# pre-shared-key ckn abcdef12 cak ciphertext AQBapUvjDZgUxtTpgA4NLqnsn7CjXqbDch+BOS7y9fcWExLUBgAAAKUmDYdhew==

Configuring a key chain for an MKA policy:

switch(config)# mka policy Agg-To-Agg switch(config-mka-policy)# pre-shared-key keychain macsec_keys

Deleting the PSK configuration including its CKN and CAK:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1378

switch(config-mka-policy)# no pre-shared-key
Deleting a key chain from an MKA policy:
switch(config)# mka policy Agg-To-Agg switch(config-mka-policy)# no pre-shared-key keychain macsec_keys

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms 6300

Command context config-mka-policy

Modification Command introduced on the 6300.
Authority Administrators or local user group members with execution rights for this command.

mka policy
mka policy <MKA-POLICY-NAME> no mka policy <MKA-POLICY-NAME>
Description
Creates the specified MKA (MACsec Key Agreement) policy and then enters its context (displayed in the CLI as config-mka-policy). If the MKA policy already exists, this command enters the specified MKA policy context. An MKA policy can be applied to one or more switch ports, enabling MKA on the ports. A MACsec policy must be applied to the same ports. The no form of this command deletes the MKA policy.
An MKA policy cannot be deleted if it is currently applied to any ports. All application of the policy must be removed before the policy can be deleted.

Parameter <MKA-POLICY-NAME>
Examples
Creating an MKA policy:

Description
Specifies the MKA policy name. Range: 1 to 32 alphanumeric characters including only the three special characters "." (period), "-" (hyphen), and "_" (underscore).

MKA commands (MACsec) | 1379

switch(config)# mka policy MKA_Policy1 switch(config-mka-policy)#
Deleting an MKA policy (the policy cannot be currently applied to any ports):
switch(config)# no mka policy MKA_Policy1

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms 6300

Command context config

Modification Command introduced on the 6300.
Authority Administrators or local user group members with execution rights for this command.

show mka policy
show mka policy [<MKA-POLICY-NAME>]
Description
Shows information for one or all MKA policies.

Parameter <MKA-POLICY-NAME>

Description
Specifies the MKA policy name. Range: 1 to 32 alphanumeric characters including only the three special characters "." (period), "-" (hyphen), and "_" (underscore).

Examples
Showing information for a specific MKA policy:

switch# show mka policy Agg-To-Agg

MKA Policy Details

Policy Name: Agg-To-Agg

----------------------------------------------------------------------------

Mode

: Pre-shared key

CKN

: abcdef123456

CAK (encrypted)

:

AQBapUwNK5Uf+r1vmhBIncQPw1YPVH0V1nYr7Yjm/bPn3bBVCgAAAHFKt8mcSv/A/g8=

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1380

Keychain EAPoL Destination MAC EAPoL 802.1q Tag Key-server Priority Transmit Interval

: macsec_keys : ff:ff:ff:ff:ff:ff : Enabled :5 : 6 seconds

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.13.1000 10.13
10.10

Modification
Command introduced on the 6400 Switch Series.
Command updated to display EAPoL Destination MAC and EAPoL 802.1q Tag in the output.
Command introduced on the 6300.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mka statistics
show mka statistics [interface <IF-RANGE>]
Description
Shows MKA statistics for all MACsec-enabled interfaces or a specific interface or interface range. The MKA statistics are refreshed periodically, approximately every five seconds.

Parameter interface <IF-RANGE>

Description
Specifies one or more interfaces for which MKA statistics information is to be shown.

Examples
Showing MKA statistics information for a specific interface:

switch# show mka statistics interface 1/1/1

Interface 1/1/1 ================
KaY

MKA commands (MACsec) | 1381

---SCI : ec0273f72f4d0001

Statistics

-----------

MKPDUs With Invalid Version : 0

MKPDUs With Invalid CKN

:0

Participant ------------
CKN : 1234567890

Statistics

-----------

Tx MKPDUs

: 33834

Rx MKPDUs

: 35375

SAKs Distributed

:1

SAKs Received

:0

MKPDUs With Invalid ICV : 0

MKPDUs With Duplicate MI : 0

MKPDUs With Invalid MN : 0

...

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Modification Command introduced on the 6300.

Command Information

Platforms 6300

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mka status
Shows MKA status information for all MACsec-enabled interfaces or a specific interface or interface range. show mka status [interface <IF-RANGE>]
Description

Parameter interface <IF-RANGE>

Description
Specifies one or more interfaces for which MKA status information is to be shown.

Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1382

Showing MKA status information for a specific interface (Pre-shared key):

switch# show mka status interface 1/1/1

MKA Protocol Status

Interface 1/1/1 ================

KA Port Identifier : 1

MKA Policy Name

: Agg-To-Agg

MKA Session Status : Secured

Mode

: Pre-shared key

CKN

: abcdef123456

CAK (encrypted)

:

AQBapUwNK5Uf+r1vmhBIncQPw1YPVH0V1nYr7Yjm/bPn3bBVCgAAAHFKt8mcSv/A/g8=

Keychain

: macsec_keys

Member Identifier

: 1c64f054f894b5482defdf81

Message Number

: 86

Capability

: Conf, Offset 0

EAPoL Destination MAC : ff:ff:ff:ff:ff:ff

EAPoL 802.1q Tagged : Enabled

Transmit Interval

: 6 seconds

Key Server Priority : 5

Key Server

: No

Live Peer List:

MI

MN

PRI Capability

Rx-SCI

------------------------ -------- --- --------------------- ----------------

fb7f82788e4cd38dbc65dc55 119

16 IC, Conf, Offset 0 a45d36489bfe0002

Potential Peer List:

MI

MN

PRI Capability

Rx-SCI

------------------------ -------- --- --------------------- ----------------

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.13.1000 10.13
10.10

Modification
Command introduced on the 6400 Switch Series.
Command updated to display EAPoL Destination MAC and EAPoL 802.1q Tagged in the output.
Command introduced on the 6300.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

MKA commands (MACsec) | 1383

transmit-interval
transmit-interval <INTERVAL> no transmit-interval
Description
In the config-mka-policy policy context, configures the MKA packet transmit interval. The no form of this command resets the MKA packet transmit interval to its default of 2 seconds.

Parameter <INTERVAL>

Description
Selects the MKA packet transmit interval. Default 2 seconds. Range: 2 to 6 seconds.

Examples
Setting the MKA packet transmit interval:

switch(config-mka-policy)# transmit-interval 4

Resetting the MKA packet transmit interval to its default of 2 seconds:

switch(config-mka-policy)# no transmit-interval

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms 6300

Command context config-mka-policy

Modification Command introduced on the 6300.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1384

Chapter 78
MLD snooping global configuration commands

MLD snooping global configuration commands

ipv6 mld snooping
ipv6 mld snooping drop-unknown {vlan-shared | vlan-exclusive} no ipv6 mld snooping drop-unknown {vlan-shared | vlan-exclusive}
Description
This command configures the drop unknown mode. While MLD snooping is enabled, the traffic will be forwarded only to ports that initiate an MLD request for multicast. Drop unknown mode can be a filter across all VLANs (vlan-shared) or per VLAN (exclusive-vlan). The default configuration is vlan-shared. The no form of this command configures the drop unknown mode on the switch to the default vlanshared.

Parameter vlan-shared vlan-exclusive

Description Required: Enable shared VLAN filter on the switch. Required: Enable exclusive drop unknown filter per VLAN.

Example

switch(config)# ipv6 mld snooping drop-unknown vlan-shared switch(config)# ipv6 mld snooping drop-unknown vlan-exclusive switch(config)# no ipv6 mld snooping drop-unknown

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

mgmd delayed-refresh timer

AOS-CX 10.14 Command-Line Interface Guide

1385

mgmd delayed-refresh timer <value> no mgmd delayed-refresh timer <value>
Description
This command delays the refresh for some IGMP or MLD protocol-related values. When this command is enabled, IGMP/MLD last_reporter value, source, group, or querier uptime, and the create time and expiry time values will be updated based on the configured timer values. By default, the timer value is 30 seconds. This command is disabled by default, where the values listed above will be updated for every control packet. Best practices is to enable this feature when CPU utilization by the OVSDB server is increasing because of increased MGMD operations.

Parameter timer <value>

Description
Number of seconds the timer will delay the update. Range: 530.

Example
Configuring the MGMD delayed refresh.

switch(config)# mgmd delayed-update timer 20

Disabling the MGMD delayed refresh.feature:

switch(config)# no mgmd delayed-update timer 20

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.10

Modification Command Introduced

Command Information

Platforms 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

mgmd querier-offload
mgmd querier-offload no mgmd querier-offload
Description

MLD snooping global configuration commands | 1386

Configures the IGMP/MLD querier (mgmd) offload feature. When the querier offload is enabled, during VSX software upgrade or VSX querier node reboot, the querier responsibility is offloaded to the VSX peer which is up and running. This is enabled by default. The no form of this command disables the querier offload functionality. This feature is applicable only to the VSX switches not to standalone switches.
Example
Configuring the querier offload feature:
switch(config)# mgmd querier-offload
Disabling the querier offload feature:
switch(config)# no mgmd querier-offload

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.10

Modification Command Introduced

Command Information

Platforms 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1387

Chapter 79
MLD snooping VLAN configuration commands

MLD snooping VLAN configuration commands

ipv6 mld snooping
ipv6 mld snooping {enable | disable} no ipv6 mld snooping [enable | disable]
Description
This command enables or disables MLD snooping on the VLAN. The no form of this command disables all MLD snooping configurations on the VLAN.

Parameter enable disable

Description Required: Enable MLD snooping on the VLAN. Required: Disable MLD snooping on the VLAN.

Example
Enable MLD snooping on VLAN 2:

switch(config)# vlan 2 switch(config-vlan)# ipv6 mld snooping enable switch(config-vlan)# ipv6 mld snooping disable

Remove all MLD snooping configurations on VLAN 2:

switch(config)# vlan 2 switch(config-vlan)# no ipv6 mld snooping enable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide

1388

Platforms All platforms

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

ipv6 mld snooping fastlearn
ipv6 mld snooping fastlearn <port-list>
Description
This command enables the port to learn group information on receiving topology change notification. The no form of this command disables fastlearn on the ports.

Parameter port-list

Description Required: 1/1/1-1/1/2, ports to be configured as fastlearn ports.

Example
On the 6400 Switch Series, interface identification differs.

switch(config)# ipv6 mld snooping fastlearn 1/1/3 switch(config)# ipv6 mld snooping fastlearn 1/1/1-1/1/2 switch(config)# ipv6 mld snooping fastlearn 1/1/5,1/1/6

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld snooping fastleave vlan
ipv6 mld snooping [fastleave vlan <VLAN-LIST>] no ipv6 mld snooping [fastleave vlan <VLAN-LIST>]
Description
Configures the specified ports as fastleave ports. Enables the switch to immediately remove an interface from the bridge table upon receiving the leave group message.

MLD snooping VLAN configuration commands | 1389

The no form of this command disables fastleave configuration on the ports.

Parameter <VLAN-LIST>

Description
Required: Specifies a list of VLANs on which the port should be configured as a fastleave port. Specifies the number of a single VLAN or a series of numbers for a range of VLANs, separated by commas (10, 20, 30, 40), dashes (10-40), or both (10-40,60).

Usage
MLD fastleave is configured for ports on a per-VLAN basis. By default, the querier sends a MLD GroupSpecific Query message out of the interface, upon which the leave group message is received to ensure that no other receivers are connected to the interface. If receivers are directly attached to the switch, it is inefficient to send the membership query as the receiver wanting to leave is the only connected host. Fastleave processing eliminates the MLD Group-Specific Query message. Thus, it allows the switch to immediately remove an interface from the bridge table upon receiving the leave Group message. This processing speeds up the overall leave process and also eliminates the CPU overhead of having to generate an MLD Group-Specific Query message.
Example
On the 6400 Switch Series, interface identification differs. Configuring fastleave ports for the VLAN:

switch# configure terminal switch(config)# int 1/1/1 switch(config-vlan)# no shut switch(config-vlan)# no routing switch(config-vlan)# ipv6 mld snooping fastleave vlan 10 switch(config-vlan)# ipv6 mld snooping fastleave vlan 10-20

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld snooping filter-unknown-mcast
ipv6 mld snooping filter-unknown-mcast no ipv6 mld snooping filter-unknown-mcast

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1390

Description
Configures the unknown multicast to steal when the MLD snooping is enabled. The no form of this command returns to the default behavior of initial flooding of unknown multicast traffic.
Usage
In the default behavior, the unknown multicast traffic is flooded until the IP Multicast Flow programming is done on the hardware. This is known as initial flooding of unknown multicast. Use this command to filter unknown multicast instead of flooding.
Initial flooding of multicast traffic is observed for a few seconds after the device comes up from a reboot. This issue is only seen when the multicast source connected device is rebooted. Once the device is up after a reboot, it takes a few seconds for the CPU Rx rule to be programmed during the timeframe that the initial flooding is observed. This is an expected behavior.

Example
Configure the unknown multicast to steal globally on IGMP snooping enabled VLANs.
switch# configure terminal switch(config)# ipv6 mld snooping filter-unknown-multicast
Removing the configuration of the unknown multicast to steal globally on IGMP snooping enabled VLANs.
switch# configure terminal switch(config)# no ipv6 mld snooping filter-unknown-multicast

Command History

Release 10.11

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced on the 6200, 6300, 6400, 8100, and 8360.
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld snooping forced fastleave vlan
ipv6 mld snooping [forced-fastleave <VLAN-LIST>] no ipv6 mld snooping [forced-fastleave <VLAN-LIST>]
Description
Configures the given ports in forced fastleave mode. The no form of this command disables forced fastleave configuration on the ports.

MLD snooping VLAN configuration commands | 1391

Parameter <VLAN-LIST>

Description
Required: Specifies a list of VLANs on which the port should be configured as a forced fastleave port. Specifies the number of a single VLAN or a series of numbers for a range of VLANs, separated by commas (10, 20, 30, 40), dashes (10-40), or both (1040,60).

Usage
With forced fastleave enabled, MLD speeds up the process of blocking unnecessary multicast traffic to a switch port that is connected to multiple end nodes. When a port having multiple end nodes receives a leave group request from one end node for a given multicast group, forced fastleave activates and waits a small amount of time to receive a join request from any other member of the same group on that port. If the port does not receive a join request for that group within the forced fastleave interval, the switch then blocks any further traffic to that group on that port.
Example
On the 6400 Switch Series, interface identification differs. Configuring forced-fastleave ports for the VLAN:

switch# configure terminal switch(config)# int 1/1/1 switch(config-vlan)# no shut switch(config-vlan)# no routing switch(config-vlan)# ipv6 mld snooping forced-fastleave vlan 10 switch(config-vlan)# ipv6 mld snooping forced-fastleave vlan 10-20

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld snooping apply access-list
ipv6 mld snooping apply access-list <ACL-NAME> no ipv6 mld snooping apply access-list <ACL-NAME>
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1392

Configures the ACL on a particular interface to filter the MLD join or leave packets based on rules set in the particular ACL name. The no form of this command disables the rules set for the ACL.
This configuration will override the ACL associated with IGMP snooping on the corresponding L2 VLAN.

Parameter access-list <ACL-NAME>

Description
Associates an ACL with the IGMP.
Specifies the name of the ACL. NOTE: If the access list is configured for both L2 VLAN and L3 VLAN, the L3 VLAN configuration will be applied.

Usage
n Existing classifier commands are used to configure the ACL. n In case an IGMPv3 packet with multiple group addresses is received, the switch only processes the
permitted group addresses based on the ACL rule set. The packet is forwarded to querier and PIM router even though one of the groups present in the packet is blocked by ACL. This avoids the delay in learning of the permitted groups. Since the access switch configured with ACL blocks the traffic for the groups which are denied, forwarding of joins has no impact. If all the groups in the packet are denied by the ACL rule, the packet is not forwarded to the querier and PIM router. Existing joins will timeout. n In case of IGMPv2, if there is no match or if there is a deny rule match, the packet is dropped.
Examples
Configuring the ACL to filter MLD packets based on permit/deny rules set in access list mygroup:
switch(config)# access-list ipv6 mygroup switch(config-acl-ip)# 10 deny icmpv6 any ff55::2 switch(config-acl-ip)# 20 deny icmpv6 any ff55::3 switch(config-acl-ip)# 30 permit icmpv6 any ff55::1 switch(config-acl-ip)# exit switch(config)# interface vlan 2 switch(config-vlan)# ipv6 mld snooping apply access-list mygroup
Configuring the ACL to remove the rules set in access list mygroup:
switch(config-vlan)# no ipv6 mld snooping apply access-list mygroup

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

MLD snooping VLAN configuration commands | 1393

Command Information

Platforms All platforms

Command context config-vlan

Authority
Administrators or local user group members with execution rights for this command.

ipv6 mld snooping auto vlan
ipv6 mld snooping [auto vlan <VLAN-LIST>] no ipv6 mld snooping [auto vlan <VLAN-LIST>]
Description
This command configures the given ports in auto mode, which is the default port mode. The no form of this command disables auto ports.

Parameter <VLAN-LIST>

Description
Required: Specifies a list of VLANs on which the port should be configured as an auto port. Specifies the number of a single VLAN or a series of numbers for a range of VLANs, separated by commas (10, 20, 30, 40), dashes (10-40), or both (10-40,60).

Example
On the 6400 Switch Series, interface identification differs. Configuring auto ports for VLANs on the interface:

switch# configure terminal switch(config)# int 1/1/1 switch(config-vlan)# no shut switch(config-vlan)# no routing switch(config-vlan)# ipv6 mld snooping auto vlan 10 switch(config-vlan)# ipv6 mld snooping auto vlan 10-20

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1394

ipv6 mld snooping blocked vlan
ipv6 mld snooping [blocked vlan <VLAN-LIST>] no ipv6 mld snooping [blocked vlan <VLAN-LIST>]
Description
By default ports are configured in auto mode. This command configures the given ports in blocked mode. The no form of this command removes blocked ports.

Parameter <VLAN-LIST>

Description
Required: Specifies a list of VLANs on which the port should be configured as a blocked port. Specifies the number of a single VLAN or a series of numbers for a range of VLANs, separated by commas (10, 20, 30, 40), dashes (10-40), or both (10-40,60).

Example
On the 6400 Switch Series, interface identification differs. Configuring blocked ports for the VLANs on the interface:

switch# configure terminal switch(config)# int 1/1/1 switch(config-vlan)# no shut switch(config-vlan)# no routing switch(config-vlan)# ipv6 mld snooping blocked vlan 10 switch(config-vlan)# ipv6 mld snooping blocked vlan 10-20

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld snooping forward vlan
ipv6 mld snooping [forward vlan <VLAN-LIST>] no ipv6 mld snooping [forward vlan <VLAN-LIST>]
Description

MLD snooping VLAN configuration commands | 1395

By default ports are configured in auto mode. This command configures the given ports in forward mode.
The no form of this command disables forward ports.

Parameter <VLAN-LIST>

Description
Required: Specifies a list of VLANs on which the port should be configured as a forward port. Specifies the number of a single VLAN or a series of numbers for a range of VLANs, separated by commas (10, 20, 30, 40), dashes (10-40), or both (10-40,60).

Example
On the 6400 Switch Series, interface identification differs. Configuring forward ports for VLANs on the interface:

switch# configureterminal switch(config)# int 1/1/1 switch(config-vlan)# no shut switch(config-vlan)# no routing switch(config-vlan)# ipv6 mld snooping forward vlan 10 switch(config-vlan)# ipv6 mld snooping forward vlan 10-20

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld snooping preprogram-starg-flow
ipv6 mld snooping preprogram-starg-flow {enable | disable}
Description
This command configures the preprogramming of the starg flow feature on MLD snooping enabled VLANs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1396

Parameter enable disable

Description Enable preprogramming starg flows on the VLAN. Disable prprogramming starg flows on the VLAN.

Usage
When this feature is enabled, a summarized multicast bridge entry is programmed into the hardware table when a starg or sg MLD join is received on the MLD snooping enabled VLAN. This enables multicast flow to be programmed in the hardware even before the data packet arrives for multicast flow. MLDv2 joins that are sent for a specific source are treated similar to starg joins and a summarized entry is programmed in the corresponding hardware. Preprogramming of Starg Flows is supported only on the MLD snooping enabled VLANs. If MLD snooping is disabled on a VLAN, this feature is auto-disabled. This feature is currently supported for MLDv1 and MLDv2 joins, which means a summarized multicast flow is programmed in advance when a MLDv1 or MLDv2 join for a specific group is received. For MLDv2 deployments, traffic from all of the sources for a specific multicast group are sent to all of the clients, regardless of whether they are sending MLDv1 or MLDv2 joins for this group. Keeping this feature disabled is recommended on VLANs where traffic from the specific source is only expected for the MLDv2 clients. On the 6200, 6300, 6400, and 8100 switch series, a single starg entry is programmed in advance for each join received. Data driven programming of SG entries does not occur when traffic is received from a specific source for this group. A single starg entry is used to forward the traffic to the clients for all of the active joins in the feature enabled VLANs. When an unknown multicast packet is received on a VLAN where the feature is enabled, it triggers programming of a starg entry in the hardware instead of SG. It is highly recommended to not enable this feature on devices where PIM or L3 multicast routing is enabled as it can lead to issues like permanent traffic loss. Configuring this feature on devices where there are multiple sources sending traffic for the same group address is recommended. This feature is mutually exclusive with the MLD snooping static group feature.
Optimization may vary environment to environment, based on scale.

Example
Enable preprogramming of starg flow on VLAN 2:
switch(config)# vlan 2 switch(config-vlan)# ipv6 mld snooping preprogramming-starg-flow enable
Remove all preprogramming of starg flow on VLAN 2:
switch(config)# vlan 2 switch(config-vlan)# ipv6 mld snooping preprogramming-starg-flow disable

Command History

MLD snooping VLAN configuration commands | 1397

Release 10.13

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

ipv6 mld snooping static-group
ipv6 mld snooping [static-group <X:X::X:X>] no ipv6 mld snooping [static-group <X:X::X:X>]
Description
This command configures static multicast group. The no form of this command disables static multicast group.

Parameter static-group

Description Required: <X:X::X:X>, MLD static multicast group.

Example
Configuring static multicast group:

switch(config)# vlan 2 switch(config-vlan)# ipv6 mld snooping static-group ff12::c

Removing the configuration of static multicast group:

switch(config)# vlan 2 switch(config-vlan)# no ipv6 mld snooping static-group ff12::c

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1398

Platforms All platforms

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

ipv6 mld snooping version
ipv6 mld snooping [version <ver>] no ipv6 mld snooping [version <ver>]
Description
This command configures the MLD snooping version on the VLAN. MLD version 2 is the default. The no form of the command configures the default MLD snooping version on the VLAN, 2.

Parameter ver

Description Required: 1-2, MLD snooping version.

Example

switch(config)# vlan 2 switch(config-vlan)# ipv6 mld snooping version 2

switch(config-vlan)# no ipv6 mld snooping version 2

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

MLD snooping VLAN configuration commands | 1399

Chapter 80 MLD snooping show commands

MLD snooping show commands

show ipv6 mld snooping
show ipv6 mld snooping [vlan <vlan-id> [group <ip-addr>|{port <IF-NAME>}] counters detail groups vlan <vlan-id> no ... packet-exceptions static-groups statistics vsx-peer vlan [<vlan-id>]
NOTE: The vsx-peer parameter is not supported by the 6300 Series Switch

Description
This command shows MLD snooping details for all VLANs. Specify a VLAN ID or a VLAN and a group to display details for only that VLAN or VLAN group.

Parameter vlan <vlan-id> group
<ip-addr> port <IF-NAME> counters detail
groups vlan <vlan-id>
no ... packet-exceptions

Description
Shows MLD snooping protocol information and number of different groups joined for the VLAN.
Shows MLD snooping details for the specified VLAN, including the number of different groups joined for the VLAN. Identify the group by IP address or interface name.
Dispaly MLD snooping information for the selected group IP address.
Display information for a VLAN port. Specify the port name in member/slot/port format.
Shows MLD query packets transmitted (Tx), received (Rx), and error packet counters.
Shows the total VLANs with MLD enabled. When issued with the vlan <vlan-id> parameter, this command displays details for the selected VLAN.
Show MLD snooping groups information.
Display IGMP snooping operational information for specified VLAN
Negates any configured parameter.
Troubleshoot issues in an L2 multicast bridge entries for data

AOS-CX 10.14 Command-Line Interface Guide

1400

Parameter statistics

Description packets forwarded to the CPU. Show MLD snooping statistics.

Examples

switch# show ipv mld snooping vlan 2 group port 1/1/1

VLAN ID : 2 VLAN Name : VLAN2

Group Address : ff05::2:1 Last Reporter : fe80::1 Group Type : Filter

V1

Sources Sources

Port

Vers Mode Uptime Expires Timer

Forwarded Blocked

--------- ---- ---- --------- --------- --------- --------- --------

1/1/1

2 INC 1m 46s 2m 34s

3

0

Group Address : ff05::2:1 Source Address : 3000::1 Source Type : Filter

Port

Mode Uptime Expires Configured Mode

--------- ---- --------- --------- ----------------

1/1/1

INC 1m 46s 2m 34s Auto

Group Address : ff05::2:1 Source Address : 3000::2 Source Type : Filter

Port

Mode Uptime Expires Configured Mode

--------- ---- --------- --------- ----------------

1/1/1

INC 1m 46s 2m 34s Auto

Group Address : ff05::2:1 Source Address : 3000::3 Source Type : Filter

Port

Mode Uptime Expires Configured Mode

--------- ---- --------- --------- ----------------

1/1/1

INC 1m 46s 2m 34s Auto

switch# show ipv6 mld snooping counters MLD Snooping VLAN Counters

Rx Counters :

V1 All Hosts Queries

0

V2 All Hosts Queries

0

V2 Group Specific Queries

0

Group And Source Specific Queries

0

V1 Member Reports

0

V2 Member Reports

0

V1 Member Leaves

0

MLD snooping show commands | 1401

Tx Counters :

Flood on vlan

44

V1 Group Specific Queries

0

V2 Group Specific Queries

0

Errors:

Unknown Message Type

0

Malformed Packets

0

Bad Checksum

0

Packet received on MLD-disabled Interface

0

Interface Wrong Version Queries

0

Packets dropped by ACL

0

Port Counters:

Membership Timeout

0

switch# show ipv6 mld snooping groups

MLD Group Address Information

VLAN ID Group Address

Expires UpTime Last Reporter

Type

------- ----------------- --------- --------- ------------------------------ ----

10

ff12::c

3m 54s 0m 26s 2001::1

Filter

10

ff12::d

4m 17s 0m 3s

2001::1

switch# show ipv6 mld snooping vlan 2 statistics MLD Snooping statistics

VLAN ID : 2 VLAN Name : VLAN2

Number of Include Groups

:1

Number of Exclude Groups

:0

Number of Static Groups

:1

Total Multicast Groups Joined : 2

switch# show ipv6 mld snooping packet-exceptions

List of L2 Multicast Bridge entries for which data packets are hitting CPU

Vlan Group Address Source-Address

Packet Count Last Seen Time

---- -------------- -----------------

------------ --------------

10

ff03::10/128

1010::10/128

19

01h:02m:05s

10

ff03::12/128

1010::11/128

30

00d:02h:01m

10

ff04::10/12

1010::10/128

40

01m:02w:03d

20

ff03::11/128

5000::10/128

20

02m:02w:00d

20

ff03::12/128

5000::10/128

41

0001y:01m:02w:05d

20

ff04::10/128

5000::10/128

30

00d:02h:02m

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1402

Release 10.10 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification The packet-exceptions parameter is introduced. --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mgmd debug-counters
show mgmd debug-counters
Description
This command displays packet throttle counters and packet queue sizes for IGMP/MLD debug counters.
Example

switch# show mgmd debug-counters Global MGMD Debug Counters Group Throttle Count Dropped Packet Count Max Pkt Handler Queue Depth Current Pkt Handler Queue Depth

:0 : 100 : 2048 : 1000

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.10
Command Information
Platforms Command context All platforms config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

MLD snooping show commands | 1403

Chapter 81
MLD configuration commands for interface VLAN

MLD configuration commands for interface VLAN

ipv6 mld
ipv6 mld {enable | disable} no ipv6 mld [enable | disable]
Description
This command enables or disables MLD on the interface VLAN. The no form of this command disables MLD on the interface VLAN.

Parameter enable disable

Description Required: Enable MLD on the interface VLAN. Required: Disable MLD on the interface VLAN.

Example

switch(config)# interface vlan 2 switch(config-if-vlan)# ipv6 mld enable switch(config-if-vlan)# ipv6 mld disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld apply access-list
ipv6 mld apply access-list <ACL-NAME> no ipv6 mld apply access-list <ACL-NAME>

AOS-CX 10.14 Command-Line Interface Guide

1404

Description
Configures the ACL on a particular interface to filter the MLD join or leave packets based on rules set in the particular ACL name. The no form of this command disables the rules set for the ACL.

Parameter access-list <ACL-NAME>

Description Associates an ACL with the IGMP. Specifies the name of the ACL.

Usage
n Existing classifier commands are used to configure the ACL. n In case an IGMPv3 packet with multiple group addresses is received, the switch only processes the
permitted group addresses based on the ACL rule set. The packet is forwarded to querier and PIM router even though one of the groups present in the packet is blocked by ACL. This avoids the delay in learning of the permitted groups. Since the access switch configured with ACL blocks the traffic for the groups which are denied, forwarding of joins has no impact. If all the groups in the packet are denied by the ACL rule, the packet is not forwarded to the querier and PIM router. Existing joins will timeout. n In case of IGMPv2, if there is no match or if there is a deny rule match, the packet is dropped.
Examples
Configuring the ACL to filter MLD packets based on permit/deny rules set in access list mygroup:

switch(config)# access-list ipv6 mygroup switch(config-acl-ip)# 10 deny icmpv6 any ff55::2 switch(config-acl-ip)# 20 deny icmpv6 any ff55::3 switch(config-acl-ip)# 30 permit icmpv6 any ff55::1 switch(config-acl-ip)# exit switch(config)# interface vlan 2 switch(config-vlan)# ipv6 mld apply access-list mygroup

Configuring the ACL to remove the rules set in access list mygroup:

switch(config-vlan)# no ipv6 mld apply access-list mygroup

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

MLD configuration commands for interface VLAN | 1405

Platforms All platforms

Command context config-vlan

Authority
Administrators or local user group members with execution rights for this command.

no ipv6 mld
no ipv6 mld
Description
This command removes all MLD configurations on the interface.
Example
On the 6400 Switch Series, interface identification differs.
switch(config)# interface 1/1/1 switch(config-if)# no ipv6 mld

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld querier
ipv6 mld querier
Description
This command configures MLD querier. The no form of this command disables MLD querier.
Example
switch(config)# interface vlan 2 switch(config-if-vlan)# ipv6 mld querier switch(config-if-vlan)# no ipv6 mld querier

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1406

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld querier interval
ipv6 mld querier [interval <interval-value>]
Description
This command configures MLD querier interval. The default interval-value is 125.

Parameter interval-value

Description
Required: 5-300, configures MLD querier interval.
NOTE: Default interval-value is 125. Use the no ipv6 mld querier interval command to set interval-value to the default.

Example
switch(config)# interface vlan 2 switch(config-if-vlan)# ipv6 mld querier interval 100 switch(config-if-vlan)# no ipv6 mld querier interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

MLD configuration commands for interface VLAN | 1407

Platforms All platforms

Command context config-if-vlan

Authority
Administrators or local user group members with execution rights for this command.

ipv6 mld querier-wait-time
ipv6 mld querier-wait-time <QUERIER-WAIT-TIME> [no] ipv6 mld querier-wait-time <QUERIER-WAIT-TIME>
Description
Configures initial MLD querier-wait-time value in seconds. The no form of this command sets the MLD querier-wait-time to the default value of 260 seconds. Note that the wait timer can be configured to any numbers within the 1-300 second range.

Parameter <QUERIER-WAIT-TIME-VALUE>

Description Configures MLD querier-wait-time to desired value.

Example
6200-1(config-if-vlan)# ipv6 mld querier-wait-time <1-300> Querier Wait value (Default: 260) 6200-1(config-if-vlan)#

When PIMv6 is enabled, automated election will override querier-wait-time configuration. When PIM is disabled and [no] igmp querier-wait-time is configured, the initial wait timer will be configured at desired value.
For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms All platforms

Command context config-if-vlan

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld last-member-query-interval
ipv6 mld last-member-query-interval <interval-value>
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1408

This command configures MLD last member query interval value in seconds. The default interval-value is 1 second.

Parameter interval-value

Description Required: 1-2, configures MLD last-member-query-interval.

Default interval-value is 1 second. Use the no ipv6 mld last-member-query-interval command to set interval-value to the default.
Example
switch(config)# interface vlan 2 switch(config-if-vlan)# ipv6 mld last-member-query-interval 2 switch(config-if-vlan)# no ipv6 mld last-member-query-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld querier query-max-response-time
ipv6 mld querier query-max-response-time <response-time>
Description
This command configures MLD max response time value in seconds. The default max-response-timevalue is 10 seconds.

Parameter max-response-time-value

Description
Required: 10-128, configures MLD querier max-response-time.
NOTE: Default max-response-time-value is 10 seconds. Use the no ipv6 mld querier query-max-response-time command to set max-response-time-value to the default.

Example

MLD configuration commands for interface VLAN | 1409

switch(config)# interface vlan 2 switch(config-if-vlan)# ipv6 mld query-max-response-time 50 switch(config-if-vlan)# no ipv6 mld query-max-response-time

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld robustness
ipv6 mld robustness <VALUE>
Description
This command configures MLD robustness. The robustness value represents the number of times the querier retries queries on the connected subnets. The default robustness-value is 2 seconds.

Parameter <VALUE>

Description
Required: 1-7, configures MLD robustness.
NOTE: Default robustness-value is 2 seconds. Use the no ipv6 mld robustness command to set robustness-value to the default.

Example
switch(config)# interface vlan 2 switch(config-if-vlan)# ipv6 mld robustness 5 switch(config-if-vlan)# no ipv6 mld robustness

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1410

Command Information

Platforms All platforms

Command context config-if-vlan

Authority
Administrators or local user group members with execution rights for this command.

ipv6 mld static-group
ipv6 mld static-group <MULTICAST-GROUP-IP>
Description
This command configures MLD static group.

Parameter <MULTICAST-GROUP-IP>

Description Required: X:X::X:X, configures MLD static group.

Example

switch(config)# interface vlan 2 switch(config-if-vlan)# ipv6 mld static-group ff12::c switch(config-if-vlan)# no ipv6 mld static-group ff12::c

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld version
ipv6 mld version <VERSION> no ipv6 mld version <VERSION>
Description
This command configures MLD version. The no form of the command configures the default MLD version of 2.

MLD configuration commands for interface VLAN | 1411

Parameter <VERSION>

Description Required: 1-2, configures MLD version.

Example

switch(config)# interface vlan 2 switch(config-if-vlan)# ipv6 mld version 2

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld version strict
ipv6 mld version <VERSION> [strict]
Description
This command configures MLD strict version. Packets that do not match the configured version will be dropped. By default, strict option is not enabled.

Parameter <VERSION>

Description Required: 1-2, configures MLD version.

Example

switch(config)# interface vlan 2 switch(config-if-vlan)# ipv6 mld version 2 strict switch(config-if-vlan)# no ipv6 mld version 2 strict

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1412

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

MLD configuration commands for interface VLAN | 1413

Chapter 82 MLD show commands for interface VLAN

MLD show commands for interface VLAN

show ipv6 mld
show ipv6 mld all-vrfs counters group <x:x::x:x> [source x:x::x:x] groups interface {<INTF-ID>|<INTF-ID.ID>}|{vlan <vlan-id}} static-groups statistics [all-vrfs|{vrf <vrf-name>}] vrf <vrf-name}
Description
This command shows MLD groups joined details.

Parameter all-vrfs
counters group <x:x::x:x> [source <x:x::x:x>]
groups interface
<INTF-ID> <INTF-ID.ID> vlan <vlan-id> static-groups

Description
Show MLD snooping info for all VRFs in all interfaces or groups, or for all VRFs in a specified group, interface or VLAN
Show all MLD counters, or display counters for the specified interface or VLAN
Show MLD group information for the specified group, group and interface, or group and vlan. Include the optional source <x:x::x:x> parameter to dislay source information for the group.
Show MLD group information for all VRFs, or for groups in the specified interface or VLAN.
Shows MLD configuration information for a specified interface , sub interface, or VLAN.
Specify an Interface ID
Specify a sub-interface ID. (Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.)
Specify a VLAN ID
Display all static groups information, or include one of the additional parameters apply additional filters: n all-vrfs: Display MLD static-group information for all
VRFs n vrf <vrf-name>: Display MLD static-group information
for the selected VRF

AOS-CX 10.14 Command-Line Interface Guide

1414

Parameter statistics
vrf <vrf-name>

Description
Display all MLD statistics, or include one of the additional parameters apply additional filters: n all-vrfs: Display MLD statistics information for all VRFs n vrf <vrf-name>: Display MLD statistics information
forthe selcted VRF
Show MLD information for the specified VRF.

Examples
Showing the current MLD configuration and status

switch# show ipv6 mld

VRF Name Interface MLD Configured Version MLD Operating Version Querier State Querier IP [this switch] Querier Uptime Querier Expiration Time MLD Snoop Enabled on VLAN

: default : vlan10 :2 :2 : Querier : fe80::7272:cfff:fe96:d3ec : 39m 44s : 0m 31s : True

Showing the MLD configuration on a specified VLAN or interface:

switch# show ipv6 mld interface vlan 10

MLD Configured Version : 2

MLD Operating Version : 2

Querier State

: Querier

Querier IP [this switch] : fe80::7272:cfff:fe96:d3ec

Querier Uptime

: 40m 42s

Querier Expiration Time : 1m 39s

MLD Snoop Enabled on VLAN : True

switch# show ipv6 mld interface 1/1/2

MLD Configured Version : 2

MLD Operating Version : 2

Querier State

: Querier

Querier IP [this switch] : fe80::7272:cfff:fe96:d3ec

Querier Uptime

: 40m 42s

Querier Expiration Time : 1m 39s

MLD Snoop Enabled on VLAN : True

Showing MLD configuration on sub-interface 1/1/2.10: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch# show ipv6 mld interface 1/1/2.10 MLD Configured Version : 2

MLD show commands for interface VLAN | 1415

MLD Operating Version : 2

Querier State

: Querier

Querier IP [this switch] : fe80::7272:cfff:fe96:13ec

Querier Uptime

: 40m 42s

Querier Expiration Time : 1m 39s

MLD Snoop Enabled on VLAN : True

Showing MLD groups information for a specified interface:

switch# show ipv6 mld interface 1/1/1 groups

MLD group information for group ff55::1

Interface Name : 1/1/1

VRF Name

: default

Group Address Last Reporter

: ff55::1 : fe80::a00:9ff:fe77:1062

V1

Sources Sources

Vers Mode Uptime Expires Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------

2 EXC 0m 14s 4m 6s

Showing MLD groups information for a specified sub-interface:

switch# show ipv6 mld interface 1/1/1.10 groups

MLD group information for group ff56::1

Interface Name : 1/1/1.10

VRF Name

: default

Group Address Last Reporter

: ff56::1 : fe80::a00:9ff:fe77:1062

V1

Sources Sources

Vers Mode Uptime Expires Timer

Forwarded Blocked

---- ---- --------- --------- --------- --------- --------

2 EXC 1m 14s 2m 6s

Showing MLD static groups

switch# show ipv6 mld static-groups all-vrfs

MLD Static Group Address Information

VRF Name :default

Interface Name Group Address

--------------- -----------------------------------------

vlan2

ff12::c

vlan2

ff12::d

VRF Name :test

Interface Name Group Address

--------------- -----------------------------------------

vlan3

ff13::1

vlan3

ff13::2

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1416

Showing MLD counters

switch# show ipv6 mld counters

MLD Counters

Interface Name

: vlan2

VRF Name

: default

Membership Timeout : 0

V1 All Hosts Queries V2 All Hosts Queries V1 Group Specific Queries V2 Group Specific Queries Group And Source Specific Queries V2 Member Reports V1 Member Reports V1 Member Leaves Packets dropped by ACL

Rx

Tx

------------- -------------

0

0

0

12

0

0

0

0

0

0

0

N/A

0

N/A

0

N/A

0

N/A

switch# show ipv6 mld counters vrf default

MLD Counters

Interface Name

: vlan2

VRF Name

: default

Membership Timeout : 0

V1 All Hosts Queries V2 All Hosts Queries V1 Group Specific Queries V2 Group Specific Queries Group And Source Specific Queries V2 Member Reports V1 Member Reports V1 Member Leaves Packets dropped by ACL

Rx

Tx

------------- -------------

0

0

0

12

0

0

0

0

0

0

0

N/A

0

N/A

0

N/A

Showing MLD statistics on a specified interface:

switch# show ipv6 mld interface 1/1/1 statistics

MLD statistics

Interface Name : 1/1/1

VRF Name

: default

Number of Include Groups

:2

Number of Exclude Groups

:0

Number of Static Groups

:0

Total Multicast Groups Joined : 2

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

MLD show commands for interface VLAN | 1417

Release 10.11 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1418

Chapter 83
MLD configuration commands for interface

MLD configuration commands for interface

ipv6 mld
ipv6 mld {enable | disable} no ipv6 mld {enable | disable}
Description
This command enables or disables MLD on the interface. The no form of this command disables MLD on the interface.

Parameter enable disable

Description Required: Enable MLD on the interface. Required: Disable MLD on the interface.

Example
On the 6400 Switch Series, interface identification differs.

switch(config)# interface 1/1/1 switch(config-if)# ipv6 mld enable switch(config-if)# ipv6 mld disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld apply access-list
ipv6 mld apply access-list <ACL-NAME> no ipv6 mld apply access-list <ACL-NAME>

AOS-CX 10.14 Command-Line Interface Guide

1419

Description
Configures the ACL on a particular interface to filter the MLD join or leave packets based on rules set in the particular ACL name. The no form of this command removes the rules set for the ACL.

Parameter access-list <ACL-NAME>

Description Associates an ACL with the IGMP. Specifies the name of the ACL.

Usage
n Existing classifier commands are used to configure the ACL. n In case an IGMPv3 packet with multiple group addresses is received, the switch only processes the
permitted group addresses based on the ACL rule set. The packet is forwarded to querier and PIM router even though one of the groups present in the packet is blocked by ACL. This avoids the delay in learning of the permitted groups. Since the access switch configured with ACL blocks the traffic for the groups which are denied, forwarding of joins has no impact. If all the groups in the packet are denied by the ACL rule, the packet is not forwarded to the querier and PIM router. Existing joins will timeout. n In case of IGMPv2, if there is no match or if there is a deny rule match, the packet is dropped.
Examples
On the 6400 Switch Series, interface identification differs. Configuring the ACL to filter MLD packets based on permit/deny rules set in access list mygroup:

switch(config)# access-list ipv6 mygroup switch(config-acl-ip)# 10 deny icmpv6 any ff55::2 switch(config-acl-ip)# 20 deny icmpv6 any ff55::3 switch(config-acl-ip)# 30 permit icmpv6 any ff55::1 switch(config-acl-ip)# exit switch(config)# interface 1/1/1 switch(config-vlan)# ipv6 mld apply access-list mygroup

Configuring the ACL to remove the rules set in access list mygroup:

switch(config-vlan)# no ipv6 mld apply access-list mygroup

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

MLD configuration commands for interface | 1420

Platforms All platforms

Command context config-vlan

Authority
Administrators or local user group members with execution rights for this command.

no ipv6 mld
no ipv6 mld
Description
This command removes all MLD configurations on the interface.
Example
On the 6400 Switch Series, interface identification differs.
switch(config)# interface 1/1/1 switch(config-if)# no ipv6 mld

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld querier
ipv6 mld querier
Description
This command configures MLD querier. This functionality will allow the interface to join in the querierelection process.
Example
On the 6400 Switch Series, interface identification differs.
switch(config)# interface 1/1/1 switch(config-if)# ipv6 mld querier switch(config-if)# no ipv6 mld querier

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1421

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld querier interval
ipv6 mld querier [interval <interval-value>]
Description
This command configures MLD querier interval. The default interval-value is 125.

Parameter interval-value

Description
Required: 5-300, configures MLD querier interval.
NOTE: Default interval-value is 125. Use the no ipv6 mld querier interval command to set interval-value to the default.

Example
On the 6400 Switch Series, interface identification differs.
switch(config)# interface 1/1/1 switch(config-if)# ipv6 mld querier interval 100 switch(config-if)# no ipv6 mld querier interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

MLD configuration commands for interface | 1422

Platforms All platforms

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

ipv6 mld last-member-query-interval
ipv6 mld last-member-query-interval <interval-value>
Description
This command configures MLD last member query interval value in seconds. The default interval-value is 1 second.

Parameter interval-value

Description Required: 1-2, configures MLD last-member-query-interval.

Default interval-value is 1 second. Use the no ipv6 mld last-member-query-interval command to set interval-value to the default.
Example
On the 6400 Switch Series, interface identification differs.
switch(config)# interface 1/1/1 switch(config-if)# ipv6 mld last-member-query-interval 2 switch(config-if)# no ipv6 mld last-member-query-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld querier query-max-response-time
ipv6 mld querier query-max-response-time <response-time>
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1423

This command configures MLD max response time value in seconds. The default max-response-timevalue is 10 seconds.

Parameter max-response-time-value

Description
Required: 10-128, configures MLD querier max-response-time.
NOTE: Default max-response-time-value is 10 seconds. Use the no ipv6 mld querier query-max-response-time command to set max-response-time-value to the default.

Example
On the 6400 Switch Series, interface identification differs.
switch(config)# interface 1/1/1 switch(config-if)# ipv6 mld query-max-response-time 50 switch(config-if)# no ipv6 mld query-max-response-time

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld robustness
ipv6 mld robustness <value>
Description
This command configures MLD robustness. The robustness value represents the number of times the querier retries queries on the connected subnets. The default robustness-value is 2 seconds.

Parameter robustness-value

Description Required: 1-7, configures MLD robustness.

Default robustness-value is 2 seconds. Use the no ipv6 mld robustness command to set robustness-value to the default.

MLD configuration commands for interface | 1424

Example
On the 6400 Switch Series, interface identification differs.
switch(config)# interface 1/1l/1 switch(config-if)# ipv6 mld robustness 5 switch(config-if)# no ipv6 mld robustness

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld static-group
ipv6 mld static-group <multicast-group-ip>
Description
This command configures MLD static group.

Parameter multicast-group-ip

Description Required: X:X::X:X, configures MLD static group.

Example
On the 6400 Switch Series, interface identification differs.

switch(config)# interface 1/1/1 switch(config-if)# ipv6 mld static-group ff12::c switch(config-if)# no ipv6 mld static-group ff12::c

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1425

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mld version
ipv6 mld version <version> no ipv6 mld version <version>
Description
This command configures MLD version. The no form of this command removes MLD version from the interface.

Parameter version

Description Required: 1-2, configures MLD version.

Example
On the 6400 Switch Series, interface identification differs.

switch(config)# interface 1/1/1 switch(config-if)# ipv6 mld version 2

switch(config)# interface 1/1/1 switch(config-if)# no ipv6 mld version 2

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

MLD configuration commands for interface | 1426

ipv6 mld version strict
ipv6 mld version <version> [strict]
Description
This command configures MLD strict version. Packets that do not match the configured version will be dropped. By default, strict option is not enabled.

Parameter version

Description Required: 1-2, configures MLD version.

Example
On the 6400 Switch Series, interface identification differs.

switch(config)# interface 1/1/1 switch(config-if)# ipv6 mld version 2 strict switch(config-if)# no ipv6 mld version 2 strict

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1427

Chapter 84 MPLS commands

MPLS commands

bind ipv4 (lsp label imposition)
bind ipv4 {<IP-ADDR>/<MASK> | <IP-ADDR> <MASK>} output <IFNAME> <IP-ADDR> <OUT-LABEL> no bind ipv4 {<IP-ADDR>/<MASK> | <IP-ADDR><MASK>} output <IFNAME><IP-ADDR><OUT-LABEL>
Description
Performs LSP label imposition by adding label to an ingress packet (push operation). The no form of this command removes the ingress packet label.

Parameter ipv4 <IP-ADDR>/<MASK>
ipv4 <IP-ADDR> <MASK>
<IFNAME> <IP-ADDR> <OUT-LABEL>

Description
Specifies the IPv4 destination in x.x.x.x format, where x is a decimal value from 0 to 255 and the number of bits in an IPv4 address mask in CIDR format (x), where x is a decimal number from 0 to 32.
Specifies the IPv4 destination in x.x.x.x format, where x is a decimal value from 0 to 255 and the destination IP subnet mask in x.x.x.x format, where x is a decimal value from 0 to 255.
Specifies the egress interface of the binding.
Specifies he next hop IP address of the binding.
Specifies the MPLS label to apply. Range: 16-1048575.

Usage
n The no form of both the mpls and static-lsp commands deletes all static LSP bindings. n The static LSP label range must be allocated before configuring static LSP bindings. n Specifying an outgoing label outside the range of 16-1048575 is not allowed. An outgoing label is not
bound by allocated static LSP label range. n Types of valid egress interfaces are: System, LAG, VLAN, and Tunnel.
o Routing must be enabled for egress interfaces. o Interfaces must be configured before performing the bind command. o LAG member interfaces are not allowed as egress interfaces.
Examples
Configuring binding:

switch(config-mpls-static-lsp)# bind ipv4 2.2.2.0/24 output 1/1/1 20.0.0.2 20

Unconfiguring binding:

AOS-CX 10.14 Command-Line Interface Guide

1428

switch(config-mpls-static-lsp)# no bind ipv4 2.2.2.0/24 output 1/1/1 20.0.0.2 20
Configuring binding with an invalid egress interface:
switch(config-mpls-static-lsp)# bind ipv4 2.2.2.0/24 output 1/1/1 20.0.0.2 20 The output must be a layer 3 interface with routing enabled.
Configuring binding with an interface that does not have an IP address assigned:
switch(config-mpls-static-lsp)# bind ipv4 2.2.2.0/24 output 1/1/1 20.0.0.2 20 The egress interface must have an IP address assigned.
Configuring binding with a next hop IP that is not in the same subnet as egress interface:
switch(config-if)# interface 1/1/1 switch(config-if)# no shutdown switch(config-if)# ip address 10.0.0.1/24 switch(config-if)# mpls enable switch(config-if)# mpls switch(config-mpls)# static-lsp switch(config-mpls-static-lsp)# bind ipv4 2.2.2.0/24 output 1/1/1 60.0.0.20 40
The next hop IP address must be in the same subnet as interface 1/1/1.
Configuring binding with a next hop IP that is the same as the egress interface IP:
switch(config-if)# int 1/1/1 switch(config-if)# no shutdown switch(config-if)# ip address 10.0.0.1/24 switch(config-if)# mpls enable switch(config)# mpls switch(config-mpls)# static-lsp switch(config-mpls-static-lsp)# bind ipv4 2.2.2.0/24 output 1/1/1 10.0.0.1 40
The next hop IP address cannot be the same as any interface 1/1/1 primary or secondary addresses.

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09
Command Information

Modification Support for the Aruba 6400 Series Switch added. Command introduced

MPLS commands | 1429

Platforms 6400

Command context config-mpls-static-lsp

Authority
Administrators or local user group members with execution rights for this command.

bind ipv4 input (static lsp binding)
bind ipv4 input <in-label> no bind ipv4 input <in-label>
Description
Performs label disposition by removing label from an egress packet (pop operation). The no form of this command removes the static LSP binding configuration.

Parameter <in-label>

Description Specifies the MPLS label to bind. Range: 16-1048575.

Usage
n The no form of both the mpls and static-lsp commands deletes all MPLS binding configurations. n The static LSP label range must be allocated before configuring static LSP bindings. n Specifying an incoming label outside the range of 16-1048575 is not allowed. An incoming label is
bound by the allocated static LSP label range.
Examples
Configuring static LSP binding for label disposition:

switch(config)# mpls switch(config-mpls)# static-lsp switch(config-mpls-static-lsp)# bind ipv4 input 20

Removing the configuration for static LSP binding:

switch(config)# mpls switch(config-mpls)# static-lsp switch(config-mpls-static-lsp)# no bind ipv4 input 20

Configuring static LSP binding outside the label range:

switch(config-mpls-static-lsp)# bind ipv4 input 200 The input label must be within the range specified by label-range.

Configuring static LSP binding without first allocating a label range:

switch(config-mpls-static-lsp)# bind ipv4 input 20 A label range must be allocated before configuring bindings.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1430

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09

Modification Support for the Aruba 6400 Series Switch added. Command introduced

Command Information

Platforms 6400

Command context config-aruba-central

Authority
Administrators or local user group members with execution rights for this command.

clear mpls statistics
clear mpls statistics {ingress | egress} <LABEL> no syntax
Description
Clears MPLS statistics per label for all sessions.

Parameter ingress egress <LABEL>

Description Selects ingress statistics. Selects egress statistics. Specifies the label for which statistics will be cleared.

Examples
Clearing ingress MPLS statistics for a specific label:

switch# clear mpls statistics ingress 20

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09

Modification Support for the Aruba 6400 Series Switch added. Command introduced

MPLS commands | 1431

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

crossconnect input (static lsp binding label swap)
crossconnect input <in-label> output <IFNAME> <ID-ADDR> {<out-label> | explicit-null} no crossconnect input <in-label> output <IFNAME> <ID-ADDR> {<out-label> | explicit-null}
Description
Configures a static LSP binding to swap labels and route to the given next hop. The no form of this command removes the static LSP binding label swap configuration.

Parameter <in-label> <IFNAME> <IP-ADDR> <out-label> explicit-null

Description Specifies the MPLS label to bind. Range: 16-1048575. Specifies the egress interface of the binding. Specifies the next hop IP address of the binding. Specifies the MPLS label to apply. Range: 16-1048575. Specifies an IETF MPLS IPv4 explicit null label (0).

Usage
n A static LSP label range must be allocated before configuring static LSP bindings. n An incoming label must be within the allocated static LSP label range. Outgoing labels are not bound
by the allocated static LSP label range, but must still be within the range of 16-1048575. n The types of valid outgoing interfaces are: System, LAG, VLAN, and Tunnel.
o Routing must be enabled for egress interfaces. o LAG member interfaces cannot be used with this command. n Next hop and outgoing label pairs must be unique for each crossconnect binding.
Examples
Configuring crossconnect with an incoming and outgoing label:

switch(config)# mpls switch(config-mpls)# static-lsp switch(config-mpls-static-lsp)# crossconnect input 20 output 1/1/2 11.0.3.2 21

Configuring explicit-null PHP:

switch(config-mpls-static-lsp)# crossconnect input 20 output 1/1/2 11.0.3.2 explicit-null

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1432

Removing crossconnect binding:
switch(config-mpls-static-lsp)# no crossconnect input 20 output 1/1/2 11.0.3.2 21
Configuring crossconnect with an incoming label outside the allocated range:
switch(config-mpls-static-lsp)# crossconnect input 20 output 11.0.3.2 99 Failed to configure static LSP binding. Incoming label not in range allocated for
static LSP.
Configuring crossconnect with an interface that does not have routing enabled:
switch(config-mpls-static-lsp)# crossconnect input 20 output 1/1/8 11.0.3.2 21 The egress interface must have an IP address assigned.
Configuring crossconnect with a nexthop IP that is not in the same subnet as egress interface:
switch(config-if)# int 1/1/1 switch(config-if)# no shutdown switch(config-if)# ip address 10.0.0.1/24 switch(config-if)# mpls enable switch(config)# mpls switch(config-mpls)# static-lsp switch(config-mpls-static-lsp)# crossconnect input 35 output 1/1/1 60.0.0.20 40 The next hop IP address must be in the same subnet as interface 1/1/1.
Configuring crossconnect with a nexthop IP that is the same as the egress interface IP:
switch(config-if)# int 1/1/1 switch(config-if)# no shutdown switch(config-if)# ip address 10.0.0.1/24 switch(config-if)# mpls enable switch(config)# mpls switch(config-mpls)# static-lsp switch(config-mpls-static-lsp)# crossconnect input 35 output 1/1/1 10.0.0.1 40 The next hop IP address cannot be the same as any interface 1/1/1 primary or secondary addresses.
Configuring crossconect with a nexthop IP and outgoing label of an already existing binding:
switch(config-if)# int 1/1/1 switch(config-if)# no shutdown switch(config-if)# ip address 10.0.0.1/24 switch(config-if)# mpls enable switch(config)# mpls switch(config-mpls)# static-lsp switch(config-mpls-static-lsp)# crossconnect input 35 output 1/1/1 10.0.0.2 40 switch(config-mpls-static-lsp)# crossconnect input 36 output 1/1/1 10.0.0.2 40
A static LSP binding with the same nexthop and outgoing label already exists.
For more information on features that use this command, refer to the MPLS Guide for your switch model.
MPLS commands | 1433

Command History

Release 10.11 10.09

Modification Support for the Aruba 6400 Series Switch added. Command introduced

Command Information

Platforms 6400

Command context config-mpls-static-lsp

Authority
Administrators or local user group members with execution rights for this command.

enable (mpls globally)
enable no enable
Description
Enables MPLS forwarding of IPv4 traffic globally. The no form of this command disables MPLS forwarding of IPv4 traffic globally.
Examples
Enabling MPLS forwarding of IPv4 traffic:
switch(config)# mpls switch(config-mpls)# enable
Disabling MPLS forwarding of IPv4 traffic:
switch(config)# mpls switch(config-mpls)# no enable

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09
Command Information

Modification Support for the Aruba 6400 Series Switch added. Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1434

Platforms 6400

Command context config-mpls

Authority
Administrators or local user group members with execution rights for this command.

enable mpls (interface)
mpls enable no mpls enable
Description
Enables MPLS forwarding of IP traffic for the interface. The no form of this command disables MPLS forwarding of IP traffic for the interface.
Usage
n Routing must be configured before enabling MPLS on an interface.
Examples
Enabling MPLS forwarding:
switch(config)# interface 1/1/1 switch(config-if)# routing switch(config-if)# mpls enable
Enabling MPLS on a layer 2 interface:
switch(config)# interface 1/1/2 switch(config-if)# mpls enable Routing must be enabled on this interface to use MPLS
Disabling MPLS forwarding:
switch(config)# interface 1/1/2 switch(config-if)# no mpls enable

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09
Command Information

Modification Support for the Aruba 6400 Series Switch added. Command introduced

MPLS commands | 1435

Platforms 6400

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

enable (mpls ldp)
enable no enable
Description
Enables MPLS LDP. The no form of this command disable MPLS LDP.
Usage
n The LDP back off timer cannot be configured. It is set to exponentially back off session retry attempts with initial value of 15 seconds and a maximum of 2 minutes.
Examples
Enabling MPLS LDP:
switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# enable
Disabling MPLS LDP:
switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# no enable

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09

Command Information

Platforms 6400

Command context config-mpls-ldp

Modification Support for the Aruba 6400 Series Switch added. Command introduced
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1436

enable (mpls static lsp)
enable no enable
Description
Enables MPLS static LSPs. The no form of this command disables static LSPs.
Usage
A static LSP binding will be processed when MPLS is globally enabled, static LSP is enabled, and the ingress and egress interface has MPLS enabled.
Examples
Enabling MPLS static LSPs:
switch(config)# mpls switch(config-mpls)# enable switch(config-mpls)# static-lsp switch(config-mpls-static-lsp)# enable
Disabling static LSPs:
switch(config)# mpls switch(config-mpls)# static-lsp switch(config-mpls-static-lsp)# no enable

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History

Release 10.11 10.09

Modification Support for the Aruba 6400 Series Switch added. Command introduced.

Command Information

Platforms 6400

Command context
config config-mpls config-mpls-static-lsp

Authority
Administrators or local user group members with execution rights for this command.

graceful-restart (mpls ldp)
graceful-restart
Description

MPLS commands | 1437

Enables LDP graceful restart. Graceful restart is enabled by default. With graceful restart enabled, the MPLS forwarding state will be temporarily retained if the control plane restarts. The switch will wait after losing LDP neighbors before deleting bindings from that neighbor. See graceful-restart-timers (mpls ldp) for details. Graceful restart is enabled for LDP sessions only when the LDP setting and the overall router setting are enabled. If either is disabled, then graceful restart will not occur for LDP sessions. Upon being disabled or enabled, any LDP sessions will be restarted, which may result in temporary traffic loss. The no form of this command disables LDP graceful restart
Examples
Enabling MPLS LDP graceful restart:
switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# graceful-restart Enabling graceful restart will restart any LDP sessions. This may result in traffic loss.
Continue (y/n)? y
Disabling MPLS LDP graceful restart:
switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# no graceful-restart Enabling graceful restart will restart any LDP sessions. This may result in traffic loss.
Continue (y/n)? y

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms 6400

Command context config-mpls-ldp

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

graceful-restart-timers (mpls ldp)
graceful-restart-timers {forwarding-holding <SECONDS> | max-recovery <SECONDS> | neighbor-liveness <SECONDS>} no graceful-restart-timers {forwarding-holding <SECONDS> | max-recovery <SECONDS> | neighbor-liveness <SECONDS>}

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1438

Description
Configures MPLS LDP discovery hold time for peers found via hello packets. The no form of this command resets the discovery hello hold time to its default value of 15 seconds.
The BGP restart timer must be configured as 180 seconds or higher for graceful restart to work with MPLS.

It is recommended to configure the OSPF graceful restart timer as lower than the LDP forward-holding timer, which in turn should be configured as lower than the BGP graceful restart timer.

Parameter forwarding-holding <SECONDS>
max-recovery <SECONDS>
neighbor-liveness <SECONDS>

Description
Specifies the amount of time in seconds that the MPLS forwarding state should be preserved after the control plane restarts. Range: 30-600. Default: 150.
Specifies the amount of time in seconds that the stale label bindings should be kept on the router after the LDP session has been reestablished. Range: 15-600. Default: 120.
Specifies the amount of time in seconds that the router will wait for the LDP session to be reestablished. If the router cannot reestablish the LDP session within that time, the router deletes all the stale LDP bindings received from that LDP neighbor. Range: 5300. Default: 120.

Examples
Configuring the MPLS LDP graceful restart forwarding holding time for 30 seconds:

switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# graceful-restart-timers forwarding-holding 30 Changing the timer value will restart any LDP sessions. This may result in traffic loss. Continue (y/n)? y

Resetting the MPLS LDP graceful restart forwarding holding time to default:

switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# no graceful-restart-timers forwarding-holding switch(config-mpls-ldp)# no graceful-restart-timers forwarding-holding 30 Changing the timer value will restart any LDP sessions. This may result in traffic loss. Continue (y/n)? y

Configuring the MPLS LDP graceful restart max recovery time for 30 seconds:

switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# graceful-restart-timers max-recovery 30 Changing the timer value will restart any LDP sessions.

MPLS commands | 1439

This may result in traffic loss.
Continue (y/n)? y
Resetting the MPLS LDP graceful restart max recovery time to default:
switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# no graceful-restart-timers max-recovery switch(config-mpls-ldp)# no graceful-restart-timers max-recovery 30 Changing the timer value will restart any LDP sessions. This may result in traffic loss.
Continue (y/n)? y
Configuring the MPLS LDP graceful restart neighbor liveness timefor 30 seconds:
switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# graceful-restart-timers neighbor-liveness 30 Changing the timer value will restart any LDP sessions. This may result in traffic loss.
Continue (y/n)? y
Resetting the MPLS LDP graceful restart neighbor liveness to default:
switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# no graceful-restart-timers neighbor-liveness Changing the timer value will restart any LDP sessions. This may result in traffic loss.
Continue (y/n)? y

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.10

Command Information

Platforms 6400

Command context config-mpls-ldp

Modification Support for the Aruba 6400 Series Switch added. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1440

label-protocol ldp
label-protocol ldp no label-protocol ldp
Description
Configures the Label Distribution Protocol (LDP). The no form of this command removes all LDP-related configuration.
Examples
Configuring LDP:
switch(config-mpls)# label-protocol ldp
Removing all LDP-related configuration:
switch(config-mpls)# no label-protocol ldp All MPLS LDP configuration will be deleted. Continue (y/n)? y

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09

Command Information

Platforms 6400

Command context config-mpls

Modification Support for the Aruba 6400 Series Switch added. Command introduced
Authority Administrators or local user group members with execution rights for this command.

label-range (static lsp)
label-range <start-label-range> <end-label-range> no label-range <start-label-range> <end-label-range>
Description
Allocates MPLS labels for use exclusively by static LSP. The no form of this command removes the configured allocation, returning to the default state with no labels allocated for static LSP usage.

MPLS commands | 1441

Parameter <start-label-range> <end-label-range>

Description Selects the start of the static LSP label range. Range: 16-1048575. Selects the end of the static LSP label range. Range: 16-1048575.

Usage
n The range arguments are inclusive. Configuring a range of 20-30 will allocate the labels 20, 21, ..., 29, 30.
n Static LSP labels must not overlap with labels used by any other protocol, i.e. LDP. This label range allocation command will fail if any labels are shared between protocols.
n Any change to the static LSP label allocation will fail if any static LSP bindings are configured. All bindings must be removed before the static LSP label range can be reallocated.
n Allocated label range affects only the ingress packets. Labels for the outgoing packets must be within the allocated label range of the next hop device.
Examples
Allocating a valid static LSP label range:
switch(config-mpls-static-lsp)# label-range 100 2000
Changing the static LSP label range while LSP bindings are configured:
switch(config-mpls-static-lsp)# label-range 100 2000 All static LSP bindings must first be deleted.
Deallocating static LSP label range; use either command:
switch(config-mpls-static-lsp)# no label-range 100 2000 switch(config-mpls-static-lsp)# no label-range
Configuring a static LSP range that intersects with LDP:
switch(config-mpls-static-lsp)# label-range 30 99 The static LSP label range cannot overlap with any other MPLS range.
Deallocating static LSP range when bindings are still configured:
switch(config-mpls-static-lsp)# no label-range All static LSP bindings must be removed before removing the label range. All static LSP bindings must be removed before removing the label range.

For more information on features that use this command, refer to the MPLS Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1442

Release 10.11 10.09

Modification Support for the Aruba 6400 Series Switch added. Command introduced

Command Information

Platforms 6400

Command context config-mpls-static-lsp

Authority
Administrators or local user group members with execution rights for this command.

mpls
mpls no mpls
Description
Configures MPLS forwarding of IPv4 traffic globally. The no form of the command removes all MPLS-related configuration.
Examples
Configuring MPLS forwarding for IPv4 traffic:
switch(config)# mpls
Removing MPLS configuration for IPv4 traffic:
switch(config)# no mpls All MPLS configuration will be deleted. Continue (y/n)? y

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09
Command Information

Modification Support for the Aruba 6400 Series Switch added. Command introduced

MPLS commands | 1443

Platforms 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

mpls ldp discovery hello hold time (global)
discovery hello holdtime <SECONDS> no discovery hello holdtime <SECONDS>
Description
Configures MPLS LDP discovery hold time for peers found via hello packets. The no form of this command resets the discovery hello hold time to its default value of 15 seconds.

Parameter <SECONDS>

Description
Specifies the discovery hold time in seconds. Range: 15-65535. Default: 15.

Usage
n The default value of discovery hello hold time is 15 seconds n The discovery hello hold time configured on an interface supersedes the global configuration. n The discovery hello interval time is auto-computed as one third of the hello hold time.
Examples
Configuring the MPLS LDP discovery hello hold time:

switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# discovery hello holdtime 30

Changing discovery hello hold time:

switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# discovery hello holdtime 50

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09
Command Information

Modification Support for the Aruba 6400 Series Switch added. Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1444

Platforms 6400

Command context config-mpls-ldp

Authority
Administrators or local user group members with execution rights for this command.

mpls ldp discovery hello hold time (interface)
mpls ldp discovery hello holdtime <SECONDS> no mpls ldp discovery hello holdtime <SECONDS>
Description
Overrides the global MPLS LDP discovery hold time for peers found via hello packets from the given interface. The no form of this command resets the discovery hello hold time for the given interface to the global value (if configured) or default value of 15 seconds if global value is not specified.

Parameter <SECONDS>

Description
Specifies the discover hello hold time on an interface. Range: 1565535. Default: 15.

Usage
n The interface LDP discovery hello hold time overrides global hello hold time. n Routing must be configured before changing the LDP discovery hold time on an interface.
Examples
Configuring the interface MPLS LDP discovery hello hold time:

switch(config)# interface 1/1/1 switch(config-if)# routing switch(config-if)# mpls ldp discovery hello holdtime 30

Removing the interface MPLS LDP discovery hello hold time configuration:

switch(config)# interface 1/1/1 switch(config-if)# no mpls ldp discovery hello holdtime

Configuring the interface MPLS LDP discovery hello hold time on a Layer 2 interface:

switch(config)# interface 1/1/2 switch(config-if)# mpls ldp discovery hello holdtime 30 Routing must be enabled on this interface to use MPLS.

For more information on features that use this command, refer to the MPLS Guide for your switch model.
Command History

MPLS commands | 1445

Release 10.11 10.09

Command Information

Platforms 6400

Command context config-if

Modification Support for the Aruba 6400 Series Switch added. Command introduced
Authority Administrators or local user group members with execution rights for this command.

mpls ldp enable
mpls ldp enable no mpls ldp enable
Description
Enables LDP protocol in the interface level. The no form of this command disables LDP. Enabling/disabling interface level LDP will also enable/disable php-mode-explicit-null by default. phpmode-explicit-null is currently the only mode supported and there is no option to disable it when LDP is enabled on an interface.
Usage
n Routing must be configured before enabling LDP on an interface. n MPLS must be enabled on the interface prior to enabling LDP.
Examples
Enabling the LDP protocol:
switch(config)# interface 1/1/1 switch(config-if)# routing switch(config-if)# mpls enable switch(config-if)# mpls ldp enable
Enabling LDP prior to enabling MPLS:
switch(config)# interface 1/1/2 switch(config-if)# routing switch(config-if)# mpls ldp enable MPLS must be enabled on this interface to use LDP.
Enabling MPLS on a layer 2 interface:
switch(config)# interface 1/1/2 switch(config-if)# mpls ldp enable

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1446

Routing must be enabled on this interface to use MPLS.
Disabling MPLS forwarding:
switch(config)# interface 1/1/2 switch(config-if)# no mpls ldp enable

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09

Command Information

Platforms 6400

Command context config-if

Modification Support for the Aruba 6400 Series Switch added. Command introduced
Authority Administrators or local user group members with execution rights for this command.

graceful-restart-timers (mpls ldp)
graceful-restart-timers {forwarding-holding <SECONDS> | max-recovery <SECONDS> | neighbor-liveness <SECONDS>} no graceful-restart-timers {forwarding-holding <SECONDS> | max-recovery <SECONDS> | neighbor-liveness <SECONDS>}
Description
Configures MPLS LDP discovery hold time for peers found via hello packets. The no form of this command resets the discovery hello hold time to its default value of 15 seconds.
The BGP restart timer must be configured as 180 seconds or higher for graceful restart to work with MPLS.

It is recommended to configure the OSPF graceful restart timer as lower than the LDP forward-holding timer, which in turn should be configured as lower than the BGP graceful restart timer.

Parameter forwarding-holding <SECONDS>

Description
Specifies the amount of time in seconds that the MPLS forwarding state should be preserved after the control plane restarts. Range: 30-600. Default: 150.

MPLS commands | 1447

Parameter max-recovery <SECONDS>
neighbor-liveness <SECONDS>

Description
Specifies the amount of time in seconds that the stale label bindings should be kept on the router after the LDP session has been reestablished. Range: 15-600. Default: 120.
Specifies the amount of time in seconds that the router will wait for the LDP session to be reestablished. If the router cannot reestablish the LDP session within that time, the router deletes all the stale LDP bindings received from that LDP neighbor. Range: 5300. Default: 120.

Examples
Configuring the MPLS LDP graceful restart forwarding holding time for 30 seconds:

switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# graceful-restart-timers forwarding-holding 30 Changing the timer value will restart any LDP sessions. This may result in traffic loss. Continue (y/n)? y

Resetting the MPLS LDP graceful restart forwarding holding time to default:

switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# no graceful-restart-timers forwarding-holding switch(config-mpls-ldp)# no graceful-restart-timers forwarding-holding 30 Changing the timer value will restart any LDP sessions. This may result in traffic loss. Continue (y/n)? y

Configuring the MPLS LDP graceful restart max recovery time for 30 seconds:

switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# graceful-restart-timers max-recovery 30 Changing the timer value will restart any LDP sessions. This may result in traffic loss.
Continue (y/n)? y

Resetting the MPLS LDP graceful restart max recovery time to default:

switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# no graceful-restart-timers max-recovery switch(config-mpls-ldp)# no graceful-restart-timers max-recovery 30 Changing the timer value will restart any LDP sessions. This may result in traffic loss.
Continue (y/n)? y

Configuring the MPLS LDP graceful restart neighbor liveness timefor 30 seconds:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1448

switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# graceful-restart-timers neighbor-liveness 30 Changing the timer value will restart any LDP sessions. This may result in traffic loss.
Continue (y/n)? y
Resetting the MPLS LDP graceful restart neighbor liveness to default:
switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# no graceful-restart-timers neighbor-liveness Changing the timer value will restart any LDP sessions. This may result in traffic loss.
Continue (y/n)? y

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History

Release 10.11 10.10

Command Information

Platforms 6400

Command context config-mpls-ldp

Modification Support for the Aruba 6400 Series Switch added. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

mpls ldp session holdtime (interface)
mpls ldp session holdtime <TIME> no mpls ldp session holdtime <TIME>
Description
Configures MPLS LDP session hold time for an interface. The no form of this command resets the session hold time to its default value of 15 seconds.

Parameter <TIME>

Description
Specifies the session hold time for the interface in seconds. Range: 15-65535. Default: 40.

Usage

MPLS commands | 1449

n The interface LDP session hold time overrides global hello hold time. n Routing must be configured before changing LDP session holdtime on an interface.
Examples
Configuring the MPLS LDP session hold time for an interface:
switch(config)# interface 1/1/1 switch(config-if)# routing switch(config-if)# mpls ldp session holdtime 30
Removing the MPLS LDP session hold time for the interface:
switch(config)# interface 1/1/1 switch(config-if)# no mpls ldp session holdtime 30
Configuring the MPLS LDP session hold time on a layer 2 interface:
switch(config)# interface 1/1/2 switch(config-if)# mpls ldp session holdtime 30 Routing must be enabled on this interface to use MPLS.

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History

Release 10.11 10.09

Command Information

Platforms 6400

Command context config-if

Modification Support for the Aruba 6400 Series Switch added. Command introduced
Authority Administrators or local user group members with execution rights for this command.

ping mpls
ping mpls ipv4 <IP-ADDR/MASK> [source <IP-ADDR> | destination <IP-ADDR> | ttl <HOPS> | size <BYTES> | repeat <NUMBER> | timeout <TIME> | interval <TIME>]
Description
Ping MPLS is a command which sends LSP ping packets on the MPLS network and displays the responses from the remote target. It is used as a debugging and analytics tool to verify connectivity within MPLS networks.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1450

Parameter ipv4 <IP-ADDR/MASK> source <IP-ADDR> destination <IP-ADDR> ttl <HOPS> size <BYTES> repeat <NUMBER> timeout <TIME> interval <TIME>

Description
Specifies target IP address and mask of the remote subnet to ping.
Specifies the source IPv4 address for the request packet.
Specifies the destination address for the request packet. Default: 127.0.0.1.
Specifies the max number of hops a packet can take en route to its destination. Range: 1-255. Default: 64.
Specifies the size of the packet to be sent in bytes. Range: 0-9600. Default: 0.
Specifies the number of packets to be sent. Range 110000. Default: 5.
Specifies the amount of time in seconds after which a packet is considered dropped. Range 1-60. Default: 2.
Specifies the interval time between packets in seconds. Range: 160 seconds. Default: 1.

Examples
Sending 5 successful pings to the destination to the 10.10.10.10/32 subnet with a source IP address 20.20.20.1, a destination IP of 127.0.0.1, a zero byte payload, 64 hop time to live, 3 second interval between packets, and a 5 second timeout:

switch# ping mpls ipv4 10.10.10.10/32 source 20.20.20.1 destination 127.0.0.1 repeat 5 size 0 ttl 64 interval 3 timeout 5 Sending 5 MPLS Echo packets of size 0 bytes to 10.10.10.0/32 from source 20.20.20.1, timeout is 5 sec, send interval is 3 sec: Codes: '!' - success, 'Q' - request not sent, '.' - timeout,
'U' - unreachable, 'M' - malformed request, 'T' - unsupported TLV, 'E' - malformed response, 'R' - transit router Type escape sequence (Ctrl + C) to abort. !!!!! 1908 Success rate is 100 percent (5/5), round-trip min/avg/max = 7/10/13 ms

Sending an unsuccessful ping that fails because the network is unreachable:

switch# ping mpls ipv4 10.10.10.10/32 source 20.20.20.1 destination 127.0.0.1 repeat 5 size 0 Sending 5 MPLS Echo packets of size 0 bytes to 10.10.10.0/32 from source 20.20.20.1, timeout is 2 sec, send interval is 1 sec: Codes: '!' - success, 'Q' - request not sent, '.' - timeout,
'U' - unreachable, 'M' - malformed request, 'T' - unsupported TLV, 'E' - malformed response, 'R' - transit router Type escape sequence (Ctrl + C) to abort. Network unreachable

For more information on features that use this command, refer to the MPLS Guide for your switch model.

MPLS commands | 1451

Command History

Release 10.11 10.10

Command Information

Platforms 6400

Command context Manager (#)

Modification Support for the Aruba 6400 Series Switch added. Command introduced
Authority Administrators or local user group members with execution rights for this command.

router-id (mpls ldp)
router-id <IFNAME> [confirm] no router-id <IFNAME> [confirm]
Description
Configures MPLS LDP router ID which is the IP address of a loopback interface. The no form of this command removes the MPLS LDP router ID configuration.

Parameter <IFNAME>

Description Specifies the loopback interface for the MPLS LDP router ID.

Usage
n There is a possibility of MPLS traffic disruption whenever a router ID is deleted or updated to another loopback interface.
n The MPLS router ID interface must be a loopback interface with an IPv4 address configured. n The confirmation prompt is skipped if the router ID is being configured for the first time by the user. n Changing the IP address of the loopback interface may interrupt MPLS traffic.
Examples
Configuring an MPLS LDP router ID:
switch(config)# interface loopback 1 switch(config-loopback-if)# ip address 1.1.1.1/32
switch(config)# mpls switch(config-mpls)# enable switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# enable switch(config-mpls-ldp)# router-id loopback1
Changing the MPLS LDP router ID loopback interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1452

switch(config)# interface loopback 2 switch(config-loopback-if)# ip address 2.2.2.2/32 switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# router-id loopback2 Changing the router ID interface may disrupt MPLS traffic. Continue (y/n)?
Changing the MPLS LDP router ID interface without prompting for confirmation:
switch(config)# interface loopback 2 switch(config-loopback-if)# ip address 2.2.2.2/24 switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# router-id loopback2 confirm
Removing the MPLS LDP router ID configuration:
switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# no router-id loopback2 Removing the router ID interface may disrupt MPLS traffic. Continue (y/n)?
Removing the MPLS LDP router ID without providing loopback interface name:
switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# no router-id Removing the router ID interface may disrupt MPLS traffic. Continue (y/n)?
Removing the configuration of an MPLS LDP router ID with an interface name which is different than the one configured as router ID:
switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# router-id loopback1 confirm switch(config-mpls-ldp)# no router-id loopback2 The value to disable does not match the currently configured value.
Removing the MPLS LDP router ID configuration prompting for confirmation:
switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# no router-id loopback2 confirm
Configuring an MPLS LDP router ID with system interface:
switch(config)# mpls switch(config-mpls)# label-protocol ldp
MPLS commands | 1453

switch(config-mpls-ldp)# enable switch(config-mpls-ldp)# router-id 1/1/1 The router ID must be a loopback interface with an IP address assigned.
Configuring MPLS LDP router ID with a loopback interface without an IPv4 address configured:
switch(config)# interface loopback 1
switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# enable switch(config-mpls-ldp)# router-id loopback1 The router ID interface must have an IP address assigned.

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09

Modification Support for the Aruba 6400 Series Switch added. Command introduced

Command Information

Platforms 6400

Command context
config-loopback-if config-mpls-ldp

Authority
Administrators or local user group members with execution rights for this command.

session hold time (mpls ldp globally)
session holdtime <SECONDS> no session holdtime <SECONDS>
Description
Configures MPLS LDP session hold time. The no form of this command resets the session hold time to its default value of 40 seconds.

Parameter <SECONDS>

Description
Specifies the session hold time in seconds. Range: 15-65535. Default: 40.

Usage

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1454

n The default session hold time is 40 seconds n The session hold time configured on an interface supersedes the global configuration. n The session keepalive interval time is auto computed as one sixth of the hold time.
Examples
Configuring the MPLS LDP session hold time:
switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(config-mpls-ldp)# session holdtime 30
Changing the session hold time:
switch(config)# mpls switch(config-mpls)# label-protocol ldp switch(switch(config-mpls-ldp)# session holdtime 50)# session holdtime 50

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History

Release 10.11 10.09

Command Information

Platforms 6400

Command context config-mpls-ldp

Modification Support for the Aruba 6400 Series Switch added. Command introduced
Authority Administrators or local user group members with execution rights for this command.

show bgp vpnv4 unicast
show bgp VPNv4 unicast [[<IP-ADDR>/<MASK>] | community | extcommunity | neighbors [<IP-ADDR>] | paths | summary | vsx-peer]
Description
Shows all vpnv4 entries in the BGP routing table .

Parameter <IP-ADDR>/<MASK>

Description
Specifies the IP network and mask of a specific BGP route in IPv4 format (x.x.x.x/M), where x is a decimal number from 0 to 255 and M is the number of bits in CIDR format from 0 to 32.

MPLS commands | 1455

Parameter community extcommunity neighbors [<IP-ADDR>]
paths summary vsx-peer

Description Selects routes that belong to specified BGP communities.
Selects unicast routes with extended communities.
Selects BGP neighbor connection parameters for all neighbors or the IP address of a specific neighbor in IPv4 format (x.x.x.x) where x is a decimal number from 0 to 255.
Selects AS Path information of the vpnv4 routes in BGP RIB.
Selects a summary of BGP neighbor status.
Selects VSX peer switch information.

Examples
Showing all VPNv4 entries in the BGP routing table:

switch# show bgp vpnv4 unicast

VRF : default

BGP Summary

-----------

Local AS

: 100

Peers

:0

Cfg. Hold Time

: 180

Confederation Id

:0

BGP Router Identifier : 4.4.4.4

Log Neighbor Changes : No

Cfg. Keep Alive

: 60

PE2# show bgp vpnv4 unicast Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed, a additional-paths Origin codes: i - IGP, e - EGP, ? - incomplete

VRF : default Local Router-ID 4.4.4.4

Network

Nexthop

Metric

LocPrf

Weight Path

Route Distinguisher: 100:100

*>i 11.1.1.0/30

1.1.1.1

(Label 22)

0

100

0

?

Route Distinguisher: 1.1.1.1:200

*>i 11.1.2.0/30

1.1.1.1

(Label 23)

0

100

0

?

Route Distinguisher: 100:300

*>i 11.1.3.0/30

1.1.1.1

(Label 24)

0

100

0

?

Route Distinguisher: 100:400

*>i 11.1.4.0/30

1.1.1.1

Total number of entries 4

(Label 25)

0

100

0

?

Showing entries in the BGP routing table for the 11.1.3.0/30 network:

switch# show bgp vpnv4 unicast 11.1.3.0/30

VRF : default BGP Local AS 100

BGP Router-id 4.4.4.4

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1456

Network Peer Metric Weight Best Type Originator ID Aggregator ID Aggregator AS Atomic Aggregate

: 11.1.3.0/30 : 1.1.1.1 :0 :0 : Yes : internal : 0.0.0.0 : : :

AS-Path

:

Cluster List

:

Communities

:

Ext-Communities :

Nexthop Origin Local Pref Calc. Local Pref Valid Stale Path ID

: 1.1.1.1 : incomplete : 100 : 100 : Yes : No :0

Showing entries in the BGP routing table for routes with extended communities:

switch# show bgp vpnv4 unicast extcommunity Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed, a additional-paths Origin codes: i - IGP, e - EGP, ? - incomplete

VRF : default Local Router-ID 4.4.4.4

Network *>i 11.1.1.0/30

Next Hop 1.1.1.1

Ecommunity 100:100

*>i 11.1.2.0/30

1.1.1.1

4.4.4.4:200

*>i 11.1.3.0/30

1.1.1.1

100:300

*>i 11.1.4.0/30

1.1.1.1

100:400

Total number of entries 4

Showing BGP neighbor connection parameters for all neighbors:

switch# show bgp vpnv4 unicast neighbors Codes: ^ Inherited from peer-group

VRF : default

BGP Neighbor 1.1.1.1 (Internal)

Description

: MPBGP Session to PE2

Peer-group

:

Remote Router Id Remote AS Remote Port State Conn. Established Passive Cfg. Hold Time Neg. Hold Time Up/Down Time Local-AS Prepend BFD

: 1.1.1.1 : 100 : 179 : Established :1 : No : 180 : 180 : 00h:56m:46s : No : Disabled

Local Router Id : 4.4.4.4

Local AS

: 100

Local Port

: 38335

Admin Status

: Up

Conn. Dropped

:0

Update-Source

: loopback0

Cfg. Keep Alive : 60

Neg. Keep Alive : 60

Connect-Retry Time : 120

Alt. Local-AS

:0

MPLS commands | 1457

Password Last Err Sent Last SubErr Sent Last Err Rcvd Last SubErr Rcvd

: : No Error : No Error : No Error : No Error

Graceful-Restart : Enabled

Gr. Stalepath Time : 300

TTL

: 255

Weight

:0

Confederation-Peers : No

Gr. Restart Time Remove Private-AS Local Cluster-ID Fall-over

: 120 : No : : No

Message statistics ------------------Open Notification Updates Keepalives Route Refresh Total

Sent -----
1 0 7 64 0 72

Rcvd -----
1 0 7 65 0 73

Capability ----------Route Refresh Graceful Restart Add-Path Four Octet ASN Address family IPv4 Unicast Address family IPv6 Unicast Address family VPNv4 Unicast Address family L2VPN EVPN

Advertised ----------Yes Yes No Yes No No Yes No

Received ---------Yes Yes No Yes No No Yes No

Address Family : VPNv4 Unicast ------------------------------

Rt. Reflect. Client : No

Allow-AS in

:0

Max. Prefix

: 32500

Nexthop-Self

:

Cfg. Add-Path

:

Neg. Add-Path

:

Send Community : both Advt. Interval : 30 Soft Reconfig In : Default-Originate :

Routemap In Routemap Out ORF type ORF capability

: : : Prefix-list :

Showing BGP neighbor connection parameters for the neighbor with IP address 1.1.1.1:

switch# show bgp vpnv4 unicast neighbors 1.1.1.1 Codes: ^ Inherited from peer-group

VRF : default

BGP Neighbor 1.1.1.1 (Internal)

Description

: MPBGP Session to PE2

Peer-group

:

Remote Router Id Remote AS Remote Port

: 1.1.1.1 : 100 : 179

Local Router Id Local AS Local Port

: 4.4.4.4 : 100 : 38335

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1458

State Conn. Established Passive Cfg. Hold Time Neg. Hold Time Up/Down Time Local-AS Prepend BFD Password Last Err Sent Last SubErr Sent Last Err Rcvd Last SubErr Rcvd

: Established :1 : No : 180 : 180 : 00h:58m:52s : No : Disabled : : No Error : No Error : No Error : No Error

Admin Status

: Up

Conn. Dropped

:0

Update-Source

: loopback0

Cfg. Keep Alive : 60

Neg. Keep Alive : 60

Connect-Retry Time : 120

Alt. Local-AS

:0

Graceful-Restart : Enabled

Gr. Stalepath Time : 300

TTL

: 255

Weight

:0

Confederation-Peers : No

Gr. Restart Time Remove Private-AS Local Cluster-ID Fall-over

: 120 : No : : No

Message statistics ------------------Open Notification Updates Keepalives Route Refresh Total

Sent -----
1 0 7 67 0 75

Rcvd -----
1 0 7 67 0 75

Capability ----------Route Refresh Graceful Restart Add-Path Four Octet ASN Address family IPv4 Unicast Address family IPv6 Unicast Address family VPNv4 Unicast Address family L2VPN EVPN Address Family : VPNv4 Unicast

Advertised ----------Yes Yes No Yes No No Yes No

Received ---------Yes Yes No Yes No No Yes No

------------------------------

Rt. Reflect. Client : No

Allow-AS in

:0

Max. Prefix

: 32500

Nexthop-Self

:

Cfg. Add-Path

:

Neg. Add-Path

:

Send Community : both Advt. Interval : 30 Soft Reconfig In : Default-Originate :

Routemap In Routemap Out ORF type ORF capability

: : : Prefix-list :

Showing AS Path information of the vpnv4 routes in BGP RIB:

switch# show bgp vpnv4 unicast paths Status codes: s suppressed, d damped, h history, * valid, > best, = multipath,
i internal, e external S Stale, R Removed, a additional-paths VRF : default

MPLS commands | 1459

Local Router-ID 4.4.4.4

Network

Next Hop

Route Distinguisher: 100:100

* i 11.1.1.0/30

1.1.1.1

Route Distinguisher: 1.1.1.1:200

* i 11.1.2.0/30

1.1.1.1

Route Distinguisher: 100:300

* i 11.1.3.0/30

1.1.1.1

Route Distinguisher: 100:400

* i 11.1.4.0/30

1.1.1.1

Total number of entries 4

PathID

Path

(Label 22)

0

?

(Label 23)

0

?

(Label 24)

0

?

(Label 25)

0

?

Showing a summary of BGP neighbor status:

switch(config-bgp)# show bgp vpnv4 unicast summary

VRF : default

BGP Summary

Local AS

: 100

BGP Router Identifier

Peers

:0

Log Neighbor Changes

Cfg. Hold Time

: 180

Cfg. Keep Alive

Confederation Id

:0

: 4.4.4.4 : No : 60

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History

Release 10.11 10.09

Modification Support for the Aruba 6400 Series Switch added. Command introduced

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show capacities mpls
show capacities mpls show capacities-status mpls
Description
For capacities command, shows the maximum number of label endpoints, label switch entries, and service label entries that can be configured on the device. For capacities-status command, shows the

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1460

total number of label endpoints, label switch entries, and service label entries that are currently configured on the device.
Examples
Showing capacities of configurable MPLS options:
switch# show capacities mpls System Capacities: Filter MPLS Capacities Name
Value -----------------------------------------------------------------------------------------------------------------Maximum number of MPLS Label Endpoints configurable in a system
8192 Maximum number of MPLS Label Switch entries configurable in a system
8192 Maximum number of MPLS Service Label entries configurable in a system
8192
Showing the configuration of currently configured MPLS options in relation to their capacities:
switch# show capacities-status mpls System Capacities Status: Filter MPLS Capacities Status Name
Value Maximum ---------------------------------------------------------------------------------------Number of MPLS Label Endpoints currently configured
0 8192 Number of MPLS Label Switch entries currently configured
0 8192 Number of MPLS Service Label entries currently configured
0 8192

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09

Command Information

Platforms 6400

Command context Manager (#)

Modification Support for the Aruba 6400 Series Switch added. Command introduced
Authority Administrators or local user group members with execution rights for this command.

show mpls forwarding

MPLS commands | 1461

show mpls forwarding [detail]
Description
Shows the MPLS forwarding table.
Usage
n Forwarding table filters will be implemented at a later date. n When running this command on a huge-scale setup, showing the full tables might take a while.
Examples
Showing the MPLS forwarding table:

switch# show mpls forwarding

MPLS Bindings

Entry Bindings : 2

Exit Bindings : 2

Transit Bindings : 1

PHP Mode

: Explicit-Null

QoS Mode

: Uniform

TTL Propagation : Uniform

Entry Bindings:

Origin Prefix

Ingress

Nexthop

Outgoing

Egress

Egress

Status

VRF

Address

Label

Interface

VRF

----------------------------------------------------------------------------------

---------------------------------------

LDP

4.4.4.4/32

default

192.168.10.2

3002

1/1/6

default

operational

BGP

20.20.20.0/24

vrf-blue

4.4.4.4

5001

1/1/6

default

operational

Exit Bindings:

Origin Prefix

Incoming Service Egress

Status

Label

Label

VRF

-------------------------------------------------------------------------------

static n/a

exp-null -

default

operational

BGP

n/a

imp-null 2001

vrf-blue

operational

Transit Bindings:

Origin Prefix

Incoming Egress

Egress Nexthop

Outgoing Status

Label

Interface VRF

Address

Label

----------------------------------------------------------------------------------

-----

LDP

4.4.4.4/32 2002

1/1/6

default 192.168.10.2 3002

operational

switch# show mpls forwarding detail

MPLS Bindings

Entry Bindings : 2

Exit Bindings : 2

Transit Bindings : 1

PHP Mode

: Explicit-Null

QoS Mode

: Uniform

TTL Propagation : Uniform

Entry Bindings:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1462

Origin Prefix

Ingress

Nexthop

Outgoing

Egress

Egress

Status

Tx Packets

Tx

Bytes

VRF

Address

Label

Interface

VRF

----------------------------------------------------------------------------------

---------------------------------------------------------------------------------

LDP

4.4.4.4/32

default

192.168.10.2

3002

1/1/6

default

operational

99

100

BGP

20.20.20.0/24

vrf-blue

4.4.4.4

5001

1/1/6

default

operational

66

88

Exit Bindings:

Origin Prefix

Incoming Service Egress

Status

Rx Packets

Rx Bytes

Label

Label

VRF

----------------------------------------------------------------------------------

---------------------------------------

static n/a

exp-null -

default

operational

33

44

BGP

n/a

imp-null 2001

vrf-blue

operational

22

33

Transit Bindings:

Origin Prefix

Incoming Egress

Egress

Nexthop

Outgoing Status

Rx Packets

Rx Bytes

Tx Packets

Tx Bytes

Label

Interface

VRF

Address

Label

----------------------------------------------------------------------------------

----------------------------------------------------------------------------------

---------------------------------

LDP

4.4.4.4/32

2002

1/1/6

default

192.168.10.2

3002

operational

11

22

22

33

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09

Modification Support for the Aruba 6400 Series Switch added. Command introduced

Command Information

Platforms 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

show mpls label-range static-lsp
show mpls label-range static-lsp
Description

MPLS commands | 1463

Shows the range of MPLS labels allocated for use in static LSP bindings and the range of labels currently used by static LSP bindings.
Examples
Showing the range and usage of static LSp labels on the switch:
switch# show mpls label-range static-lsp Static LSP Labels Allocated : 16-100 In use : 16-30,35

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History

Release 10.11 10.09

Modification Support for the Aruba 6400 Series Switch added. Command introduced

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mpls ldp bindings
show mpls ldp bindings
Description
Shows information about all MPLS LDP bindings.
Examples
Showing information about MPLS LDP bindings:
switch# show mpls ldp bindings
10.10.2.0/24 local binding: label: imp-null remote binding:lsr:10.255.255.255:0, label:16 remote binding:lsr:10.256.256.256:0, label: exp-null
10.10.3.0/24 local binding: label:20 remote binding:lsr:10.256.256.256:0, label:22

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1464

5.43.9.98/32 local binding: label:21 No remote binding

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History

Release 10.11 10.09

Modification Support for the Aruba 6400 Series Switch added. Command introduced

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show mpls ldp discovery
show mpls ldp discovery [<IP-ADDR>] no syntax
Description
Shows information about discovered LDP peers.

Parameter <IP-ADDR>

Description
Specifies the peer MPLS LDP router ID in x.x.x.x format, where x is a decimal value from 0 to 255.

Examples
Showing information about discovered LDP peers:

switch# show mpls ldp discovery Local LDP Identifier: 10.44.44.44:0 Discovery Sources:
Interfaces: 1/1/1 : recv LDP Id: 10.33.33.33:0, Transport address: 10.33.33.33 Path vector limit: 10 Distribution type: Downstream-on-demand Adjacency type: Link Hold time: 15 sec (local: 15 sec, peer: 15 sec, remaining: 10s) BFD status: Activating 1/1/2 : recv LDP Id: 10.33.33.34:0, Transport address: 10.33.33.33

MPLS commands | 1465

Path vector limit: 10 Distribution type: Downstream-unsolicited Adjacency type: Targeted Hold time: 15 sec (local: 15 sec, peer: 15 sec, remaining: 10s) BFD status: Active
Local LDP Identifier: 10.44.44.44:2 Discovery Sources:
Interfaces: 1/1/3 : recv LDP Id: 10.33.38.33:0, Transport address: 10.43.33.33 Path vector limit: 10 Distribution type: Downstream-unsolicited Adjacency type: Link Hold time: 15 sec (local: 15 sec, peer: 15 sec, remaining: 10s) BFD status: Active
Showingu information about a specific LDP peer:
switch# show mpls ldp discovery 10.33.33.34 Local LDP Identifier: 10.44.44.44:0 Discovery Sources:
Interfaces: 1/1/2 : recv LDP Id: 10.33.33.34:0, Transport address: 10.33.33.33 Path vector limit: 10 Distribution type: Downstream-unsolicited Adjacency type: Targeted Hold time: 15 sec (local: 15 sec, peer: 15 sec, remaining: 10s) BFD status: Active

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09

Modification Support for the Aruba 6400 Series Switch added. Command introduced

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show mpls ldp graceful-restart
show mpls ldp graceful-restart
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1466

Shows graceful restart parameters and status.
Examples
Showing graceful restart parameters and status when graceful restart is not configured:

switch# show mpls ldp graceful-restart

Max recovery time

: 50 sec

Neighbor liveness time

: 50 sec

Forwarding holding time

: 70 sec

Number of graceful restart events

:7

Graceful restart in progress

: true

Forwarding holding time remaining

: 300 sec

Current graceful restart status

: in-progress

Graceful restart exit history (last 5) : complete, complete, complete, cancelled,

cancelled

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.10

Modification Support for the Aruba 6400 Series Switch added. Command introduced.

Command Information

Platforms 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

show mpls ldp neighbor
show mpls ldp neighbor
Description
Shows information about LDP neighbors in the current session(s). The reconnect and recovery time are the times advertised by the peer device.
Examples
Showing LDP neighbors:
switch# show mpls ldp neighbor Local LDP Identifier: 10.44.44.44:0, Peer LDP Identifier: 10.22.22.22:0
TCP connection: 10.22.22.22:646 - 10.33.33.33:65530 Graceful Restart: No Session Holdtime: 180 sec State: Operational; Msgs sent/rcvd: 46/43

MPLS commands | 1467

Up time: 00:31:21 LDP Discovery Sources: 1/1/1 Addresses bound to this peer:
10.22.22.22 10.10.2.1
Showing LDP neighbors when graceful restart has been configured:
switch# show mpls ldp neighbor Local LDP Identifier: 1.1.1.1:0, Peer LDP Identifier: 11.1.1.2:0
Graceful Restart: Yes Peer Reconnect Time: 120 sec Peer Recovery Time: 300 sec Session Holdtime: 40 sec Up time: 00:02:59 State: operational LDP Discovery Sources: 1/1/32 Addresses bound to this peer:
11.1.1.2 12.1.1.1 2.2.2.2

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History
Release 10.11 10.09

Modification Support for the Aruba 6400 Series Switch added. Command introduced

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

static-lsp
static-lsp no static-lsp
Description
Configures MPLS static Label Switched Paths (LSP). The no form of this command removes all static LSP configurations including label range allocation and static LSP binding.
Examples
Configuring MPLS static LSP:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1468

switch(config-mpls)# static-lsp Removing MPLS static LSP configuration:
switch(config-mpls)# no static-lsp

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History

Release 10.11 10.09

Command Information

Platforms 6400

Command context config-mpls

Modification Support for the Aruba 6400 Series Switch added. Command introduced
Authority Administrators or local user group members with execution rights for this command.

traceroute mpls
traceroute mpls ipv4 <IP-ADDR/MASK> [source <IP-ADDR> | destination <IP-ADDR> | ttl <HOPS> | timeout <TIME> | fec-type ldp]
Description
Send LSP ping packets on the MPLS network and display the responses all intermediate routers as well as the destination host. Use this command as a debugging and analytics tool to verify connectivity within the MPLS networks.

Parameter ipv4 <IP-ADDR/MASK>
source <IP-ADDR> destination <IP-ADDR> ttl <HOPS>
timeout <SECONDS>
fec-type ldp

Description
Specifies the IP address and netmask of the remote subnet to traceroute.
Specifies the source IPv4 address for the request packet.
Specifies the destination IPv4 address for the request packet
Specifies the max number of hops a packet can take en route to its destination. Range: 1-255. Default: 255.
Specifies the number of seconds after which a packet is considered dropped. Range: 1-60 seconds. Default: 2.
Selects the target Forward Equivalence Class (FEC) type. The only supported option is the default value of ldp.

MPLS commands | 1469

Example
Successfully tracing the route a target with IP address 1.1.4.1/32 with a maximum TTL of 3 hops and a 3 second timeout:
switch# traceroute mpls ipv4 1.1.4.1/32 ttl 3 timeout 3 Tracing MPLS Label Switched Path to 1.1.4.1/32 from source 10.0.0.2, timeout is 3 seconds and ttl is 3
Codes: '!' - success, 'Q' - request not sent, '.' - timeout, 'N' - no label entry, 'R' - transit router, 'D' - DS Map mismatch, 'F' - no FEC mapping, 'M' - malformed request, `T' - unsupported tlvs, `Z' - return code 0
Type escape sequence to abort. 0 10.0.0.2 MRU 1500 [Labels: 17]
R 1 10.0.0.1 MRU 1500 [Labels: explicit-null] 10 ms ! 2 10.0.1.2 1 ms

For more information on features that use this command, refer to the MPLS Guide for your switch model.

Command History

Release 10.11 10.10

Command Information

Platforms 6400

Command context Manager (#)

Modification Support for the Aruba 6400 Series Switch added. Command introduced
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1470

Chapter 85 MSDP router config commands

MSDP router config commands
disable
disable
Description
Disables MSDP on the VRF.
Example
Disabling MSDP:
switch(config)# router msdp switch(config-msdp)# disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-msdp

Modification --
Authority Administrators or local user group members with execution rights for this command.

enable
enable
Description
Enables MSDP on the VRF.
Example
Enabling MSDP:

AOS-CX 10.14 Command-Line Interface Guide

1471

switch(config)# router msdp switch(config-msdp)# enable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-msdp

Modification --
Authority Administrators or local user group members with execution rights for this command.

router msdp
router msdp [vrf <VRF-NAME>] no router msdp [vrf <VRF-NAME>]
Description
Changes the current context to the MSDP router context. If no VRF is specified, the default VRF MSDP context of the router is assumed. The no form of this command removes the MSDP configuration from the specified context or the default VRF.

Parameter vrf <VRF-NAME>

Description Specifies the context to the specified VRF.

Examples
Configuring default MSDP router context:

switch(config)# router msdp switch(config-msdp)#

Configuring specified router MSDP:

switch(config-msdp)# router msdp vrf red

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

MSDP router config commands | 1472

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

sa-interval
sa-interval <INTERVAL-VALUE> no sa-interval
Description
Configures the sa-interval for the frequency at which MSDP source-active messages are sent. The no form of this command sets the interval to the default value of 60 seconds.

Parameter <INTERVAL-VALUE>

Description
Specifies the sa-interval in seconds. Default: 60 seconds. Range 60-65535.

Examples
Configuring the sa-interval:

switch(config)# router msdp switch(config-msdp)# sa-interval 400 switch(config-msdp)# no sa-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-msdp

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1473

sa-limit
sa-limit <LIMIT-VALUE> no sa-limit <LIMIT-VALUE>
Description
Configures the SA (Source Active) cache limit for the MSDP peer. The no form of this command sets the cache limit to the default value.

Parameter <LIMIT-VALUE>

Description
Specifies the sa cache limit. MSDP peer limit: 64, Cache Limit: 8K

Usage
This command is used to limit the overall number of (S, G) entries that a device can accept from specified MSDP peers and store in a sa-cache. When configured, the device maintains a per-peer count of (S, G) messages stored in the SA cache and ignores new messages from a peer if the configured salimit for that peer has been reached. This command protects MSDP-enabled devices from denial of service (DOS) attacks.
By default, there is no limit configured per peer. All (S, G) entries within the system capacities are allowed. If there is a reboot or HA switchover, the (S, G) cache allocation occurs based on FCFS basis. When configured via CLI or REST, (S, G) entries are allocated until they reach the system capacity or peer limit based on whichever is reached first and new sets of (S, G) requests are discarded.

Examples
Configuring the sa cache limit to 1000:
switch(config)# router msdp switch(config-msdp)# ip msdp peer 10.1.1.1 switch(config-msdp-peer)# switch(config-msdp-peer)# sa-limit 1000
Removing the configured sa cache limit of 1000:
switch(config)# router msdp switch(config-msdp)# ip msdp peer 10.1.1.1 switch(config-msdp-peer)# switch(config-msdp-peer)# no sa-limit 1000
Configuring the sa cache limit outside system capacities:
switch(config)# router msdp switch(config-msdp)# ip msdp peer 10.1.1.1 switch(config-msdp-peer)# switch(config-msdp-peer)# sa-limit 20000 Specified value exceeds the system capacities. Maximum SA Allowed on the system is 16384.

MSDP router config commands | 1474

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms
6300 6400

Command context config-msdp

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1475

Chapter 86 MSDP peer configuration commands

MSDP peer configuration commands

connection-retry-interval
connection-retry-interval <INTERVAL-VALUE> no connection-retry-interval
Description
Configures the connection-retry-interval for which MSDP peers will wait after peering sessions are reset, before attempting to re-establish the peering sessions. The no form of this command removes the currently configured value and sets it to the default value of 30 seconds.

Parameter <INTERVAL-VALUE>

Description Specify connection-retry-interval in seconds. Range: 1-65535.

Example
Configuring the connection-retry-interval:

switch(config-msdp-peer)# connection-retry-interval 120 switch(config-msdp-peer)# no connection-retry-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-msdp-peer

Modification --
Authority Administrators or local user group members with execution rights for this command.

connect-source
connect-source <INTERFACE-NAME>

AOS-CX 10.14 Command-Line Interface Guide

1476

Description
Configures the connection source interface for the MSDP Peer. The no form of this command removes the existing connection source interface and resets the peer connection.

Parameter <INTERFACE-NAME>

Description Specifies the interface to use as a source.

Examples
Configuring the connection source interface:

switch(config-msdp-peer)# connect-source 1/1/1

Configuring the connection source as ROP:

switch(config)# router msdp switch(config-msdp)# ip msdp peer 10.1.1.1 switch(config-msdp-peer)# connect-source 1/1/1

Configuring the connection source as a sub-interface: Supported only on the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# router msdp switch(config-msdp)# ip msdp peer 20.1.1.1 switch(config-msdp-peer)# connect-source 1/1/10.10

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-msdp-peer

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

clear ip msdp peer statistics

MSDP peer configuration commands | 1477

clear ip msdp peer [all-vrfs | vrf <VRF-NAME> | <PEER-IP>]
Description
Clears MSDP SA counters of peer information for the given VRF. If VRF is not specified, it clears SA counters of peers in the default VRF. It also clears MSDP SA counters for a specified peer address.

Parameter all-vrfs vrf <VRF-NAME>
<PEER-IP>

Description
Clears MSDP peer information for all VRFs. Optional.
Clears MSDP peer information for a particular VRF. If the <VRFNAME> is not specified, it clears information for the default VRF. Optional
Clears MSDP peer information for the specified Peer IP. Format: A.B.C.D. Optional.

Examples
Showing MSDP peer information for VRFs:

switch# clear ip msdp peer statistics all-vrfs switch# clear ip msdp peer statistics 2.2.2.2

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

description
description <TEXT> no description
Description
Configures a description for a specified MSDP peer to make it easier to identify in a configuration or show command output. The no form of this command removes the peer description.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1478

Parameter <TEXT>

Description Specifies a description for the MSDP Peer.

Example
Configuring the MSDP peer description:

switch(config-msdp)# ip msdp peer 10.1.1.1 switch(config-msdp-peer)# switch(config-msdp-peer)# description Peer_1 switch(config-msdp-peer)# no description

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-msdp-peer

Modification --
Authority Administrators or local user group members with execution rights for this command.

disable
disable
Description
Disables MSDP peer on the L3 interface.
Example
Disabling MSDP peering:
switch(config)# router msdp switch(config-msdp)# switch(config-msdp)# ip msdp peer 10.1.1.1 switch(config-msdp-peer)# switch(config-msdp-peer)# disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

MSDP peer configuration commands | 1479

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-msdp-peer

Modification --
Authority Administrators or local user group members with execution rights for this command.

enable (ip msdp peer)
enable
Description
Enables MSDP peer on the L3 interface.
Only one MSDP peering session per VRF should be configured between two routers to avoid loops.
Example
Enabling MSDP peering:
switch(config)# router msdp switch(config-msdp)# switch(config-msdp)# ip msdp peer 10.1.1.1 switch(config-msdp-peer)# switch(config-msdp-peer)# enable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-msdp-peer

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip msdp peer
ip msdp peer <IP-ADDR> no ip msdp peer

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1480

Description
Changes the current context to the MSDP peer context. The no form of this command removes the MSDP peer configuration from the specified context.

Parameter <IP-ADDR>

Description Specifies the IPv4 address of the MSDP peer. Format: A.B.C.D

Examples
Enabling the MSDP peer context:

switch(config)# router msdp switch(config-msdp)# switch(config-msdp)# ip msdp peer 10.1.1.1 switch(config-msdp-peer)#

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-msdp

Modification --
Authority Administrators or local user group members with execution rights for this command.

keepalive
keepalive <KEEPALIVE-INTERVAL> <HOLD-TIME> no keepalive
Description
Configures the interval at which a MSDP peer will send keepalive messages, and the interval at which the MSDP peer will wait for keepalive messages from other peers before declaring them down. The no form of this command removes the currently configured value and sets it to the default value.

Parameter <KEEPALIVE-INTERVAL> <HOLD-TIME>

Description Specifies the value for the keepalive interval. Specifies the value for the hold time.

Example

MSDP peer configuration commands | 1481

Configuring the keepalive interval and the hold time for MSDP peer:
switch(config-msdp-peer)# keepalive 30 45 switch(config-msdp-peer)# no keepalive

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-msdp-peer

Modification --
Authority Administrators or local user group members with execution rights for this command.

mesh-group
mesh-group <MESH-NAME> no mesh-group <MESH-NAME>
Description
Associates the given mesh group with the MSDP peer. This feature is used to reduce the amount of SA traffic in an intra-domain setting. The no form of this command removes the peer from the currently configured mesh.

Parameter <MESH-NAME>

Description Specifies the MSDP mesh group name.

Usage
All MSDP peers on the router that participate in the mesh group must be fully meshed with all other peers in the mesh group. When MSDP mesh groups are used, SA messages are not flooded to other mesh group peers. It also eliminates RPF checks on arriving SA messages. With MSDP mesh group configured, SA messages are always accepted from mesh group peers.
Example
Associating a mesh group with an MSDP peer:

switch(config-msdp-peer)# mesh-group test-mesh-group

Removing the MSDP peer from the configured mesh:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1482

switch(config-msdp-peer)# no mesh-group test-mesh-group

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-msdp-peer

Modification --
Authority Administrators or local user group members with execution rights for this command.

password (router msdp)
password {ciphertext | plaintext} <password> no password
Description
Enables MD5 password encryption for a TCP connection between two MSDP peers. The no form of this command removes MD5 password encryption.

Parameter {ciphertext | plaintext} <password>

Description Selects the password type. Specifies the password.

When the password is not provided on the command line, plaintext password prompting occurs upon pressing Enter. The entered password characters are masked with asterisks.
Examples
Configuring MD5 password encryption with a provided plaintext password:
switch(config)# router msdp switch(config-msdp)# switch(config-msdp)# ip msdp peer 10.1.1.1 switch(config-msdp-peer)# switch(config-msdp-peer)# password plaintext F82#4eva
Configuring MD5 password encryption with a prompted plaintext password:

MSDP peer configuration commands | 1483

switch(config)# router msdp switch(config-msdp)# switch(config-msdp)# ip msdp peer 10.1.1.1 switch(config-msdp-peer)# switch(config-msdp-peer)# password Enter the MD5 password: ******** Re-Enter the MD5 password: ********
Removing MD5 password encryption:
switch(config)# router msdp switch(config-msdp)# switch(config-msdp)# ip msdp peer 10.1.1.1 switch(config-msdp-peer)# switch(config-msdp-peer)# no password

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-msdp-peer

Modification --
Authority Administrators or local user group members with execution rights for this command.

sa-filter access-list
sa-filter {in|out} access-list <ACL-RULE> no sa-filter {in|out} access-list <ACL-RULE>
Description
Associates the given ACL to filter MSDP SA messages on the peer. The no form of this command removes the currently configured ACL entry.

Parameter {in|out} <ACL-RULE>

Description Enables the filter for incoming or outgoing SA messages. Specifies the ACL rule name.

Usage
By default, the MSDP enabled router forwards all the SA messages, and the peer router processes all the received messages. This command allows the user to configure an ACL on the MSDP peer to filter SA

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1484

messages. User can prevent the incoming/outgoing SA messages on MSDP router by creating incoming/outgoing filter lists using an ACL.
Example
Filtering incoming SA messages on the MSDP peer for the specified ACL:
switch(config-msdp-peer)# sa-filter in access-list msdp_sa_filter1
Filtering outgoing SA messages on the MSDP peer for the specified ACL:
switch(config-msdp-peer)# sa-filter out access-list msdp_sa_filter2
Removing filter on the MSDP peer for the specified ACL:
switch(config-msdp-peer)# no sa-filter in access-list msdp_sa_filter2

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-msdp-peer

Modification --
Authority Administrators or local user group members with execution rights for this command.

MSDP peer configuration commands | 1485

Chapter 87 MSDP show commands

MSDP show commands

show ip msdp count
show ip msdp count [all-vrfs | vrf <VRF-NAME>]
Description
Shows MSDP Peer (S,G) learnt count for a given VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME>

Description
Shows MSDP (S,G) entries count for all VRFs. Optional.
Shows MSDP (S,G) entries count for a particular VRF. If the <VRFNAME> is not specified, it shows information for the default VRF. Optional.

Examples
Showing the MSDP learnt count:

switch# show ip msdp count
VRF: default SA state per Peer counters <Peer>:<#SA learned> 10.1.1.1: 30 20.1.1.1: 100

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide

1486

show ip msdp peer
show ip msdp peer [all-vrfs | vrf <VRF-NAME> | <PEER-IP>]
Description
Shows MSDP Peer information for the given VRF. Optionally, you can show specific information by VRF.

Parameter all-vrfs vrf <VRF-NAME>
<PEER-IP>

Description
Shows MSDP peer information for all VRFs. Optional.
Shows MSDP peer information for a particular VRF. If the <VRFNAME> is not specified, it shows information for the default VRF. Optional.
Shows MSDP Peer information for specified Peer IP. Format: A.B.C.D. Optional.

Examples
Showing MSDP peer information for VRFs: (Sub-interface is supported only on the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series)

switch# show ip msdp peer
VRF: default
MSDP Peer: 10.1.1.1 Connection status State: up Resets: 0 Connection Source: 1/1/1 Uptime(Downtime): 0m 25s SA Messages sent: 0 SA's learned from this peer: 0 SA Filtering Input (S,G) filter: msdp_sa_filter1 (S,G) entries dropped: 0 Output (S,G) filter: msdp_sa_filter2 (S,G) entries dropped: 30 Mesh group: test-mesh-group

MSDP Peer: 30.1.1.1 Connection status State: up Resets: 0 Connection Source: 1/1/10.10(30.1.1.2) Uptime(Downtime): 0m 25s SA Messages sent: 0 SA's learned from this peer: 0 Peer Keepalive interval: 70 Peer Hold time: 90 Peer Connection Retry interval: 40 SA Filtering Input (S,G) filter: msdp_sa_filter1 (S,G) entries dropped: 0 Output (S,G) filter: msdp_sa_filter2 (S,G) entries dropped: 30 Mesh group: test-mesh-group1
switch# show ip msdp peer 20.1.1.1
VRF: default
MSDP Peer: 20.1.1.1 Connection status State: down Resets: 0 Connection Source: 1/1/2 Uptime(Downtime): 1m 25s SA Messages sent: 0

MSDP show commands | 1487

SA's learned from this peer: 0 SA Filtering Input (S,G) filter: msdp_sa_filter1 (S,G) entries dropped: 0 Output (S,G) filter: msdp_sa_filter2 (S,G) entries dropped: 20 Mesh group: test-mesh-group

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show ip msdp sa-cache
show ip msdp sa-cache [all-vrfs | vrf <VRF-NAME> | <SRC-OR-GRP-IP>]
Description
Shows MSDP Peer SA-Cache information for the given VRF. Optionally, you can show specific information by VRF. The SA-Cache output can be filtered based on the source or group IPv4 address.

Parameter all-vrfs vrf <VRF-NAME>
<SRC-OR-GRP-IP>

Description
Shows MSDP SA-Cache information for all VRFs. Optional.
Shows MSDP SA-Cache information for a particular VRF. If the <VRF-NAME> is not specified, it shows information for the default VRF. Optional.
Shows the filtered SA-cache output for the specified source or group IPv4 address. Format: A.B.C.D. Optional.

Examples
Showing MSDP SA-Cache information for VRFs:

switch# show ip msdp sa-cache
VRF: default (30.0.0.1, 230.1.1.1) RP: 10.1.1.1 Peer: 10.1.1.2

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1488

(20.0.0.1, 229.1.1.1) RP: 10.1.1.1 Peer: 10.1.1.2 (10.0.0.1, 229.1.1.1) RP: 10.1.1.1 Peer: 10.1.1.2
Total entries: 3
switch# show ip msdp sa-cache 229.1.1.1 (20.0.0.1, 229.1.1.1) RP: 10.1.1.1 Peer: 10.1.1.2 (10.0.0.1, 229.1.1.1) RP: 10.1.1.1 Peer: 10.1.1.2
Total entries: 2

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

show ip msdp summary
show ip msdp summary [all-vrfs | vrf <VRF-NAME>]
Description
Shows MSDP peer summary for a given VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME>

Description
Shows the MSDP peer summary for all VRFs. Optional.
Shows the MSDP peer summary for a particular VRF. If the <VRFNAME> is not specified, it shows information for the default VRF. Optional.

Examples
Showing the MSDP peer summary:

switch# show ip msdp summary VRF: default

MSDP show commands | 1489

MSDP Peer Status Summary Peer address State Uptime(Downtime)

10.1.1.1 20.1.1.1

down up

34m 34s 50m 24s

Reset Count
0 0

SA Count
0 50

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1490

Chapter 88 MSTP commands

MSTP commands
clear spanning-tree statistics
clear spanning-tree statistics
Description
Clears the spanning tree BPDU statistics.
Example
Clearing the spanning tree BPDU statistics:
switch(config)# clear spanning-tree statistics

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show spanning-tree
show spanning-tree [vsx-peer]
Description
Shows priority, address, Hello-time, Max-age, and Forward-delay for bridge and root node.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the

AOS-CX 10.14 Command-Line Interface Guide

1491

Parameter

Description
VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
On the 6400 Switch Series, interface identification differs. Showing spanning tree standard information:

switch# show spanning-tree

Spanning tree status

: Enabled Protocol: MSTP

MST0

Root ID

Priority

: 32768, Root

MAC-Address : 48:0F:CF:AF:04:76

Hello time(in seconds):2 Max Age(in seconds):20

Forward Delay(in seconds):15

Bridge ID

Priority

: 32768

MAC-Address : 48:0F:CF:AF:04:76

Hello time(in seconds):2 Max Age(in seconds):20

Forward Delay(in seconds):15

PORT

ROLE

STATE

COST

PRIORITY TYPE

BPDU-Tx BPDU-Rx

TCN-Tx

TCN-Rx

-------- ----------- ---------- ---------- --------- --------- ---------- --------

-- ---------- ----------

1/1/1 Designated Forwarding 20000

128

P2P Edge 100

60

20

10

1/1/2 Designated Forwarding 20000

128

P2P

100

60

20

10

1/1/3 Designated Forwarding 20000

128

Shr

100

60

20

10

1/1/4 Designated Forwarding 20000

128

Shr Edge 100

60

20

10

1/1/5 Alternate Loop-Inc 20000

128

Shr Edge 100

60

20

10

1/1/6 Alternate Root-Inc 20000

128

Shr Edge 100

60

20

10

1/1/7 Root

Forwarding 2000

128

P2P

100

60

20

10

1/1/8 Alternate Blocking 20000

128

P2P

100

60

20

10

1/1/9 Disabled Down

20000

128

P2P

100

60

20

10

Number of topology changes : 4 Last topology change occurred : 516 seconds ago

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

MSTP commands | 1492

Release 10.09 10.07 or earlier

Modification A new state Down is added in the output. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree detail
show spanning-tree detail [vsx-peer]
Description
Shows spanning tree detail including CIST and corresponding port information.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
On the 6400 Switch Series, interface identification differs. Showing spanning tree detailed information:

switch# show spanning-tree detail

Spanning tree status

: Enabled Protocol: MSTP

MST0

Root ID

Priority

: 32768, Root

MAC-Address : 48:0F:CF:AF:04:76

Hello time(in seconds):2 Max Age(in seconds):20

Forward Delay(in seconds):15

Bridge ID

Priority

: 32768

MAC-Address : 48:0F:CF:AF:04:76

Hello time(in seconds):2 Max Age(in seconds):20

Forward Delay(in seconds):15

PORT

ROLE

STATE

COST

PRIORITY TYPE

BPDU-Tx BPDU-Rx

TCN-Tx

TCN-Rx

-------- ----------- ---------- ---------- --------- --------- ---------- --------

-- ---------- ----------

1/1/1 Designated Forwarding 20000

128

P2P Edge 100

60

20

10

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1493

1/1/2 Designated Forwarding 20000

128

P2P

100

60

20

10

1/1/3 Designated Forwarding 20000

128

Shr

100

60

20

10

1/1/4 Designated Forwarding 20000

128

Shr Edge 100

60

20

10

1/1/5 Alternate Loop-Inc 20000

128

Shr Edge 100

60

20

10

1/1/6 Alternate Root-Inc 20000

128

Shr Edge 100

60

20

10

1/1/7 Disabled Down

20000

128

P2P

100

60

20

10

Topology change flag

: True

Number of topology changes : 4

Last topology change occurred : 516 seconds ago

Hello expiry

: 1 second

Forward delay expiry

: 18 seconds

Port 1/1/1

Designated root has priority

: 32768

48:0F:CF:AF:04:76

Designated bridge has priority

: 32768

48:0F:CF:AF:04:76

Designated port

: 1/1/1

Number of transitions to forwarding state : 3

BPDUs sent

: 347

BPDUs received

:9

TCN_Tx: 20, TCN_Rx: 10

Port 1/1/2

Designated root has priority

: 32768

48:0F:CF:AF:04:76

Designated bridge has priority

: 32768

48:0F:CF:AF:04:76

Designated port

: 1/1/2

Number of transitions to forwarding state : 3

BPDUs sent

: 350

BPDUs received

: 11

TCN_Tx: 20, TCN_Rx: 10

Port lag1 ID 321

Designated root has priority

: 32768

48:0F:CF:AF:04:76

Designated bridge has priority

: 32768

48:0F:CF:AF:04:76

Designated port id

: 321

Multi-Chassis role

: active

Number of transitions to forwarding state : 3

BPDUs sent

: 340

BPDUs received

:5

TCN_Tx: 20, TCN_Rx: 10

Address: Address:
Address: Address:
Address: Address:

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

MSTP commands | 1494

Release 10.09 10.07 or earlier

Modification A new state Down is added in the output. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree inconsistent-ports
show spanning-tree inconsistent-ports [instance <INSTANCE-ID>]
Description
Shows ports blocked by STP protection functions such as Root guard, Loop guard, BPDU guard, and RPVST guard in addition to MSTI information.

Parameter <INSTANCE-ID>

Description Specifies the MSTP instance ID. Range: 0 to 64.

Example
On the 6400 Switch Series, interface identification differs. Showing spanning tree inconsistent ports:

switch# show spanning-tree inconsistent-ports

Instance ID Blocked Port Reason

------------ -------------- ------------

0

1/1/13

BPDU Guard

Showing inconsistent port information for instances 1-4:

switch# show spanning-tree inconsistent-ports instance 1-4

Instance ID Blocked Port Reason

------------ -------------- ------------

1

1/1/3

Root Guard

2

1/1/7

BPDU Guard

3

1/1/9

Loop Guard

4

1/1/37

RPVST Guard

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1495

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree mst
show spanning-tree mst [vsx-peer]
Description
Shows MSTP configuration and status information for each instance.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing MSTP configuration and status information:

switch# show spanning-tree mst

#### MST0

Vlans mapped : 2,4-4094

Bridge Address : 48:0F:CF:AF:04:76

Priority

: 32768

Root

Regional Root

Operational Hello time : 2 seconds

Max-age

: 20 seconds

Configured

Hello time : 2 seconds

Max-age

: 20 seconds

Root

Address

: 48:0F:CF:AF:04:76

Port

:0

Regional Root Address

: 48:0F:CF:AF:04:76

Internal cost: 0

Forward delay: 15 seconds

TxHoldCount : 6 pps

Forward delay: 15 seconds

Max-Hops

: 20

Priority

: 32768

Path cost : 0

Priority

: 32768

Rem Hops

: 20

PORT

ROLE

STATE

COST

PRIORITY TYPE

BPDU-Tx BPDU-Rx

TCN-Tx

TCN-Rx

-------- ----------- ---------- ---------- --------- --------- ---------- --------

-- ---------- ----------

1/1/1 Designated Forwarding 20000

128

P2P Edge 100

60

20

10

1/1/2 Designated Forwarding 20000

128

P2P

100

60

20

10

MSTP commands | 1496

1/1/3 Designated Forwarding 20000

128

Shr

100

60

20

10

1/1/4 Designated Forwarding 20000

128

Shr Edge 100

60

20

10

1/1/5 Alternate Loop-Inc 20000

128

Shr Edge 100

60

20

10

1/1/6 Alternate Root-Inc 20000

128

Shr Edge 100

60

20

10

1/1/7 Disabled Down

20000

128

P2P

100

60

20

10

Topology change flag

: True

Number of topology changes : 4

Last topology change occurred : 516 seconds ago

#### MST1 Vlans mapped: Bridge Root

1 Address : 48:0F:CF:AF:04:76 Address : 48:0F:CF:AF:04:76 Port : 0 Rem Hops: 20

Priority: 32768 Priority: 32768 Cost : 0

PORT

ROLE

STATE

COST

PRIORITY TYPE

BPDU-Tx BPDU-Rx

TCN-Tx

TCN-Rx

-------- ----------- ---------- ---------- --------- --------- ---------- --------

-- ---------- ----------

1/1/1 Designated Forwarding 20000

128

P2P Edge 100

60

20

10

1/1/2 Designated Forwarding 20000

128

P2P

100

60

20

10

1/1/3 Designated Forwarding 20000

128

Shr

100

60

20

10

1/1/4 Designated Forwarding 20000

128

Shr Edge 100

60

20

10

1/1/5 Alternate Loop-Inc 20000

128

Shr Edge 100

60

20

10

1/1/6 Alternate Root-Inc 20000

128

Shr Edge 100

60

20

10

1/1/7 Disabled Down

20000

128

P2P

100

60

20

10

Topology change flag

: True

Number of topology changes : 4

Last topology change occurred : 516 seconds ago

#### MST2 Vlans mapped: Bridge Root

3 Address : 48:0F:CF:AF:04:76 Address : 48:0F:CF:AF:04:76 Port : 0 Rem Hops: 20

Priority: 32768 Priority: 32768 Cost : 0

PORT

ROLE

STATE

COST

PRIORITY TYPE

BPDU-Tx BPDU-Rx

TCN-Tx

TCN-Rx

-------- ----------- ---------- ---------- --------- --------- ---------- --------

-- ---------- ----------

1/1/1 Designated Forwarding 20000

128

P2P Edge 100

60

20

10

1/1/2 Designated Forwarding 20000

128

P2P

100

60

20

10

1/1/3 Designated Forwarding 20000

128

Shr

100

60

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1497

20

10

1/1/4 Designated Forwarding 20000

128

Shr Edge 100

60

20

10

1/1/5 Alternate Loop-Inc 20000

128

Shr Edge 100

60

20

10

1/1/6 Alternate Root-Inc 20000

128

Shr Edge 100

60

20

10

Topology change flag

: True

Number of topology changes : 4

Last topology change occurred : 516 seconds ago

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.09 10.07 or earlier

Modification A new state Down is added in the output. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree mst-config
show spanning-tree mst-config [vsx-peer]
Description
Shows MSTP instance and corresponding VLAN information.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing configuration information for MST instances and corresponding VLANs:

switch# show spanning-tree mst-config MST configuration information

MSTP commands | 1498

MST config ID MST config revision MST config digest Number of instances

: reg :1 : 2D2BC9A32097B463C48EE1817673FA2D :2

Instance ID

Member VLANs

--------------- ----------------------------------

0

2,4-4094

1

1

2

3

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree mst detail
show spanning-tree mst detail [vsx-peer]
Description
Shows detailed information for all MST instances.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
On the 6400 Switch Series, interface identification differs. Showing detailed information for all MST instances:

switch# show spanning-tree mst detail #### MST0 Vlans mapped: 2,4-4094

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1499

Bridge Root Regional Root Operational
Configured
Root
Regional Root

Address: 48:0F:CF:AF:04:76

Hello time : 2 seconds

Max-age

: 20 seconds

Hello time : 2 seconds

Max-age

: 20 seconds

Address

: 48:0F:CF:AF:04:76

Port

:0

Address

: 48:0F:CF:AF:04:76

Internal cost: 0

Priority: 32768

Forward delay: 15 seconds

TxHoldCount : 6 pps

Forward delay: 15 seconds

Max-Hops

: 20

Priority

: 32768

Path cost : 0

Priority

: 32768

Rem Hops

: 20

PORT

ROLE

STATE

COST

PRIORITY TYPE

BPDU-Tx BPDU-Rx

TCN-Tx

TCN-Rx

-------- ----------- ---------- ---------- --------- --------- ---------- --------

-- ---------- ----------

1/1/1 Designated Forwarding 20000

128

P2P Edge 100

60

20

10

1/1/2 Designated Forwarding 20000

128

P2P

100

60

20

10

1/1/3 Designated Forwarding 20000

128

Shr

100

60

20

10

1/1/4 Designated Forwarding 20000

128

Shr Edge 100

60

20

10

1/1/5 Alternate Loop-Inc 20000

128

Shr Edge 100

60

20

10

1/1/6 Alternate Root-Inc 20000

128

Shr Edge 100

60

20

10

1/1/7 Disabled Down

20000

128

P2P

100

60

20

10

Topology change flag

: True

Number of topology changes : 4

Last topology change occurred : 516 seconds ago

Port 1/1/1 Designated root address Designated regional root address Designated bridge address Priority BPDUs sent BPDUs received Message expiry Forward delay expiry Forward transitions TCN_Tx: 10, TCN_Rx: 10

: 48:0F:CF:AF:04:76 : 48:0F:CF:AF:04:76 : 48:0F:CF:AF:04:76 : 32768 : 638 :9 : 1 second : 18 seconds :3

Port 1/1/2 Designated root address Designated regional root address Designated bridge address Priority BPDUs sent BPDUs received Message expiry Forward delay expiry Forward transitions TCN_Tx: 10, TCN_Rx: 10

: 48:0F:CF:AF:04:76 : 48:0F:CF:AF:04:76 : 48:0F:CF:AF:04:76 : 32768 : 641 : 11 : 1 second : 18 seconds :3

#### MST1

Vlans mapped: 1

Bridge

Address : 48:0F:CF:AF:04:76

Priority: 32768

MSTP commands | 1500

Root

Address : 48:0F:CF:AF:04:76 Port : 0 Rem Hops: 20

Priority: 32768 Cost : 0

PORT

ROLE

STATE

COST

PRIORITY TYPE

BPDU-Tx BPDU-Rx

TCN-Tx

TCN-Rx

-------- ----------- ---------- ---------- --------- --------- ---------- --------

-- ---------- ----------

1/1/1 Designated Forwarding 20000

128

P2P Edge 100

60

20

10

1/1/2 Designated Forwarding 20000

128

P2P

100

60

20

10

1/1/3 Designated Forwarding 20000

128

Shr

100

60

20

10

1/1/4 Designated Forwarding 20000

128

Shr Edge 100

60

20

10

1/1/5 Alternate Loop-Inc 20000

128

Shr Edge 100

60

20

10

1/1/6 Alternate Root-Inc 20000

128

Shr Edge 100

60

20

10

1/1/7 Disabled Down

20000

128

P2P

100

60

20

10

Topology change flag

: True

Number of topology changes : 4

Last topology change occurred : 516 seconds ago

Port 1/1/1 Designated root address Designated bridge address Priority BPDUs sent BPDUs received Message expiry Forward delay expiry Forward transitions TCN_Tx: 10, TCN_Rx: 10

: 48:0F:CF:AF:04:76 : 48:0F:CF:AF:04:76 : 32768 : 638 :9 : 1 second : 18 seconds :4

Port 1/1/2 Designated root address Designated bridge address Priority BPDUs sent BPDUs received Message expiry Forward delay expiry Forward transitions TCN_Tx: 10, TCN_Rx: 10

: 48:0F:CF:AF:04:76 : 48:0F:CF:AF:04:76 : 32768 : 641 : 11 : 1 second : 18 seconds :4

#### MST2 Vlans mapped: Bridge Root

3 Address : 48:0F:CF:AF:04:76 Address : 48:0F:CF:AF:04:76 Port : 0 Rem Hops: 20

Priority: 32768 Priority: 32768 Cost : 0

PORT

ROLE

STATE

COST

PRIORITY TYPE

BPDU-Tx BPDU-Rx

TCN-Tx

TCN-Rx

-------- ----------- ---------- ---------- --------- --------- ---------- --------

-- ---------- ----------

1/1/1 Designated Forwarding 20000

128

P2P Edge 100

60

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1501

20

10

1/1/2 Designated Forwarding 20000

128

P2P

100

60

20

10

1/1/3 Designated Forwarding 20000

128

Shr

100

60

20

10

1/1/4 Designated Forwarding 20000

128

Shr Edge 100

60

20

10

1/1/5 Alternate Loop-Inc 20000

128

Shr Edge 100

60

20

10

1/1/6 Alternate Root-Inc 20000

128

Shr Edge 100

60

20

10

1/1/7 Disabled Down

20000

128

P2P

100

60

20

10

Topology change flag

: True

Number of topology changes : 4

Last topology change occurred : 516 seconds ago

Port 1/1/1 Designated root address Designated bridge address Priority BPDUs sent BPDUs received Message expiry Forward delay expiry Forward transitions TCN_Tx: 10, TCN_Rx: 10

: 48:0F:CF:AF:04:76 : 48:0F:CF:AF:04:76 : 32768 : 638 :9 : 1 second : 18 seconds :3

Port 1/1/2 Designated root address Designated bridge address Priority BPDUs sent BPDUs received Message expiry Forward delay expiry Forward transitions TCN_Tx: 10, TCN_Rx: 10

: 48:0F:CF:AF:04:76 : 48:0F:CF:AF:04:76 : 32768 : 641 : 11 : 1 second : 18 seconds :3

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.09 10.07 or earlier

Modification A new state Down is added in the output. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

MSTP commands | 1502

show spanning-tree mst <INSTANCE-ID>
show spanning-tree mst <INSTANCE-ID> [vsx-peer]
Description
Displays MSTP configurations for the given instance ID.

Parameter <INSTANCE-ID> vsx-peer

Description
Specifies the MSTP instance number. Range: 0 to 64.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

switch# show spanning-tree mst 1

#### MST1 Vlans mapped: Bridge Root

1 Address : 48:0F:CF:AF:04:76 Address : 48:0F:CF:AF:04:76 Port : 0 Rem Hops: 20

Priority: 32768 Priority: 32768 Cost : 0

PORT

ROLE

STATE

COST

PRIORITY TYPE

BPDU-Tx BPDU-Rx

TCN-Tx

TCN-Rx

-------- ----------- ---------- ---------- --------- --------- ---------- --------

-- ---------- ----------

1/1/1 Designated Forwarding 20000

128

P2P Edge 100

60

20

10

1/1/2 Designated Forwarding 20000

128

P2P

100

60

20

10

1/1/3 Designated Forwarding 20000

128

Shr

100

60

20

10

1/1/4 Designated Forwarding 20000

128

Shr Edge 100

60

20

10

1/1/5 Alternate Loop-Inc 20000

128

Shr Edge 100

60

20

10

1/1/6 Alternate Root-Inc 20000

128

Shr Edge 100

60

20

10

1/1/7 Disabled Down

20000

128

P2P Bound 100

60

20

10

Topology change flag

: True

Number of topology changes : 4

Last topology change occurred : 516 seconds ago

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1503

Release 10.09 10.07 or earlier

Modification A new state Down is added in the output. --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree mst <INSTANCE-ID> detail
show spanning-tree mst <INSTANCE-ID> detail [vsx-peer]
Description
Displays MSTP configurations for the given instance ID with corresponding port details.

Parameter <INSTANCE-ID> vsx-peer

Description
Specifies the MSTP instance number. Range: 0 to 64.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

switch# show spanning-tree mst 1 detail

#### MST1 Vlans mapped: Bridge Root

1 Address : 48:0F:CF:AF:04:76 Address : 48:0F:CF:AF:04:76 Port : 0 Rem Hops: 20

Priority: 32768 Priority: 32768 Cost : 0

PORT

ROLE

STATE

COST

PRIORITY TYPE

BPDU-Tx BPDU-Rx

TCN-Tx

TCN-Rx

-------- ----------- ---------- ---------- --------- --------- ---------- --------

-- ---------- ----------

1/1/1 Designated Forwarding 20000

128

P2P Edge 100

60

20

10

1/1/2 Designated Forwarding 20000

128

P2P

100

60

20

10

1/1/3 Designated Forwarding 20000

128

Shr

100

60

20

10

1/1/4 Designated Forwarding 20000

128

Shr Edge 100

60

20

10

1/1/5 Alternate Loop-Inc 20000

128

Shr Edge 100

60

MSTP commands | 1504

20

10

1/1/6 Alternate Root-Inc 20000

128

Shr Edge 100

60

20

10

1/1/7 Disabled Down

20000

128

P2P Bound 100

60

20

10

Topology change flag

: True

Number of topology changes : 4

Last topology change occurred : 516 seconds ago

Port 1/1/1 Designated root address Designated bridge address Priority BPDUs sent BPDUs received Message expiry Forward delay expiry Forward transitions TCN_Tx: 10, TCN_Rx: 10

: 48:0F:CF:AF:04:76 : 48:0F:CF:AF:04:76 : 32768 : 667 :9 : 0 second : 18 seconds :4

Port 1/1/2 Designated root address Designated bridge address Priority BPDUs sent BPDUs received Message expiry Forward delay expiry Forward transitions TCN_Tx: 10, TCN_Rx: 10

: 48:0F:CF:AF:04:76 : 48:0F:CF:AF:04:76 : 32768 : 670 : 11 : 0 second : 18 seconds :4

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.09 10.07 or earlier

Modification A new state Down is added in the output. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree mst interface
show spanning-tree mst <INSTANCE-ID> interface <IFNAME> [vsx-peer]
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1505

Shows MSTP configurations for the given instance ID with corresponding port details.

Parameter <INSTANCE-ID> <IFNAME> vsx-peer

Description
Specifies the MSTP instance number. Range: 0 to 64.
Specifies an interface.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing MST configuration and port details:

switch# show spanning-tree mst 1 interface 1/1/1 Port 1/1/1

Instance

Role

State

Cost

Priority Vlans mapped

-------------- -------------- ------------ ---------- ---------- ----------

1

Designated

Forwarding 20000

128

1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree summary port
show spanning-tree summary port
Description
Shows spanning tree port summary information.
Example
On the 6400 Switch Series, interface identification differs.

MSTP commands | 1506

Showing summary of spanning tree ports:

switch# show spanning-tree summary port

STP status

: Enabled

Protocol

: MSTP

BPDU guard timeout value

: None

BPDU guard enabled interfaces : 1/1/1-1/1/9,1/1/11,1/1/13,1/1/15,1/1/17,1/1/19,

1/1/21,lag1,lag2

BPDU filter enabled interfaces : None

Root guard enabled interfaces : 1/1/3

Loop guard enabled interfaces : 1/1/2

TCN guard enabled interfaces : 1/1/1-1/1/3

RPVST filter enabled interfaces : 1/1/37

RPVST guard enabled interfaces : None

Interface count by state

Instance ID Blocking Listening Learning Forwarding Down

------------- -------- --------- -------- ---------- ----

0

2

0

0

15 0

1

2

0

0

15 0

2

2

0

0

15 0

------------- -------- --------- -------- ---------- ----

Total = 3

6

0

0

45 0

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.09 10.07 or earlier

Modification A new state Down is added in the output. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree summary root
show spanning-tree summary root
Description
Shows spanning tree root summary information.
Example
On the 6400 Switch Series, interface identification differs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1507

Showing spanning tree root summary:

switch# show spanning-tree summary root

STP status Protocol System ID

: Enabled : MSTP : 70:72:cf:32:50:f5

Root bridge for STP Instance : 0,1,2

Root Hello Max Fwd

Instance ID

Priority Root ID

cost Time Age Dly Root Port

--------------- -------- ----------------- --------- ----- --- --- ------------

0

32768 70:72:cf:32:50:f5

0

2 20 15

n/a

1

32768 70:72:cf:32:50:f5

0

2 20 15

n/a

2

32768 70:72:cf:32:50:f5

200

2 20 15

1/1/1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

spanning-tree
spanning-tree no spanning-tree
Description
Enables the spanning tree protocol on the switch. The no form of this command disables the spanning tree protocol on the switch.
Examples
Enabling spanning tree:
switch(config)# spanning-tree
Disabling spanning tree:

MSTP commands | 1508

switch(config)# no spanning-tree

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree bpdu-filter
spanning-tree bpdu-filter no spanning-tree bpdu-filter
Description
Enables the bpdu filter for the interface. The BPDU filter feature allows control of spanning tree participation on a per-port basis. It can be used to exclude specific ports from becoming part of spanning tree operations. A port with the BPDU filter enabled will ignore incoming BPDU packets, does not transmit BPDU, and stays locked in the spanning tree forwarding state. All other ports maintain their role. Typical uses for this parameter include:
n To have MSTP operations running on selected ports of the switch rather than every port of the switch at a time.
n To prevent the spread of errant BPDU frames. n To eliminate the need for a topology change when a port's link status changes. For example, ports
that connect to servers and workstations can be configured to remain outside of spanning tree operations. n To protect the network from denial of service attacks that use spoofing BPDUs by dropping incoming BPDU frames. For this scenario, BPDU protection offers a more secure alternative, implementing port shut down and a detection alert when errant BPDU frames are received.
Ports configured with the BPDU filter mode remain active (learning and forward frames). However, spanning tree cannot receive or transmit BPDUs on the port. The port remains in a forwarding state, permitting all broadcast traffic. This can create a network storm if there are any loops (that is, redundant links) using these ports. If you suddenly have a high load, disconnect the link and disable the BPDU filter (using the no command.)
The no form of the command sets the bpdu filter status to the default of disabled on the interface.
Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1509

On the 6400 Switch Series, interface identification differs. Enabling the bpdu filter on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# spanning-tree bpdu-filter
Disabling bpdu filter on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree bpdu-filter

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree bpdu-guard
spanning-tree bpdu-guard no spanning-tree bpdu-guard
Description
Enables the BPDU guard on the selected switch interface. When BPDU guard is enabled, interfaces receiving MSTP BPDUs become disabled. BPDU protection is a security feature designed to protect the active MSTP topology by preventing spoofed BPDU packets from entering the MSTP domain. In a typical implementation, BPDU protection would be applied to edge ports connected to end user devices that do not run MSTP. If MSTP BPDU packets are received on a protected port, this feature disables that port and alerts the network manager using an SNMP trap. Occasionally a hardware or software failure can cause MSTP to fail, creating forwarding loops that can cause network failures where unidirectional links are used. The non-designated port transitions in a faulty manner because the port is no longer receiving MSTP BPDUs. The no form of the command disables BPDU guard on the selected interface.
Examples
On the 6400 Switch Series, interface identification differs.

MSTP commands | 1510

Enabling the BPDU guard on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# spanning-tree bpdu-guard
Disabling BPDU guard on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree bpdu-guard

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree bpdu-guard timeout
spanning-tree bpdu-guard timeout <INTERVAL> no spanning-tree bpdu-guard timeout [<INTERVAL>]
Description
Enables and configures the auto re-enable timeout in seconds for all interfaces with BPDU guard enabled. When an interface is disabled after receiving an unauthorized BPDU it will automatically be reenabled after the timeout expires. The default is for the interface to stay disabled until manually reenabled. The no form of the command disables BPDU guard timeout on the interface. This is the default.

Parameter <INTERVAL>

Description Specifies the re-enable timeout in seconds. Range: 1 to 65535.

Example
On the 6400 Switch Series, interface identification differs. Enabling the BPDU guard timeout on interface 1/1/1:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1511

switch(config)# interface 1/1/1 switch(config-if)# spanning-tree bpdu-guard timeout 10
Disabling BPDU guard timeout on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree bpdu-guard

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree config-name
spanning-tree config-name <CONFIG-NAME> no spanning-tree config-name [<CONFIG-NAME>]
Description
Sets the configuration name for the MST region in which the switch resides. All switches within an MST region must have identical configuration names. For more than one MSTP switch in the same MST region, the identical region name must be configured on all such switches. If the default configuration name is retained on a switch, it cannot exist in the same MST region with another switch. The no form of this command overwrites the currently configured name with the default name. The default name is a text string using the hexadecimal representation of the system MAC address.

Parameter <CONFIG-NAME>

Description
Specifies the configuration name for the MST region in which the switch resides. Default: text string using the hexadecimal representation of the MAC address of the switch. Range: 1 - 32 nonblank characters (case-sensitive).

Examples
Setting the configuration name to MST0:

MSTP commands | 1512

switch(config)# spanning-tree config-name MST0 Setting the configuration name to the default value:
switch(config)# no spanning-tree config-name

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree config-revision
spanning-tree config-revision <REVISION-NUMBER> no spanning-tree config-revision [<REVISION-NUMBER>]
Description
Configures the revision number for the MST region in which the switch resides. All switches within an MST region must have identical revision numbers. Use this setting to differentiate between region configurations. For example, when changing configuration settings within a region where you want to track the configuration versions you use, or when creating a new region from a subset of switches in a current region and you want to maintain the same region name. The no form of this command overwrites the currently configured revision number of the MST region and sets it to the default value of 0.

Parameter <REVISION-NUMBER>

Description
Specifies the revision number for the MST region in which the switch resides.Range: 0 - 65535. Default: 0.

Examples
Setting the revision to 40:

switch(config)# spanning-tree config-revision 40

Setting the revision to the default value:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1513

switch(config)# no spanning-tree config-revision

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree cost
spanning-tree cost <PORT-COST> no spanning-tree cost [<PORT-COST>]
Description
Sets individual port cost for MSTI 0. For a given port, the path cost setting can be different for different MSTIs to which the port may belong. The switch uses the path cost to determine which ports are the forwarding ports in the MSTI; that is, which links to use for the active topology of the MSTI and which ports to block. Cost gets calculated based on physical interface link speed. It is not based on cumulative speed of all physical links under a lag. Therefore, the cost will be same for a 1G interface and 2x1G lag interfaces. The no form of the command sets the port cost for MSTI 0 instance to the default value.

Parameter <PORT-COST>

Description
Specifies the cost of the port for MSTI 0. Range: 1-200,000,000. Default is calculated from the port link speed: n 10 Mbps link speed equals a path cost of 2,000,000. n 100 Mbps link speed equals a path cost of 200,000. n 1 Gbps link speed equals a path cost of 20,000. n 10 Gbps link speed equals a path cost of 2,000. n 100 Gbps link speed equals a path cost of 200. n 1 Tbps link speed equals a path cost of 20.

Examples
On the 6400 Switch Series, interface identification differs. Setting the cost to 2000 on interface 1/1/1:

MSTP commands | 1514

switch(config)# interface 1/1/1 switch(config-if)# spanning-tree cost 2000
Setting the cost to the default on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree cost

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree forward-delay
spanning-tree forward-delay <DELAY-IN-SECS> no spanning-tree forward-delay [<DELAY-IN-SECS>]
Description
Configures the time the switch waits between transitions from listening to learning and from learning to forwarding states. The no form of this command sets forward delay time for the bridge to the default of 15 seconds.

Parameter <DELAY-IN-SECS>

Description
Specifies the forward delay time in seconds. Default: 15 seconds. Range: 4-30.

Examples
Setting forward delay to 6 seconds:

switch(config)# spanning-tree forward-delay 6

Setting forward delay to the default of 15 seconds:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1515

switch(config)# no spanning-tree forward-delay

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree hello-time
spanning-tree hello-time <HELLO-IN-SECS> no spanning-tree hello-time [<HELLO-IN-SECS>]
Description
Configures the transmission interval between consecutive Bridge Protocol Data Units (BPDU) that the switch sends as a root bridge. The hello time interval is inserted in outbound BPDUs. The no form of this command sets hello time to the default of 2 seconds.

Parameter <HELLO-IN-SECS>

Description
Specifies the hello time interval in seconds. Default: 2 seconds. Range: 2-10.

Examples
Setting the hello time interval to 6 seconds:

switch(config)# spanning-tree hello-time 6

Setting the hello time interval to the default of 2 seconds:

switch(config)# no spanning-tree hello-time

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

MSTP commands | 1516

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree instance cost
spanning-tree instance <INSTANCE-ID> cost <PORT-COST> no spanning-tree instance <INSTANCE-ID> cost [<PORT-COST>]
Description
Sets the individual port cost for an MSTI. The switch uses the path cost to determine which links to use for the active topology of the MSTI (forwarding ports) and which ports to block. The path cost setting for a port can be different on each MSTI to which the port belongs. The no form of this command sets the port cost for an MSTI to the default value.

Parameter <INSTANCE-ID> <PORT-COST>

Description
Specifies the MSTI number. Range: 1-64.
Specifies the cost of the port for the MSTI. Range: 1-200000000. Default value is calculated from the port link speed: n 10 Mbps link speed equals a path cost of 2000000. n 100 Mbps link speed equals a path cost of 200000. n 1 Gbps link speed equals a path cost of 20000.

Examples
On the 6400 Switch Series, interface identification differs. Setting the port 1/1/1 cost for MSTI 1 to 2000:

switch(config)# interface 1/1/1 switch(config-if)# spanning-tree instance 1 cost 2000

Setting the port 1/1/1 cost for MSTI 1 to the default:

switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree instance 1 cost

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1517

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree instance port-priority
spanning-tree instance <INSTANCE-ID> port-priority <PRIORITY-MULTIPLIER> no spanning-tree instance <INSTANCE-ID> port-priority [<PRIORITY-MULTIPLIER>]
Description
Configures the priority as a priority multiplier for the specified ports in the specified MST instance. For a given port, the priority setting can be different for different MST instances to which the port may belong. The no form of this command sets the port priority to the default value of 8 for the MST instance. The default priority value is derived by multiplying 8 by 16.

Parameter <INSTANCE-ID> <PRIORITY-MULTIPLIER>

Description
Specifies the MSTP instance number. Range: 1-64.
Specifies the priority as a multiplier. Default: 8. Range: 0 to 15. The priority range for a port in a given MST instance is 0 to 255. However, this command specifies the priority as a multiplier (0 to 15) of 16. When you specify a priority multiplier of 0 to 15, the actual priority assigned to the switch is: (priority-multiplier) x 16.

Examples
On the 6400 Switch Series, interface identification differs. Setting the port 1/1/1 priority for instance 1 to 8:

switch(config)# interface 1/1/1 switch(config-if)# spanning-tree instance 1 port-priority 8

Setting the port 1/1/1 priority for instance 1 to the default:

switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree instance 1 port-priority

MSTP commands | 1518

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree instance priority
spanning-tree instance <INSTANCE-ID> priority <PRIORITY-MULTIPLIER> no spanning-tree instance <INSTANCE-ID> priority [<PRIORITY-MULTIPLIER>]
Description
Sets the switch priority for the specified MST instance. The no form of this command sets the priority for the specified instance to the default of 8.

Parameter <INSTANCE-ID> <PRIORITY-MULTIPLIER>

Description
Specifies the MSTP instance number. Range: 1 to 64.
Specifies the priority as a multiplier. Default: 8. Range: 0 to 15. The priority range for an MSTP switch is 0-61440. However, this command specifies the priority as a multiplier (0 - 15) of 4096. That is, when you specify a priority multiplier value of 0 - 15, the actual priority assigned to the switch is: (priority-multiplier) x 4096. For example, with 2 as the priority-multiplier on a given MSTP switch, the switch priority setting is 8,192.

Examples
Setting the priority multiplier for instance 1 to 5:

switch(config)# spanning-tree instance 1 priority 5

Setting the priority multiplier for instance 1 to the default of 8:

switch(config)# no spanning-tree instance 1 priority

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1519

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree instance vlan
spanning-tree instance <INSTANCE-ID> vlan <VLAN-ID> no spanning-tree instance <INSTANCE-ID> vlan <VLAN-ID>
Description
Creates a new instance with VLANs mapped or maps VLANs to an existing instance. Each instance must have at least one VLAN mapped to it. When VLANs are mapped to an instance, they are automatically unmapped from the instance they were mapped to before. Any MSTP instance can have all the VLANs configured on the switch. The no form of this command removes the specified VLAN from the MSTP instance.

Parameter <INSTANCE-ID> <VLAN-ID>

Description Specifies the MSTP instance number. Range: 1 to 64. Specifies a VLAN ID number.

Examples
Mapping VLAN 1 to instance 1:

switch(config)# spanning-tree instance 1 vlan 1

Removing VLAN 1 from instance 1:

switch(config)# no spanning-tree instance 1 vlan 1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

MSTP commands | 1520

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree link-type
spanning-tree link-type {point-to-point|shared}
Description
Specifies the link type of the interface, which is normally derived from the duplex setting of the port. The default setting depends on the duplex mode of the port: full-duplex ports are point-to-point, half-duplex ports are shared.

Parameter point-to-point shared

Description Specifies the link type as point-to-point. Specifies the link type as shared.

Examples
On the 6400 Switch Series, interface identification differs. Setting the link type to point-to-point on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# spanning-tree link-type point-to-point

Setting the link type to shared on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# spanning-tree link-type shared

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1521

Command Information

Platforms All platforms

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

spanning-tree loop-guard
spanning-tree loop-guard no spanning-tree loop-guard
Description
Enables the loop guard on the interface. STP loop guard is best applied on blocking or forwarding ports. The no form of the command sets the loop guard status to the default of disabled on the interface.
Usage
Occasionally a hardware or software failure can cause MSTP to fail, creating forwarding loops that can cause network failures where unidirectional links are used. The non-designated port transitions in a faulty manner because the port is no longer receiving MSTP BPDUs. Loop guard causes the non-designated port to go into the MSTP loop inconsistent state instead of the forwarding state. In the loop inconsistent state the port prevents data traffic and BPDU transmission through the link, therefore avoiding the loop creation. When BPDUs again are received on the inconsistent port, it resumes normal MSTP operation automatically. In this example, the transmission from switch 1 port 10 to switch 2 port 20 is blocked due to a hardware failure. Switch 2 port 2 does not receive BPDUs and goes into a forwarding state, creating a loop. When loop guard is configured for switch 2 port 20, this port goes from a forwarding state to an inconsistent state, and does not forward the traffic through the link, thus avoiding loop creation.
Examples
Enabling the loop guard on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# spanning-tree loop-guard
Disabling loop guard on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree loop-guard

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

MSTP commands | 1522

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree max-age
spanning-tree max-age <AGE-IN-SECS> no spanning-tree max-age [<AGE-IN-SECS>]
Description
Sets the maximum age timer, which specifies the maximum age value that the switch inserts in outbound BPDU packets it sends as a root bridge. Max-age is the interval, specified in the BPDU, that BPDU data remains valid after its reception. The bridge recomputes the spanning tree topology if it does not receive a new BPDU before max-age expiry. The no form of this command sets the max-age value to the default of 20 seconds.

Parameter <AGE-IN-SECS>

Description Specifies the max-age in seconds. Range: 6 to 40. Default: 20.

Examples
Setting the max-age to 10 seconds:

switch(config)# spanning-tree max-age 10

Setting the max-age to the default of 20 seconds:

switch(config)# no spanning-tree max-age

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1523

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

spanning-tree max-hops
spanning-tree max-hops <HOP-COUNT> no spanning-tree max-hops [<HOP-COUNT>]
Description
Configures the max hop setting that the switch inserts into BPDUs that it sends out as the root bridge. The max hop setting determines the number of bridges in an MST region that a BPDU can traverse before it is discarded. The no form of this command sets the maximum number of hops to the default of 20.

Parameter <HOP-COUNT>

Description
Specifies the maximum number of hops. Range: 1 to 40. Default: 20.

Examples
Setting the hop count to 10:

switch(config)# spanning-tree max-hops 10

Setting the max-age to the default of 20:

switch(config)# no spanning-tree max-hops

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

MSTP commands | 1524

spanning-tree mode
spanning-tree mode {mstp|rpvst [auto-vlan-enable [priority <NUMBER>]]} no spanning-tree mode {mstp|rpvst [auto-vlan-enable [priority <NUMBER>]]}
Description
Sets the spanning tree protocol (STP) mode to either MSTP mode (Multiple-instance Spanning Tree Protocol) or RPVST mode (Rapid Per VLAN Spanning Tree). Enabling the RPVST Auto VLAN feature will run RPVST on all VLANs currently configured on the switch. Default priority of 8 will be assigned to the VLANs being auto created. The no form of this command sets the spanning tree mode to the default mstp.
Enabling auto-VLAN can lead to an undeterministic state if auto scaled beyond the max system limit mentioned in the capacity-status.

Parameter mstp
rpvst auto-vlan-enable priority <NUMBER>

Description
Sets the STP mode to MSTP which applies spanning tree separately for each set of VLANs called an MSTI (multiple spanning tree instance).
Sets the STP mode to RPVST.
Selects RPVST auto VLAN mode.
Specifies the priorites for all auto created RPVST instances. Configured as a multiple of 4096. Default: 8.

Examples
Enabling MSTP mode:

switch(config)# spanning-tree mode mstp

Disabling MSTP mode:

switch(config)# no spanning-tree mode mstp

Enabling RPVST mode:

switch(config)# spanning-tree mode rpvst

Disabling RPVST mode:

switch(config)# no spanning-tree mode rpvst

Enabling RPVST auto VLAN with a priority of 1:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1525

switch(config)# spanning-tree mode rpvst auto-vlan-enable priority 1 Disabling RPVST auto VLAN with a priority of 1:
switch(config)# no spanning-tree mode rpvst auto-vlan-enable priority 1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.12.1000 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Auto VLAN enable added. --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree port-priority
spanning-tree port-priority <PRIORITY-MULTIPLIER> no spanning-tree port-priority [<PRIORITY-MULTIPLIER>]
Description
Configures the port priority. The priority of a port can be different for each MST instance to which it belongs. The no form of the command sets the port priority for MST instance 0 to the default of 8. The default priority value is derived by multiplying 8 by 8. For LAG interfaces the default is 4.

Parameter <PRIORITY-MULTIPLIER>

Description
Specifies the port priority as a multiplier. Default: 8, except for LAG interfaces where the default is 4. Range: 0 to15. The priority range for a port in a given MSTI is 0 to 255. However, this command specifies the priority as a multiplier (0 to 15) of 16. When you specify a priority multiplier of 0 to15, the actual priority assigned to the switch is: (priority-multiplier) x 16.

Examples
On the 6400 Switch Series, interface identification differs. Setting the port priority to 8 on interface 1/1/1:

MSTP commands | 1526

switch(config)# interface 1/1/1 switch(config-if)# spanning-tree port-priority 8
Setting the port priority to the default on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree port-priority

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree port-type
spanning-tree port-type {admin-edge|admin-network} no spanning-tree port-type [admin-edge|admin-network]
Description
Sets the STP port type for the interface. Port types include: admin-edge and admin-network. The no form of the command sets the port type to the default of admin-network.

Parameter admin-edge
admin-network

Description
Specifies the port type as administrative edge. During spanning tree establishment, ports with admin-edge enabled transition immediately to the forwarding state.
Specifies the port type as administrative network. When this option is selected, the port looks for BPDUs for the first 3 seconds. If there are none, the port is classified as an edge port and immediately starts forwarding packets. If BPDUs are seen on the port, the port is classified as a non-edge port and normal STP operation commences on that port.

Examples
On the 6400 Switch Series, interface identification differs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1527

Setting the port type to admin-edge on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# spanning-tree port-type admin-edge
Setting the port type to admin-network on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# spanning-tree port-type admin-network
Setting the port type to the default of admin-network on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree port-type

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree priority
spanning-tree priority <PRIORITY-MULTIPLIER> no spanning-tree priority [<PRIORITY-MULTIPLIER>]
Description
Configures the switch (bridge) priority for the designated region in which the switch resides. The switch compares this priority with the priorities of other switches in the same region to determine the root switch for the region. The lower the priority value, the higher the priority. The no form of this command sets the bridge priority to the default of 8. The default priority value is derived by multiplying 8 by 4096.

Parameter <PRIORITY-MULTIPLIER>

Description Specifies the priority as a multiplier. Range: 0 to 15. Default: 8.

MSTP commands | 1528

Parameter

Description
The priority range for an MSTP switch is 0-61440. However, this command specifies the priority as a multiplier (0 to 15) of 4096. That is, when you specify a priority multiplier value of 0 to 15, the actual priority assigned to the switch is: (priority-multiplier) x 4096. For example, with 2 as the priority-multiplier on a given MSTP switch, the switch priority setting is 8,192.

Usage
Every switch running an instance of MSTP has a Bridge Identifier, which is a unique identifier that helps distinguish this switch from all others. The switch with the lowest Bridge Identifier is elected as the root for the tree. The Bridge Identifier is composed of a configurable priority component (2 bytes) and the bridge's MAC address (6 bytes). You can change the priority component provides flexibility in determining which switch will be the root for the tree, regardless of its MAC address.
Examples
Setting the priority multiplier to 12:

switch(config)# spanning-tree priority 12

Setting the priority multiplier to the default of 8:

switch(config)# no spanning-tree priority

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree root-guard
spanning-tree root-guard no spanning-tree root-guard
Description
Enables the root guard on the interface.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1529

When a port is enabled as root-guard, it cannot be selected as the root port even if it receives superior STP BPDUs. The port is assigned an "alternate" port role and enters a blocking state if it receives superior MSTP BPDUs. A superior BPDU contains both "better" information on the root bridge and path cost to the root bridge, which would normally replace the current root bridge selection. The no form of the command sets the root guard status to the default of disabled on the interface.
Examples
On the 6400 Switch Series, interface identification differs. Enabling the root guard on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# spanning-tree root-guard
Disabling root guard on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree root-guard

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree rpvst-filter
spanning-tree rpvst-filter no spanning-tree rpvst-filter
Description
Enables the RPVST filter for the interface. This command is only applicable to MSTP mode. It is not applicable to RPVST+ mode. When the RPVST filter is enabled, the ingressing RPVST proprietary BPDUs are dropped after copying to CPU whereas the standard IEEE RPVST BPDUs are still allowed. This helps in preventing the flooding of RPVST proprietary BPDUs under an MSTP-RPVST interop environment.

MSTP commands | 1530

If the neighboring switch is running RPVST then this pair of switches will not converge as RPVST BPDUs will not reach them.
If enabling RPVST filter causes a high traffic load, shutdown the port and reconfigure the BPDU filter with the CLI command: no spanning tree rpvst-filter. RPVST filter is disabled by default.
Example
On the 6400 Switch Series, interface identification differs. Enabling the RPVST filter on interface 1/1/1:
switch# configure terminal switch(config)# interface 1/1/1 switch(config-if)# spanning-tree rpvst-filter
Disabling RPVST filter on interface 1/1/1:
switch# configure terminal switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree rpvst-filter

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree rpvst-guard
spanning-tree rpvst-guard no spanning-tree rpvst-guard
Description
Enables RPVST guard on the switch interface. This command is only applicable to MSTP mode. It is not applicable to RPVST+ mode. When RPVST guard is enabled on an interface, it will disable that interface if RPVST BPDUs are received on it.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1531

The no form of the command sets the RPVST guard status to the default of disabled on the interface.
Example
On the 6400 Switch Series, interface identification differs. Enabling RPVST guard on interface 1/1/1:
switch# configure terminal switch(config)# interface 1/1/1 switch(config-if)# spanning-tree rpvst-guard
Disabling RPVST guard on interface 1/1/1:
switch# configure terminal switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree rpvst-guard

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree tcn-guard
spanning-tree tcn-guard no spanning-tree tcn-guard
Description
Enables the TCN (Topology Change Notification) guard in the interface. When enabled for a port, the port stops propagating received topology change notifications and topology changes to other ports. The no form of the command sets the TCN guard status to the default of disabled on the interface.
Examples
On the 6400 Switch Series, interface identification differs. Enabling TCN guard on interface 1/1/1:

MSTP commands | 1532

switch(config)# interface 1/1/1 switch(config-if)# spanning-tree tcn-guard
Disabling TCN guard on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree tcn-guard

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree transmit-hold-count
spanning-tree transmit-hold-count <COUNT> no spanning-tree transmit-hold-count [<COUNT>]
Description
Sets the maximum number of BPDUs per second that the switch can send from an interface. The no form of this command sets the transmit-hold-count to the default of 6.

Parameter <COUNT>

Description
Specifies the number of BPDUs that can be sent per second. Range: 1 to 10. Default: 6.

Examples
Setting the transmit-hold-count to 5:

switch(config)# spanning-tree transmit-hold-count 5

Setting the transmit-hold-count to the default of 6:

switch(config)# no spanning-tree transmit-hold-count

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1533

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree trap
spanning-tree trap {new-root|topology-change [instance <INSTANCE-ID>] | errant-bpdu | root-guard-inconsistency | loop-guard-inconsistency}
no spanning-tree trap {new-root|topology-change [instance <INSTANCE-ID>] | errant-bpdu | root-guard-inconsistency | loop-guard-inconsistency}
Description
Enables SNMP traps for new root, topology change event, errant-bpdu received event, root-guard inconsistency, and loop-guard inconsistency notifications. It is disabled by default. The no form of this command disables the notifications for SNMP traps.

Parameter new-root topology-change <INSTANCE-ID> errant-bpdu root-guard-inconsistency loop-guard-inconsistency

Description
Enabling SNMP notification when a new root is elected on any MST instance on the switch.
Enabling SNMP notification when a topology change event occurs in the specified MST instance on the switch.
Specifies the instance ID for the topology change trap. Range: 0 to 64.
Enabling SNMP notification when an errant bpdu is received by any MST instance on the switch.
Enabling SNMP notification when the root-guard finds the port inconsistent for any MST instance on the switch.
Enabling SNMP notification when the loop-guard finds the port inconsistent for any MST instance on the switch.

Examples
Enabling the notifications for the SNMP traps:

MSTP commands | 1534

switch(config)# spanning-tree trap

new-root

Enable notifications which are sent when a new root is

elected

topology-change

Enable notifications which are sent when a topology

change occurs

errant-bpdu

Enable notifications which are sent when an errant

bpdu is received

root-guard-inconsistency Enable notifications which are sent when root guard

inconsistency occurs

loop-guard-inconsistency Enable notifications which are sent when loop guard

inconsistency occurs

switch(config)# spanning-tree trap new-root

<cr>

switch(config)# spanning-tree trap topology-change

instance Enable topology change notification for the specified MST instance id.

switch(config)# spanning-tree trap topology-change instance

<0-64> Enable topology change information on the specified instance id.

switch(config)# spanning-tree trap topology-change instance 1

<cr>

switch(config)# spanning-tree trap errant-bpdu

<cr>

switch(config)# spanning-tree trap root-guard-inconsistency

<cr>

switch(config)# spanning-tree trap loop-guard-inconsistency

<cr>

Disabling the notifications for the SNMP traps:

switch(config)# no spanning-tree trap

new-root

Disable notifications which are sent when a new root

is elected

topology-change

Disable notifications which are sent when a topology

change occurs

errant-bpdu

Disable notifications which are sent when an errant

bpdu is received

root-guard-inconsistency Disable notifications which are sent when root guard

inconsistency occurs

loop-guard-inconsistency Disable notifications which are sent when loop guard

inconsistency occurs

switch(config)# no spanning-tree trap new-root

<cr>

switch(config)# no spanning-tree trap topology-change

instance Disable topology change notification for the specified MST instance

switch(config)# no spanning-tree trap topology-change instance

<0-64> Disable topology change information on the specified instance id

switch(config)# no spanning-tree trap topology-change instance 1

<cr>

switch(config)# no spanning-tree trap errant-bpdu

<cr>

switch(config)# no spanning-tree trap root-guard-inconsistency

<cr>

switch(config)# no spanning-tree trap loop-guard-inconsistency

<cr>

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1535

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

MSTP commands | 1536

Chapter 89 Multicast VXLAN commands

Multicast VXLAN commands

clear ip mroute
clear ip mroute all-vrfs group-prefix <group-prefix> <group-address>[<source-address>] <port> vrf <vrf-name>
Description
Clears the multicast routing information for a specified VRF or all VRFs. If you do not include VRF information in these commands, the clear ip mroute commands clear the default VRF.

Parameter all-vrfs <group-address>
<source-address>
group-prefix <group-prefix>
<port> vrf <VRF-NAME>

Description
Clears multicast routing for all VRFs.
Clears the multicast routing information for the group address in the specified VRF or all VRFs. If the command does not include VRF information, it clears routing information for the group address in the default VRF.
Clears multicast routing information for the group and source addresses in the specified VRF or all VRFs. If the command does not include VRF information, it clears routing information for the group and source addresses in the default VRF.
Clears the multicast routing information for the group prefix in the specified VRF or all VRFs. The group prefix must be in the format A.B.C.D/length. If the command does not include VRF information, it clears routing information for the group address in the default VRF.
Clears the multicast routing information for the port in the specified VRF or all VRFs. If the command does not include VRF information, it clears routing information for the port in the default VRF.
Clears multicast routing information for a specific VRF.

Examples
Clears multicast routing information for the default VRF.

switch# clear ip mroute

Clears multicast routing information the group address 225.1.1.1 for the VRF Lab2.

AOS-CX 10.14 Command-Line Interface Guide

1537

switch# clear ip mroute 225.1.1.1 vrf Lab2
Clears multicast routing information the group address 225.1.1.1 and source address 192.0.2.6 for all VRFs
switch# clear ip mroute 225.1.1.1 192.0.2.6 all-vrfs
Clears multicast routing information for the port VLAN10 on the Default VRF. clear ip mroute vlan10
Clears multicast routing information for the port VLAN10 for the group address 225.1.1.1 and source address 192.0.2.6 for the VRF Lab3.
switch# clear ip mroute vlan20 225.1.1.1 192.0.2.6 Lab3

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.12

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ip pim-sparse datapath-auto-include
ip pim-sparse datapath-auto-include no ip pim-sparse datapath-auto-include
Description
Enables the router to forward multicast data received on the VXLAN L3VNI fabric to this interface, regardless of whether a multicast join was received on this interface or not. This allows the interface to be in the same multicast data path state on both the VSX peers. This command must be enabled on the VSX VXLAN routers to support multicast receivers over ROP or P2P SVI extensions. This command can be enabled on a transit L3 peering between VSX peers. This command is optional when the uplink is an MCLAG SVI. The no form of the command disables forwarding of multicast data on the interface.

Multicast VXLAN commands | 1538

n An IP address must be configured on the interface and pim-sparse must be enabled. n This command must be enabled only on one interface per VRF.

PIM enabled VXLAN VTEPs can be extended to other routers that can be connected to sources or clients. The following types of L3 or L2 extensions are supported:
n L2 VSX LAG: Upstream or downstream routers are connected using L2 VSX LAG links. n L3 VSX LAG: Upstream or downstream routers are connected using L3 VSX LAG links. n ROP extension: L3 extension for sources or clients using ROPs is supported. n Point-to-point SVI extension: L3 extension for sources or clients using point-to-point SVIs is
supported.
If the source is connected using ROP or P2P SVIs, it is recommended to have an additional L3 link per VRF between the VSX devices for upstream redundancy. If the L3 link is an SVI, it is recommended to not add an ISL port in that VLAN.

Parameter datapath-auto-include

Description Includes the interface for multicast data forwarding.

Examples
Configuring interface 40.0.0.4/24 of the router to forward multicast data:
switch(config)# interface vlan40 switch(config-if-vlan)# ip address 40.0.0.4/24 switch(config-if-vlan)# ip pim-sparse enable switch(config-if-vlan)# ip pim-sparse datapath-auto-include

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms 6400

Command context config-if-vlan

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

ip pim-sparse vsx-virtual-neighbor
ip pim-sparse vsx-virtual-neighbor

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1539

no ip pim-sparse vsx-virtual-neighbor
Description
Once configured, the router processes IGMP/MLD and PIM joins received on this interface regardless of its DR or Prime Neighbor role. The command must be enabled for VSX VXLAN leaf switches for both L2 and L3 extensions. This allows for the interface to be in the same multicast data path state on both the VSX peers. The no form of the command disables the vsx-virtual-neighbor on the interface.
This command is applicable for normal SVI interfaces and L2 VNI mapped SVI interfaces. It is valid for VXLANenabled VLANs only and has no effect on non-VXLAN-enabled VLANs.
Examples
switch(config)# interface vlan40 switch(config-if-vlan)# ip address 40.0.0.4/24 switch(config-if-vlan)# ip pim-sparse enable switch(config-if-vlan)# ip pim-sparse vsx-virtual-neighbor

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-sparse datapath-auto-include
ipv6 pim6-sparse datapath-auto-include no ipv6 pim6-sparse datapath-auto-include
Description
Enables the router to forward multicast data received on the VXLAN L3VNI fabric to this interface, regardless of whether a multicast join was received on this interface or not. This allows the interface to be in the same multicast data path state on both the VSX peers. This command must be enabled on the VSX VXLAN routers to support multicast receivers over ROP or P2P SVI extensions. This command can be enabled on a transit L3 peering between VSX peers. This command should not be enabled when the uplink is an MCLAG SVI. The no form of the command disables forwarding of multicast data on the interface.

Multicast VXLAN commands | 1540

n An IP address must be configured on the interface and pim-sparse must be enabled. n This command must be enabled only on one interface per VRF.

PIM enabled VXLAN VTEPs can be extended to other routers that can be connected to sources or clients. The following types of L3 or L2 extensions are supported:
n L2 VSX LAG: Upstream or downstream routers are connected using L2 VSX LAG links. n L3 VSX LAG: Upstream or downstream routers are connected using L3 VSX LAG links. n ROP extension: L3 extension for sources or clients using ROPs is supported. n Point-to-point SVI extension: L3 extension for sources or clients using point-to-point SVIs is
supported.
If the source is connected using ROP or P2P SVIs, it is recommended to have an additional L3 link per VRF between the VSX devices for upstream redundancy. If the L3 link is an SVI, it is recommended to not add an ISL port in that VLAN.

Parameter datapath-auto-include

Description Includes the interface for multicast data forwarding.

Examples
Configuring interface 40.0.0.4/24 of the router to forward multicast data:
switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 address 40:40::4/64 switch(config-if-vlan)# ipv6 pim6-sparse enable switch(config-if-vlan)# ipv6 pim6-sparse datapath-auto-include

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.12

Command Information

Platforms 6400

Command context config-if-vlan

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-sparse vsx-virtual-neighbor
ipv6 pim6-sparse vsx-virtual-neighbor

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1541

no ipv6 pim6-sparse vsx-virtual-neighbor
Description
Once configured, the router processes IGMP/MLD and PIM joins received on this interface regardless of its DR or Prime Neighbor role. The command must be enabled for VSX VXLAN leaf switches for both L2 and L3 extensions. This allows for the interface to be in the same multicast data path state on both the VSX peers. The no form of the command disables the vsx-virtual-neighbor on the interface.
This command is applicable for normal SVI interfaces and L2 VNI mapped SVI interfaces. It is valid for VXLANenabled VLANs only and has no effect on non-VXLAN-enabled VLANs.
Examples
switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 address 40:40::4/64 switch(config-if-vlan)# ipv6 pim6-sparse enable switch(config-if-vlan)# ipv6 pim6-sparse vsx-virtual-neighbor

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.12

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

register-source
register-source <INTERFACE-NAME> no register-source <INTERFACE-NAME>
Description
Specifies the source interface to be used for PIM registration in the case of VXLAN anycast interfaces. When the PIM enabled anycast VLAN is directly connected to a multicast source, register-source is used to send registration messages to the RP and this interface receives the register-stop messages from the RP. The no form of this command removes the register source configuration.

Multicast VXLAN commands | 1542

Parameter <INTERFACE-NAME>

Description Specifies the name of the interface to use.

Usage
n This is a global configuration under router-pim configuration and is required in Symmetric IRB with anycast IP address configuration.
n This configuration is required in the source connected switch only when the PIM-DR and RP are in two different switches.
n Without this configuration, there will be traffic loss as the registration sequence will not be successful. It is mandatory to have this source interface configured with a non-anycast IP address which is unique to the VTEP, and with PIM enabled.
Examples
Configuring the source interface for PIM registrations:

switch# config switch(config)# router pim vrf vrf1 switch(config-pim)# register-source loopback1

Removing the register-source configuration:

switch(config-pim)# no register-source loopback1

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.09.1000

Command Information

Platforms
6300 6400

Command context config-pim

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

show ip mroute
show ip mroute [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows multicast routing information. Optionally, you can show specific information by VRF. If no options are specified, it shows information for the default VRF.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1543

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows all PIM neighbors information.
Shows PIM neighbor information for a specific VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Multicast route with L3VNI in Incoming Interface List:

switch# show ip mroute all-vrfs IP Multicast Route Entries

VRF : red Total number of entries : 1

Group Address

: 225.1.1.1

Source Address

: 80.1.1.11

Neighbor

: 1.1.1.1

Incoming interface

: vni2

Outgoing Interface List :

Interface

State

-----------

----------

vlan10

forwarding

switch# show ip mroute 225.1.1.1 80.1.1.11 all-vrfs

IP Multicast Route Entries

VRF : red

Group Address

Source Address

Neighbor

Incoming interface

Multicast Routing Protocol

Unicast Routing Protocol

Metric

Metric Pref

Uptime (HH:MM:SS)

Downstream Interface

Interface

State

-----------

----------

vni2

forwarding

vni2

forwarding

: 225.1.1.1 : 80.1.1.11 : 1.1.1.1 : vni2 : PIM-SM : BGP :0 : 200 : 00:07:23

Multicast route with L3VNI in Outgoing Interface List:

switch# show ip mroute all-vrfs IP Multicast Route Entries
VRF : red Total number of entries : 1

Multicast VXLAN commands | 1544

Group Address

: 225.1.1.1

Source Address

: 80.1.1.11

Neighbor

:

Incoming interface

: vlan20

Outgoing Interface List :

Interface

State

-----------

----------

vni2

forwarding

switch# show ip mroute 225.1.1.1 80.1.1.11 vrf red

IP Multicast Route Entries

VRF : red Total number of entries : 1

Group Address

: 225.1.1.1

Source Address

: 80.1.1.11

Neighbor

:

Incoming interface

: vlan20

Multicast Routing Protocol : PIM-SM

Unicast Routing Protocol

: connected

Metric

:0

Metric Pref

:0

Uptime (HH:MM:SS)

: 00:06:32

Downstream Interface

Interface

State

-----------

----------

vni2

forwarding

Detailed multicast route that displays the individual VTEPs to which the packet is forwarded:

switch# show ip mroute 239.2.2.2 100.2.1.4 vrf red detail

VRF : red

Group Address

: 239.2.2.2

Source Address

: 100.2.1.4

SSM Mroute

: False

Neighbor

: 20.20.20.2

Incoming interface

: 1/1/2

Unicast Routing Protocol: OSPF

Metric

: 200

Metric Pref

: 110

Downstream Interface

Interface

State

Proxy-DR

----------- ----------

--------

vni1000

forwarding

false

VTEPS ------3.3.3.3

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1545

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim neighbor
show ip pim neighbor [<IP-ADDR>] [all-vrfs | vrf <VRF-NAME>] show ip pim neighbor [<BRIEF>] [all-vrfs | vrf <VRF-NAME>]
Description
Displays the information about PIM interfaces currently configured in the router for the given VRF. If VRF is not given, it displays for default VRF.

Parameter <IP-ADDR> <BRIEF> all-vrfs vrf <VRF-NAME>

Description Shows PIM neighbor information. Shows brief PIM neighbor information. Shows all PIM neighbors information Shows PIM neighbor information for a specific VRF.

Examples
Show information for all VRFs:

switch# show ip pim neighbor all-vrfs

PIM Neighbor

VRF

: Test_1

Total number of neighbors : 2

IP Address Interface Up Time (HH:MM:SS) Expire Time (HH:MM:SS) DR Priority Hold Time (HH:MM:SS)

: 100.1.1.252 : vlan100 : 00:44:38 : 00:01:32 :1 : 00:01:45

IP Address Interface Up Time (HH:MM:SS) Expire Time (HH:MM:SS) DR Priority Hold Time (HH:MM:SS)

: 172.1.1.1 : vni1000 : 00:44:35 : 00:03:25 :1 : 00:03:30

PIM supports both IPv4 and IPv6 as underlay VTEP IP addresses. In deployments with an IPv6 underlay, PIM forms an auto-generated link-local address to exchange control packets and forms a PIM neighborship over an L3VNI interface with other VTEPs. The auto generated IP will be a link local IP in case of overlay IPv6.
The following example displays L3VNI neighbors for an IPv6 underlay tunnel with an IPv4 overlay.

Multicast VXLAN commands | 1546

switch# show ip pim neighbor all-vrfs

PIM Neighbor

VRF

: Test_1

Total number of neighbors : 1

IP Address

: 169.254.125.33

Interface

: vni1000

Up Time (HH:MM:SS)

: 00:44:35

Expire Time (HH:MM:SS) : 00:03:25

DR Priority

:1

Hold Time (HH:MM:SS)

: 00:03:30

In deployments with an IPv4 overlay, multicast route entries with an incoming L3VNI interface will have a neighbor ip address that is an auto-generated IPv4 address derived from the underlay V6 tunnel address,

switch# show ip mroute 230.1.1.1 vrf Test_1 detail

IP Multicast Route Entries

VRF : Test_1

Total number of entries : 1

Group Address

: 230.1.1.1

Source Address

: 40.40.1.100

Neighbor

: 169.254.125.33

Incoming interface

: vni1000

Unicast Routing Protocol

: BGP

Metric

:0

Metric Pref

: 200

Uptime (HH:MM:SS)

: 00:01:45

Downstream Interface

Interface

State

-----------

----------

vlan20

forwarding

Show brief information for PIM neighbor:

switch# show ip pim neighbor brief

----------------------------------------------------------------------------------

---------

VRF: default

Total number of neighbor : 2

----------------------------------------------------------------------------------

---------

Interface

Neighbor Uptime

Expires

DR

Hold Time

Secondary Address

(IPV4)

(HH:MM:SS) (HH:MM:SS) Priority (HH:MM:SS)

(IPV4)

----------- ---------- ---------- ---------- ------- ---------- --------

---------

1/1/1

40.0.0.5

11:54:21 00:01:31 1000

00:01:45 Nil

1/1/2

50.0.0.5

00:03:23 00:01:23 500

00:01:45 60.0.0.4 ,

70.0.0.4

----------------------------------------------------------------------------------

---------

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1547

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 mroute
show ipv6 mroute [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows multicast routing information. Optionally, you can show specific information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows all PIM neighbors information.
Shows PIM neighbor information for a specific VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing multicast route with L3VNI in Incoming Interface List:

switch# show ipv6 mroute all-vrfs IP Multicast Route Entries

VRF : red Total number of entries : 1

Group Address

: ff55::100:1

Source Address

: 200:200::100

SSM Mroute

: False

Neighbor

: fe80::5:5:5:5

Uptime

: 00:02:37

State

: route

Incoming interface

: vni2

Outgoing Interface List :

Interface

State

-----------

----------

vlan10

forwarding

Multicast VXLAN commands | 1548

switch# show ipv6 mroute ff55::100:1 200:200::100 vrf red

IP Multicast Route Entries

VRF : red

Group Address Source Address Neighbor Incoming interface Multicast Routing Protocol Unicast Routing Protocol Metric Metric Pref Uptime (HH:MM:SS)

: ff55::100:1 : 200:200::100 : : vni2 : PIM-SM : BGP :0 : 200 : 00:10:24

Showing multicast route with L3VNI in Outgoing Interface List:

switch# show ipv6 mroute all-vrfs IP Multicast Route Entries

VRF : red Total number of entries : 1

Group Address

: ff55::100:1

Source Address

: 200:200::100

Neighbor

:

Uptime

: 00:06:38

State

: route

Incoming interface

: vlan20

Outgoing Interface List :

Interface

State

-----------

----------

vni2

forwarding

switch# show ipv6 mroute ff55::100:1 200:200::100 vrf red IP Multicast Route Entries

VRF : red Total number of entries : 1

Group Address

Source Address

Neighbor

Incoming interface

Multicast Routing Protocol

Unicast Routing Protocol

Metric

Metric Pref

Uptime (HH:MM:SS)

Downstream Interface

Interface

State

-----------

----------

vni2

forwarding

: ff55::100:1 : 200:200::100 : : vlan20 : PIM-SM : connected :0 :0 : 00:06:38

Showing detailed multicast route that displays the individual VTEPs to which the packet is forwarded:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1549

switch# show ipv6 mroute all-vrfs ff55::100:1 200:200::100 vrf red detail

VRF : red Total number of entries : 1

Group Address

: ff55::100:1

Source Address

: 200:200::100

SSM Mroute

: False

Neighbor

:

Incoming Interface

: vlan20

Unicast Routing Protocol: connected

Metric

:0

Metric Pref

:0

Downstream Interface

Interface

State

Proxy-DR

----------- ---------- ---------

vni2

forwarding false

VTEPs --------3.3.3.3

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 interface vlan
show ipv6 pim6 interface vlan <vlan name>
Description
Displays the IPV6 information about PIM6 interfaces currently configured in the router for the given VLAN. If VLAN is not given, it displays for default VLAN.

Parameter vlan <vlan name>

Description Specifies the vlan.

Examples
Showing the IPV6 information about PIM6 interfaces currently configured in the router for VLAN 301:

Multicast VXLAN commands | 1550

switch(config)# show ipv6 pim6 interface vlan301

Interface

: vlan301

Neighbor count

:1

IPv6 Address

: fe80::5480:2881:2dfc:b200/64

Mode

: sparse

Designated Router

: fe80::5480:2881:2dfc:b200

Proxy DR

: false

Hello Interval (sec)

: 30

Hello Delay (sec)

:5

Override Interval (msec) : 2500

Lan Prune Delay

: Yes

Propagation Delay (msec) : 500

Configured DR Priority : 100

Operational DR Priority : 100

Neighbor Timeout

: 82

VSX Virtual Neighbor

: true

Datapath Auto Include

: true

For more information on features that use this command, refer to the Multicast Guide for your switch model.

switch (config-if-vlan)# show traffic-insight test monitor-type dns-averagelatency
mon2 error-statistics

Type Start time for error monitoring End time for error monitoring

: dns-average-latency : 10/10/2022 04:12:13.923691 UTC : 10/10/2022 04:17:13.964505 UTC

client_mac

dns_server_ip

number_of_ dns_name dns_server dns_format

dns_failures _errors

_failures

_errors

----------------------------------------------------------------------------------

--

aa:aa:aa:aa:aa:aa 172.0.0.1

200

50

100

50

bb:bb:bb:bb:bb:bb 172.1.1.1

50

10

20

20

cc:cc:cc:cc:cc:cc 172.2.2.2

150

75

25

50

Command History
Release 10.12

Modification Command introduced

Command Information

Platforms
6300 6400

Command context config-if-vlan

Authority
Administrators or local user group members with execution rights for this command.

show ipv6 pim6 neighbor
show ipv6 pim6 neighbor [<IP-ADDR>] [all-vrfs | vrf <VRF-NAME>]
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1551

Displays the information about PIM interfaces currently configured in the router for the given VRF. If VRF is not given, it displays for default VRF.
The overlay IPv6 address of the LRVNI is an autogenerated link local IP that is derived by PIM using the VXLAN source IP.

Parameter <IP-ADDR> all-vrfs vrf <VRF-NAME>

Description Shows PIM neighbor information. Shows all PIM neighbors information Shows PIM neighbor information for a specific VRF.

Examples
Show information for all VRFs:

switch# show ipv6 pim6 neighbor all-vrfs

PIM Neighbor

VRF

: red

Total number of neighbors : 2

IPv6 Address Interface Up Time (HH:MM:SS) Expire Time (HH:MM:SS) DR Priority Hold Time (HH:MM:SS)

: fe80::5:5:5:5 : vni10000 : 06:57:307 : 00:03:26 :1 : 00:03:30

IPv6 Address Interface Up Time (HH:MM:SS) Expire Time (HH:MM:SS) DR Priority Hold Time (HH:MM:SS) Secondary IP Addresses

: fe80::3281:c780:a5c:18c0 : vlan10 : 00:01:46 : 00:01:29 :1 : 00:01:45 : 100:100::3

PIM supports both IPv4 and IPv6 as underlay VTEP IP addresses. If the outgoing interface is a L3VNI, the forwarded VTEP IP address will be displayed as the actual IPv6 underlay tunnel source IP address.

switch# show ipv6 mroute 230.1.1.1 vrf Test_1 detail

IP Multicast Route Entries

VRF : Test_1

Total number of entries : 1

Group Address

: 230.1.1.1

Source Address

: 40.40.1.100

Neighbor

: 100.100.1.1

Incoming interface

: 1/1/6

Multicast Routing Protocol : PIM-SM

Unicast Routing Protocol

: BGP

Metric

:0

Metric Pref

: 20

Uptime (HH:MM:SS)

: 00:02:06

Downstream Interface

Multicast VXLAN commands | 1552

Interface ----------vni1000

State ---------forwarding

Vteps ----5::5

The following example displays L3VNI neighbors for an underlay IPv6 tunnel with an IPv6 overlay

switch# show ipv6 pim6 neighbor all-vrfs

PIM Neighbor

VRF

: Test_1

Total number of neighbors : 1

IP Address

: fe80::165:72:119

Interface

: vni1000

Up Time (HH:MM:SS)

: 00:40:38

Expire Time (HH:MM:SS) : 00:01:32

DR Priority

:1

Hold Time (HH:MM:SS)

: 00:01:45

In deployments with an IPv6 overlay, multicast route entries with an incoming L3VNI interface will have a neighbor IP that is an auto-generated IPv6 address derived from the IPv6 underlay tunnel. This example displays multicast routes for an IPv6 underlay tunnel with an IPV6 overlay.

switch# show ipv6 mroute ff55::1 vrf Test_1 detail

IP Multicast Route Entries

VRF : Test_1

Total number of entries : 1

Group Address

: ff55::1

Source Address

: 40:40::100

Neighbor

: fe80::165:72:119

Incoming interface

: vni1000

Unicast Routing Protocol

: BGP

Metric

:0

Metric Pref

: 200

Uptime (HH:MM:SS)

: 00:01:45

Downstream Interface

Interface

State

-----------

----------

vlan20

forwarding

If the outgoing interface is L3VNI, the forwarded VTEP IP address will be displayed as the actual underlay IPv6 tunnel source IP.

switch# show ipv6 mroute ff55::1 vrf Test_1 detail

IP Multicast Route Entries

VRF : Test_1

Total number of entries : 1

Source Address

: 40:40::100

Neighbor

: fe80::f860:f001:4057:6900

Incoming interface

: 1/1/6

Multicast Routing Protocol : PIM-SM

Unicast Routing Protocol

: BGP

Metric

:0

Metric Pref

: 20

Uptime (HH:MM:SS)

: 00:02:06

Downstream Interface

Interface

State

Vteps

-----------

----------

-----

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1553

vni1000

forwarding

Group Address

5::5 : ff55::1

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.12

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Multicast VXLAN Multi-fabric commands
For a complete list of Multicast VXLAN commands, refer to Multicast VXLAN commands.

show ip mroute detail
show ip mroute <GROUP ADDRESS> <SOURCE ADDRESS> [all-vrfs | vrf <VRF-NAME>] detail
Description
Shows multicast routing information from a border router where traffic from a local site is forwarded to a remote site. Optionally, you can show specific information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME>

Description Shows all PIM neighbors information. Shows PIM neighbor information for a specific VRF.

Usage
The Intra-Inter Forwarded VTEP(s) tunnel field denotes which tunnel the traffic is routed to. This includes the intra or inter VTEPs based on where the joins are seen. If there is more than one site where the traffic needs to be forwarded, the corresponding site's VTEPs are listed. The Intra-Inter Forwarded VTEP(s) field is only visible at the Border router.
There are no outgoing interfaces listed in these Mroutes as they are routing withing the same L3VNI logical interface. If there are any local receivers at the border routers that are extended via L2/L3 extensions, then the same Mroute is updated with the outgoing list.

Multicast VXLAN Multi-fabric commands | 1554

Examples
Multicast route where the border is routing from one VTEP to another VTEP. In this case, VTEP 1.1.1.1 to 3.3.3.3 in L3VNI:

switch# show ip mroute 225.0.0.1 100.100.1.4 all-vrfs detail IP Multicast Route Entries

VRF : red

Group Address

: 225.0.0.1

Source Address

: 100.100.1.4

Neighbor

: 1.1.1.1

Incoming interface

: vni10000

Intra-Inter Forwarded VTEP(s) : 3.3.3.3

Multicast Routing Protocol : PIM-SM

Unicast Routing Protocol

: BGP

Metric

:0

Metric Pref

: 200

Uptime (HH:MM:SS)

: 00:00:51

Multicast route where the border is routing from one VTEP to another VTEP in addition to an L3 interface:

switch# show ip mroute 225.0.0.1 100.100.1.4 all-vrfs detail IP Multicast Route Entries

VRF : red

Group Address

: 225.0.0.1

Source Address

: 100.100.1.4

Neighbor

: 1.1.1.1

Incoming interface

: vni10000

Intra-Inter Forwarded VTEP(s) : 3.3.3.3

Multicast Routing Protocol : PIM-SM

Unicast Routing Protocol

: BGP

Metric

:0

Metric Pref

: 200

Uptime (HH:MM:SS)

: 00:00:51

Outgoing Interface List

Interface

State

----------------------------

vlan1675

forwarding

Multicast route where the output is at the source connected leaf router. In this case, traffic ingresses on SVI10 and is routed to VTEP 2.2.2.2:

switch# show ip mroute 225.0.0.1 100.100.1.4 all-vrfs detail IP Multicast Route Entries

VRF : red

Group Address Source Address Neighbor Incoming interface Multicast Routing Protocol

: 225.0.0.1 : 100.100.1.4 : : vlan10 : PIM-SM

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1555

Unicast Routing Protocol Metric Metric Pref Uptime (HH:MM:SS)

: connected :1 :1 : 00:00:56

Outgoing Interface List

Interface

State

Vteps

----------------------------------------

vni10000

forwarding

2.2.2.2

Multicast route where there is mixed L2-L3 VNI routing. In this case, traffic ingressed from VTEP 1.1.1.1 on L3VNI is routed to SVI 4007(L2VNI):

switch# show ip mroute 225.0.0.1 100.100.1.4 all-vrfs detail IP Multicast Route Entries

VRF : red

Group Address

: 225.0.0.1

Source Address

: 100.100.1.4

Neighbor

: 1.1.1.1

Incoming interface

: vni10000

Intra-Inter Forwarded VTEP(s) :

Multicast Routing Protocol : PIM-SM

Unicast Routing Protocol

: BGP

Metric

:0

Metric Pref

: 200

Uptime (HH:MM:SS)

: 00:00:51

Outgoing Interface List

Interface

State

------------------------------

vlan4007

forwarding

Command History

Release 10.12

Modification Command introduced

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ip multicast multi-fabric border
ip multicast multi-fabric border no ip multicast multi-fabric border
Description

Multicast VXLAN Multi-fabric commands | 1556

Enables PIM's border router functionality. This command must be enabled on the border router when iBGP-eBGP is not used. The no form of the command disables forwarding of multicast data on the interface.
This configuration is global and is applicable to all host's VRFs configured in that router.
Examples
Configuring ip multicast multi-fabric border command:
switch# configure terminal switch(config)# switch(config)# ip multicast multi-fabric border <cr> switch(config)# no ip multicast multi-fabric border <cr> switch(config)# switch(config)# ipv6 multicast multi-fabric border <cr> switch(config)# no ipv6 multicast multi-fabric border <cr>

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms 6400

Command context config-if-vlan

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

ip multicast multi-fabric identifier
ip multicast multi-fabric identifier-value <IDENTIFIER VALUE> <cr> no ip multicast multi-fabric <IDENTIFIER-VALUE>
Description
Configures multicast fabric identifier (MFID) that uniquely represents the fabric/site to which this leaf router belongs. Shown in the PIM hello option field, this command is used by the border router to associate the neighbor to the fabric MFID. This command is applicable to all the regular leaf routers and not applicable at the shared border router. The no form of the command disables forwarding of multicast data on the interface.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1557

The same MFID value must be configured on all leaf routers belonging to the same fabric. However, the same MFID value cannot be reused between fabrics attached to the same border.
Configuration of an Identifier is optional on the VTEPs. If there is no manually configured Identifier, it will automatically use and announce the local AS Number as Identifier.

Parameter <IDENTIFIER VALUE>

Description Configures the given value as MFID

Examples
Configuring ip multicast multi-fabric identifier-value command:

switch(config)# switch(config)# ip multicast multi-fabric identifier <identifier-value> <cr> switch(config)# no ip multicast multi-fabric identifier <identifier-value> <cr> switch(config)# switch(config)# ipv6 multicast multi-fabric identifier <identifier-value> <cr> switch(config)# no ipv6 multicast multi-fabric identifier <identifier-value> <cr>

Configuring MFID value of 1001 on two VTEPs using the same fabric:

On VTEP1: vtep1(config)# vtep1(config)# ip multicast multi-fabric identifier 1001 <cr>

On VTEP2: vtep2(config)# vtep2(config)# ip multicast multi-fabric identifier 1001 <cr>

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms 6400

Command context config-if-vlan

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

Multicast VXLAN Multi-fabric commands | 1558

Chapter 90 Multicast datapath commands for IPv4

Multicast datapath commands for IPv4

show ip multicast bridging datapath
show ip multicast bridging datapath {group <GROUP-IP> {source <SOURCE-IP> {vlan <VLAN-ID>}}}[vrf <VRF_NAME>] [vsx-peer]
Description
Displays the multicast bridge control forwarding entries on a device including replication details and hardware programming status. Displays bridging datapath details for the specified multicast flow (the group, source, VLAN, and VRF).

Parameter group <GROUP-IP>
source <SOURCE-IP> vlan <VLAN-ID> vrf <VRF-NAME> vsx-peer

Description
Specifies a group IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. Shows bridging datapath details for the specified group.
Specifies a source IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. Shows bridging datapath details for the specified source.
Specifies a VLAN. Values: 1-4094. Shows bridging datapath details for the specified VLAN.
Specifies a VRF. Shows datapath information for groups joined in the specified VRF. If the <VRF-NAME> is not specified, it shows the default VRF information.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
A multicast bridge control forwarding table comprises of the IP multicast destination address, source address and its association with a list of ports on which the multicast packets are replicated in a Layer 2 domain. The switch floods/ replicates the multicast packet on these ports by matching the multicast destination address, source address, and the virtual local network identifier (VLAN ID). The show ip multicast bridging datapath command displays the multicast bridge control forwarding entries on a device including replication details and hardware programming status.
Examples

AOS-CX 10.14 Command-Line Interface Guide

1559

Showing detailed bridging datapath information for the specified multicast flow:

switch# show ip multicast bridging datapath group 232.1.1.10 source 100.100.1.10

vlan 10

Multicast Bridging Datapath Details

VRF

: default

Source

: 100.100.1.10/32

Group

: 232.1.1.10/32

Replication Group Index : 70

Hardware Status

: active

Error Code

: None

Retries for programming : 0

Vlan

: VLAN10

State

: forwarding

VNI

: vni1000

State

: operational

Replication Details:

Tunnel Endpoints

State

----------------

----------

2.2.2.2

operational

4.4.4.4

operational

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.09.1000

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip multicast routing datapath
show ip multicast routing datapath {group <GROUP-IP> {source <SOURCE-IP> {port <INCOMING-PORT>}}}[vrf <VRF_NAME>] [vsx-peer]
Description
Displays the multicast Layer 3 forwarding entries with replication details and hardware programming status. Displays routing datapath details for the specified multicast flow (group, source, incoming port, and VRF).

Parameter group <GROUP-IP>

Description Specifies a group IP address in IPv4 format (x.x.x.x), where x is a

Multicast datapath commands for IPv4 | 1560

Parameter
source <SOURCE-IP> port <INCOMING-PORT> vrf <VRF-NAME> vsx-peer

Description
decimal number from 0 to 255. Shows datapath details for the specified group.
Specifies a source IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. Shows datapath details for the specified source.
Specifies the incoming port. Shows datapath details for the specified port.
Specifies a VRF. Shows datapath information for the specified VRF. If the <VRFNAME> is not specified, it shows the default VRF information.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
A multicast routing protocol such as PIM populates the multicast Layer 3 forwarding table and forwards multicast traffic to clients throughout the network. A multicast forwarding table comprises of the IP multicast destination address, source address, interface on which the traffic is received, and the list of interfaces on which multicast traffic is replicated. The show ip multicast routing datapath command displays the multicast Layer 3 forwarding entries with replication details and hardware programming status.
Examples
Showing detailed routing datapath information for the specified multicast flow:

switch# show ip multicast routing datapath group 225.20.0.1 source 20.0.0.2 port

vlan20

Multicast Routing Datapath Details

VRF

: default

Source

: 20.0.0.2/32

Group

: 225.20.0.1/32

Primary Upstream Interface : vlan20

From

: pim_sm

Type

: route

Replication Group Index : 38923

Hardware Status

: active

Error Code

: None

Retries for programming : 0

Upstream Interface

: vlan20

State

: forwarding

Replication Details:

L2 Ports

State

-----------

----------

1/1/4

forwarding

Downstream Interface

: vlan30

State

: forwarding

Replication Details:

L2 Ports

State

-----------

----------

1/1/1

forwarding

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1561

Downstream Interface

: vlan40

State

: forwarding

Replication Details:

L2 Ports

State

-----------

----------

1/1/2

forwarding

1/1/3

forwarding

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.09.1000

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Multicast datapath commands for IPv4 | 1562

Chapter 91 Multicast datapath commands for IPv6

Multicast datapath commands for IPv6

show ipv6 multicast bridging datapath
show ipv6 multicast bridging datapath {group <GROUP-IP> {source <SOURCE-IP> {vlan <VLAN-ID>}}}[vrf <VRF_NAME>]]]] [vsx-peer]
Description
Displays the multicast bridge control forwarding entries on a device including replication details and hardware programming status. Displays bridging datapath details for the specified multicast flow (the group, source, VLAN, and VRF).

Parameter group <GROUP-IP> source <SOURCE-IP> vlan <VLAN-ID> vrf <VRF-NAME> vsx-peer

Description
Specifies a group IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. Shows bridging datapath details for the specified group.
Specifies a source IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. Shows bridging datapath details for the specified source.
Specifies a VLAN. Range 1 to 4094. Shows bridging datapath details for groups joined in the specified VLAN.
Specifies a VRF. Shows bridging datapath information for groups joined in the specified VRF. If the <VRF-NAME> is not specified, it shows the default VRF information.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
A multicast bridge control forwarding table comprises of the IP multicast destination address, source address and its association with a list of ports on which the multicast packets are replicated in a Layer 2 domain. The switch floods/ replicates the multicast packet on these ports by matching the multicast destination address, source address, and the virtual local network identifier (VLAN ID). The show ipv6 multicast bridging datapath command displays the multicast bridge control forwarding entries on a device including replication details and hardware programming status.
Examples
Showing detailed bridging datapath information for the specified multicast flow:

AOS-CX 10.14 Command-Line Interface Guide

1563

switch# show ipv6 multicast bridging datapath group ff03::0 source 1010:22::4 vlan

10

Multicast Bridging Datapath Details

VRF

: default

Source

: 1010:22::4/128

Group

: ff03::/128

Replication Group Index : 70

Hardware Status

: active

Error Code

: None

Retries for programming : 0

Vlan

: VLAN10

State

: forwarding

Replication Details:

L2 Ports

State

-----------

----------

1/1/6

forwarding

1/1/7

forwarding

VNI

: vni1000

State

: operational

Replication Details:

Tunnel Endpoints

State

----------------

----------

2.2.2.2

operational

4.4.4.4

operational

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.09.1000

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 multicast routing datapath
show ipv6 multicast routing datapath {group <GROUP-IP> {source <SOURCE-IP> {port <INCOMING-PORT>}}} [vrf <VRF_NAME>] [vsx-peer]
Description
Displays the multicast Layer 3 forwarding entries with replication details and hardware programming status. Displays routing datapath details for the specified multicast flow (group, source, incoming port, and VRF).

Multicast datapath commands for IPv6 | 1564

Parameter group <GROUP-IP>
source <SOURCE-IP>
port <INCOMING-PORT> vrf <VRF-NAME>
vsx-peer

Description
Specifies a group IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. Shows datapath details for the specified group.
Specifies a source IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. Shows datapath details for the specified source.
Specifies the incoming port. Shows datapath details for the specified port.
Specifies a VRF. Shows datapath information for groups joined in the specified VRF. If the <VRF-NAME> is not specified, it shows the default VRF information.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
A multicast routing protocol such as PIM populates the multicast Layer 3 forwarding table and forwards multicast traffic to clients throughout the network. A multicast forwarding table comprises of the IP multicast destination address, source address, interface on which the traffic is received, and the list of interfaces on which multicast traffic is replicated. The show ipv6 multicast routing datapath command displays the multicast Layer 3 forwarding entries with replication details and hardware programming status.
Examples
Showing detailed routing datapath information for the specified multicast flow:

switch# show ip multicast routing datapath group 225.20.0.1 source 20.0.0.2 port

vlan20

Multicast Routing Datapath Details

VRF

: default

Source

: 20.0.0.2/32

Group

: 225.20.0.1/32

Primary Upstream Interface : vlan20

From

: pim_sm

Type

: route

Replication Group Index : 38923

Hardware Status

: active

Error Code

: None

Retries for programming : 0

Upstream Interface

: vlan20

State

: forwarding

Replication Details:

L2 Ports

State

-----------

----------

1/1/4

forwarding

Downstream Interface

: vlan30

State

: forwarding

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1565

Replication Details:

L2 Ports

State

-----------

----------

1/1/1

forwarding

Downstream Interface

: vlan40

State

: forwarding

Replication Details:

L2 Ports

State

-----------

----------

1/1/2

forwarding

1/1/3

forwarding

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.09.1000

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Multicast datapath commands for IPv6 | 1566

Chapter 92 Static Route commands

Static Route commands

ip multicast-static-route
ip multicast-static-route <INCOMING-INTERFACE-NAME> {<SOURCE-ADDRESS | ANY>} <GROUPADDRESS> [<OUTGOING-INTERFACE-NAME>] vrf <VRF-NAME> no ip multicast-static-route <INCOMING-INTERFACE-NAME> {<SOURCE-ADDRESS | ANY>} <GROUPADDRESS> [<OUTGOING-INTERFACE-NAME>] vrf <VRF-NAME>
Description
Configures a multicast static route for (source, group) on an incoming interface with outgoing interface (s) not involving L3VNI. If a vrf is not specified, default vrf is used. The no form of this command removes the configuration.

Parameter <INCOMING-INTERFACE-NAME>

Description Specifies the multicast stream incoming interface name.

<SOURCE-ADDRESS>

Selects the IPv4 source address.

<ANY>

Selects any source address.

<GROUP-ADDRESS>

Specifies the IPv4 multicast group address.

<OUTGOING-INTERFACE-NAME>

Specifies the outgoing interface name.

vrf <VRF-NAME>

Configures the specified VRF. The default is default vrf.

Usage
If the incoming interface is attached to different vrf than the vrf spcified in the multicast static route command, route will be made inactive. If the vrf mismatch occurs for the outgoing interface, that particular outgoing interface will be made inactive. If no outgoing interface is specified, the multicast traffic is not routed and is bridged on the interface (SVI) on which the traffic is received.
Examples
Configuring Multicast Static Route with a outgoing interface:

switch(config)# ip multicast-static-route vlan10 10.10.1.2 239.255.255.250 vlan20

Removing the configured Multicast Static Route with a outgoing interface:

AOS-CX 10.14 Command-Line Interface Guide

1567

switch(config)# no ip multicast-static-route vlan10 10.10.1.2 239.255.255.250 vlan20
Configuring Multicast Static Route without an outgoing interface to bridge traffic only in incoming interface in default vrf:
switch(config)# ip multicast-static-route vlan30 30.30.1.2 239.255.255.250
Removing the configured Multicast Static Route without an outgoing interface to bridge traffic only in incoming interface in default vrf:
switch(config)# no ip multicast-static-route vlan30 30.30.1.2 239.255.255.250
Configuring Multicast Static Route without an outgoing interface to bridge traffic only in incoming interface in non-default vrf:
switch(config)# ipv6 multicast-static-route vlan30 30.30.1.2 239.255.255.250 vrf red
Removing the configured Multicast Static Route without an outgoing interface to bridge traffic only in incoming interface in non-default vrf:
switch(config)# ipv6 multicast-static-route vlan30 30.30.1.2 239.255.255.250 vrf red
Configuring Multicast Static Route with multiple outgoing interfaces:
switch(config)# ip multicast-static-route vlan40 40.40.1.2 239.255.255.250 vlan50 vrf red switch(config)# ip multicast-static-route vlan40 40.40.1.2 239.255.255.250 vlan60 vrf red switch(config)# ip multicast-static-route vlan40 40.40.1.2 239.255.255.250 1/1/1 vrf red
Removing configured Multicast Static Route with multiple outgoing interfaces:
switch(config)# no ip multicast-static-route vlan40 40.40.1.2 239.255.255.250 vlan60 vrf red switch(config)# no ip multicast-static-route vlan40 40.40.1.2 239.255.255.250 vrf red
Configuring Static (\*, Group) Multicast Route with multiple outgoing interfaces:
switch(config)# ip multicast-static-route vlan50 any 239.255.255.250 vlan70 vrf red switch(config)# ip multicast-static-route vlan50 any 239.255.255.250 vlan80 vrf red
Removing configured Static (\*, Group) Multicast Route with multiple outgoing interfaces:
Static Route commands | 1568

switch(config)# no ip multicast-static-route vlan50 any 239.255.255.250 vlan70 vrf red switch(config)# no ip multicast-static-route vlan50 any 239.255.255.250 vlan80 vrf red

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ip multicast-static-route (l3vni)
ip multicast-static-route <INCOMING-INTERFACE-NAME> {<SOURCE-ADDRESS | ANY>} <GROUPADDRESS> vrf <VRF-NAME> ip multicast-static-route <VXLAN1> {<SOURCE-ADDRESS | ANY>} <GROUP-ADDRESS> [<OUTGOINGINTERFACE-NAME>]vrf <VRF-NAME> no ip multicast-static-route <INCOMING-INTERFACE-NAME> {<SOURCE-ADDRESS | ANY>} <GROUPADDRESS> vrf <VRF-NAME> no ip multicast-static-route {<SOURCE-ADDRESS | ANY>} <GROUP-ADDRESS> [<OUTGOINGINTERFACE-NAME>]vrf <VRF-NAME>
Description
Configures a multicast static route for (source, group) involving L3VNI tunnels. If a vrf is not specified, default vrf is used. The no form of this command removes the configuration.

Parameter <INCOMING-INTERFACE-NAME>

Description Specifies the multicast stream incoming interface name.

<SOURCE-ADDRESS>

Selects the IPv4 source address.

<ANY>

Selects any source address.

<GROUP-ADDRESS>

Specifies the IPv4 multicast group address.

<OUTGOING-INTERFACE-NAME>

Specifies the outgoing interface name.

vrf <VRF-NAME>

Configures the specified VRF. The default is default vrf.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1569

Usage
If the incoming interface is attached to different vrf than the vrf spcified in the multicast static route command, route will be made inactive. If the vrf mismatch occurs for the outgoing interface, that particular outgoing interface will be made inactive.
Examples
Configuring Multicast Static Route with L2VN1 to SVI:
switch(config)# ip multicast-static-route vlan10 10.10.1.2 239.255.255.250 vlan30

Removing the configured Multicast Static Route with L2VN1 to SVI:
switch(config)# no ip multicast-static-route vlan10 10.10.1.2 239.255.255.250 vlan30

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ipv6 multicast-static-route
ipvy multicast-static-route <INCOMING-INTERFACE-NAME> {<SOURCE-ADDRESS | ANY>} <GROUPADDRESS> [<OUTGOING-INTERFACE-NAME>] vrf <VRF-NAME> no ipv6 multicast-static-route <INCOMING-INTERFACE-NAME> {<SOURCE-ADDRESS | ANY>} <GROUPADDRESS> [<OUTGOING-INTERFACE-NAME>] vrf <VRF-NAME>
Description
Configures a multicast static route for (source, group) on an incoming interface with outgoing interface (s) not involving L3VNI. If a vrf is not specified, default vrf is used. The no form of this command removes the configuration.

Parameter <INCOMING-INTERFACE-NAME>

Description Specifies the multicast stream incoming interface name.

<SOURCE-ADDRESS>

Selects the IPv6 source address.

Static Route commands | 1570

Parameter <ANY>

Description Selects any source address.

<GROUP-ADDRESS>

Specifies the IPv6 multicast group address.

<OUTGOING-INTERFACE-NAME>

Specifies the outgoing interface name.

vrf <VRF-NAME>

Configures the specified VRF. The default is default vrf.

Usage
If the incoming interface is attached to different vrf than the vrf spcified in the multicast static route command, route will be made inactive. If the vrf mismatch occurs for the outgoing interface, that particular outgoing interface will be made inactive.
Examples
Configuring Multicast Static Route with a outgoing interface:

switch(config)# ipv6 multicast-static-route vlan10 2001::1 ff02::c vlan20

Removing the configured Multicast Static Route with a outgoing interface:
switch(config)# no ipv6 multicast-static-route vlan10 2001::1 ff02::c vlan20
Configuring Static (\*, Group) Multicast Route with multiple outgoing interfaces:
switch(config)# ipv6 multicast-static-route vlan50 any ff0e::c vlan70 vrf red switch(config)# ipv6 multicast-static-route vlan50 any ff0e::c vlan80 vrf red
Removing configured Static (\*, Group) Multicast Route with multiple outgoing interfaces:
switch(config)# no ipv6 multicast-static-route vlan50 any ff0e::c vlan70 vrf red switch(config)# no ipv6 multicast-static-route vlan50 any ff0e::c vlan80 vrf red

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1571

ipv6 multicast-static-route (l3vni)
ipv6 multicast-static-route <INCOMING-INTERFACE-NAME> {<SOURCE-ADDRESS | ANY>} <GROUPADDRESS> vrf <VRF-NAME> ipv6 multicast-static-route {<SOURCE-ADDRESS | ANY>} <GROUP-ADDRESS> [<OUTGOINGINTERFACE-NAME>]vrf <VRF-NAME> no ipv6 multicast-static-route <INCOMING-INTERFACE-NAME> {<SOURCE-ADDRESS | ANY>} <GROUPADDRESS> vrf <VRF-NAME> no ipv6 multicast-static-route {<SOURCE-ADDRESS | ANY>} <GROUP-ADDRESS> [<OUTGOINGINTERFACE-NAME>]vrf <VRF-NAME>
Description
Configures a multicast static route for (source, group) involving L3VNI tunnels. If a vrf is not specified, default vrf is used. The no form of this command removes the configuration.

Parameter <INCOMING-INTERFACE-NAME>

Description Specifies the multicast stream incoming interface name.

<SOURCE-ADDRESS>

Selects the IPv6 source address.

<ANY>

Selects any source address.

<GROUP-ADDRESS>

Specifies the IPv6 multicast group address.

<OUTGOING-INTERFACE-NAME>

Specifies the outgoing interface name.

vrf <VRF-NAME>

Configures the specified VRF. The default is default vrf.

Usage
If the incoming interface is attached to different vrf than the vrf spcified in the multicast static route command, route will be made inactive. If the vrf mismatch occurs for the outgoing interface, that particular outgoing interface will be made inactive.
Examples
Configuring Multicast Static Route with L2VN1 to SVI:

switch(config)# ipv6 multicast-static-route vlan10 2001::1 ff02::c vlan30

Removing the configured Multicast Static Route with L2VN1 to SVI: switch(config)# no ipv6 multicast-static-route vlan10 2001::1 ff02::c vlan30

Command History

Static Route commands | 1572

Release 10.11

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced.
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

redistribute static
redistribute static no redistribute static
Description
Exports all static multicast routes configured on a VRF to the corresponding PIM router. The no form of this command disables the redistribution.
Usage
Static multicast routes give the flexibility to program a specific path for multicast traffic from the source to the client without having to rely on the underlying protocols to build a multicast route. They can be configured on all the routers in the path or on a specific section of routers. The remaining section of routers can be configured to run the native PIM protocol. In such cases, the static multicast route is exported to PIM domain as PIM joins using this command.
Examples
Configuring redistribute static routes to PIM for IPv4:
switch(config)# router pim switch(config-pim)# redistribute static
Disabling redistribute static routes to PIM for IPv4:
switch(config)# router pim switch(config-pim)# no redistribute static
Configuring redistribute static routes to PIM for IPv4 on vrf red:
switch(config)# router pim vrf red switch(config-pim)# redistribute static
Disabling redistribute static routes to PIM for IPv4 on vrf red:
switch(config)# router pim vrf red switch(config-pim)# no redistribute static

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1573

Configuring redistribute static routes to PIM for IPv6:

switch(config)# router pim6 switch(config-pim)# redistribute static

Disabling redistribute static routes to PIM for IPv6:

switch(config)# router pim6 switch(config-pim)# no redistribute static

Configuring redistribute static routes to PIM for IPv6 on vrf red:

switch(config)# router pim6 vrf red switch(config-pim)# redistribute static

Disabling redistribute static routes to PIM for IPv6 on vrf red:

switch(config)# router pim6 vrf red switch(config-pim)# no redistribute static

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-pim

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show capacities multicast static route
show capacities multicast-static-route show capacities-status multicast-static route
Description
Displays the maximum number of IPv4 and IPv6 static multicast routes that can be configured on the devices.
Examples
Displaying the maximum number of multicast static routes configured on the device:

Static Route commands | 1574

switch# show capacities static-multicast-route

System Capacities: Filter Static Multicast Route

Capacities Name

Value

----------------------------------------------------------------------------------

---

Maximum number of IPv4/IPv6 Static multicast nexthops supported

65536

Maximum number of IPv4/IPv6 Static multicast routes supported

4096

Maximum number of IPv4/IPv6 Summarized static multicast routes supported 1024

switch# show capacities-status static-multicast-route

System Capacities Status: Filter Static Multicast Route

Capacities Status Name

Value Maximum

----------------------------------------------------------------------------------

---

Number of IPv4/IPv6 Static multicast nexthops

10

65536

Number of IPv4/IPv6 Static multicast routes

33

4096

Number of IPv4/IPv6 Summarized static multicast routes 6

1024

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip multicast-static-route
show ip multicst-static-route [all vrfs | vrf <VRF-NAME>]
Description
Displays the multicast static route and corresponding summarized route information for the specified VRF. If VRF is not specified, the default VRF is displayed.

Parameter [all vrfs] [vrf <VRF-NAME>]

Description Selects all VRFs to display. Specifies the VRF to display. The default is default vrf.

Examples
Displaying the multicast static route and corresponding summarized route information for all vrfs:

switch# show ip multicast-static-route all-vrfs VRF : red

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1575

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vlan10

forwarding

VRF : blue

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vlan20

forwarding

vlan30

forwarding

: 239.255.255.250 : 40.40.40.2 : Static : 1/1/2 :
: 239.255.255.250 : Any : Static-Summarized : 1/1/3 :

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip multicast-static-route detail
show ip multicst-static-route <GROUP-ADDRESS> {<SOURCE-ADDRESS | ANY>} detail [all vrfs | vrf <VRF-NAME>]
Description
Displays the multicast static route and corresponding summarized route information for the given group address in the given VRF detail. If VRF is not specified, the default VRF is displayed.

Parameter <GROUP-ADDRESS> <SOURCE-ADDRESS> <ANY>

Description Specifies the group address. Specifies the source address. Selects any source address.

Static Route commands | 1576

Parameter [all vrfs] [vrf <VRF-NAME>]

Description Selects all VRFs to display. Specifies the VRF to display. The default is default vrf.

Examples
Displaying the multicast static route information for a specific group:

switch# show ip multicast-static-route 239.255.255.250 40.40.40.3 detail vrf red

VRF : red

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vni1000

forwarding

: 239.255.255.250 : 40.40.40.2 : Static : 1/1/2 : Vteps ----2.2.2.2, 3.3.3.3

Displaying the multicast static route information for any group on vrf red:

switch# show ip multicast-static-route 239.255.255.250 any detail vrf red VRF : red

Group Address Source Address Route type Incoming interface Outgoing Interface List

: 239.255.255.250 : Any : Static : 1/1/2 :

Interface --------vni1000

State ----forwarding

Vteps ----2.2.2.2, 3.3.3.3

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip multicast-static-route (group)

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1577

show ip multicast-static-route <GROUP-ADDRESS> {<SOURCE-ADDRESS | ANY>} [all vrfs | vrf <VRF-NAME>]
Description
Displays the multicast static route and corresponding summarized route information for the given group address in the given VRF briefly. If VRF is not specified, the default VRF is displayed.

Parameter <GROUP-ADDRESS> <SOURCE-ADDRESS> <ANY> [all vrfs] [vrf <VRF-NAME>]

Description Specifies the group address. Specifies the source address. Selects any source address. Selects all VRFs to display. Specifies the VRF to display. The default is default vrf.

Examples
Displaying the multicast static route information for all vrfs:

switch# show ip multicast-static-route 239.255.255.250 all-vrfs

VRF : red

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vlan10

forwarding

: 239.255.255.250 : 40.40.40.2 : Static : 1/1/2 :

VRF : blue

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vlan20

forwarding

vlan30

forwarding

: 239.255.255.250 : Any : Static-summarized : 1/1/3 :

Displaying the multicast static route information for a specific group on vrf red:

switch# show ip multicast-static-route 239.255.255.250 40.40.40.4 vrf red VRF : red

Group Address Source Address Route type Incoming interface

: 239.255.255.250 : Any : Static : 1/1/2

Static Route commands | 1578

Outgoing Interface List

:

Interface

State

---------

-----

vlan10

forwarding

Displaying the multicast static route information for a specific group and source :

switch# show ip multicast-static-route 239.255.255.250 40.40.40.2 all-vrfs VRF : red

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vlan10

forwarding

: 239.255.255.250 : 40.40.40.2 : Static : 1/1/2 :

VRF : blue

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vlan20

forwarding

vlan30

forwarding

: 239.255.255.250 : 40.40.40.2 : Static : vlan40 :

Displaying the multicast static route information for a specific group and any source :

switch# show ip multicast-static-route 239.255.255.250 any all-vrfs VRF : red

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vlan10

forwarding

: 239.255.255.250 : Any : Static-summarized : 1/1/2 :

VRF : blue

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vlan20

forwarding

vlan30

forwarding

: 239.255.255.250 : Any : Static-summarized : vlan40 :

Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1579

Release 10.11

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced.
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 multicast-static-route
show ipv6 multicast-static-route [all vrfs | vrf <VRF-NAME>]
Description
Displays the multicast static route and corresponding summarized route information for the specified VRF. If VRF is not specified, the default VRF is displayed.

Parameter [all vrfs] [vrf <VRF-NAME>]

Description Selects all VRFs to display. Specifies the VRF to display. The default is default vrf.

Examples
Displaying the multicast static route and corresponding summarized route information for all vrfs:

switch# show ipv6 multicast-static-route all-vrfs

VRF : red

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vlan10

forwarding

: ff0e::c : 2001::2 : Static : vlan200 :

VRF : blue

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

----------

vlan10

forwarding

: ff0e::c : Any : Static-Summarized : vlan200 :

Displaying the multicast static route information for a specific group:

Static Route commands | 1580

switch# show ipv6 multicast-static-route ff0e::c all-vrfs

VRF : red

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vlan10

forwarding

: ff0e::c : 2001::2 : Static : vlan200 :

VRF : blue

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

----------

vlan10

forwarding

: ff0e::c : Any : Static-Summarized : vlan200 :

Displaying the multicast static route information for a specific group and source:

switch# show ipv6 multicast-static-route ff0e::c 2001::2 all-vrfs

VRF : red

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vlan10

forwarding

: ff0e::c : 2001::2 : Static : vlan100 :

VRF : blue

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

----------

vlan10

forwarding

: ff0e::c : 200::2 : Static : vlan200 :

Displaying the multicast static route information for a specific group and any source:

switch# show ipv6 multicast-static-route ff0e::c any all-vrfs

VRF : red

Group Address Source Address Route type

: ff0e::c : Any : Static-summarized

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1581

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vlan10

forwarding

VRF : blue

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

----------

vlan10

forwarding

: 1/1/3 :
: ff0e::c : Any : Static-summarized : vlan200 :

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 multicast-static-route (group)
show ipv6 multicst-static-route <GROUP-ADDRESS> {<SOURCE-ADDRESS | ANY>} [all vrfs | vrf <VRF-NAME>]
Description
Displays the multicast static route and corresponding summarized route information for the given group address in the given VRF briefly. If VRF is not specified, the default VRF is displayed.

Parameter <GROUP-ADDRESS> <SOURCE-ADDRESS> <ANY> [all vrfs] [vrf <VRF-NAME>]

Description Specifies the group address. Specifies the source address. Selects any source address. Selects all VRFs to display. Specifies the VRF to display. The default is default vrf.

Examples
Displaying the multicast static route information for a specific group:

Static Route commands | 1582

switch# show ipv6 multicast-static-route ff0e::c 2002::2 vrf red

VRF : red

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vlan10

forwarding

: ff0e::c : 2002::2 : Static : 1/1/2 :

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 multicast-static-route detail
show ipv6 multicast-static-route <GROUP-ADDRESS> {<SOURCE-ADDRESS | ANY>} detail [all vrfs | vrf <VRF-NAME>]
Description
Displays the multicast static route and corresponding summarized route information for the given group address in the given VRF detail. If VRF is not specified, the default VRF is displayed.

Parameter <GROUP-ADDRESS> <SOURCE-ADDRESS> <ANY> [all vrfs] [vrf <VRF-NAME>]

Description Specifies the group address. Specifies the source address. Selects any source address. Selects all VRFs to display. Specifies the VRF to display. The default is default vrf.

Examples
Displaying the multicast static route information for a specific group:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1583

switch# show ipv6 multicast-static-route ff0e::c 2002::2 detail vrf red VRF : red

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vni1000

forwarding

: ff0e::c : 2002:2 : Static : 1/1/2 : Vteps ----2.2.2.2, 3.3.3.3

Displaying the multicast static route information for any group on vrf red:

switch# show ipv6 multicast-static-route ff0e::c any detail vrf red VRF : red

Group Address

Source Address

Route type

Incoming interface

Outgoing Interface List

Interface

State

---------

-----

vni1000

forwarding

: ff0e::c : Any : Static : 1/1/2 : Vteps ----2.2.2.2, 3.3.3.3

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config
show running-config
Description
Displays the running configuration.
Examples
Displaying the running configuration:
switch# show running-config !

Static Route commands | 1584

--------------------ip multicast-static-route vlan10 10.10.1.2 239.255.255.250 vlan20 ip multicast-static-route vlan10 10.10.1.2 239.255.255.250 1/1/2 ip multicast-static-route vlan21 any 239.255.255.250 1/1/2 ip multicast-static-route vlan30 10.10.1.2 239.255.255.250 1/1/16 vrf red ip multicast-static-route 1/1/1 10.10.1.2 239.255.255.250 1/1/2 ipv6 multicast-static-route vlan10 2001::1 ff02::c vlan20 ipv6 multicast-static-route vlan50 any ff0e::c vlan70 vrf red ipv6 multicast-static-route vlan50 any ff0e::c vlan80 vrf red ipv6 multicast-static-route vlan10 2001::1 ff02::c vlan20 ipv6 multicast-static-route vlan10 2001::1 ff02::c 1/1/1

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1585

Chapter 93 MVRP commands

MVRP commands

clear mvrp statistics
clear mvrp statistics [<PORT-NUM> | <PORT-LIST> | LAG <LAG-NUM>]
Description
Resets the MVRP statistic counters globally or for the specified ports or LAG.

Parameter <PORT-NUM> <PORT-LIST> LAG <LAG-NUM>

Description Specifies a port number. Specifies a list of ports. Specifies a Link Aggregation number. Range: 1 to 128.

Examples
On the 6400 Switch Series, interface identification differs.

switch# clear mvrp statistics 1/1/1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

mvrp
mvrp no mvrp

AOS-CX 10.14 Command-Line Interface Guide

1586

Description
Enables the MVRP feature globally or on a specific interface. By default, MVRP is disabled. The no form of this command disables MVRP.
MVRP and VLAN translation cannot be enabled on the same interface.
Examples
On the 6400 Switch Series, interface identification differs. Enabling MVRP globally:
switch(config)# mvrp
Enabling MVRP on an interface:
switch(config)# interface 1/1/1 switch(config-if)# mvrp

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

mvrp registration
mvrp registration {normal | fixed | forbidden [<VLAN-LIST>]} no mvrp registration forbidden {<VLAN-LIST>}
Description
Configures the MVRP registrar state which determines how an MVRP participant responds to MRP messages. The default registration mode is normal. The no command removes the specified VLANs from the forbidden list.

MVRP commands | 1587

Parameter normal fixed forbidden <VLAN-LIST>

Description
Enables dynamic registration and deregistration of VLANs on the interface, and propagates VLAN information to other switches on the network. Default.
Disables dynamic deregistration of VLANs and drops received MVRP frames. The interface does not deregister dynamic VLANs or register new dynamic VLANs.
Disables dynamic registration of VLANs and drops received MVRP frames. The MVRP participant does not register new dynamic VLANs or re-register a deregistered dynamic VLAN.
Disables dynamic registration of VLANs and drops received MVRP frames for specific VLANs only. Normal behavior applies to all other VLANs. Specify the number of a single VLAN, or a series of numbers for a range of VLANs, separated by commas (1, 2, 3, 4), dashes (1-4), or both (1-4,6).

Examples

switch(config)# switch(config-if)# mvrp registration forbidden 10

switch(config-if)# mvrp registration fixed

switch(config-if)# mvrp registration forbidden 1,2,10-20

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

mvrp timer
mvrp timer {join | leave | leaveall | periodic} <TIME> no mvrp timer {join | leave | leaveall | periodic}
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1588

Sets an MVRP timer. The no form of this command sets the specified timer to its default value.

Parameter join <TIME>
leave <TIME>
leaveall <TIME> periodic <TIME>

Description
Sets the join timer. You can use the timer to space MVRP join messages. To ensure that join messages are transmitted to other participants, an MRP participant waits for the specified period of the join timer before sending a join message. The Join timer must be less than half of the Leave Timer. Range: 20 to 100 in centiseconds. Default: 20.
Sets the leave timer for the port, specifying the time that the registrar state machine waits in the LV state before transiting to the MT state. The leave timer must be at least twice the join timer and must be less than the leave all timer. Range: 40 - 1000000 centiseconds. Default: 300 centiseconds.
Sets the leave all timer for the port, specifying the frequency with which the leave all state machine generates leave alll PDUs. Range: 500 to1000000 centiseconds. Default: 1000.
Sets the periodic timer for the port, specifying the frequency with which the periodic transmission state machine generates periodic events. The periodic timer is set to 1 second when it is started. Range: 100 to 1000000 centiseconds. Default: 100.

Examples

switch(config-if)# mvrp timer join 22

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

show mvrp config
show mvrp config [<PORT-NUM> | <PORT-LIST> | LAG <LAG-NUM>] [vsx-peer]
Description

MVRP commands | 1589

Displays the MVRP configuration for all L2 ports or optionally for the ports specified.

Parameter <PORT-NUM> <PORT-LIST> LAG <LAG-NUM> vsx-peer

Description
Specifies displaying information for a particular port number.
Specifies displaying information for a list of ports.
Specifies displaying information by LAG. Range: 1 to 128.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs.

switch# show mvrp config

Configuration and Status - MVRP

Global MVRP status : Disabled

Port Status Registration Join Leave LeaveAll Periodic

Type

Timer Timer Timer Timer

------- -------- --------

----- ----- ------ --------

1/1/1 Disabled Normal

20 300 1000

100

1/1/2 Disabled Normal

20 300 1000

100

1/1/3 Disabled Normal

20 300 1000

100

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mvrp state
show mvrp state [<VLAN-ID> | <VLAN-ID> <PORT-NUM>] [vsx-peer]
Description
Displays the MVRP Registrar and Applicant state machine information for all ports on which MVRP is enabled, or for specific ports.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1590

Parameter <VLAN-ID> <PORT-NUM>
vsx-peer

Description
Specifies the number of a VLAN.
Specifies a physical port on the switch. Forrmat: member/slot/port.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs.

switch# show mvrp state 1

Configuration and Status - MVRP state for VLAN 1

Port VLAN Registrar Applicant

State

State

---- ---- -------- ---------

1/1/1 1 MT

QA

switch# show mvrp state 10 1/1/1

Configuration and Status - MVRP state for VLAN 10

Port VLAN Registrar Applicant Forbid

State

State

Mode

---- ---- --------- --------- ---------

1/1/1 10 MT

LO

Yes

switch#

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mvrp statistics
show mvrp statistics [<PORT-LIST>] [vsx-peer]
Description

MVRP commands | 1591

Displays MVRP statistics for all ports or on the ports specified in the list.

Parameter <PORT-LIST>
vsx-peer

Description
Specifies a list of ports. When specifying a list of ports, the ports for which there are no statistics will be listed in the output.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs.

switch# show mvrp statistics

Status and Counters - MVRP

MVRP statistics for port : 1/1/1

----------------------------

Failed registration : 0

Last PDU origin

: 48:0f:cf:af:b1:76

Total PDU Transmitted : 13127

Total PDU Received : 327

Frames Discarded

:0

Message type Transmitted

Received

-------------- ------------ ------------

New

0

0

Empty

50029394

1264

In

0

4

Join Empty

1425

48

Join In

563

555

Leave

0

0

Leaveall

12218

25

switch# show mvrp statistics 1/1/1

Status and Counters - MVRP

MVRP statistics for port : 1/1/1

----------------------------

Failed registration : 0

Last PDU origin

: 48:0f:cf:af:b1:76

Total PDU Transmitted : 14874

Total PDU Received : 327

Frames Discarded

:0

Message type Transmitted

Received

-------------- ------------ ------------

New

0

0

Empty

57181612

1264

In

0

4

Join Empty

1425

48

Join In

563

555

Leave

0

0

Leaveall

13965

25

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1592

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

MVRP commands | 1593

Chapter 94 ND snooping commands

ND snooping commands

clear nd-snooping binding
clear nd-snooping bindings {all | ipv6 <IPV6-ADDR> vlan <VLAN-ID> | port <PORT-NUM> | vlan <VLAN-ID>}
Description
Clears ND snooping binding entries.
Command context

Parameter all ip <IPV6-ADDR> vlan <VLAN-ID>
port <PORT-NUM>
vlan <VLAN-ID>

Description
Specifies that all ND binding information is to be cleared.
Specifies the IPv6 address and VLAN for which all ND binding information is to be cleared.
Specifies the port (interface) for which all ND binding information is to be cleared.
Specifies the VLAN for which all ND binding information is to be cleared. Range: 1 to 4094.

Examples
On the 6400 Switch Series, interface identification differs. Clearing all ND binding information for 5000::1 vlan 1:

switch(config)# clear nd-snooping bindings ipv6 5000::1 vlan 1

Clearing all ND binding information for port 1/1/10:

switch(config)# clear nd-snooping bindings port 1/1/10

Clearing all ND binding information for VLAN 10:

switch(config)# clear nd-snooping bindings vlan 10

Clearing all ND binding information:

switch(config)# clear nd-snooping bindings all

AOS-CX 10.14 Command-Line Interface Guide

1594

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

clear nd-snooping ra-guard-policy statistics
clear nd-snooping ra-guard-policy statistics [vlan <VLAN-ID>]|[interface <IFNAME>]
Description
Clear all RA Guard policy statistics from the specified interface or VLAN.
Command context

Parameter vlan <VLAN-ID> interface <IFNAME>

Description Clear all RA Guard policy information on the specified VLAN Clear all RA Guard policy information on the specified interface

Examples
Clear all RA Guard policy statistics for VLAN 10:

switch# clear nd-snooping ra-guard-policy statistics vlan 10

Clear all RA Guard policy statistics for interface 1/1/10

switch# clear nd-snooping ra-guard-policy statistics interface 1/1/10

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

ND snooping commands | 1595

Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

clear nd-snooping statistics
clear nd-snooping statistics
Description
Clears all ND snooping statistics.
Examples
Clear all ND snooping statistics:
switch# clear nd-snooping statistics

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

diag-dump nd-snooping basic
diag-dump nd-snooping basic
Description
This command displays information about the ND-Snooping configuration and runtime context.
Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1596

The following example displays sample output for this command.

switch# diag-dump nd-snooping basic ========================================================================= [Start] Feature nd-snooping Time : Tue Mar 29 02:53:59 2022 ========================================================================= ------------------------------------------------------------------------[Start] Daemon ipsavd ------------------------------------------------------------------------Feature nd-snooping:

Global ND snoop = ENABLED ND snoop MAC check = ENABLED

VLAN ---1

ND-Snooping ----------ENABLED

ND-Guard -------ENABLED

RA-Guard -------ENABLED

RA-Guard-Log -----------DISABLED

RA-Drop ------DISABLED

Statistics Counter Name -----------ra_recd_on_trusted_port ra_drop_on_trusted_port ra_recd_on_untrusted_port rr_recd_on_trusted_port rr_recd_on_untrusted_port ns_recd_on_trusted_port ns_recd_on_untrusted_port ns_failed_mac_check ns_failed_prefix_check ns_failed_binding_limit ns_failed_nd_snoop_validation na_recd_on_trusted_port na_recd_on_untrusted_port na_failed_mac_check na_failed_prefix_check na_failed_binding_limit na_failed_nd_snoop_validation nd_invalid_packet_received total_nd_packets_dropped Pkts_to_refilter_interface Pkts_on_vxlan_tunnels_received Pkts_on_vxlan_tunnels_sent Pkts_on_vxlan_tunnels_dropped

Count ----0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0

Feature ipsavvxlan: Source IP VXLAN Socket

= 2.2.2.2 = 29

Feature remote-ipbinding:

Feature ipbinding: Storage

= DISABLED

Total count of lockdown entries = 0 Total count of IPv6 lockdown entries = 0

Displaying lease entries with (vid,mac) as key.

Total number of entries: 0

Leased IPv6 addr MAC

Vid Switch port

address IS_STATIC Lockdown

Lease time

Server IPv6

ND snooping commands | 1597

---------------- ------------------

-------- --------- --------

2000::2

11:22:32:44:55:66

0

Yes

2000::1

11:22:33:44:55:66

0

Yes

----1 1

------------ -----------

1/1/1

195

1/1/1

211

----------0 0

Displaying lease entries with (vid,ip) as key.

Total number of entries: 0

Leased IPv6 addr MAC

Vid Switch port Lease time

address IS_STATIC Lockdown

---------------- ------------------ ----- ------------ -----------

-------- --------- --------

2000::2

11:22:32:44:55:66 1

1/1/1

195

0

Yes

2000::1

11:22:33:44:55:66 1

1/1/1

211

0

Yes

Server IPv6 ----------0 0

Feature ipsavmac:

Feature ipsavvlan:

Vlan ID State VNI

Port map

------- ------- -------- --------

1

ENABLE -

1 420

7

ENABLE 100

3,4

100

ENABLE -

1

Feature ipsavport:

ISL Port Name =

Index

=0

Egress blocked port map

IPv6 Lockdown vidmap

= None =

Port Name --------1/1/10 1/1/8 1/1/26 1/1/27 1/1/14 1/1/25 1/1/17 1/1/18 1/1/28 1/1/23 1/1/24 1/1/11 1/1/13 1/1/16 1/1/22 1/1/5 1/1/9 1/1/12 1/1/15 1/1/20 1/1/4 1/1/7 1/1/21 1/1/1 1/1/6 1/1/19

Index ----10 8 26 27 14 25 17 18 28 23 24 11 13 16 22 5 9 12 15 20 4 7 21 1 6 19

Socket -----26 30 22 23 19 32 43 42 16 28 18 34 25 36 35 40 20 38 39 29 41 37 33 17 27 24

Trusted ------No No No No No No No No No No No No No No No No No No No No No No No No No No

Max Binding ----------16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384 16384

Lockdown -------No No No No No No No No No No No No No No No No No No No No No No No No No No

VID map ------1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1598

1/1/2

2

31

Yes

16384

No

1

1/1/3

3

21

No

16384

No

1

Feature ipsav:

* nd-snooping *

VID map

=1

Global Config

= ENABLED

State

= ENABLED

------------------------------------------------------------------------[End] Daemon ipsavd ------------------------------------------------------------------------========================================================================= [End] Feature nd-snooping ========================================================================= Diagnostic-dump captured for feature nd-snooping

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.12

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

nd-snooping
nd-snooping {enable|disable} no nd-snooping {enable|disable}
Description
Enables or disables ND snooping. ND snooping is disabled by default. ND snooping is not supported on the management interface.
Examples
Enabling ND snooping:
switch(config)# nd-snooping enable

ND snooping commands | 1599

Disabling ND snooping: switch(config)# nd-snooping disable

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

nd-snooping (in config-vlan context)
nd-snooping no nd-snooping
Description
Enables ND snooping in the config-vlan context. ND snooping is disabled by default for all VLANs. The no form of the command disables ND snooping on the specified VLAN, flushing all the IPv6 bindings learned for this VLAN since ND snooping was enabled for this VLAN.
Examples
Enabling ND snooping on VLAN 100:
switch(config)# vlan 100 switch(config-vlan-100)# nd-snooping switch(config-vlan-100)# exit switch(config)#
Disabling ND snooping on VLAN 100:
switch(config)# vlan 100 switch(config-vlan-100)# no nd-snooping switch(config-vlan-100)# exit switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1600

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

nd-snooping mac-check
nd-snooping mac-check no nd-snooping mac-check
Description
This command enables verification of the hardware address field in ND snooping packets. When enabled, the ICMPv6 target link layer address field and the source MAC address must be the same for packets received on untrusted ports or else the packets are dropped. This ND snooping MAC verification is enabled by default. The no form of the command disables ND snooping MAC verification.
Examples
Enabling ND snooping MAC verification:
switch(config)# nd-snooping mac-check
Disabling ND snooping MAC verification:
switch(config)# no nd-snooping mac-check

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ND snooping commands | 1601

nd-snooping prefix-list
nd-snooping prefix-list <IPV6-ADDR> no nd-snooping prefix-list <IPV6-ADDR>
Description
Configures the ND snooping prefix list for the selected VLAN and the specified IPv6 address prefix. ND snooping must be enabled both globally and on this VLAN before this prefix list configuration takes effect. The no form of this command removes the prefix list configuration for the selected VLAN and IPv6 address.

Parameter <IPV6-ADDR>

Description Specifies the IPv6 address.

Examples
Configuring ND snooping prefix-list on VLAN 1:

switch(config)# vlan 1 switch(config-vlan-1)# nd-snooping prefix-list 2001::1/64 switch(config-vlan-1)# exit switch(config)#

Remove configuration of ND snooping prefix-list on VLAN 100:

switch(config)# vlan 1 switch(config-vlan-1)# no nd-snooping prefix-list 2001::1/64 switch(config-vlan-1)# exit switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-vlan-<VLAN-ID>

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

nd-snooping max-bindings

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1602

nd-snooping max-bindings <MAX-BINDINGS> no nd-snooping max-bindings
Description
Sets the maximum number of ND bindings allowed on the selected interface. For all interfaces on which this command is not run, the default max bindings applies. The no form of the command reverts max bindings for the selected interface to its default.

Parameter <MAX-BINDINGS>

Description
Specifies the maximum number of ND bindings. You can use the show capacities command to see the maximum available for your switch model.

Examples
On the 6400 Switch Series, interface identification differs. Set the ND max bindings to 768 on interface 2/2/1:

switch(config)# interface 2/2/1 switch(config-if)# nd-snooping max-bindings 768 switch(config-if)# exit switch(config)#

Revert ND max bindings to its default on interface 2/2/1:

switch(config)# interface 2/2/1 switch(config-if)# no nd-snooping max-bindings switch(config-if)# exit switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

nd-snooping nd-guard
nd-snooping nd-guard no nd-snooping nd-guard

ND snooping commands | 1603

Description
This command enables ND guard on the selected VLAN. The no form of the command disables ND guard and deletes all the IPv6 bindings learned on the VLAN.
ND snooping must be enabled in both the global context and the config-vlan context before this command can be used.
Examples
Enabling ND snooping ND guard on VLAN 100:
switch(config)# nd-snooping enable switch(config)# vlan 100 switch(config-vlan-100)# nd-snooping nd-guard switch(config-vlan-100)# exit switch(config)#
Disabling ND snooping ND guard on VLAN 100:
switch(config)# vlan 100 switch(config-vlan-100)# no nd-snooping nd-guard switch(config-vlan-100)# exit switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

nd-snooping ra-guard
nd-snooping ra-guard [log] no nd-snooping ra-guard
Description
This command enables Routing Advertisement (RA) guard on the selected VLAN. When enabled, ingress Routing Advertisement (RA) and Routing Redirect (RR) packets on the selected VLAN are blocked on untrusted ports. The packets are forwarded when received on trusted ports. The no form of the command disables RA guard on the VLAN.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1604

ND snooping must be enabled in both the global context and the config-vlan context before this command can be used.

Parameter [log]

Description Logs messages along with drop functionality.

Examples
Enabling ND snooping RA guard on VLAN 100:

switch(config)# nd-snooping enable switch(config)# vlan 100 switch(config-vlan-100)# nd-snooping ra-guard switch(config-vlan-100)# exit switch(config)#

Enabling ND snooping RA guard on VLAN 100 with event logging on dropped packets:

switch(config)# nd-snooping enable switch(config)# vlan 100 switch(config-vlan-100)# nd-snooping ra-guard log switch(config-vlan-100)# exit switch(config)#

Disabling ND snooping RA guard on VLAN 100:

switch(config)# vlan 100 switch(config-vlan-100)# no nd-snooping ra-guard switch(config-vlan-100)# exit switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

nd-snooping ra-drop

ND snooping commands | 1605

nd-snooping ra-drop no nd-snooping ra-drop
Description
This command enables Routing Advertisement (RA) drop on the selected VLAN. When enabled, ingress RA packets on the selected VLAN are blocked on both trusted and untrusted ports. When disabled, RA packets are forwarded on the selected VLAN with ND snooping trusted port validation. RA drop is disabled by default.
ND snooping must be enabled in both the config context and the config-vlan context before this command can be used.
The no form of the command disables ND snooping RA drop on the selected VLAN.
Examples
Enabling ND snooping RA drop on VLAN 100:
switch(config)# nd-snooping enable vlan 100 switch(config-vlan-100)# nd-snooping ra-drop switch(config-vlan-100)# exit switch(config)#
Disabling ND snooping RA drop on VLAN 100:
switch(config)# vlan 100 switch(config-vlan-100)# no nd-snooping ra-drop switch(config-vlan-100)# exit switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

nd-snooping trust
nd-snooping trust no nd-snooping trust
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1606

Enables ND snooping trust on the selected interface (port). Only server packets received on trusted ports are forwarded. All the ports are untrusted by default. The no form of the command disables ND snooping trust on the selected port.
Examples
On the 6400 Switch Series, interface identification differs. Enabling ND snooping trust on interface 2/2/1:
switch(config)# interface 2/2/1 switch(config-if)# nd-snooping trust switch(config-if)# exit switch(config)#
Disabling ND snooping trust on interface 2/2/1:
switch(config)# interface 2/2/1 switch(config-if)# no nd-snooping trust switch(config-if)# exit switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

show nd-snooping
show nd-snooping [vlan <VLAN-ID>] [vsx-peer]
Description
Shows either all ND snooping configuration or the configuration for the specified VLAN.

Parameter vlan <VLAN-ID>
vsx-peer

Description
Specifies the VLAN for which the ND configuration is to be shown. Range: 1 to 4094.
Shows the output from the VSX peer switch. If the switches do not

ND snooping commands | 1607

Parameter

Description
have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. (Applies to the 6200, 6300, 6400, 8100, and 8360.) Showing all ND snooping configuration:

switch(config)# show nd-snooping

ND Snooping Information ========================

ND Snooping

: Enabled

ND Snooping Enabled VLANs

: 10

Trusted Port Bindings Enabled VLANs : 10

ND Guard Enabled VLANs

: 10

RA Guard Enabled VLANs

: 10

RA Drop Enabled VLANs

:

MAC Address Check

: Disabled

PORT TRUST MAX-BINDINGS CURRENT-BINDINGS

------- ------ ------------- -----------------

1/1/1 Yes

1/1/2 Yes

1/1/3 No

100

10

1/1/4 No

200

10

1/1/5 No

300

10

(Applies to the 6200, 6300, 6400, 8100, 8360.) Showing ND snooping configuration for VLAN 2:

switch(config)# show nd-snooping vlan 2

ND Snooping Information =======================

ND Snooping

: Enabled

MAC Address Check

: Disabled

Trusted Port Bindings : Enabled

ND Guard

: Enabled

RA Guard

: Disabled

RA Drop

: Disabled

PORT TRUST MAX-BINDINGS CURRENT-BINDINGS

------- ------ ------------- -----------------

1/1/1 Yes

1/1/2 Yes

1/1/3 No

100

10

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1608

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show nd-snooping binding
show nd-snooping bindings [vsx-peer]
Description
Shows the ND snooping binding configuration.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing the ND snooping binding configuration:

switch# show nd-snooping binding

PORT IPV6-ADDRESS

MAC-ADDRESS

VLAN TIME-

LEFT STATE

------- ---------------------------------------- ------------------ ----- ------

--- ---------

1/1/1 2001::1

00:00:0A:01:02:03 1

600

Valid

1/1/2 fe80::250:56ff:fe9a:143c

00:00:0B:01:02:03 2

-

Tentative

1/1/3 2001:1111:2222:3333:4444:5555:6666:7777 00:00:0C:01:02:03 4094 -

Testing

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

ND snooping commands | 1609

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show nd-snooping prefix-list
show nd-snooping prefix-list [vsx-peer]
Description
Shows the ND snooping prefix list information.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing the ND snooping prefix list information:

switch# show nd-snooping prefix-list

VLAN IPV6-ADDRESS-PREFIX

SOURCE

----- ------------------------------------------- --------

1

2001::/64

Static

4094 3001::/64

Dynamic

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show nd-snooping statistics

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1610

show nd-snooping statistics [vsx-peer]
Description
Shows the global ND snooping statistics.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
(Applies to the 6200, 6300, 6400, 8100, 8360.) Showing global ND snooping statistics:

switch(config)# show nd-snooping statistics

PACKET-TYPE ACTION REASON

COUNT

------------ -------- ----------------------------------------------- --------

RA

forward RA packets received on trusted port

20

RA

drop

RA packets received on untrusted port

45

NS

forward NS packets received on trusted port

52

NS

forward NS packets received on untrusted port

95

NS

drop

NS packets failed MAC check

14

NS

drop

NS packets failed Prefix check

12

NS

drop

NS packets failed on max-binding limit

0

NS

drop

NS packets failed ND snooping validation checks 20

NA

forward NA packets received on trusted port

17

NA

forward NA packets received on untrusted port

30

NA

drop

NA packets failed Prefix check

15

NA

drop

NA packets failed on max-binding limit

2

NA

drop

NA packets failed ND snooping validation checks 5

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ND snooping commands | 1611

Chapter 95 Network Analytics Engine commands

Network Analytics Engine commands
nae cli-authorization
nae cli-authorization no nae cli-authorization
Description
Configures the NAE agent action CLI commands to require authorization. By default, the NAE agent action CLI commands are subject to regular command authorization, including when TACACS+ is configured for authorization. Unless the configured authorization method allows the CLI commands sent by the NAE agent as user admin, the NAE agent action CLI commands will result in command failures. The no form of the command disables the authorization required for NAE agent action CLI commands.
Examples
Enabling authorization requirement for NAE agent action CLI commands:
switch(config)# nae cli-authorization
Disabling authorization requirement for NAE agent action CLI commands:
switch(config)# no nae cli-authorization

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History

Release 10.11

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

show nae-agent

AOS-CX 10.14 Command-Line Interface Guide

1612

show nae-agent [<AGENT-NAME>] [vsx-peer]
Description
Shows the details of the NAE Agent. If the agent name is specified, then shows the information details of the specified agent.

Parameter <AGENT-NAME>
vsx-peer

Description
Specifies the name of the agent. Length: 3 to 80 alphanumeric characters, including underscore (_).
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
The output of this command shows the following information about the Aruba Network Analytics Engine agents that are configured and enabled on the switch:

Parameter Agent Name Script Name Version Origin
Disabled
Status
Time series count Alerts count

Description
The name of the agent. Length: 3 through 80 characters.
The name of the script. Length: 3 through 80 characters. Example: memory_monitor
The version number of the script.
The origin of the script: n system: Indicates that the script is provided as part of the system software. n user: Indicates that a user loaded the script. n generated: Indicates that the agent is configured using the CLI.
Indicates whether the agent is disabled or enabled on the switch: n true: Indicates that the agent is disabled. n false: Indicates that the agent is enabled on the switch.
The current state of the agent. Status values are the following: n CRITICAL :The agent has encountered a critical error during execution. For information
about the error, see the Analytics Dashboard of the Web UI. n MAJOR: The agent has encountered a major error during execution. For information about
the error, see the Analytics Dashboard of the Web UI. n MINOR: The agent has encountered a minor error during execution. For information
about the error, see the Analytics Dashboard of the Web UI. n NORMAL: Indicates that the agent is actively monitoring network conditions and handling
events.
Number of time series associated with agent.
Number of alerts generated by the agent.

Network Analytics Engine commands | 1613

Parameter Rules Error Recent alerts

Description Number of Prometheus rules associated with the agent. Current error state of the agent. Lists the recent alerts.

Example
Showing the details of all the NAE agents existing in the switch:

switch# show nae-agent

----------------------------------------------------------------------------------

--------------------------------------------------------------------------

Agent Name

Script Name

Version

Origin Disabled Status Time Series Count Alerts Count Rules Error

----------------------------------------------------------------------------------

--------------------------------------------------------------------------

com.arubanetworks.monitor.agent

com.arubanetworks.monitor

1.0

user

true

UNKNOWN 0

0

0

NONE

interface_monitor.agent

interface_tx_rx_stats_monitor 2.3

user

true

UNKNOWN 168

10

36

NONE

com.arubanetworks.wildcard.vlan.agent com.arubanetworks.wildcard.vlan 1.0

user

false

UNKNOWN 0

0

0

ERROR

system_resource_monitor.default

system_resource_monitor

1.3

system false

NORMAL 6

23

10

NONE

event_monitor

event_monitor

NA

generated NA

NA

0

0

0

Script

activation is pending

cpu_monitor

cpu_monitor

NA

generated NA

NA

0

0

0

Script

generation is in progress

mem_monitor

mem_monitor

NA

generated NA

NA

0

0

0

Script

validation is in progress

interface_monitor

interface_monitor

NA

generated NA

NA

0

0

0

Agent

creation is in progress

port_monitor

port_monitor

NA

generated NA

NA

0

0

0

Agent

updation is in progress

Showing the details of the NAE agent named memory_monitor:

switch# show nae-agent memory_monitor

Script Name

: memory_monitor

Version

: 1.0

Origin

: generated

Disabled

: false

Status

: NORMAL

Time Series Count : 0

Alerts Count

:0

Rules

:0

Error

: None

Alert Description : Memory - Normal

Recent alerts

:

<1> 2021-05-29 01:34:11 An action has been triggered by NAE agent memory_monitor

<2> 2021-05-28 06:11:00 An action has been triggered by NAE agent memory_monitor

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1614

<3> 2021-05-27 03:19:50 An action has been triggered by NAE agent memory_monitor

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History
Release 10.13.1000

10.09 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command output updated to display Alert Description for the agent name. Added <AGENT-NAME> --
Authority Administrators or local user group members with execution rights for this command.

show nae-agent alerts
show nae-agent [<AGENT-NAME>] alerts Shows the alerts raised by all the NAE agents. If the agent name is specified, then shows the alerts raised by the specified agent.

Parameter <AGENT-NAME>

Description Specifies the name of the NAE-Lite agent.

Example
Showing the alerts raised by all the NAE agents:

switch# show nae-agent alerts 2021-06-13 07:53:56 An action has been triggered by NAE agent memory_monitor 2021-06-07 00:30:10 An action has been triggered by NAE agent system_resource_ monitor.default 2021-06-07 00:24:13 An action has been triggered by NAE agent system_resource_ monitor.default 2021-06-06 21:48:27 An action has been triggered by NAE agent memory_monitor 2021-06-06 18:44:41 An action has been triggered by NAE agent system_resource_ monitor.default 2021-06-06 18:31:53 An action has been triggered by NAE agent system_resource_ monitor.default 2021-06-06 20:19:03 An action has been triggered by NAE agent system_resource_

Network Analytics Engine commands | 1615

monitor.default 2021-06-06 20:15:05 An action has been triggered by NAE agent system_resource_ monitor.default 2021-06-03 07:45:36 An action has been triggered by NAE agent memory_monitor
Showing the alerts raised by the NAE agent named memory_monitor:
switch# show nae-agent memory_monitor alerts 2021-06-13 07:54:47 An action has been triggered by NAE agent memory_monitor 2021-06-13 07:53:56 An action has been triggered by NAE agent memory_monitor 2021-06-06 21:48:27 An action has been triggered by NAE agent memory_monitor 2021-06-03 07:45:36 An action has been triggered by NAE agent memory_monitor

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History

Release 10.09

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

show nae-agent alerts details
show nae-agent [<AGENT-NAME>] alerts details [<INSTANCE-ID>]
Description
Shows the detailed information of a specific NAE agent alert raised by all the NAE agents.
Only CLI, alert, and system log specific action details are displayed as the output. For other action details, refer to the Web UI.

Parameter <AGENT-NAME>
<INSTANCE-ID>

Description
Specifies the name of the NAE-Lite agent. Length: 3 to 80 alphanumeric characters, including underscore (_).
Specifies the instance of the alert. Number 1 represents the latest alert whereas N represents the Nth recent alert. By default, it displays the latest alert (INSTANCEID=1).

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1616

Example
Showing the details of the recent alert of the NAE-Lite agent named memory_monitor:

switch# show nae-agent memory_monitor alerts details 1 2Alert Message: 2021-06-13 07:54:47 An action has been triggered by NAE agent memory_monitor Action(s) performed: Alert, CLI, Syslog

Action Details:

===============

Action Alert: Alert level changed to MAJOR

Action Syslog: Potential mis-configuration detected

Action CLI:

6405# top cpu

top - 07:54:27 up 25 min, 1 user, load average: 10.45, 10.38, 8.48

Tasks: 295 total, 1 running, 294 sleeping, 0 stopped, 0 zombie

%Cpu(s): 2.2 us, 2.2 sy, 0.0 ni, 95.7 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st

MiB Mem : 7555.6 total, 1982.1 free, 2022.6 used, 3550.9 buff/cache

MiB Swap:

0.0 total,

0.0 free,

0.0 used. 5307.9 avail Mem

PID USER

PR NI VIRT RES

27776 admin

20 0 3540 2128

/usr/bin/top -b -n 2 -c -o %CPU -w 11+

1 root

20 0 14272 9468

2 root

20 0

0

0

3 root

0 -20

0

0

SHR S %CPU %MEM 1580 R 16.7 0.0
5260 S 0.0 0.1 0 S 0.0 0.0 0 I 0.0 0.0

TIME+ COMMAND 0:00.04
0:03.23 /sbin/init 0:00.00 [kthreadd] 0:00.00 [rcu_gp]

Only the action Alert, action Syslog, and action CLI details are displayed in this command. Please refer to the Web UI for other action details.

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History

Release 10.09

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

show nae-script
show nae-script [vsx-peer]
Description
Shows information about the Aruba Network Analytics Engine scripts that are available on the switch.

Network Analytics Engine commands | 1617

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
This command shows the following information about the Aruba Network Analytics Engine scripts that are available on the switch: Script Name
The name of the script. Length: 3 through 80 characters. Example: system_resource_monitor_mm1.default Version The version number of the script. Origin The origin of the script: system
Indicates that the script is provided as part of the system software. user
Indicates that a user loaded the script. Status The current state of the script. Status values are the following:
CREATED The script has been uploaded to the switch, but script validation has not begun.
ERROR The script validation process detected an error that would result in execution errors if an agent runs the script. Resolve the error by modifying the script. For information about the error, see the Analytics Dashboard of the Web UI.
VALIDATING The script syntax and components (manifest, parameters, monitor, condition, and action) are in the process of being validated.
VALIDATED The script syntax and components (manifest, parameters, monitor, condition, and action) have been validated and no errors have been found.
Example

switch# show nae-script

---------------------------------------------------------------------

Script Name

Version Origin Status

---------------------------------------------------------------------

fan_monitor

1.0

system VALIDATED

interface_link_flap_monitor

1.0

system VALIDATED

interface_link_state_monitor

1.0

system VALIDATED

interface_tx_rx_stats_monitor

1.0

system VALIDATED

lag_imbalance_monitor

1.0

system VALIDATED

lag_status_monitor

1.0

system VALIDATED

power_supply_monitor

1.0

system VALIDATED

stp_bpdu_tcn_rate_monitor

1.0

system VALIDATED

system_resource_monitor_mm1.default 1.0

system VALIDATED

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1618

system_resource_monitor_mm2.default 1.0

system VALIDATED

temp_sensor_monitor

1.0

system VALIDATED

---------------------------------------------------------------------

Script Name

Version Origin Status

---------------------------------------------------------------------

fan_monitor

1.0

system VALIDATED

interface_link_flap_monitor

1.0

system VALIDATED

interface_link_state_monitor

1.0

system VALIDATED

interface_tx_rx_stats_monitor

1.0

system VALIDATED

lag_imbalance_monitor

1.0

system VALIDATED

lag_status_monitor

1.0

system VALIDATED

power_supply_monitor

1.0

system VALIDATED

stp_bpdu_tcn_rate_monitor

1.0

system VALIDATED

system_resource_monitor_mm1.default 1.0

system VALIDATED

system_resource_monitor_mm2.default 1.0

system VALIDATED

temp_sensor_monitor

1.0

system VALIDATED

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

uerieshow running-config (nae-lite)
show running-config
Description
Shows the NAE-Lite running configuration.
Example
Showing the NAE-Lite running configuration:
switch# show running-config Current configuration: ! !Version Halon 0.1.0 (Build: ridley-Halon-0.1.0-master-20161110190644-dev) !Schema version 0.1.8 hostname switch ... nae-agent memory_monitor

Network Analytics Engine commands | 1619

desc Memory resource monitor monitor memory system memory line-module 1/3 set-condition monitor memory gt 80
status major syslog "High memory usage detected" cli show system clear-condition monitor memory lt 40
status normal syslog "Memory usage is recovered to normal limit" exit nae-agent crash_watch desc Watch the crash event tags crash, resource watch crash_event event-log 1201 set-condition watch event-log crash_event status major cli show core-dump all exit nae-agent crash_watch activate nae-agent memory_monitor activate ... ```

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1620

Chapter 96
Network Analytics Engine Lite commands

Network Analytics Engine Lite commands

actions
status {normal | minor | major | critical} no status {normal | minor | major | critical}
syslog <MESSAGE> [facility {kern | user | mail | daemon | auth | syslog | lpr | uucp | authpriv | cron | ftp}] [severity {debug | info | notice | warning | err | crit | alert | emer}]
no syslog <MESSAGE> [facility {kern | user | mail | daemon | auth | syslog | lpr | uucp | authpriv | cron | ftp}] [severity {debug | info | notice | warning | err | crit | alert | emer}]
cli <COMMAND> {show system | redirect local-file} {show version | redirect tftp} no cli <COMMAND>

schedule <SCHEDULE> no schedule <SCHEDULE>

trap <TRAP> no trap <TRAP>
Description
Configures different NAE-Lite agent actions to be performed when the set condition or the clear condition is met. The following NAE actions can be configured for the set and clear condition: status--Set the alert level for the NAE-Lite Agent. syslog--Create a syslog message and send it to the configured remote syslog servers. cli--Execute a CLI command. Multiple CLI commands can be specified by using \n as the delimiter. schedule--Execute a configured job CLI commands at the specific time. trap--Create a snmp trap message and send it to the configured snmp servers. The no form of this command removes the actions associated with the NAE-Lite agent condition.

Parameter normal minor major critical <MESSAGE

Description
Sets the NAE-Lite agent status to normal (default).
Sets the NAE-Lite agent status to minor.
Sets the NAE-Lite agent status to major.
Sets the NAE-Lite agent status to critical.
Specifies the syslog message to be sent when the set condition or the clear condition is met. Length: 3 to 255 characters.

AOS-CX 10.14 Command-Line Interface Guide

1621

Parameter
facility {kern | user | mail | daemon | auth | syslog | lpr | uucp | authpriv | cron | ftp}

Description
Specifies the syslog facility code to denote the type of program that is logging the message. The default facility code is daemon. Optional. The valid facility code values are:
n kern: Sets the syslog message source as kernel. n user: Sets the syslog message source as user space
programs. n mail: Sets the syslog message source as mail system. n daemon: Sets the syslog message source as system
daemon (default). n auth: Sets the syslog message source as
authentication subsystem. n syslog: Sets the syslog message source as syslog
daemon. n lpr: Sets the syslog message source as line printer
subsystem. n uucp: Sets the syslog message source as unix-to-unix
copy subsystem. n authpriv: Sets the syslog message source as security
subsystem. n cron: Sets the syslog message source as cron
scheduler subsystem. n ftp: Sets the syslog message source as FTP daemon.

[severity {debug | info | notice | warning | err | crit | alert | emer}]

Specifies the severity level for the syslog message. The severity level values are: n debug: Sets the syslog severity level as debug. n info: Sets the syslog severity as information (default). n notice: Sets the syslog severity as notice. n warning: Sets the syslog severity as warning. n err: Sets the syslog severity as error. n crit: Sets the syslog severity as critical. n alert: Sets the syslog severity as alert. n emer: Sets the syslog severity as emergency.

<COMMAND>
{show system | redirect local-file} {show version | redirect tftp}

Specifies the CLI command to be executed when the set condition or the clear condition is met.
Specifies where to relocate local-file.
Specifies where to relocate tftp.

Usage
Take note of the following requirements and recommendations:
n SNMP trap messages should be a minimum of 3 and a maximum of 255 characters. n Add the job configuration separately in the configuration node and execute the corresponding job
name in the action schedule CLI.

Network Analytics Engine Lite commands | 1622

n It is not recommended to use NAE-lite action schedule CLI commands in the NAE-lite action CLI. n It is not recommended to add the job configuration CLI and schedule configuration CLI together in
the action schedule CLI.
Example
Setting the status level for the NAE-Lite agent condition:
switch(config-nae-agent-condition)# status major
Creating the syslog message for the NAE-Lite agent condition:
switch(config-nae-agent-condition)# syslog "IPSLA server1 is down" severity err
Executing the CLI command for the NAE-Lite agent condition:
switch(config-nae-agent-condition)# cli show version\nshow image
Removing the different actions associated with the NAE-Lite agent condition:
switch(config-nae-agent-condition)# no status minor

switch(config-nae-agent-condition)# no syslog "Processing system event"

switch(config-nae-agent-condition)# no cli show logging

Executing the schedule CLI command:

switch(config-nae-agent-condition)# schedule SCHEDULE Set the job schedule CLI command. The CLI commands can be specified by using `\n` as the separator.

Example of a scheduled CLI Command:

switch(config-nae-agent-condition)# schedule s1\n10 job j1\ntrigger every minutes 30 start 17:20 2023-11-21

Creating the snmp trap message:

switch(config-nae-agent-condition)# trap

TRAP

Set the trap message

Example of a trap message:

switch(config-nae-agent-condition)# trap High system CPU utilization

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1623

Removing the scheduled CLI command: switch(config-nae-agent)# no schedule
Removing snmp trap message: switch(config-nae-agent)# no trap

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History

Release 10.14 10.09

Command Information

Platforms
6300 6400

Command context
config-nae-agentcondition

Modification Schedule and Trap actions introduced. Command introduced
Authority Administrators or local user group members with execution rights for this command.

desc
desc <DESCRIPTION> no desc <DESCRIPTION>
Description
Adds the description for the NAE-Lite agent. The no form of this command removes the description from the NAE-Lite agent.

Parameter <DESCRIPTION>

Description
Specifies the description for the NAE-Lite agent. Range: 3 to 255 characters

Example
Adding the description for the NAE-Lite agent:

switch(config-nae-agent)# desc Monitor system memory

Removing the description for the NAE-Lite agent:

Network Analytics Engine Lite commands | 1624

switch(config-nae-agent)# no desc Monitor system memory

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms
6300 6400

Command context config-nae-agent

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

disable
disable no disable
Description
Disables the NAE-lite agent. The NAE-Lite agents are enabled by default. The no form of this command enables the NAE-Lite agent.
Example
Disabling the NAE-Lite agent:
switch(config-nae-agent)# disable
Enabling the NAE-Lite agent:
switch(config-nae-agent)# no disable

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History
Release 10.09

Modification Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1625

Command Information

Platforms
6300 6400

Command context config-nae-agent

Authority
Administrators or local user group members with execution rights for this command.

monitor resource
monitor <MONITOR-NAME> resource <RESOURCE> [group-by {count | sum | min | max | average} [over {seconds | minutes | hours | days} <DURATION>]] no monitor <MONITOR-NAME> resource <RESOURCE> [group-by {count | sum | min | max | average} [over {seconds | minutes | hours | days} <DURATION>]]
monitor <MONITOR-NAME> resource <RESOURCE> group-by rate over {seconds | minutes | hours | days} <DURATION> no monitor <MONITOR-NAME> resource <RESOURCE> group-by rate over {seconds | minutes | hours | days} <DURATION>
Description
Configures the monitor for the NAE-Lite agent. The monitor defines what system resource the agent must monitor. Monitors are defined using the time series function and it supports the grouping of data. The no form of this command removes the monitor associated with the NAE-Lite agent. Before removing the monitor, you must remove the condition used in the monitor.

Parameter <MONITOR-NAME>
<RESOURCE> The <RESOURCE> is defined as follows: n For 8400 and 6400 Switch Series:
o system {cpu | memory} {management-module | line-module} <SLOT-ID>
o system storage {nos | security | coredump | logs | selftest} management-module <SLOT-ID>
o system storage coredump line-module <SLOT-ID>
n For 6300 and 6200 Switch Series: o system {cpu | memory} vsf member <MEMBER-ID> o system storage {nos | security | coredump | logs | selftest} vsf member <MEMBER-ID>

Description
Specifies the name of the monitor. Length: 3 to 80 alphanumeric characters, including underscore (_).
Specifies the system resources such as memory, CPU, and storage utilization for specific modules that need to be monitored. Values are: n cpu: Configures the CPU
monitoring. n memory: Configures the
memory monitoring. n storage: Configures the storage
utilization monitoring. n management-module:
Monitors resources of the management module. n line-module: Monitors resources of the line module. n nos: Monitors the network operating system storage utilization. n security: Monitors the security storage utilization.

Network Analytics Engine Lite commands | 1626

Parameter

Description
n coredump: Monitors the coredump storage utilization.
n logs: Monitors the log storage utilization.
n selftest: Monitors the self-test storage utilization.
n <SLOT-ID>: Configure the module slot ID. <SLOT-ID> is the mandatory parameter for representing the management module or line module.
n vsf member <MEMBER-ID>: Configures the VSF member ID. The member ID is the mandatory parameter.

group-by {count | sum | min | max | average} over {seconds | minutes | hours | days} <DURATION>

Groups the monitored data based on the parameters specified. Values are: n count: Groups by distinct
counts of monitored data. n sum: Groups by summing the
monitored data. n min: Groups by minimum value
of the monitored data. n max: Groups the data by
maximum value of the monitored data. n average: Groups by average value of the monitored data.
Group over the specified time interval in the past instead of the current value. Values are: seconds: Sets the time interval in seconds. Range: 5 to 10000 minutes: Sets the time interval in minutes. Range: 1 to 10000. hours: Sets the time interval in hours. Range: 1 to 10000. days: Sets the time interval in days. Range: 1 to 365.

rate over {seconds | minutes | hours | days} <DURATION>

Groups by rate of change of the monitored data over the specified time interval.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1627

Example
Configuring the monitor for the system cpu resource on the 1/1 module (8400 and 6400 Switch Series):
switch(config-nae-agent)# monitor sys_cpu resource system cpu management-module 1/1
Configuring the monitor for the calculating the average CPU usage over the 30 minutes (8400 and 6400 Switch Series):
switch(config-nae-agent)# monitor avg_sys_cpu resource system cpu line-module 1/4 group-by average over minutes 30
Configuring the monitor for the system CPU usage on the vsf member 1 (6300 and 6200 Switch Series):
switch(config-nae-agent)# monitor sys_cpu resource system cpu vsf member 1
Removing the monitor named sys_mem:
switch(config-nae-agent)# no monitor sys_mem

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History

Release 10.09

Command Information

Platforms
6300 6400

Command context config-nae-agent

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

nae-agent lite
nae-agent lite <AGENT-NAME> no nae-agent lite [<AGENT-NAME>]
Description
Configures the NAE-Lite agent. After the command is executed, the command prompt enters into the nae-agent context. The specified name of the agent is also used as the name of the NAE script generated from the agent configurations. Therefore the agent name must be unique and must not match with any existing NAE scripts or NAE-Lite agent names.

Network Analytics Engine Lite commands | 1628

The no form of the command removes the NAE-Lite agent configuration. The no nae-agent lite command removes all the configured NAE-Lite agents.

Parameter <AGENT-NAME>

Description
Specifies the name of the NAE-Lite agent. Length: 3 to 80 alphanumeric characters, including underscore (_).

Example
Configuring NAE-Lite agent named mem_monitor and entering into the nae-agent context:

switch(config)# nae-agent lite mem_monitor switch(config-nae-agent)#

Removing the NAE-Lite agent named mem_monitor:

switch(config-nae-agent)# no nae-agent lite mem_monitor

Removing all the NAE-Lite agent configurations:

switch(config)# no nae-agent lite

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History

Release 10.09

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

nae-agent lite activate
nae-agent lite <AGENT-NAME> activate no nae-agent lite <AGENT-NAME> activate
Description
Activates the NAE-Lite agent creation. Once activated, the NAE-Lite agent gets generated, validated, and begins monitoring.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1629

Whenever modifying the NAE-Lite agent configuration, after all the modifications are done, you must trigger the agent update process by executing no nae-agent lite <AGENT-NAME> activate followed by nae-agent lite <AGENT-NAME> activate. The agent will not be created or updated until the nae-agent lite <AGENT-NAME> activate command is executed.
The no form of the command deactivates the NAE-Lite agent. Once the command is executed, the NAELite agent and its corresponding script will be deleted.

Parameter <AGENT-NAME>

Description
Specifies the name of the NAE-Lite agent. Length: 3 to 80 alphanumeric characters, including underscore (_).

Example
Activating the NAE-Lite agent named crash_watch :

switch(config)# nae-agent lite crash_watch activate

Deactivating the NAE-Lite agent named mem_monitor :

switch(config)# no nae-agent lite mem_monitor activate

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

2set-condition monitor
set-condition monitor <MONITOR-NAME> {{lt | le | eq | ne | gt | ge} <VALUE>[for {seconds | minutes | hours | days} <DURATION>] | transition from <STRING-LIST> to <STRING-LIST>} no set-condition monitor <MONITOR-NAME> {{lt | le | eq | ne | gt | ge} <VALUE> [for {seconds | minutes | hours | days} <DURATION>] | transition from <STRING-LIST> to <STRING-LIST>}
clear-condition monitor <MONITOR-NAME> {{lt | le | eq | ne | gt | ge} <VALUE> [for {seconds | minutes | hours | days} <DURATION>] | transition from <STRING-LIST> to <STRING-LIST>}

Network Analytics Engine Lite commands | 1630

no clear-condition monitor <MONITOR-NAME> {{lt | le | eq | ne | gt | ge} <VALUE> [for {seconds | minutes | hours | days} <DURATION>] | transition from <STRING-LIST> to <STRING-LIST>}
Description
Defines the condition for the monitor resource events. Once the condition is met, one or more actions are executed based on the configuration. The clear condition is an optional component of the condition and helps in identifying if an event, usually an issue in the system, is no longer occurring. Clear conditions also address the problem when data is fluctuating above and below the threshold, generating too many alerts. Initially, when an NAELite agent is created, only the set-condition is active. Once the set-condition is met, the condition becomes inactive and the clear condition becomes active. The set-condition becomes active again once the clear condition is met. The no form of this command removes the monitor condition associated with the NAE-Lite agent.

Parameter <MONITOR-NAME> <VALUE>
<DURATION>
<STRING-LIST>

Description
Specifies the monitor name used in the condition.
Specifies the numeric value compared with the monitor value. The defined values are: n lt (less than) n le (less than or equal to) n eq (equal to) n ne (not equal to) n gt (greater than) n ge (greater than or equal to) n transition
Specifies the time duration. The defined time duration are: n seconds (Range: 5-10000) n minutes (Range: 1-10000) n hours (Range: 1-10000) n day
Specifies the list of one or more strings representing the initial or final value of the monitor. The strings are comma-separated and each string must be contained within double-quotes.

Example
Configuring set conditions for the NAE-Lite agent:

switch(config-nae-agent)# set-condition monitor average_mem gt 70

Configuring the set and clear conditions for the NAE-Lite agent:

switch(config-nae-agent)# set-condition monitor cpu gt 70 for minutes 30 switch(config-nae-agent-condition)# clear-condition monitor cpu lt 30 for minutes 30

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1631

switch(config-nae-agent)# set-condition monitor line_mdl_state transition from "ready" to "down","error" switch(config-nae-agent-condition)# clear-condition monitor line_mdl_state transition from "down","error" to "ready"
Removing the monitor conditions for the NAE-Lite agent:
switch(config-nae-agent)# no set-condition monitor line_mdl_state transition from "ready" to "down","error"
switch(config-nae-agent-condition)# no clear-condition monitor cpu lt 30 for minutes 30

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms
6300 6400

Command context
config-nae-agent config-nae-agentcondition

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

5set-condition watch
set-condition watch event-log <WATCH-NAME> [include {all | any} <REGEX-LIST>] [exclude <REGEX-LIST>] [count <COUNT>] no set-condition watch event-log <WATCH-NAME> [include {all | any} <REGEX-LIST>] [exclude <REGEX-LIST>] [count <COUNT>]
clear-condition watch event-log <WATCH-NAME> [include {all | any} <REGEX-LIST>] [exclude <REGEX-LIST>] [count <COUNT>] no clear-condition watch event-log <WATCH-NAME> [include {all | any} <REGEX-LIST>] [exclude <REGEX-LIST>] [count <COUNT>]
Description
Defines the condition for the watch resource events. Once the condition is met, one or more actions are executed based on the configuration. The clear condition is an optional component of the condition and helps in identifying an event, usually an issue in the system, is no longer occurring. Clear conditions also address the problem when data is fluctuating above and below the threshold, and generating too many alerts. Initially, when an NAE-Lite agent is created, only the set-condition is active. Once the set-condition is met, the condition becomes

Network Analytics Engine Lite commands | 1632

inactive and the clear condition becomes active. The set-condition becomes active again once the clear condition is met.
The condition is met when any of the event logs watched by the <WATCH-NAME> has occurred and the event log message fits the include or exclude <REGEX-LIST> (if configured) and the condition has occurred for <COUNT> number of times (if configured).
The no form of this command removes the condition associated with the NAE-Lite agent.

Parameter <WATCH-NAME> include {all | any} <REGEX-LIST>
all any <REGEX-LIST>
exclude count <COUNT>

Description
Specifies the name of the watch. This must be already defined using the watch command.
Configures the list of strings matching the regular expression that must be included in the event log message. Optional.
Includes all of the specified lists of regular expressions in eventlog messages.
Includes any of the specified lists of regular expressions in eventlog messages
Specifies the comma-separated list of one or more regular expressions that must be matched against the event log messages. Optional.
Configures the list of strings matching the regular expression that must be included in the event log message. Optional.
Limits the number of times that the condition to be met once in every specified count. Optional. For example, if you want to monitor mac movement in the VLAN for every 10th time, then the count must be specified as 10. Range: 1 to 4294967295.

Example
Defining the condition for the watch named ipsla_status including all the specified list:

switch(config-nae-agent)# set-condition watch event-log ipsla_status include all "servername","failure" count 3

Clearing the condition for the watch named ipsla_status including all the specified list:

switch(config-nae-agent-condition)# clear-condition watch ipsla_status include all "servername","success"

Defining the condition for the watch named ipsla_status excluding snmpd:

switch(config-nae-agent-condition)# set-condition watch event-log crash_event exclude snmpd

Removing the conditions associated with the NAE-Lite agent:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1633

switch(config-nae-agent)# no set-condition watch event-log ipsla_status include all "servername","failure"
switch(config-nae-agent-condition)# no clear-condition watch ipsla_status include all "servername","success"

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms
6300 6400

Command context
config-nae-agent config-nae-agentcondition

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

show running-config nae-agent
show running-config nae-agent
Description
Shows the NAE-Lite agent current running configurations.
Example
Showing the NAE-Lite running configurations:
switch# show running-config nae-agent Current configuration: ! ... nae-agent lite memory_monitor
desc Memory resource monitor monitor memory system memory line-module 1/3 set-condition monitor memory gt 80
status major syslog "High memory usage detected" cli show system clear-condition monitor memory lt 40
status normal syslog "Memory usage is recovered to normal limit"
nae-agent lite crash_watch

Network Analytics Engine Lite commands | 1634

desc Watch the crash event tags crash, resource watch crash_event event-log 1201 set-condition watch event-log crash_event
status major cli show core-dump all nae-agent lite crash_watch activate nae-agent lite memory_monitor activate ... ```

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

tags
tags <TAG-LIST> no tags <TAG-LIST>
Description
Configures the tags applicable for the NAE-Lite agent. The tags are used to categorize and group the agent. The no form of this command removes the tag lists associated with the NAE-Lite agent.

Parameter <TAG-LIST>

Description
Specifies the tag list for the NAE-Lite agent.<TAG-LIST> is the comma separated list of tags. Each tag can be a minimum of 3 to a maximum of 32 characters in length. A maximum of 16 tags are supported.

Example
Configuring the tags for the NAE-Lite agent:

switch(config-nae-agent)# tags memory,resource,ztag

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1635

Removing the tags for the NAE-Lite agent: switch(config-nae-agent)# no tags switch(config-nae-agent)# no tags memory,resource

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History

Release 10.09

Command Information

Platforms
6300 6400

Command context config-nae-agent

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

watch event-log
watch <WATCH-NAME> event-log <EVENT-ID-LIST> no watch <WATCH-NAME> event-log <EVENT-ID-LIST>
Description
Configures the watch source for the NAE-Lite agent. This enables the agent to watch for specific events occurring in the system. Event-driven monitoring can be performed by watching the event log of the system. For information on event IDs, refer to the Event Log Message Reference Guide. The no form of this command removes the watch associated with the NAE-Lite agent.

Parameter <WATCH-NAME>
<EVENT-ID-LIST>

Description
Specifies the watch name for the NAE-Lite agent. Length: 3 to 80 alphanumeric characters, including underscore (_).
Specifies the list of one or more event IDs of the event log message. A maximum of five event IDs can be specified.

Example
Configuring the watch source for the NAE-Lite agent.

switch(config-nae-agent)# watch crash_event event-log 1201

Network Analytics Engine Lite commands | 1636

Removing the watch source used by the NAE-Lite agent: switch(config-nae-agent)# no watch high_mem switch(config-nae-agent)# no watch high_mem_event event-log 1208,1209

For more information on features that use this command, refer to the Network Analytics Engine Guide for your switch model.

Command History

Release 10.09

Command Information

Platforms
6300 6400

Command context config-nae-agent

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1637

Chapter 97
Network configuration validation commands

Network configuration validation commands

switch config-validator
switch config-validator [config <CONFIG-NAME>] [feature <feature>] [mode {consistency | vsx-sync}] [format {cli | json}]
mode vsx-sync is not supported on the 6300 switch series.

Description
Runs configuration validation to detect configuration anomalies.

Parameter config
feature <feature>

Description
Specifies configuration to be validated. The default configuration is running-config.
Specifies the name of the feature to be validated.
NOTE: Available features vary by switch type. The 6300 Series Switch supports vsf as an option for the feature parameter, and the 6400 Series Switch supports vsx as an option for the feature parameter.

mode consistency vsx-sync
format

Specifies configuration validation mode. The default is consistency.
Validates feature configuration for consistency check.
Validates VSX configuration synchronization between VSX peers for VSX enabled features. vsx-sync is not supported on the 6300 switch series.
Specifies the results display format. The default is cli.

Examples
Running configuration validation with all default values. (6300 Switch Series)

switch# switch config-validator Line number 15: Split detect (MAD) is recommended for vsf stack. Line number 18: VSF interface should be configured in the VSF link and the interface should be up. Line number 34: Configuration 'associate role <ROLE_NAME> is missing. Line number 38: Configuration 'enable' is recommended.

AOS-CX 10.14 Command-Line Interface Guide

1638

Line number 43: Configuration 'enable' is recommended. Line number 45: A group (LLDP, CDP, MAC) should be associated with only one device profile.
Running configuration validation with switches for the vsx feature. (6400 Switch Series)
switch (config)# switch config-validator config running-config feature vsx Line number 36: Configuration `system-mac <VSX_SYSTEM_MAC>` is recommended Line number 36: Multi chassis configuration is recommended for VSX redundancy

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

Network configuration validation commands | 1639

Chapter 98 NLB commands

NLB commands

arp ip mac
arp ip <IP-ADDR> mac <MAC-ADDR> no arp ip <IP-ADDR> mac <MAC-ADDR>
Description
Configures static ARP multicast on the interface. The no form of this command removes the static ARP multicast configuration.

Parameter <IP-ADDR> <MAC-ADDR>

Description
Specifies cluster's virtual IPv4 address.
Specifies multicast MAC address in IANA format (xx:xx:xx:xx:xx:xx) and non IANA format (xxxx.xxxx.xxxx).

Examples
Configuring static ARP multicast on an interface:

switch(config)# vlan 10 switch(config-vlan-10)# no shutdown switch(config-vlan-10)# ip igmp snooping enable switch(config-vlan-10)# exit switch(config)# interface vlan10 switch(config-if-vlan)# ip igmp enable switch(config-if-vlan)# arp ip 10.1.30.254 mac 01:00:5e:7F:1E:FE

If your NLB Virtual IP address is 10.1.30.254, then the server will join the 239.255.30.254 IGMP group. This IGMP group is mapped to the destination MAC address of 01:00:5e:7F:1E:FE.

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.14

Modification
Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated.

AOS-CX 10.14 Command-Line Interface Guide

1640

Release 10.08 10.07 or earlier

Modification Added NLB support for 6300 and 6400 Switch series. --

Command Information

Platforms
6300 6400

Command context

Authority

config-if and config- Administrators or local user group members with execution rights

if-vlan

for this command.

show arp
show arp
Description
Displays the static ARP multicast information.
Examples
Displaying the static ARP multicast information:

switch# show arp

IPv4 Address

MAC

Port

Physical Port State

---------------------------------------------------------------------------

3.3.3.3

01:00:5e:00:00:02

1/1/1

permanent

2.2.2.2

01:00:5e:00:00:01 vlan10

permanent

Total Number Of ARP Entries Listed- 2. ---------------------------------------------------------------------------

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Modification Added NLB support for 6300 and 6400 Switch series. --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

NLB commands | 1641

show ip igmp snooping vlan group
show ip igmp snooping vlan <VLAN-ID> group IGMP-Group
Description
Displays multicast joins (members of the cluster) participating in the IGMP group.
Examples
Displaying multicast joins participating in the IGMP group:

switch# show ip igmp snooping vlan 10 group 239.255.30.254

VLAN ID : 10 VLAN Name : VLAN10

Group Address : 239.255.30.254 Last Reporter : 10.1.30.254 Group Type : Filter

V1

V2

Sources Sources

Port

Vers Mode Uptime Expires Timer

Timer

Forwarded Blocked

--------- ---- ---- --------- --------- --------- --------- --------- --------

1/1/6

2 EXC 0m 21s 1m 12s

2m 48s 0

0

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.08 10.07 or earlier

Modification Added NLB support for 6300 and 6400 Switch series. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1642

Chapter 99 NTP commands

NTP commands
ntp authentication
ntp authentication no ntp authentication
Description
Enables support for authentication when communicating with an NTP server. The no form of this command disables authentication support.
Examples
Enabling authentication support:
switch(config)# ntp authentication
Disabling authentication support:
switch(config)# no ntp authentication

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ntp authentication-key
ntp authentication-key <KEY-ID> {md5 | sha1} [{ <PLAINTXT-KEY> [trusted] | ciphertext <ENCRYPTED-KEY> }]
no ntp authentication-key <KEY-ID> {md5 | sha1} [{ <PLAINTXT-KEY> [trusted] | ciphertext <ENCRYPTED-KEY> }]

AOS-CX 10.14 Command-Line Interface Guide

1643

Description
Defines an authentication key that is used to secure the exchange with an NTP time server. This command provides protection against accidentally synchronizing to a time source that is not trusted. The no form of this command removes the authentication key.

Parameter <KEY-ID> md5 sha1 <PLAINTXT-KEY>
trusted
ciphertext <ENCRYPTED-KEY>

Description
Specifies the authentication key ID. Range: 1 to 65534.
Selects MD5 key encryption.
Specifies SHA1 key encryption.
Specifies the plaintext authentication key. Range: 8 to 40 characters. The key may contain printable ASCII characters excluding "#" or be entered in hex. Keys longer than 20 characters are assumed to be hex. To use an ASCII key longer than 20 characters, convert it to hex.
Specifies that this is a trusted key. When NTP authentication is enabled, the switch only synchronizes with time servers that transmit packets containing a trusted key.
Specifies the ciphertext authentication key in Base64 format. This is used to restore the NTP authentication key when copying configuration files between switches or when uploading a previously saved configuration.
NOTE: When the key is not provided on the command line, plaintext key prompting occurs upon pressing Enter, followed by prompting as to whether the key is to be trusted. The entered key characters are masked with asterisks.

Examples
Defining key 10 with MD5 encryption and a provided plaintext trusted key:
switch(config)# ntp authentication-key 10 md5 F82#450b trusted
Defining key 5 with SHA1 encryption and a prompted plaintext trusted key:
switch(config)# ntp authentication-key 5 sha1 Enter the NTP authentication key: ********* Re-Enter the NTP authentication key: ********* Configure the key as trusted (y/n)? y
Removing key 10:
switch(config)# no ntp authentication-key 10

NTP commands | 1644

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ntp disable
ntp disable
Description
Disables the NTP client on the switch. The NTP client is disabled by default.
Examples
Disabling the NTP client.
switch(config)# ntp disable

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ntp enable
ntp enable

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1645

no ntp enable
Description
Enables the NTP client on the switch to automatically adjust the local time and date on the switch. The NTP client is disabled by default. The no form of this command disables the NTP client.
Examples
Enabling the NTP client.
switch(config)# ntp enable
Disabling the NTP client.
switch(config)# no ntp enable

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ntp conductor
ntp conductor vrf <VRF-NAME> {stratum <NUMBER>] no ntp conductor vrf <VRF-NAME> {stratum <NUMBER>]
Description
Sets the switch as the conductor time source for NTP clients on the specified VRF. By default, the switch operates at stratum level 8. The switch cannot function as both NTP conductor and client on the same VRF. The no form of this command stops the switch from operating as the conductor time source on the specified VRF.

NTP commands | 1646

Parameter vrf <VRF-NAME> stratum <NUMBER>

Description
Specifies the VRF on which to act as conductor time source.
Specifies the stratum level at which the switch operates. Range: 1 15. Default: 8.

Examples
Setting the switch to act as conductor time source on VRF primary-vrf with a stratum level of 9.

switch(config)# ntp conductor vrf primary-vry statum 9

Stops the switch from acting as conductor time source on VRF primary-vrf.

switch(config)# no ntp conductor vrf primary-vry

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.08 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Inclusive language. --
Authority Administrators or local user group members with execution rights for this command.

ntp server
ntp server <IP-ADDR> [key <KEY-NUM>] [minpoll <MIN-NUM>] [maxpoll <MAX-NUM>][burst | iburst][prefer] [version <VER-NUM>] no ntp server <IP-ADDR> <IP-ADDR> [key <KEY-NUM>] [minpoll <MIN-NUM>] [maxpoll <MAX-NUM>] [burst | iburst] [prefer] [version <VER-NUM>]
Description
Defines an NTP server to use for time synchronization, or updates the settings of an existing server with new values. Up to eight servers can be defined. The no form of this command removes a configured NTP server.
The default NTP version is 4; it is backwards compatible with version 3.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1647

Parameter server <IP-ADDR>
key <KEY-NUM> minpoll <MIN-NUM> maxpoll <MAX-NUM> burst iburst prefer version <VER-NUM>

Description
Specifies the address of an NTP server as a DNS name, an IPv4 address (x.x.x.x), where x is a decimal number from 0 to 255, or an IPv6 address (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. When specifying an IPv4 address, you can remove leading zeros. For example, the address 192.169.005.100 becomes 192.168.5.100. When specifying an IPv6 address, you can use two colons (::) to represent consecutive zeros (but only once), remove leading zeros, and collapse a hextet of four zeros to a single 0. For example, this address 2222:0000:3333:0000:0000:0000:4444:0055 becomes 2222:0:3333::4444:55 .
Specifies the key to use when communicating with the server. A trusted key must be defined with the command ntp authentication-key and authentication must be enabled with the command ntp authentication. Range: 1 to 65534.
Specifies the minimum polling interval in seconds, as a power of 2. Range: 4 to 17. Default: 6 (64 seconds).
Specifies the maximum polling interval in seconds, as a power of 2. Range: 4 to 17. Default: 10 (1024 seconds).
Send a burst of packets instead of just one when connected to the server. Useful for reducing phase noise when the polling interval is long.
Send a burst of six packets when not connected to the server. Useful for reducing synchronization time at startup.
Make this the preferred server.
Specifies the version number to use for all outgoing NTP packets. Range: 3 or 4. Default: 4.
NOTE: NTP is backwards compatible.

Usage
For features such as Activate and ZTP, a switch that has a factory default configuration will automatically be configured with pool.ntp.org. NTP server configurations via DHCP options are supported. The DHCP server can be configured with maximum of two NTP server addresses which will be supported on the switch. Only IPV4 addresses are supported. NTP uses a stratum to describe the distance between a network device and an authoritative time source:
n A stratum 1 time server is directly attached to an authoritative time source (such as a radio or atomic clock or a GPS time source).
n A stratum 2 NTP server receives its time through NTP from a stratum 1 time server.
When using multiple servers with same stratum setting, the best practice to configure a preferred server, so NTP will attempt to use the preferred server as the primary NTP connection. If a preferred server is not manually set when NTP is enabled, the configured server with the lowest stratum will automatically be set as the preferred server. If there are servers with the same stratum, this auto prefer status will prevent AOS-CX from toggling between different servers as the primary server. Auto prefer

NTP commands | 1648

selection of servers with same stratum (if not manually selected) may change after reconfiguring the switch, or after executing the reboot command.
Examples
Defining the ntp server pool.ntp.org, using iburst, and NTP version 4.
switch(config)# ntp server pool.ntp.org iburst version 4
Removing the ntp server pool.ntp.org.
switch(config)# no ntp server pool.ntp.org
Defining the ntp server my-ntp.mydomain.com and makes it the preferred server.
switch(config)# ntp server my-ntp.mydomain.com prefer

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ntp trusted-key
ntp trusted-key <KEY-ID> no ntp trusted-key <KEY-ID>
Description
Sets a key as trusted. When NTP authentication is enabled, the switch only synchronizes with time servers that transmit packets containing a trusted key. The no form of this command removes the trusted designation from a key.

Parameter <KEY-ID>

Description
Specifies the identification number of the key to set as trusted. Range: 1 to 65534.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1649

Examples
Defining key 10 as a trusted key. switch(config)# ntp trusted-key 10
Removing trusted designation from key 10: switch(config)# no ntp trusted-key 10

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ntp vrf
ntp vrf <VRF-NAME> no ntp vrf <VRF-NAME>
Description
Specifies the VRF on which the NTP client communicates with an NTP server. The switch cannot function as both NTP conductor and client on the same VRF. The no form of the command returns to default VRF.

Parameter <VRF-NAME>

Description Specifies the name of a VRF.

Example
Setting the switch to use the default VRF for NTP client traffic.

switch(config)# ntp vrf default

Setting the switch to use the default management VRF for NTP client traffic. Returning the switch to use the default VRF for NTP client traffic.

NTP commands | 1650

switch(config)# no ntp vrf

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show ntp associations
show ntp associations [vsx-peer]
Description
Shows the status of the connection to each NTP server. The following information is displayed for each server:
n Tally code : The first character is the Tally code: o (blank): No state information available (e.g. non-responding server) o x : Out of tolerance (discarded by intersection algorithm) o . : Discarded by table overflow (not used) o - : Out of tolerance (discarded by the cluster algorithm) o + : Good and a preferred remote peer or server (included by the combine algorithm) o # : Good remote peer or server, but not utilized (ready as a backup source) o * : Remote peer or server presently used as a primary reference o o : PPS peer (when the prefer peer is valid)
n ID: Server number. n NAME: NTP server FQDN/IP address (Only the first 24 characters of the name are displayed). n REMOTE: Remote server IP address. n REF_ID: Reference ID for the remote server (Can be an IP address). n ST: (Stratum) Number of hops between the NTP client and the reference clock. n LAST: Time since the last packet was received in seconds unless another unit is indicated. n POLL: Interval (in seconds) between NTP poll packets. Maximum (1024) reached as server and client
sync. n REACH: 8-bit octal number that displays status of the last eight NTP messages (377 = all messages
received).

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1651

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

switch# show ntp associations

----------------------------------------------------------------------

ID

NAME

REMOTE

REF-ID ST LAST POLL REACH

----------------------------------------------------------------------

1

192.0.1.1

192.0.1.1

.INIT. 16 - 64

0

* 2 time.apple.com 17.253.2.253

.GPSs. 2 70 128 377

----------------------------------------------------------------------

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ntp authentication-keys
show ntp authentication-keys [vsx-peer]
Description
Shows the currently defined authentication keys.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

NTP commands | 1652

switch# show ntp authentication-keys

--------------------------------

Auth key Trusted MD5 password

--------------------------------

10

No

**********

20

Yes

**********

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show ntp servers
show ntp servers[vsx-peer]
Description
Shows all configured NTP servers, including any DHCP servers, default pool servers or any server with the status auto prefer.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

switch# show ntp servers

------------------------------------------------

NTP SERVER KEYID MINPOLL MAXPOLL OPTION VER

------------------------------------------------

192.0.1.18

-

5

10 iburst 3

192.0.1.19

-

6

10 none 4

192.0.1.20

-

6

8 burst 3 prefer

------------------------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1653

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ntp statistics
show ntp statistics [vsx-peer]
Description
Shows global NTP statistics. The following information is displayed:
n Rx-pkts: Total NTP packets received. n Current Version Rx-pkts: Number of NTP packets that match the current NTP version. n Old Version Rx-pkts: Number of NTP packets that match the previous NTP version. n Error pkts: Packets dropped due to all other error reasons. n Auth-failed pkts: Packets dropped due to authentication failure. n Declined pkts: Packets denied access for any reason. n Restricted pkts: Packets dropped due to NTP access control. n Rate-limited pkts: Number of packets discarded due to rate limitation. n KOD pkts: Number of Kiss of Death packets sent.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

switch(config)# show ntp statistics Rx-pkts 100
Current Version Rx-pkts 80 Old Version Rx-pkts 20 Err-pkts 2

NTP commands | 1654

Auth-failed-pkts 1 Declined-pkts 0
Restricted-pkts 0 Rate-limited-pkts 0
KoD-pkts 0

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ntp status
show ntp status [vsx-peer]
Description
Shows the status of NTP on the switch.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Displaying the status information when the switch is not synced to an NTP server:

switch# show ntp status NTP is enabled. NTP authentication is enabled. NTP is using the default VRF for NTP server connections.
Wed Nov 23 23:29:10 PDT 2016 NTP uptime: 187 days, 1 hours, 37 minutes, 48 seconds
Not synchronized with an NTP server.

Displaying the status information when the switch is synced to an NTP server:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1655

switch# show ntp status NTP is enabled. NTP authentication is enabled. NTP is using the default VRF for NTP server connections.
Wed Nov 23 23:29:10 PDT 2016 NTP uptime: 187 days, 1 hours, 37 minutes, 48 seconds
Synchronized to NTP Server 17.253.2.253 at stratum 2. Poll interval = 1024 seconds. Time accuracy is within 0.994 seconds Reference time: Thu Jan 28 2016 0:57:06.647 (UTC)

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

NTP commands | 1656

Chapter 100 OSPFv2 commands

OSPFv2 commands
active-backbone
active-backbone stub-default-route no active-backbone stub-default-route
Description
This command enables the router to send a default route to stub areas if there is an active loopback link in the backbone area. The configuration is not required if backbone area has neighbors or passive interfaces configured. By default active backbone detection is enabled.
Examples
switch(config)# router ospf 1 switch(config-ospf-1)# active-backbone stub-default-route
switch(config)# no active-backbone stub-default-route

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.10.1000

Modification Command Introduced

Command Information

Platforms
6300 6400

Command context
config-ospf-<PROCESS-ID> config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

area (ospf)
area <AREA-ID> no area <AREA-ID>
Description
Creates a normal area, with <AREA-ID> set if not present. If the area is already present and it is not a normal area, then this command changes the area type to normal.

AOS-CX 10.14 Command-Line Interface Guide

1657

The no form of this command deletes the area with the <AREA-ID> specified. Area can be of any type (nssa, nssa no-summary, stub, stub no-summary, and default normal area).

Parameter <AREA-ID>

Description
Specifies the area ID in one of the following formats. OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPF area identifier in decimal format. Range: 0 to 4294967295.

Examples
Creating a normal area:

switch(config)# router ospf 1 switch(config-ospf-1)# area 1 switch(config-ospf-1)# area 10.1.1.1 Switch(config-ospf-1)# show running-config current-context router ospf 1
router-id 1.1.1.1 area 0.0.0.0 area 0.0.0.1 area 0.0.0.2 stub area 0.0.0.3 nssa

Deleting an area:

switch(config)# router ospf 1 switch(config-ospf-1)# no area 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

area default-metric
area <AERA-ID> default-metric <COST> no area <AREA-ID> default-metric
Description

OSPFv2 commands | 1658

Sets the cost of the default route announced to NSSA or stub areas.
The no form of this command resets the cost of the default route announced to NSSA or stub areas, to the default value of 1.

Parameter <AREA-ID>
default-metric <COST>

Description
Specifies area ID in one of the following formats. OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPF area identifier in decimal format. Range: 0 to 4294967295.
Sets the cost of default-summary LSAs announced to NSSA or stub areas, to the specified value. Default cost: 1. Range: 0 to 16777215.

Examples
Setting cost for default LSA summary:

switch(config)# router ospf 1 switch(config-ospf-1)# area 1 default-metric 2 switch(config-ospf-1)# area 0.0.0.1 default-metric 2

Setting cost for default LSA summary to default:

switch(config)# router ospf 1 switch(config-ospf-1)# no area 1 default-metric switch(config-ospf-1)# no area 0.0.0.1 default-metric

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

area nssa
area <AREA-ID> nssa [no-summary] no area <AREA-ID> nssa [no-summary]
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1659

Creates the NSSA area (Not So Stubby Area) with <AREA-ID> if not present. If area is present and not NSSA area, this command changes the area type to NSSA area. If no-summary is used, area type will be NSSA No-Summary.
The no form of this command unsets the area type as NSSA. That is, the configured area will be changed to default normal area. The no area <AREA-ID> nssa no-summary command enables sending inter-area routes into NSSA, but will not unset the area as NSSA.

Parameter <AREA-ID>
nssa [no-summary]

Description
Specifies the area ID in one of the following formats. OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPF area identifier in decimal format. Range: 0 to 4294967295.
Specifies Not So Stubby Area (NSSA) area type. If area is present and not NSSA area, parameter changes the area type to NSSA area. If no-summary is specified, area type will be NSSA NoSummary, which means do not inject inter-area routes into NSSA.

Examples
Creating an NSSA area:

switch(config)# router ospf 1 switch(config-ospf-1)# area 1 nssa switch(config-ospf-1)# area 1 nssa no-summary

Unsetting the area as NSSA

switch(config)# router ospf 1 switch(config-ospf-1)# no area 1 nssa switch(config-ospf-1)# no area 1 nssa no-summary

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

area range

OSPFv2 commands | 1660

area <AREA-ID> range <IP-PREFIX> type {inter-area | nssa} [no-advertise] no area <AREA-ID> range <IP-PREFIX> type {inter-area | nssa} [no-advertise]
Description
Summarizes the routes with the matching address or masks. This command only works for border routers. The no form of this command removes route summarization for the configured IPv4 prefix address on the ABR. When using the no form of the command with the no-advertise option, enables advertising this range to other areas.

Parameter <AREA-ID>
range <IP-PREFIX> type {inter-area | nssa} no-advertise

Description
Specifies the area ID in one of the following formats. OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPF area identifier in decimal format. Range: 0 to 4294967295.
Specifies summarizing routes matching the area range prefix/mask.
Specifies the type this address aggregation applies to as either inter-area range prefix or NSSA range prefix.
Specifies the address range status as DoNotAdvertise (do not advertise this range to other areas).

Examples
Summarizing inter-area or NSSA paths:

switch(config)# router ospf 1 switch(config-ospf-1)# area 1 switch(config-ospf-1)# area 2 nssa switch(config-ospf-1)# area 1 range 192.77.114.0/24 type inter-area switch(config-ospf-1)# area 2 range 192.77.114.0/24 type nssa switch(config-ospf-1)# area 2 range 192.77.114.0/24 type nssa no-advertise

Removing summarization:

switch(config)# router ospf 1 switch(config-ospf-1)# no area 1 range 192.77.114.0/24 type inter-area switch(config-ospf-1)# no area 2 range 192.77.114.0/24 type nssa switch(config-ospf-1)# no area 2 range 192.77.114.0/24 type nssa no-advertise

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1661

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

area stub
area <AREA-ID> stub [no-summary] no area <AREA-ID> stub [no-summary]
Description
Creates the stub area with <AREA-ID> if not present. If the area is already present and it is not a normal stub area, then this command changes the stub area type to normal. If the no-summary parameter is used, area type will be stub No-Summary. The no form of this command unsets the area as a stub type. That is, the configured area will be changed to a default normal area. The no area <AREA-ID> stub no_summary command enables sending inter-area routes into the stub area, but will not unset the area as stub.
ABR does not inject the default route in a Totally Stubby Area with loopback in Area 0.0.0.0. As a workaround, configure a passive interface or active neighbors in the backbone area.

Parameter <AREA-ID>
stub [no-summary]

Description
Specifies the area ID in one of the following formats. OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPF area identifier in decimal format. Range: 0 to 4294967295.
Specifies the stub area type. If the area is already present and it is not a stub area, this parameter changes the area type to stub. If no-summary is specified, area type will be stub No-Summary (totally stubby area), which means do not inject summary link advertisements into stub areas.

Examples
Creating a STUB area:

switch(config)# router ospf 1 switch(config-ospf-1)# area 1 stub switch(config-ospf-1)# area 1 stub no-summary

Unsetting the area type as stub:

switch(config)# router ospf 1 switch(config-ospf-1) # no area 1 stub switch(config-ospf-1) # no area 1 sub no-summary

OSPFv2 commands | 1662

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

area virtual-link
area <AREA-ID> virtual-link <ROUTER-ID> no area <AREA-ID> virtual-link <ROUTER-ID>
Description
Creates an OSPF virtual link with a remote ABR and enters the vlink context. The no form of this command deletes an OSPF virtual link with the specified router ID of the remote ABR. If no <ROUTER-ID> is specified, the no form of the command sets the virtual link to the default settings.

Parameter <AREA-ID>
virtual-link <ROUTER-ID>

Description
Specifies the area ID in one of the following formats. OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPF area identifier in decimal format. Range: 0 to 4294967295.
Configures a virtual link with the specified router ID of the remote ABR.

Examples
Configuring OSPF virtual links:

switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)#

Deleting OSPF virtual links:

switch(config)# router ospf 1 switch(config-ospf-1)# no area 100 virtual-link 100.0.1.1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1663

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

authentication
authentication {hmac-sha-1 | hmac-sha-256 | hmac-sha-384 | hmac-sha-512 | message-digest | simple-text | null | keychain} no authentication
Description
Sets the OSPF virtual-link authentication type that will be used for authentication with the remote ABR. Choose one of the authentication types from the following parameters. The no form of this command unconfigures the virtual-link authentication type used and sets it to Null authentication.

Parameter hmac-sha-1 hmac-sha-256 hmac-sha-384 hmac-sha-512 message-digest simple-text null keychain

Description Sets the authentication type as SHA-1. Sets the authentication type as SHA-256. Sets the authentication type as SHA-384. Sets the authentication type as SHA-512. Sets the authentication type to message-digest. Sets the authentication type to simple-text. Sets the authentication type to null. Sets authentication type to use the key chain.

Examples
Setting OSPF virtual links authentication type:

OSPFv2 commands | 1664

switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# authentication simple-text
Deleting OSPF virtual links authentication type:
switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# no authentication

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

authentication-key
authentication-key [{ciphertext | plaintext} <PASSWORD>] no authentication-key
Description
Sets the OSPF virtual-link authentication password that is used for simple-text authentication. If the password is given in ciphertext, it will be decrypted and applied to the protocol. The no form of this command deletes the virtual-link authentication password that is used for simpletext authentication.

Parameter {ciphertext | plaintext} <PASSWORD>

Description Selects the password format. Specifies the password.

When the password is not provided on the command line, plaintext password prompting occurs upon pressing Enter. The entered password characters are masked with asterisks.
Examples
Setting the OSPF virtual link simple-text authentication password in plaintext format:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1665

switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# authentication-key plaintext F82#450b
Setting the OSPF virtual link simple-text authentication with a prompted plaintext password:
switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# authentication-key Enter the authentication key: ******** Re-Enter the authentication key: ********
Setting the OSPF virtual link simple-text authentication password in ciphertext format:
switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# authentication-key ciphertext AQaAz05...RmH+4pg=
Deleting the OSPF virtual link simple-text authentication password:
switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# no authentication-key

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

clear ip ospf neighbors
clear ip ospf [<PROCESS-ID>] neighbor [<NEIGHBOR>] [interface [<INTERFACE-NAME>]] [all-vrfs | vrf <VRF-NAME>]
Description
Resets the neighbor and clears the OSPF neighbor information.

OSPFv2 commands | 1666

Parameter <PROCESS-ID>
<NEIGHBOR> <INTERFACE-NAME> all-vrfs vrf <VRF-NAME>

Description Specifies the OSPFv2 process ID to clear the statistics for the particular OSPFv2 process. Range: 1 to 65535. Specifies the router ID of a neighbor. Specifies the OSPFv2 statistics to clear for the specified interface. Select to clear the OSPFv2 statistics for all VRFs. Specifies the name of a VRF.

Example
Clearing the OSPFv2 neighbor information:

switch# clear ip ospf 1 neighbor Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y switch# clear ip ospf 1 neighbor 1.1.1.2 Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y switch# clear ip ospf 1 neighbor interface 1/1/1 Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y switch# clear ip ospf 1 neighbor 1.1.1.5 vrf red Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y switch# clear ip ospf neighbor Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y switch# clear ip ospf neighbor 1.1.1.4 Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y switch# clear ip ospf neighbor interface 1/1/1 Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y switch# clear ip ospf neighbor 1.1.1.5 vrf red Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier
Command Information

Modification Supported process ID range expanded from 1-63 to 1-65535. --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1667

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

clear ip ospf statistics
clear ip ospf [<PROCESS-ID>] statistics [interface [<INTERFACE-NAME>]] [all-vrfs | vrf <VRF-NAME>]
Description
Clear the OSPF event statistics.

Parameter <PROCESS-ID>
<INTERFACE-NAME> all-vrfs vrf <VRF-NAME>

Description
OSPF process ID. Clear the statistics for the particular OSPF process. Range: 1 to 65535.
Clear the OSPF statistics for the specified interface.
Optionally select to clear the OSPF statistics for all VRFs.
Optionally select to clear the OSPF statistics for a particular VRF. If the VRF is not specified, information for the default VRF is cleared.

Examples
Clearing the OSPF event statistics:

switch# clear ip ospf statistics switch# clear ip ospf statistics interface 1/1/1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

OSPFv2 commands | 1668

dead-interval
dead-interval <INTERVAL> no dead-interval
Description
Sets the interval after which a neighbor is declared dead if no hello packet comes in for virtual links. The no form of this command sets the dead interval to default for virtual links. The default value is 40 seconds (generally four times the hello packet interval).
For proper operation, set the dead interval must be longer than the hello interval.

Parameter <INTERVAL>

Description
Specifies the time interval for the dead interval, in seconds. Range: 1 to 65535. Default: 40.

Examples
Setting the OSPv2F virtual links dead interval:

switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# dead-interval 30

Setting the OSPFv2 virtual links dead interval to default:

switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# no dead-interval

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

default-information originate
default-information originate [metric <METRIC-VALUE>]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1669

no default-information originate [metric <METRIC-VALUE>]
Description
Configures OSPF to advertise the default route (0.0.0.0/0) to its neighbors if it is present in the routing table. Optionally, the metric value can be set for default route ::/0. The default value is 1. The no form of this command disables advertisement of the default route.

Parameter metric <METRIC-VALUE>

Description
Specifies the OSPF metric value for the default route. Optional. Default: 1.

Examples
Setting advertisement of the default route:

switch(config)# router ospf 1 switch(config-ospf-1)# default-information originate

Disabling advertisement of the default route:

switch(config)# router ospf 1 switch(config-ospf-1)# no default-information originate

Setting advertisement of the default route and specifying an optional metric value of 20:

switch(config)# router ospf 1 switch(config-ospfv3-1)# default-information originate switch(config-ospfv3-1)# default-information originate metric 20

Disabling advertisement of the default route and setting metric to the default value:

switch(config)# router ospf 1 switch(config-ospf-1)# no default-information originate metric

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.09 10.07 or earlier
Command Information

Modification Added parameter: metric <METRIC-VALUE> --

OSPFv2 commands | 1670

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

default-information originate always
default-information originate always [metric <METRIC-VALUE>] no default-information originate always [metric <METRIC-VALUE>]
Description
Configures OSPF to advertise the default route (0.0.0.0/0) to its neighbors, regardless if it is present in the routing table or not. Optionally, metric can be set for default route 0.0.0.0/0. The default value is 1. The no form of this command disables advertisement of the default route.

Parameter metric <METRIC-VALUE>

Description Specifies the OSPF metric value for the default route. Default: 1.

Examples
Setting advertisement of the default route:
switch(config)# router ospf 1 switch(config-ospf-1)# default-information originate always
Disabling advertisement of the default route:
switch(config)# router ospf 1 switch(config-ospf-1)# no default-information originate always
Setting advertisement of the default route with metric set to 20:
switch(config)# router ospf 1 switch(config-ospf-1)# default-information originate always metric 20
Disabling advertisement of the default route and setting the metric to the default value:
switch(config)# router ospf 1 switch(config-ospf-1)# no default-information originate always metric

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1671

Release 10.09 10.07 or earlier

Modification Added parameter: metric <METRIC-VALUE> --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

default-metric
default-metric <METRIC-VALUE> no default-metric
Description
Sets the default metric for redistributed routes in the OSPF. The no form of this command sets the default metric to be used for redistributed routes into OSPF to the default of 25.

Parameter <METRIC-VALUE>

Description
Specifies the default metric value to use for redistributed routes. Default: 25. Range: 0-1677214.

Examples
Setting default metric for redistributed routes:

switch(config)# router ospf 1 switch(config-ospf-1)# default-metric 37

Setting default metric for redistributed routes to the default:

switch(config)# router ospf 1 switch(config-ospf-1)# no default-metric

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

OSPFv2 commands | 1672

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

disable
disable
Description
Disables the OSPF process.
This command does not remove the OSPF configurations.
Examples
Disabling OSPF process:
switch(config)# router ospf 1 switch(config-ospf-1)# disable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

distance
distance [<DISTANCE-VAL> | intra-area [<DISTANCE-VAL>] | inter-area [<DISTANCE-VAL>] | external [<DISTANCE-VAL>]] no distance [intra-area | inter-area | external]
Description
Defines an Administrative Distance (AD) for OSPF. Administrative Distance is used as a criteria to select the best route when multiple routes are present from different routing protocols. The no form of this command sets the OSPF administrative distance to the default of 110. Optionally, administrative distance can be set to default for the specific OSPF route type: intra-area, inter-area, or external type-5 and type-7 routes.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1673

Parameter <DISTANCE-VAL>
intra-area inter-area external

Description Specifies the OSPF administrative distance. Range: 1 to 255. Default: 110. Specifies the OSPF distance for intra-area routes. Specifies the OSPF distance for inter-area routes. Specifies the OSPF distance for external type 5 and type 7 routes.

Usage
Within a given OSPF process, intra-area routes are always given precedence even when distances are configured for inter-area or external type routes.
Examples
Setting OSPF administrative distance:

switch(config)# router ospf 1 switch(config-ospf-1)# distance 100 switch(config-ospf-1)# distance intra-area 24 external 55 inter-area 66 switch(config-ospf-1)# distance intra-area 24 external 55 switch(config-ospf-1)# distance external 55 switch(config-ospf-1)#exit
switch(config)# router ospf 2 switch(config-ospf-2)# distance 200 switch(config-ospf-2)# distance external 60 switch(config-ospf-2)# distance intra-area 24 inter-area 66

Setting OSPF administrative distance to the default:

switch(config)# router ospf 1 switch(config-ospf-1)# no distance switch(config-ospf-1)# no distance external switch(config-ospf-1)# no distance inter-area switch(config-ospf-1)# no distance intra-area switch(config-ospf-1)# no distance 100 switch(config-ospf-1)# no distance 220
switch(config)# router ospf 2 vrf blue switch(config-ospf-2)# no distance 200 switch(config-ospf-2)# no distance external 60 switch(config-ospf-2)# no distance intra-area 24 inter-area 66

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14

Modification
Added capability to have individual admin distance for multiple OSPF processes in a VRF.

OSPFv2 commands | 1674

Release 10.09 10.07 or earlier

Modification Added parameters: intra-area, inter-area, external --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

distribute-list prefix
distribute-list prefix <prefix-list-name> {in | out} no distribute-list prefix <prefix-list-name> {in | out}
Description
This command uses an existing prefix list to filter routes that are being installed in the routing table or redistributed to another routing protocol. The distribute-list prefix command filters routes in the inbound or the outbound direction. When this command is issued with the in parameter, it filters routes from being installed in the routing table, it does not filter LSAs. When this command is issued with the out parameter, it filters only the desired redistributed routes from other protocols.
This command requires that your prefix list is already defined using the ip prefix commands. Route-maps are not supported with the distribute-list feature.

Parameter prefix <prefix-list-name> {in | out}

Description
Specify the name of an existing prefix.
Select one of the following parameters to set the filter direction: n in: Filter incoming routes into the routing table n out: Filter outgoing routing updates

Examples
The following commands enable the filtering of OSPFv2 routes in an IPv4 network, so routes are no longer installed in the routing table or redistributed from another routing protocol.

switch(config)# router ospfv2 1 switch(config-ospfv2-1)# distribute-list prefix listA in switch(config-ospfv2-1)# distribute-list prefix listB out

The following command disables the filtering of OSPFv2 routes in an IPv4 network, so routes can be installed in the routing table or redistributed from another routing protocol.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1675

switch# configure terminal switch(config)# router ospfv2 1 switch(config-ospfv2-1)# no distribute-list prefix listA in switch(config-ospfv2-1)# no distribute-list prefix listB out

Command History
Release 10.13

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-ospfv2-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

enable
enable
Description
Enables the OSPF process, if disabled. By default the OSPF process is enabled.
Examples
Enabling OSPF process:
switch(config)# router ospf 1 switch(config-ospf-1)# enable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

graceful-restart

OSPFv2 commands | 1676

graceful-restart restart-interval <INTERVAL> helper [strict-lsa-check] ignore-lost-interface no...
Description
Configures graceful restart parameters for OSPF. The no form of this command sets the restart interval to the default interval of 120 seconds or disables the helper mode, depending on the parameter specified.

Parameter restart-interval <INTERVAL>
helper strict-lsa-check

Description
Specifies the time another router waits for this router to gracefully restart and selects the maximum time to wait in seconds. Range: 5 to 1800. Default: 120.
Specifies that the router will participate in the graceful restart of a neighbor router.
(Optional). Use with the helper parameter to enable strict Link state Advertisement (LSA) checking when acting as a restart helper for a restarting peer.
NOTE: OSPF neighbors must disable strict LSA checking. If the local node has fewer OSPF interfaces after restarting, then the neighbors that were adjacent on those interfaces will clear up their adjacencies to the restarting node and will send out link state updates to advertise the dropped adjacency. If strict LSA checking is enabled, the restarting router's neighbors will exit helper mode when they receive the updated LSAs and the graceful restart will still fail.

ignore-lost-interface

Enable the restarting router to ignore lost OSPF interfaces during a graceful restart process. This setting should be enabled on a high availability system to ensure a graceful restart completes successfully, even if OSPF-enabled links fail due to High Availability events like a switchover or failover.
NOTE: Enabling this setting means that the hitless restart procedures do not strictly follow those defined in RFC 3623, Graceful OSPF Restart.

no

Negate any parameter or return the setting to its default.

Examples
Enabling OSPF graceful restart:

switch(config)# router ospf 1 switch(config-ospf-1)# graceful-restart restart-interval 40 switch(config-ospf-1)# graceful-restart helper strict-lsa-check

Enabling the switch to ignore lost OSPF interfaces during a graceful restart process:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1677

switch(config)# router ospf 1 switch (config-ospf-1)# graceful-restart ignore-lost-interface
Setting the restart interval to default, and disabling helper mode:
switch(config)# router ospf 1 switch(config-ospfv3-1)# no graceful-restart restart-interval switch(config-ospfv3-1)# no graceful-restart helper

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

hello-interval
hello-interval <INTERVAL> no hello-interval
Description
Sets the time interval between OSPF hello packets for virtual links. The no form of this command sets the hello interval to the default value of 10 seconds for virtual links.
For proper operation, the hello interval must be shorter than the dead interval.

Parameter <INTERVAL>

Description
Specifies the time interval for the hello interval, in seconds. Range: 1 to 65535. Default: 10.

Examples
Setting the OSPF virtual links hello interval:

switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# hello-interval 30

OSPFv2 commands | 1678

Setting the OSPF virtual links hello interval to default:
switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# no hello-interval

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

ip ospf area
ip ospf <PROCESS-ID> area <AREA-ID> no ip ospf <PROCESS-ID> area <AREA-ID>
Description
Runs the OSPF protocol on the interface with the configured IPv4 address for the area specified. The interfaces which have an IP address configured in this network or in a subset of this network, will participate in the OSPF protocol. To move an interface to a new area, unmap the existing area and then associate a new area with the interface. The no form of this command disables OSPF on the interface and removes the interface from the area. Interfaces which have an IP address configured on the network or in a subset of the network, stop participating in the OSPF protocol.

Parameter <PROCESS-ID> <AREA-ID>

Description
Specifies the OSPF process Id. Range: 1 to 65535.
Specifies the OSPF area ID in one of the following formats. Area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. Area identifier in decimal format. Range: 0 to 4294967295.

Examples
Setting OSPF network for the area:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1679

switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf 1 area 1 switch(config-if-vlan)# ip ospf 1 area 0.0.0.1
Disabling OSPF network for the area:
switch(config)# interface vlan 1 switch(config-if-vlan)# no ip ospf 1 area 1 switch(config-if-vlan)# no ip ospf 1 area 0.0.0.1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip ospf authentication
ip ospf authentication {message-digest | simple-text | null | keychain | hmac-sha-1 | hmac-sha-256 | hmac-sha-384 | hmac-sha-512} no ip ospf authentication
Description
Sets the authentication type that will be used for authentication with the neighbor router. The no form of this command deletes the authentication type used for a particular authentication with the neighbor router and sets to null authentication.

Parameter message-digest simple-text null keychain hmac-sha-1

Description Sets authentication type as message-digest. Sets authentication type as simple-text. Sets authentication type as null. Sets the authentication type to use the key chain. Sets the authentication type to SHA-1.

OSPFv2 commands | 1680

Parameter hmac-sha-256 hmac-sha-384 hmac-sha-512

Description Sets the authentication type to SHA-256. Sets the authentication type to SHA-384. Sets the authentication type to SHA-512.

Examples
Setting OSPF authentication type on the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf authentication simple-text

Deleting OSPF authentication type on the interface and sets it to null:

switch(config)# interface vlan 1 switch(config-if-vlan)# no ip ospf authentication

Setting OSPF authentication type to SHA-384 on the interface:

switch(config)# interface vlan 5 switch(config-if-vlan)# ip ospf authentication hmac-sha-384

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip ospf authentication-key
ip ospf authentication-key [{ciphertext | plaintext} <PASSWORD>] no ip ospf authentication-key
Description
Sets the authentication password used for simple-text authentication. If the password is given in ciphertext it will be decrypted and applied to the protocol.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1681

The no form of this command deletes the authentication password used for simple-text authentication.

Parameter {ciphertext | plaintext} <PASSWORD>

Description Selects the password format. Specifies the password.

When the password is not provided on the command line, plaintext password prompting occurs upon pressing Enter. The entered password characters are masked with asterisks.
Examples
Setting the OSPF simple-text authentication password in plaintext format:
switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf authentication-key plaintext F82#450b
Setting the OSPF simple-text authentication password with a prompted plaintext password:
switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf authentication-key Enter the authentication key: ******** Re-Enter the authentication key: ********
Setting the OSPF simple-text authentication password in ciphertext format:
switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf authentication-key ciphertext AQBaZ...ecopg=
Deleting the OSPF simple-text authentication password:
switch(config)# interface vlan 1 switch(config-if-vlan)# no ip ospf authentication-key

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

OSPFv2 commands | 1682

Platforms
6300 6400

Command context
config-if config-if-vlan

Authority
Administrators or local user group members with execution rights for this command.

ip ospf cost
ip ospf cost <INTERFACE-COST> no ip ospf cost
Description
Sets the cost (metric) associated with a particular interface. The interface cost is used as a parameter to calculate the best routes. The no form of this command sets the cost (metric) associated with a particular interface to the default cost 1.

Parameter <INTERFACE-COST>

Description Specifies the interface cost value. Range: 1 to 65535. Default: 1.

Examples
Setting OSPF interface cost

switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf cost 100

Setting the OSPF interface cost to default

switch(config)# interface vlan 1 switch(config-if-vlan)# no ip ospf cost

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1683

ip ospf dead-interval
ip ospf dead-interval <INTERVAL> no ip ospf dead-interval
Description
Sets the interval after which a neighbor is declared dead if no hello packet is received on the OSPF interface. The no form of this command sets the interval after which a neighbor is declared dead, to the default for the OSPF interface. The default value is 40 seconds (generally 4 times the hello packet interval).

Parameter <INTERVAL>

Description
Specifies the time interval for the dead interval, in seconds. Range: 1 to 65535. Default: 40.

Examples
Setting OSPF dead interval on the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf dead-interval 30

Setting OSPF dead interval to default on the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# no ip ospf dead-interval

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip ospf hello-interval
ip ospf hello-interval <INTERVAL> no ip ospf hello-interval
Description

OSPFv2 commands | 1684

Sets the time interval between OSPF hello packets for the OSPF interface.
The no form of this command sets the time interval OSPF hello packets to the default of 10 seconds for the OSPF interface.

Parameter <INTERVAL>

Description
Specifies the time interval for the hello interval, in seconds. Range: 1 to 65535. Default: 10.

Examples
Setting OSPF hello interval on the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf hello-interval 30

Setting OSPF hello interval to the default on the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# no ip ospf hello-interval

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip ospf keychain
ip ospf keychain <KEYCHAIN-NAME> no ip ospf keychain
Description
Sets the key chain for md5 authentication. A key chain configures rotating keys for packet authenticating, reducing the risk of keys being compromised. The no form of this command deletes the key chain used for md5 authentication.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1685

Parameter <KEYCHAIN-NAME>

Description Name of key chain to be used for md5 authentication.

Examples
Setting OSPFv2 key chain authentication:

switch(config)# interface 1/1/1 switch(config-if)# ip ospf keychain ospf_keys

Deleting OSPFv2 key chain authentication:

switch(config)# interface 1/1/1 switch(config-if)# no ip ospf keychain

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip ospf message-digest-key md5
ip ospf message-digest-key <KEY-ID> md5 [{ciphertext | plaintext} <KEY>] no ip ospf message-digest-key <KEY-ID>
Description
Sets the md5 message digest authentication key. If the md5 key is given in ciphertext, it will be decrypted and applied to the protocol. The no form of this command deletes the md5 authentication key.

Parameter <KEY-ID> {ciphertext | plaintext} <KEY>

Description Specifies the md5 key ID. Range: 1 to 255. Selects the md5 key format. Specifies the md5 authentication key.

OSPFv2 commands | 1686

When the authentication key is not provided on the command line, plaintext key prompting occurs upon pressing Enter. The entered key characters are masked with asterisks.
Examples
Setting the md5 key in plaintext format:
switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf message-digest-key 1 md5 plaintext F82#450b
Setting the md5 key with a prompted plaintext key:
switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf message-digest-key 1 md5 Enter the MD5 authentication key: ******** Re-Enter the MD5 authentication key: ********
Setting the md5 key in ciphertext format:
switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf message-digest-key 1 md5 ciphertext AQt6e...7qEa4=
Deleting the md5 key:
switch(config)# interface vlan 1 switch(config-if-vlan)# no ip ospf message-digest-key 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip ospf network
ip ospf network {broadcast | point-to-point} no ip ospf network
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1687

Configures the OSPF network type for the interface. Choose one of the following parameters as the interface network type.
The no form of this command sets the network type for the interface to the system default which is broadcast network.

Parameter broadcast
point-to-point

Description
Specifies the OSPF network type as a broadcast multi-access network.
Specifies the OSPF network type as a point-to-point network.

Examples
Setting OSPF network type for the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf network broadcast switch(config-if-vlan)# ip ospf network point-to-point

Disabling OSPF network type for the interface to system default of broadcast network:

switch(config)# interface vlan 1 switch(config-if-vlan)# no ip ospf network

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip ospf passive
ip ospf passive no ip ospf passive
Description
Configures the interface as an OSPF passive interface. With this setting, the interface participates in OSPF but does not send or receive packets on that interface.

OSPFv2 commands | 1688

The no form of this command resets the interface as active. With this setting, the interface starts sending and receiving OSPF packets.
Examples
Setting the interface as OSPF passive interface:
switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf passive
Setting the interface as OSPF active interface:
switch(config)# interface vlan 1 switch(config-if-vlan)# no ip ospf passive

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip ospf priority
ip ospf priority <PRIORITY-VALUE> no ip ospf priority
Description
Sets the OSPF priority for the interface. The larger the numeric value of the priority, the higher the chances for it to become the designated router. Setting a priority of zero makes the router ineligible to become a designated router or back up designated router. The no form of this command sets the OSPF priority for the interface to the default of 1.

Parameter <PRIORITY-VALUE>

Description Specifies the OSPF priority value. Range: 0 to 255. Default: 1.

Examples
Setting OSPF priority for the interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1689

switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf priority 50
Disabling OSPF priority for the interface to default:
switch(config)# interface vlan1 switch(config-if-vlan)# no ip ospf priority

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip ospf retransmit-interval
ip ospf retransmit-interval <INTERVAL> no ip ospf retransmit-interval
Description
Sets the time between retransmitting lost link state advertisements for the OSPF interface. The no form of this command sets the time between retransmitting lost link state advertisements to the default of 5 seconds for the OSPF interface.

Parameter <INTERVAL>

Description
Specifies the retransmit interval, in seconds. Range: 1 to 3600. Default: 5.

Examples
Setting OSPF retransmit interval on the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf retransmit-interval 30

Setting OSPF retransmit interval to the default on the interface:

OSPFv2 commands | 1690

switch(config)# interface vlan 1 switch(config-if-vlan)# no ip ospf retransmit-interval

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip ospf sha-key sha
ip ospf sha-key <KEY-ID> sha [{ciphertext | plaintext} <KEY>] no ip ospf sha-key <KEY-ID>
Description
Sets the SHA (secure hash authentication) key for the selected interface. If the SHA key is given in ciphertext, it will be decrypted and applied to the protocol. This command accepts a key of up to 64 characters irrespective of the SHA version configured on the interface. OSPF will internally pad zeros to the key to obtain a 64-byte key. For all types of SHA, key length is adjusted to 64 bytes. The no form of this command deletes the SHA authentication key.

Parameter <KEY-ID> {ciphertext | plaintext} <KEY>

Description Specifies the SHA key ID. Range: 1 to 255. Selects the SHA key format. Specifies the SHA authentication key.

When the authentication key is not provided on the command line, plaintext key prompting occurs upon pressing Enter. The entered key characters are masked with asterisks.
Examples
Setting the SHA authentication key in plaintext format:
switch(config)# interface 1/1/1 switch(config-if)# ip ospf sha-key 1 sha plaintext F82#450b

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1691

Setting the SHA authentication key in prompted plaintext format:
switch(config)# interface 1/1/1 switch(config-if)# ip ospf sha-key 1 sha Enter the SHA authentication key: ******** Re-Enter the SHA authentication key: ********
Setting the SHA authentication key in ciphertext format:
switch(config)# interface 1/1/1 switch(config-if)# ip ospf sha-key 1 sha ciphertext AQapu...C2K47A=
Deleting the SHA authentication key:
switch(config)# interface 1/1/1 switch(config-if)# no ip ospf sha-key 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip ospf shutdown
ip ospf shutdown no ip ospf shutdown
Description
Disables OSPF on the interface. The interface state changes to Down. It does not remove the interface from the OSPF area. To remove the interface, use the command no ip ospf area. The no form of this command re-enables OSPF on the interface
Examples
Disabling OSPF on the interface:

OSPFv2 commands | 1692

switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf shutdown
Re-enabling OSPF on the interface:
switch(config)# interface vlan 1 switch(config-if-vlan)# no ip ospf shutdown

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip ospf transit-delay
ip ospf transit-delay <DELAY> no ip ospf transit-delay
Description
Sets the time delay in link state transmission for the OSPF interface. The no form of this command sets the delay in link state transmission to the default of 1 second for the OSPF interface.

Parameter <DELAY>

Description Specifies the transit delay in seconds. Range: 1 to 3600. Default: 1.

Examples
Setting OSPF transit delay on the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# ip ospf transit-delay 30

Setting OSPF transit delay to the default on the interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1693

switch(config)# interface vlan 1 switch(config-if-vlan)# no ip ospf transit-delay

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

keychain
keychain <KEYCHAIN-NAME> no keychain
Description
Sets the key chain for md5 authentication. A key chain configures rotating keys for packet authenticating, reducing the risk of keys being compromised. The no form of this command deletes the key chain used for md5 authentication.

Parameter <KEYCHAIN-NAME>

Description Name of key chain to be used for md5 authentication.

Examples
Setting OSPF virtual link key chain authentication:

switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# keychain ospf_keys

Deleting OSPF virtual link key chain authentication:

switch# configure terminal switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link switch(config-router-vlink)# no keychain

100.0.1.1

OSPFv2 commands | 1694

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

max-metric router-lsa
max-metric router-lsa [on-startup [<ADVERT-TIME>]] no max-metric router-lsa [on-startup]
Description
Sets the protocol to advertise a maximum metric so that other routers do not prefer this router as an intermediate hop in their shortest path first (SPF) calculations. If the on-startup parameter is used, the router is configured to advertise a maximum metric at startup for the time mentioned in seconds or for a default value of 600 seconds. The no form of this command advertises the normal cost metrics instead of advertising the maximized cost metric. This setting causes the router to be considered in traffic forwarding.

Parameter on-startup <ADVERT-TIME>

Description
Specifies the time in seconds to advertise self as stub-router on startup. If no time is specified, the default time of 600 seconds is used. Range: 5 to 86400. Default: 600.

Examples
Setting to maximize the cost metrics for Router LSA:

switch(config)# router ospf 1 switch(config-ospf-1)# max-metric router-lsa switch(config-ospf-1)# max-metric router-lsa on-startup switch(config-ospf-1)# max-metric router-lsa on-startup 3000

Setting to advertise the normal cost metrics instead of advertising the maximized cost metric:

switch(config)# router ospf 1 switch(config-ospf-1)# no max-metric router-lsa switch(config-ospf-1)# no max-metric router-lsa on-startup

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1695

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

maximum-paths
maximum-paths <MAX-VALUE> no maximum-paths
Description
Sets the maximum number of ECMP routes that OSPF can support. The no form of this command sets the maximum number of ECMP routes that OSPF can support to the default value of 4.

Parameter <MAX-VALUE>

Description
Specifies the maximum number of ECMP routes. Range: 1 to 32. Default: 4.

Examples
Setting maximum number of ECMP routes:

switch(config)# router ospf 1 switch(config-ospf-1)# maximum-paths 32

Setting maximum number of ECMP routes to the default of 4:

switch(config)# router ospf 1 switch(config-ospf-1)# no maximum-paths

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

OSPFv2 commands | 1696

Release 10.10 10.07 or earlier

Modification Increased upper limit of range of <MAX-VALUE> parameter to 32. --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

message-digest-key md5
message-digest-key <KEY-ID> md5 [{ciphertext | plaintext} <KEY>] no message-digest-key <KEY-ID>
Description
Sets the virtual link md5 message digest authentication key. If the md5 key is given in ciphertext, it will be decrypted and applied to the protocol. The no form of this command deletes the virtual link md5 authentication key.

Parameter <KEY-ID> {ciphertext | plaintext} <KEY>

Description Specifies the virtual link md5 key ID. Range: 1 to 255. Selects the virtual link md5 key format. Specifies the virtual link md5 authentication key.

When the authentication key is not provided on the command line, plaintext key prompting occurs upon pressing Enter. The entered key characters are masked with asterisks.
Examples
Setting virtual link md5 authentication key in plaintext format:
switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# message-digest-key 1 md5 plaintext F82#450b
Setting the virtual link md5 authentication key in prompted plaintext format:
switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# message-digest-key 1 md5 Enter the MD5 authentication key: ******** Re-Enter the MD5 authentication key: ********

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1697

Setting the virtual link md5 authentication key in ciphertext format:
switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# message-digest-key 1 md5 ciphertext AQapu...C2K47A=
Deleting the virtual link md5 authentication password:
switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# no message-digest-key 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

passive-interface default
passive-interface default no passive-interface
Description
Configures all OSPF interfaces as passive. The no form of this command sets all OSPF interfaces as active.
Examples
Setting OSPF-enabled interfaces as passive:
switch(config)# router ospf 1 switch(config-ospf-1)# passive-interface default
Setting OSPF-enabled interfaces as active:
switch(config)# router ospf 1 switch(config-ospf-1)# no passive-interface

OSPFv2 commands | 1698

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

redistribute
redistribute {bgp | connected | host-routes | local loopback | static | rip | ospf <PROCESS-ID>[route-map <ROUTE-MAP-NAME>] no redistribute {bgp | connected | host-routes | local loopback | static | rip | ospf <PROCESS-ID>}[route-map <ROUTE-MAP-NAME>]
Description
Redistributes routes originating from other protocols, or from another OSPFv2 process, to the current OSPFv2 process. If a route map is specified, then only the routes that pass the match clause specified in the route map are redistributed to OSPFv2. Configuration is not allowed if the referenced route map has not yet been configured. If you try to redistribute routes from an OSPFv2 process which is not created, you are prompted to allow the OSPFv2 process to be auto-created before proceeding with redistribution. If you confirm at the prompt, the OSPFv2 process is created with defaults and redistribution configuration applied. If you deny at the prompt, redistribution configuration is skipped. If command route-redistribute active-routes-only has been issued, only the routes from other protocols which are selected for forwarding are considered for redistribution into OSPFv2. The no form of this command disables redistribution of routes to the current OSPFv2 process.

Parameter bgp connected
local loopback static rip

Description Specifies redistributing BGP (Border Gateway Protocol) routes. Specifies redistributing connected (directly attached subnet or host). Specifies redistributing local routes of the loopback interface. Specifies redistributing static routes. Specifies redistributing RIP routes.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1699

Parameter ospf <PROCESS-ID>
route-map <ROUTE-MAP-NAME>

Description
Specifies redistributing routes from the specified OSPFv2 process ID. Range: 1 to 65535.
Specifies redistribution filtering by route map. To create a route map, use command route-map.

Examples
Redistributing routes to OSPFv2:

switch(config)# router ospf 1 switch(config-ospf-1)# redistribute bgp switch(config-ospf-1)# redistribute bgp route-map BGP_routes

switch(config-ospf-1)# redistribute host-routes switch(config-ospf-1)# redistribute connected switch(config-ospf-1)# redistribute connected route-map connected_routes switch(config-ospf-1)# redistribute local loopback switch(config-ospf-1)# redistribute local loopback route-map local_routes switch(config-ospf-1)# redistribute static switch(config-ospf-1)# redistribute static route-map static_networks switch(config-ospf-1)# redistribute rip switch(config-ospf-1)# redistribute rip route-map rip-routes switch(config-ospf-1)# redistribute ospf 2
Disabling redistributing routes to OSPFv2:
switch(config)# router ospf 1 switch(config-ospf-1)# no redistribute bgp switch(config-ospf-1)# no redistribute bgp route-map BGP_routes

switch(config-ospf-1)# no redistribute connected switch(config-ospf-1)# no redistribute connected route-map connected_routes switch(config-ospf-1)# no redistribute local loopback switch(config-ospf-1)# no redistribute local loopback route-map local_routes switch(config-ospf-1)# no redistribute static switch(config-ospf-1)# no redistribute static route-map static_networks switch(config-ospf-1)# no redistribute rip switch(config-ospf-1)# no redistribute rip route-map rip-routes switch(config-ospf-1)# no redistribute ospf 2

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.08

Modification Supported process ID range expanded from 1-63 to 1-65535. Added route-map support for supported redistribute source-

OSPFv2 commands | 1700

Release 10.07 or earlier

Modification protocols. Updated information and examples. --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

reference-bandwidth
reference-bandwidth <BANDWIDTH> no reference-bandwidth
Description
Sets the reference bandwidth for OSPFv2. If the OSPFv2 interface cost is not explicitly set, then the cost of all the OSPFv2 interfaces is recalculated based on the reference bandwidth and link speed of the interface. For VLAN interfaces the link speed value is taken as 1 Gbps (if the OSPFv2 interface cost is not explicitly set). The no form of this command sets the reference bandwidth for OSPF to the default of 100000 Mbps.

Parameter <BANDWIDTH>

Description
Specifies the reference bandwidth used to calculate the cost of an interface in Mbps. Range: 1 to 4000000. Default: 100000.

Examples
Setting the reference bandwidth:

switch(config)# router ospf 1 switch(config-ospf-1)# reference-bandwidth 40000

Setting the reference bandwidth to the default value:

switch(config)# router ospf 1 switch(config-ospf-1)# no reference-bandwidth

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1701

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

retransmit-interval
retransmit-interval <INTERVAL> no retransmit-interval
Description
Sets the time between retransmitting lost link state advertisements for virtual links. The no form of this command sets the time between retransmitting lost link state advertisements to the default of 5 seconds for virtual links.

Parameter <INTERVAL>

Description
Specifies the retransmit interval in seconds. Range: 1 to 3600. Default: 5.

Examples
Setting OSPFv2 virtual links retransmit interval:

switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# retransmit-interval 30

Setting OSPFv2 virtual links retransmit interval to default:

switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# no retransmit-interval

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

OSPFv2 commands | 1702

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

rfc1583-compatibility
rfc1583-compatibility no rfc1583-compatibility
Description
Enables OSPF compatibility with RFC1583 (backward compatibility). If RFC1583 compatibility is enabled, then the route cost calculation follows a different method. The no form of this command disables OSPF compatibility with RFC1583 (backward compatibility). By default the RFC1583 compatibility is disabled.
Examples
Enabling OSPF RFC1583 compatibility:
switch(config)# router ospf 1 switch(config-ospf-1)# rfc1583-compatibility
Disabling OSPF RFC1583 compatibility:
switch(config)# router ospf 1 switch(config-ospf-1)# no rfc1583-compatibility

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

router ospf
router ospf <PROCESS-ID> [vrf <VRF-NAME>] no router ospf <PROCESS-ID> [vrf <VRF-NAME>]
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1703

Creates an OSPF process (if not created already) on a VRF, and switches to the OSPF router instance context. Up to eight OSPF processes are supported per VRF.
The no form of this command removes the OSPF instance.

Parameter <PROCESS-ID> vrf <VRF-NAME>

Description Specifies an OSPF process ID. Range: 1 to 65535. Specifies a VRF name for the OSPF process. Default: default.

Examples

switch(config)# router ospf 1 switch(config-ospf-1)#

switch(config)# router ospf 1 vrf vrf_red

switch(config)# no router ospf 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Supported process ID range expanded from 1-63 to 1-65535. --
Authority Administrators or local user group members with execution rights for this command.

router-id
router-id <ROUTER-ADDR> no router-id
Description
Sets an ID for the router in an IPv4 address format. The no form of this command unconfigures the router-id for the instance and sets the router-id to the default as follows: the router-id is selected dynamically as equal to the highest loopback address on the router, or the highest active interface if there are no loopback addresses. If no IP address is configured on any interfaces on the router, OSPF will not form an adjacency.

OSPFv2 commands | 1704

Parameter <ROUTER-ADDR>

Description
Specifies the Router ID in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.

Examples
Setting router-id in the OSPF context:

switch(config)# router ospf 1 switch(config-ospf-1)# router-id 1.1.1.1

Unconfiguring router-id:

switch(config)# router ospf 1 switch(config-ospf-1)# no router-id

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

sha-key sha
sha-key <KEY-ID> sha [{ciphertext | plaintext} <KEY>] no sha-key <KEY-ID>
Description
Sets the SHA (secure hash authentication) key for the selected virtual link. If the SHA key is given in ciphertext, it will be decrypted and applied to the protocol. This command accepts a key of up to 64 characters irrespective of the SHA version configured on virtual link. OSPF will internally pad zeros to the key to obtain a 64-byte key. For all types of SHA, key length is adjusted to 64 bytes. The no form of this command deletes the virtual link SHA authentication key.

Parameter <KEY-ID>

Description Specifies the virtual link SHA key ID. Range: 1 to 255.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1705

Parameter {ciphertext | plaintext} <KEY>

Description Selects the virtual link SHA key format. Specifies the virtual link SHA authentication key.

When the authentication key is not provided on the command line, plaintext key prompting occurs upon pressing Enter. The entered key characters are masked with asterisks.
Examples
Setting virtual link SHA authentication key in plaintext format:
switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# sha-key 1 sha plaintext F82#450b
Setting the virtual link SHA authentication key in prompted plaintext format:
switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# sha-key 1 sha Enter the SHA authentication key: ******** Re-Enter the SHA authentication key: ********
Setting the virtual link SHA authentication key in ciphertext format:
switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# sha-key 1 sha ciphertext AQapu...C2K47A=
Deleting the virtual link SHA authentication key:
switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# no sha-key 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

OSPFv2 commands | 1706

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

show ip ospf
show ip ospf [<PROCESS-ID>] [all-vrfs | vrf <VRF-NAME>]
Description
Displays general OSPF, area, state, and configuration information.

Parameter <PROCESS-ID>
all-vrfs vrf <VRF-NAME>

Description
Enter an OSPF process ID to display general OSPF information for a particular OSPF process. Range: 1 to 65535.
Optionally select to display general OSPF information for all VRFs.
Specifies the name of a VRF. Default: default.

Examples
Showing general OSPF configurations:

switch# show ip ospf 200

VRF : Default

Process : 200

-------------------------------------------------------------------

Router ID

: 1.1.1.1

BFD

: Disabled

SPF Hold Interval

: 1000 ms

LSA Start Interval

: 5000 ms

LSA Max Wait Interval : 1000 ms

External LSAs

:4

ECMP

:4

Area Border

: Yes

GR Status

: Disabled

GR State

: Inactive

GR Helper

: Enabled

GR Ignore Lost I/F

: Disabled

Summary address:

prefix 10.1.1.0/24, advertise, tag 10

OSPFv2

: Enabled

SPF Start Interval : 5000 ms

SPF Max Wait Interval : 1000 ms

LSA Hold Interval

: 1000 ms

LSA Arrival Interval : 1000 ms

Checksum Sum

: 133302

Reference Bandwidth : 100000 Mbps

AS Border

: No

GR Interval

: 120 sec

GR Exit Status

: None

GR Strict LSA Check : Enabled

Internal Process ID : 1

Area

Total Active

-------------------------

Normal 2

1

Stub

2

1

NSSA

0

0

Area : 0.0.0.1

----------------------------------

Area Type

: Normal

Status

Total Interfaces

: 100

Active Interfaces

Passive Interfaces : 5

Loopback Interfaces

SPF Calculation Count : 1500

Area ranges:

: Active : 10 : 85

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1707

ip-prefix 10.1.1.1/24, inter-area, advertise

Number of LSAs

: 5000

Checksum Sum

: 99122

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip ospf border-routers
show ip ospf [<PROCESS-ID>] border-routers [all-vrfs | vrf <VRF-NAME>]
Description
Displays the OSPF routing table entries for Area Border Router (ABR) and Autonomous System Border Router (ASBR).

Parameter <PROCESS-ID>
all-vrfs vrf <VRF-NAME>

Description
Enter an OSPF process ID to display general OSPF information for a particular OSPF process. Range: 1 to 65535.
Optionally select to display general OSPF information for all VRFs.
Specifies the name of a VRF. Default: default.

Examples
Showing OSPF border routers information:

switch# show ip ospf border-routers

VRF : default

Process : 1

Internal Routing Table

-----------------------------------------------------

Codes: i - Intra-area route, I - Inter-area route

OSPFv2 commands | 1708

Router-ID Cost Type Area

SPF

i 40.40.40.40 10 ABR 0.0.0.0 71

i 60.60.60.60 20 ABR 0.0.0.0 71

i 40.40.40.40 10 ABR 0.0.0.1 71

i 60.60.60.60 20 ABR 0.0.0.1 71

Nexthop 192.0.2.1 192.0.2.1 192.0.2.1 192.0.2.1

Interface 1/1/1 1/1/1 1/1/2 1/1/2

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip ospf interface
show ip ospf [<PROCESS-ID>] interface [<interface-name>] [brief] [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Displays general OSPF, area, state, and configuration information.

Parameter <PROCESS-ID>
<interface-name>] brief

Description
Enter an OSPF process ID to display general OSPF information for a particular OSPF process. Range: 1 to 65535.
Specify the name of an OSPF interface.
Include this parameter to display a brief overview of the following OSPF configuration information. n Interface: OSPF interface name. n Area: OSPF area ID. n Cost: The metric OSPF uses to judge a path's feasibility,
calculated as (reference bandwidth / interface bandwidth). n State: Indicates if the interface is a designated router (Dr) or a
backup designated router (Backup-dr). n Status: Indicates if the interface is up or down. n Flags: P - Passive A - Active.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1709

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Optionally select to display general OSPF information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing general OSPF configuration settings for the default VRF:

switch (config-if)# show ip ospf 1

VRF : default

Process : 1

----------------------------------------------------

RouterID SPF Start Interval SPF Hold Interval LSA Start Time LSA Max Wait Time External LSAs ECMP Area Border GR Status GR State GR Helper GR Ignore Lost I/F Summary address:

: 20.0.0.1

: 200 ms

: 1000 ms

: 5000 ms

:0

ms

:0

:4

: false

: Enabled

: inactive

: Enabled

: Disabled

OSPFv2

: Enabled

SPF Max Wait Interval LSA Hold Time LSA Arrival Checksum Sum Reference Bandwidth AS Border GR Interval GR Exit Status GR Strict LSA Check

: 5000 ms

:0

ms

: 1000 ms

:0

: 100000 Mbps

: false

: 120 sec

: none

: Enabled

Area

Total

Active

------------------------------

Normal

1

1

Stub

0

0

NSSA

0

0

Area : 0.0.0.0

----------------

Area Type

Total Interfaces

Passive Interfaces

SPF Calculation Count

Area ranges

:

Number of LSAs

: Normal :1 :0 :4
:3

Status

: Active

Active Interfaces : 1

Loopback Interfaces : 0

Checksum Sum

: 82420

Showing OSPF configuration settings for all interfaces:

switch(config)# show ip ospf interface Codes: DR - Designated router BDR - Backup designated router

Interface 1/1/1 is up, line protocol is up

--------------------------------------------

VRF

: default

IP Address

: 10.10.10.1/24

Status

: Up

Hello Interval

: 10 sec

Process Area Network Type Dead Interval

:1 : 0.0.0.0 : Broadcast : 40 sec

OSPFv2 commands | 1710

Transit Delay

:1

sec

Link Speed

: 1000 Mbps

Cost Configured

:1

State/Type

: BDR

DR

: 10.10.10.2

Link LSAs

:0

Authentication

: Md5

Interface 1/1/2 is up, line protocol is up

--------------------------------------------

VRF

: default

IP Address

: 10.10.10.1/24

Status

: Up

Hello Interval

: 10 sec

Transit Delay

:1

sec

Link Speed

: 1000 Mbps

Cost Configured

:1

State/Type

: BDR

DR

: 20.10.10.2

Link LSAs

:0

Authentication

: Simple

Retransmit Interval : 5

sec

Cost Calculated Router Priority BDR Checksum Sum Passive

:1 :1 : 10.10.10.1 :0 : Yes

Process

:1

Area

: 0.0.0.0

Network Type

: Broadcast

Dead Interval

: 40 sec

Retransmit Interval : 5

sec

Cost Calculated Router Priority BDR Checksum Sum Passive

:1 :1 : 20.10.10.1 :0 : No

Displaying brief OSPF information

switch(config-if)# show ip ospf interface brief

VRF : default Process : 1

==============================

Total Number of Interfaces: 2

Flags: P - Passive A - Active

Interface

Area

IP Address/Mask

Cost State Status Flags

----------------------------------------------------------------------------------

-------

1/1/1

0.0.0.0

10.10.10.1/24

40 DR

Up

P

1/1/2

255.255.255.255 200.200.200.123/24 4

Waiting Up

A

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.09
10.07 or earlier

Modification
Supported process ID range expanded from 1-63 to 1-65535.
Output of the show ip ospf interface command includes flags to indicate whether the interface is in passive or active mode.
--

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1711

show ip ospf lsdb
show ip ospf [<process-id>] lsdb adv-router {<ROUTER-ID> | self} area <AREA-ID> lsid <link-state-id> all-vrfs |{vrf <VRF-NAME>} asbr-summary database-summary external lsid <LINK-STATE-ID> network nssa-external router summary
Description
Shows the OSPF link state database summary for different OSPF LSAs (Link State Advertisement). Use the parameters to get information for a particular LSA.

Parameter <PROCESS-ID> adv-router {<ROUTER-ID>|self} area <AREA-ID>
lsid <LINK-STATE-ID> all-vrfs|{vrf <vrf-name>
asbr-summary

Description
Enter an OSPF process ID to display general OSPF information for a particular OSPF process. Range: 1 to 65535.
Select to display link states for a particular advertising router. Specify either a Router ID of the advertising router or specify self to show self-originated link states.
Select to display information filtered for the specified area in one of the following formats.
OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPF area identifier in decimal format. Value: 0 to 4294967295.
Select to display information filtered by link state identifier specified in IPv4 address format (A.B.C.D).
Select all-vrfs to display general OSPF information for all VRFs, or use the vrf <VRF-NAME> option to display information for a specific VRF.
Optionally select one of the following parameters to filter the link state database information.
Show ASBR summary link states (LSA type 4).

database-summary external

Select to display the count of each type of LSA and each area in the database.
NOTE: The database-summary parameter does not support the area <area-id>, lsid <link-state-id> or adv-router {<routerid>|self} parameters.
Show external link states (LSA type 5).

OSPFv2 commands | 1712

Parameter

Description

NOTE: The external parameter does not support the area area <area-id> parameter.

network nssa-external router summary

Show network LSAs (LSA type 2). Show NSSA external link states (LSA type 7). Show router LSAs (LSA type 1). Show network-summary link states (LSA type 3).

Examples
Showing OSPF link state database (LSDB) general information:

switch# show ip ospf lsdb OSPF Router with ID (50.50.50.50) (Process ID 1 VRF default) ============================================================

Router Link State Advertisements (Area 0.0.0.0)

-----------------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Link Count Bits

-----------------------------------------------------------------------------

40.40.40.40

930

0x80000004 0x2ea1

0

3

None

50.50.50.50

935

0x80000002 0x8b52

0

1

E

60.60.60.60

943

0x800003c5 0x9854

0

2

None

Network Link State Advertisements (Area 0.0.0.0)

------------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Router Count

------------------------------------------------------------------------

60.60.60.60

944

0x80000001 0x7179

1360007168 2

50.50.50.50

935

0x80000001 0x516a

19

1

Inter Area Prefix Link State Advertisements (Area 0.0.0.0)

------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Prefix

------------------------------------------------------------------

40.40.40.40

929

0x80000001 0x2498

131072

FEC0:3344::/32

50.50.50.50

928

0x80000001 0x5b2f

65536

111::/64

Inter Area Router Link State Advertisements (Area 0.0.0.0)

---------------------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Destination Router ID

---------------------------------------------------------------------------------

40.40.40.40

929

0x80000001 0x2498

1

33.33.33.33

AS External Link State Advertisements (Area 0.0.0.0)

------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Prefix

------------------------------------------------------------------

40.40.40.40

264

0x80000001 0x24cc4

1

10::/64

40.40.40.40

675

0x80000001 0x5b00f

2

11::/64

NSSA External Link State Advertisements (Area 0.0.0.0)

------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Prefix

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1713

------------------------------------------------------------------

3.3.3.3

264

0x80000001 0x24ac2

1

200::/64

Link-local Link State Advertisements (Area 0.0.0.0)

---------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Interface

---------------------------------------------------------------------

50.50.50.50

264

0x80000001 0x653c4

19

1/1/1

Intra Area Prefix Link State Advertisements (Area 0.0.0.0)

----------------------------------------------------------------------------------

-------------

ADV Router

Age

Seq#

Checksum LSID

Referenced LS Type

Referenced LSID

----------------------------------------------------------------------------------

-------------

50.50.50.50

263

0x80000001 0x1da34

1

0x2001

0

50.50.50.50

264

0x80000001 0x2a45d

1

0x2002

19

Showing ASBR summary link states:

switch# show ip ospf lsdb asbr-summary OSPF Router with ID (2.2.2.1) (Process ID 1 VRF default) ========================================================

ASBR Summary Link State Advertisements (Area 0.0.0.0) -----------------------------------------------------

LSID

ADV Router

Age

Seq#

Checksum

------------------------------------------------------------------

209.165.201.3 60.60.60.60

944

0x80000001

0x7179

192.0.2.1

50.50.50.50

935

0x80000001

0x516a

Showing external link states:

switch# show ip ospf lsdb external OSPF Router with ID (2.2.2.1) (Process ID 1 VRF default) ========================================================

AS External Link State Advertisements --------------------------------------

LSID

ADV Router

Age

Seq#

Checksum

------------------------------------------------------------------

209.165.201.3 60.60.60.60

944

0x80000001

0x7179

192.0.2.1

50.50.50.50

935

0x80000001

0x516a

Showing database summary:

switch# show ip ospf lsdb database-summary OSPF Router with ID (10.1.1.1) (Process ID 1 VRF default) ==========================================================

Area 0.0.0.0 database summary ------------------------------

LSA Type

Count

OSPFv2 commands | 1714

---------------------------

Router

2

Network

1

Inter-area Summary 1

ASBR Summary

0

NSSA External

0

Subtotal

4

Process 1 database summary ---------------------------

LSA Type

Count

---------------------------

Router

2

Network

1

Inter-area Summary 1

ASBR Summary

0

NSSA External

0

AS External

0

Total

4

Showing router LSAs:

switch# show ip ospf lsdb router OSPF Router with ID (2.2.2.1) (Process ID 1 VRF default) ========================================================

Router Link State Advertisements (Area 0.0.0.0) -----------------------------------------------

LSID

ADV Router

Age

Seq#

Checksum Link Count

-------------------------------------------------------------------------

1.1.1.2

1.1.1.2

15

0x80000004 0xf526 1

2.2.2.1

2.2.2.1

14

0x80000005 0x6c5e 2

2.2.2.2

2.2.2.2

104

0x80000004 0xf51a 1

OSPF Router with ID (2.2.2.1) (Process ID 1 VRF default)

========================================================

Router Link State Advertisements (Area 0.0.0.0) -----------------------------------------------

LSID

ADV Router

Age

Seq#

Checksum Link Count

-------------------------------------------------------------------------

1.1.1.2

1.1.1.2

15

0x80000004 0xf526 1

2.2.2.1

2.2.2.1

14

0x80000005 0x6c5e 2

2.2.2.2

2.2.2.2

104

0x80000004 0xf51a 1

Showing network LSAs:

switch# show ip ospf lsdb network OSPF Router with ID (2.2.2.1) (Process ID 1 VRF default) ========================================================

Network Link State Advertisements (Area 0.0.0.0) ------------------------------------------------

LSID

ADV Router

Age

Seq#

Checksum

----------------------------------------------------------------

1.1.1.2

1.1.1.2

141

0x80000001 0xc55e

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1715

2.2.2.2

2.2.2.2

230

0x80000001 0xa179

Showing network-summary link states:

switch# show ip ospf lsdb summary OSPF Router with ID (2.2.2.1) (Process ID 1 VRF default) ========================================================

Inter-area Summary Link State Advertisements (Area 0.0.0.0) -----------------------------------------------------------

LSID

ADV Router

Age

Seq#

Checksum

----------------------------------------------------------------

1.1.1.0

2.2.2.1

133

0x80000002 0xa089

Inter-area Summary Link State Advertisements (Area 0.0.0.1) -----------------------------------------------------------

LSID

ADV Router

Age

Seq#

Checksum

----------------------------------------------------------------

2.2.2.0

2.2.2.1

133

0x80000002 0x7caa

Showing NSSA external link states:

switch(config-ospf-1)# show ip ospf lsdb nssa-external OSPF Router with ID (2.2.2.1) (Process ID 1 VRF default) ========================================================

NSSA External Link State Advertisements (Area 0.0.0.1) ------------------------------------------------------

LSID

ADV Router

Age

Seq#

Checksum

----------------------------------------------------------------

8.8.8.0

1.1.1.2

162

0x80000003 0xc7b2

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

OSPFv2 commands | 1716

show ip ospf neighbors
show ip ospf [<PROCESS-ID>] neighbors [<NEIGHBOR-ID>] [interface <INTERFACE-NAME>] [detail | summary] [all-vrfs | vrf <VRF-NAME>]
Description
Displays information about OSPF neighbors.

Parameter <PROCESS-ID>
neighbors <NEIGHBOR-ID>
interface <INTERFACE-NAME>
detail summary all-vrfs vrf <VRF-NAME>

Description
Enter an OSPF process ID to display OSPF neighbor information for the particular OSPF process. Range: 1 to 65535.
Select to display information about a particular neighbor, specified in IPv4 format (A.B.C.D).
Select to display neighbor information only for the specified interface.
Select to display detailed information for all the neighbors.
Select to display summary information for the neighbors.
Select to display neighbor information for all VRFs.
Specify the name of a VRF. Default: default.

Examples
Showing OSPF neighbors information for the default VRF:

switch# show ip ospf neighbors OSPF Process ID 1 VRF default ==============================

Total Number of Neighbors: 1

Neighbor ID

Priority State

Nbr Address

Interface

-------------------------------------------------------------------------

2.2.2.2

1

FULL/DR

10.1.1.2

1/1/1

Showing OSPF neighbors information for VRF red:

switch# show ip ospf neighbors vrf red OSPF Process ID 1 VRF red ==========================

Total Number of Neighbors: 1

Neighbor ID

Priority State

Nbr Address

Interface

-------------------------------------------------------------------------

1.1.1.1

1

FULL/BDR

10.1.1.1

1/1/1

Showing OSPF neighbors information for a specific neighbor:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1717

switch# show ip ospf neighbors 2.2.2.2

switch# show ip ospf neighbors 2.2.2.2

VRF : default

Process : 1

----------------------------------------------------------------

Router-Id

: 2.2.2.2

Area Id

: 0.0.0.0

Interface

: 1/1/1

Address

: 10.10.10.2

State

: FULL

Neighbor Priority : 1

Dead Timer Due : 00:00:36

Options

: 0x42

Showing OSPF neighbors information for a specific neighbor and interface:

switch# show ip ospf neighbors 2.2.2.2 interface 1/1/1

VRF : default

Process : 1

-----------------------------------------------

Router-Id

: 2.2.2.2

Interface

: 1/1/1

State

: FULL

Dead Timer Due : 00:00:36

Area Id

: 0.0.0.0

Address

: 10.10.10.2

Neighbor Priority : 1

Options

: 0x42

Showing detail information for OSPF neighbors:

switch# show ip ospf neighbors detail

VRF : default

Process : 1

----------------------------------------------

Router-Id

: 2.2.2.2

Area Id

: 0.0.0.0

Interface

: 1/1/1

Address

: 10.10.10.2

State

: FULL

Neighbor Priority : 1

DR

: 10.10.10.2

BDR

: 10.10.10.1

Dead Timer Due : 00:00:38

Options

: 0x42

Retransmission Queue Length : 0

Time Since Last State Change : 00h:11m:37s

Showing summary information for OSPF neighbors in the default VRF:

switch# show ip ospf neighbors summary OSPF Process ID 1 VRF default, Neighbor Summary ================================================

Interface Down Attempt Init TwoWay ExStart Exchange Loading Full Total

-------------------------------------------------------------------------

1/1/1

00

00

0

0

0

1

1

1/1/2

00

00

0

0

0

0

0

Total

00

00

0

0

0

1

1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

OSPFv2 commands | 1718

Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip ospf routes
show ip ospf [<PROCESS-ID>] routes [<IPV4-ADDR>/<MASK>] [all-vrfs | vrf <VRF-NAME>]
Description
Displays OSPF routing table information.

Parameter <IPV4-ADDR> <MASK> <PROCESS-ID> all-vrfs vrf <VRF-NAME>

Description
Specify an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 32.
Enter an OSPF process ID to display OSPF neighbor information for the particular OSPF process. Range: 1 to 65535.
Select to display neighbor information for all VRFs.
Specify the name of a VRF. Default: default.

Examples
Showing OSPF routing table information:

switch# show ip ospf routes Codes: i - Intra-area route, I - Inter-area route
E1 - External type-1, E2 - External type-2

OSPF Process ID 1 VRF default, Routing Table ---------------------------------------------

Total Number of Routes : 2

10.1.1.0/24

(i) area: 0.0.0.0

directly attached to interface 1/1/1, cost 1 distance 110

20.1.1.0/24

(I)

via 10.1.1.2 interface 1/1/1, cost 2 distance 110

Showing OSPF routing table information for a specific subnet:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1719

switch# show ip ospf routes 10.1.1.0/2 Codes: i - Intra-area route, I - Inter-area route
E1 - External type-1, E2 - External type-2

OSPF Process ID 1 VRF default, Routing Table for prefixes 10.1.1.0/24 ----------------------------------------------------------------------

Total Number of Routes : 1

10.1.1.0/24

(i) area: 0.0.0.0

directly attached to interface 1/1/1, cost 1 distance 110

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip ospf statistics
show ip ospf [<PROCESS-ID>] statistics [all-vrfs | vrf <VRF-NAME>]
Description
Displays OSPF statistics.

Parameter <PROCESS-ID>
all-vrfs vrf <VRF-NAME>

Description
Enter an OSPF process ID to display OSPF neighbor information for the particular OSPF process. Range: 1 to 65535.
Select to display OSPF statistics information for all VRFs.
Specify the name of a VRF. Default: default.

Examples
Showing OSPF statistics:

OSPFv2 commands | 1720

switch# show ip ospf statistics OSPF Process ID 1 VRF default, Statistics (cleared 1h 16m 24s ago) -------------------------------------------------------------

Unknown Interface Drops

:0

Unknown Virtual Interface Drops : 0

Bad Instance ID Drops

:0

Bad IP Header Length Drops

:0

Wrong OSPF Version Drops

:0

Bad Source IP Drops

:0

Resource Failure Drops

:0

Bad Header Length Drops

:0

Total Drops

:0

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip ospf statistics interface
show ip ospf [<PROCESS-ID>] statistics interface [<INTERFACE-NAME>] [all-vrfs | vrf <VRF-NAME>]
Description
Displays OSPF statistics for the OSPF-enabled interfaces.

Parameter <PROCESS-ID>
<INTERFACE-NAME> all-vrfs vrf <VRF-NAME>

Description
Enter an OSPF process ID to display OSPF-enabled interface statistics information on the specified OSPF process. Range: 1 to 65535.
Select to display information only for the specified interface.
Select to display OSPF-enabled interface statistics information for all VRFs.
Specify the name of a VRF. Default: default.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1721

Examples
Showing OSPF-enabled interfaces information:

switch# show ip ospf statistics interface 1/1/1 OSPF Process ID 1 VRF default, interface 1/1/1 statistics (cleared 0h 30m 28s ago) =============================================================================

Tx Hello Packets

: 101

Tx Hello Bytes

: 101

Tx DD Packets

: 101

Tx DD Bytes

: 101

Tx LS Request Packets : 101

Tx LS Request Bytes : 101

Tx LS Update Packets : 101

Tx LS Update Bytes : 101

Tx LS Ack Packets

: 101

Tx LS Ack Bytes

: 101

Rx Hello Packets

: 99

Rx Hello Bytes

: 99

Rx DD Packets

: 99

Rx DD Bytes

: 99

Rx LS Requests Packets : 99

Rx LS Request Bytes : 99

Rx LS Update Packets : 99

Rx LS Update Bytes

: 99

Rx LS Ack Packets

: 99

Rx LS Ack Bytes

: 99

Total Number of State Changes : 8

Number of LSAs

: 29

LSA Checksum Sum

: 2345

Total Transmit Failures

: 29

Total OSPF Packets Discarded : 999

Reason

Packets Dropped

-----------------------------------------------------

Invalid type

19

Invalid length

9

Invalid checksum

0

Invalid version

23

Bad or unknown source

67

Area mismatch

1

Self-originated

19

Duplicate router ID

9

Interface standby

0

Total Hello packets dropped

60

Network Mask mismatch

10

Hello interval mismatch

10

Dead interval mismatch

10

Options mismatch

10

MTU mismatch

10

Neighbor ignored

10

Authentication errors

12

Type mismatch

6

Authentication failures

6

Wrong protocol

0

Resource failures

0

Bad LSA length

0

Others

0

Total LSAs Ignored : 176

Bad Type

: 10

Bad Length

: 56

Invalid Data

: 55

Invalid Checksum : 55

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

OSPFv2 commands | 1722

Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip ospf virtual-links
show ip ospf [<PROCESS-ID>] virtual-links [brief] [all-vrfs | vrf <VRF-NAME>]
Description
Displays the current state and parameters of the OSPF virtual links.

Parameter <PROCESS-ID>
brief
all-vrfs vrf <VRF-NAME>

Description
Enter an OSPF process ID to display information on the OSPF virtual links for the particular OSPF process. Range: 1 to 65535.
Select to display brief overview information for the OSPF virtual links.
Select to display OSPF virtual links information for all VRFs.
Specify the name of a VRF. Default: default.

Examples
Showing OSPF virtual links information:

switch# show ip ospf virtual-links Virtual link to router 40.40.40.40 is up -----------------------------------------

VRF

: default

Transit Area

: 0.0.0.1

Hello Interval

: 10

Transit Delay

:1

Number of Link LSAs : 0

Number of State Shanges : 4

Process

: 21

Authentication

: No

Dead Interval

: 40

Retransmit Interval : 5

Checksum Sum

:0

Showing brief overview information for OSPF virtual links:

switch# show ip ospf virtual-links brief OSPF Process ID 1 VRF default ==============================

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1723

Total Number of Virtual Links: 1

Remote Router Transit Area

Status

------------------------------------------

2.2.2.2

0.0.0.1

down

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

summary-address
summary-address <IPV4-ADDR>/<MASK> [no-advertise | tag <TAG-VALUE>] no summary-address <prefix/length> [no-advertise | tag <tag-value>
Description
Summarizes the external routes with the matching address and mask. When advertising this route, its metric is set to the lowest cost path from among the routes that were summarized. The no form of this command disables route summarization.
This command only works for an ASBR (Autonomous System Boundary Router).

Parameter <IPV4-ADDR> <MASK> no-advertise tag <TAG-VALUE>

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 32.
Do not advertise the aggregate route. Suppress routes that match the specified prefix/mask pair.
Specify the tag for the aggregate route. The summary prefix will be advertised along with the tag value in External LSAs. Range: 0 to 4294967295

OSPFv2 commands | 1724

Examples
Setting OSPF route summarization:
switch(config)# router ospf 1 switch(config-ospf-1)# summary-address 10.1.0.0/16
Disabling route summarization:
switch(config)# router ospf 1 switch(config-ospf-1)# no summary-address 10.1.0.0/16

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

timers lsa-arrival
timers lsa-arrival <DELAY> no timers lsa-arrival
Description
Configures the minimum delay between receiving the same LSA from a peer. The same LSA is an LSA that contains the same LSA ID number, LSA type, and advertising router ID. If an instance of the same LSA arrives sooner before the delay expires, the LSA is dropped. Generally, the LSA arrival timer should be set to a value less than or equal to the start-time value for the command timers throttle lsa start on the neighbor. The no form of this command sets the LSA timers to default values.

Parameter <DELAY>

Description
Specifies the delay in milliseconds. Range: 0 to 600000. Default: 1000.

Examples
Setting the LSA arrival timer:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1725

switch(config)# router ospf 1 switch(config-ospf-1)# timers lsa-arrival 10
Setting the LSA arrival timer to default:
switch(config)# router ospf 1 switch(config-ospf-1)# no timers lsa-arrival

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

timers throttle lsa
timers throttle lsa start-time <START-TIME> hold-time <HOLD-TIME> max-wait-time <WAITTIME> no timers throttle lsa
Description
Configures the timers for LSA generation. The no form of this command sets the LSA timers to default values.

Parameter start-time <START-TIME> hold-time <HOLD-TIME>
max-wait-time <WAIT-TIME>

Description
Specifies the initial wait time in milliseconds after which LSAs are generated. When set to 0, the LSAs are generated without any delay. Range: 0 to 600000. Default: 5000.
Specifies the amount of time, in milliseconds, between regeneration of an LSA. The hold time doubles each time the same LSA must be regenerated, until max-wait-time is reached. When set to 0, LSA regeneration time is not increased. Range: 0 to 600000. Default: 0.
Specifies the maximum wait time, in milliseconds, for regeneration of the same LSA. When set to 0, LSA regeneration time is not increased. Range: 0 to 600000. Default: 0.

Examples

OSPFv2 commands | 1726

Setting the LSA timers:
switch(config)# router ospf 1 switch(config-ospf-1)# timers throttle lsa start-time 100 hold-time 1000 max-waittime 10000
Setting LSA timers to default values:
switch(config)# router ospf 1 switch(config-ospf-1)# no timers throttle lsa

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

timers throttle spf
timers throttle spf start-time <START-TIME> hold-time <HOLD-TINME> max-wait-time <WAIT-TIME> no timers throttle spf
Description
Configures timers for SPF calculation. There are three timers:
n start-time Is the initial delay before an SPF calculation is started. Default is 200 milliseconds. n hold-time Is the progressive backoff time to wait before next scheduled SPF calculation. Default is
1000 milliseconds. If a route change event occurs during this period, the value doubles until it reaches the max-wait-time. n max-wait-time Is the maximum time to wait before the next scheduled SPF calculation. Default is 5000 milliseconds. This is used to limit the SPF hold timer and also defines the time to be considered for which the OSPF LSDB has to be stable, after which the SPF throttle mechanism is reset.
The no form of this command sets all the configured non-default timers to default value.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1727

Parameter <START-TIME> <HOLD-TINME>
<WAIT-TIME>

Description
Time in milliseconds to set timer for initial SPF delay. Default: 200.
Time in milliseconds to set the minimum hold time between two consecutive SPF calculations. Default: 1000.
Time in milliseconds to set the maximum wait time between two consecutive SPF calculations. Default: 5000.

Examples
Setting non-default timer values for SPF throttling:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# timers throttling spf start-time 500 hold-time 3000 maxwait-time 9000 Switch(config-ospfv3-1)# show running-config current-context router ospfv3 1
area 0.0.0.0 area 0.0.0.1 area 0.0.0.2 nssa no-summary area 0.0.0.3 stub

Setting default timer values for SPF throttling after configuring non-default values:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no timers throttling spf

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

transit-delay
transit-delay <SECONDS> no transit-delay
Description
Sets the time delay in Link state transmission for virtual links.

OSPFv2 commands | 1728

The no form of this command sets the delay in Link state transmission to the default of 1 second for virtual links.

Parameter <SECONDS>

Description
Specifies the time delay for the transit delay, in seconds. Default: 1 second. Range: 1-3600.

Examples
Setting OSPFv2 virtual links transit delay:

switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# transit-delay 30

Setting OSPFv2 virtual links transit delay to default:

switch(config)# router ospf 1 switch(config-ospf-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink)# no transit-delay

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

trap-enable
trap-enable no trap-enable
Description
Enables the notification of the events to be sent as traps to the SNMP management stations for OSPF. The no form of this command disables the notification of the events to be sent as traps to the SNMP management stations for OSPF.
Examples
Enabling sending notification of events as traps:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1729

switch(config)# router ospf 1 switch(config-ospf-1)# trap-enable
Disabling sending notification of events as traps:
switch(config)# router ospf 1 switch(config-ospf-1)# no trap-enable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

OSPFv2 commands | 1730

Chapter 101 OSPFv3 commands

OSPFv3 commands
active-backbone
active-backbone stub-default-route no active-backbone stub-default-route
Description
This command enables the router to send a default route to stub areas if there is an active loopback link in the backbone area. The configuration is not required if backbone area has neighbors or passive interfaces configured. By default active backbone detection is enabled.
Examples
switch(config)# router ospf 1 switch(config-ospf-1)# active-backbone stub-default-route
switch(config)# no active-backbone stub-default-route

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.10.1000

Modification Command Introduced

Command Information

Platforms
6300 6400

Command context
config-ospf-<PROCESS-ID> config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

area
area <AREA-ID> no area <AREA-ID>
Description
Creates a normal area with <AREA-ID> set if not present. If area is present and is not the normal area, this command changes the area type to normal area.

AOS-CX 10.14 Command-Line Interface Guide

1731

The no form of this command deletes the area with the <AREA-ID> specified. The area can be of any type (stub, stub no-summary, and default normal area).

Parameter <AREA-ID>

Description
Specifies the area ID is one of the following formats. OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPF area identifier in decimal format. Range: 0 to 4294967295.

Examples
Creating a normal area:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 1 switch(config-ospfv3-1)# area 1.1.1.1

Deleting an area:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no area 1 switch(config-ospfv3-1)# no area 1.1.1.1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

area authentication ipsec
area <AREA-ID> authentication ipsec spi <SPI-INDEX> <AUTH-TYPE> [<KEY-TYPE> <AUTH-KEY>] no area <AREA-ID> authentication
Description
Configures IPsec AH authentication for the specified area. OSPFv3 interfaces which have IPsec configured at the interface context will not use area level IPsec. The no form of this command removes IPsec AH authentication for the specified area.

OSPFv3 commands | 1732

IPsec is not supported for 6in6 tunnel interfaces.

Parameter <AREA-ID>
spi <SPI-INDEX>
<AUTH-TYPE> <KEY-TYPE> <AUTH-KEY>

Description
Specifies the area ID is one of the following formats: OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPF area identifier in decimal format. Range: 0 to 4294967295.
Specifies the Security Parameters Index (SPI) to use. The SPI is an identification tag carried in the IPsec AH header. It enables the receiving OSPF process to select and use the Security Association (SA) from the SA table. The SPI must be unique on the switch. Range: 256 to 4294967295.
Specifies the authentication type: md5 or sha1.
Specifies the key type to use: plaintext (unencrypted), hex-string (encrypted) or ciphertext (encrypted).
Specifies the authentication key.

When the authentication key is not provided on the command line, plaintext key prompting occurs upon pressing Enter. The entered key characters are masked with asterisks.
Examples
Setting area 0 to use IPsec authentication with a provided plaintext authentication key:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 0 authentication ipsec spi 256 sha1 plaintext F82#450
Setting area 5 to use IPsec authentication with a prompted plaintext authentication key:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 5 authentication ipsec spi 256 sha1 Enter the IPsec authentication key: ******** Re-Enter the IPsec authentication key: ********
Removing IPsec authentication from area 1:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no area 1 authentication

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1733

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

area encryption ipsec
area <AREA-ID> encryption ipsec spi <SPI-INDEX> <AUTH-TYPE> [<KEY-TYPE> <AUTH-KEY> <ENCR-TYPE> [<KEY-TYPE> <ENCR-KEY>]]
no area <AREA-ID> encryption
Description
Configures IPsec ESP with the authentication and encryption algorithm types and keys for the specified area. OSPFv3 interfaces with IPsec configured at the interface context will not use area level IPsec ESP configuration. The no form of this command removes IPsec ESP from the specified area.
IPsec is not supported for 6in6 tunnel interfaces.

Parameter <AREA-ID>
spi <SPI-INDEX>
<AUTH-TYPE> <KEY-TYPE> <AUTH-KEY> <ENCR-TYPE>
<ENCR-KEY>

Description
Specifies the area ID is one of the following formats. OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPF area identifier in decimal format. Range: 0 to 4294967295.
Specifies the Security Parameters Index (SPI) to use. The SPI is an identification tag carried in the IPsec AH header. It enables the receiving OSPF process to select and use the Security Association (SA) from the SA table. The SPI must be unique on the switch. Range: 256 to 4294967295.
Specifies the authentication type: md5 or sha1.
Specifies the key type to use: plaintext (unencrypted), hex-string (encrypted) or ciphertext (encrypted).
Specifies the authentication key.
Specifies the encryption type: des, 3des, aes, or null.
NOTE: Encryption type aes is considered to be AES128, AES192 or AES256 based on key length.
Specifies the encryption key.

OSPFv3 commands | 1734

When the authentication key is not provided on the command line, plaintext authentication key prompting occurs upon pressing Enter, followed by encryption type prompting, and finally plaintext encryption key prompting. The entered key characters are masked with asterisks.
When the authentication key and encryption type are provided on the command line but the encryption key is not provided, plaintext encryption key prompting occurs upon pressing Enter. The entered key characters are masked with asterisks.
Examples
Setting area 0 to use IPSec ESP with provided authentication and encryption keys:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 0 encryption ipsec spi 256 md5 plaintext F824eva
des plaintext F82#450b
Setting area 5 to use IPSec ESP with prompted authentication and encryption keys:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 5 encryption ipsec spi 256 md5 Enter the IPsec authentication key: ******** Re-Enter the IPsec authentication key: ******** Enter the IPsec encryption type (3des/aes/des/null)? des Enter the IPsec encryption key: ******** Re-Enter the IPsec encryption key: ********
Setting area 2 to use IPsec ESP with provided authentication password and encryption type but a prompted encryption key:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 2 encryption ipsec spi 256 md5 plaintext F82# des Enter the IPsec encryption key: ******** Re-Enter the IPsec encryption key: ********
Setting area 0 to use IPSec ESP with provided plaintext authentication key and null encryption:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 0 encryption ipsec spi 256 md5 plaintext axtw null
Removing IPSec ESP from area 0:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no area 0 encryption
For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1735

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

area nssa
area <AREA-ID> nssa [no-summary] no area <AREA-ID> nssa [no-summary]
Description
Creates the NSSA area (Not So Stubby Area) with <AREA-ID> if not present. If area is present and not NSSA area, this command changes the area type to NSSA area. If no-summary is used, area type will be NSSA No-Summary. The no form of this command clears the NSSA area type. That is, the configured area will be changed to default normal area. The no area <AREA-ID> nssa no-summary command enables sending inter-area routes into NSSA, but will not unset the area as NSSA.

Parameter <AREA-ID>
nssa [no-summary]

Description
Specifies the area ID is one of the following formats. OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPF area identifier in decimal format. Range: 0 to 4294967295.
Specifies Not So Stubby Area (NSSA) area type. If area is present and not NSSA area, parameter changes the area type to NSSA area. If no-summary is specified, area type will be NSSA NoSummary, which means do not inject inter-area routes into NSSA.

Examples
Creating an NSSA area for OSPFv3:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 1 nssa switch(config-ospfv3-1)# area 1 nssa no-summary

Clearing the NSSA area for OSPFv3:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no area 1 nssa switch(config-ospfv3-1)# no area 1 nssa no-summary

OSPFv3 commands | 1736

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

area range
area <AREA-ID> range <IP-PREFIX> type {inter-area | nssa} [no-advertise] no area <AREA-ID> range <IP-PREFIX> type {inter-area | nssa} [no-advertise]
Description
Summarizes the routes with the matching address or masks for OSPFv3. This command only works for border routers. The no form of this command unsets the route summarization for the configured IPv4 prefix address on the ABR. When using the no form of the command with the no-advertise option, enables advertising this range to other areas.

Parameter <AREA-ID>
range <IP-PREFIX> type {inter-area | nssa} no-advertise

Description
Specifies the area ID is one of the following formats. OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPF area identifier in decimal format. Range: 0 to 4294967295.
Specifies summarizing routes matching the area range prefix/mask.
Specifies the type this address aggregation applies to as either inter-area range prefix or NSSA range prefix.
Specifies the address range status as DoNotAdvertise (do not advertise this range to other areas).

Examples
Summarizing inter-area or NSSA paths on OSPFv3:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 1 range fd00::/64 type inter-area switch(config-ospfv3-1)# area 1 range fd00::/64 type nssa

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1737

switch(config-ospfv3-1)# area 1 range fd00::/64 type inter-area no-advertise
Unsetting summarization on OSPFv3:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no area 1 range fd00::/64 type inter-area switch(config-ospfv3-1)# no area 1 range fd00::/64 type nssa switch(config-ospfv3-1)# no area 1 range fd00::/64 type inter-area no-advertise

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

area stub
area <AREA-ID> stub [no-summary] no area <AREA-ID> stub [no-summary]
Description
Creates the stub area with <AREA-ID> if not present. If area is present and is not the stub area, this command changes the area type to stub area. If no-summary is used, area type will be totally stubby area. The no form of this command unsets the area type as stub. The configured area will be changed to the default normal area. The no area <AREA-ID> stub no-summary command will start sending Area Border Router (ABR) summary link advertisements into the stub area, but will not unset the stub area.
ABR does not inject the default route in a Totally Stubby Area with loopback in Area 0.0.0.0. As a workaround, configure a passive interface or active neighbors in the backbone area.

Parameter <AREA-ID>

Description
Specifies the area ID is one of the following formats. OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.

OSPFv3 commands | 1738

Parameter stub [no-summary]

Description
OSPF area identifier in decimal format. Range: 0 to 4294967295.
Specifies stub area type. If area is present and not stub area, this parameter changes the area type to stub area. If no-summary is specified, area type will be totally stubby area, which means do not inject interarea routes into stub.

Examples
Creating a stub area:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 1 stub switch(config-ospfv3-1)# area 1 stub no-summary

Unsetting the stub area type:

switch(config)# router ospfv3 1 switch(config-ospfv3-1) # no area 1 stub switch(config-ospfv3-1) # no area 1 sub no-summary

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

area virtual-link
area <AREA-ID> virtual-link <ROUTER-ID> no area <AREA-ID> virtual-link <ROUTER-ID>
Description
Creates an OSPF virtual link with remote ABR (if not created already) and enters the vlink context. The no form of this command deletes an OSPF virtual link with the specified router ID of the remote ABR. If no<ROUTER-ID> is specified, the no form of the command sets the virtual link to the default settings.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1739

Parameter <AREA-ID>
virtual-link <ROUTER-ID>

Description
Specifies the area ID is one of the following formats. OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPF area identifier in decimal format. Range: 0 to 4294967295.
Configures a virtual link with the specified router ID of the remote ABR.

Examples
Configuring OSPF virtual links:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 100 virtual-link 100.0.1.1

Deleting OSPF virtual links:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no area 100 virtual-link 100.0.1.1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

area default-metric
area <AREA-ID> default-metric <METRIC> no area <AREA-ID> default-metric
Description
Sets the cost of default-summary LSAs announced to the stub/nssa areas. The no form of this command resets the cost of the default-summary LSAs announced to stub/nssa areas to the default of 1.

OSPFv3 commands | 1740

Parameter <AREA-ID>
default-metric <METRIC>

Description
Specifies the area ID is one of the following formats. OSPF area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPF area identifier in decimal format. Range: 0 to 4294967295.
Specifies the default metric of default-summary LSAs announced to the stub/nssa areas, to the specified value. Default: 1. Range: 0 to 16777215.

Examples
Setting cost for default LSA summary:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 1 default-metric 2 switch(config-ospfv3-1)# area 1.1.1.1 default-metric 2

Setting cost for default LSA summary to default:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no area 1 default-metric switch(config-ospfv3-1)# no area 0.0.0.1 default-metric

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

authentication ipsec
authentication ipsec spi <SPI-INDEX> <AUTH-TYPE> [<KEY-TYPE> <AUTH-KEY>] no authentication
Description
Configures IPsec AH authentication for the selected Vlink. The no form of this command removes IPsec AH authentication for the selected Vlink.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1741

Parameter spi <SPI-INDEX>
<AUTH-TYPE> <KEY-TYPE> <AUTH-KEY>

Description
Specifies the Security Parameters Index (SPI) to use. The SPI is an identification tag carried in the IPsec AH header. It enables the receiving OSPF process to select and use the Security Association (SA) from the SA table. The SPI must be unique on the switch. Range: 256 to 4294967295.
Specifies the authentication type: md5 or sha1.
Specifies the key type to use: plaintext (unencrypted), hex-string (encrypted) or ciphertext (encrypted).
Specifies the authentication key.

When the authentication key is not provided on the command line, plaintext key prompting occurs upon pressing Enter. The entered key characters are masked with asterisks.
Examples
Setting area 1 to use IPsec AH authentication for Vlink with provided plaintext key:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 1 switch(config-ospfv3-1)# area 1 virtual-link 3.3.3.3 switch (config-router-vlink6)# authentication ipsec spi 256 sha1 plaintext F82#450
Setting area 1 to use IPsec AH authentication for Vlink with prompted plaintext key:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 1 switch(config-ospfv3-1)# area 1 virtual-link 3.3.3.3 switch (config-router-vlink6)# authentication ipsec spi 256 sha1 Enter the IPsec authentication key: ******** Re-Enter the IPsec authentication key: *******
Removing IPsec AH authentication for Vlink on area 1:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 1 virtual-link 3.3.3.3 switch(config-router-vlink6)# no authentication

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

OSPFv3 commands | 1742

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

clear ipv6 ospfv3 neighbors
clear ipv6 ospfv3 [<PROCESS-ID>] neighbor [<NEIGHBOR>] [interface [<INTERFACE-NAME>]] [all-vrfs | vrf <VRF-NAME>]
Description
Resets the neighbor and clears the OSPF neighbor information.

Parameter <PROCESS-ID>
<NEIGHBOR> <INTERFACE-NAME> all-vrfs vrf <VRF-NAME>

Description Specifies the OSPFv3 process ID to clear the statistics for the particular OSPFv3 process. Range: 1 to 65535. Specifies the router ID of a neighbor. Specifies the OSPFv3 statistics to clear for the specified interface. Select to clear the OSPFv3 statistics for all VRFs. Specifies the name of a VRF.

Example
Clearing the OSPFv3 neighbor information:

switch# clear ipv6 ospfv3 1 neighbor Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y switch# clear ipv6 ospfv3 1 neighbor 3.3.3.3 Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y switch# clear ipv6 ospfv3 1 neighbor interface 1/1/1 Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y switch# clear ipv6 ospfv3 1 neighbor 3.3.3.3 vrf red Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y switch# clear ipv6 ospfv3 neighbor Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y switch# clear ipv6 ospfv3 neighbor 5.5.5.5 Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y switch# clear ipv6 ospfv3 neighbor interface 1/1/1 Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y switch# clear ipv6 ospfv3 neighbor 5.5.5.5 vrf red Performing clear ospf neighbor may result in traffic disruption. Do you want to continue (y/n)? y

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1743

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

clear ipv6 ospfv3 statistics
clear ipv6 ospfv3 [<PROCESS-ID>] statistics [interface [<INTERFACE-NAME>]] [all-vrfs | vrf <VRF-NAME>]
Description
Clears the OSPFv3 event statistics.

Parameter <PROCESS-ID>
<INTERFACE-NAME> all-vrfs vrf <VRF-NAME>

Description Specifies the OSPFv3 process ID to clear the statistics for the particular OSPFv3 process. Range: 1 to 65535. Specifies the OSPFv3 statistics to clear for the specified interface. Select to clear the OSPFv3 statistics for all VRFs. Specifies the name of a VRF.

Example
Clearing the OSPFv3 event statistics:

switch# clear ipv6 ospfv3 statistics switch# clear ipv6 ospfv3 statistics interface 1/1/1 switch# clear ipv6 ospfv3 statistics interface 1/1/1 vrf vrf_red

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

OSPFv3 commands | 1744

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

dead-interval
dead-interval <INTERVAL> no dead-interval
Description
Sets the interval after which a neighbor is declared dead if no hello packet comes in for virtual links. The no form of this command sets the dead interval to default for virtual links. The default value is 40 seconds (generally four times the hello packet interval).

Parameter <INTERVAL>

Description
Specifies the time interval for the dead interval, in seconds. Range: 1 to 65535. Default: 40.

Examples
Setting OSPFv3 virtual links dead interval:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink6)# dead-interval 30

Setting OSPFv3 virtual links dead interval to default:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink6)# no dead-interval

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1745

default-information originate
default-information originate [metric <METRIC-VALUE>] no default-information originate [metric <METRIC-VALUE>]
Description
Configures OSPFv3 to advertise the default route (::/0) to its neighbors if it is present in the routing table. Optionally, the metric value can be set for default route ::/0. The default value is 1. The no form of this command disables advertisement of the default route.

Parameter metric <METRIC-VALUE>

Description
Specifies the OSPF metric value for the default route. Optional. Default: 1.

Examples
Setting advertisement of the default route:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# default-information originate

Disabling advertisement of the default route:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no default-information originate

Setting advertisement of the default route and specifying an optional metric value of 20:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# default-information originate switch(config-ospfv3-1)# default-information originate metric 20

Disabling advertisement of the default route and setting metric to the default value:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no default-information originate metric

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.09 10.07 or earlier
Command Information

Modification Added parameter: metric <METRIC-VALUE> --

OSPFv3 commands | 1746

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

default-metric
default-metric <METRIC-VALUE> no default-metric
Description
Sets the default metric for redistributed routes in the OSPFv3. The no form of this command sets the default metric to be used for redistributed routes into OSPFv3 to the default of 25.

Parameter <METRIC-VALUE>

Description
Specifies the default metric value to use for redistributed routes. Range: 1 to 1677214. Default: 25.

Examples
Setting default metric for redistributed routes:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# default-metric 36

Setting default metric for redistributed routes to the default:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no default-metric

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

disable

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1747

disable
Description
Disables the OSPFv3 process. By default OSPFv3 process is enabled. This command does not remove the OSPFv3 configurations.
Example
Disabling OSPFv3 process:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# disable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

distance
distance [<DISTANCE-VAL> | intra-area [<DISTANCE-VAL>] | inter-area [<DISTANCE-VAL>] | external [<DISTANCE-VAL>]] no distance [<DISTANCE-VAL> | intra-area [<DISTANCE-VAL>] | inter-area [<DISTANCE-VAL>] | external [<DISTANCE-VAL>]]
Description
Defines an administrative distance for OSPFv3. Administrative distance is used as a criteria to select the best route when the same route is learned by multiple routing protocols. The no form of this command sets the OSPFv3 administrative distance to the default value of 110. Optionally, administrative distance can be set to default for the specific OSPF route type: intra-area, inter-area, or external type-5 and type-7 routes.

Parameter <DISTANCE-VAL>
intra-area

Description
Specifies the OSPFv3 administrative distance. Range: 1 to 255. Default: 110.
Specifies the OSPFv3 distance for intra-area routes.

OSPFv3 commands | 1748

Parameter inter-area external

Description
Specifies the OSPFv3 distance for inter-area routes.
Specifies the OSPFv3 distance for external type 5 and type 7 routes.

Usage
Within a given OSPF process, intra-area routes are always given precedence even when distances are configured for inter-area or external type routes.
Examples
Setting OSPFv3 administrative distance:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# distance 100 switch(config-ospfv3-1)# distance intra-area 24 external 55 inter-area 66 switch(config-ospfv3-1)# distance intra-area 24 external 55 switch(config-ospfv3-1)# distance external 55 switch(config-ospfv3-1)#exit
switch(config)# router ospfv3 2 switch(config-ospfv3-2)# distance 200 switch(config-ospfv3-2)# distance external 60 switch(config-ospfv3-2)# distance intra-area 24 inter-area 66

Setting OSPFv3 administrative distance to the default:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no distance switch(config-ospfv3-1)# no distance external switch(config-ospfv3-1)# no distance intra-area switch(config-ospfv3-1)# no distance inter-area switch(config-ospfv3-1) # no distance 1 switch(config-ospfv3-1)#exit
switch(config)# router ospfv3 2 vrf blue switch(config-ospfv3-2)# no distance 200 switch(config-ospfv3-2)# no distance external 60 switch(config-ospfv3-2)# no distance intra-area 24 inter-area 66

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14
10.09 10.07 or earlier

Modification
Added capability to have individual admin distance for multiple OSPF processes in a VRF.
Added parameters: intra-area, inter-area, external
--

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1749

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

distribute-list prefix
distribute-list prefix <prefix-list-name> {in | out} no distribute-list prefix <prefix-list-name> {in | out}
Description
This command uses an existing prefix list to filter routes that are being installed in the routing table or redistributed to another routing protocol. The distribute-list prefix command filters routes in the inbound or the outbound direction. When this command is issued with the in parameter, it filters routes from being installed in the routing table, it does not filter LSAs. When this command is issued with the out parameter, it filters only the desired redistributed routes from other protocols.
This command requires that your prefix list is already defined using the ipv6 prefix commands. Route-maps are not supported with the distribute-list feature.

Parameter prefix <prefix-list-name> {in | out}

Description
Specify the name of an existing prefix.
Select one of the following parameters to set the filter direction: n in: Filter incoming routes into the routing table n out: Filter outgoing routing updates

Examples
The following commands enable the filtering of OSPFv3 routes in an IPv6 network, so routes are no longer installed in the routing table or redistributed from another routing protocol.
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# distribute-list prefix listA in switch(config-ospfv3-1)# distribute-list prefix listB out

The following command disables the filtering of OSPFv3 routes in an IPv6 network, so routes can be installed in the routing table or redistributed from another routing protocol.
switch# configure terminal switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no distribute-list prefix listA in switch(config-ospfv3-1)# no distribute-list prefix listB out

Command History

OSPFv3 commands | 1750

Release 10.13

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

enable
enable
Description
Enables OSPFv3 process when disabled. By default OSPFv3 process is enabled.
Example
Enabling OSPFv3 process:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# enable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

encryption ipsec
encryption ipsec spi <SPI-INDEX> <AUTH-TYPE> [<KEY-TYPE> <AUTH-KEY> <ENCR-TYPE> [<KEY-TYPE> <ENCR-KEY>]]
no encryption
Description
Configures IPSec ESP authentication and encryption for the selected Vlink. The no form of this command removes IPSec ESP authentication and encryption for the selected Vlink.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1751

Parameter spi <SPI-INDEX>
<AUTH-TYPE> <KEY-TYPE> <AUTH-KEY> <ENCR-TYPE>
<ENCR-KEY>

Description
Specifies the Security Parameters Index (SPI) to use. The SPI is an identification tag carried in the IPsec AH header. It enables the receiving OSPF process to select and use the Security Association (SA) from the SA table. The SPI must be unique on the switch. Range: 256 to 4294967295.
Specifies the authentication type: md5 or sha1.
Specifies the key type to use: plaintext (unencrypted), hex-string (encrypted) or ciphertext (encrypted).
Specifies the authentication key.
Specifies the encryption type: des, 3des, aes, or null.
NOTE: Encryption type aes is considered to be AES128, AES192, or AES256 based on key length.
Specifies the encryption key.

When the authentication key is not provided on the command line, plaintext authentication key prompting occurs upon pressing Enter, followed by encryption type prompting, and finally plaintext encryption key prompting. The entered key characters are masked with asterisks.
When the authentication key and encryption type are provided on the command line but the encryption key is not provided, plaintext encryption key prompting occurs upon pressing Enter. The entered key characters are masked with asterisks.
Examples
Setting area 1 to use IPSec ESP authentication and encryption for Vlink with provided plaintext keys:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 1 switch(config-ospfv3-1)# area 1 virtual-link 3.3.3.3 switch(config-router-vlink6)# encryption ipsec spi 256 md5 plaintext F82#
des plaintext Plane#88
Setting area 1 to use IPSec ESP authentication and encryption for Vlink with prompted plaintext keys and encryption type:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 1 switch(config-ospfv3-1)# area 1 virtual-link 3.3.3.3 switch(config-router-vlink6)# encryption ipsec spi 256 md5 Enter the IPsec authentication key: ******** Re-Enter the IPsec authentication key: *******
Enter the IPsec encryption type (3des/aes/des/null)? des
Enter the IPsec encryption key: ********

OSPFv3 commands | 1752

Re-Enter the IPsec encryption key: ********
Setting area 1 to use IPSec ESP authentication and encryption for Vlink provided plaintext authentication key and encryption type but prompted plaintext encryption key:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 1 switch(config-ospfv3-1)# area 1 virtual-link 3.3.3.3 switch(config-router-vlink6)# encryption ipsec spi 256 md5 plaintext Fx des Enter the IPsec encryption key: ******** Re-Enter the IPsec encryption key: ********
Setting area 1 to use IPSec ESP authentication for Vlink with a provided plaintext authentication key and null encryption:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 1 switch(config-ospfv3-1)# area 1 virtual-link 3.3.3.3 switch(config-router-vlink6)# encryption ipsec spi 256 md5 plaintext Fx null
Removing IPSec ESP authentication and encryption for Vlink on area 1:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 1 virtual-link 3.3.3.3 switch(config-router-vlink6)# no encryption

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

default-information originate
default-information originate [metric <METRIC-VALUE>] no default-information originate [metric <METRIC-VALUE>]
Description
Configures OSPFv3 to advertise the default route (::/0) to its neighbors if it is present in the routing table. Optionally, the metric value can be set for default route ::/0. The default value is 1.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1753

The no form of this command disables advertisement of the default route.

Parameter metric <METRIC-VALUE>

Description
Specifies the OSPF metric value for the default route. Optional. Default: 1.

Examples
Setting advertisement of the default route:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# default-information originate

Disabling advertisement of the default route:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no default-information originate

Setting advertisement of the default route and specifying an optional metric value of 20:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# default-information originate switch(config-ospfv3-1)# default-information originate metric 20

Disabling advertisement of the default route and setting metric to the default value:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no default-information originate metric

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.09 10.07 or earlier

Modification Added parameter: metric <METRIC-VALUE> --

Command Information

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

default-information originate always

OSPFv3 commands | 1754

default-information originate always [metric <METRIC-VALUE>] no default-information originate always [metric <METRIC-VALUE>]
Description
Configures OSPFv3 to advertise the default route (::/0) to its neighbors, regardless if it is present in the routing table or not. Optionally, metric can be set for default route ::/0. The default value is 1. The no form of this command disables advertisement of the default route.

Parameter metric <METRIC-VALUE>

Description Specifies the OSPFv3 metric value for the default route. Default: 1.

Examples
Setting advertisement of the default route:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# default-information originate always
Disabling advertisement of the default route:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no default-information originate always
Setting advertisement of the default route with metric set to 20:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# default-information originate always metric 20
Disabling advertisement of the default route and setting the metric to the default value:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no default-information originate always metric

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.09 10.07 or earlier
Command Information

Modification Added parameter: metric <METRIC-VALUE> --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1755

Platforms
6300 6400

Command context config-ospf-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

graceful-restart
graceful-restart restart-interval <INTERVAL> helper [strict-lsa-check] ignore-lost-interface no...
Description
Configures graceful restart for OSPFv3. By default graceful restart is enabled on the OSPFv3 router. The no form of this command sets the restart interval to the default of 120 seconds or disables helper mode depending on the specified parameters.

Parameter restart-interval <INTERVAL>
helper strict-lsa-check

Description
Specifies the time another router waits for this router to gracefully restart and selects the maximum time to wait in seconds. Range: 5 to 1800. Default: 120.
Specifies that the router will participate in the graceful restart of a neighbor router.
(Optional). Use with the helper parameter to enable strict Link state Advertisement (LSA) checking when acting as a restart helper for a restarting peer.
NOTE: OSPF neighbors must disable strict LSA checking. If the local node has fewer OSPF interfaces after restarting, then the neighbors that were adjacent on those interfaces will clear up their adjacencies to the restarting node and will send out link state updates to advertise the dropped adjacency. If strict LSA checking is enabled, the restarting router's neighbors will exit helper mode when they receive the updated LSAs and the graceful restart will still fail.

ignore-lost-interface

Enable the restarting router to ignore lost OSPF interfaces during a graceful restart process. This setting should be enabled on a high availability system to ensure a graceful restart completes successfully, even if OSPF-enabled links fail due to High Availability events like a switchover or failover.
NOTE: Enabling this setting means that the hitless restart procedures do not strictly follow those defined in RFC 3623, Graceful OSPF Restart.

no

Negate any parameter or return the setting to its default..

Examples
Enabling OSPF graceful restart:

OSPFv3 commands | 1756

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# graceful-restart restart-interval 40 switch(config-ospfv3-1)# graceful-restart helper strict-lsa-check
Enabling the switch to ignore lost OSPF interfaces during a graceful restart process:
switch(config)# router ospfv3 1 switch (config-ospfv3-1)# graceful-restart ignore-lost-interface
Setting the restart interval to default, and disabling helper mode:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no graceful-restart restart-interval switch(config-ospfv3-1)# no graceful-restart helper

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

hello-interval
hello-interval <INTERVAL> no hello-interval
For proper operation, the hello interval must be shorter than the dead interval.

Description
Sets the time interval between OSPF hello packets for virtual links. The no form of this command sets the hello interval to the default value of 10 seconds for virtual links.

Parameter <INTERVAL>

Description
Specifies the time interval for the hello interval, in seconds. Range: 1 to 65535. Default: 10.

Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1757

Setting OSPF virtual links hello interval:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink6)# hello-interval 30
Setting OSPF virtual links hello interval to default:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink6)# no hello-interval

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 area
ipv6 ospfv3 <PROCESS-ID> area <AREA-ID> no ipv6 ospfv3 <PROCESS-ID> area <area-id>
Description
Runs the OSPFv3 protocol on the interface for the area specified. To move an interface to a new area, unmap the existing area and then associate a new area with the interface. The no form of this command disables OSPF on the interface and removes the interface from the area. Interfaces which have an IP address configured on the network or in a subset of the network, stop participating in the OSPF protocol

Parameter <AREA-ID>
<PROCESS-ID>

Description
Specifies the area ID is one of the following formats. Area ID in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. Area ID as a decimal value. Range: 0-4294967295.
Specifies the OSPFv3 process ID. Range: 1 to 65535.

OSPFv3 commands | 1758

Examples
Setting OSPFv3 network for the area:
switch(config)# interface vlan 1 switch(config-if-vlan)# ipv6 ospfv3 1 area 1 switch(config-if-vlan)# ipv6 ospfv3 1 area 0.0.0.1
Disabling OSPFv3 network for the area:
switch(config)# interface 1/1/1 switch(config-if-vlan)# no ipv6 ospfv3 1 area 1 switch(config-if-vlan)# no ipv6 ospfv3 1 area 0.0.0.1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 authentication null
ipv6 ospfv3 authentication null
Description
Configures null authentication on an interface which disables IPsec authentication.
Examples
Disabling IPsec on interface VLAN 1:
switch(config)# interface van 1 switch(config-if-vlan)# ipv6 ospfv3 authentication null

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1759

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 authentication ipsec
ipv6 ospfv3 authentication ipsec spi <SPI-INDEX> <AUTH-TYPE> [<KEY-TYPE> <AUTH-KEY>] no ipv6 ospfv3 authentication
Description
Configures IPSec AH authentication. OSPFv3 interfaces that have IPsec configured at the interface context will not use area level IPsec. The no form of this command removes IPsec AH authentication for the specified area.

Parameter spi <SPI-INDEX>
<AUTH-TYPE> <KEY-TYPE> <AUTH-KEY>

Description
Specifies the Security Parameters Index (SPI) to use. The SPI is an identification tag carried in the IPsec AH header. It enables the receiving OSPF process to select and use the Security Association (SA) from the SA table. The SPI must be unique on the switch. Range: 256 to 4294967295.
Specifies the authentication type: md5 or sha1.
Specifies the key type to use: plaintext (unencrypted), hex-string (encrypted) or ciphertext (encrypted).
Specifies the authentication key.

When the authentication key is not provided on the command line, plaintext key prompting occurs upon pressing Enter. The entered key characters are masked with asterisks.
Examples
Setting interface VLAN 1 to use IPsec authentication with a provided plaintext authentication key:
switch(config)# interface vlan 1 switch(config-if-vlan)# ipv6 ospfv3 authentication ipsec spi 256 md5 plaintext F82#
Setting interface VLAN 4 to use IPsec authentication with a prompted plaintext authentication key:
switch(config)# interface vlan 4

OSPFv3 commands | 1760

switch(config-if-vlan)# ipv6 ospfv3 authentication ipsec spi 256 md5 Enter the IPsec authentication key: ******** Re-Enter the IPsec authentication key: ********
Removing IPsec authentication from interface VLAN 1:
switch(config)# interface vlan 1 switch(config-if-vlan)# no ipv6 ospfv3 authentication

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 cost
ipv6 ospfv3 cost <INTERFACE-COST> no ipv6 ospfv3 cost
Description
Sets the cost (metric) associated with a particular interface. The interface cost is used as a parameter to calculate the best routes. The no form of this command sets the cost (metric) associated with a particular interface to the default of 1.

Parameter <INTERFACE-COST>

Description Specifies the interface cost value. Range: 1 to 65535. Default: 1.

Examples
Setting OSPFv3 interface cost:

switch(config)# interface vlan 1 switch(config-if-vlan)# ipv6 ospfv3 cost 100

Setting the OSPFv3 interface cost to default:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1761

switch(config)# interface vlan 1 switch(config-if-vlan)# no ipv6 ospfv3 cost

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 dead-interval
ipv6 ospfv3 dead-interval <INTERVAL> no ipv6 ospfv3 dead-interval
Description
Sets the interval after a neighbor is declared dead when no hello packet is received on the OSPFv3 interface. The no form of this command sets the interval after which a neighbor is declared dead, to the default for the OSPFv3 interface. The default value is 40 seconds (generally four times the hello packet interval).

Parameter <INTERVAL>

Description
Specifies the time interval for the dead interval, in seconds. Range: 1 to 65535. Default: 40.

Examples
Setting OSPFv3 dead interval on the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# ipv6 ospfv3 dead-interval 30

Setting OSPFv3 dead interval to default on the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# no ipv6 ospfv3 dead-interval

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

OSPFv3 commands | 1762

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 encryption ipsec
ipv6 ospfv3 encryption ipsec spi <SPI-INDEX> <AUTH-TYPE> [<KEY-TYPE> <AUTH-KEY> <ENCR-TYPE> [<KEY-TYPE> <ENCR-KEY>]]
no ipv6 ospfv3 encryption
Description
Configures IPsec ESP authentication. OSPFv3 interfaces that have IPsec configured at the interface context will not use area level IPsec ESP. The no form of this command removes IPsec ESP for the specified area.

Parameter spi <SPI-INDEX>
<AUTH-TYPE> <KEY-TYPE> <AUTH-KEY> <ENCR-TYPE>

Description
Specifies the Security Parameters Index (SPI) to use. The SPI is an identification tag carried in the IPsec AH header. It enables the receiving OSPF process to select and use the Security Association (SA) from the SA table. The SPI must be unique on the switch. Range: 256 to 4294967295.
Specifies the authentication type: md5 or sha1.
Specifies the key type to use: plaintext (unencrypted), hex-string (encrypted) or ciphertext (encrypted).
Specifies the authentication key.
Specifies the encryption type: des, 3des, aes, or null.
NOTE: Encryption type aes is considered to be AES128, AES192, or AES256 based on key length.

<ENCR-KEY>

Specifies the encryption key.

When the authentication key is not provided on the command line, plaintext authentication key prompting occurs upon pressing Enter, followed by encryption type prompting, and finally plaintext encryption key prompting. The entered key characters are masked with asterisks.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1763

When the authentication key and encryption type are provided on the command line but the encryption key is not provided, plaintext encryption key prompting occurs upon pressing Enter. The entered key characters are masked with asterisks.
Examples
Setting interface VLAN 1 to use IPsec ESP with provided authentication and encryption keys:
switch(config)# interface vlan 1 switch(config-if-vlan)# ipv6 ospfv3 encryption ipsec spi 256 sha1 plaintext F82
des plaintext F82#450b
Setting interface VLAN 3 to use IPsec ESP with prompted authentication and encryption keys:
switch(config)# interface vlan 3 switch(config-if-vlan)# ipv6 ospfv3 encryption ipsec spi 256 sha1 Enter the IPsec authentication key: ******** Re-Enter the IPsec authentication key: ******** Enter the IPsec encryption type (3des/aes/des/null)? des Enter the IPsec encryption key: ******** Re-Enter the IPsec encryption key: ********
Setting interface VLAN 4 to use IPsec ESP with provided authentication password and encryption type but a prompted encryption key:
switch(config)# interface vlan 4 switch(config-if-vlan)# ipv6 ospfv3 encryption ipsec spi 256 sha1 plaintext F82 des Enter the IPsec encryption key: ******** Re-Enter the IPsec encryption key: ********
Setting interface VLAN 1 to use IPSec ESP with provided plaintext authentication key and null encryption:
switch(config)# interface vlan 1 switch(config-if-vlan)# ipv6 ospfv3 encryption ipsec spi 256 sha1 plaintext F82 null
Removing IPsec from interface VLAN 1:
switch(config)# interface vlan 1 switch(config-if-vlan)# no ipv6 ospfv3 encryption
For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History
OSPFv3 commands | 1764

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 encryption null
ipv6 ospfv3 encryption null
Description
Configures NULL ESP on an interface which disables IPsec ESP.
Examples
Disable IPsec ESP on interface VLAN 1:
switch(config)# interface vlan 1 switch(config-if-vlan)# ipv6 ospfv3 encryption null

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 hello-interval
ipv6 ospfv3 hello-interval <INTERVAL> no ipv6 ospfv3 hello-interval
Description
Sets the time interval between OSPFv3 hello packets for the OSPFv3 interface.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1765

The no form of this command sets the time interval between OSPFv3 hello packets to the default for the OSPFv3 interface of 10 seconds.

Parameter <INTERVAL>

Description
Specifies the time interval between hello packets, in seconds. Range: 1 to 65535. Default: 10.

Examples
Setting OSPFv3 hello interval on the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# ipv6 ospfv3 hello-interval 30

Setting OSPFv3 hello interval to default on the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# no ipv6 ospfv3 hello-interval

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 network
ipv6 ospfv3 network {broadcast|point-to-point} no ipv6 ospfv3 network
Description
Configures the network type for the interface. By default the network type is broadcast network. The no form of this command sets the network type for the interface to the system default of broadcast network.

Parameter broadcast

Description Specifies the OSPFv3 network type as a broadcast multiaccess

OSPFv3 commands | 1766

Parameter point-to-point

Description network. Specifies the OSPFv3 network type as a point-to-point network.

Examples
Setting OSPFv3 network type for the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# ipv6 ospfv3 network broadcast switch(config-if-vlan)# ipv6 ospfv3 network point-to-point

Disabling OSPFv3 network type for the interface to system default of broadcast network:

switch(config)# interface vlan 1 switch(config-if-vlan)# no ipv6 ospfv3 network

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 passive
ipv6 ospfv3 passive no ipv6 ospfv3 passive
Description
Configures the interface as an OSPFv3 passive interface. With this setting, the interface participates in the OSPF, but does not send or receive OSPF packets on that interface. The no form of this command resets the interface as active. With this setting, the interface starts sending and receiving OSPF packets.
Examples
Setting the interface as OSPFv3 passive interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1767

switch(config)# interface vlan 1 switch(config-if-vlan)# ipv6 ospfv3 passive
Setting the interface as OSPFv3 active interface:
switch(config)# interface vlan 1 switch(config-if-vlan)# no ipv6 ospfv3 passive

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 priority
ipv6 ospfv3 priority <number-value> no ipv6 ospfv3 priority
Description
Sets the OSPFv3 priority for the interface. The larger the numeric value of the priority, the higher the chance it will become the designated router. Setting a priority of 0 makes the router ineligible to become a designated router or back up designated router. The no form of this command sets the OSPFv3 priority for the interface to the default of 1.

Parameter <number-value>

Description Specifies the OSPFv3 priority value. Default: 1. Range: 0 to 255.

Examples
Setting the OSPFv3 priority for the interface:

switch(config)# interface vlan /1 switch(config-if-vlan)# ipv6 ospfv3 priority 50

Setting the OSPFv3 priority for the interface to the default of 1:

OSPFv3 commands | 1768

switch(config)# interface vlan 1 switch(config-if-vlan)# no ipv6 ospfv3 priority

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 retransmit-interval
ipv6 ospfv3 retransmit-interval <INTERVAL> no ipv6 ospfv3 retransmit-interval
Description
Sets the time between retransmitting lost link state advertisements for the OSPFv3 interface. The no form of this command sets the time between retransmitting lost link state advertisements to the default 5 seconds.

Parameter <INTERVAL>

Description
Specifies the time interval for the retransmit interval, in seconds. Range: 1 to 3600. Default: 5

Examples
Setting OSPFv3 retransmit interval on the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# ipv6 ospfv3 retransmit-interval 30

Setting OSPFv3 retransmit interval to the default on the interface:

switch(config)# interface vlan 1 switch(config-if-vlan)# no ipv6 ospfv3 retransmit-interval

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1769

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 ospfv3 shutdown
ipv6 ospfv3 shutdown no ipv6 ospfv3 shutdown
Description
Disables OSPFv3 on the interface. The interface state changes to Down. It does not remove the interface from the OSPF area. To remove the interface, use the command no ip ospf area. The no form of this command re-enables OSPFv3 on the interface.
Examples
Disabling OSPFv3 on the interface:
switch(config)# interface vlan 1 switch(config-if-vlan)# ipv6 ospfv3 shutdown
Re-enabling OSPFv3 on the interface:
switch(config)# interface vlan 1 switch(config-if-vlan)# no ipv6 ospfv3 shutdown

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

OSPFv3 commands | 1770

ipv6 ospfv3 transit-delay
ipv6 ospfv3 transit-delay <DELAY> no ipv6 ospfv3 transit-delay
Description
Sets the time delay in Link state transmission for the OSPFv3 interface. The no form of this command sets the transit delay in Link state transmission to the default of 1 second.

Parameter <DELAY>

Description
Specifies the time delay for the transit delay, in seconds. Range: 1 to 3600. Default: 1.

Examples
Setting OSPFv3 transit delay on the interface

switch(config)# interface vlan 1 switch(config-if-vlan)# ipv6 ospfv3 transit-delay 30

Setting OSPFv3 transit delay to default on the interface

switch(config)# interface vlan 1 switch(config-if-vlan)# no ipv6 ospfv3 transit-delay

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

maximum-paths
maximum-paths <MAXIMUM> no maximum-paths
Description
Sets the maximum number of ECMP routes that OSPFv3 can support.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1771

The no form of this command sets the maximum number of ECMP routes that OSPFv3 can support to the default value of 4.

Parameter <MAXIMUM>

Description
Specifies the maximum number of ECMP routes. Range: 1 to 32. Default: 4.

Examples
Setting maximum number of parallel routes:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# maximum-paths 32

Setting maximum number of parallel paths to the default value of 4:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no maximum-paths

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.10 10.07 or earlier

Modification Increased upper limit of range of <MAXIMUM> parameter to 32. --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

max-metric router-lsa
max-metric router-lsa [on-startup <INTERVAL>] no max-metric router-lsa [on-startup]
Description
Sets the protocol to advertise a maximum metric so that other routers do not prefer the router as an intermediate hop in their shortest path first (SPF) calculations. If the on-startup parameter is used, the router is configured to advertise a maximum metric at startup. That is, for the time specified in seconds, or the default value of 600 seconds. To disable advertisement of the maximum metric, use the no form of the command.

OSPFv3 commands | 1772

The no form of this command advertises the normal cost metrics instead of advertising the maximized cost metric. This setting causes the router to be considered in traffic forwarding.

Parameter on-startup <INTERVAL>

Description
Automatically advertises the stub Router-LSA (or maximize the router-LSA cost metric) for a specified time interval upon OSPFv3 startup. Specifies the time in seconds. Range: 5 to 86400. Default: 600.

Examples
Setting to maximize the cost metrics for Router LSA:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# max-metric router-lsa switch(config-ospfv3-1)# max-metric router-lsa on-startup 3000

Setting to advertise the normal cost metrics instead of advertising the maximized cost metric:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no max-metric router-lsa switch(config-ospfv3-1)# no max-metric router-lsa on-startup

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

passive-interface default
passive-interface default no passive-interface default
Description
Sets all OSPFv3 interfaces as passive. The no form of this command sets all the OSPFv3 interfaces as active.
Examples
Setting OSPFv3-enabled interfaces as passive:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1773

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# passive-interface default
Setting OSPFv3-enabled interfaces as active:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no passive-interface default

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

redistribute
redistribute {bgp | connected | host-routes | local loopback | static | ripng | ospf <PROCESS-ID>}
[route-map <ROUTE-MAP-NAME>] no redistribute {bgp | connected | host-routes | local loopback | static | ripng | ospf <PROCESS-ID>}
[route-map <ROUTE-MAP-NAME>]
Description
Redistributes routes originating from other protocols, or from another OSPFv3 process, to the current OSPFv3 process.
If a route map is specified, then only the routes that pass the match clause specified in the route map are redistributed to OSPFv3. Configuration is not allowed if the referenced route map has not yet been configured.
If you try to redistribute routes from an OSPFv3 process which is not created, you are prompted to allow the OSPFv3 process to be auto-created before proceeding with redistribution. If you confirm at the prompt, the OSPFv3 process is created with defaults and redistribution configuration applied. If you deny at the prompt, redistribution configuration is skipped.
If command route-redistribute active-routes-only has been issued, only the routes from other protocols which are selected for forwarding are considered for redistribution into OSPFv3.
The no form of this command disables redistribution of routes to the current OSPFv3 process.

OSPFv3 commands | 1774

Parameter bgp connected
local loopback static ripng ospf <PROCESS-ID>
route-map <ROUTE-MAP-NAME>

Description
Specifies redistributing BGP (Border Gateway Protocol) routes.
Specifies redistributing connected (directly attached subnet or host).
Specifies redistributing local routes of the loopback interface.
Specifies redistributing static routes.
Specifies redistributing RIPng routes.
Specifies redistributing routes from the specified OSPFv3 process ID. Range: 1 to 65535.
Specifies redistribution filtering by route map. To create a route map, use command route-map.

Examples
Redistributing routes to OSPFv3:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# redistribute bgp switch(config-ospfv3-1)# redistribute bgp route-map BGP_routes

switch(config-ospfv3-1)# redistribute connected switch(config-ospfv3-1)# redistribute connected route-map connected_routes switch(config-ospfv3-1)# redistribute local loopback switch(config-ospfv3-1)# redistribute local loopback route-map local_routes switch(config-ospfv3-1)# redistribute static switch(config-ospfv3-1)# redistribute static route-map static_networks switch(config-ospfv3-1)# redistribute ripng switch(config-ospfv3-1)# redistribute ripng route-map rip-routes switch(config-ospfv3-1)# redistribute ospf 2
Disabling redistributing routes to OSPFv3:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no redistribute bgp switch(config-ospfv3-1)# no redistribute bgp route-map BGP_routes

switch(config-ospfv3-1)# no redistribute connected switch(config-ospfv3-1)# no redistribute connected route-map connected_routes switch(config-ospfv3-1)# no redistribute local loopback switch(config-ospfv3-1)# no redistribute local loopback route-map local_routes switch(config-ospfv3-1)# no redistribute static switch(config-ospfv3-1)# no redistribute static route-map static_networks switch(config-ospfv3-1)# no redistribute ripng switch(config-ospfv3-1)# no redistribute ripng route-map rip-routes switch(config-ospfv3-1)# no redistribute ospf 2

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1775

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.08
10.07 or earlier

Modification
Added route-map support for supported redistribute sourceprotocols. Updated information and examples.
--

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

reference-bandwidth
reference-bandwidth <BANDWIDTH> no reference-bandwidth
Description
Sets the reference bandwidth for OSPFv3. If the OSPFv3 interface cost is not explicitly set, then the cost of all the OSPFv3 interfaces is recalculated based on the reference bandwidth and link speed of the interface. For VLAN interfaces the calculated link speed value is 1 Gbps (if the OSPFv3 interface cost is not explicitly set). The no form of this command sets the reference bandwidth for OSPF to the default of 100000 Mbps.

Parameter <BANDWIDTH>

Description
Specifies the reference bandwidth used to calculate the cost of an interface in Mbps. Range: 1 to 4000000. Default: 100000.

Examples
Setting the reference bandwidth:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# reference-bandwidth 40000

Setting the reference bandwidth to the default value:

switch(config)# routerv3 ospf 1 switch(config-ospfv3-1)# no reference-bandwidth

OSPFv3 commands | 1776

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

retransmit-interval
retransmit-interval <INTERVAL> no retransmit-interval
Description
Sets the time between retransmitting lost link state advertisements for virtual links. The no form of this command sets the time between retransmitting lost link state advertisements to the default of 5 seconds for virtual links.

Parameter <INTERVAL>

Description
Specifies the time interval for the retransmit interval, in seconds. Range: 1 to 3600. Default: 5.

Examples
Setting OSPFv3 virtual links retransmit interval:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink6)# retransmit-interval 30

Setting OSPFv3 virtual links retransmit interval to default:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink6)# no retransmit-interval

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1777

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

router-id
router-id <ROUTER-ADDRESS> no router-id
Description
Sets an ID for the router in an IPv4 address format. The no form of this command unconfigures the router-id for the instance and sets the router-id to the default. The router-id is changed to the dynamically selected router-id. The default router-id 0.0.0.0 updates to the routing stack that triggers to auto-elect a router-id based on the highest IP address of loopback interface, or the highest IP address of interfaces.

Parameter <ROUTER-ADDRESS>

Description
Specifies the router address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.

Examples
Setting router-id in the OSPFv3 context:

switch(config)# router ospfv3 1 switch(config-ospfv3-1) # router-id 1.1.1.1

Unconfiguring router-id:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no router-id

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

OSPFv3 commands | 1778

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

router ospfv3
router ospfv3 <PROCESS-ID> [vrf <VRF-NAME>] no router ospfv3 <PROCESS-ID> [vrf <VRF-NAME>]
Description
Creates the OSPFv3 process (if not created already) and enters the router OSPFv3 instance context. Optionally if specified, you can specify a named VRF, or the default VRF if the <vrf-name> is not specified. Only one OSPFv3 process is allowed per VRF. The no form of this command removes the OSPFv3 instance. If a VRF is specified, it removes the OSPF instance from the named VRF, or the default VRF if the <var-name> is not specified.

Parameter <PROCESS-ID> vrf <VRF-NAME>

Description Specifies an OSPFv3 process ID. Length: 1 to 65535. Specifies the name of a VRF. Default: default.

Examples
Entering the router OSPFv3 instance:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)#

Setting the router OSPFv3 VRF instance:

switch(config)# router ospfv3 1 vrf vrf_red

Removing the router OSPFv3 instance:

switch#(config)# no router ospfv3 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1779

Command Information

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

show ipv6 ospfv3
show ipv6 ospfv3 [<PROCESS-ID>] [all-vrfs | vrf <VRF-NAME>]
Description
Shows OSPFv3 information including area, state, and configuration information.

Parameter <PROCESS-ID>
all-vrfs vrf <VRF-NAME>

Description
Specifies an OSPFv3 process ID optionally to show OSPFv3 information for a particular OSPFv3 process. Range: 1 to 65535.
Select to show OSPFv3 information for all VRFs.
Specifies the name of a VRF. Default: default.

Example
Showing general OSPFv3 configurations:

switch# show ipv6 ospfv3 200

VRF : default

Process : 200

---------------------------------------------------------------------

Router ID

: 1.1.1.1

BFD

: Disabled

SPF Hold Interval

: 1000 ms

LSA Start Interval

: 5000 ms

LSA Max Wait Interval : 1000 ms

External LSAs

:0

ECMP

:4

Area Border

: Yes

GR Status

: Enabled

GR State

: Inactive

GR Helper

: Enabled

GR Ignore Lost I/F

: Disabled

Summary address:

prefix fd00::1/64, advertise, tag 10

OSPFv3 SPF Start Interval SPF Max Wait Interval LSA Hold Interval LSA Arrival Interval Checksum Sum Reference Bandwidth AS Border GR Interval GR Exit Status GR Strict LSA Check Internal Process ID

: Enabled : 200 ms : 5000 ms : 1000 ms : 1000 ms :0 : 100000 Mbps : No : 120 sec : None : Enabled :1

Area

Total Active

----------------------

Normal

2

2

Stub

0

0

Area : 0.0.0.0

----------------------------------

Area Type

: Normal

Total Interfaces

:1

Passive Interfaces : 0

SPF calculation count : 4

Status

: Active

Active Interfaces : 1

Loopback Interfaces : 0

OSPFv3 commands | 1780

Area ranges:

fd00::1/64, inter-area, no-advertise

AH Authentication

: SHA1, SPI 256

Number of LSAs

:5

Checksum Sum

: 99122

Area : 0.0.0.1

----------------------------------

Area Type

: Normal

Total Interfaces

:1

Passive Interfaces : 0

Status

: Active

Active Interfaces : 1

Loopback Interfaces : 0

SPF Calculation Count : 4

Area ranges:

fd00::1/64, inter-area, no-advertise

ESP Authentication : SHA1

Encryption

: 3DES, SPI 256

Number of LSAs

:5

Checksum Sum

: 99122

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 ospfv3 border-routers
show ipv6 ospfv3 [<PROCESS-ID>] border-routers [all-vrfs | vrf <VRF-NAME>]
Description
Shows the OSPFv3 routing table entries for Area Border Router (ABR) and Autonomous System Border Router (ASBR).

Parameter <PROCESS-ID>
all-vrfs

Description
Specifies an OSPFv3 process ID to show the OSPFv3 routing table entries for ABR and ASBR for the particular OSPFv3 process. Range: 1 to 65535.
Select to show OSPFv3 border router information for all VRFs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1781

Parameter vrf <VRF-NAME>

Description Specifies the name of a VRF. Default: default.

Example
On the 6400 Switch Series, interface identification differs. Showing OSPFv3 border routers information for VRF vrf_red:

switch# show ipv6 ospfv3 border-routers vrf vrf_red

VRF : vrf_red

Process ID : 1

Internal Routing Table

--------------------------------------------------------

Codes: i - Intra-area route, I - Inter-area route

Router-ID Cost Type Area SPF Nexthop

i 1.1.1.1 1

ASBR 0.0.0.0 9 fe80::7272:cfff:fe9a:a15d

i 3.3.3.3 1

ASBR 1.1.1.1 9 fe80::7272:cfff:fe1f:d80

Interface 1/1/2 ** tunnel1

Command History
Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 ospfv3 interface
show ipv6 ospfv3 [<PROCESS-ID>] interface [<INTERFACE-NAME>] [brief] [all-vrfs | vrf <VRF-NAME>]
Description
Shows information about OSPFv3 enabled interfaces.

Parameter <PROCESS-ID>
<INTERFACE-NAME>

Description
Specifies an OSPFv3 process ID optionally to show the OSPFv3 enabled interfaces for the particular OSPFv3 process. Range: 1 to 65535.
Selects to show information only for the specified OSPFv3enabled interface.

OSPFv3 commands | 1782

Parameter brief
all-vrfs vrf <VRF-NAME>

Description
Include this parameter to display a brief overview of the following OSPF configuration information. n Interface: OSPF interface name. n Area: OSPF area ID. n Cost: The metric OSPF uses to judge a path's feasibility,
calculated as (reference bandwidth / interface bandwidth). n State: Indicates if the interface is a designated router (Dr) or a
backup designated router (Backup-dr). n Status: Indicates if the interface is up or down. n Flags: P - Passive A - Active.
Select to show OSPF-enabled interface information for all VRFs.
Specifies the name of a VRF. Default: default.

Examples
On the 6400 Switch Series, interface identification differs. Showing OSPFv3 information for all interfaces in default VRF:

switch# show ipv6 ospfv3 interface Codes: DR - Designated router BDR - Backup Designated router

Interface 1/3/10 is Up, Line Protocol is Up

--------------------------------------------

VRF

: default

IPv6 address

: fe80::9020:c203:280a:e800

0.0.0.0

Status

: Up

Broadcast

Hello Interval

: 10 sec

sec

Transit Delay

:1

sec

sec

BFD

: Disabled

Mbps

Cost Configured

: NA

State/Type

: DR

DR

: 1.1.1.1

2.2.2.2

Link LSAs

:2

39245

Authentication

: no

Process

:1

Area

:

Network Type

:

Dead Interval

: 40

Retransmit Interval : 5

Link Speed

: 1000

Cost Calculated Router Priority BDR

: 100 :2 :

Checksum Sum

:

Passive

: No

Codes: DR - Designated router BDR - Backup Designated router

Interface 1/3/11 is Up, Line Protocol is Up

--------------------------------------------

VRF

: default

IPv6 address

: fe80::9020:c203:2c0a:e800

0.0.0.1

Status

: Up

Broadcast

Hello Interval

: 10 sec

sec

Transit Delay

:1

sec

sec

Process

:1

Area

:

Network Type

:

Dead Interval

: 40

Retransmit Interval : 5

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1783

BFD Mbps Cost Configured State/Type DR 1.1.1.1 Link LSAs 83119 Authentication

: Disabled
: NA : BDR : 3.3.3.3
:2
: no

Link Speed
Cost Calculated Router Priority BDR
Checksum Sum
Passive

: 1000
: 100 :1 :
:
: No

Showing overview information for OSPFv3 enabled interfaces for all VRFs in brief:

switch# show ipv6 ospfv3 interface brief all-vrfs

VRF : default

Process : 1

===================================================

Total Number of Interfaces: 2

Flags: P - Passive A - Active

Interface

Area

Cost

State

Status

Flags

---------------------------------------------------------------------------------

1/3/10

0.0.0.0

100

DR

Up

A

1/3/11

0.0.0.1

100

BDR

Up

A

Showing overview information for OSPFv3 enabled interfaces for all VRFs:

6200(config)# show ipv6 ospfv3 interface br all-vrfs

VRF : default

Process : 1

===================================================

Total Number of Interfaces: 1

Flags: P - Passive A - Active

Interface

Area

Cost

State

Status

Flags

---------------------------------------------------------------------------------

1/1/1

0.0.0.0

100

BDR

Up

A

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.09
10.07 or earlier
Command Information

Modification
Supported process ID range expanded from 1-63 to 1-65535.
Output of the show ipv6 ospfv3 interface command includes flags to indicate whether the interface is in passive or active mode.
--

OSPFv3 commands | 1784

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 ospfv3 lsdb
show ipv6 ospfv3 [<process-id>] lsdb adv-router {<ROUTER-ID>|self} area <AREA-ID> lsid <link-state-id> all-vrfs|vrf <VRF-NAME>} as-external asbr-summary database-summary inter-area-prefix inter-area-router intra-area-prefix link network nssa-external router summary vsx-peer
Description
Shows the OSPFv3 link state database summary for different OSPF LSAs (Link State Advertisement). Use the parameters to get information for a particular LSA.

Parameter <PROCESS-ID> adv-router {<ROUTER-ID>|self} area <AREA-ID>
lsid <LINK-STATE-ID> all-vrfs|{vrf <vrf-name>
as-external

Description
Enter an OSPFv3 process ID to display general OSPF information for a particular OSPF process. Range: 1 to 65535.
Select to display link states for a particular advertising router. Specify either a Router ID of the advertising router or specify self to show self-originated link states.
Select to display information filtered for the specified area in one of the following formats.
OSPFv3 area identifier in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. OSPFv3 area identifier in decimal format. Value: 0 to 4294967295.
Select to display information filtered by link state identifier specified in IPv4 address format (A.B.C.D).
Select all-vrfs to display general OSPF information for all VRFs, or use the vrf <VRF-NAME> option to display information for a specific VRF.
Optionally select one of the following parameters to filter the link state database information.
Show external link states (LSA type 5)

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1785

Parameter database-summary

Description
Select to display the count of each type of LSA and each area in the database.
NOTE: The database-summary parameter does not support the area <area-id>, lsid <link-state-id> or adv-router {<routerid>|self} parameters.

inter-area-prefix inter-area-router intra-area-prefix link network nssa-external router vsx-peer

Show inter-area prefix link states (LSA type 3)
Show inter-area router link states (LSA type 4)
Show intra-area prefix link states (LSA type 9
Show link states (LSA type 8)
Show network LSAs (LSA type 2).
Show NSSA external link states (LSA type 7).
Show router LSAs (LSA type 1).
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing OSPFv3 link state database (LSDB) general information:

switch# show ipv6 ospfv3 lsdb OSPF Router with ID (50.50.50.50) (Process ID 1 VRF default) ============================================================

Router Link State Advertisements (Area 0.0.0.0)

-----------------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Link Count Bits

-----------------------------------------------------------------------------

40.40.40.40

930

0x80000004 0x2ea1

0

3

None

50.50.50.50

935

0x80000002 0x8b52

0

1

E

60.60.60.60

943

0x800003c5 0x9854

0

2

None

Network Link State Advertisements (Area 0.0.0.0)

------------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Router Count

------------------------------------------------------------------------

60.60.60.60

944

0x80000001 0x7179

1360007168 2

50.50.50.50

935

0x80000001 0x516a

19

1

Inter Area Prefix Link State Advertisements (Area 0.0.0.0)

------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Prefix

------------------------------------------------------------------

40.40.40.40

929

0x80000001 0x2498

131072

FEC0:3344::/32

50.50.50.50

928

0x80000001 0x5b2f

65536

111::/64

Inter Area Router Link State Advertisements (Area 0.0.0.0) ---------------------------------------------------------------------------------

OSPFv3 commands | 1786

ADV Router

Age

Seq#

Checksum LSID

Destination Router ID

---------------------------------------------------------------------------------

40.40.40.40

929

0x80000001 0x2498

1

33.33.33.33

AS External Link State Advertisements (Area 0.0.0.0)

------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Prefix

------------------------------------------------------------------

40.40.40.40

264

0x80000001 0x24cc4

1

10::/64

40.40.40.40

675

0x80000001 0x5b00f

2

11::/64

NSSA External Link State Advertisements (Area 0.0.0.0)

------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Prefix

------------------------------------------------------------------

3.3.3.3

264

0x80000001 0x24ac2

1

200::/64

Link-local Link State Advertisements (Area 0.0.0.0)

---------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Interface

---------------------------------------------------------------------

50.50.50.50

264

0x80000001 0x653c4

19

1/1/1

Intra Area Prefix Link State Advertisements (Area 0.0.0.0)

----------------------------------------------------------------------------------

-------------

ADV Router

Age

Seq#

Checksum LSID

Referenced LS Type

Referenced LSID

----------------------------------------------------------------------------------

-------------

50.50.50.50

263

0x80000001 0x1da34

1

0x2001

0

50.50.50.50

264

0x80000001 0x2a45d

1

0x2002

19

Showing AS external link states:

switch# show ipv6 ospfv3 lsdb as-external OSPF Router with ID (60.60.60.60) (Process ID 1 VRF default) ========================================================

AS External Link State Advertisements (Area 0.0.0.0)

------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Prefix

------------------------------------------------------------------

40.40.40.40

264

0x80000001 0x24cc4

1

10::/64

40.40.40.40

675

0x80000001 0x5b00f

2

11::/64

Showing the LSDB database summary:

switch# show ipv6 ospfv3 lsdb database-summary OSPF Router with ID (10.1.1.1) (Process ID 1 VRF default) ==========================================================

Area 0.0.0.0 database summary

--------------------------

LSA Type

Count

--------------------------

Router

2

Network

1

Inter Area Prefix 1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1787

Inter Area Router 0

NSSA External

0

Link

3

Intra Area Prefix 3

--------------------------

Total

10

Process 1 database summary

--------------------------

LSA Type

Count

--------------------------

Router

2

Network

1

Inter Area Prefix 1

Inter Area Router 0

AS External

2

NSSA External

0

Link

3

Intra Area Prefix 3

--------------------------

Total

12

Showing inter-area prefix LSAs:

switch# show ipv6 ospfv3 lsdb inter-area-prefix OSPF Router with ID (6.6.6.6) (Process ID 1 VRF default) ========================================================

Inter Area Prefix Link State Advertisements (Area 0.0.0.0)

------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Prefix

------------------------------------------------------------------

40.40.40.40

929

0x80000001 0x2498

131072

FEC0:3344::/32

50.50.50.50

928

0x80000001 0x5b2f

65536

111::/64

Showing network LSAs:

switch# show ipv6 ospfv3 lsdb network OSPF Router with ID (50.50.50.50) (Process ID 1 VRF default) ========================================================

Network Link State Advertisements (Area 0.0.0.0)

------------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Router Count

------------------------------------------------------------------------

60.60.60.60

944

0x80000001 0x7179

1360007168 2

50.50.50.50

935

0x80000001 0x516a

19

1

Showing NSSA external link states:

switch# show ipv6 ospfv3 lsdb nssa-external OSPF Router with ID (2.2.2.1) (Process ID 1 VRF default) ========================================================

NSSA External Link State Advertisements (Area 0.0.0.0)

------------------------------------------------------------------

ADV Router

Age

Seq#

Checksum LSID

Prefix

OSPFv3 commands | 1788

------------------------------------------------------------------

3.3.3.3

264

0x80000001 0x24ac2

1

200::/64

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 ospfv3 neighbors
show ipv6 ospfv3 [<PROCESS-ID>] neighbors [<NEIGHBOR-ID>] [interface <INTERFACE-NAME>] [detail | summary] [all-vrfs | vrf <VRF-NAME>]
Description
Shows information about OSPFv3 neighbors.

Parameter <PROCESS-ID>
neighbors <NEIGHBOR-ID>
interface <INTERFACE-NAME> detail summary all-vrfs vrf <VRF-NAME>

Description Specifies an OSPFv3 process ID to show OSPFv3 neighbor information for the particular OSPFv3 process. Range: 1 to 65535. Shows information about a particular neighbor, specified in IPv4 format (A.B.C.D). Shows neighbor information only for the specified interface. Shows detailed information for the neighbors. Shows summary information for the neighbors. Shows neighbor information for all VRFs. Specifies the name of a VRF. Default: default.

Examples
On the 6400 Switch Series, interface identification differs. Showing OSPFv3 neighbors information:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1789

Showing OSPFv3 neighbors information for a specific neighbor:

switch# show ipv6 ospfv3 neighbors 3.3.3.3

VRF : default

Process : 1

--------------------------------------------------------------

Router-Id

: 3.3.3.3

Area

: 0.0.0.0

Interface

: 1/1/1

Address

:

fe80::7272:cfff:fe79:7510

State

: FULL

Neighbor Priority : 1

Dead Timer Due : 00:00:36

Options

: 0x13

Time since last state change : 00h:14m:45s

Showing detail OSPFv3 neighbors information for a specific neighbor:

switch# show ipv6 ospfv3 neighbors 2.2.2.2 detail

VRF : default

Process : 1

--------------------------------------------------------------

Router-Id

: 3.3.3.3

Area

: 0.0.0.0

Interface

: 1/1/1

Address

:

fe80::7272:cfff:fe79:7510

State

: FULL

Neighbor Priority : 1

DR

: 3.3.3.3

BDR

: 1.1.1.3

Dead Timer Due : 00:00:36

Options

: 0x13

Retransmission Queue Length : 0

Time Since Last State Change : 00h:14m:45s

Showing OSPFv3 neighbors information for interface 1/1/1:

switch# show ipv6 ospfv3 neighbors 3.3.3.3 interface 1/1/1

VRF : default

Process : 1

--------------------------------------------------------------

Router-Id

: 3.3.3.3

Area

: 0.0.0.0

Interface

: 1/1/1

Address

:

fe80::7272:cfff:fe79:7510

State

: FULL

Neighbor Priority : 1

Dead Timer Due : 00:00:36

Options

: 0x13

Time Since Last State Change : 00h:14m:45s

Showing summary OSPFv3 neighbors information for a specific neighbor for all VRFs:

switch# show ipv6 ospfv3 neighbors 3.3.3.3 summary all-vrfs OSPFv3 Process ID 1 VRF default, Neighbor Summary ==================================================

Interface Down Attempt Init TwoWay ExStart Exchange Loading Full Total

--------------------------------------------------------------------------

1/1/1

00

00

0

0

0

11

Total

00

00

0

0

0

11

OSPFv3 Process ID 1 VRF red, Neighbor Summary ==============================================

Interface Down Attempt Init TwoWay ExStart Exchange Loading Full Total

--------------------------------------------------------------------------

1/1/2

00

00

0

0

0

11

Total

00

00

0

0

0

11

OSPFv3 commands | 1790

Showing OSPFv3 neighbors information for VRF red:

switch# show ipv6 ospfv3 neighbors vrf red OSPFv3 Process ID 2 VRF red ============================

Total Number of Neighbors: 1

Neighbor ID

Priority State

Interface

-------------------------------------------------------

4.4.4.4

1

FULL/DR

1/1/2

Neighbor address fe80::7272:cfff:fe79:7510

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 ospfv3 routes
show ipv6 ospfv3 [<PROCESS-ID>] routes [<PREFIX/LENGTH>] [all-vrfs | vrf <VRF-NAME>]
Description
Shows the OSPFv3 routing table information.

Parameter <PROCESS-ID>
<PREFIX/LENGTH> all-vrfs vrf <VRF-NAME>

Description
Specifies an OSPFv3 process ID that shows information from the OSPFv3 routing table for the particular OSPFv3 process. Range: 1 to 65535.
Specifies the IPv6 destination prefix showing information about a particular destination prefix. For example, 2010:bd9::/32.
Select to show OSPFv3 routing table information for all VRFs.
Specifies the name of a VRF. Default: default.

Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1791

On the 6400 Switch Series, interface identification differs. Showing OSPFv3 routing table information:

switch# show ipv6 ospfv3 routes Codes: i - Intra-area route, I - Inter-area route
E1 - External type-1, E2 - External type-2

OSPFv3 Process ID 1 VRF default, Routing Table -----------------------------------------------

Total Number of OSPFv3 Routes : 2

111::/64

(i) area:0.0.0.0

directly attached to interface 1/1/1, cost 1 distance 110

fd00::/64

(i) area:0.0.0.1

directly attached to interface vlan10, cost 1 distance 110

Showing OSPFv3 routing table information for VRF red:

switch# show ipv6 ospfv3 routes vrf red

Codes: i - Intra-area route, I - Inter-area route E1 - External type-1, E2 - External type-2

OSPFv3 Process ID 2 VRF red, Routing Table -------------------------------------------

Total Number of OSPFv3 Routes : 1

222::/64

(i) area:0.0.0.1

directly attached to interface 1/1/2, cost 1 distance 110

Showing OSPFv3 routing table information for destination prefix fd00::/64:

switch# show ipv6 ospfv3 1 routes fd00::/64 Codes: i - Intra-area route, I - Inter-area route
E1 - External type-1, E2 - External type-2

OSPFv3 Process ID 1 VRF default, Routing Table for prefixes fd00::/64 ----------------------------------------------------------------------

Total Number of OSPFv3 Routes : 1

fd00::/64

(i) area:0.0.0.1

directly attached to interface vlan10, cost 1 distance 110

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

OSPFv3 commands | 1792

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 ospfv3 statistics
show ipv6 ospfv3 [<PROCESS-ID>] statistics [all-vrfs | vrf <VRF-NAME>]
Description
Shows OSPFv3 statistics.

Parameter <PROCESS-ID>
all-vrfs vrf <VRF-NAME>

Description
Specifies an OSPFv3 process ID that shows information on the OSPFv3 SPF statistics for the particular OSPFv3 process. Range: 1 to 65535.
Select to show OSPFv3 SPF statistics information for all VRFs.
Specifies the name of a VRF. Default: default.

Examples
Showing OSPFv3 statistics information:

switch# show ipv6 ospfv3 statistics OSPFv3 Process ID 1 VRF default, Statistics (cleared 3h 2m 21s ago) --------------------------------------------------------------------

Unknown Interface Drops

:0

Unknown Virtual Interface Drops : 0

Bad IPv6 Header Length Drops : 0

Wrong OSPFv3 Version Drops

:0

Bad Source IPv6 Drops

:0

Resource Failure Drops

:0

Bad Header Length Drops

:0

Total Drops

:0

Showing OSPFv3 statistics information for VRF red:

switch# show ipv6 ospfv3 2 statistics vrf red

OSPFv3 Process ID 2 VRF red, Statistics (cleared 3h 2m 30s ago) ----------------------------------------------------------------

Unknown Interface Drops

:0

Unknown Virtual Interface Drops : 0

Bad IPv6 Header Length Drops : 0

Wrong OSPFv3 Version Drops

:0

Bad Source IPv6 Drops

:0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1793

Resource Failure Drops

:0

Bad Header Length Drops

:0

Total Drops

:0

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 ospfv3 statistics interface
show ipv6 ospfv3 [<PROCESS-ID>] statistics interface [<INTERFACE-NAME>] [all-vrfs | vrf <VRF-NAME>]
Description
Shows the OSPFv3 statistics for the OSPFv3-enabled interfaces.

Parameter <PROCESS-ID>
<INTERFACE-NAME> all-vrfs vrf <VRF-NAME>

Description
Specifies an OSPFv3 process ID to show OSPF-enabled interface statistics information on the specified OSPFv3 process. Range: 1 to 65535.
Selects to show information only for the specified interface.
Select to show OSPF-enabled interface statistics information for all VRFs.
Specifies the name of a VRF. Default: default.

Example
Showing OSPFv3-enabled interfaces information for interface 1/1/1:

switch# show ipv6 ospfv3 statistics interface all-vrfs OSPFv3 Process ID 1 VRF default, Interface vlan2000 Statistics (cleared 0h 2m 52s ago)

OSPFv3 commands | 1794

================================================================================== ====

Tx Hello packets

:0

Tx Hello bytes

:0

Tx DD packets

:0

Tx DD bytes

:0

Tx LS request packets : 0

Tx LS request bytes : 0

Tx LS update packets : 0

Tx LS update bytes : 0

Tx LS ack packets

:0

Tx LS ack bytes

:0

Rx Hello packets

:0

Rx Hello bytes

:0

Rx DD packets

:0

Rx DD bytes

:0

Rx LS request packets : 0

Rx LS request bytes : 0

Rx LS update packets : 0

Rx LS update bytes : 0

Rx LS ack packets

:0

Rx LS ack bytes

:0

Total IPsec packets processed : 0

Total IPsec bytes processed : 0

Total Number of State Changes : 0

Number of LSAs

:0

LSA Checksum Sum

:0

Total OSPFv3 Packets Discarded: 0 ----------------------------------

Reason

Packets Dropped

--------------------------------------------------

Invalid Type

0

Invalid Length

0

Invalid Version

0

Bad or Unknown Source

0

Area Mismatch

0

Self-originated

0

Duplicate Router ID

0

Interface Standby

0

Total Hello Packets Dropped

0

Hello Interval Mismatch

0

Dead Interval Mismatch

0

Options Mismatch

0

MTU Mismatch

0

Neighbor Ignored

0

Resource Failures

0

Bad LSA Length

0

Others

0

IPsec Authentication Errors

0

IPsec ESP Errors

0

Total LSAs Ignored : 0

-----------------------

Bad Type

:0

Bad Length

:0

Invalid Data

:0

Invalid Checksum : 0

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1795

Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 ospfv3 virtual-links
show ipv6 ospfv3 [<PROCESS-ID>] virtual-links [brief] [all-vrfs | vrf <vrf-name>]
Description
Displays the current state and parameters of the OSPFv3 virtual links.

Parameter <PROCESS-ID>
brief
all-vrfs vrf <VRF-NAME>

Description
Enter an OSPFv3 process ID to display information on the OSPFv3 virtual links for the particular OSPFv3 process. Range: 1 to 65535.
Select to display brief overview information for the OSPFv3 virtual links.
Select to display OSPFv3 virtual links information for all VRFs.
Specifies the name of a VRF. Default: default.

Examples
Show OSPFv3 virtual links information:

switch# show ipv6 ospfv3 virtual-links Virtual link to router 4.4.4.4 is down ---------------------------------------
Process ID 1 VRF default, Transit area 0.0.0.1 Transit delay 1 sec Timer Intervals: hello 10, dead 40, retransmit 5 Number of Link LSAs: 0, checksum sum 0 0 state changes AH Authentication: MD5, SPI: 256

Show brief overview information for OSPFv3 virtual links:

switch# show ospfv3 virtual-links brief OSPFv3 Process ID 1 VRF default

OSPFv3 commands | 1796

================================

Total Number of Virtual Links: 1

Remote Router Transit Area

Status

------------------------------------------

4.4.4.4

0.0.0.1

down

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Modification Supported process ID range expanded from 1-63 to 1-65535. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

summary-address
summary-address <IPV6-ADDR>/<MASK> [no-advertise | tag <TAG-VALUE>] no summary-address <prefix/length> [no-advertise | tag <tag-value>
Description
Summarizes the external routes with the matching address and mask. When advertising this route, its metric is set to the lowest cost path from among the routes that were summarized. The no form of this command disables route summarization.
This command only works for an ASBR (Autonomous System Boundary Router).

Parameter <IPV6-ADDR>
<MASK> no-advertise

Description
Specifies an IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Do not advertise the aggregate route. Suppress routes that match the specified prefix/mask pair.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1797

Parameter tag <TAG-VALUE>

Description
Specify the tag for the aggregate route. The summary prefix will be advertised along with the tag value in External LSAs. Range: 0 to 4294967295

Examples
Setting OSPF route summarization:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# summary-address 2001:DB8::1/32

Disabling route summarization:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no summary-address 2001:DB8::1/32

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

timers lsa-arrival
timers lsa-arrival <DELAY> no timers lsa-arrival
Description
Configures the minimum delay between receiving the same LSA from a peer. The same LSA is an LSA that contains the same LSA ID number, LSA type, and advertising router ID. If an instance of the same LSA arrives sooner before the delay expires, the LSA is dropped. Generally, the LSA arrival timer should be set to a value less than or equal to the start-time value for the command timers throttle lsa start on the neighbor. The no form of this command sets the LSA timers to default values.

OSPFv3 commands | 1798

Parameter <DELAY>

Description
Specifies the delay in milliseconds. Range: 0 to 600000. Default: 1000.

Examples
Setting the LSA arrival timer:

switch(config)# router ospf 1 switch(config-ospfv3-1)# timers lsa-arrival 10

Setting the LSA arrival timer to default:

switch(config)# router ospf 1 switch(config-ospfv3-1)# no timers lsa-arrival

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

timers throttle lsa
timers throttle lsa start-time <START-TIME> hold-time <HOLD-TIME> max-wait-time <WAITTIME> no timers throttle lsa
Description
Configures the timers for LSA generation. The no form of this command sets the LSA timers to default values.

Parameter start-time <START-TIME>

Description
Specifies the initial wait time in milliseconds after which LSAs are generated. When set to 0, the LSAs are generated without any delay. Range: 0 to 600000. Default: 5000.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1799

Parameter hold-time <HOLD-TIME>
max-wait-time <WAIT-TIME>

Description
Specifies the amount of time, in milliseconds, between regeneration of an LSA. The hold time doubles each time the same LSA must be regenerated, until max-wait-time is reached. When set to 0, LSA regeneration time is not increased. Range: 0 to 600000. Default: 0.
Specifies the maximum wait time, in milliseconds, for regeneration of the same LSA. When set to 0, LSA regeneration time is not increased. Range: 0 to 600000. Default: 0.

Examples
Setting the LSA timers:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# timers throttle lsa start-time 100 hold-time 1000 maxwait-time 10000

Setting LSA timers to default values:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no timers throttle lsa

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

timers throttle spf
timers throttle spf start-time <START-TIME> hold-time <HOLD-TINME> max-wait-time <WAIT-TIME> no timers throttle spf
Description
Configures timers for SPF calculation. There are three timers:

OSPFv3 commands | 1800

n start-time Is the initial delay before an SPF calculation is started. Default is 200 milliseconds. n hold-time Is the progressive backoff time to wait before next scheduled SPF calculation. Default is
1000 milliseconds. If a route change event occurs during this period, the value doubles until it reaches the max-wait-time. n max-wait-time Is the maximum time to wait before the next scheduled SPF calculation. Default is 5000 milliseconds. This is used to limit the SPF hold timer and also defines the time to be considered for which the OSPF LSDB has to be stable, after which the SPF throttle mechanism is reset.
The no form of this command sets all the configured non-default timers to default value.

Parameter <START-TIME> <HOLD-TINME>
<WAIT-TIME>

Description
Time in milliseconds to set timer for initial SPF delay. Default: 200.
Time in milliseconds to set the minimum hold time between two consecutive SPF calculations. Default: 1000.
Time in milliseconds to set the maximum wait time between two consecutive SPF calculations. Default: 5000.

Examples
Setting non-default timer values for SPF throttling:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# timers throttling spf start-time 500 hold-time 3000 maxwait-time 9000 Switch(config-ospfv3-1)# show running-config current-context router ospfv3 1
area 0.0.0.0 area 0.0.0.1 area 0.0.0.2 nssa no-summary area 0.0.0.3 stub

Setting default timer values for SPF throttling after configuring non-default values:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no timers throttling spf

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1801

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

transit-delay
transit-delay <DELAY> no transit-delay
Description
Sets the time delay in Link state transmission for virtual links. The no form of this command sets the delay in Link state transmission to the default of 1 second for virtual links.

Parameter <DELAY>

Description
Specifies the time delay for the transit delay, in seconds. Range: 1 to 3600. Default: 1.

Examples
Setting OSPFv3 virtual links transit delay:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink6)# transit-delay 30

Setting OSPFv3 virtual links transit delay to default:

switch(config)# router ospfv3 1 switch(config-ospfv3-1)# area 100 virtual-link 100.0.1.1 switch(config-router-vlink6)# no transit-delay

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-router-vlink

Authority
Administrators or local user group members with execution rights for this command.

OSPFv3 commands | 1802

trap-enable
trap-enable no trap-enable
Description
Enables the notification of the events to be sent as traps to the SNMP management stations for OSPFv3. The no form of this command disables the notification of the events to be sent as traps to the SNMP management stations for OSPFv3.
Examples
Enabling sending notification of events as traps:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# trap-enable
Disabling sending notification of events as traps:
switch(config)# router ospfv3 1 switch(config-ospfv3-1)# no trap-enable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ospfv3-<PROCESS-ID>

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1803

Chapter 102 PBR commands

PBR commands

apply policy
apply policy <POLICY-NAME> routed-in no apply policy <POLICY-NAME> routed-in
Description
Applies a classifier policy containing a PBR action to an interface. A policy with PBR actions is only applicable to L3/routing interfaces. The no form of this command removes a classifier policy containing a PBR action from an interface. config-if

Parameter <POLICY-NAME>

Description Specifies name of the policy.

Restrictions
n Only Layer 3 interfaces are valid for PBR policy application, and only in the routed inbound direction. n If a policy with an 'interface tunnel' PBR action is applied on a Layer 3 interface in VRF 'A', and that
interface tunnel is a member of VRF 'B', the interface tunnel is considered down/unavailable in this policy application in VRF 'A'.
Usage
To use route-only ports (ROPs) as Layer 3 interfaces, an internal VLAN range must be configured first. A policy with PBR actions can be applied to ROPs.
Example
On the 6400 Switch Series, interface identification differs. Applying a policy to an interface:

switch(config)# interface 1/1/10 switch(config-if)# routing switch(config-if)# apply policy pbr_policy routed-in switch(config-if)# exit

Applying a policy to a subinterface, inbound direction:

switch(config)# interface 1/1/1.0 switch(config-if)# apply policy my_policy in switch(config-if)# exit

AOS-CX 10.14 Command-Line Interface Guide

1804

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

pbr-action-list
pbr-action-list <ACTION-LIST-NAME>
[<SEQUENCE-NUMBER>] {nexthop | default-nexthop} <NEXT-HOP-IP-ADDR> interface {null | <TUNNEL-NAME>}
no [<SEQUENCE-NUMBER>] {nexthop | default-nexthop} <IP-ADDR> interface {null | <TUNNEL-NAME>}
no pbr-action-list <ACTION-LIST-NAME>
Description
Creates a PBR action list or modifies its entries. The no form of this command can be used to delete an action list or an individual action list entry.

Parameter <ACTION-LIST-NAME> <SEQUENCE-NUMBER>
nexthop default-nexthop <NEXTHOP-IP-ADDR> interface {null | <TUNNEL-NAME>

Description
Specifies the action list name. An action list name can be 1 to 64 alphanumeric characters.
Specifies list entry sequence number. Range: 1-4294967295 {nexthop | default-nexthop} Selects a regular next-hop (nexthop) or a default next-hop (default-nexthop). These parameters specify the address of a next-hop router to forward traffic matched by a class under different conditions.
Sets the next hop for routing the packet.
Sets the next hop for routing the packet when there is no explicit route for its destination.
Specifies IPv4 or IPv6 address of the next-hop router.
Selects the type of keyword interface: null or the tunnel interface

PBR commands | 1805

Parameter
null <TUNNEL-NAME>

Description name. Specifies to drop matching traffic.
Specifies an IP tunnel interface name through which to forward the matching traffic.

Restrictions
The reachability of the next-hop routers/tunnel interfaces in the list is not guaranteed. Such reachability can change at any time due to the dynamic nature of the network environment.
Usage
Each action list may contain up to eight entries of four different entry types:
n interface null n interface tunnel n nexthop n default-nexthop
List entries have a unique sequence number which, if not user specified, are automatically assigned beginning at 10 and continuing at intervals of 10 for each subsequent new list entry, for example 20, 30, and 40. Sequence numbers of any value can be specified manually, a different interval may be set, and new entries can be added to (or removed from) any location in the list at any time. Specifying an existing sequence number causes the existing list entry to be replaced by the new details. The list entry with the lowest sequence number has the highest priority entry in the list. The sequence numbers may be renumbered with the pbr-action-list resequence command. Only one next-hop router or interface from the list is used per packet matched. This router or interface is defined as the highest priority list entry that is reachable or available at the time of the traffic match. If the highest priority list entry next-hop router or tunnel interface is reachable - that list entry is chosen, the search is stopped, and the traffic is forwarded to the next-hop router or interface for the entry. If the highest priority list entry next-hop router or tunnel interface is not reachable, the next highest priority list entry reachability is determined and used if reachable, otherwise the process continues down the list. If none of the routers in the list are reachable, the packet may be dropped (through the null interface entry if configured) or forwarded according to a system route table entry.
An action list that contains a next-hop of one IP version cannot also contain an entry of another IP version. For example, an action list must contain only IPv4 or IPv6 next-hop addresses or tunnel interfaces.

Examples
The list name is included in the context prompt for easy current-list identification. Any list name over 10 characters will be truncated at 10 characters and terminated with the tilde character (~) to indicate a reduced list name display. This reduction affects the prompt display of the list name only:
switch(config)# pbr-action-list eighteenchars switch(config-pbr-action-list-eighteench~)#

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1806

The following example creates an action list with two IPv4 next-hops, a default IPv4 next-hop, and a null interface. The example uses default sequence numbering for its list entries.

switch(config)# pbr-action-list test1 switch(config-pbr-action-list-test1)# nexthop 1.1.1.1 switch(config-pbr-action-list-test1)# nexthop 2.2.2.2 switch(config-pbr-action-list-test1)# default-nexthop 9.9.9.9 switch(config-pbr-action-list-test1)# interface null switch(config-pbr-action-list-test1)# end
switch(config)# show pbr-action-list test1

Name

Sequence Type

Address/Interface

------------------------------------------------------------------

test1

10 nexthop

1.1.1.1

20 nexthop

2.2.2.2

30 default-nexthop

9.9.9.9

40 interface

null

The following example creates an action list with an IPv4 next-hop and a tunnel interface with manual sequence numbers for its entries.

switch(config)# pbr-action-list test2 switch(config-pbr-action-list-test2)# 6 ip default-nexthop 4.4.4.4 switch(config-pbr-action-list-test2)# 1 interface tunnel10 switch(config-pbr-action-list-test2)# end

switch(config)# show pbr-action-list test2

Name

Sequence Type

Address/Interface

------------------------------------------------------------------

test2

1 interface

tunnel10

6 default-nexthop

4.4.4.4

The following example creates an action list with two IPv4 tunnel interfaces, with default sequence numbering.

switch(config)# pbr-action-list test3 switch(config-pbr-action-list-test3)# interface tunnel10 switch(config-pbr-action-list-test3)# interface tunnel15 switch(config-pbr-action-list-test3)# end

switch(config)# show pbr-action-list test3

Name

Sequence Type

Address/Interface

------------------------------------------------------------------

test3

10 interface

tunnel10

20 interface

tunnel15

The following example creates an action list with two IPv6 next-hops and the null interface, with manual sequence numbers.

PBR commands | 1807

switch(config)# pbr-action-list test4 switch(config-pbr-action-list-test4)# 5 nexthop 2000:abcd::cccc:dddd switch(config-pbr-action-list-test4)# 6 nexthop 1000:abcd::1234:5678 switch(config-pbr-action-list-test4)# 7 interface null switch(config-pbr-action-list-test4)# end

switch(config)# show pbr-action-list test4

Name

Sequence Type

Address/Interface

------------------------------------------------------------------

test4

5 nexthop

2000:abcd::cccc:dddd

6 nexthop

1000:abcd::1234:5678

7 interface

null

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

config
The pbr-action-list
<ACTION-LIST-NAME> command takes you into the config-pbraction-list-
<ACTION-LIST-NAME> context where you modify entries for a PBR action list.

Administrators or local user group members with execution rights for this command.

pbr-action-list copy
pbr-action-list <ACTION-LIST-NAME> copy <DESTINATION-ACTION-LIST-NAME>
Description
Copies an existing PBR action list.

Parameter <ACTION-LIST-NAME> <DESTINATION-ACTION-LIST-NAME>

Description
Specifies the action list name to be copied.
Specifies the name of the copied action list. A destination action list name can be 1 to 64 alphanumeric characters.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1808

Examples
The following example copies test4 action list to test 5.

switch(config)# show pbr-action-list test4

Name

Sequence Type

Address/Interface

------------------------------------------------------------------

test4

5 nexthop

2000:abcd::cccc:dddd

6 nexthop

1000:abcd::1234:5678

7 interface

null

switch(config)# pbr-action-list test4 copy test5 switch(config-pbr-action-list-test4)# show pbr-action-list test5

Name

Sequence Type

Address/Interface

------------------------------------------------------------------

test4

1 nexthop

2000.abcd::cccc.dddd

11 nexthop

1000.abcd::1234.5678

21 interface

null

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

pbr-action-list resequence
pbr-action-list <ACTION-LIST-NAME> resequence <STARTING-SEQUENCE-NUMBER> <INCREMENT>
Description
Renumbers the entries in an action list. The list entry with the lowest sequence number has the highest priority entry in the list.

Parameter <ACTION-LIST-NAME>

Description Specifies the action list name to have its entries resequenced.

PBR commands | 1809

Parameter <STARTING-SEQUENCE-NUMBER> <INCREMENT>

Description
Specifies the starting sequence number. Range: 1-4294967295
Specifies the increment of the resequencing. Range: 14294967295

Examples
The following command shows how a PBR action list is resequenced. In the following example, an action list named test4 is resequenced so that instead of its entries starting at 5 and being numbered sequentially, its entries start now at 1 and they are numbered in increments of 10:

switch(config)# show pbr-action-list test4

Name

Sequence Type

Address/Interface

------------------------------------------------------------------

test4

5 nexthop

2000.abcd::cccc.dddd

6 nexthop

1000.abcd::1234.5678

7 interface

null

switch(config)# pbr-action-list test4 resequence 1 10

Name

Sequence Type

Address/Interface

------------------------------------------------------------------

test4

1 nexthop

2000.abcd::cccc.dddd

11 nexthop

1000.abcd::1234.5678

21 interface

null

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

pbr-action-list reset
pbr-action-list <ACTION-LIST-NAME> reset
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1810

Resets a specified PBR action list to its last successful configuration.

Parameter <ACTION-LIST-NAME>

Description Specifies the action list name to be reset.

Examples

switch(config)# pbr-action-list test reset

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

policy
policy <POLICY-NAME>
[<SEQUENCE-NUMBER>] class {ip|ipv6|mac} <CLASS-NAME> action {<REMARK-ACTIONS> | <POLICE-ACTIONS> | <OTHER-ACTIONS>} [{<REMARK-ACTIONS> | <POLICE-ACTIONS> | <OTHER-ACTIONS>}]
[<SEQUENCE-NUMBER>] comment ...
no policy <POLICY-NAME>
Description
Creates, modifies, or deletes a classifier policy. A policy contains one or more policy entries ordered and prioritized by sequence numbers. Each entry has an IPv4/IPv6/MAC class and one or more policy actions associated with it. An applied policy processes a packet sequentially against policy entries in the list until the last entry in the list has been evaluated or the packet matches an entry. If a match occurs the related entry, actions are taken. The no form of this command is used to delete a policy or an individual policy entry.

PBR commands | 1811

Parameter <POLICY-NAME> <SEQUENCE-NUMBER>
comment class {ip|ipv6|mac} <CLASS-NAME>
<REMARK-ACTIONS>

Description
Specifies the name of the policy.
Specifies a sequence number for the policy entry. Optional. Range: 1 to 4294967295.
Stores the remaining entered text as a policy entry comment.
Specifies a type of class, ip for IPv4, ipv6 for IPv6 and mac for a MAC policy. And specifies a class name.
Remark actions can be any of the following options: {pbr <ACTION-LIST> | pcp <PRIORITY> | ip-precedence <IPPRECEDENCE-VALUE> | dscp <DSCP-VALUE> | local-priority <LOCAL-PRIORITY-VALUE>} where:
pbr <ACTION-LIST>
Specifies the PBR action list to be used.
pcp <PCP-VALUE>
Specifies Priority Code Point (PCP) value. Range: 0 to 7.
ip-precedence <IP-PRECEDENCE-VALUE>
Specifies the numeric IP precedence value. Range: 0 to 7.
dscp <DSCP-VALUE> Specifies a Differentiated Services Code Point (DSCP) value. Enter either a numeric value (0 to 63) or a keyword as follows: AF11 - DSCP 10 (Assured Forwarding Class 1, low drop probability) AF12 - DSCP 12 (Assured Forwarding Class 1, medium drop probability) AF13 - DSCP 14 (Assured Forwarding Class 1, high drop probability) AF21 - DSCP 18 (Assured Forwarding Class 2, low drop probability) AF22 - DSCP 20 (Assured Forwarding Class 2, medium drop probability) AF23 - DSCP 22 (Assured Forwarding Class 2, high drop probability) AF31 - DSCP 26 (Assured Forwarding Class 3, low drop probability) AF32 - DSCP 28 (Assured Forwarding Class 3, medium drop probability) AF33 - DSCP 30 (Assured Forwarding Class 3, high drop probability) AF41 - DSCP 34 (Assured Forwarding Class 4, low drop probability) AF42 - DSCP 36 (Assured Forwarding Class 4, medium drop probability) AF43 - DSCP 38 (Assured Forwarding Class 4, high drop probability) CS0 - DSCP 0 (Class Selector 0: Default) CS1 - DSCP 8 (Class Selector 1: Scavenger) CS2 - DSCP 16 (Class Selector 2: OAM) CS3 - DSCP 24 (Class Selector 3: Signaling) CS4 - DSCP 32 (Class Selector 4: Real time) CS5 - DSCP 40 (Class Selector 5: Broadcast video)

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1812

Parameter <POLICE-ACTIONS> <OTHER-ACTIONS>

Description
CS6 - DSCP 48 (Class Selector 6: Network control) CS7 - DSCP 56 (Class Selector 7) EF - DSCP 46 (Expedited Forwarding) local-priority <LOCAL-PRIORITY-VALUE> Specifies a local priority value. Range: 0 to 7.
Police actions can be the following {cir <RATE-BPS> cbs <BYTES> exceed} where:
cir <RATE-BPS> Specifies a Committed Information Rate value in Kilobits per second. Range: 1 to 4294967295.
cbs <BYTES> Specifies a Committed Burst Size value in bytes. Range: 1 to 4294967295.
exceed Specifies action to take on packets that exceed the rate limit.
Other actions can be the following: drop Specifies drop traffic.

Restrictions
MAC classes are not applicable to policies containing PBR actions. Applying such policies to an interface are blocked.
Usage
n For Policy Based Routing, the policy action keyword is pbr which itself takes the name of a PBR action list as a parameter.
n A policy entry that contains a PBR action can contain other action types as well. n An applied policy processes a packet sequentially against policy entries in the list until the last policy
entry in the list has been evaluated or the packet matches an entry. n Entering an existing <POLICY-NAME> value will cause the existing policy to be modified, with any
new <SEQUENCE-NUMBER> value creating an additional policy entry, and any existing <SEQUENCENUMBER> value replacing the existing policy entry with the same sequence number. n If no sequence number is specified, a new policy entry is appended to the end of the entry list with a sequence number equal to the highest policy entry currently in the list plus 10.
Examples
Create a policy with two PBR actions:

switch(config)# policy pbr_policy switch (config-policy)# 10 class ip v4_class action pbr action_list1 switch (config-policy)# 20 class ipv6 v6_class action pbr action_list2 switch (config-policy)# exit

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

PBR commands | 1813

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

config
The policy command takes you into the config-policy context where you enter the policy entries.

Administrators or local user group members with execution rights for this command.

show pbr
show pbr {interface <INTERFACE-NAME>|vrf <VRF-NAME>|summary}
Description
Shows a detailed view of Policy Based Routing (PBR) in the system.

Parameter <VRF-NAME> <INTERFACE-NAME>

Description Specifies name of a VRF. Specifies an interface. Format: member/slot/port.

Usage
Show commands can only reference the default VRF.
Examples
Showing PBR summary information when there is no active next-hop in the system:

switch# show pbr summary

VRF

Port Policy PBR

Seq Type

Nexthop

--------------------------------------------------------------------

No active PBR nexthop found

--------------------------------------------------------------------

Showing PBR summary information when there are active next-hops in the system:

switch# show pbr summary

VRF

Port Policy PBR

Seq Type

Nexthop

--------------------------------------------------------------------

default 1/1/1 policy_1 pbr_1 10 nexthop 1.1.1.1 (active)

1/1/2 policy_2 pbr_2 20 nexthop 5.5.5.5 (active)

--------------------------------------------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1814

Showing PBR summary information when displaying a policy with a pbr-action-list applied on a VxLAN L3VNI:

switch# configure terminal

switch(config)# interface vxlan 1

switch(config-vxlan-if)# vni 10000

switch(config-vni-10000)# apply policy p1 routed-in

switch(config-vni-10000)# show pbr summary

VRF

Port

Policy

Class

PBR

Sequence Type

Nexthop

-------------------------------------------------------------------------------

red

vni10000

p1

c1

pbr1

10 nexthop

11.2.1.4

(active)

-------------------------------------------------------------------------------

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show pbr-action-list
show pbr-action-list [<ACTION-LIST-NAME>] [commands] [configuration] [vsx-peer]
Description
Shows the current PBR action list configuration. Action list entries are displayed in ascending order of their sequence number.

Parameter <ACTION-LIST-NAME>

Description Specifies the PBR action list name.

PBR commands | 1815

Parameter commands configuration vsx-peer

Description Formats output as CLI commands. Displays user-specified configuration. Displays VSX peer switch information.

Restrictions
If an action list entry is modified to an invalid value (for example through the REST interface), this command will indicate a mismatch for that action entry when run. In this event, use the pbr-action-list <NAME> reset command to restore it to the previous valid value.
Usage
n This command does not indicate whether the action list is configured in a policy or applied to an interface. Use the show pbr command for PBR status involving action lists.
n A single action list is shown by specifying its name or you can show all action lists by omitting a name argument.
n Using the additional commands keyword, you can change the tabulated output to a configuration style output for single or all list display.
Examples
Create two PBR action lists then run show pbr-action-list to display all configured action lists in the default configuration mode:

switch(config)# pbr-action-list v4_pbr switch(config-pbr-action-list-v4_pbr)# 1 nexthop 1.1.1.1 switch(config-pbr-action-list-v4_pbr)# 5 default-nexthop 2.2.2.2 switch(config-pbr-action-list-v4_pbr)# 10 interface null switch(config-pbr-action-list-v4_pbr)# exit switch(config)# switch(config)# pbr-action-list v6_pbr switch(config-pbr-action-list-v6_pbr)# 20 nexthop 2000:abcd::cccc:dddd switch(config-pbr-action-list-v6_pbr)# 40 default-nexthop 1000:abcd::1234:5678 switch(config-pbr-action-list-v6_pbr)# 60 interface null switch(config-pbr-action-list-v6_pbr)# exit switch#

switch# show pbr-action-list

Name

Additional PBR-Action-List Parameters

Sequence

Type

Nexthop

----------------------------------------------------------------------------------

-----

v4_pbr

1

nexthop

1.1.1.1

5

default-nexthop 2.2.2.2

10

interface

null

v6_pbr

20

nexthop

2000:abcd::cccc:dddd

40

default-nexthop 1000:abcd::1234:5678

60

interface

null

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1816

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config current-context
show running-config current-context
Description
Displays the configuration of the PBR action list in the current configuration context, in commands mode.

Parameter running-config current-context

Description Shows configuration currently running on switch. Limits display to current config context only, in commands mode.

Usage
Useful for reexamining entries previously entered into the action list after its entries have scrolled off the terminal due to other output or upon reentering the context of an existing action list.
Examples
Creating two PBR action lists and running show running-configuration curent-context to display the action list configuration in commands mode:

switch(config)# pbr-action-list v4_pbr switch(config-pbr-action-list-v4_pbr)# 1 nexthop 1.1.1.1 switch(config-pbr-action-list-v4_pbr)# 5 default-nexthop 2.2.2.2 switch(config-pbr-action-list-v4_pbr)# 10 interface null switch(config-pbr-action-list-v4_pbr)# exit switch(config)# switch(config)# pbr-action-list v6_pbr switch(config-pbr-action-list-v6_pbr)# 20 nexthop 2000:abcd::cccc:dddd switch(config-pbr-action-list-v6_pbr)# 40 default-nexthop 1000:abcd::1234:5678 switch(config-pbr-action-list-v6_pbr)# 60 interface null switch(config-pbr-action-list-v6_pbr)# switch(config-pbr-action-list-v6_pbr)# show running-config current-context

PBR commands | 1817

pbr-action-list v6_pbr 20 nexthop 2000:abcd::cccc:dddd 40 default-nexthop 1000:abcd::1234:5678 60 interface null
Switching context back to the first actionl ist and running the same command:
switch(config-pbr-action-list-v6_pbr)# pbr-action-list v4_pbr switch(config-pbr-action-list-v4_pbr)# switch(config-pbr-action-list-v4_pbr)# show running-config current-context pbr-action-list v4_pbr
1 nexthop 1.1.1.1 5 default-nexthop 2.2.2.2 10 interface null
Removing action list entry number 5 and running the command again:
switch(config-pbr-action-list-v4_pbr)# no 5 switch(config-pbr-action-list-v4_pbr)# show running-config current-context pbr-action-list v4_pbr
1 nexthop 1.1.1.1 10 interface null

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1818

Chapter 103 PIM-DM commands for IPv4

PIM-DM commands for IPv4
disable
disable
Description
Disables PIM globally on the router. PIM is disabled by default.
Using the disable command will cause all the multicast routes to be erased from hardware.

Example
Disabling PIM router:
switch(config)# router pim switch(config-pim)# disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

enable
enable
Description
Enables PIM globally on the router.
Example

AOS-CX 10.14 Command-Line Interface Guide

1819

Enabling PIM router:
switch(config)# router pim switch(config-pim)# enable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip pim-dense
ip pim-dense {enable|disable} no ip pim-dense [enable]
Description
Enables or disables PIM-DM in the current interface. PIM-DM is disabled by default on an interface. IP address must be configured on the interface to enable PIM-DM.

Parameter enable
disable

Description
Specifies PIM-DM on the interface. IP address must be configured on the interface to enable PIM-DM (use the ip address <A.B.C.D/M> command).
Disables PIM-DM on the interface.

Examples
Enabling and disabling PIM-DM in an interface:

switch(config)# interface vlan40 switch(config-if-vlan)# ip address 40.0.0.4/24 switch(config-if-vlan)# ip pim-dense enable switch(config-if-vlan)# switch(config-if-vlan)# ip pim-dense disable

Enabling and disabling PIM-DM in a sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

PIM-DM commands for IPv4 | 1820

switch(config)# interface 1/1/1.10 switch(config-subif)# ip address 10.0.0.1/24 switch(config-subif)# ip pim-dense enable switch(config-subif)# switch(config-subif)# ip pim-dense disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ip pim-dense bfd
ip pim-dense bfd [disable] no ip pim-dense bfd
Description
Configures BFD on a per-interface basis for an interface associated with the PIM process. The no form of this command removes the BFD configuration on the interface and sets it to the default configuration.
If BFD is enabled globally, it will be enabled by default on all interfaces. The only exception is when it is disabled specifically on an interface using the ip pim-dense bfd disable command. If BFD is disabled globally, it will be disabled by default on all interfaces. The only exception is when it is enabled specifically on an interface using the ip pim-dense bfd command.

Parameter disable

Description Disables the BFD configuration on the interface.

Examples
Enabling the BFD configuration on the interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1821

switch(config)# interface vlan40 switch(config-if-vlan)# ip pim-dense bfd Removing the BFD configuration on the interface: switch(config-if-vlan)# no ip pim-dense bfd Disabling the BFD configuration on the interface and overriding the global setting: switch(config-if-vlan)# ip pim-dense bfd disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip pim-dense graft-retry-interval
ip pim-dense graft-retry-interval <INTERVAL-VALUE> no ip pim-dense graft-retry-interval
Description
Configures the interval for which the routing switch waits for the graft acknowledgment from another router before resending the graft request. The no form of this command removes the currently configured value and sets to the default of 3 seconds.

Parameter <INTERVAL-VALUE>

Description
Specifies the interval the routing switch waits for the graft acknowledgment. Default: 3 seconds. Range: 1-10 seconds.

Usage
Graft packets result when a downstream router transmits a request to join a flow. The upstream router responds with a graft acknowledgment packet. If the graft acknowledgment is not received within the time period of the graft-retry-interval, it resends the graft packet.

PIM-DM commands for IPv4 | 1822

Example
Configuring and removing dense graft retry interval on the interface:
switch(config)# interface vlan40 switch(config-if-vlan)# ip pim-dense graft-retry-interval 5 switch(config-if-vlan)# no ip pim-dense graft-retry-interval
Configuring and removing dense graft retry interval on the sub-interface:
Applies only to the Aruba 6300, 6400, 8100, 8325, 8360 and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# ip pim-dense graft-retry-interval 5 switch(config-subif)# switch(config-subif)# no ip pim-dense graft-retry-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ip pim-dense hello-delay
ip pim-dense hello-delay <DELAY-VALUE> no ip pim-dense hello-delay
Description
Configures the maximum time in seconds before the router actually transmits the initial PIM hello message on the current interface. The no form of this command removes currently configured value and sets to the default of 5 seconds.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1823

Parameter <DELAY-VALUE>

Description
Specifies the hello-delay in seconds, which is the maximum time before a triggered PIM Hello message is transmitted on this interface. Default: 5 seconds. Range: 0-5 seconds.

Usage
In cases where a new interface activates connections with multiple routers, if all the connected routers send hello packets at the same time, the receiving router could become momentarily overloaded. This command randomizes the transmission delay to a time between zero and the hello delay setting. Using zero means no delay. After the router sends the initial hello packet to a newly detected interface, it sends subsequent hello packets according to the current hello interval setting.
Example
Configuring and removing hello-delay on the interface:

switch(config)# interface vlan40 switch(config-if-vlan)# ip pim-dense hello-delay 4 switch(config-if-vlan)# no ip pim-dense hello-delay

Configuring and removing hello-delay on the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360 and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# ip pim-dense hello-delay 4 switch(config-subif)# switch(config-subif)# no ip pim-dense hello-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

PIM-DM commands for IPv4 | 1824

ip pim-dense hello-interval
ip pim-dense hello-interval <INTERVAL-VALUE> no ip pim-dense hello-interval
Description
Configures the frequency at which the router transmits PIM hello messages on the current interface. The no form of this command removes the currently configured value and sets to the default of 30 seconds.

Parameter <INTERVAL-VALUE>

Description
Required: Specifies the frequency at which PIM Hello messages are transmitted on this interface. Default: 30 seconds. Range: 5300 seconds.

Usage
n The router uses hello packets to inform neighbor routers of its presence. n The router also uses this setting to compute the hello holdtime, which is included in hello packets
sent to neighbor routers. n Hello holdtime tells neighbor routers how long to wait for the next hello packet from the router. If
another packet does not arrive within that time, the router removes the neighbor adjacency on that interface from the PIM adjacency table, which removes any flows running on that interface. n Shortening the hello interval reduces the hello holdtime. If they do not receive a new hello packet when expected, it changes how quickly other routers stop sending traffic to the router.
Example
Configuring and removing dense hello-interval:

switch(config)# interface 1/1/4 switch(config-if)# ip pim-dense hello-interval 60 switch(config-if)# no ip pim-dense hello-interval

Configuring and removing dense hello-interval on the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config-subif)# interface 1/1/10.10 switch(config-subif)# ip pim-dense hello-interval 60 switch(config-subif)# switch(config-subif)# no ip pim-dense hello-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1825

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip pim-dense ip-addr
ip pim-dense ip-addr {<IP-ADDR-VALUE> | any} no ip pim-dense ip-addr
Description
Enables the router to dynamically determine the source IP address to use for PIM packets sent from the interface or to use the specific IP address. The no form of this command removes the currently configured value and sets to the default of any.

Parameter <IP-ADDR-VALUE> any

Description
Specifies an IP address as the source IP for the interface.
Specifies dynamically determining the source IP from the current IP address of the interface.

Examples
Configuring and removing source IP address:

switch(config)# interface vlan40 switch(config-if-vlan)# ip pim-dense ip-addr 40.0.0.4 switch(config-if-vlan)# no ip pim-dense ip-addr

Configuring and removing source IP address on the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360 and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# ip pim-dense ip-addr 10.1.1.1 switch(config-subif)# switch(config-subif)# no ip pim-dense ip-addr

For more information on features that use this command, refer to the Multicast Guide for your switch model.

PIM-DM commands for IPv4 | 1826

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip pim-dense lan-prune-delay
ip pim-dense lan-prune-delay no ip pim-dense lan-prune-delay
Description
Enables the LAN prune delay option on the current interface. The default status is enabled. The no form of this command disables the LAN prune delay option.
Usage
With LAN-prune-delay enabled, the router informs downstream neighbors how long it will wait before pruning a flow after receiving a prune request. Other downstream routers on the same interface must send a join to override the prune before the LAN-prune-delay time to continue the flow. Prompts any downstream neighbors with multicast receivers continuing to belong to the flow to reply with a join. If no joins are received after the LAN-prune-delay period, the router prunes the flow. The propagationdelay and override-interval settings determine the LAN-prune-delay setting.
Example
Enabling and disabling the LAN prune delay:
switch(config)# interface vlan40 switch(config-if-vlan)# ip pim-dense lan-prune-delay switch(config-if-vlan)# no ip pim-dense lan-prune-delay
Enabling and disabling the LAN prune delay on the sub-interface:
Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# ip pim-dense lan-prune-delay switch(config-subif)# no ip pim-dense lan-prune-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1827

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip pim-dense max-graft-retries
ip pim-dense max-graft-retries <ATTEMPT-VALUE> no ip pim-dense max-graft-retries
Description
Configures the number of attempts the routing switch will retry sending the same graft packet to join a flow. The no form of this command removes the currently configured value and sets to the default of 3 attempts.

Parameter <INTERVAL-VALUE>

Description
Specifies the number of retries for the routing switch to resend the graft packet. Default: 3 attempts. Range: 1-10 attempts.

Usage
If a graft acknowledgment response is not received after the specified number of retries, the routing switch ceases trying to join the flow. In this case the flow is removed until either a state-refresh from upstream re-initiates the flow or an upstream router floods the flow. Increasing this value helps to improve multicast reliability.
Example
Configuring and removing dense graft retry interval:

switch(config)# interface vlan40 switch(config-if-vlan)# ip pim-dense max-graft-retries 6 switch(config-if-vlan)# no ip pim-dense max-graft-retries

Configuring and removing dense graft retry interval on the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360 and 10000 Switch Series.

PIM-DM commands for IPv4 | 1828

switch(config)# interface 1/1/1.10 switch(config-subif)# ip pim-dense max-graft-retries 6 switch(config-subif)# switch(config-subif)# no ip pim-dense max-graft-retries

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ip pim-dense override-interval
ip pim-dense override-interval <INTERVAL-VALUE> no ip pim-dense override-interval
Description
Configures the override interval that gets inserted into the Override Interval field of a LAN Prune Delay option. The no form of this command removes the currently configured value and sets the value to the default of 2500 ms.

Parameter <INTERVAL-VALUE>

Description
Specifies the override interval of a LAN Prune Delay option in ms. Default: 2500 ms. Range: 500-6000.

Usage
Each router on the LAN expresses its view of the amount of randomization necessary in the Override Interval field of the LAN Prune Delay option. When all routers on a LAN use the LAN Prune Delay Option, all routers on the LAN MUST set their Override_Interval to the largest Override value on the LAN.
Example
Configuring and removing the override interval:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1829

switch(config)# interface vlan40 switch(config-if-vlan)# ip pim-dense override-interval 4000 switch(config-if-vlan)# no ip pim-dense override-interval
Configuring and removing the override interval on the sub-interface:
Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# ip pim-dense override-interval 4000 switch(config-subif)# no ip pim-dense override-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ip pim-dense propagation-delay
ip pim-dense propagation-delay <DELAY-VALUE> no ip pim-dense propagation-delay
Description
Configures the propagation delay that gets inserted into the LAN prune delay field of a LAN Prune Delay option. The no form of this command removes currently configured value and sets to the default of 500 ms.

Parameter <DELAY-VALUE>

Description
Specifies the propagation delay value in ms. Default: 500 ms. Range: 250-2000 ms.

Usage

PIM-DM commands for IPv4 | 1830

The LAN Delay inserted by a router in the LAN Prune Delay option expresses the expected message propagation delay on the link. When all routers on a link use the LAN Prune Delay Option, all routers on the LAN MUST set Propagation Delay to the largest LAN Delay on the LAN.
Examples
Configuring and removing the propagation delay:
switch(config)# interface vlan40 switch(config-if-vlan)# ip pim-dense propagation-delay 400 switch(config-if-vlan)# no ip pim-dense propagation-delay
Configuring and removing the propagation delay on the sub-interface:
Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# ip pim-dense propagation-delay 400 switch(config-subif)# no ip pim-dense propagation-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip pim-dense ttl-threshold
ip pim-dense ttl-threshold <THRESHOLD-VALUE> no ip pim-dense ttl-threshold
Description
Configures the multicast datagram time-to-live (router hop-count) threshold for the interface. A staterefresh packet with a TTL less than this threshold will not be forwarded out the interface. The no form of this command removes the currently configured value and sets to the default of 3 attempts.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1831

Parameter <THRESHOLD-VALUE>

Description
Specifies the time to live threshold. Default: 3 attempts. Range: 0255.

Usage
The interface connected to the multicast source does not receive state refresh packets and thus is not state-refresh capable. Downstream VLANs in the switches are state-refresh capable. This parameter provides a method for containing multicast traffic within a network, or even within specific areas of a network. Initially, the multicast traffic source sets a TTL value in the packets it transmits. Each time one of these packets passes through a multicast routing device, the TTL setting decrements by 1. If the packet arrives with a TTL lower than the ttl-threshold, the routing switch does not forward the packet. The following aspects of the TTL setting of incoming multicast packets must be considered, before changing this parameter on a routing switch:
n A value that is too high will allow multicast traffic to go beyond the internal network. n A value that is too low may prevent some intended hosts from receiving the desired multicast traffic. n A value of 0 will forward multicast traffic regardless of the packet TTL setting.
Example
Configuring and removing the time-to-live threshold:

switch(config)# interface vlan40 switch(config-if-vlan)# ip pim-dense ttl-threshold 8 switch(config-if-vlan)# no ip pim-dense ttl-threshold

Configuring and removing the time-to-live threshold on the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# ip pim-dense ttl-threshold 8 switch(config-subif)# switch(config-subif)# no ip pim-dense ttl-threshold

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

PIM-DM commands for IPv4 | 1832

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Authority
Administrators or local user group members with execution rights for this command.

router pim
router pim [vrf <VRF-NAME>] accept-register access-list <ACL-RULE> accept-rp <IP-ADDR> access-list <ACL-RULE> active-active bfd all-interfaces bsr-candidate {bsm-interval <INTERVAL-VALUE> | {hash-mask-length <LENGTH-VALUE> | priority <PRIORITY-VALUE> | source-ip-interface <INTERFACE-NAME>} enable|disable join-prune-interval <INTERVAL-VALUE> multicast-route-limit <limit> no ... register-rate-limit <limit> rp-address <IP-ADDR> [<GRP-ADDR/GRP-MASK>] [override] rp-candidate {group-prefix <GRP-ADDR/GRP-MASK> |hold-time <TIME-VALUE> | priority <PRIORITY-VALUE> | source-ip-interface <INTERFACE-NAME> [group-prefix <GRP-ADDR/GRPMASK>]} rpf-override <SRC-ADDR/SRC-MASK><RPF-ADDR|INTERFACE-NAME>
Description
Changes the current context to the PIM configuration context and enables PIM globally on the router. If no VRF is specified, the default VRF is assumed.
The no form of this command removes the PIM configuration from the specified context or the default VRF.

Parameter vrf <VRF-NAME> accept-register access-list <ACL-RULE>
accept-rp <IP-ADDR> access-list <ACL-RULE>

Description
Specifies the name of a VRF.
Specify an ACL rule name to configures ACL on RP to filter PIM Register packets from unauthorized sources. The ACL specified will contain the (S,G) traffic in register packets to permitted or denied.
Specify the IPv4 address of the static RP and ACL rule name to enable the PIM router to filter PIM join/prune messages destined for a specific RP and specific groups. The ACL specifies the group addresses which are allowed or denied. Up to 8 RP addresses and group ACL can be associated with the PIM router. PIM will store the accepted RP address and the associated group ACL. When a join or prune message is received, a RP look up is made for the packet. If the RP is in the configured list and if the group in the join/prune packet is allowed in the ACL, the packet is allowed. Otherwise the packet is dropped.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1833

Parameter
active-active
bfd all-interfaces bsr-candidate
bsm-interval <INTERVAL-VALUE> hash-mask-length <LENGTH-VALUE>

Description
To allow join/prune message from any groups, group address in the ACL can be wild-carded. In this case, only RP address check is performed. This parameter impacts only (*,G) join/prune messages. If there are any existing flows, the user will need to disable and enable PIM on the interface to apply the ACL. Loopback interfaces are special interfaces where only unicast PIM messages are updated. This includes Register, Register Stop, and Candidate RP Advertisements. When a loopback interface is configured as the RP, the ACL drop counters will be updated on the interface on which the packets are received.
NOTE: If there is an active flow which is in the SPT, the traffic flow through the SPT will continue. Only (*,G) join/prune messages are dropped. (S,G) join/prune messages will not be impacted.
Enables the PIM active-active mechanism per VRF on VSX. The default is disabled. PIM active-active keeps the multicast forwarding state synchronized on both VSX peer devices. Synchronization is achieved by electing the VSX peer that has the highest IP address as a designated router (DR) and the other as Proxy-DR. If you want the multicast traffic to flow through VSX primary, assign higher IP addresses to the interfaces in VSX primary. When the VSX peer that is acting as the DR goes down, traffic is recovered faster since the multicast routes are synchronized.
Enables BFD on all PIM interfaces. BFD can be disabled at individual PIM interface using the ip pim-sparse bfd disable command.
Configure settings for a router that operates as the BSR in a domain.
Configures the interval in seconds to send periodic RP-Set messages to all PIM-SM interfaces on a router that operates as the BSR in a domain. This setting must be smaller than the rp-candidate hold-time settings (range of 30 to 255; default 150) configured in the RPs operating in the domain. Default: 60 seconds. Range: 5-300.
Controls the distribution of multicast groups among the C-RP, in a domain where there is overlapping coverage of the groups among the RPs. This value specifies the length (number of significant bits) when allocating this distribution. A longer hashmask-length results in fewer multicast groups, for each block of group addresses assigned to the RPs. Multiple blocks of addresses assigned to each C-RP results in wider dispersal of addresses. Includes

PIM-DM commands for IPv4 | 1834

Parameter priority <PRIORITY-VALUE>
source-ip-interface <INTERFACE-NAME>
enable|disable join-prune-interval <INTERVAL-VALUE> multicast-route-limit <limit>

Description
enhanced load-sharing for the multicast traffic for the different groups that are used in the domain at the same time. Default: 30 bits. Range: 1-32.
Configures the priority to apply to the router when a BSR election process occurs in the PIM-SM domain. The candidate with the highest priority becomes the BSR for the domain. If the highest priority is shared by multiple routers, the candidate having the highest IP address becomes the BSR of the domain. Zero (0) is the lowest priority. To make BSR selection easily predictable, use this command to assign a different priority to each candidate BSR in the PIMSM domain. Default: 0. Range: 0-255
Configures the router to advertise itself as a candidate PIM-SM BSR on the interface specified, and enables BSR candidate operation. The result makes the router eligible to be elected as the BSR for the PIM-SM domain in which it operates. One BSR candidate interface is allowed per-router. The Interface can be a VLAN interface (such as vlan15) or routed interfaces (such as lag 1 or 1 / 1 / 19). PIMSM must be enabled on this interface (use the ip pim-sparse enable command).
Enables or disables PIM globally on the router.
Configures the frequency at which the router will send periodic join or prune-interval messages. Range 5 to 65535 Default: 60.
Configures the limit on the maximum number of multicast route entries that can be programmed. When the limit is configured, multicast route entries created because of IGMP or MLD membership reports, and multicast route entries created because of multicast streams are restricted to the configured limit. Flows exceeding the configured multicast route limit will be programmed as a bridge entry and will not have the outgoing interfaces list populated. This configuration prevents creation of new multicast routes when limits are reached. At the time of configuration, if the device has more multicast routes than the configured limit, existing multicast routes continue to exist until they are removed. The flows are programmed in the HW on a FCFS basis. There could be scenarios where the flow is forwarded in neighbor router, but it may not be forwarded on the current router because of exceeding the limits configured on the current router. In such cases, it is recommended to configure higher limits to avoid traffic outage. Range: 1 to 4294967295.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1835

Parameter no... register-rate-limit <limit>
rp-address
<IP-ADDR> <GRP-ADDR/GRP-MASK> override rp-candidate group-prefix <GRP-ADDR/GRP-MASK> hold-time <TIME-VALUE>
priority <PRIORITY-VALUE>

Description
Negates any configured parameter.
Configures the limit on the maximum number of register messages sent per second for every unique (S,G) entry. By default, there is no maximum rate set. When the limit is configured, register messages generation is limited to the configured value. Range: 1 to 4294967295.
Statically configures the router as the RP for a specified multicast group or range of multicast groups. When a static RP and a C-RP are configured to support the same multicast groups and the multicast group mask for the static RP is equal to or greater than the same mask for the applicable CRPs, this command assigns the higher precedence to the static RP, resulting in the C-RP operating only as a backup RP for the configured group. Without override, the C-RP has precedence over a static RP configured for the same multicast group or groups. This must be configured on all PIM-SM routers in the domain. If group address is not specified, it applies to all IPv4 multicast addresses (224.0.0.0 239.255.255.255). PIM-SM supports a maximum of 8 static RPs per VRF.
Specifies the address of the static RP in IPv4 format (x.x.x.x).
Specifies the multicast group address in IPv4 format (x.x.x.x) and the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies higher precedence to static RP over Candidate RP.
Configure Candidate Rendezvous Point (C-RP) settings.
Adds multicast group address to the current Candidate Rendezvous Point (C-RP) configuration by specifying the the multicast group address in IPv4 format (x.x.x.x) and the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Changes the hold-time a C-RP includes in its advertisements to the BSR. Hold-time is included in the advertisements the CRP periodically sends to the elected BSR for the domain. Also updates the BSR on how long to wait after the last advertisement from the reporting RP before assuming it has become unavailable. Range: 30 to 250. Default: 150.
Changes the current priority setting for a C-RP. Where multiple C-RP configurations are used to support the same multicast groups, the candidate

PIM-DM commands for IPv4 | 1836

Parameter source-ip-interface
<INTERFACE-NAME> group-prefix <GRP-ADDR/GRP-MASK> rpf-override
<SRC-ADDR/SRC-MASK> <RPF-ADDR|INTERFACE-NAME>

Description
having the highest priority is elected. Zero (0) is the highest priority, and 255 is the lowest priority. Range: 0 to 255. Default: 192.
Enables the Candidate Rendezvous Point (C-RP) operation, and configures the router to advertise itself as a C-RP to the Bootstrap Router (BSR) for the current domain. This step includes the option to allow the C-RP to be a candidate for all possible multicast groups, or for up to four multicast groups, or ranges of groups. If group-prefix is not given, it considers for all multicast group addresses.
Specifies the interface to use as a source for the CRP router IP address.
Specifies the multicast group address in IPv4 format (x.x.x.x) and the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
The Reverse Path Forward (RPF) override allows overriding the normal RPF lookup mechanism, and indicates to the router that it may accept multicast traffic on an interface other than the one that the RPF lookup mechanism would normally select. This includes accepting traffic from an invalid source IP address for the subnet or VLAN that is directly connected to the router. Traffic may also be accepted from a valid PIM neighbor that is not on the reverse path towards the source of the received multicast traffic.
Specifies the multicast source IPv4 address in IPv4 format (x.x.x.x) and the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the RPF override IP address or interface.

Usage
When a register ACL is associated with a PIM Router, the PIM protocol will store the source and destination address details along with the action (permit or deny). If there are any existing flows, the user will need to disable and enable PIM on the interface to apply the ACL.
Upon receiving the register messages, a look up is made to check if the S and G in the packet is in the permitted list. If there is no match or if there is a deny rule match, a register stop message is immediately sent and the packet is dropped and no further action is taken. Permitted packets will go through the normal flow.
Loopback interfaces are special interfaces where only unicast PIM messages are updated. This includes Register, Register Stop, and Candidate RP Advertisements.
When a loopback interface is configured as the RP, the ACL drop counters will be updated on the interface on which the packets are received.
Recommendations for the active-active mechanism:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1837

n Do not configure the DR priority of interfaces when active-active is enabled. The DR priority will be set to high on DR and default on Proxy-DR and any user-configured DR priority will be ignored.
n Always configure keepalive between VSX peers. If the ISL goes down when keepalive is not configured, both VSX peers start acting independently as DRs, resulting in duplicate traffic.
n Do not configure IGMP joins on transit VLANS. n RP redundancy is not supported on the active-active mechanism. If one of the VSX peers is
configured as RP and it goes down, the new traffic flows will not be converged until the RP is elected. For a static RP, new flows will never be converged until the VSX peer is back up.
Reverse Path Forward (RPF) override usage details:
n Reverse Path Forward (RPF) checking is a core multicast routing mechanism. The RPF ensures that the multicast traffic received arrives on the expected router interface before further processing. If the RPF check fails for a multicast packet, the packet is discarded. For multicast traffic flow that arrives on the SPT, the expected incoming interface for a given source or group is the interface towards the source address of the traffic (determined by the unicast routing system). For traffic arriving on the RP tree, the expected incoming interface is the interface towards the RP.
n RPF checking is applied to all multicast traffic and is significant in preventing network loops. Up to eight manual RPF overrides can be specified. The RPF-address indicates one of two distinct RPF candidates: 1. A valid PIM neighbor address from which forwarded multicast traffic is accepted with a source address of <source-addr/src-mask>. 2. A local router address on a PIM-enabled interface to which <source-addr/src-mask> is directly connected. If configured, the local router will assume the role of DR for this flow and registers the flow with an RP.
Examples
Configuring and enabling default router PIM:
switch(config)# router pim switch(config-pim)#enable
Configuring specified router PIM:
switch(config)# router pim vrf green switch(config-pim)#
Configuring ACL on RP with an ACL rule named pim_reg_acl:
switch(config)# access-list ip pim_reg_acl switch(config-acl-ip)# 10 permit any 20.1.1.1 225.1.1.2 switch(config-acl-ip)# 20 deny any 30.1.1.1 225.1.1.3 switch(config)# router pim switch(config-pim)# accept-register acces
Configuring ACL on a RP with an ACL rule named pim_rp_grp_acl to filter join/prune messages:
switch(config)# access-list ip pim_rp_grp_acl switch(config-acl-ip)# 10 permit any any 225.1.1.2/255.255.255.0
PIM-DM commands for IPv4 | 1838

switch(config-acl-ip)# 20 permit any any 239.1.1.2/255.255.255.0 switch(config)-acl-ip# router pim switch(config-pim)# accept-rp 30.1
On the 6400 Switch Series, interface identification differs. Configuring and removing the BSR-candidate interface:
switch(config)# router pim switch(config-pim)# bsr-candidate source-ip-interface 1/1/4 switch(config-pim)# bsr-candidate source-ip-interface vlan5 switch(config-pim)# no rp-candidate source-ip-interface 1/1/4
Configuring and removing sub-interface 1/1/4.10 as the BSR-candidate:
Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# router pim switch(config-pim)# bsr-candidate source-ip-interface 1/1/4.10 switch(config-pim)# switch(config-pim)# no rp-candidate source-ip-interface 1/1/4.10
Configuring and removing the multicast route rate limit:
switch(config)# router pim switch(config-pim)# multicast-route-limit 1024 switch(config-pim)# no multicast-route-limit
Configuring and removing the register rate limit:
switch(config)# router pim switch(config-pim)# register-rate-limit 10 switch(config-pim)# no register-rate-limit
Configuring and removing candidate-RP router priority and hold times
switch(config)# router pim switch(config-pim)# rp-candidate priority 250 switch(config-pim)# rp-candidate hold-time 200

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1839

Command Information

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

show ip mroute
show ip mroute [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows multicast routing information. Optionally, you can show specific information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME>
vsx-peer

Description
Shows mroute information for all VRFs. Optional.
Shows mroute information for a particular VRF. If the <VRFNAME> is not specified, it shows information for the default VRF. Optional.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing IP mroute for all VRFs:

switch# show ip mroute all-vrfs VRF : blue Total number of entries : 1

Group Address

Source Address

Incoming interface

Downstream Interface

Interface State

--------- -----

vlan2

forwarding

: 239.1.1.1 : 40.0.0.5 : vlan3

VRF : green Total number of entries : 2

Group Address

Source Address

Neighbor

Incoming interface

Downstream Interface

Interface State

--------- -----

vlan5

forwarding

: 239.1.1.1 : 40.0.0.4 : 10.1.1.1 : vlan2

Group Address

: 239.1.1.1

PIM-DM commands for IPv4 | 1840

Source Address

Neighbor

Incoming interface

Downstream Interface

Interface State

--------- -----

vlan6

forwarding

: 40.0.0.5 : 10.1.1.2 : vlan1

VRF : default Total number of entries : 1

Group Address

Source Address

Neighbor

Incoming interface

Downstream Interface

Interface State

--------- -----

1/1/3

forwarding

: 10.1.1.14 : 40.0.0.6 : 10.1.1.2 : 1/1/5

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip mroute group-addr
show ip mroute <GROUP-ADDR> [<SOURCE-ADDR>] [all-vrfs | vrf <vrf-name>] [vsx-peer]
Description
Shows the multicast routing information for the given group address. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter <GROUP-ADDR>
<SOURCE-ADDR>

Description
Specifies a group address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies show information for the group from this source in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1841

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows mroute information for the group for all VRFs.
Specifies the name of a VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing information for group 239.1.1.1 and VRF green:

switch# show ip mroute 239.1.1.1 vrf green

VRF : green

Group Address

Source Address

Neighbor

Incoming interface

Unicast Routing Protocol

Metric

Metric Pref

Downstream Interface

Interface State

--------- -----

vlan6

forwarding

: 239.1.1.1 : 40.0.0.5 : 10.1.1.2 : vlan1 : connected : 1234 : 1234

Showing information for group 239.1.1.1 from source 40.0.0.5 and all VRFs:

switch# show ip mroute 239.1.1.1 40.0.0.5 all-vrfs

VRF : blue

Group Address

Source Address

Incoming interface

Unicast Routing Protocol

Metric

Metric Pref

Downstream Interface

Interface State

--------- -----

vlan2

forwarding

: 239.1.1.1 : 40.0.0.5 : vlan3 : connected : 1234 : 1234

VRF : green
Group Address Source Address Neighbor Incoming interface Unicast Routing Protocol Metric Metric Pref Downstream Interface

: 239.1.1.1 : 40.0.0.5 : 10.1.1.2 : vlan1 : connected : 1234 : 1234

PIM-DM commands for IPv4 | 1842

Interface --------vlan6

State ----forwarding

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip mroute brief
show ip mroute brief [al-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows brief version of the multicast routing information. Optionally, you can specify the display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows mroute information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing the IP mroute brief:

switch# show ip mroute brief VRF : default Total number of entries : 1

Group Address ------------239.1.1.1

Source Address -------------40.0.0.6

Neighbor -------10.1.1.2

Interface --------vlan5

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1843

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim
show ip pim [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the PIM router information. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME>
vsx-peer

Description
Optional. Shows PIM router information on all VRFs.
Optional. Shows PIM router information for a particular VRF. If the <VRF-NAME> is not specified, it shows information for the default VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing IP PIM router:

switch# show ip pim

PIM Global Parameters

VRF

:

PIM Status

:

Join/Prune Interval (sec) :

SPT Threshold

:

State Refresh Interval (sec) :

default Enabled 60 Enabled 60

PIM-DM commands for IPv4 | 1844

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim interface
show ip pim interface [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the information about PIM interfaces currently configured in the router. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME>
vsx-peer

Description
(Optional) Shows PIM interface information for all VRFs.
(Optional) Shows PIM interface information for a particular VRF. If the <VRF-NAME> is not specified, it shows the default VRF information.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM interface for the 6200, 6300, 6400,8100, 8325, 8360, 9300, 10000 switch series:

switch# show ip pim interface

PIM Interfaces

VRF: default Total Number of interfaces: 1

Interface Neighbor count IP Address

: vlan10 :0 : 100.100.1.2/24

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1845

Mode

: bidir

Proxy DF

: false

Hello Interval(sec)

: 30

Hello Delay(sec)

:5

Override Interval(msec) : 2500

Lan Prune Delay

: Yes

Propagation Delay (msec): 500

Neighbor Timeout

:0

PIM Interfaces

VRF: default

Interface

IP Address

------------------ -----------------

1/1/1

40.0.0.4/24

1/1/2

50.0.0.4/24

mode ---------sparse sparse

Showing PIM interface: For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13
10.07 or earlier

Modification
Added support for BIDIR PIM on the , 6300, 6400,, , , , switch series.
--

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim interface interface-name
show ip pim interface <INTERFACE-NAME> [vsx-peer]
Description
Shows detailed information about the PIM interface currently configured.

Parameter <INTERFACE-NAME>
vsx-peer

Description
Specifies an interface for showing PIM interface information. Interface can also be a LAG or VLAN.
Shows the output from the VSX peer switch. If the switches do not

PIM-DM commands for IPv4 | 1846

Parameter

Description
have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM interface information for interface 1/1/2:

switch# show ip pim interface 1/1/2

PIM Interfaces

VRF: default

Interface : 1/1/2

IP Address : 50.0.0.4/24

Mode

: dense

Designated Router :

Hello Interval (sec)

: 30

Hello Delay (sec)

:5

Graft Retry Interval(sec) : 3

Max Graft Retries

:5

SR TTL Threshold

:8

Override Interval (msec) : 2500

Propagation Delay (msec) : 500

Neighbor Timeout

: 105

Lan Prune Delay DR Priority

: Yes :1

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim interface interface-name counters
show ip pim interface <INTERFACE-NAME> counters [vsx-peer]
Description
Shows the PIM packet counters information for the specified interface.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1847

Parameter <INTERFACE-NAME> vsx-peer

Description
Specifies the interface to show packet counter information.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM packet counters:

switch# show ip pim interface vlan1 counters

Interface

: vlan1

VRF

: default

Rx

--------

Hello

21

BSM

12

Register

0

SSM Register

5

Register Stop

0

SSM Register Stop

0

Join/Prune

0

SSM Join/Prune

2

C-RP Advertisement

0

Graft

0

Graft Ack

0

Assert

0

State Refresh

0

Register Drops(Register ACL hitcount) 0

Join/Prune Drops(RP ACL hitcount)

0

Unknown Multicast

0

Tx --------
21 10 0 0 0 5 0 2 0 0 0 0 0 0 0 0

Drops --------
0 0 0 0 0 0 0 0 0 0 0 0 0 4 7 0

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim rpf
show ip pim rpf [<IP-ADDRESS>][all-vrfs | vrf <VRF-NAME>] [vsx-peer]

PIM-DM commands for IPv4 | 1848

Description
Displays PIM RPF details for the specified source or RP address in the given VRF and shows the nexthop and interface through which the shortest path to the source is available. It also displays if a PIM neighbor is present on the nexthop. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter <IP-ADDRESS>
all-vrfs vrf <VRF-NAME>
vsx-peer

Description
(Optional) Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. Shows PIM RPF details for the given IP address.
(Optional) Shows PIM interface information for all VRFs.
(Optional) Shows PIM interface information for a particular VRF. If the <VRF-NAME> is not specified, it shows the default VRF information.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing PIM RPF information for the default VRF:

switch# show ip pim rpf

Multicast RPF Details

Origin Codes: C - connected, SM - static-multicast, SU - static-unicast

O - OSPF, B - BGP, R - RIP

VRF: default

IP Address

RPF Interface RPF Nexthop PIM Neighbor RPF Route/Mask

Origin In Use

--------------- ------------- ------------ ------------ ---------------

- ---

1.1.1.1

vlan10

10.1.1.1

yes

1.1.1.1/32

yes

10.1.1.1

vlan10

no

10.1.1.0/24

yes

10.1.1.2

vlan10

no

10.1.1.2/32

yes

----O C C

Showing PIM RPF information for the specified IP address:

switch# show ip pim rpf 1.1.1.1 Multicast RPF Details Origin Codes: C - connected, SM - static-multicast, SU - static-unicast O - OSPF, B - BGP, R - RIP
VRF: default IP Address RPF Interface RPF Nexthop PIM Neighbor RPF Route/Mask Origin In Use ----------- ------------- ----------- ------------ ---------------- ------ -----

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1849

1.1.1.1 yes

vlan10

10.1.1.1

yes

1.1.1.1/32

O

Showing PIM RPF information for all VRFs:

switch# show ip pim rpf all-vrfs Multicast RPF Details Origin Codes: C - connected, SM - static-multicast, SU - static-unicast O - OSPF, B - BGP, R - RIP

VRF: default

IP Address RPF Interface RPF Nexthop PIM Neighbor RPF Route/Mask Origin In

Use

----------- ------------- ------------ ------------ -------------- ---- --

--

1.1.1.1

vlan10

10.1.1.1

yes

1.1.1.1/32

O

yes

10.1.1.1

vlan10

no

10.1.1.0/24

C

yes

10.1.1.2

vlan10

no

10.1.1.2/32

C

yes

VRF: red

IP Address RPF Interface RPF Nexthop PIM Neighbor RPF Route/Mask Origin In

Use

----------- ------------- ------------ ------------ -------------- ------ --

----

2.2.2.2

vlan20

20.0.0.1

yes

2.2.2.2/32

SU

yes

20.0.0.1

vlan20

no

20.0.0.0/24

C

yes

20.0.0.2

vlan20

no

20.0.0.2/32

C

yes

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.09.1000

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim neighbor
show ip pim neighbor [<IP-ADDRESS>] [brief | all-vrfs | vrf <VRF-NAME>] [vsx-peer]

PIM-DM commands for IPv4 | 1850

Description
Shows PIM neighbor information. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter <IP-ADDRESS> brief all-vrfs vrf <VRF-NAME> vsx-peer

Description
Specifies an IP address.
Specifies PIM neighbor information display in brief format.
Selects all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM neighbor information for the , 6300, 6400,, , , , switch series.:

switch# show ip pim neighbor

PIM Neighbor

VRF

: default

Total number of neighbors : 1

IP Address Interface Up Time (HH:MM:SS) Expire Time (HH:MM:SS) DR Priority Hold Time (HH:MM:SS) Bidir Capable

: 30.1.1.3 : vlan30 : 03:55:40 : 00:01:23 : NA : 00:01:45 : True

Showing PIM neighbor information in brief for the default VRF:

switch# show ip pim neighbor brief

----------------------------------------------------------------------------------

-

VRF: default

Total number of neighbor : 2

----------------------------------------------------------------------------------

-

Interface Neighbor Uptime

Expires DR

Hold Time Secondary

Address

(IPV4) (HH:MM:SS) (HH:MM:SS) Priority (HH:MM:SS) (IPV4)

---------- -------- --------- --------- ------ --------- ----------------

-

29091/1/1 40.0.0.5 11:54:21 00:01:31 NA

00:01:45 Nil

29101/1/2 50.0.0.5 00:03:23 00:01:23 NA

00:01:45

60.0.0.4,70.0.0.4

----------------------------------------------------------------------------------

-

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1851

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13
10.07 or earlier

Modification
Added support for BIDIR PIM on the , 6300, 6400,, , , , switch series.
--

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

state-refresh-interval
state-refresh <INTERVAL-VALUE> no state-refresh
Description
Configures the interval between successive state-refresh messages originated by the routing switch. Only the routing switch connected directly to the multicast source initiates state-refresh packets. All other PIM routers in the network only propagate these state-refresh packets. The no form of this command sets the interval to the default value of 60 seconds.

Parameter <INTERVAL-VALUE>

Description
Specifies the state refresh interval in seconds. Default: 60 seconds. Range 10-100.

Examples
Configuring the state refresh interval:

switch(config)# router pim switch(config-pim)# state-refresh 30 switch(config-pim)# no state-refresh

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

PIM-DM commands for IPv4 | 1852

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1853

Chapter 104 PIM-DM commands for IPv6

PIM-DM commands for IPv6
disable
disable
Description
Disables PIMv6 globally on the router.
Using the disable command will cause all the multicast routes to be erased from hardware.

Example
Disabling PIM router:
switch(config)# router pim6 switch(config-pim6)# disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

enable
enable
Description
Enables PIMv6 globally on the router.
Example

AOS-CX 10.14 Command-Line Interface Guide

1854

Enabling PIM router:
switch(config)# router pim6 switch(config-pim6)# enable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-dense
ipv6 pim6-dense {enable | disable} no ipv6 pim6-dense [enable]
Description
Enables or disables PIM-DM on the current interface. PIM-DM is disabled by default on an interface. An IPv6 address must be configured on the interface to enable PIM-DM.

Parameter enable
disable

Description
Enables PIM-DM on the interface. IPv6 address must be configured on the interface to enable PIM-SM (use the ipv6 address <X:X::X:X/M> command).
Disables PIM-DM on the interface.

Examples
Enabling and disabling PIM-DM on an interface:

switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 address 2001::01/64 switch(config-if-vlan)# ipv6 pim6-dense enable switch(config-if-vlan)# ipv6 pim6-dense disable

Enabling and disabling PIM-DM on a sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

PIM-DM commands for IPv6 | 1855

switch(config)# interface 1/1/1.10 switch(config-subif)# ipv6 address 1001::01/64 switch(config-subif)# ipv6 pim6-dense enable switch(config-subif)# ipv6 pim6-dense disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-dense bfd
ipv6 pim6-dense bfd [disable] no ipv6 pim6-dense bfd
Description
Configures BFD on a per-interface basis for an interface associated with the PIM process. The no form of this command removes the BFD configuration on the interface and sets it to the default configuration.
If BFD is enabled globally, it will be enabled by default on all interfaces. The only exception is when it is disabled specifically on an interface using the ipv6 pim6-dense bfd disable command. If BFD is disabled globally, it will be disabled by default on all interfaces. The only exception is when it is enabled specifically on an interface using the ipv6 pim6-dense bfd command.

Parameter disable

Description Disables the BFD configuration on the interface.

Examples
Enabling the BFD configuration on the interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1856

switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 pim6-dense bfd Disabling the BFD configuration on the interface: switch(config-if-vlan)# ipv6 pim6-dense bfd disable Removing the BFD configuration on the interface: switch(config-if-vlan)# no ipv6 pim6-dense bfd

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-dense graft-retry-interval
ipv6 pim6-dense graft-retry-interval <INTERVAL-VALUE> no ipv6 pim6-dense graft-retry-interval
Description
Configures the interval for which the routing switch waits for the graft acknowledgment from another router before resending the graft request. The no form of this command removes the currently configured value and sets to the default of 3 seconds.

Parameter <INTERVAL-VALUE>

Description
Specifies the interval the routing switch waits for the graft acknowledgment. Default: 3 seconds. Range: 1-10.

Usage
Graft packets result when a downstream router transmits a request to join a flow. The upstream router responds with a graft acknowledgment packet. If the graft acknowledgment is not received within the time period of the graft-retry-interval, it resends the graft packet.

PIM-DM commands for IPv6 | 1857

Example
Configuring and removing dense graft retry interval:
switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 pim6-dense graft-retry-interval 5 switch(config-if-vlan)# no ipv6 pim6-dense graft-retry-interval
Configuring and removing dense graft retry interval on the sub-interface:
Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# ipv6 pim6-dense graft-retry-interval 5 switch(config-subif)# switch(config-subif)# no ipv6 pim6-dense graft-retry-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-dense hello-delay
ipv6 pim6-dense hello-delay <DELAY-VALUE> no ipv6 pim6-dense hello-delay
Description
Configures the maximum time in seconds before the router actually transmits the initial PIM hello message on the current interface. The no form of this command removes currently configured value and sets to the default of 5 seconds.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1858

Parameter <DELAY-VALUE>

Description
Specifies the hello-delay in seconds, which is the maximum time before a triggered PIM Hello message is transmitted on this interface. Default: 5 seconds. Range: 0-5.

Usage
n In cases where a new interface activates connections with multiple routers, if all the connected routers sent hello packets at the same time, the receiving router could become momentarily overloaded.
n This command randomizes the transmission delay to a time between zero and the hello delay setting. Using zero means no delay. After the router sends the initial hello packet to a newly detected interface, it sends subsequent hello packets according to the current hello interval setting.
Example
Configuring and removing hello-delay on the interface:

switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 pim6-dense hello-delay 4 switch(config-if-vlan)# no ipv6 pim6-dense hello-delay

Configuring and removing hello-delay on the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# ipv6 pim6-dense hello-delay 4 switch(config-subif)# switch(config-subif)# no ipv6 pim6-dense hello-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

PIM-DM commands for IPv6 | 1859

ipv6 pim6-dense hello-interval
ipv6 pim6-dense hello-interval <INTERVAL-VALUE> no ipv6 pim6-dense hello-interval
Description
Configures the frequency at which the router transmits PIM hello messages on the current interface. The no form of this command removes the currently configured value and sets to the default of 30 seconds.

Parameter <INTERVAL-VALUE>

Description
Specifies the frequency at which PIM Hello messages are transmitted on this interface. Default: 30 seconds. Range: 5-300.

Usage
n The router uses hello packets to inform neighbor routers of its presence. n The router also uses this setting to compute the hello holdtime, which is included in hello packets
sent to neighbor routers. n Hello holdtime tells neighbor routers how long to wait for the next hello packet from the router. If
another packet does not arrive within that time, the router removes the neighbor adjacency on that interface from the PIM adjacency table, which removes any flows running on that interface. n Shortening the hello interval reduces the hello holdtime. If they do not receive a new hello packet when expected, it changes how quickly other routers stop sending traffic to the router.
Example
Configuring and removing dense hello-interval:

switch(config)# interface 1/1/4 switch(config-if)# ipv6 pim6-dense hello-interval 60 switch(config-if)# no ipv6 pim6-dense hello-interval

Configuring and removing dense hello-interval on the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config-subif)# interface 1/1/10.10 switch(config-subif)# ipv6 pim6-dense hello-interval 60 switch(config-subif)# switch(config-subif)# no ipv6 pim6-dense hello-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1860

Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-dense ipv6-addr
ipv6 pim6-dense ipv6-addr {<IPV6-ADDR-VALUE> | any} no ipv6 pim6-dense ipv6-addr
Description
Enables the router to dynamically determine the source IP address to use for PIM packets sent from the interface or to use the specific IP address. The no form of this command removes the currently configured value and sets to the default of any.

Parameter <IPV6-ADDR-VALUE> any

Description
Specifies an IPv6 address as the source IP for the interface.
Specifies dynamically determining the source IP from the current IPv6 address of the interface.

Examples
Configuring and removing the source IP address:

switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 pim6-dense ip-addr 2001::02 switch(config-if-vlan)# no ipv6 pim6-dense ipv6-addr

Configuring and removing the source IP address for the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# ipv6 pim6-dense ipv6-addr 1001::01 switch(config-subif)# switch(config-subif)# no ipv6 pim6-dense ipv6-addr

PIM-DM commands for IPv6 | 1861

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-dense lan-prune-delay
ipv6 pim6-dense lan-prune-delay no ipv6 pim6-dense lan-prune-delay
Description
Enables the LAN prune delay option on the current interface. The default status is enabled. The no form of this command disables the LAN prune delay option.
Usage
With LAN-prune-delay enabled, the router informs downstream neighbors how long it will wait before pruning a flow after receiving a prune request. Other downstream routers on the same interface must send a join to override the prune before the LAN-prune-delay time to continue the flow. Prompts any downstream neighbors with multicast receivers continuing to belong to the flow to reply with a join. If no joins are received after the LAN-prune-delay period, the router prunes the flow. The propagationdelay and override-interval settings determine the LAN-prune-delay setting.
Example
Enabling and disabling the LAN prune delay:
switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 pim6-dense lan-prune-delay switch(config-if-vlan)# no ipv6 pim6-dense lan-prune-delay
Enabling and disabling the LAN prune delay on the sub-interface:
Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1862

switch(config)# interface 1/1/1.10 switch(config-subif)# no ipv6 pim6-dense lan-prune-delay switch(config-subif)# switch(config-subif)# ipv6 pim6-dense lan-prune-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-dense max-graft-retries
ipv6 pim6-dense max-graft-retries <ATTEMPT-VALUE> no ipv6 pim6-dense max-graft-retries
Description
Configures the number of attempts the routing switch will retry sending the same graft packet to join a flow. The no form of this command removes the currently configured value and sets to the default of 3 attempts.

Parameter <INTERVAL-VALUE>

Description
Specifies the number of retries for the routing switch to resend the graft packet. Default: 3 attempts. Range: 1-10.

Usage
If a graft acknowledgment response is not received after the specified number of retries, the routing switch ceases trying to join the flow. In this case the flow is removed until either a state-refresh from upstream re-initiates the flow or an upstream router floods the flow. Increasing this value helps to improve multicast reliability.
Example
Configuring and removing the dense graft retry interval:

PIM-DM commands for IPv6 | 1863

switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 pim6-dense max-graft-retries 6 switch(config-if-vlan)# no ipv6 pim6-dense max-graft-retries
Configuring and removing the dense graft retry interval on the sub-interface:
Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# ipv6 pim6-dense max-graft-retries 6 switch(config-subif)# no ipv6 pim6-dense max-graft-retries

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-dense override-interval
ipv6 pim6-dense override-interval <INTERVAL-VALUE> no ipv6 pim6-dense override-interval
Description
Configures the override interval that gets inserted into the Override Interval field of a LAN Prune Delay option. The no form of this command removes the currently configured value and sets the value to the default of 2500 ms.

Parameter <INTERVAL-VALUE>

Description
Specifies the override interval of a LAN Prune Delay option in ms. Default: 2500 ms. Range: 500-6000.

Usage

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1864

Each router on the LAN expresses its view of the amount of randomization necessary in the Override Interval field of the LAN Prune Delay option. When all routers on a LAN use the LAN Prune Delay Option, all routers on the LAN MUST set their Override_Interval to the largest Override value on the LAN.
Example
Configuring and removing the override interval:
switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 pim6-dense override-interval 4000 switch(config-if-vlan)# no ipv6 pim6-dense override-interval
Configuring and removing the override interval on the sub-interface:
Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# ipv6 pim6-dense override-interval 4000 switch(config-subif)# switch(config-subif)# no ipv6 pim6-dense override-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-dense propagation-delay
ipv6 pim6-dense propagation-delay <DELAY-VALUE> no ipv6 pim6-dense propagation-delay
Description
Configures the propagation delay that gets inserted into the LAN prune delay field of a LAN Prune Delay option. The no form of this command removes currently configured value and sets to the default of 500 ms.

PIM-DM commands for IPv6 | 1865

Parameter <DELAY-VALUE>

Description
Specifies the propagation delay value in ms. Default: 500 ms. Range: 250-2000.

Usage
The LAN Delay inserted by a router in the LAN Prune Delay option expresses the expected message propagation delay on the link. When all routers on a link use the LAN Prune Delay Option, all routers on the LAN MUST set Propagation Delay to the largest LAN Delay on the LAN.
Examples
Configuring and removing the propagation delay:

switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 pim6-dense propagation-delay 400 switch(config-if-vlan)# no ipv6 pim6-dense propagation-delay

Configuring and removing the propagation delay on the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# ipv6 pim6-dense propagation-delay 400 switch(config-subif)# switch(config-subif)# no ipv6 pim6-dense propagation-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-dense ttl-threshold
ipv6 pim6-dense ttl-threshold <THRESHOLD-VALUE> no ipv6 pim6-dense ttl-threshold

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1866

Description
Configures the multicast datagram time-to-live (router hop-count) threshold for the interface. Any IP multicast datagrams or state-refresh packets with a TTL less than this threshold will not be forwarded out the interface.
The no form of this command removes the currently configured value and sets to the default of 3 attempts.

Parameter <THRESHOLD-VALUE>

Description
Specifies the time-to-live threshold. Default: 3 attempts. Range: 0255.

Usage
The VLAN connected to the multicast source does not receive state refresh packets and thus is not state-refresh capable. Downstream VLANs in the switches are state-refresh capable. This parameter provides a method for containing multicast traffic within a network, or even within specific areas of a network. Initially, the multicast traffic source sets a TTL value in the packets it transmits. Each time one of these packets passes through a multicast routing device, the TTL setting decrements by 1. If the packet arrives with a TTL lower than the ttl-threshold, the routing switch does not forward the packet. The following aspects of the TTL setting of incoming multicast packets must be considered, before changing this parameter on a routing switch:
n A value that is too high will allow multicast traffic to go beyond the internal network. n A value that is too low may prevent some intended hosts from receiving the desired multicast traffic. n A value of 0 will forward multicast traffic regardless of the packet TTL setting.
Example
Configuring and removing the time-to-live threshold:

switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 pim6-dense ttl-threshold 8 switch(config-if-vlan)# no ipv6 pim6-dense ttl-threshold

Configuring and removing the time-to-live threshold on the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# ipv6 pim6-dense ttl-threshold 8 switch(config-subif)# no ipv6 pim6-dense ttl-threshold

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

PIM-DM commands for IPv6 | 1867

Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

no ipv6 pim6-dense
no ip pim-dense
Description
Removes PIM-DM for all IPv6 related configurations for the interface.
Examples
Removing all PIM-DM configurations on an interface:
switch(config)# interface vlan40 switch(config-if-vlan)# no ipv6 pim6-dense
Removing all PIM-DM configurations on a sub-interface:
Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/1.10 switch(config-subif)# no ipv6 pim6-dense

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier
Command Information

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1868

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Authority
Administrators or local user group members with execution rights for this command.

register-source
register-source <INTERFACE-NAME> no register-source <INTERFACE-NAME>
Description
Specifies the source interface to be used for PIM registration in the case of VXLAN anycast interfaces. When the PIM enabled anycast VLAN is directly connected to a multicast source, register-source is used to send registration messages to the RP and this interface receives the register-stop messages from the RP. The no form of this command removes the register source configuration.
For PIMv6, both IPv6 link-local and active-gateway address of the anycast VLAN interface is configured with the anycast link-local address. Refer to EVPN VXLAN distributed anycast gateway in the Multicast Guide for more information.

Parameter <INTERFACE-NAME>

Description Specifies the name of the interface to use.

Usage
n This is a global configuration under router-pim configuration and is required in Symmetric IRB with anycast IP address configuration.
n This configuration is required in the source connected switch only when the PIM-DR and RP are in two different switches.
n Without this configuration, there will be traffic loss as the registration sequence will not be successful. It is mandatory to have this source interface configured with a non-anycast IP address which is unique to the VTEP, and with PIM enabled.
Examples
Configuring the source interface for PIM registrations:

switch# config switch(config)# router pim6 vrf vrf1 switch(config-pim)# register-source loopback1

Removing the register-source configuration:

switch(config-pim)# no register-source loopback1

PIM-DM commands for IPv6 | 1869

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.12 10.09.1000

Command Information

Platforms
6300 6400

Command context config-pim

Modification Command introduced for PIMv6. Command introduced
Authority Administrators or local user group members with execution rights for this command.

router pim6
router pim6 [vrf <VRF-NAME>] no router pim6 [vrf <VRF-NAME>]
Description
Changes the current context to the PIMv6 configuration context. If no VRF is specified, the default VRF is assumed. The no form of this command removes the PIM configuration from the specified context or the default VRF.

Parameter vrf <VRF-NAME>

Description Specifies the name of a VRF. Default: default.

Examples
Configuring default router PIM:

switch(config)# router pim6 switch(config-pim6)#

Configuring specified router PIM:

switch(config)# router pim6 vrf Green switch(config-pim6)#

Removing router PIM:

switch(config)# no router pim6

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1870

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show ipv6 pim6
show ipv6 pim6 [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the PIM router information. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing the IPv6 PIM router:

switch# show ipv6 pim6
PIM Global Parameters
VRF PIM Status Join/Prune Interval (sec) SPT Threshold

: default : Enabled : 46 : Disabled

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

PIM-DM commands for IPv6 | 1871

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 interface
show ipv6 pim6 interface [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the information about PIM interfaces currently configured in the router. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME>
vsx-peer

Description
Optional. Shows mroute information for the group for all VRFs.
Optional. Shows mroute information for the group for a particular VRF. If the <VRF-NAME> is not specified, it shows information for the default VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM interface:

switch# show ipv6 pim6 interface PIM Interfaces

VRF: default

Interface

IP Address

mode

------------------ --------------------------------------------------------------

----------

1/1/1

fe80::a00:9ff:feec:dc0e/64

dense

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1872

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 interface <INTERFACE-NAME>
show ipv6 pim6 interface <INTERFACE-NAME> [vsx-peer]
Description
Shows detailed information about the PIM interface currently configured.

Parameter <INTERFACE-NAME>
vsx-peer

Description
Specifies an interface for showing PIM interface information. Interface can also be a LAG or VLAN.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM interface information for interface 1/1/1:

switch# show ipv6 pim6 interface 1/1/1

PIM Interfaces

VRF: default

Interface IPv6 Address Mode

: 1/1/1 : fe80::a00:9ff:feec:dc0e/64 : dense

Designated Router Hello Interval Hello Delay

: fe80::a00:9ff:febd:8364 : 30 sec : 4 sec

Override Interval Propagation Delay Neighbor Timeout Graft Retry Interval

: 500 msec : 350 msec :0 :9

LAN Prune Delay DR Priority TTL Threshold Max Graft Retries

: Yes :3 : 250 :9

For more information on features that use this command, refer to the Multicast Guide for your switch model.

PIM-DM commands for IPv6 | 1873

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 rpf
show ipv6 pim6 rpf [<IP-ADDRESS>][all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Displays PIM RPF details for the specified source or RP address in the given VRF and shows the nexthop and interface through which the shortest path to the source is available. It also displays if a PIM neighbor is present on the nexthop. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter <IP-ADDRESS>
all-vrfs vrf <VRF-NAME>
vsx-peer

Description
Optional. Specifies an IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. Shows PIM RPF details for the given IP address.
Optional. Shows PIM interface information for all VRFs.
Optional. Shows PIM interface information for a particular VRF. If the <VRF-NAME> is not specified, it shows the default VRF information.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing PIM RPF information for the VRF named 'red':

switch# show ipv6 pim6 rpf vrf red

Multicast RPF Details

Origin Codes: C - connected, SM - static-multicast, SU - static-unicast

O - OSPF, B - BGP, R - RIP

VRF: red

IP Address

: 2000::2

RPF Interface : vlan20

RPF Nexthop

:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1874

RPF Route/Mask Origin In Use IP Address RPF Interface RPF Nexthop RPF Route/Mask Origin In Use

: 2000::2/128 :C : yes : 2222::2 : vlan20 : fe80::94f1:2880:141d:a800(PIM Neighbor) : 2222::2/128 :O : yes

Showing PIM RPF information for the specified IP address:

switch# show ipv6 pim6 rpf 2222::2 vrf red

Multicast RPF Details

Origin Codes: C - connected, SM - static-multicast, SU - static-unicast

O - OSPF, B - BGP, R - RIP

VRF: red

IP Address

: 2222::2

RPF Interface : vlan20

RPF Nexthop

: fe80::94f1:2880:141d:a800(PIM Neighbor)

RPF Route/Mask : 2222::2/128

Origin

:O

In Use

: yes

Showing PIM RPF information for all VRFs:

switch# show ipv6 pim6 rpf all-vrfs Multicast RPF Details

Origin Codes: C - connected, SM - static-multicast, SU - static-unicast O - OSPF, B - BGP, R - RIP

VRF: default IP Address RPF Interface RPF Nexthop RPF Route/Mask Origin In Use

: 1001::2 : vlan10 : : 1001::2/128 :C : yes

IP Address RPF Interface RPF Nexthop RPF Route/Mask Origin In Use

: 1111::1 : vlan10 : fe80::94f1:2880:a1d:a800(PIM Neighbor) : 1111::1/128 :O : yes

VRF: red IP Address RPF Interface RPF Nexthop RPF Route/Mask Origin In Use

: 2000::2 : vlan20 : : 2000::2/128 :C : yes

IP Address RPF Interface RPF Nexthop RPF Route/Mask

: 2222::2 : vlan20 : fe80::94f1:2880:141d:a800(PIM Neighbor) : 2222::2/128

PIM-DM commands for IPv6 | 1875

Origin In Use

:O : yes

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.09.1000

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 mroute
show ipv6 mroute [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows multicast routing information. Optionally, you can show specific information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing IPv6 mroute information for the default VRF:

Switch# show ipv6 mroute IP Multicast Route Entries

VRF : default Total number of entries : 1

Group Address Source Address

: ff32::10 : fd00:192:168:20::2

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1876

SSM Mroute

: True

Neighbor

: fe80::f403:4301:1422:2600

Uptime

: 00:14:05

State

: route

Incoming interface

: 1/1/5

Outgoing Interface List :

Interface

State

-----------

----------

vlan20

forwarding

Showing IPv6 mroute information for all VRFs:

switch# do show ipv6 mroute all-vrfs IP Multicast Route Entries

VRF : default Total number of entries : 1

Group Address

: ff32::10

Source Address

: fd00:192:168:2::100

SSM Mroute

: True

Neighbor

: fe80::eceb:b801:14e4:2900

Uptime

: 00:19:20

State

: route

Incoming interface

: 1/1/4

Outgoing Interface List :

Interface

State

-----------

----------

vlan20

forwarding

VRF : red Total number of entries : 1

Group Address

: ff32::11

Source Address

: 30::3

SSM Mroute

: True

Neighbor

: fe80::eceb:b880:1fe4:2900

Uptime

: 00:01:13

State

: route

Incoming interface

: vlan31

Outgoing Interface List :

Interface

State

-----------

----------

vlan32

forwarding

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

PIM-DM commands for IPv6 | 1877

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 mroute brief
show ipv6 mroute brief [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows brief version of the multicast routing information. Optionally, you can specify the display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows mroute information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing the IPv6 mroute brief:

switch# show ipv6 mroute brief all-vrfs IP Multicast Route Entries

VRF : blu Total number of entries : 2

Group Address : ff08::1:3

Source Address : 2002::04

Neighbor

: 2003::04

Interface

: 1/1/2

Group Address : ff08::1:4

Source Address : 2002::03

Neighbor

: 2003::05

Interface

: 1/1/3

VRF : default Total number of entries : 1

Group Address : ff08::1:5

Source Address : 2001::03

Neighbor

: 2002::01

Interface

: 1/1/1

For more information on features that use this command, refer to the Multicast Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1878

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 mroute <GROUP-ADDR>
show ipv6 mroute <GROUP-ADDR> [<SOURCE-ADDR>] [all-vrfs | vrf <vrf-name>] [vsx-peer]
Description
Shows the multicast routing information for the given group address. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter <GROUP-ADDR> <SOURCE-ADDR> all-vrfs vrf <VRF-NAME>
vsx-peer

Description
Specifies show information for the group address. Format: X:X::X:X
Optional. Specifies show information for the group from this source. Format: X:X::X:X
Optional. Shows mroute information for the group for all VRFs.
Optional. Shows mroute information for the group for a particular VRF. If the <VRF-NAME> is not specified, it shows information for the default VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing information for group ff08::1:3 and VRF green:

switch# show ipv6 mroute ff08::1:3 vrf green

IP Multicast Route Entries

VRF : green

Group Address Source Address Neighbor

: ff08::1:3 : 2001::03 : 2003::04

PIM-DM commands for IPv6 | 1879

Incoming Interface Multicast Routing Protocol Unicast Routing Protocol Metric Metric Pref

Downstream Interface

Interface

State

---------

-----

1/1/4

pruned

: 1/1/1 : PIM-DM : connected :0 :0

Showing information for group ff08::1:3 from source 2001::03 and all VRFs:

switch# show ipv6 mroute ff08::1:3 2001::03 all-vrfs

IP Multicast Route Entries

VRF : blue

Group Address Source Address Neighbor Incoming Interface Multicast Routing Protocol Unicast Routing Protocol Metric Metric Pref

: ff08::1:3 : 2001::03 : 2003::04 : 1/1/1 : PIM-DM : connected :0 :0

Downstream Interface

Interface

State

---------

-----

1/1/4

pruned

VRF : green

Group Address Source Address Neighbor Incoming Interface Multicast Routing Protocol Unicast Routing Protocol Metric Metric Pref

: ff08::1:3 : 2001::03 : 2003::04 : 1/1/2 : PIM-DM : connected :0 :0

Downstream Interface

Interface

State

---------

-----

1/1/4

pruned

VRF : red

Group Address Source Address Neighbor Incoming Interface Multicast Routing Protocol Unicast Routing Protocol Metric Metric Pref

: ff08::1:6 : 2001::04 : 2003::04 : 1/1/2 : PIM-DM : connected :0 :0

Downstream Interface

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1880

Interface --------vlan10

State ----forwarding

By_Proxy_Dr ----------false

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 neighbor
show ipv6 pim6 neighbor [<IPv6-ADDR>] [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows PIM neighbor information. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter <IPv6-ADDR>
all-vrfs vrf <VRF-NAME> vsx-peer

Description
Specifies a neighbor address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
On the 6400 Switch Series, interface identification differs. Showing PIM neighbor information:

switch# show ipv6 pim6 neighbor

PIM-DM commands for IPv6 | 1881

PIM Neighbor

VRF IP Address Interface Up Time (sec) Expire Time (sec) DR Priority

: default : 2001::02 : 1/1/1 :0 :0 : 44

Showing PIM neighbor information (including the presence of anycast neighbors) for all VRFs:

switch# show ipv6 pim6 neighbor all-vrfs PIM Neighbor

VRF

: red

Total number of neighbors : 2

IPv6 Address Interface Up Time (HH:MM:SS) Expire Time (HH:MM:SS) DR Priority Hold Time (HH:MM:SS)

: fe80::5:5:5:5 : vni10000 : 06:57:07 : 00:03:26 :1 : 00:03:30

IPv6 Address Interface Up Time (HH:MM:SS) Expire Time (HH:MM:SS) DR Priority Hold Time (HH:MM:SS) Secondary IP Addresses

: fe80::3821:c780:a5c:18c0 : vlan10 : 00:01:46 : 00:01:29 :1 : 00:01:45 :100:100::3

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

state-refresh-interval
state-refresh <INTERVAL-VALUE> no state-refresh

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1882

Description
Configures the interval between successive state-refresh messages originated by the routing switch. Only the routing switch connected directly to the unicast source initiates state-refresh packets. All other PIM routers in the network only propagate these state-refresh packets. The no form of this command sets the interval to the default value of 60 seconds.

Parameter <INTERVAL-VALUE>

Description
Specifies the state refresh interval in seconds. Default: 60 seconds. Range 10-100.

Examples
Configuring the state refresh interval:

switch(config)# router pim6 switch(config-pim6)# state-refresh 30 switch(config-pim6)# no state-refresh

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

PIM-DM commands for IPv6 | 1883

Chapter 105 PIM-SM commands for IPv4

PIM-SM commands for IPv4

accept-register access-list
accept-register access-list <ACL-RULE> no accept-register access-list <ACL-RULE>
Description
Configures ACL on RP to filter PIM Register packets from unauthorized sources. The ACL specified will contain the (S,G) traffic in register packets to permitted or denied. The no form of this command removes the currently configured ACL rule.

Parameter <ACL-RULE>

Description Specifies the ACL rule name.

Usage
When register ACL is associated with a PIM Router, PIM protocol will store the source and destination address details along with the action (permit or deny). If there are any existing flows, the user will need to disable and enable PIM on the interface to apply the ACL. Upon receiving the register messages, a look up is made to check if the S and G in the packet is in the permitted list. If there is no match or if there is a deny rule match, a register stop message is immediately sent and the packet is dropped and no further action is taken. Permitted packets will go through the normal flow. Loopback interfaces are special interfaces where only unicast PIM messages are updated. This includes Register, Register Stop, and Candidate RP Advertisements. When a loopback interface is configured as the RP, the ACL drop counters will be updated on the interface on which the packets are received.
Examples
Configuring ACL on RP with an ACL rule named pim_reg_acl:

switch(config)# access-list ip pim_reg_acl switch(config-acl-ip)# 10 permit any 20.1.1.1 225.1.1.2 switch(config-acl-ip)# 20 deny any 30.1.1.1 225.1.1.3 switch(config)# router pim switch(config-pim)# accept-register access-list pim_reg_acl

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide

1884

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

accept-rp
accept-rp <IP-ADDR> access-list <ACL-RULE> no accept-rp <IP-ADDR> access-list <ACL-RULE>
Description
Enables PIM router to filter PIM join/prune messages destined for a specific RP and specific groups. The ACL specifies the group addresses which are allowed or denied. Up to 8 RP addresses and group ACL can be associated with the PIM router. The no form of this command removes the currently configured ACL rule.

Parameter <IP-ADDR> <ACL-RULE>

Description Specifies the IPv4 address of the static RP. Format: A.B.C.D Specifies the ACL rule name.

Usage
PIM will store the accepted RP address and the associated group ACL. When a join or prune message is received, a RP look up is made for the packet. If the RP is in the configured list and if the group in the join/prune packet is allowed in the ACL, the packet is allowed. Otherwise the packet is dropped. To allow join/prune message from any groups, group address in the ACL can be wild-carded. In this case, only RP address check is performed. This command impacts only (*,G) join/prune messages. If there are any existing flows, the user will need to disable and enable PIM on the interface to apply the ACL. Loopback interfaces are special interfaces where only unicast PIM messages are updated. This includes Register, Register Stop, and Candidate RP Advertisements. When a loopback interface is configured as the RP, the ACL drop counters will be updated on the interface on which the packets are received.
If there is an active flow which is in the SPT, the traffic flow through the SPT will continue. Only (*,G) join/prune messages are dropped. (S,G) join/prune messages will not be impacted.

Examples
Configuring ACL on a RP with an ACL rule named pim_rp_grp_acl to filter join/prune messages:

PIM-SM commands for IPv4 | 1885

switch(config)# access-list ip pim_rp_grp_acl switch(config-acl-ip)# 10 permit any any 225.1.1.2/255.255.255.0 switch(config-acl-ip)# 20 permit any any 239.1.1.2/255.255.255.0 switch(config)-acl-ip# router pim switch(config-pim)# accept-rp 30.1.1.1 access-list pim_rp_grp_acl

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

active-active
active-active no active-active
Description
Enables the PIM active-active mechanism per VRF on VSX. The default is disabled. The no form of this command disables the PIM active-active mechanism.
Usage
PIM active-active keeps the multicast forwarding state synchronized on both VSX peer devices. Synchronization is achieved by electing the VSX peer that has the highest IP address as a designated router (DR) and the other as Proxy-DR. If you want the multicast traffic to flow through VSX primary, assign higher IP addresses to the interfaces in VSX primary. When the VSX peer that is acting as the DR goes down, traffic is recovered faster since the multicast routes are synchronized.
Recommendations:
n Do not configure the DR priority of interfaces when active-active is enabled. The DR priority will be set to high on DR and default on Proxy-DR and any user-configured DR priority will be ignored.
n Always configure keepalive between VSX peers. If the ISL goes down when keepalive is not configured, both VSX peers start acting independently as DRs, resulting in duplicate traffic.
n Do not configure IGMP joins on transit VLANS.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1886

n RP redundancy is not supported on the active-active mechanism. If one of the VSX peers is configured as RP and it goes down, the new traffic flows will not be converged until the RP is elected. For a static RP, new flows will never be converged until the VSX peer is back up.
Examples
Enabling the PIM active-active mechanism:
switch(config)# router pim switch(config-pim)# active-active
Disabling the PIM active-active mechanism:
switch(config)# router pim switch(config-pim)# no active-active

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

anycast-rp source-directly-connected
anycast-rp source-directly-connected [no] anycast-rp source-directly-connected
Description
Use this command with an Anycast rendezvous point (RP) solution (for example, with MSDP) when the same multicast source is directly connected to two or more Anycast RP routers.
Usage
When configured this command allows only one RP who is the Designated Router (DR) in the segment to own the generation of the MSDP SA (Source Active) messages. If this command is not enabled, all Anycast RP routers where the source is directly connected would start advertising SA messages and form a loop. For example. when the source is directly connected to an Anycast RP VSX pair via VSX-LAG. Therefore this configuration is recommended when VSX pairs act as Anycast RPs. This command is optional when the source is directly connected to a single Anycast RP router or when the source is at least one hop away from the RP.

PIM-SM commands for IPv4 | 1887

Examples
The following examples configure directly connected sources with Anycast RP, then remove the configuration.
switch(config)# router pim switch(config-pim)# anycast-rp source-directly-connected switch(config-pim)# switch(config-pim)# no anycast-rp source-directly-connected

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Command Introduced
Authority Users having admin privileges.

bfd all-interfaces
bfd all-interfaces no bfd all-interfaces
Description
Enables BFD on all PIM interfaces. BFD can be disabled at individual PIM interface using the ip pimsparse bfd disable command. The no form of this command disables BFD for all the interfaces.
Examples
Enabling and disabling BFD on all PIM interfaces:
switch(config)# router pim switch(config-pim)# bfd all-interfaces switch(config-pim)# no bfd all-interfaces

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1888

Release
10.12 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification
Command introduced --
Authority Administrators or local user group members with execution rights for this command.

bsr-candidate bsm-interval
bsr-candidate bsm-interval <INTERVAL-VALUE> no bsr-candidate bsm-interval
Description
Configures the interval in seconds to send periodic RP-Set messages to all PIM-SM interfaces on a router that operates as the BSR in a domain. This setting must be smaller than the rp-candidate hold-time settings (range of 30 to 255; default 150) configured in the RPs operating in the domain. The no form of this command removes the currently configured value and sets it to the default of 60 seconds.

Parameter <INTERVAL-VALUE>

Description
Specifies the BSR-candidate BSM interval in seconds. Default: 60 seconds. Range: 5-300.

Example
Configuring and removing BSR-candidate BSM-interval:

switch(config)# router pim switch(config-pim)# bsr-candidate bsm-interval 150 switch(config-pim)# no bsr-candidate bsm-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

PIM-SM commands for IPv4 | 1889

Platforms
6300 6400

Command context config-pim

Authority
Administrators or local user group members with execution rights for this command.

bsr-candidate hash-mask-length
bsr-candidate hash-mask-length <LENGTH-VALUE> no bsr-candidate hash-mask-length
Description
Controls the distribution of multicast groups among the C-RP, in a domain where there is overlapping coverage of the groups among the RPs. This value specifies the length (number of significant bits) when allocating this distribution. A longer hash-mask-length results in fewer multicast groups, for each block of group addresses assigned to the RPs. Multiple blocks of addresses assigned to each C-RP results in wider dispersal of addresses. Includes enhanced load-sharing for the multicast traffic for the different groups that are used in the domain at the same time. The no form of this command removes currently configured value and sets to the default of 30.

Parameter <LENGTH-VALUE>

Description
Specifies the length (in bits) of the hash mask. Default: 30. Range: 1-32.

Example
Configuring and removing the BSR-candidate hash-mask-length:

switch(config)# router pim switch(config-pim)# bsr-candidate hash-mask-length 4 switch(config-pim)# no bsr-candidate hash-mask-length

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

bsr-candidate priority

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1890

bsr-candidate priority <PRIORITY-VALUE> no bsr-candidate priority
Description
Configures the priority to apply to the router when a BSR election process occurs in the PIM-SM domain. The candidate with the highest priority becomes the BSR for the domain. If the highest priority is shared by multiple routers, the candidate having the highest IP address becomes the BSR of the domain. Zero (0) is the lowest priority. To make BSR selection easily predictable, use this command to assign a different priority to each candidate BSR in the PIM-SM domain. The no form of this command removes currently configured value and sets to the default of 0.

Parameter <PRIORITY-VALUE>

Description
Specifies the priority for the Candidate Bootstrap router. Default: 0. Range: 0-255

Example
Configuring and removing the BSR-candidate priority:

switch(config)# router pim switch(config-pim)# bsr-candidate priority 250 switch(config-pim)# no bsr-candidate priority

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

bsr-candidate source-ip-interface
bsr-candidate source-ip-interface <INTERFACE-NAME> no bsr-candidate source-ip-interface <INTERFACE-NAME>
Description
Configures the router to advertise itself as a candidate PIM-SM BSR on the interface specified, and enables BSR candidate operation. The result makes the router eligible to be elected as the BSR for the PIM-SM domain in which it operates. One BSR candidate interface is allowed per-router. The no form of this command removes the Candidate BSR configuration.

PIM-SM commands for IPv4 | 1891

Parameter <INTERFACE-NAME>

Description
Specifies the interface to use as a source for Candidate-BSR router IP address. Interface can be a VLAN interface (such as vlan15) or routed interfaces (such as lag 1 or 1 / 1 / 19). PIM-SM must be enabled on this interface (use the ip pim-sparse enable command).

Example
On the 6400 Switch Series, interface identification differs. Configuring and removing the BSR-candidate interface:

switch(config)# router pim switch(config-pim)# bsr-candidate source-ip-interface 1/1/4 switch(config-pim)# bsr-candidate source-ip-interface vlan5 switch(config-pim)# no rp-candidate source-ip-interface 1/1/4

Configuring and removing sub-interface 1/1/4.10 as the BSR-candidate: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# router pim switch(config-pim)# bsr-candidate source-ip-interface 1/1/4.10 switch(config-pim)# switch(config-pim)# no rp-candidate source-ip-interface 1/1/4.10

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

disable
disable
Description
Disables PIM globally on the router. PIM is disabled by default.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1892

Using the disable command will cause all the multicast routes to be erased from hardware.

Example
Disabling PIM router:
switch(config)# router pim switch(config-pim)# disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

enable
enable
Description
Enables PIM globally on the router.
Example
Enabling PIM router:
switch(config)# router pim switch(config-pim)# enable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

PIM-SM commands for IPv4 | 1893

Command Information

Platforms
6300 6400

Command context config-pim

Authority
Administrators or local user group members with execution rights for this command.

ip mroute
ip mroute <SRC-ADDR/SRC-MASK> <RPF-ADDRESS> | <INTERFACE-NAME>
Description
Configures multicast reverse path (RPF) forwarding static routes. This command is an alias of the rpfoverride command.

Parameter <SRC-ADDR> <SRC-MASK> <RPF-ADDR> <INTERFACE-NAME>

Description
Specifies the multicast source address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the RPF address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the RPF interface name.

Usage
Reverse Path Forward (RPF) checking is a core multicast routing mechanism. The RPF ensures that the multicast traffic received arrives on the expected router interface before further processing. If the RPF check fails for a multicast packet, the packet is discarded. For multicast traffic flow that arrives on the SPT, the expected incoming interface for a given source or group is the interface towards the source address of the traffic (determined by the unicast routing system). For traffic arriving on the RP tree, the expected incoming interface is the interface towards the RP.
Example
Configuring and removing an IP mroute:
switch(config)# router pim switch(config-pim)# ip mroute 40.0.0.4/24 30.0.0.4 switch(config-pim)# no ip mroute 40.0.0.4/24 30.0.0.4
Configuring and removing an IP mroute for an IPv6 address:
switch(config-pim)# router pim6 switch(config-pim6)# ipv6 mroute 50::4/24 tunnel1 switch(config-pim6)# no ipv6 mroute 50::4/24 tunnel1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1894

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.10

Modification Command introduced

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ip multicast boundary
ip multicast boundary access-list <acl_name> no ip multicast boundary access-list <acl_name>
Description
This command configures administratively-scoped multicast boundaries on PIM-enabled Interfaces. A multicast boundary uses an Access Control List (ACL) to filter multicast traffic on the specified interface and prevent the routing of multicast traffic from that interface. This feature supports filtering based on IP, IGMP, and PIM protocols, and can filter both multicast data traffic and control packets, including IGMP Join, PIM Join, and Prune messages. The ACL can use the any filter to match traffic from any source to a specific IP multicast group (*,G), and can contain subnet masks to match a range of addresses.

Parameter access-list <acl_name>

Description Name of the boundary ACL to be applied on the interface.

Usage
When the multicast boundary is configured, MSDP is used to learn the multicast sources across the boundaries. Based on the ACL rules configured, the multicast traffic from one domain to other domain is permitted/denied. MSDP SA messages will always be forwarded across the boundaries regardless of multicast boundary ACL configurations. Anycast RP with MSDP mesh group across the boundaries is not supported. Multicast boundary feature is supported only for IPv4 currently. Multicast boundary feature is not supported on VXLAN based overlay networks.
Examples
The following example creates a boundary that denies multicast group IP addresses in 239.0.0.0/8 and permits group addresses in 224.0.0.0/4. Since the source address is any, it matches traffic from any multicast source (*,G).

PIM-SM commands for IPv4 | 1895

access-list ip boundary1 10 deny any any 239.0.0.0/255.0.0.0 20 permit any any 224.0.0.0/240.0.0.0
interface vlan 40 ip address 40.1.1.1/24 ip pim-sparse enable ip multicast boundary access-list boundary1

The following example creates a boundary which permits traffic for specific multicast sources and groups IP addresses, and implicitly denies all other traffic.
access-list ip boundary2 10 permit any 192.168.1.1 225.1.1.0/255.255.255.0 20 permit any 172.168.1.1 239.1.1.0/255.255.255.0
interface vlan 40 ip address 40.1.1.1/24 ip pim-sparse enable ip multicast boundary access-list boundary2

The following boundary ACL creates a boundary based on protocols. The PIM, IGMP, and IP packets from the specified (S,G) are denied and all other traffic for 239.1.1.0/24 is allowed.

access-list ip boundary3 30 deny pim 192.168.1.1 239.1.1.5 40 deny igmp 192.168.1.1 239.1.1.5 41 deny any 192.168.1.1 239.1.1.5 50 permit any any 239.1.1.0/255.255.255.0
interface vlan 40 ip address 40.1.1.1/24 ip pim-sparse enable ip multicast boundary access-list boundary3

Related Commands
Command show ip multicast boundary interface

Description
Displays IP Multicast boundary ACL configurations and packet drop counters for the given interface.

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.10
Command Information

Modification Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1896

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Authority
Administrators or local user group members with execution rights for this command.

ip multicast multipath
ip multicast multipath {s-hash|s-g-hash} no ip multicast multipath {s-hash|g-hash}
Description
This command configures the multipath hash mode, which allows the switch to determine the nexthop in the RPF path if there are multiple equal cost paths to a source address. PIM S,G join messages are sent to the selected nexthop which results in a multicast traffic flow in the selected paths. An even distribution of available nexthops across different multicast flows improves the utilization of ECMP paths.

Parameter s-hash
s-g-hash

Description
The hash to select the nexthop is based on only the source address. Flows originating from different sources will use different ECMP paths as the source is considered for selecting the nexthop. If the same source sends streams for multiple groups, then all the streams use only one of the ECMP paths. This is the default setting for this feature .
This method uses both source and group address to select the nexthop. This allows better distribution of flows in scenarios where single source is streaming traffic for multiple groups.

Usage
Use this command only for route lookups for a source address and not for an Rendezvous Point (RP) address. The PIM *,G join messages which enable route lookup for the RP always uses the default shash mode, where nexthop is selected based on the RP IP address alone, and the group address is not part of the hash computation. Changes to the multipath has mode can result in traffic loss as the existing route cache is cleared and new route lookups are initiated. In topologies where PIM Assert messages are triggered, RPF lookups are not honored, and the packet forwarding path will be decided based on the assert winner.
Examples
Configuring the hash mode for an individual VRF:

switch(config)# vrf example switch(config-vrf)# ip multicast multipath s-hash

Configuring the hash mode globally:

switch(config)# ip multicast multipath s-g-hash

PIM-SM commands for IPv4 | 1897

Related Commands
For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms
6300 6400

Command context
config-if config-vrf

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

ip pim-sparse
ip pim-sparse {enable|disable} no ip pim-sparse [enable]
Description
Enables or disables PIM-SM in the current interface. PIM-SM is disabled by default on an interface. IP address must be configured on the interface to enable PIM-SM.

Parameter enable
disable

Description
Specifies PIM SM on the interface. IP address must be configured on the interface to enable PIM-SM.
Disables PIM SM on the interface.

Examples
Enabling and disabling PIM-SM:

switch(config)# interface vlan 40 switch(config-if-vlan)# ip address 40.0.0.4/24 switch(config-if-vlan)# ip pim-sparse enable switch(config-if-vlan)# ip pim-sparse disable

Configuring and disabling PIM-SM on the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config-if)# interface 1/1/10.10 switch(config-subif)# ip add 100.100.1.1/24 switch(config-subif)# ip pim-sparse enable

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1898

switch(config-subif)# switch(config-subif)# ip pim-sparse disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ip pim-sparse bfd
ip pim-sparse bfd [disable] no ip pim-sparse bfd
Description
Configures BFD on a per-interface basis for one interface associated with the PIM process. The no form of this command removes the BFD configuration on the interface and sets it to the default configuration.
If BFD is enabled globally, it will be enabled by default on all interfaces. The only exception is when it is disabled specifically on an interface using the ip pim-sparse bfd disable command. If BFD is disabled globally, it will be disabled by default on all interfaces. The only exception is when it is enabled specifically on an interface using the ip pim-sparse bfd command.

Parameter disable

Description Disables the BFD configuration on the interface.

Examples
Enabling the BFD configuration on the interface:

switch(config)# interface vlan 40 switch(config-if-vlan)# ip pim-sparse bfd

Removing the BFD configuration on the interface:

PIM-SM commands for IPv4 | 1899

switch(config-if-vlan)# no ip pim-sparse bfd Disabling the BFD configuration on the interface and overriding the global setting:
switch(config-if-vlan)# ip pim-sparse bfd disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.12 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan

Modification Command introduced --
Authority Administrators or local user group members with execution rights for this command.

ip pim-sparse bsr-boundary
ip pim-sparse bsr-boundary no ip pim-sparse bsr-boundary
Description
Prevent exchange of PIM Bootstrap messages across multicast boundaries.
Usage
Best practices is to avoid exchanging PIM Bootstrap messages across different multicast domains as it will lead to election of RP in a different domain. When this command is configured on a boundary interface, PIM BSMs originating from other domain will be dropped and PIM BSMs originated within this domain will not forwarded to other domain. Note that this command will filter only PIM BSMs and is recommended to be enabled along with ip multicast boundary.
Examples
Configuring and removing the BSR boundary:
switch(config-if)# interface 1/1/1 switch(config-if)# ip pim-sparse bsr-boundary switch(config-if)# no ip pim-sparse bsr-boundary

For more information on features that use this command, refer to the Multicast Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1900

Command History

Release 10.10

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Command Introduced
Authority Users having admin privileges.

ip pim-sparse dr-priority
ip pim-sparse dr-priority <PRIORITY-VALUE> no ip pim-sparse dr-priority
Description
Changes the router priority for the designated router (DR) election process in the current interface. A numerically higher value means a higher priority. If multiple routes share the highest priority, the router with the highest IP address is selected as the DR. The no form of this command removes currently configured value and sets to the default of 1.

Parameter <PRIORITY-VALUE>

Description
Specifies the priority value to use on the interface in the DR election process. Required. Default: 1. Range: 0- to 0-4294967295.

Examples
Configuring and removing the interface priority value:

switch(config)# interface vlan 40 switch(config-if-vlan)# ip pim-sparse dr-priority 4444 switch(config-if-vlan)# no ip pim-sparse dr-priority

Configuring and removing the interface priority value in the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config-if)# interface 1/1/10.10 switch(config-subif)# ip pim-sparse dr-priority 1000 switch(config-subif)# switch(config-subif)# no ip pim-sparse dr-priority

For more information on features that use this command, refer to the Multicast Guide for your switch model.

PIM-SM commands for IPv4 | 1901

Command History

Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ip pim-sparse hello-delay
ip pim-sparse hello-delay <DELAY-VALUE> no ip pim-sparse hello-delay
Description
Configures the maximum time in seconds before the router actually transmits the initial PIM hello message on the current interface. The no form of this command removes currently configured value and sets to the default of 5 seconds.

Parameter <DELAY-VALUE>

Description
Specifies the hello-delay in seconds, which is the maximum time before a triggered PIM Hello message is transmitted on this interface. Default: 5. Range: 0 to 5.

Usage
n In cases where a new interface activates connections with multiple routers. If all the connected routers sent hello packets at the same time, the receiving router could become momentarily overloaded.
n This command randomizes the transmission delay to a time between zero and the hello delay setting. Using zero means no delay. After the router sends the initial hello packet to a newly detected interface, it sends subsequent hello packets according to the current hello interval setting.
Example
Configuring and removing hello-delay interface:

switch(config)# interface vlan 40 switch(config-if-vlan)# ip pim-sparse hello-delay 4 switch(config-if-vlan)# no ip pim-sparse hello-delay

Configuring and removing hello-delay on the sub-interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1902

Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config-if)# interface 1/1/10.10 switch(config-subif)# ip pim-sparse hello-delay 4 switch(config-subif)# switch(config-subif)# no ip pim-sparse hello-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ip pim-sparse hello-interval
ip pim-sparse hello-interval <INTERVAL-VALUE> no ip pim-sparse hello-interval
Description
Configures the frequency at which the router transmits PIM hello messages on the current interface. The no form of this command removes the currently configured value and sets to the default of 30 seconds.

Parameter <INTERVAL-VALUE>

Description
Specifies the frequency at which PIM Hello messages are transmitted on this interface. Range: 5 to 300. Default: 30.

Usage
n The router uses hello packets to inform neighbor routers of its presence. n The router also uses this setting to compute the hello holdtime, which is included in hello packets
sent to neighbor routers.

PIM-SM commands for IPv4 | 1903

n Hello holdtime tells neighbor routers how long to wait for the next hello packet from the router. If another packet does not arrive within that time, the router removes the neighbor adjacency on that interface from the PIM adjacency table, which removes any flows running on that interface.
n Shortening the hello interval reduces the hello holdtime. If they do not receive a new hello packet when expected, it changes how quickly other routers stop sending traffic to the router.
Example
Configuring and removing sparse hello-interval:
switch(config)# interface vlan 20 switch(config-if-vlan)# ip pim-sparse hello-interval 60 switch(config-if-vlan)# no ip pim-sparse hello-interval
Configuring and removing sparse hello-interval on the sub-interface:
Applies only to the Aruba 6300, 8100, 8325, 8360, and 10000 Switch Series.

switch(config-if)# interface 1/1/10.10 switch(config-subif)# ip pim-sparse hello-interval 60 switch(config-subif)# switch(config-subif)# no ip pim-sparse hello-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ip pim-sparse ip-addr
ip pim-sparse ip-addr {<IP-ADDR-VALUE> | any} no ip pim-sparse ip-addr
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1904

Enables the router to dynamically determine the source IP address to use for PIM-SM packets sent from the interface or to use the specific IP address.
The no form of this command removes the currently configured value and sets to the default of any.

Parameter <IP-ADDR-VALUE> any

Description
Specifies an IP address as the source IP for the interface.
Specifies dynamically determining the source IP from the current IP address of the interface.

Examples
Configuring and removing source IP address:

switch(config)# interface vlan 40 switch(config-if-vlan)# ip pim-sparse ip-addr 40.0.0.4 switch(config-if-vlan)# no ip pim-sparse ip-addr

Configuring and removing source IP address on the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config-if)# interface 1/1/10.10 switch(config-subif)# ip pim-sparse ip-addr 10.0.0.1 switch(config-subif)# switch(config-subif)# no ip pim-sparse ip-addr

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ip pim-sparse lan-prune-delay
ip pim-sparse lan-prune-delay

PIM-SM commands for IPv4 | 1905

no ip pim-sparse lan-prune-delay
Description
Enables the LAN prune delay option on the current interface. The default is enabled. With LAN-prune-delay enabled, the router informs downstream neighbors how long it will wait before pruning a flow after receiving a prune request. Other downstream routers on the same interface must send a join to override the prune before the LAN-prune-delay time to continue the flow. Prompts any downstream neighbors with multicast receivers continuing to belong to the flow to reply with a join. If no joins are received after the LAN-prune-delay period, the router prunes the flow. The propagationdelay and override-interval settings determine the LAN-prune-delay setting. The no form of this command disables the LAN prune delay option.
Example
Enabling and disabling the LAN prune delay:
switch(config)# interface vlan 40 switch(config-if-vlan)# ip pim-sparse lan-prune-delay switch(config-if-vlan)# no ip pim-sparse lan-prune-delay
Enabling and disabling the LAN prune delay on the sub-interface:
Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config-if)# interface 1/1/10.10 switch(config-subif)# no ip pim-sparse lan-prune-delay switch(config-subif)# switch(config-subif)# ip pim-sparse lan-prune-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ip pim-sparse override-interval

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1906

ip pim-sparse override-interval <INTERVAL-VALUE> no ip pim-sparse override-interval
Description
Configures the override interval that gets inserted into the Override Interval field of a LAN Prune Delay option. The no form of this command removes the currently configured value and sets the value to the default of 2500 ms.

Parameter <INTERVAL-VALUE>

Description
Specifies the override interval of a LAN Prune Delay option in ms. Range: 500 to 6000. Default: 2500.

Usage
A router sharing a VLAN with other multicast routers uses the override-interval value along with the propagation-delay value to compute the lan-prune-delay setting. The setting specifies how long to wait for a PIM-SM join after receiving a prune packet from downstream for a particular multicast group. Example scenario: A network may have multiple routers sharing VLAN X. When an upstream router is forwarding traffic from multicast group X to VLAN Y, if one of the routers on VLAN Y does not want this traffic, it issues a prune response to the upstream neighbor. The upstream neighbor then goes into a prune pending state for group X on VLAN Y. During this period, the upstream neighbor continues to forward the traffic. During the pending period, another router on VLAN Y can send a group X join to the upstream neighbor. If this happens, the upstream neighbor drops the prune pending status and continues forwarding the traffic. But if no routers on the VLAN send a join, the upstream router prunes.
Example
Configuring and removing the override interval:

switch(config)# interface vlan 40 switch(config-if-vlan)# ip pim-sparse override-interval 4000 switch(config-if-vlan)# no ip pim-sparse override-interval

Configuring and removing the override interval on the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config-if)# interface 1/1/10.10 switch(config-subif)# ip pim-sparse override-interval 4000 switch(config-subif)# switch(config-subif)# no ip pim-sparse override-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

PIM-SM commands for IPv4 | 1907

Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

ip pim-sparse propagation-delay
ip pim-sparse propagation-delay <DELAY-VALUE> no ip pim-sparse propagation-delay
Description
Configures the propagation delay that gets inserted into the LAN prune delay field of a LAN Prune Delay option. The no form of this command removes currently configured value and sets to the default of 500 ms.

Parameter <DELAY-VALUE>

Description
Specifies the propagation delay value in ms. Range: 250 to 2000. Default: 500.

Examples
Configuring and removing the propagation delay:

switch(config)# interface vlan 40 switch(config-if-vlan)# ip pim-sparse propagation-delay 400 switch(config-if-vlan)# no ip pim-sparse propagation-delay

Configuring and removing the propagation delay on the sub-interface: Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config-if)# interface 1/1/10.10 switch(config-subif)# ip pim-sparse propagation-delay 400 switch(config-subif)# switch(config-subif)# no ip pim-sparse propagation-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1908

Command History

Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

join-prune-interval
join-prune-interval <INTERVAL-VALUE> no join-prune-interval
Description
Configures the frequency at which the router will send periodic join or prune-interval messages. The no form of this command sets the interval to the default value of 60 seconds.

Parameter <INTERVAL-VALUE>

Description
Specifies the join-prune-interval in seconds. Range 5 to 65535 Default: 60.

Examples
Configuring join prune interval:

switch(config)# router pim switch(config-pim)# join-prune-interval 400 switch(config-pim)# no join-prune-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

PIM-SM commands for IPv4 | 1909

Platforms
6300 6400

Command context config-pim

Authority
Administrators or local user group members with execution rights for this command.

multicast-route-limit
multicast-route-limit <limit> no multicast-route-limit <limit>
Description
Configures the limit on the maximum number of multicast route entries that can be programmed. When the limit is configured, multicast route entries created because of IGMP or MLD membership reports, and multicast route entries created because of multicast streams are restricted to the configured limit. The no form of this command removes the currently configured limit value.

Parameter <limit>

Description
Specifies the value to be configured as the multicast route limit. Range: 1 to 4294967295.

Usage
Flows exceeding the configured multicast route limit will be programmed as a bridge entry and will not have the outgoing interfaces list populated. This configuration prevents creation of new multicast routes when limits are reached. At the time of configuration, if the device has more multicast routes than the configured limit, existing multicast routes continue to exist until they are removed. The flows are programmed in the HW on a FCFS basis. There could be scenarios where the flow is forwarded in neighbor router, but it may not be forwarded on the current router because of exceeding the limits configured on the current router. In such cases, it is recommended to configure higher limits to avoid traffic outage.
Examples
Configuring and removing the multicast route rate limit:

switch(config)# router pim switch(config-pim)# multicast-route-limit 1024 switch(config-pim)# no multicast-route-limit

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1910

Platforms
6300 6400

Command context config-pim

Authority
Administrators or local user group members with execution rights for this command.

no ip pim-sparse
no ip pim-sparse
Description
Removes all the PIM-SM related configurations for the interface.
Example
Removing PIM-SM configuration:
switch(config)# interface vlan 40 switch(config-if-vlan)# no ip pim-sparse
Removing PIM-SM configuration on the sub-interface:
Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.

switch(config)# interface 1/1/10.10 switch(config-subif)# no ip pim-sparse

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

register-rate-limit
register-rate-limit <limit> no register-rate-limit <limit>

PIM-SM commands for IPv4 | 1911

Description
Configures the limit on the maximum number of register messages sent per second for every unique (S,G) entry. By default, there is no maximum rate set. When the limit is configured, register messages generation is limited to the configured value. The no form of this command removes the currently configured limit value.

Parameter <limit>

Description
Specifies the value to be configured as the register rate limit. Range: 1 to 4294967295.

Examples
Configuring and removing the register rate limit:

switch(config)# router pim switch(config-pim)# register-rate-limit 10 switch(config-pim)# no register-rate-limit

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

register-source
register-source <INTERFACE-NAME> no register-source <INTERFACE-NAME>
Description
Specifies the source interface to be used for PIM registration in the case of VXLAN anycast interfaces. When the PIM enabled anycast VLAN is directly connected to a multicast source, register-source is used to send registration messages to the RP and this interface receives the register-stop messages from the RP. The no form of this command removes the register source configuration.

Parameter <INTERFACE-NAME>

Description Specifies the name of the interface to use.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1912

Usage
n This is a global configuration under router-pim configuration and is required in Symmetric IRB with anycast IP address configuration.
n This configuration is required in the source connected switch only when the PIM-DR and RP are in two different switches.
n Without this configuration, there will be traffic loss as the registration sequence will not be successful. It is mandatory to have this source interface configured with a non-anycast IP address which is unique to the VTEP, and with PIM enabled.
Examples
Configuring the source interface for PIM registrations:
switch# config switch(config)# router pim vrf vrf1 switch(config-pim)# register-source loopback1
Removing the register-source configuration:
switch(config-pim)# no register-source loopback1

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.09.1000

Command Information

Platforms
6300 6400

Command context config-pim

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

router pim
router pim [vrf <VRF-NAME>] accept-register access-list <ACL-RULE> accept-rp <IP-ADDR> access-list <ACL-RULE> active-active bfd all-interfaces bsr-candidate {bsm-interval <INTERVAL-VALUE> | {hash-mask-length <LENGTH-VALUE> | priority <PRIORITY-VALUE> | source-ip-interface <INTERFACE-NAME>} enable|disable join-prune-interval <INTERVAL-VALUE> multicast-route-limit <limit> no ... register-rate-limit <limit>

PIM-SM commands for IPv4 | 1913

rp-address <IP-ADDR> [<GRP-ADDR/GRP-MASK>] [override] rp-candidate {group-prefix <GRP-ADDR/GRP-MASK> |hold-time <TIME-VALUE> | priority <PRIORITY-VALUE> | source-ip-interface <INTERFACE-NAME> [group-prefix <GRP-ADDR/GRPMASK>]} rpf-override <SRC-ADDR/SRC-MASK><RPF-ADDR|INTERFACE-NAME>
Description
Changes the current context to the PIM configuration context and enables PIM globally on the router. If no VRF is specified, the default VRF is assumed. The no form of this command removes the PIM configuration from the specified context or the default VRF.

Parameter vrf <VRF-NAME> accept-register access-list <ACL-RULE>
accept-rp <IP-ADDR> access-list <ACL-RULE>

Description
Specifies the name of a VRF.
Specify an ACL rule name to configures ACL on RP to filter PIM Register packets from unauthorized sources. The ACL specified will contain the (S,G) traffic in register packets to permitted or denied.
Specify the IPv4 address of the static RP and ACL rule name to enable the PIM router to filter PIM join/prune messages destined for a specific RP and specific groups. The ACL specifies the group addresses which are allowed or denied. Up to 8 RP addresses and group ACL can be associated with the PIM router. PIM will store the accepted RP address and the associated group ACL. When a join or prune message is received, a RP look up is made for the packet. If the RP is in the configured list and if the group in the join/prune packet is allowed in the ACL, the packet is allowed. Otherwise the packet is dropped. To allow join/prune message from any groups, group address in the ACL can be wild-carded. In this case, only RP address check is performed. This parameter impacts only (*,G) join/prune messages. If there are any existing flows, the user will need to disable and enable PIM on the interface to apply the ACL. Loopback interfaces are special interfaces where only unicast PIM messages are updated. This includes Register, Register Stop, and Candidate RP Advertisements. When a loopback interface is configured as the RP, the ACL drop counters will be updated on the interface on which the packets are received.
NOTE: If there is an active flow which is in the SPT, the traffic flow through the SPT will continue. Only (*,G) join/prune messages are dropped. (S,G) join/prune messages will not be impacted.

active-active

Enables the PIM active-active mechanism per VRF on VSX. The default is disabled. PIM active-active keeps the multicast forwarding state synchronized on both VSX peer devices.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1914

Parameter
bfd all-interfaces bsr-candidate
bsm-interval <INTERVAL-VALUE> hash-mask-length <LENGTH-VALUE>
priority <PRIORITY-VALUE>
source-ip-interface <INTERFACE-NAME>

Description
Synchronization is achieved by electing the VSX peer that has the highest IP address as a designated router (DR) and the other as Proxy-DR. If you want the multicast traffic to flow through VSX primary, assign higher IP addresses to the interfaces in VSX primary. When the VSX peer that is acting as the DR goes down, traffic is recovered faster since the multicast routes are synchronized.
Enables BFD on all PIM interfaces. BFD can be disabled at individual PIM interface using the ip pim-sparse bfd disable command.
Configure settings for a router that operates as the BSR in a domain.
Configures the interval in seconds to send periodic RP-Set messages to all PIM-SM interfaces on a router that operates as the BSR in a domain. This setting must be smaller than the rp-candidate hold-time settings (range of 30 to 255; default 150) configured in the RPs operating in the domain. Default: 60 seconds. Range: 5-300.
Controls the distribution of multicast groups among the C-RP, in a domain where there is overlapping coverage of the groups among the RPs. This value specifies the length (number of significant bits) when allocating this distribution. A longer hashmask-length results in fewer multicast groups, for each block of group addresses assigned to the RPs. Multiple blocks of addresses assigned to each C-RP results in wider dispersal of addresses. Includes enhanced load-sharing for the multicast traffic for the different groups that are used in the domain at the same time. Default: 30 bits. Range: 1-32.
Configures the priority to apply to the router when a BSR election process occurs in the PIM-SM domain. The candidate with the highest priority becomes the BSR for the domain. If the highest priority is shared by multiple routers, the candidate having the highest IP address becomes the BSR of the domain. Zero (0) is the lowest priority. To make BSR selection easily predictable, use this command to assign a different priority to each candidate BSR in the PIMSM domain. Default: 0. Range: 0-255
Configures the router to advertise itself as a candidate PIM-SM BSR on the interface specified, and enables BSR candidate operation. The result makes the router eligible to be elected as the BSR for the PIM-SM domain in which it operates. One BSR candidate interface is allowed per-router. The Interface can be a VLAN interface (such as vlan15) or routed interfaces (such as lag 1 or 1 / 1 / 19). PIM-

PIM-SM commands for IPv4 | 1915

Parameter enable|disable join-prune-interval <INTERVAL-VALUE> multicast-route-limit <limit>
no... register-rate-limit <limit> rp-address

Description
SM must be enabled on this interface (use the ip pim-sparse enable command).
Enables or disables PIM globally on the router.
Configures the frequency at which the router will send periodic join or prune-interval messages. Range 5 to 65535 Default: 60.
Configures the limit on the maximum number of multicast route entries that can be programmed. When the limit is configured, multicast route entries created because of IGMP or MLD membership reports, and multicast route entries created because of multicast streams are restricted to the configured limit. Flows exceeding the configured multicast route limit will be programmed as a bridge entry and will not have the outgoing interfaces list populated. This configuration prevents creation of new multicast routes when limits are reached. At the time of configuration, if the device has more multicast routes than the configured limit, existing multicast routes continue to exist until they are removed. The flows are programmed in the HW on a FCFS basis. There could be scenarios where the flow is forwarded in neighbor router, but it may not be forwarded on the current router because of exceeding the limits configured on the current router. In such cases, it is recommended to configure higher limits to avoid traffic outage. Range: 1 to 4294967295.
Negates any configured parameter.
Configures the limit on the maximum number of register messages sent per second for every unique (S,G) entry. By default, there is no maximum rate set. When the limit is configured, register messages generation is limited to the configured value. Range: 1 to 4294967295.
Statically configures the router as the RP for a specified multicast group or range of multicast groups. When a static RP and a C-RP are configured to support the same multicast groups and the multicast group mask for the static RP is equal to or greater than the same mask for the applicable CRPs, this command assigns the higher precedence to the static RP, resulting in the C-RP operating only as a backup RP for the configured group. Without override, the C-RP has precedence over a static RP configured for the same multicast group or groups. This must be configured on all PIM-SM routers in the domain. If group address is not specified, it applies to all IPv4 multicast addresses (224.0.0.0 239.255.255.255). PIM-SM supports a maximum of 8 static RPs per VRF.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1916

Parameter <IP-ADDR> <GRP-ADDR/GRP-MASK> override
rp-candidate group-prefix <GRP-ADDR/GRP-MASK>
hold-time <TIME-VALUE>
priority <PRIORITY-VALUE>
source-ip-interface
<INTERFACE-NAME> group-prefix <GRP-ADDR/GRP-MASK> rpf-override

Description
Specifies the address of the static RP in IPv4 format (x.x.x.x).
Specifies the multicast group address in IPv4 format (x.x.x.x) and the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies higher precedence to static RP over Candidate RP.
Configure Candidate Rendezvous Point (C-RP) settings.
Adds multicast group address to the current Candidate Rendezvous Point (C-RP) configuration by specifying the the multicast group address in IPv4 format (x.x.x.x) and the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Changes the hold-time a C-RP includes in its advertisements to the BSR. Hold-time is included in the advertisements the CRP periodically sends to the elected BSR for the domain. Also updates the BSR on how long to wait after the last advertisement from the reporting RP before assuming it has become unavailable. Range: 30 to 250. Default: 150.
Changes the current priority setting for a C-RP. Where multiple C-RP configurations are used to support the same multicast groups, the candidate having the highest priority is elected. Zero (0) is the highest priority, and 255 is the lowest priority. Range: 0 to 255. Default: 192.
Enables the Candidate Rendezvous Point (C-RP) operation, and configures the router to advertise itself as a C-RP to the Bootstrap Router (BSR) for the current domain. This step includes the option to allow the C-RP to be a candidate for all possible multicast groups, or for up to four multicast groups, or ranges of groups. If group-prefix is not given, it considers for all multicast group addresses.
Specifies the interface to use as a source for the CRP router IP address.
Specifies the multicast group address in IPv4 format (x.x.x.x) and the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
The Reverse Path Forward (RPF) override allows overriding the normal RPF lookup mechanism, and indicates to the router that it may accept multicast traffic on an interface other than the one that the RPF lookup mechanism would normally select. This

PIM-SM commands for IPv4 | 1917

Parameter
<SRC-ADDR/SRC-MASK> <RPF-ADDR|INTERFACE-NAME>

Description
includes accepting traffic from an invalid source IP address for the subnet or VLAN that is directly connected to the router. Traffic may also be accepted from a valid PIM neighbor that is not on the reverse path towards the source of the received multicast traffic.
Specifies the multicast source IPv4 address in IPv4 format (x.x.x.x) and the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the RPF override IP address or interface.

Usage
When a register ACL is associated with a PIM Router, the PIM protocol will store the source and destination address details along with the action (permit or deny). If there are any existing flows, the user will need to disable and enable PIM on the interface to apply the ACL. Upon receiving the register messages, a look up is made to check if the S and G in the packet is in the permitted list. If there is no match or if there is a deny rule match, a register stop message is immediately sent and the packet is dropped and no further action is taken. Permitted packets will go through the normal flow. Loopback interfaces are special interfaces where only unicast PIM messages are updated. This includes Register, Register Stop, and Candidate RP Advertisements. When a loopback interface is configured as the RP, the ACL drop counters will be updated on the interface on which the packets are received. Recommendations for the active-active mechanism:
n Do not configure the DR priority of interfaces when active-active is enabled. The DR priority will be set to high on DR and default on Proxy-DR and any user-configured DR priority will be ignored.
n Always configure keepalive between VSX peers. If the ISL goes down when keepalive is not configured, both VSX peers start acting independently as DRs, resulting in duplicate traffic.
n Do not configure IGMP joins on transit VLANS. n RP redundancy is not supported on the active-active mechanism. If one of the VSX peers is
configured as RP and it goes down, the new traffic flows will not be converged until the RP is elected. For a static RP, new flows will never be converged until the VSX peer is back up.
Reverse Path Forward (RPF) override usage details:
n Reverse Path Forward (RPF) checking is a core multicast routing mechanism. The RPF ensures that the multicast traffic received arrives on the expected router interface before further processing. If the RPF check fails for a multicast packet, the packet is discarded. For multicast traffic flow that arrives on the SPT, the expected incoming interface for a given source or group is the interface towards the source address of the traffic (determined by the unicast routing system). For traffic arriving on the RP tree, the expected incoming interface is the interface towards the RP.
n RPF checking is applied to all multicast traffic and is significant in preventing network loops. Up to eight manual RPF overrides can be specified. The RPF-address indicates one of two distinct RPF candidates:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1918

1. A valid PIM neighbor address from which forwarded multicast traffic is accepted with a source address of <source-addr/src-mask>.
2. A local router address on a PIM-enabled interface to which <source-addr/src-mask> is directly connected. If configured, the local router will assume the role of DR for this flow and registers the flow with an RP.
Examples
Configuring and enabling default router PIM:
switch(config)# router pim switch(config-pim)#enable
Configuring specified router PIM:
switch(config)# router pim vrf green switch(config-pim)#
Configuring ACL on RP with an ACL rule named pim_reg_acl:
switch(config)# access-list ip pim_reg_acl switch(config-acl-ip)# 10 permit any 20.1.1.1 225.1.1.2 switch(config-acl-ip)# 20 deny any 30.1.1.1 225.1.1.3 switch(config)# router pim switch(config-pim)# accept-register acces
Configuring ACL on a RP with an ACL rule named pim_rp_grp_acl to filter join/prune messages:
switch(config)# access-list ip pim_rp_grp_acl switch(config-acl-ip)# 10 permit any any 225.1.1.2/255.255.255.0 switch(config-acl-ip)# 20 permit any any 239.1.1.2/255.255.255.0 switch(config)-acl-ip# router pim switch(config-pim)# accept-rp 30.1
On the 6400 Switch Series, interface identification differs. Configuring and removing the BSR-candidate interface:
switch(config)# router pim switch(config-pim)# bsr-candidate source-ip-interface 1/1/4 switch(config-pim)# bsr-candidate source-ip-interface vlan5 switch(config-pim)# no rp-candidate source-ip-interface 1/1/4
Configuring and removing sub-interface 1/1/4.10 as the BSR-candidate:
Applies only to the Aruba 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series.
switch(config)# router pim switch(config-pim)# bsr-candidate source-ip-interface 1/1/4.10
PIM-SM commands for IPv4 | 1919

switch(config-pim)# switch(config-pim)# no rp-candidate source-ip-interface 1/1/4.10

Configuring and removing the multicast route rate limit:
switch(config)# router pim switch(config-pim)# multicast-route-limit 1024 switch(config-pim)# no multicast-route-limit
Configuring and removing the register rate limit:
switch(config)# router pim switch(config-pim)# register-rate-limit 10 switch(config-pim)# no register-rate-limit
Configuring and removing candidate-RP router priority and hold times
switch(config)# router pim switch(config-pim)# rp-candidate priority 250 switch(config-pim)# rp-candidate hold-time 200

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.11 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Sub-interface support extended to 8325 and 10000 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

rp-address
rp-address <IP-ADDR> [<GRP-ADDR/GRP-MASK>] [override] no rp-address <IP-ADDR> [<GRP-ADDR/GRP-MASK>] [override]
Description
Statically configures the router as the RP for a specified multicast group or range of multicast groups. This must be configured on all PIM-SM routers in the domain. If group address is not specified, it applies to all IPv4 multicast addresses (224.0.0.0 - 239.255.255.255). PIM-SM supports a maximum of 8 static RPs per VRF. Optionally associates the specified access control list to the given static RP address.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1920

The no form of this command removes static RP configuration and its precedence.

Parameter <IP-ADDR> <GRP-ADDR> <GRP-MASK> override

Description
Specifies the address of the static RP in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the multicast group address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies higher precedence to static RP over candidate RP.

Usage
Where a static RP and a C-RP are configured to support the same multicast groups and the multicast group mask for the static RP is equal to or greater than the same mask for the applicable C-RPs, this command assigns the higher precedence to the static RP, resulting in the C-RP operating only as a backup RP for the configured group. Without override, the C-RP has precedence over a static RP configured for the same multicast group or groups.
Examples
Configuring the static RP precedence over the candidate RP:

switch(config)# router pim switch(config-pim)# rp-address 40.0.0.4 230.0.0.4/24 ovverride switch(config-pim)# rp-address 40.0.0.8 222.0.0.4/24 switch(config-pim)# no rp-address 40.0.0.4 230.0.0.4/24

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

rp-address access list
rp-address <IP-ADDR> [access-list <ACL-NAME>][override] no rp-address <IP-ADDR> [access-list <ACL-NAME>][override]
Description

PIM-SM commands for IPv4 | 1921

Statically configures the router as the RP and associates the static RP to the specified ACL. The no form of this command removes static RP ACL configuration.

Parameter <IP-ADDR>
access-list <ACL-NAME>

Description
Specifies the address of the static RP in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the name of the access control list.

override

Specifies whether or not static RP configuration precedes the information learned by a BSR.

Usage
The ACL includes a list of permitted/ denied group addresses for the specified RP.
n When configured on a source DR, only permitted group addresses are registered to the RP. When applied on other routers, (\*,G) PIM join/prune messages are filtered according to the applied ACL.
n Only destination group addresses in the ACEs are filtered and any other fields configured in the ACE are ignored. If only PIM (\*,G) messages need to be filtered, configure accept-rp ACLs.
n When static RP ACL is configured, only one static RP can be configured per VRF and that configured RP handles all the multicast groups in range 224.0.0.0/4.

A change in the RP ACL does not impact the flows that have already switched to SPT. Only when the source information is expired and the RP is needed to establish the multicast tree, is the change in the ACL reflected. If the source is always active, PIM can be disabled and re-enabled to clear the learned sources information and reestablish multicast trees based on the latest RP ACL configurations.

Examples
Configuring the static RP ACL:
... access-list ip static_rp_acl
10 permit any any 225.1.1.1 20 permit any any 239.1.1.0/255.255.255.0 30 deny any any 226.1.1.0/255.255.255.0
switch(config)# router pim switch(config-pim)# rp-address 40.0.0.4 access-list static_rp_acl
Removing the static RP ACL configuration:
switch(config-pim)# no rp-address 40.0.0.4 access-list static_rp_acl

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1922

Release 10.10 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification Added optional access list parameter [access-list <ACL-NAME>] --
Authority Administrators or local user group members with execution rights for this command.

rp-candidate group-prefix
rp-candidate group-prefix <GRP-ADDR/GRP-MASK> no rp-candidate group-prefix <GRP-ADDR/GRP-MASK>
Description
Adds multicast group address to the current Candidate Rendezvous Point (C-RP) configuration. The no form of this command removes C-RP multicast group address.

Parameter <GRP-ADDR>
<GRP-MASK>

Description
Specifies the multicast group address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the address mask in CIDR format (x), where x is a decimal number from 0 to 128.

Examples
Configuring and removing candidate group prefix:

switch(config)# router pim switch(config-pim)# rp-candidate group-prefix 230.0.0.4/24 switch(config-pim)# no rp-candidate group-prefix 230.0.0.4/24

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

PIM-SM commands for IPv4 | 1923

Platforms
6300 6400

Command context config-pim

Authority
Administrators or local user group members with execution rights for this command.

rp-candidate hold-time
rp-candidate hold-time <TIME-VALUE> no rp-candidate hold-time
Description
Changes the hold-time a C-RP includes in its advertisements to the BSR. Hold-time is included in the advertisements the C-RP periodically sends to the elected BSR for the domain. Also updates the BSR on how long to wait after the last advertisement from the reporting RP before assuming it has become unavailable. The no form of this command removes the currently configured value and sets it to the default value 150 seconds.

Parameter <TIME-VALUE>

Description
Specifies the hold-time value in seconds to be sent in C-RP-Adv messages. Range: 30 to 250. Default: 150.

Example
Setting and removing the candidate holdtime:

switch(config)# router pim switch(config-pim)# rp-candidate hold-time 250 switch(config-pim)# no rp-candidate hold-time

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

rp-candidate priority
rp-candidate priority <PRIORITY-VALUE>

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1924

no rp-candidate priority
Description
Changes the current priority setting for a C-RP. Where multiple C-RP configurations are used to support the same multicast groups, the candidate having the highest priority is elected. Zero (0) is the highest priority, and 255 is the lowest priority. The no form of this command removes the currently configured value and sets it to the default of 192.

Parameter <PRIORITY-VALUE>

Description
Specifies the priority value for the Candidate-RP router. Range: 0 to 255. Default: 192.

Example
Configuring and removing candidate priority:

switch(config)# router pim switch(config-pim)# rp-candidate priority 250 switch(config-pim)# no rp-candidate priority

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

rp-candidate source-ip-interface
rp-candidate source-ip-interface <INTERFACE-NAME> [group-prefix <GRP-ADDR/GRP-MASK>] no rp-candidate source-ip-interface <INTERFACE-NAME> [group-prefix <GRP-ADDR/GRP-MASK>]
Description
Enables the Candidate Rendezvous Point (C-RP) operation, and configures the router to advertise itself as a C-RP to the Bootstrap Router (BSR) for the current domain. This step includes the option to allow the C-RP to be a candidate for all possible multicast groups, or for up to four multicast groups, or ranges of groups. If group-prefix is not given, it considers for all multicast group addresses. The no form of this command removes the C-RP configuration.

PIM-SM commands for IPv4 | 1925

Parameter <INTERFACE-NAME> <GRP-ADDR> <GRP-MASK>

Description
Specifies the interface to use as a source for the C-RP router IP address.
Specifies the multicast group address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the address mask in CIDR format (x), where x is a decimal number from 0 to 128.

Examples
Configuring and removing candidate source IP interface:

switch(config)# router pim switch(config-pim)# rp-candidate source-ip-interface vlan40 group-prefix 230.0.0.4/24 switch(config-pim)# no rp-candidate source-ip-interface vlan20

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

rpf-override
rpf-override <SRC-ADDR/SRC-MASK> <RPF-ADDR|INTERFACE-NAME> no rpf-override <SRC-ADDR/SRC-MASK> <RPF-ADDR|INTERFACE-NAME>
Description
The Reverse Path Forward (RPF) override, allows overriding the normal RPF lookup mechanism, and indicates to the router that it may accept multicast traffic on an interface other than the one that the RPF lookup mechanism would normally select. This includes accepting traffic from an invalid source IP address for the subnet or VLAN that is directly connected to the router. Traffic may also be accepted from a valid PIM neighbor that is not on the reverse path towards the source of the received multicast traffic. The no form of this command removes currently configured RPF entry.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1926

Parameter <SRC-ADDR/SRC-MASK>
<RPF-ADDR> <INTERFACE-NAME>

Description
Specifies the multicast source IPv4 address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. And the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the RPF address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the RPF interface name.

Usage
Reverse Path Forward (RPF) checking is a core multicast routing mechanism. The RPF ensures that the multicast traffic received arrives on the expected router interface before further processing. If the RPF check fails for a multicast packet, the packet is discarded. For multicast traffic flow that arrives on the SPT, the expected incoming interface for a given source or group is the interface towards the source address of the traffic (determined by the unicast routing system). For traffic arriving on the RP tree, the expected incoming interface is the interface towards the RP.
Example
Configuring and removing RPF override:

switch(config)# router pim switch(config-pim)# rpf-override 40.0.0.4/24 30.0.0.4 switch(config-pim)# no rpf-override 40.0.0.4/24 30.0.0.4

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

show ip mroute
show ip mroute [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows multicast routing information. Optionally, you can show specific information by VRF. If no options are specified, it shows information for the default VRF.

PIM-SM commands for IPv4 | 1927

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows mroute information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing IP mroute for the default VRF:

Switch(config-vlan-20)# show ip mroute IP Multicast Route Entries

VRF : default Total number of entries : 1

Group Address

: 232.10.10.10

Source Address

: 192.168.20.2

SSM Mroute

: True

Neighbor

: 192.168.3.0

Uptime

: 02:08:31

State

: route

Incoming interface

: 1/1/5

Outgoing Interface List :

Interface

State

-----------

----------

vlan20

forwarding

Showing IP mroute for all VRFs:

switch# do show ip mroute all-vrfs IP Multicast Route Entries

VRF : default Total number of entries : 1

Group Address

: 232.10.10.10

Source Address

: 192.168.2.100

SSM Mroute

: True

Neighbor

: 192.168.3.0

Uptime

: 00:38:24

State

: route

Incoming interface

: 1/1/4

Outgoing Interface List :

Interface

State

-----------

----------

vlan20

forwarding

VRF : red Total number of entries : 1

Group Address Source Address SSM Mroute

: 232.11.11.11 : 30.0.0.3 : True

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1928

Neighbor

: 31.0.0.1

Uptime

: 00:32:55

State

: route

Incoming interface

: vlan31

Outgoing Interface List :

Interface

State

-----------

----------

vlan32

forwarding

switch#

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip mroute brief
show ip mroute brief [al-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows brief version of the multicast routing information. Optionally, you can specify the display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows mroute information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing the IP mroute brief:

PIM-SM commands for IPv4 | 1929

switch# show ip mroute brief VRF : default Total number of entries : 1

Group Address ------------239.1.1.1

Source Address -------------40.0.0.6

Neighbor -------10.1.1.2

Interface --------vlan5

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip mroute group-addr
show ip mroute <GROUP-ADDR> [<SOURCE-ADDR>] [all-vrfs | vrf <vrf-name>] [vsx-peer]
Description
Shows the multicast routing information for the given group address. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter <GROUP-ADDR>
<SOURCE-ADDR>
all-vrfs vrf <VRF-NAME> vsx-peer

Description
Specifies a group address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies show information for the group from this source in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Shows mroute information for the group for all VRFs.
Specifies the name of a VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing information for group 239.1.1.1 and VRF green:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1930

switch# show ip mroute 239.1.1.1 vrf green

VRF : green

Group Address

Source Address

Neighbor

Incoming interface

Unicast Routing Protocol

Metric

Metric Pref

Downstream Interface

Interface State

--------- -----

vlan6

forwarding

: 239.1.1.1 : 40.0.0.5 : 10.1.1.2 : vlan1 : connected : 1234 : 1234

Showing information for group 239.1.1.1 from source 40.0.0.5 and all VRFs:

switch# show ip mroute 239.1.1.1 40.0.0.5 all-vrfs

VRF : blue

Group Address

Source Address

Incoming interface

Unicast Routing Protocol

Metric

Metric Pref

Downstream Interface

Interface State

--------- -----

vlan2

forwarding

: 239.1.1.1 : 40.0.0.5 : vlan3 : connected : 1234 : 1234

VRF : green

Group Address

Source Address

Neighbor

Incoming interface

Unicast Routing Protocol

Metric

Metric Pref

Downstream Interface

Interface State

--------- -----

vlan6

forwarding

: 239.1.1.1 : 40.0.0.5 : 10.1.1.2 : vlan1 : connected : 1234 : 1234

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

PIM-SM commands for IPv4 | 1931

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip multicast anomalies
show ip multicast anomalies (pim | igmp | msdp | data-path | all) {source <source_ip>} {group <group_ip>} {interface <IFNAME>} {vrf <vrf_name>} {all-vrfs}
Description
This command is used to display IPv4 multicast anomalies occurring across all the multicast modules in the system. Use this issue to troubleshoot current issues, or to detect multicast issues that occurred in the past by capturing the list of anomalies occurring across the multicast stack.

Parameter pim igmp msdp data-path all group <group_ip> interface <IFNAME> source <source_ip> vrf <vrf-name> all-vrfs

Description Display multicast anomalies specific to PIM. Display multicast anomalies specific to IGMP. Display multicast anomalies specific to MSDP. Display multicast anomalies specific to the datapath. Display anomalies of all muticast modules. Display multicast anomalies specific to the group. Display multicast anomalies specific to an interface Display multicast anomalies specific to a source. Display multicast anomalies specific to a VRF. Display multicast anomalies for all VRFs.

Examples
Showing datapath multicast anomalies for a specified group, interface and VRF.

switch# show ip multicast anomalies all all-vrfs
2022-02-18T09:28:40.272639+00:00 8320 pimd[2206]: MCAST_ANOMALY|IPV4|PIM||100.1.1.1|224.0.0.2|VLAN20|VRF_BLUE| Dropping packet as max number of mroute or nexthop is reached
2022-02-18T09:28:40.275256+00:00 8320 hpe-repld[2678]: MCAST_ANOMALY|-|DATA-PATH||-|-|-|-|Could not allocate resources | linecard = e1937928-ceee-4027-a240aa54ba2de076 | err = Ingress resources exhausted
2022-02-18T09:28:40.283113+00:00 8320 ops-switchd[1214]: MCAST_ANOMALY|IPV4|DATAPATH|-|100.1.1.1|224.0.0.2|VLAN20|VRF_BLUE|Unable to add IPMC entry

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1932

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip multicast boundary interface
show ip multicast boundary interface <interface-name>
Description
Displays IP Multicast boundary ACL configurations and packet drop counters for the specified interface.
Examples
The following example displays IP multicast boundary information for interface 1/1/1.

switch# show ip multicast boundary interface vlan50 IP Multicast Boundary Configurations -----------------------------------access-list ip permitssm
20 permit any any 225.0.0.0/255.0.0.0 30 permit any any 230.0.0.0/255.0.0.0 40 permit any any 232.0.0.0/255.0.0.0

IP Multicast Boundary Rx packet drop counters

---------------------------------------------

PIM Joins/Prunes

0

PIM BSM

0

PIM C-RP Advertisements 0

PIM Asserts

0

Multicast Data Packets

0

IGMP Joins

0

Related Commands
Command ip multicast boundary

Description
This command configures administratively-scoped multicast boundaries on PIM-enabled Interfaces.

PIM-SM commands for IPv4 | 1933

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification Command Introduced
Authority Users having admin privileges.

show ip pim
show ip pim [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the PIM router information. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows PIM router information on all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
n In the 6400 Switch Series, In-Service Software Upgrade (ISSU) and multicast NSF are not supported in mixed mode.
n Multicast NSF is not supported for PIM RP enabled switches, therefore some transient traffic loss is expected during ISSU on RP routers where both PIM and MSDP are enabled.
n When PIM NSF status is inactive, the PIM NSF Time Remaining information is not shown.
Example
Showing IP PIM router information:

switch# show ip pim

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1934

PIM Global Parameters

VRF

:

PIM Status

:

PIM SSM Status

:

PIM SSM Range ACL

:

Join/Prune Interval (sec)

:

SPT Threshold

:

State Refresh Interval (sec)

:

PIM NSF Status

:

PIM NSF Time Remaining (HH:MM:SS) :

default Enabled Enabled pim_ssm_grp_range_acl 60 Enabled 60 Active 00:01:21

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.10 10.07 or earlier

Modification Added NSF information: PIM NSF status, PIM NSF Time Remaining --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim rpf
show ip pim rpf [<source-ip-address> [<group-ip-address>]] [vrf <vrf-name> | all-vrfs]
Description
Shows PIM RPF details for the specified source or RP address in the given VRF. It shows the nexthop and interface through which shortest path to the source is available. Additionally, it prints if PIM neighborship is present on the nexthop. If VRF is not given, it displays for default VRF.

Parameter <IP-ADDR> vrfs vrf <VRF-NAME> all-vrfs

Description Show PIM RPF details for the given IPv4/IPv6 (X:X::X:X) address Shows PIM RPF information for specific VRF. Specifies the name of a VRF. Default: default. Shows PIM RPF details in all VRFs.

Examples
Showing PIM RPF for an IP address:

PIM-SM commands for IPv4 | 1935

switch# [show ip pim rpf 1.1.1.1]

VRF: default IP Address In Use --------------1.1.1.1 yes

RPF Interface ------------vlan10

RPF Nexthop ----------10.1.1.1

PIM Neighbor RPF Route/Mask

------------ --------------

yes

1.1.1.1/32

Origin -----O

Showing PIM RPF for all VRFs:

switch# [show ip pim rpf all-vrfs]

VRF: default IP Address In Use ----------------1.1.1.1 yes 10.1.1.1 yes 10.1.1.2 yes

RPF Interface ------------vlan10 vlan10 vlan10

RPF Nexthop ----------10.1.1.1 -

VRF: red IP Address In Use --------------2.2.2.2 yes 20.0.0.1 yes 20.0.0.2 yes

RPF Interface RPF Nexthop

------------- -----------

vlan20

20.0.0.1

vlan20

-

vlan20

-

PIM Neighbor RPF Route/Mask Origin

------------ -------------- ------

yes

1.1.1.1/32

O

no

10.1.1.0/24

C

no

10.1.1.2/32

C

PIM Neighbor RPF Route/Mask Origin

------------ -------------- ------

yes

2.2.2.2/32

SU

no

20.0.0.0/24

C

no

20.0.0.2/32

C

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.12 10.07 or earlier

Modification Command introduced --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1936

show ip pim bsr
show ip pim bsr [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the information about BSR candidates in the domain and multicast groups it supports. Optionally, you can specify the display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME>
vsx-peer

Description
Shows PIM candidate BSR information for all VRFs.
Optional. Shows PIM candidate BSR information for a particular VRF. If the <VRF-NAME> is not specified, it shows information for the default VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing information about BSR candidates:

switch# show ip pim bsr all-vrfs

Status and Counters- PIM-SM Bootstrap Router Information

VRF E-BSR Address E-BSR Priority E-BSR Hash Mask Length E-BSR Up Time Next Bootstrap Message

: default : 10.0.0.1 :0 : 30 : 3000 secs : 80 secs

C-BSR Admin Status

: This system is a Candidate-BSR

C-BSR Address

: 2.2.2.2/24

C-BSR Priority

: 34

C-BSR Hash Mask Length : 30

C-BSR Message Interval : 76

C-BSR Source IP Interface : vlan10

C-RP Admin Status C-RP Address C-RP Hold Time C-RP Advertise Period C-RP Priority C-RP Source IP Interface

: This system is a Candidate-RP : 2.2.2.2 : 150 : 60 : 192 : vlan10

Group Address --------------226.2.2.2 228.2.2.2 232.2.2.2

Group Mask --------------255.255.255.255 255.255.255.255 255.255.255.255

VRF E-BSR Address

: green : 2.2.2.2

PIM-SM commands for IPv4 | 1937

E-BSR Priority E-BSR Hash Mask Length E-BSR Up Time Next Bootstrap Message

:0 : 30 : 3000 secs : 80 secs

C-BSR Admin Status

: This system is a Candidate-BSR

C-BSR Address

: 2.2.2.2/24

C-BSR Priority

: 34

C-BSR Hash Mask Length : 32

C-BSR Message Interval : 60

C-BSR Source IP Interface : vlan10

C-RP Admin Status C-RP Address C-RP Hold Time C-RP Advertise Period C-RP Priority C-RP Source IP Interface

: This system is a Candidate-RP : 2.2.2.2 : 150 : 60 : 192 : vlan10

Group Address --------------231.2.2.2 232.2.2.2 235.2.2.2

Group Mask --------------255.255.255.255 255.255.255.255 255.255.255.255

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim bsr elected
show ip pim bsr elected [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows information about the elected BSR in the domain and multicast groups it supports. Optionally you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1938

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Selects all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM elected bootstrap router information:

switch# show ip pim bsr elected all-vrfs

Status and Counters- PIM-SM Elected Bootstrap Router Information

VRF E-BSR Address E-BSR Priority E-BSR Hash Mask Length E-BSR Up Time Next Bootstrap Message

: default : 10.0.0.1 :0 : 30 : 3000 secs : 80 secs

VRF E-BSR Address E-BSR Priority E-BSR Hash Mask Length E-BSR Up Time Next Bootstrap Message

: green : 20.0.0.1 :0 : 30 : 3000 secs : 80 secs

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim bsr local
show ip pim bsr local [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description

PIM-SM commands for IPv4 | 1939

Shows the information about BSR candidates on the local router and multicast groups it supports. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Selects all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing local Candidate BSR:

switch# show ip pim bsr local all-vrfs

Status and Counters - PIM-SM Local Candidate-BSR Information

VRF

: default

C-BSR Admin Status

: This system is a Candidate-BSR

C-BSR Address

: 2.2.2.2/24

C-BSR Priority

: 34

C-BSR Hash Mask Length : 30

C-BSR Message Interval : 76

C-BSR Source IP Interface : vlan10

VRF

: green

C-BSR Admin Status

: This system is a Candidate-BSR

C-BSR Address

: 2.2.2.2/24

C-BSR Priority

: 34

C-BSR Hash Mask Length : 32

C-BSR Message Interval : 60

C-BSR Source IP Interface : vlan10

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1940

show ip pim interface
show ip pim interface [brief | all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the information about PIM interfaces currently configured in the router. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter brief all-vrfs vrf <VRF-NAME> vsx-peer

Description
Specifies brief interface information
Selects all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing the information about PIM interfaces currently configured in the router for the 6200, 6300, 6400, 8100, 8325, 8360, 9300, and 10000 switch series.

switch# show ip pim interface 1/1/2

PIM Interfaces
VRF: default Interface: 1/1/2 Neighbor count: 2 IP Address:50.1.1.4/24 Mode: bidir Designated Router: NA Proxy DF: false Hello Interval (sec): 30 Hello Delay (sec):5 Override Interval (msec): 2500 Propagation Delay (msec): 500 Operational DR Priority : NA Neighbor Timeout: 105

Lan Prune Delay: Yes Configured DR Priority: NA

Showing PIM interface information in brief for the default VRF:

switch(config)# show ip pim interface brief

----------------------------------------------------------------------------------

--

VRF : default

Total number of interfaces : 4

----------------------------------------------------------------------------------

--

Interface

IP Address

DR Address

Neighbor

Mode

VSX

count

PIM-SM commands for IPv4 | 1941

Role

----------- ------------------ --------------- --------- ------ ---

--

1/1/1

40.0.0.4/24

Nil

1

bidir

NA

vlan10

50.1.1.1/24

Nil

0

bidir

NA

vlan20

60.0.0.4/24

Nil

1

bidir

NA

vlan30

30.10.10.2/24

Nil

2

bidir

NA

loopback1

70.0.0.4/24

NA

NA

bidir

NA

----------------------------------------------------------------------------------

--

Showing PIM interface brief information for all VRFs:

switch(config)# show ip pim interface brief all-vrfs

----------------------------------------------------------------------------------

--

VRF : default

Total number of interfaces : 1

----------------------------------------------------------------------------------

--

Interface

IP Address

DR Address

Neighbor

Mode

VSX

count

Role

----------- ------------------ --------------- --------- ------ ---

--

1/3/1

31.1.1.1/30

Nil

0

sparse N/A

-----------------------------------------------------------------------------------

----------------------------------------------------------------------------------

--

VRF : vrf1

Total number of interfaces : 1

----------------------------------------------------------------------------------

--

1/3/2

32.1.1.1/30

Nil

0

sparse N/A

-----------------------------------------------------------------------------------

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13
10.07 or earlier
Command Information

Modification
Added support for BIDIR PIM on the ,6300, 6400,, ,, ,switch series.
--

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1942

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim interface interface-name
show ip pim interface {<INTERFACE-NAME> [vsx-peer] | lag | loopback | tunnel | vlan <VLAN-ID> | vxlan} [vrf <VRF-NAME>]
Description
Shows detailed information about the PIM interface currently configured.

Parameter <INTERFACE-NAME> vsx-peer
LAG loopback tunnel vlan <VLAN-ID> vrf <VRF-NAME> vxlan

Description
Specifies an interface for showing PIM interface information.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.
Shows LAG interface information.
Shows loopback interface information.
Shows tunnel interface information.
Specifies an interface for showing PIM interface information.
Specifies the name of a VRF. Default: default.
Shows the VXLAN interface information.

Example
Showing PIM interface information for interface 1/1/2:

switch# show ip pim interface 1/1/2

PIM Interfaces

VRF: default

Interface : 1/1/2

IP Address : 50.0.0.4/24

Mode

: sparse

Designated Router :

Hello Interval (sec) : 30

Hello Delay (sec)

:5

Override Interval (msec) : 2500

Propagation Delay (msec) : 500

Neighbor Timeout

: 105

Lan Prune Delay DR Priority

: Yes :1

PIM-SM commands for IPv4 | 1943

Showing the PIM interface information for VLAN 10:

switch# show ip pim interface vlan 10

PIM Interfaces

VRF: red

Interface

: vlan10

Neighbor count : 1

IP Address

: 100.100.1.1/24

Mode

: sparse

Designated Router Proxy DR Hello Interval (sec) Hello Delay (sec)

: 100.100.1.1 : false : 30 :5

Override Interval (msec) : 2500

Propagation Delay (msec) : 500

Neighbor Timeout

: 83

Lan Prune Delay : Yes

DR Priority

:1

Showing the PIM interface information for VLAN 10 when anycast neighbors are present:

switch# show ip pim interface vlan 10

PIM Interfaces

VRF: red

Interface

: vlan10

Neighbor count : 1

IP Address

: 100.100.1.1/24

Mode

: sparse

Designated Router Proxy DR Hello Interval (sec) Hello Delay (sec)

: 100.100.1.1 : false : 30 :5

Override Interval (msec) : 2500

Propagation Delay (msec) : 500

Neighbor Timeout

: 83

Lan Prune Delay : Yes

DR Priority

:1

Anycast Neighbors Present : True

DR State

: Non-DR

Operational DR Priority : 30529026

Elected DR priority

: 50529027

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1944

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim interface interface-name counters
show ip pim interface <INTERFACE-NAME> counters [vsx-peer]
Description
Shows the PIM packet counters information for the specified interface.

Parameter <INTERFACE-NAME> vsx-peer

Description
Specifies the interface to show packet counter information.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
Loopback interfaces are special interfaces where only unicast PIM messages are updated. This includes Register, Register Stop, and Candidate RP Advertisements. When a loopback interface is configured as the RP, the ACL drop counters will be updated on the interface on which the packets are received.
Example
Showing PIM packet counters for interface 1/1/5:

Switch(config)# show ip pim interface 1/1/5 counters

Interface : 1/1/5

VRF

: default

Tx Counters :

Hello

310

State Refresh

0

Join/Prune

141

SSM Join/Prune

141

RP Advertisement

0

Graft

0

Graft Ack

0

Assert

0

Bsm

0

Register

0

Register Stop

0

SSM Register Stop

0

Rx Counters :

Hello

308

PIM-SM commands for IPv4 | 1945

State Refresh

0

Join/Prune

0

SSM Join/Prune

0

RP Advertisement

0

Graft

0

Graft Ack

0

Assert

0

Bsm

0

Register

0

SSM Register

0

Register Stop

0

Register Drops(Register ACL hitcount) 0

Join/Prune Drops(RP ACL hitcount)

0

Rx Drop Counters :

Hello

0

State Refresh

0

Join/Prune

0

RP Advertisement

0

Graft

0

Graft Ack

0

Assert

0

Bsm

0

Switch(config)#

Showing PIM packet counters for interface VLAN 1:

switch# show ip pim interface vlan1 counters

Interface VRF

: vlan1 : default

Rx Counters :

Hello

4

State Refresh

0

Join/Prune

1

RPadv

0

Graft

0

GraftAck

0

Assert

0

Bsm

0

Register

0

Register Stop

0

Register Drops(Register ACL hitcount) 10

Join/Prune Drops(RP ACL hitcount)

5

Tx Counters :

Hello

9

State Refresh

0

Join/Prune

0

RPadv

0

Graft

0

GraftAck

0

Assert

0

Bsm

0

Register

0

Register Stop

0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1946

Invalid Rx Counters :

Hello

0

State Refresh

0

Join/Prune

0

RPadv

0

Graft

0

GraftAck

0

Assert

0

Bsm

0

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim rp
show ip pim rp [<group-ip>] [{vrf <vrf-name>}|all-vrfs]
Description
Displays the rendezvous point (RP) address for a particular group in the given VRF. The output of this command also includes the type of RP (static or dynamic) and the uptime for the mapping. This information can help verify that Group-to-RP mapping is consistent across all routers in the network. If the group-ip parameter is not included, the output of this command displays the group-to-RP mappings of those groups with active multicast traffic in the given VRF. If a VRF name is not specified, the output of this command displays information for the default VRF.

Parameter <group-ip> vrf <VRF-NAME> all-vrfs

Description Display group-to-RP mappings for the specified group. Specifies the name of a VRF. The default VRF is named default. Selects all VRFs.

Example
Showing RP mapping information for a single group:

PIM-SM commands for IPv4 | 1947

switch# show ip pim rp 239.1.1.1

VRF: default

PIM-SM Group-to-Resultant_RP Mapping Information

Group Address RP Address RP Type Up Time(HH:MM:SS)

------------- ---------- ------- ----------------

239.1.1.1

20.1.1.1

bsr

12:01:20

Showing RP mapping for all VRFs:

switch# show ip pim rp all-vrfs VRF: default

PIM-SM Group-to-Resultant_RP Mapping Information

Group Address RP Address RP Type Up Time(HH:MM:SS)

------------- ---------- ------- ----------------

239.1.1.1

20.1.1.1

bsr

15:10:45

239.1.1.2

40.1.1.1

static 05:07:30

239.1.1.3

Not Found -

-

VRF: red

PIM-SM Group-to-Resultant_RP Mapping Information

Group Address RP Address RP Type Up Time(HH:MM:SS)

------------- ---------- ------- ----------------

225.1.1.1

100.1.1.5 bsr

15:11:50

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.10

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim rp-registered-source
show ip pim rp-registered-sources <group-address> [source-address] [all-vrfs | vrf <vrfname>]
Description
Displays the registered sources information on the RP router. This command shows information about the active multicast flows that are registered by the source designated router (DR) to this Rendezvous Point (RP). When the multicast source becomes inactive, the entry will be removed from this table. Note

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1948

that this command displays only the set of flows that have been registered successfully for which the current router is the RP.

show ipv pim rp registered sources
show ip pim rp-registered-sources <group-address> [source-address] [all-vrfs | vrf <vrfname>]
Description
Shows information about active multicast flows that are registered by source DR to a specific RP.

Parameter <group-address> <source-address>
vrf <VRF-NAME> all-vrfs

Description
Shows registered sources information for the group address. Format: x.x.x.x
(Optional) Shows registered sources information for the group from this source. Format: x.x.x.x Display registered sources information for group address.
Displays registered sources information for a specific VRF.
Displays registered sources information for all VRFs.

Example
The following example the registered sources information for all VRFs.

switch# show ip pim rp-registered-sources all-vrfs

Multicast flows registered with this RP

VRF : default

Total number of entries : 2

Source Address

Group Address

RP Address

--------------------

-------------------- --------------------

20.1.1.1

225.1.1.4

2.2.2.2

20.1.1.1

225.1.1.5

2.2.2.2

Multicast flows registered with this RP

VRF : red

Total number of entries : 2

Source Address

Group Address

--------------------

--------------------

30.1.1.1

229.1.1.1

30.1.1.1

229.1.1.2

RP Address -------------------4.4.4.4 4.4.4.4

The following example the registered sources information for a specific group and source address.

switch# show ip pim rp-registered-sources 229.1.1.10 30.1.1.1

Multicast flows registered with this RP

VRF : default

Total number of entries : 1

Source Address

Group Address

--------------------

--------------------

30.1.1.1

229.1.1.10

RP Address -------------------4.4.4.4

PIM-SM commands for IPv4 | 1949

PIM-SM Group-to-Resultant_RP Mapping Information

Group Address RP Address RP Type Up Time(HH:MM:SS)

------------- ---------- ------- ----------------

225.1.1.1

100.1.1.5 bsr

15:11:50

Showing RP mapping information for a single group:

Multicast flows registered with this RP

VRF : default

Total number of entries : 2

Source Address

Group Address

--------------------

--------------------

20.1.1.1

225.1.1.4

20.1.1.1

225.1.1.5

Multicast flows registered with this RP

VRF : red

Total number of entries : 2

Source Address

Group Address

--------------------

--------------------

30.1.1.1

229.1.1.1

30.1.1.1

229.1.1.2

RP Address -------------------2.2.2.2 2.2.2.2
RP Address -------------------4.4.4.4 4.4.4.4

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.12

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim neighbor
show ip pim neighbor [<IP-ADDRESS>] [brief | all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows PIM neighbor information. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter <IP-ADDRESS> brief

Description Specifies an IP address. Specifies PIM neighbor information display in brief format.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1950

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Selects all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM neighbor information for the , 6300, 6400,, , , , switch series.:

switch# show ip pim neighbor

PIM Neighbor

VRF

: default

Total number of neighbors : 1

IP Address Interface Up Time (HH:MM:SS) Expire Time (HH:MM:SS) DR Priority Hold Time (HH:MM:SS) Bidir Capable

: 30.1.1.3 : vlan30 : 03:55:40 : 00:01:23 : NA : 00:01:45 : True

Showing PIM neighbor information in brief for the default VRF:

switch# show ip pim neighbor brief

----------------------------------------------------------------------------------

-

VRF: default

Total number of neighbor : 2

----------------------------------------------------------------------------------

-

Interface Neighbor Uptime

Expires DR

Hold Time Secondary

Address

(IPV4) (HH:MM:SS) (HH:MM:SS) Priority (HH:MM:SS) (IPV4)

---------- -------- --------- --------- ------ --------- ----------------

-

29091/1/1 40.0.0.5 11:54:21 00:01:31 NA

00:01:45 Nil

29101/1/2 50.0.0.5 00:03:23 00:01:23 NA

00:01:45

60.0.0.4,70.0.0.4

----------------------------------------------------------------------------------

-

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

PIM-SM commands for IPv4 | 1951

Release 10.13
10.07 or earlier

Modification
Added support for BIDIR PIM on the , 6300, 6400,, , , , switch series.
--

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim pending
show ip pim pending [<GROUP-ADDR>] [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the pending joins on a PIM router. Optionally you can specify display information by VRF. If no options are specified, it shows information for the default VRF. Use this command to determine what flows are being requested on the PIM network. If data availability for a flow is expected, and a join for the flow is pending, the troubleshooting search moves to the source of that flow, since the routers are verified to be seeing the request for data.

Parameter <GROUP-ADDR>
all-vrfs vrf <VRF-NAME> vsx-peer

Description
Specifies a group address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Selects all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
On the 6400 Switch Series, interface identification differs. Showing pending PIM joins:

switch# show ip pim pending Join Pending VRF : default
Group 234.0.20.4 (*,G) Pending Incoming Interface:
Group 234.0.20.5

1/1/32

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1952

(*,G) Pending Incoming Interface:
Group 234.0.20.6 (*,G) Pending Incoming Interface:
Group 234.0.20.7 (*,G) Pending Incoming Interface:

1/2/32 1/1/32 1/1/2

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim rp-candidate
show ip pim rp-candidate [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the candidate RP operational and configuration information. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Selects all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM RP candidate:

switch# show ip pim rp-candidate all-vrfs Status and Counters- PIM-SM Candidate-RP Information

PIM-SM commands for IPv4 | 1953

VRF

: Green

C-RP Admin Status

: This system is a Candidate-RP

C-RP Address

: 10.1.1.27

C-RP Hold Time

: 150

C-RP Advertise Period : 60

C-RP Priority

: 192

C-RP Source IP Interface : Vlan10

Group Address Group Mask

--------------- ---------------

239.10.10.240 255.255.255.252

236.0.0.0

255.255.255.0

VRF

: Red

C-RP Admin Status

: This system is a Candidate-RP

C-RP Address

: 20.1.1.27

C-RP Hold Time

: 150

C-RP Advertise Period : 60

C-RP Priority

: 192

C-RP Source IP Interface : Vlan20

Group Address Group Mask

--------------- ---------------

239.10.10.240 255.255.255.252

236.0.0.0

255.255.255.0

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim rp-set
show ip pim rp-set [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the multicast group support for both the learned C-RP assignments and any statically configured RP assignments. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1954

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Selects all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM RP set information:

switch# show ip pim rp-set all-vrfs

VRF: default

Status and Counters - PIM-SM Static RP-Set Information

Group Address Group Mask

RP Address

Override

--------------- --------------- --------------- --------

233.100.128.255 255.255.255.255 100.10.10.1

Yes

238.100.128.255 255.255.255.255 100.10.10.3

Yes

Status and Counters - PIM-SM Learned RP-Set Information

Group Address Group Mask

RP Address

Hold Time

--------------- --------------- --------------- ---------

223.2.2.34

255.0.0.0

9.0.0.25

12

Expire Time ----------0

VRF: green

Status and Counters - PIM-SM Static RP-Set Information

Group Address Group Mask

RP Address

Override

--------------- --------------- --------------- --------

226.102.128.255 255.255.255.255 105.10.10.3

Yes

234.102.128.255 255.255.255.255 110.10.10.3

Yes

Status and Counters - PIM-SM Learned RP-Set Information

Group Address Group Mask

RP Address

Hold Time

--------------- --------------- --------------- ---------

223.2.2.34

255.0.0.0

9.0.0.25

12

229.2.2.34

255.0.0.0

9.0.0.25

10

Expire Time ----------0 0

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

PIM-SM commands for IPv4 | 1955

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim rp-set learned
show ip pim rp-set learned [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the multicast group support for dynamically learned RP assignments. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Selects all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM RP set learned information:

switch# show ip pim rp-set learned all-vrfs

VRF: default

Status and Counters - PIM-SM Learned RP-Set Information

Group Address Group Mask

RP Address

Hold Time

--------------- --------------- --------------- ---------

223.2.2.34

255.0.0.0

9.0.0.25

12

Expire Time ----------0

VRF: green

Status and Counters - PIM-SM Learned RP-Set Information

Group Address Group Mask

RP Address

Hold Time

--------------- --------------- --------------- ---------

223.2.2.34

255.0.0.0

9.0.0.25

12

229.2.2.34

255.0.0.0

9.0.0.25

10

Expire Time ----------0 0

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1956

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim rp-set static
show ip pim rp-set static [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the multicast group support for statically configured RP assignments. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Selects all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM Static RP set information:

switch# show ip pim rp-set static all-vrfs

VRF: default

Status and Counters - PIM-SM Static RP-Set Information

Group Address Group Mask

RP Address

Override

--------------- --------------- --------------- --------

233.100.128.255 255.255.255.255 100.10.10.1

Yes

238.100.128.255 255.255.255.255 100.10.10.3

Yes

VRF: green

Status and Counters - PIM-SM Static RP-Set Information

Group Address Group Mask

RP Address

Override

--------------- --------------- --------------- --------

226.102.128.255 255.255.255.255 105.10.10.3

Yes

234.102.128.255 255.255.255.255 110.10.10.3

Yes

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

PIM-SM commands for IPv4 | 1957

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim rpf-override
show ip pim rpf-override [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the RPF override configuration, which can be useful information when troubleshooting potential RPF misconfigurations. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF

Parameter all-vrfs vrf <VRF-NAME>
vsx-peer

Description
Optional. Shows PIM RPF override information for all VRFs.
Optional. Shows PIM RPF override information for a particular VRF. If the <VRF-NAME> is not specified, it shows information for the default VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
On the 6400 Switch Series, interface identification differs. Showing PIM RPF override:

switch# show ip pim rpf-override all-vrfs

VRF

: default

Static RPF Override

Multicast Source RPF IP Address

-------------------- ------------------

10.0.0.2/32

1.1.1.1

VRF

: green

Static RPF Override

Multicast Source RPF IP Address

-------------------- ------------------

10.0.0.2/32

1.1.1.1

10.1.1.1/32

1.1.1.2

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1958

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim rp-registered-source
show ip pim rp-registered-sources <group-address> [source-address] [all-vrfs | vrf <vrfname>]
Description
Displays the registered sources information on the RP router. This command shows information about the active multicast flows that are registered by the source designated router (DR) to this Rendezvous Point (RP). When the multicast source becomes inactive, the entry will be removed from this table. Note that this command displays only the set of flows that have been registered successfully for which the current router is the RP.

show ipv pim rp registered sources
show ip pim rp-registered-sources <group-address> [source-address] [all-vrfs | vrf <vrfname>]
Description
Shows information about active multicast flows that are registered by source DR to a specific RP.

Parameter <group-address> <source-address>
vrf <VRF-NAME> all-vrfs

Description
Shows registered sources information for the group address. Format: x.x.x.x
(Optional) Shows registered sources information for the group from this source. Format: x.x.x.x Display registered sources information for group address.
Displays registered sources information for a specific VRF.
Displays registered sources information for all VRFs.

Example

PIM-SM commands for IPv4 | 1959

The following example the registered sources information for all VRFs.

switch# show ip pim rp-registered-sources all-vrfs

Multicast flows registered with this RP

VRF : default

Total number of entries : 2

Source Address

Group Address

RP Address

--------------------

-------------------- --------------------

20.1.1.1

225.1.1.4

2.2.2.2

20.1.1.1

225.1.1.5

2.2.2.2

Multicast flows registered with this RP

VRF : red

Total number of entries : 2

Source Address

Group Address

--------------------

--------------------

30.1.1.1

229.1.1.1

30.1.1.1

229.1.1.2

RP Address -------------------4.4.4.4 4.4.4.4

The following example the registered sources information for a specific group and source address.

switch# show ip pim rp-registered-sources 229.1.1.10 30.1.1.1

Multicast flows registered with this RP

VRF : default

Total number of entries : 1

Source Address

Group Address

--------------------

--------------------

30.1.1.1

229.1.1.10

RP Address -------------------4.4.4.4

PIM-SM Group-to-Resultant_RP Mapping Information

Group Address RP Address RP Type Up Time(HH:MM:SS)

------------- ---------- ------- ----------------

225.1.1.1

100.1.1.5 bsr

15:11:50

Showing RP mapping information for a single group:

Multicast flows registered with this RP

VRF : default

Total number of entries : 2

Source Address

Group Address

--------------------

--------------------

20.1.1.1

225.1.1.4

20.1.1.1

225.1.1.5

Multicast flows registered with this RP

VRF : red

Total number of entries : 2

Source Address

Group Address

--------------------

--------------------

30.1.1.1

229.1.1.1

30.1.1.1

229.1.1.2

RP Address -------------------2.2.2.2 2.2.2.2
RP Address -------------------4.4.4.4 4.4.4.4

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1960

Release 10.12

Modification Command introduced

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim rpf-override source
show ip pim rpf-override source <IP-ADDR> [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the RPF override configuration for the specified source. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter source <IP-ADDR>
all-vrfs vrf <VRF-NAME> vsx-peer

Description
Specifies the RPF source address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Selects all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing PIM RPF override source:

switch# show ip pim rpf-override source 10.0.0.2

VRF

: default

Static RPF Override

Multicast Source RPF IP Address

-------------------- ------------------

10.0.0.2

1.1.1.1

Showing PIM RPF override source for all VRFs:

switch# show ip pim rpf-override source 10.0.0.2 all-vrfs

VRF

: default

PIM-SM commands for IPv4 | 1961

Static RPF Override

Multicast Source RPF IP Address

-------------------- ------------------

10.0.0.2

1.1.1.1

VRF

: green

Static RPF Override

Multicast Source RPF IP Address

-------------------- ------------------

10.0.0.2

1.1.1.1

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim tree-state
show ip pim tree-state {<group-ip> [<source-ip>]}|brief [{vrf <vrf-name>}| all-vrfs]
Description
Displays upstream join states for a specified group and source address in a VRF. The command displays upstream state, upstream interface and RPF neighbor used to send join messages and a list of downstream interfaces from which join messages are received. The set of downstream interfaces in this command may not show the final list of outgoing interfaces for a flow, which is computed from various internal states and is shown in the output of the command show ip mroute.

Parameter <group-ip>
<source-ip>

Description
Shows PIM Join details for the specified group IP address
Shows PIM Join details for the specified source IP address. If a source address is not specified, only *,G states are displayed for the specified group. If a source address is specified, (S,G) states are displayed along with (*,G) states and (S,G,RPT) states wherever

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1962

Parameter
brief vrf <VRF-NAME> all-vrfs

Description
applicable. Display brief details for the multicast group and source in a table format. Show join state details for the specified VRF. Show join state details for all VRFs.

Usage
The output of this command can indicate one of the following two multicast group (*,G) and multicast source and group (S,G) upstream states:
n Joined : Join sent to upstream RPF neighbor. n Not Joined : Joins not sent upstream.
The following states are applicable to the multicast group (*G), and root path tree (S,G,RPT) only:
n Pruned : Traffic from the source is arriving on the shortest path tree, (*,G) Joined, but (S,G,RPT) pruned.
n Not Pruned : Traffic from the multicast group (*,G) Joined, and (S,G,rpt) not pruned. n RPT Not Joined' : The multicast group (*,G) has not joined.
Examples
Display multicast group (*,G) join information for the VRF red.

show ip pim tree-state 239.1.1.1 vrf red

(*,G) Information for Group 239.1.1.1

VRF: red

Upstream Information:

State

: Joined

Joined Interface

: vlan50

RPF Neighbor

: 20.1.1.2

Uptime

: 01:58:30

Downstream Information:

Interfaces

: vlan50, vlan201

Display group (*,G), source and group (S,G), and root-path tree (S,G, RPT) Information for group 239.1.1.1 and source IP 30.1.1.1.

show ip pim tree-state 239.1.1.1 30.1.1.1 vrf red

(*,G) Information for Group 239.1.1.1

VRF: red

Upstream Information:

State

: Joined

Joined Interface

: vlan50

RPF Neighbor

: 20.1.1.2

Uptime

: 01:58:30

Downstream Information:

Interfaces

: vlan200

(S,G) Information for Group 239.1.1.1 Source 30.1.1.1

Upstream Information:

PIM-SM commands for IPv4 | 1963

State

: Joined

Joined Interface

: vlan30

RPF Neighbor

: 40.1.1.2

Uptime

: 01:57:30

SPT bit set

: True

Downstream Information:

Interfaces

: vlan200

(S,G,RPT) Information for Group 239.1.1.1 Source 30.1.1.1

Upstream Information:

State

: Pruned

Joined Interface

: vlan50

RPF Neighbor

: 20.1.1.2

Uptime

: 01:58:30

Downstream Information:

Interfaces

: vlan200

Display brief information for the IP PIM tree state.

switch# show ip pim tree-state brief

State abbreviations :

J - Joined NJ - Not Joined RPTNJ - RPT Not Joined

P - Pruned NP - Not Pruned

---------------------------------------------------------------------------------

VRF : default

---------------------------------------------------------------------------------

Group Address

Source Address

RPF

Uptime

State Type

Neighbor

(HH:MM:SS)

-------------

--------------

----------- ---------- ------ -------

239.1.1.1

*

10.1.1.2

01:58:30

J

*,G

239.1.1.1

40.0.0.6

10.1.1.2

01:58:30

J

S,G

239.1.1.2

*

10.1.1.2

01:58:30

J

*,G

239.1.1.2

40.0.0.6

20.1.1.2

01:58:30

J

S,G

239.1.1.2

40.0.0.6

10.1.1.2

01:58:30

P

S,G,RPT

---------------------------------------------------------------------------------

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

sources-per-group

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1964

sources-per-group <limit> no sources-per-group <limit>
Description
Configures the total number of sources allowed for a group on the router. By default, there is no limit on the number of sources for a group. When the number of sources for a group exceeds the configured limit, multicast traffic from additional sources will be dropped. The no form of this command removes the currently configured limit value.

Parameter <limit>

Description
Specifies the value to be configured as the sources allowed per group. Range: 1 to 4294967295.

Usage
Flows exceeding the limit will be programmed as a bridge entry and will not have the outgoing interfaces list populated. This configuration does not allow new sources for the group. At the time of configuration, if the device has more sources for the given group than the configured value, already allowed sources continue to exist until they are removed. The flows are programmed in the HW on a FCFS basis. There could be scenarios where the flow is forwarded in neighbor router, but it may not be forwarded on the current router because of exceeding the limits configured on the current router. In such cases, it is recommended to configure higher limits to avoid traffic outage.
Examples
Configuring and removing the sources allowed per group:

switch(config)# router pim switch(config-pim)# sources-per-group 4 switch(config-pim)# no sources-per-group

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

spt-threshold

PIM-SM commands for IPv4 | 1965

spt-threshold no spt-threshold
Description
Enables the router to switch the multicast traffic flows to the shortest path tree. Default is enabled. The no form of this command disables the routers ability to switch the multicast traffic flows to the shortest path tree. To apply this configuration a user needs to apply disable/enable PIM globally.
Example
Enabling and disabling the SPT threshold:
switch(config)# router pim switch(config-pim)# spt-threshold switch(config-pim)# no spt-threshold

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1966

Chapter 106 PIM-SM commands for IPv6

PIM-SM commands for IPv6

accept-register access-list
accept-register access-list <ACL-RULE> no accept-register access-list <ACL-RULE>
Description
Configures ACL on RP to filter PIM Register packets from unauthorized sources. The ACL specified will contain the (S,G) traffic in register packets to permitted or denied. The no form of this command removes the currently configured ACL rule.

Parameter <ACL-RULE>

Description Specifies the ACL rule name.

Usage
When register ACL is associated with a PIM Router, PIM protocol will store the source and destination address details along with the action (permit or deny). Upon receiving the register messages, a look up is made to check if the S and G in the packet is in the permitted list. If there is no match or if there is a deny rule match, a register stop message is immediately sent and the packet is dropped and no further action is taken. Permitted packets will go through the normal flow. Loopback interfaces are special interfaces where only unicast PIM messages are updated. This includes Register, Register Stop, and Candidate RP Advertisements. When a loopback interface is configured as the RP, the ACL drop counters will be updated on the interface on which the packets are received.
Examples
Configuring ACL on RP with an ACL rule named pim_regv6_acl:

switch(config)# access-list ipv6 pim_regv6_acl switch(config-acl-ipv6)# 10 permit any 20.::1 ff1e::1 switch(config-acl-ipv6)# 20 deny any 30::1 ff1e::3 switch(config)# router pim6 switch(config-pim6)# accept-register access-list pim_regv6_acl

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide

1967

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

accept-rp
accept-rp <IPv6-ADDR> access-list <ACL-RULE> no accept-rp <IPv6-ADDR> access-list <ACL-RULE>
Description
Enables PIM router to filter PIM join/prune messages destined for a specific RP and specific groups. The ACL specifies the group addresses which are allowed or denied. Up to 8 RP addresses and group ACL can be associated with the PIM router. The no form of this command removes the currently configured ACL rule.

Parameter <IPv6-ADDR>
<ACL-RULE>

Description
Specifies an address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the ACL rule name.

Usage
PIM will store the accepted RP address and the associated group ACL. When a join or prune message is received, a RP look up is made for the packet. If the RP is in the configured list and if the group in the join/prune packet is allowed in the ACL, the packet is allowed. Otherwise the packet is dropped. To allow join/prune message from any groups, group address in the ACL can be wild-carded. In this case, only RP address check is performed. This command impacts only (*,G) join/prune messages. If there are any existing flows, the user will need to disable and enable PIM on the interface to apply the ACL. Loopback interfaces are special interfaces where only unicast PIM messages are updated. This includes Register, Register Stop, and Candidate RP Advertisements. When a loopback interface is configured as the RP, the ACL drop counters will be updated on the interface on which the packets are received.
If there is an active flow which is in the SPT, the traffic flow through the SPT will continue. Only (*,G) join/prune messages are dropped. (S,G) join/prune messages will not be impacted.

Examples
Configuring ACL on RP with an ACL rule named pim_rpv6_grp_acl to filter join/prune messages:

PIM-SM commands for IPv6 | 1968

switch(config-pim)# access-list ip pim_rpv6_grp_acl switch(config-acl-ipv6)# 10 permit any any ff2e::2/64 switch(config-acl-ipv6)# 20 permit any any ff1e::1/64 switch(config-acl-ipv6)# router pim6 switch(config-pim6)# accept-rp 30::1 access-list pim_rpv6_grp_acl

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

bsr-candidate bsm-interval
bsr-candidate bsm-interval <INTERVAL-VALUE> no bsr-candidate bsm-interval
Description
Configures the interval in seconds to send periodic RP-Set messages to all PIM-SM interfaces on a router that operates as the BSR in a domain. This setting must be smaller than the rp-candidate hold-time settings (range of 30 to 255; default 150) configured in the RPs operating in the domain. The no form of this command removes the currently configured value and sets it to the default of 60 seconds.

Parameter <INTERVAL-VALUE>

Description
Specifies the BSR-candidate BSM interval in seconds. Range: 5 to 300. Default: 60.

Example
Configuring and removing BSR-candidate BSM-interval:

switch(config)# router pim6 switch(config-pim6)# bsr-candidate bsm-interval 150 switch(config-pim6)# no bsr-candidate bsm-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1969

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

bsr-candidate hash-mask-length
bsr-candidate hash-mask-length <LENGTH-VALUE> no bsr-candidate hash-mask-length
Description
Controls the distribution of multicast groups among the C-RP, in a domain where there is overlapping coverage of the groups among the RPs. This value specifies the length (number of significant bits) when allocating this distribution. A longer hash-mask-length results in fewer multicast groups, for each block of group addresses assigned to the RPs. Multiple blocks of addresses assigned to each C-RP results in wider dispersal of addresses. Includes enhanced load-sharing for the multicast traffic for the different groups that are used in the domain at the same time. The no form of this command removes currently configured value and sets to the default of 126.

Parameter <LENGTH-VALUE>

Description
Specifies the length (in bits) of the hash mask. Range: 1 to 128. Default: 126.

Example
Configuring and removing the BSR-candidate hash-mask-length:

switch(config)# router pim6 switch(config-pim6)# bsr-candidate hash-mask-length 4 switch(config-pim6)# no bsr-candidate hash-mask-length

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

PIM-SM commands for IPv6 | 1970

Platforms
6300 6400

Command context config-pim6

Authority
Administrators or local user group members with execution rights for this command.

bsr-candidate priority
bsr-candidate priority <PRIORITY-VALUE> no bsr-candidate priority
Description
Configures the priority to apply to the router when a BSR election process occurs in the PIM-SM domain. The candidate with the highest priority becomes the BSR for the domain. If the highest priority is shared by multiple routers, the candidate having the highest IP address becomes the BSR of the domain. Zero (0) is the lowest priority. To make BSR selection easily predictable, use this command to assign a different priority to each candidate BSR in the PIM-SM domain. The no form of this command removes currently configured value and sets to the default of 0.

Parameter <PRIORITY-VALUE>

Description
Specifies the priority for the Candidate Bootstrap router. Range: 0 to 255. Default: 0.

Example
Configuring and removing the BSR-candidate priority:

switch(config)# router pim6 switch(config-pim6)# bsr-candidate priority 250 switch(config-pim6)# no bsr-candidate priority

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

bsr-candidate source-ip-interface
bsr-candidate source-ip-interface <INTERFACE-NAME>

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1971

no bsr-candidate source-ip-interface <INTERFACE-NAME>
Description
Configures the router to advertise itself as a candidate PIM-SM BSR on the interface specified, and enables BSR candidate operation. The result makes the router eligible to be elected as the BSR for the PIM-SM domain in which it operates. One BSR candidate interface is allowed per-router. The no form of this command removes the Candidate BSR configuration.

Parameter <INTERFACE-NAME>

Description
Specifies the interface to use as a source for Candidate-BSR router IP address. Interface can be a VLAN interface, routed interface, or LAG. PIM-SM must be enabled on this interface with the command ipv6 pimv6-sparse enable.

Example
On the 6400 Switch Series, interface identification differs. Configuring and removing the BSR-candidate interface:

switch(config)# router pim6 switch(config-pim6)# bsr-candidate source-ip-interface 1/1/4 switch(config-pim6)# no rp-candidate source-ip-interface 1/1/4

Configuring and removing the BSR-candidate sub-interface:

switch(config)# router pim6 switch(config-pim6)# bsr-candidate source-ip-interface 1/1/4 switch(config-pim6)# no rp-candidate source-ip-interface 1/1/4

Configuring sub-interface 1/1/19/10 as Candidate BSR:

switch(config)# router pim6 switch(config-pim6)# bsr-candidate source-ip-interface 1/1/19.10

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

PIM-SM commands for IPv6 | 1972

disable
disable
Description
Disables PIMv6 globally on the router.
Using the disable command will cause all the multicast routes to be erased from hardware.

Example
Disabling PIM router:
switch(config)# router pim6 switch(config-pim6)# disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

enable
enable
Description
Enables PIMv6 globally on the router.
Example
Enabling PIM router:
switch(config)# router pim6 switch(config-pim6)# enable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1973

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 mroute
ipv6 mroute <SRC-ADDR/SRC-MASK> <RPF-ADDRESS> | <INTERFACE-NAME>
Description
Configures multicast reverse path (RPF) forwarding static routes. This command is an alias of the rpfoverride command. The no form of this command removes the mroute configuration.

Parameter <SRC-ADDR>
<SRC-MASK> <RPF-ADDR>
<INTERFACE-NAME>

Description
Specifies the multicast source address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the RPF address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the RPF interface name.

Usage
Reverse Path Forward (RPF) checking is a core multicast routing mechanism. The RPF ensures that the multicast traffic received arrives on the expected router interface before further processing. If the RPF check fails for a multicast packet, the packet is discarded. For multicast traffic flow that arrives on the SPT, the expected incoming interface for a given source or group is the interface towards the source address of the traffic (determined by the unicast routing system). For traffic arriving on the RP tree, the expected incoming interface is the interface towards the RP. RPF checking is applied to all multicast traffic and is significant in preventing network loops. Up to eight manual RPF overrides can be specified. The RPF-address indicates one of two distinct RPF candidates:
1. A valid PIM neighbor address from which forwarded multicast traffic is accepted with a source address of <source-addr/src-mask>.

PIM-SM commands for IPv6 | 1974

2. A local router address on a PIM-enabled interface to which <source-addr/src-mask> is directly connected. If configured, the local router will assume the role of DR for this flow and registers the flow with an RP.
Example
Configuring and removing IP mroute:
switch(config-pim)# router pim6 switch(config-pim6)# ipv6 mroute 50::4/24 tunnel1 switch(config-pim6)# no ipv6 mroute 50::4/24 tunnel1

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.10

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ipv6 pim6-sparse
ipv6 pim6-sparse {enable | disable} no ipv6 pim6-sparse [enable]
Description
Enables or disables PIM-SM on the current interface. PIM-SM is disabled by default on an interface. An IPv6 address must be configured on the interface to enable PIM-SM.

Parameter enable
disable

Description
Enables PIM-SM on the interface. IPv6 address must be configured on the interface to enable PIM-SM (use the ipv6 address <X:X::X:X/M> command).
Disables PIM SM on the interface.

Examples
Enabling and disabling PIM-SM on an interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1975

switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 address 2001::01/64 switch(config-if-vlan)# ipv6 pim6-sparse enable switch(config-if-vlan)# ipv6 pim6-sparse disable
Enabling and disabling PIM-SM on a sub-interface:
switch(config)# interface 1/1/19.10 switch(config-subif)# ipv6 address 90::1/64 switch(config-subif)# ipv6 pim6-sparse enable switch(config-subif)# ipv6 pim6-sparse disable

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-sparse bfd
ipv6 pim6-sparse bfd [disable] no ipv6 pim6-sparse bfd
Description
Configures BFD on a per-interface basis for an interface associated with the PIM process. The no form of this command removes the BFD configuration on the interface and sets it to the default configuration.
If BFD is enabled globally, it will be enabled by default on all interfaces. The only exception is when it is disabled specifically on an interface using the ipv6 pim6-sparse bfd disable command. If BFD is disabled globally, it will be disabled by default on all interfaces. The only exception is when it is enabled specifically on an interface using the ipv6 pim6-sparse bfd command.

Parameter disable

Description Disables the BFD configuration on the interface.

PIM-SM commands for IPv6 | 1976

Examples
Enabling the BFD configuration on the interface: switch(config)# interface vlan 40 switch(config-if-vlan)# ipv6 pim6-sparse bfd
Disabling the BFD configuration on the interface: switch(config-if-vlan)# ipv6 pim6-sparse bfd disable
Removing the BFD configuration on the interface: switch(config-if-vlan)# no ipv6 pim6-sparse bfd

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-sparse dr-priority
ipv6 pim6-sparse dr-priority <PRIORITY-VALUE> no ipv6 pim6-sparse dr-priority
Description
Changes the router priority for the designated router (DR) election process in the current interface. A numerically higher value means a higher priority. If multiple routes share the highest priority, the router with the highest IP address is selected as the DR. The no form of this command removes currently configured value and sets to the default of 1.

Parameter <PRIORITY-VALUE>

Description
Specifies the priority value to use on the interface in the DR election process. Range: 0 to 4294967295. Default: 1.

Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1977

Configuring and removing the interface priority value:
switch(config)# interface vlan 40 switch(config-if-vlan)# ipv6 pim6-sparse dr-priority 4444 switch(config-if-vlan)# no ipv6 pim6-sparse dr-priority
Configuring and removing the interface priority value:
switch(config)# interface 1/1/19.10 switch(config-if-vlan)# ipv6 pim6-sparse dr-priority 2000 switch(config-if-vlan)# no ipv6 pim6-sparse dr-priority

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-sparse hello-delay
ipv6 pim6-sparse hello-delay <DELAY-VALUE> no ipv6 pim6-sparse hello-delay
Description
Configures the maximum time in seconds before the router actually transmits the initial PIM hello message on the current interface. The no form of this command removes currently configured value and sets to the default of 5 seconds.

Parameter <DELAY-VALUE>

Description
Specifies the hello-delay in seconds, which is the maximum time before a triggered PIM Hello message is transmitted on this interface. Range: 0 to 5. Default: 5.

Usage
n In cases where a new interface activates connections with multiple routers. If all the connected routers sent hello packets at the same time, the receiving router could become momentarily

PIM-SM commands for IPv6 | 1978

overloaded. n This command randomizes the transmission delay to a time between zero and the hello delay
setting. Using zero means no delay. After the router sends the initial hello packet to a newly detected interface, it sends subsequent hello packets according to the current hello interval setting.
Example
Configuring and removing hello-delay interface:
switch(config)# interface vlan 40 switch(config-if-vlan)# ipv6 pim6-sparse hello-delay 4 switch(config-if-vlan)# no ipv6 pim6-sparse hello-delay
Configuring and removing hello-delay on a sub-interface:
switch(config)# interface 1/1/19.10 switch(config-subif)# ipv6 pim6-sparse hello-delay 4 switch(config-subif)# no ipv6 pim6-sparse hello-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-sparse hello-interval
ipv6 pim6-sparse hello-interval <INTERVAL-VALUE> no ipv6 pim6-sparse hello-interval
Description
Configures the frequency at which the router transmits PIM hello messages on the current interface. The no form of this command removes the currently configured value and sets to the default of 30 seconds.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1979

Parameter <INTERVAL-VALUE>

Description
Specifies the frequency at which PIM Hello messages are transmitted on this interface in seconds. Range: 5 to 300. Default: 30.

Usage
n The router uses hello packets to inform neighbor routers of its presence. n The router also uses this setting to compute the hello holdtime, which is included in hello packets
sent to neighbor routers. n Hello holdtime tells neighbor routers how long to wait for the next hello packet from the router. If
another packet does not arrive within that time, the router removes the neighbor adjacency on that interface from the PIM adjacency table, which removes any flows running on that interface. n Shortening the hello interval reduces the hello holdtime. If they do not receive a new hello packet when expected, it changes how quickly other routers stop sending traffic to the router.
Example
Configuring and removing sparse hello-interval:

switch(config-if)# ipv6 pim6-sparse hello-interval 60 switch(config-if)# no ipv6 pim6-sparse hello-interval

Configuring and removing sparse hello-interval on a sub-interface:

switch)config)# interface 1/1/19.10 switch(config-subif)# ipv6 pim6-sparse hello-interval 100 switch(config-subif)# no ipv6 pim6-sparse hello-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-sparse ipv6-addr
ipv6 pim6-sparse ipv6-addr {<IPv6-ADDR-VALUE> | any}

PIM-SM commands for IPv6 | 1980

no ipv6 pim6-sparse ipv6-addr
Description
Enables the router to dynamically determine the source IP address to use for PIM-SM packets sent from the interface or to use the specific IPv6 address. The no form of this command removes the currently configured value and sets to the default of any.

Parameter <IP-ADDR-VALUE>
any

Description
Specifies the source IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies dynamically determining the source IP from the current IP address of the interface.

Examples
Configuring and removing source IP address:

switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 pim6-sparse ipv6-addr 2001::02 switch(config-if-vlan)# no ipv6 pim6-sparse ipv6-addr

Configuring and removing source IP address on a sub-interface:

switch(config)# interface 1/1/19.10 switch(config-subif)# ipv6 pim6-sparse ipv6-addr 2001:1::1 switch(config-if-vlan)# no ipv6 pim6-sparse ipv6-addr 2001:1::1

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-sparse lan-prune-delay
ipv6 pim6-sparse lan-prune-delay no ipv6 pim6-sparse lan-prune-delay

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1981

Description
Enables the LAN prune delay option on the current interface. The default is enabled. With LAN-prune-delay enabled, the router informs downstream neighbors how long it will wait before pruning a flow after receiving a prune request. Other downstream routers on the same interface must send a join to override the prune before the LAN-prune-delay time to continue the flow. Prompts any downstream neighbors with multicast receivers continuing to belong to the flow to reply with a join. If no joins are received after the LAN-prune-delay period, the router prunes the flow. The propagationdelay and override-interval settings determine the LAN-prune-delay setting. The no form of this command disables the LAN prune delay option.
Example
Enabling and disabling the LAN prune delay:
switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 pim6-sparse lan-prune-delay switch(config-if-vlan)# no ipv6 pim6-sparse lan-prune-delay
Enabling and disabling the LAN prune delay on a sub-interface:
switch(config)# interface 1/1/19.10 switch(config-subif)# ipv6 pim6-sparse lan-prune-delay switch(config-subif)# no ipv6 pim6-sparse lan-prune-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-subif

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 pim6-sparse override-interval
ipv6 pim6-sparse override-interval <INTERVAL-VALUE> no ipv6 pim6-sparse override-interval
Description
Configures the override interval that gets inserted into the Override Interval field of a LAN Prune Delay option.

PIM-SM commands for IPv6 | 1982

The no form of this command removes the currently configured value and sets the value to the default of 2500 ms.

Parameter <INTERVAL-VALUE>

Description
Specifies the override interval of a LAN Prune Delay option in ms. Range: 500 to 6000. Default: 2500.

Usage
A router sharing a VLAN with other multicast routers uses the override-interval value along with the propagation-delay value to compute the lan-prune-delay setting. The setting specifies how long to wait for a PIM-SM join after receiving a prune packet from downstream for a particular multicast group. Example scenario: A network may have multiple routers sharing VLAN X. When an upstream router is forwarding traffic from multicast group X to VLAN Y, if one of the routers on VLAN Y does not want this traffic, it issues a prune response to the upstream neighbor. The upstream neighbor then goes into a prune pending state for group X on VLAN Y. During this period, the upstream neighbor continues to forward the traffic. During the pending period, another router on VLAN Y can send a group X join to the upstream neighbor. If this happens, the upstream neighbor drops the prune pending status and continues forwarding the traffic. But if no routers on the VLAN send a join, the upstream router prunes.
Example
Configuring and removing the override interval:

switch(config)# interface vlan40 switch(config-if-vlan)# ipv6 pim6-sparse override-interval 4000 switch(config-if-vlan)# no ipv6 pim6-sparse override-interval

Configuring and removing the override interval on a sub-interface:

switch(config)# interface 1/1/19.10 switch(config-subif)# ipv6 pim6-sparse override-interval 5000 switch(config-subif)# no ipv6 pim6-sparse override-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6300

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1983

Platforms 6400

Command context
config-if-vlan config-lag-if config-subif

Authority for this command.

ipv6 pim6-sparse propagation-delay
ipv6 pim6-sparse propagation-delay <DELAY-VALUE> no ipv6 pim6-sparse propagation-delay
Description
Configures the propagation delay that gets inserted into the LAN prune delay field of a LAN Prune Delay option. The no form of this command removes currently configured value and sets to the default of 500 ms.

Parameter <DELAY-VALUE>

Description
Specifies the propagation delay value in ms. Range: 250 to 2000. Default: 500.

Examples
Configuring and removing the propagation delay:

switch(config)# interface vlan 40 switch(config-if-vlan)# ipv6 pim6-sparse propagation-delay 400 switch(config-if-vlan)# no ipv6 pim6-sparse propagation-delay

Configuring and removing the propagation delay on a sub-interface:

switch(config)# interface 1/1/19.10 switch(config-subif)# ipv6 pim6-sparse propagation-delay 1000 switch(config-subif)# no ipv6 pim6-sparse propagation-delay

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6300

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights

PIM-SM commands for IPv6 | 1984

Platforms 6400

Command context
config-if-vlan config-lag-if config-subif

Authority for this command.

join-prune-interval
join-prune-interval <INTERVAL-VALUE> no join-prune-interval
Description
Configures the frequency at which the router will send periodic join or prune-interval messages. The no form of this command sets the interval to the default value of 60 seconds.

Parameter <INTERVAL-VALUE>

Description
Specifies the join-prune-interval in seconds. Range 5 to 65535. Default: 60.

Examples
Configuring join prune interval:

switch(config)# router pim6 switch(config-pim6)# join-prune-interval 400 switch(config-pim6)# no join-prune-interval

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

no ipv6 pim6-sparse
no ipv6 pim6-sparse
Description
Removes all the PIM-SM related IPv6 configurations for the interface.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1985

Example
Removing PIM-SM configuration:
switch(config)# interface vlan40 switch(config-if-vlan)# no ipv6 pim6-sparse

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

rp-address access list
rp-address <IPv6-ADDR> [access-list <ACL-NAME>][override] no rp-address <IPv6-ADDR> [access-list <ACL-NAME>][override]
Description
Statically configures the router as the RP and associates the static RP to the specified ACL. The no form of this command removes static RP ACL configuration.

Parameter <IPv6-ADDR>
access-list <ACL-NAME>

Description
Specifies an address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the name of the access control list.

override

Specifies whether or not static RP configuration precedes the information learned by a BSR.

Usage
The ACL includes a list of permitted/ denied group addresses for the specified RP.
n When configured on a source DR, only permitted group addresses are registered to the RP. When applied on other routers, (\*,G) PIM join/prune messages are filtered according to the applied ACL.

PIM-SM commands for IPv6 | 1986

n Only destination group addresses in the ACEs are filtered and any other fields configured in the ACE are ignored. If only PIM (\*,G) messages need to be filtered, configure accept-rp ACLs.
n When static RP ACL is configured, only one static RP can be configured per VRF and that configured RP handles all the multicast groups in range ff00::/8.
A change in the RP ACL does not impact the flows that have already switched to SPT. Only when the source information is expired and the RP is needed to establish the multicast tree, is the change in the ACL reflected. If the source is always active, PIM can be disabled and re-enabled to clear the learned sources information and reestablish multicast trees based on the latest RP ACL configurations.
Examples
Configuring the static RP ACL:
... access-list ip static_rp6_acl 10 permit any any ff2e::2/64 20 permit any any ff1e::1/64
switch(config)# router pim6 switch(config-pim6)# rp-address 30::1 access-list static_rp6_acl
Removing the static RP ACL configuration:
switch(config-pim)# no rp-address 30::1 access-list static_rp6_acl

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.10 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification Added optional access list parameter [access-list <ACL-NAME>] --
Authority Administrators or local user group members with execution rights for this command.

rp-address
rp-address <IPv6-ADDR> [<GRP-ADDR/GRP-MASK>] [override] no rp-address <IPv6-ADDR> [<GRP-ADDR/GRP-MASK>] [override]
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1987

Statically configures the router as the RP for a specified multicast group or range of multicast groups. This must be configured on all PIM-SM routers in the domain. If group address is not specified, it applies to all IPv6 multicast addresses.
The no form of this command removes static RP configuration and its precedence.

Parameter <IPv6-ADDR>
<GRP-ADDR>
<GRP-MASK> override

Description
Specifies an address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the range of multicast group addresses in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies higher precedence to static RP over Candidate RP.

Usage
Where a static RP and a C-RP are configured to support the same multicast groups and the multicast group mask for the static RP is equal to or greater than the same mask for the applicable C-RPs, this command assigns the higher precedence to the static RP, resulting in the C-RP operating only as a backup RP for the configured group. Without override, the C-RP has precedence over a static RP configured for the same multicast group or groups.
Examples

switch(config)# router pim6 switch(config-pim6)# rp-address 2001::01 ff08::1:3/64 ovverride switch(config-pim6)# rp-address 2002::02 ff08::1:4/64 switch(config-pim6)# no rp-address 2002::02 ff08::1:4/64

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

rp-candidate group-prefix

PIM-SM commands for IPv6 | 1988

rp-candidate group-prefix <GRP-ADDR/GRP-MASK> no rp-candidate group-prefix <GRP-ADDR/GRP-MASK>
Description
Adds multicast group address to the current Candidate Rendezvous Point (C-RP) configuration. The no form of this command removes C-RP multicast group address.

Parameter <GRP-ADDR>
<GRP-MASK>

Description
Specifies the multicast group address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.

Examples
Configuring and removing candidate group prefix:

switch(config)# router pim6 switch(config-pim6)# rp-candidate group-prefix ff08::1:3/64 switch(config-pim6)# no rp-candidate group-prefix ff08::1:3/64

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

rp-candidate hold-time
rp-candidate hold-time <TIME-VALUE> no rp-candidate hold-time
Description
Changes the hold-time a C-RP includes in its advertisements to the BSR. Hold-time is included in the advertisements the C-RP periodically sends to the elected BSR for the domain. Also updates the BSR on how long to wait after the last advertisement from the reporting RP before assuming it has become unavailable.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1989

The no form of this command removes the currently configured value and sets it to the default value 150 seconds.

Parameter <TIME-VALUE>

Description
Specifies the hold-time value in seconds to be sent in C-RP-Adv messages. Range: 30 - 255. Default: 150.

Example
Setting and removing the candidate holdtime:

switch(config)# router pim6 switch(config-pim6)# rp-candidate hold-time 250 switch(config-pim6)# no rp-candidate hold-time

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

rp-candidate priority
rp-candidate priority <PRIORITY-VALUE> no rp-candidate priority
Description
Changes the current priority setting for a C-RP. Where multiple C-RP configurations are used to support the same multicast groups, the candidate having the highest priority is elected. Zero (0) is the highest priority, and 255 is the lowest priority. The no form of this command removes the currently configured value and sets it to the default of 192.

Parameter <PRIORITY-VALUE>

Description
Specifies the priority value for the Candidate-RP router. Range: 0 to 255. Default: 192.

Example
Configuring and removing candidate priority:

PIM-SM commands for IPv6 | 1990

switch(config)# router pim6 switch(config-pim6)# rp-candidate priority 250 switch(config-pim6)# no rp-candidate priority

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim

Modification --
Authority Administrators or local user group members with execution rights for this command.

rp-candidate source-ip-interface
rp-candidate source-ip-interface <INTERFACE-NAME> [group-prefix <GRP-ADDR/GRP-MASK>] no rp-candidate source-ip-interface <INTERFACE-NAME> [group-prefix <GRP-ADDR/GRP-MASK>]
Description
Enables the Candidate Rendezvous Point (C-RP) operation, and configures the router to advertise itself as a C-RP to the Bootstrap Router (BSR) for the current domain. This step includes the option to allow the C-RP to be a candidate for all possible multicast groups, or for up to four multicast groups, or ranges of groups. If group-prefix is not given, it considers for all multicast group addresses. The no form of this command removes the C-RP configuration.

Parameter <INTERFACE-NAME>
group-prefix <GRP-ADDR/GRP-MASK>

Description
Specifies the interface to use as a source for the C-RP router IP address.
Specifies the multicast group address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. And the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.

Examples
Configuring a C-RP using VLAN 40 as the source for the C-RP router IP address and associating the ff08::1:3/64 multicast group with the C-RP router:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1991

switch(config)# router pim6 switch(config-pim6)# rp-candidate source-ip-interface vlan40 group-prefix ff08::1:3/64
Configuring a C-RP using loopback1 as the source for the C-RP router IP address and associating the ff08::1:3/64 multicast group with the C-RP router:
switch(config)# router pim6 switch(config-pim6)# rp-candidate source-ip-interface loopback1 group-prefix ff08::1:3/64
Configuring sub-interface 1/1/19.10 as candidate RP:
switch(config)# router pim6 switch(config-pim6)# rp-candidate source-ip-interface 1/1/19.10
Removing the candidate source IP interface:
switch(config-pim6)# no rp-candidate source-ip-interface vlan20

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

rpf-override
rpf-override <SRC-ADDR/SRC-MASK> <RPF-ADDR|INTERFACE-NAME> no rpf-override <SRC-ADDR/SRC-MASK> <RPF-ADDR|INTERFACE-NAME>
Description
The Reverse Path Forward (RPF) override, allows overriding the normal RPF lookup mechanism, and indicates to the router that it may accept multicast traffic on an interface other than the one that the RPF lookup mechanism would normally select. This includes accepting traffic from an invalid source IP address for the subnet or VLAN that is directly connected to the router. Traffic may also be accepted from a valid PIM neighbor that is not on the reverse path towards the source of the received multicast traffic. The no form of this command removes currently configured RPF entry.

PIM-SM commands for IPv6 | 1992

Parameter <SRC-ADDR>
<SRC-MASK> <RPF-ADDR>
<INTERFACE-NAME>

Description
Specifies the multicast source address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the RPF address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the RPF interface name.

Usage
Reverse Path Forward (RPF) checking is a core multicast routing mechanism. The RPF ensures that the multicast traffic received arrives on the expected router interface before further processing. If the RPF check fails for a multicast packet, the packet is discarded. For multicast traffic flow that arrives on the SPT, the expected incoming interface for a given source or group is the interface towards the source address of the traffic (determined by the unicast routing system). For traffic arriving on the RP tree, the expected incoming interface is the interface towards the RP. RPF checking is applied to all multicast traffic and is significant in preventing network loops. Up to eight manual RPF overrides can be specified. The RPF-address indicates one of two distinct RPF candidates:
1. A valid PIM neighbor address from which forwarded multicast traffic is accepted with a source address of <source-addr/src-mask>.
2. A local router address on a PIM-enabled interface to which <source-addr/src-mask> is directly connected. If configured, the local router will assume the role of DR for this flow and registers the flow with an RP.
Example
Configuring and removing RPF override:

switch(config)# router pim6 switch(config-pim6)# rpf-override 50::4/24 40::1 switch(config-pim)# no rpf-override 50::4/24 40::1

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1993

Platforms
6300 6400

Command context config-pim6

Authority
Administrators or local user group members with execution rights for this command.

show ipv6 mroute <GROUP-ADDR>
show ipv6 mroute <GROUP-ADDR> [<SOURCE-ADDR>] [all-vrfs | vrf <vrf-name>] [vsx-peer]
Description
Shows the multicast routing information for the given group address. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter <GROUP-ADDR>
<SOURCE-ADDR>
all-vrfs vrf <VRF-NAME> vsx-peer

Description
Specifies a group address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies a source IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing information for group ff08::1:3 and VRF green:

switch# show ipv6 mroute ff08::1:3 vrf green

VRF : green

Group Address

: ff08::1:3

Source Address

: 2001::03

Neighbor

: 2003::04

Incoming interface

: 1/1/1

Outgoing Interface List :

Interface

State

---------

-----

1/1/4

pruned

Showing information for group ff08::1:3 from source 2001::03 and all VRFs:

switch# show ipv6 mroute ff08::1:3 2001::03 all-vrfs VRF : blue

PIM-SM commands for IPv6 | 1994

Group Address

: ff08::1:3

Source Address

: 2001::03

Neighbor

: 2003::04

Incoming interface

: 1/1/1

Outgoing Interface List :

Interface

State

---------

-----

1/1/4

pruned

VRF : green

Group Address

: ff08::1:3

Source Address

: 2001::03

Neighbor

: 2003::04

Incoming interface

: 1/1/2

Outgoing Interface List :

Interface

State

---------

-----

1/1/4

pruned

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 mroute
show ipv6 mroute [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows multicast routing information. Optionally, you can show specific information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description Shows information for all VRFs. Specifies the name of a VRF. Default: default. Shows the output from the VSX peer switch. If the switches do not

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1995

Parameter

Description
have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing IPv6 mroute information for the default VRF:

Switch# show ipv6 mroute IP Multicast Route Entries

VRF : default Total number of entries : 1

Group Address

: ff32::10

Source Address

: fd00:192:168:20::2

SSM Mroute

: True

Neighbor

: fe80::f403:4301:1422:2600

Uptime

: 00:14:05

State

: route

Incoming interface

: 1/1/5

Outgoing Interface List :

Interface

State

-----------

----------

vlan20

forwarding

Showing IPv6 mroute information for all VRFs:

switch# do show ipv6 mroute all-vrfs IP Multicast Route Entries

VRF : default Total number of entries : 1

Group Address

: ff32::10

Source Address

: fd00:192:168:2::100

SSM Mroute

: True

Neighbor

: fe80::eceb:b801:14e4:2900

Uptime

: 00:19:20

State

: route

Incoming interface

: 1/1/4

Outgoing Interface List :

Interface

State

-----------

----------

vlan20

forwarding

VRF : red Total number of entries : 1

Group Address

: ff32::11

Source Address

: 30::3

SSM Mroute

: True

Neighbor

: fe80::eceb:b880:1fe4:2900

Uptime

: 00:01:13

State

: route

Incoming interface

: vlan31

Outgoing Interface List :

Interface

State

PIM-SM commands for IPv6 | 1996

----------vlan32

---------forwarding

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 mroute brief
show ipv6 mroute brief [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows brief version of the multicast routing information. Optionally, you can specify the display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows mroute information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing the IPv6 mroute brief:

switch# show ipv6 mroute brief all-vrfs IP Multicast Route Entries

VRF : blu Total number of entries : 2

Group Address : ff08::1:3

Source Address : 2002::04

Neighbor

: 2003::04

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1997

Interface

: 1/1/2

Group Address : ff08::1:4

Source Address : 2002::03

Neighbor

: 2003::05

Interface

: 1/1/3

VRF : default Total number of entries : 1

Group Address : ff08::1:5

Source Address : 2001::03

Neighbor

: 2002::01

Interface

: 1/1/1

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6
show ipv6 pim6 [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the PIM router information. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing the IPv6 PIM router:

PIM-SM commands for IPv6 | 1998

switch# show ipv6 pim6
PIM Global Parameters
VRF PIM Status Join/Prune Interval (sec) SPT Threshold

: default : Enabled : 46 : Disabled

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 bsr
show ipv6 pim6 bsr [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the information about BSR candidates in the domain and multicast groups it supports. Optionally, you can specify the display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing information about BSR candidates:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

1999

switch# show ipv6 pim6 bsr all-vrfs

Status and Counters- PIM-SM(IPv6) Bootstrap Router Information

VRF E-BSR Address E-BSR Priority E-BSR Hash Mask Length E-BSR Up Time Next Bootstrap Message

: blu : 2006::06 :0 :0 : 0 secs : 0 secs

C-BSR Admin Status

: This system is a Candidate-BSR

C-BSR Address

: 2007::01

C-BSR Priority

: 40

C-BSR Hash Mask Length : 36

C-BSR Message Interval : 50

C-BSR Source IP Interface : lag1

C-RP Admin Status C-RP Address C-RP Hold Time C-RP Advertise Period C-RP Priority C-RP Source IP Interface

: This system is a Candidate-RP : 2007::01 : 60 : 60 : 46 : lag1

Group Prefix Group Prefix Group Prefix

: ff00::/8 : ff08::1:3/64 : ff08::1:4/64

VRF E-BSR Address E-BSR Priority E-BSR Hash Mask Length E-BSR Up Time Next Bootstrap Message

: default : 2001::01 : 40 : 36 : 53 mins : 88 secs

C-BSR Admin Status

: This system is a Candidate-BSR

C-BSR Address

: 2001::01

C-BSR Priority

: 40

C-BSR Hash Mask Length : 36

C-BSR Message Interval : 50

C-BSR Source IP Interface : 1/1/1

C-RP Admin Status C-RP Address C-RP Hold Time C-RP Advertise Period C-RP Priority C-RP Source IP Interface

: This system is a Candidate-RP : 2001::01 : 60 : 60 : 46 : 1/1/1

Group Prefix Group Prefix Group Prefix

: ff00::/8 : ff08::1:5/64 : ff08::1:6/64

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

PIM-SM commands for IPv6 | 2000

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 bsr elected
show ipv6 pim6 bsr elected [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows information about the elected BSR in the domain and multicast groups it supports. Optionally you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM elected bootstrap router information:

switch# show ipv6 pim6 bsr elected all-vrfs

Status and Counters - PIM-SM(IPv6) Elected Bootstrap Router Information

VRF E-BSR Address E-BSR Priority E-BSR Hash Mask Length E-BSR Up Time Next Bootstrap Message

: blu : 2005::05 :0 :0 : 0 secs : 0 secs

VRF E-BSR Address E-BSR Priority E-BSR Hash Mask Length E-BSR Up Time Next Bootstrap Message

: default : 2002::02 :0 : 30 : 50 mins : 88 secs

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2001

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 bsr local
show ipv6 pim6 bsr local [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the information about BSR candidates on the local router and multicast groups it supports. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing local Candidate BSR:

switch# show ipv6 pim6 bsr local all-vrfs

Status and Counters - PIM-SM(IPv6) Local Candidate-BSR Information

VRF

: blu

C-BSR Admin Status

: This system is a Candidate-BSR

C-BSR Address

: 2007::01

C-BSR Priority

: 40

C-BSR Hash Mask Length : 36

C-BSR Message Interval : 50

C-BSR Source IP Interface : lag1

PIM-SM commands for IPv6 | 2002

VRF

: default

C-BSR Admin Status

: This system is a Candidate-BSR

C-BSR Address

: 2001::01

C-BSR Priority

: 40

C-BSR Hash Mask Length : 36

C-BSR Message Interval : 50

C-BSR Source IP Interface : 1/1/1

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 interface <INTERFACE-NAME>
show ipv6 pim6 interface <INTERFACE-NAME> [vsx-peer]
Description
Shows detailed information about the PIM interface currently configured.

Parameter <INTERFACE-NAME>
vsx-peer

Description
Specifies an interface for showing PIM interface information. Interface can also be a LAG or VLAN.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
On the 6400 Switch Series, interface identification differs. Showing PIM interface information for interface 1/1/1:

switch# show ipv6 pim6 interface 1/1/1 PIM Interfaces

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2003

VRF: default

Interface : 1/1/1

IPv6 Address : fe80::a00:9ff:feec:dc0e/64

Mode

: sparse

Designated Router :

Hello Interval (sec) : 30

Hello Delay (sec)

:4

Override Interval (msec) : 500

Propagation Delay (msec) : 350

Neighbor Timeout

:0

Lan Prune Delay DR Priority

: Yes :3

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 interface
show ipv6 pim6 interface [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the information about PIM interfaces currently configured in the router. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM interface:

PIM-SM commands for IPv6 | 2004

switch# show ipv6 pim6 interface PIM Interfaces

VRF: default

Interface

IP Address

mode

------------------ --------------------------------------------------------------

----------

1/1/1

fe80::a00:9ff:feec:dc0e/64

sparse

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 neighbor
show ipv6 pim6 neighbor [<IPv6-ADDR>] [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows PIM neighbor information. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter <IPv6-ADDR>
all-vrfs vrf <VRF-NAME> vsx-peer

Description
Specifies a neighbor address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2005

On the 6400 Switch Series, interface identification differs. Showing PIM neighbor information:

switch# show ipv6 pim6 neighbor

PIM Neighbor

VRF IP Address Interface Up Time (sec) Expire Time (sec) DR Priority

: default : 2001::02 : 1/1/1 :0 :0 : 44

Showing PIM neighbor information (including the presence of anycast neighbors) for all VRFs:

switch# show ipv6 pim6 neighbor all-vrfs PIM Neighbor

VRF

: red

Total number of neighbors : 2

IPv6 Address Interface Up Time (HH:MM:SS) Expire Time (HH:MM:SS) DR Priority Hold Time (HH:MM:SS)

: fe80::5:5:5:5 : vni10000 : 06:57:07 : 00:03:26 :1 : 00:03:30

IPv6 Address Interface Up Time (HH:MM:SS) Expire Time (HH:MM:SS) DR Priority Hold Time (HH:MM:SS) Secondary IP Addresses

: fe80::3821:c780:a5c:18c0 : vlan10 : 00:01:46 : 00:01:29 :1 : 00:01:45 :100:100::3

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

PIM-SM commands for IPv6 | 2006

show ipv6 pim6 pending
show ipv6 pim6 pending [<GROUP-ADDR>] [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the pending joins on a PIM router. Optionally you can specify display information by VRF. If no options are specified, it shows information for the default VRF. Use this command to determine what flows are being requested on the PIM network. If data availability for a flow is expected, and a join for the flow is pending, the troubleshooting search moves to the source of that flow, since the routers are verified to be seeing the request for data.

Parameter <GROUP-ADDR>
all-vrfs vrf <VRF-NAME> vsx-peer

Description
Specifies a group address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
On the 6400 Switch Series, interface identification differs. Showing pending PIM joins:

switch# show ipv6 pim6 pending Join Pending

VRF : default Group ff08::1:3 (*,G) Pending Incoming Interface: Group ff08::1:4 (*,G) Pending Incoming Interface:

1/1/1 1/1/1

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2007

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 rp
show ipv6 pim6 rp [<group-ip>] [{vrf <vrf-name>}|all-vrfs]
Description
Displays the rendezvous point (RP) address for a particular group in the given VRF. The output of this command also includes the type of RP (static or dynamic) and the uptime for the mapping. This information can help verify that Group-to-RP mapping is consistent across all routers in the network. If the group-ip parameter is not included, the output of this command displays the group-to-RP mappings of those groups with active multicast traffic in the given VRF. If a VRF name is not specified, the output of this command displays information for the default VRF.

Parameter <group-ip> vrf <VRF-NAME> all-vrfs

Description Display group-to-RP mappings for the specified group. Specifies the name of a VRF. The default VRF is named default. Selects all VRFs.

Example
Showing RP mapping information for a single group:

switch# show ipv6 pim6 rp ff57::3

VRF: default

PIM-SM(IPv6) Group-to-Resultant_RP Mapping Information

Group Address

: ff57::3

RP Address

: Not Found

RP Type

:-

Up Time (HH:MM:SS) : -

Showing RP mapping for all VRFs:

switch# show ipv6 pim6 rp all-vrfs

VRF: default

PIM-SM(IPv6) Group-to-Resultant_RP Mapping Information

Group Address

: ff56::7

RP Address

: 2002::2

RP Type

: bsr

Up Time (HH:MM:SS) : 00:45:20

PIM-SM commands for IPv6 | 2008

VRF: red

PIM-SM(IPv6) Group-to-Resultant_RP Mapping Information

Group Address

: ff55::5

RP Address

: 4001::1

RP Type

: static

Up Time (HH:MM:SS) : 02:33:50

Group Address

: ff55::6

RP Address

: 3003::3

RP Type

: bsr

Up Time (HH:MM:SS) : 01:30:05

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.10

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 rpf
show ipv6 pim6 rpf [<source-ip-address> [<group-ip-address>]] [vrf <vrf-name> | all-vrfs]
Description
Shows PIM RPF details for the specified source or RP address in the given VRF. It shows the nexthop and interface through which shortest path to the source is available. Additionally, it prints if PIM neighborship is present on the nexthop. If VRF is not given, it displays for default VRF.

Parameter <IP-ADDR> vrfs vrf <VRF-NAME> all-vrfs

Description Show PIM RPF details for the given IPv4/IPv6 (X:X::X:X) address Shows PIM RPF information for specific VRF. Specifies the name of a VRF. Default: default. Shows PIM RPF details in all VRFs.

Examples
Showing PIM RPF for VRF red:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2009

switch# show ipv6 pim6 rpf vrf red

Multicast RPF Details

Origin Codes: C - connected, SM - static-multicast, SU - static-unicast

O - OSPF, B - BGP, R - RIP

VRF: red

IP Address

: 2000::2

RPF Interface : vlan20

RPF Nexthop

:-

PIM Neighbor : no

RPF Route/Mask : 2000::2/128

Origin

:C

In Use

: yes

IP Address RPF Interface RPF Nexthop PIM Neighbor RPF Route/Mask Origin In Use

: 2222::2 : vlan20 : fe80::94f1:2880:141d:a800 : yes : 2222::2/128 :O : yes

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.12

Modification Command introduced

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 rp-candidate
show ipv6 pim6 rp-candidate [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the candidate RP operational and configuration information. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME>

Description Shows information for all VRFs. Specifies the name of a VRF. Default: default.

PIM-SM commands for IPv6 | 2010

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM RP candidate:

switch# show ipv6 pim6 rp-candidate all-vrfs

Status and Counters- PIM-SM(IPv6) Candidate-RP Information

VRF C-RP Admin Status C-RP Address C-RP Hold Time C-RP Advertise Period C-RP Priority C-RP Source IP Interface

: blu : This system is a Candidate-RP : 2007::01 : 60 : 60 : 46 : lag1

Group Prefix Group Prefix Group Prefix

: ff00::/8 : ff08::1:3/64 : ff08::1:4/64

VRF C-RP Admin Status C-RP Address C-RP Hold Time C-RP Advertise Period C-RP Priority C-RP Source IP Interface

: default : This system is a Candidate-RP : 2001::01 : 60 : 60 : 46 : 1/1/1

Group Prefix Group Prefix Group Prefix

: ff00::/8 : ff08::1:5/64 : ff08::1:6/64

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2011

show ipv6 pim6 rpf-override
show ipv6 pim6 rpf-override [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the RPF override configuration, which can be useful information when troubleshooting potential RPF misconfigurations. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM RPF override:

switch# show ipv6 pim6 rpf-override all-vrfs
VRF : Green Static RPF Override Multicast Source : 2003::1/128 RPF IPv6 Address : 2001::01 Multicast Source : 2005::1/128 RPF IPv6 Address : 2007::01 VRF : Red Static RPF Override Multicast Source : 2004::02/128 RPF IPv6 Address : 2002::02

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

PIM-SM commands for IPv6 | 2012

show ipv6 pim6 rp-registered-source
show ipv6 pim6 rp-registered-sources all-vrfs
Description
Displays the registered sources information on the RP router. This command shows information about the active multicast flows that are registered by the source designated router (DR) to this Rendezvous Point (RP). When the multicast source becomes inactive, the entry will be removed from this table. Note that this command displays only the set of flows that have been registered successfully for which the current router is the RP.
=======

show ipv6 pim6 rp registered sources
show ipv6 pim6 rp-registered-sources <group-address> [source-address] [all-vrfs | vrf <vrf-name>]
Description
Shows information about active multicast flows that are registered by source DR to a specific RP.

Parameter <group-address>
<source-address>
vrf <VRF-NAME> all-vrfs
vrf vrf-name

Description
Shows registered sources information for the group address. Format: X:X::X:X
=======
group-address
(Optional) Shows registered sources information for the group from this source. Format :X:X::X:X
=======
source-address
Displays registered sources information for a specific VRF.
Displays registered sources information for all VRFs.
=======
all-vrfs
Shows registered sources information for specific VRF
Shows registered sources information for the given VRF
>>>>>>> 16436b53 (TECHPUB-300: Fixed existing content and added to TOC)

Shows registered sources information for the group address
Shows registered sources information for the group from selected source.
Shows registered sources information on all VRFs

Example
Showing information about rp-registered-sources in all-vrfs:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2013

switch# show ipv6 pim6 rp-registered-sources all-vrfs

Multicast flows registered with this RP

VRF : default

Total number of entries : 1

Source Address

Group Address

-------------------

--------------------

2001::1

ff55::5

RP Address --------------------
2002::2

Multicast flows registered with this RP

VRF : red

Total number of entries : 1

Source Address

Group Address

--------------------

--------------------

3001::1

ff99::5

RP Address -------------------3002::2

The following example the registered sources information for a specific group and source address.

switch# show ipv6 pim6 rp-registered-sources ff55::5 2001::1

Multicast flows registered with this RP

VRF : default

Total number of entries : 1

Source Address

Group Address

--------------------

--------------------

2001::1

ff55::5

RP Address -------------------3333::3

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.12

Modification Command introduced

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 rpf-override source
show ipv6 pim6 rpf-override source <IPv6-ADDR> [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the RPF override configuration for the specified source. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

PIM-SM commands for IPv6 | 2014

Parameter source <IPv6-ADDR>
all-vrfs vrf <VRF-NAME> vsx-peer

Description
Specifies the RPF source address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing PIM RPF override source:

switch# show ipv6 pim6 rpf-override source 2004::02
VRF : default Static RPF Override Multicast Source : 2004::02/128 RPF IPv6 Address : 2002::02

Showing PIM RPF override source for all VRFs:

switch# show ipv6 pim6 rpf-override source 2004::02 all-vrfs
VRF : Red Static RPF Override Multicast Source : 2004::02/128 RPF IPv6 Address : 2002::02

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 rp-set

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2015

show ipv6 pim6 rp-set [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the multicast group support for both the learned C-RP assignments and any statically configured RP assignments. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM RP set information:

switch# show ipv6 pim6 rp-set all-vrfs

VRF: blu

Status and Counters - PIM-SM(IPv6) Static RP-Set Information

Group Prefix : ff00::/8 RP Address : 2004::04 Override [No] : No

Status and Counters - PIM-SM(IPv6) Learned RP-Set Information

Group Prefix RP Address Hold Time (sec) Expire Time (sec) Group Prefix RP Address Hold Time (sec) Expire Time (sec)

: ff08::1:3/64 : 2007::01 : 60 :0 : ff08::1:4/64 : 2007::01 : 60 : 92

VRF: default

Status and Counters - PIM-SM(IPv6) Static RP-Set Information

Group Prefix : ff00::/8 RP Address : 2003::03 Override [No] : No

Status and Counters - PIM-SM(IPv6) Learned RP-Set Information

Group Prefix RP Address Hold Time (sec) Expire Time (sec) Group Prefix RP Address

: ff08::1:5/64 : 2001::01 : 60 :0 : ff08::1:6/64 : 2002::01

PIM-SM commands for IPv6 | 2016

Hold Time (sec) : 60 Expire Time (sec) : 92

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 rp-set learned
show ipv6 pim6 rp-set learned [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the multicast group support for dynamically learned RP assignments. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing PIM RP set learned information:

switch# show ipv6 pim6 rp-set learned all-vrfs

VRF: blu

Status and Counters - PIM-SM(IPv6) Learned RP-Set Information

Group Prefix

: ff08::1:3/64

RP Address

: 2007::01

Hold Time (sec) : 60

Expire Time (sec) : 0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2017

Group Prefix RP Address Hold Time (sec) Expire Time (sec)

: ff08::1:4/64 : 2007::01 : 60 : 92

VRF: default

Status and Counters - PIM-SM(IPv6) Learned RP-Set Information

Group Prefix

: ff08::1:5/64

RP Address

: 2001::01

Hold Time (sec) : 60

Expire Time (sec) : 0

Group Prefix

: ff08::1:6/64

RP Address

: 2002::01

Hold Time (sec) : 60

Expire Time (sec) : 92

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 rp-set static
show ipv6 pim6 rp-set static [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows the multicast group support for statically configured RP assignments. Optionally, you can specify display information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

PIM-SM commands for IPv6 | 2018

Showing PIM Static RP set information:
switch# show ipv6 pim6 rp-set static all-vrfs
VRF: blu
Status and Counters - PIM-SM(IPv6) Static RP-Set Information
Group Prefix : ff00::/8 RP Address : 2004::04 Override [No] : No
VRF: default
Status and Counters - PIM-SM(IPv6) Static RP-Set Information
Group Prefix : ff00::/8 RP Address : 2003::03 Override [No] : No

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim6 tree-state
show ipv6 pim6 tree-state {<group-ip> [<source-ip>]}|brief [{vrf <vrf-name>}| all-vrfs]
Description
Displays upstream join states for a specified group and source address in a VRF in an IPv6 network. The command displays upstream state, upstream interface and RPF neighbor used to send join messages and a list of downstream interfaces from which join messages are received. The set of downstream interfaces in this command may not show the final list of outgoing interfaces for a flow, which is computed from various internal states and is shown in the output of the command show ip mroute (PIM-SM.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2019

Parameter <group-ip>
<source-ip>
brief vrf <VRF-NAME> all-vrfs

Description
Shows PIM Join details for the specified group IPv6 address
Shows PIM Join details for the specified source IPv6 address. If a source address is not specified, only *,G states are displayed for the specified group. If a source address is specified, (S,G) states are displayed along with (*,G) states and (S,G,RPT) states wherever applicable.
Display brief details for the multicast group and source in a table format.
Show join state details for the specified VRF.
Show join state details for all VRFs.

Usage
The output of this command can indicate one of the following two multicast group (*,G) and multicast source and group (S,G) upstream states:
n Joined : Join sent to upstream RPF neighbor. n Not Joined : Joins not sent upstream.
The following states are applicable to the multicast group (*G), and root path tree (S,G,RPT) only:
n Pruned : Traffic from the source is arriving on the shortest path tree, (*,G) Joined, but (S,G,RPT) pruned.
n Not Pruned : Traffic from the multicast group (*,G) Joined, and (S,G,rpt) not pruned. n RPT Not Joined' : The multicast group (*,G) has not joined.
Examples
Display multicast group (*,G) join information for the VRF red.

show ipv6 pim6 tree-state ff55::1 vrf red

(*,G) Information for Group ff55::1

VRF: red

Upstream Information:

State

: Joined

Joined Interface

: vlan50

RPF Neighbor

: 20::2

Uptime

: 01:58:30

Downstream Information:

Interfaces

: vlan50, vlan201

Display group (*,G), source and group (S,G), and root-path tree (S,G, RPT) Information for group ff55::1 and source IP 30::1.

show ipv6 pim6 tree-state ff55::1 30::1 vrf red (*,G) Information for Group ff55::1 VRF: red

PIM-SM commands for IPv6 | 2020

Upstream Information:

State

: Joined

Joined Interface

: vlan50

RPF Neighbor

: 20::2

Uptime

: 01:58:30

Downstream Information:

Interfaces

: vlan200

(S,G) Information for Group ff55::1 Source 30::1

Upstream Information:

State

: Joined

Joined Interface

: vlan30

RPF Neighbor

: 40::2

Uptime

: 01:57:30

SPT bit set

: True

Downstream Information:

Interfaces

: vlan200

(S,G,RPT) Information for Group ff55::1 Source 30::1

Upstream Information:

State

: Pruned

Joined Interface

: vlan50

RPF Neighbor

: 20::2

Uptime

: 01:58:30

Downstream Information:

Interfaces

: vlan200

Display brief information for the IPv6 PIM6 tree state.

show ipv6 pim6 tree-state brief

State abbreviations :

J - Joined NJ - Not Joined RPTNJ - RPT Not Joined

P - Pruned NP - Not Pruned

---------------------------------------------------------------------------------

VRF : default

---------------------------------------------------------------------------------

Group Address

Source Address

RPF

Uptime

State Type

Neighbor

(HH:MM:SS)

-------------

--------------

----------- ---------- ------ -------

ff5e::1

*

10::2

01:58:30

J

*,G

ff5e::1

2035:135:1::100 10::2

01:58:30

J

S,G

ff5e::2

*

10::2

01:58:30

J

*,G

ff5e::2

2035:135:1::100 20::2

01:58:30

J

S,G

ff5e::2

2035:135:1::100 10::2

01:58:30

P

S,G,RPT

---------------------------------------------------------------------------------

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.14
Command Information

Modification -Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2021

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

sources-per-group
sources-per-group <limit> no sources-per-group <limit>
Description
Configures the total number of sources allowed for a group on the router. By default, there is no limit on the number of sources for a group. When the number of sources for a group exceeds the configured limit, multicast traffic from additional sources will be dropped. The no form of this command removes the currently configured limit value.

Parameter <limit>

Description
Specifies the value to be configured as the sources allowed per group. Range: 1 to 4294967295.

Usage
Flows exceeding the limit will be programmed as a bridge entry and will not have the outgoing interfaces list populated. This configuration does not allow new sources for the group. At the time of configuration, if the device has more sources for the given group than the configured value, already allowed sources continue to exist until they are removed. The flows are programmed in the HW on a FCFS basis. There could be scenarios where the flow is forwarded in neighbor router, but it may not be forwarded on the current router because of exceeding the limits configured on the current router. In such cases, it is recommended to configure higher limits to avoid traffic outage.
Examples
Configuring and removing the sources allowed per group:

switch(config)# router pim6 switch(config-pim6)# sources-per-group 4 switch(config-pim6)# no sources-per-group

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.12
Command Information

Modification Command introduced for IPv6

PIM-SM commands for IPv6 | 2022

Platforms
6300 6400

Command context config-pim6

Authority
Administrators or local user group members with execution rights for this command.

spt-threshold
spt-threshold no spt-threshold
Description
Enables the router to switch the multicast traffic flows to the shortest path tree. Default is enabled. The no form of this command disables the routers ability to switch the multicast traffic flows to the shortest path tree. To apply this configuration a user needs to apply disable/enable PIM globally.
Example
Enabling and disabling the SPT threshold:
switch(config)# router pim6 switch(config-pim6)# spt-threshold switch(config-pim6)# no spt-threshold

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-pim6

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2023

Chapter 107 PIM-SSM commands

PIM-SSM commands
ip igmp apply ssm-map access-list
ip igmp apply ssm-map access-list<ACL-NAME> no ip igmp apply ssm-map access-list<ACL-NAME>
Description
Configures SSM-map ACL on a specific interface. The no form of this command removes the currently configured ACL rule.
Existing classifier commands are used to configure ACL.

Parameter <ACL-NAME>

Description Required. Specifies the ACL rule name.

Restrictions
n ACE using mask for source address will be ignored. n ACE must include unicast source (address/source group) and multicast destination
(address/destination group) as matching criteria. Entries using "any" for source address or destination address will be ignored. n IGMPv3/MLDv2 dynamic joins will be ignored for groups in SSM-map (SSM-map is higher priority).
Usage
n When configured, every incoming IGMPv2/v1 join packet sent to the SSM range group address is converted to (S, G) channels where S is the source address specified in the SSM-map ACL.
n Object-groups can be used to group multiple sources or multiple destination addresses.
Recommendations related to SSM-map:
n Interfaces with SSM-map configured should use version 3 for IGMP and version 2 for MLD. If older versions are used, sources will not be learned.
n If SSM-map configuration is dynamically changed by adding or deleting sources associated with a group, the change will take effect when the next incoming join packet is received.
n SSM-map configuration must be consistent across all L3 nodes in the network. n Multiple ACEs with same destination (address/destination object group) are not recommended as
only the first match will be implemented. If a group must be mapped with multiple sources, source object group can be used instead of having multiple ACEs with the same destination match.
Examples
Creating SSM map ACL:

AOS-CX 10.14 Command-Line Interface Guide

2024

switch(config)# access-list ip SSM_MAP switch(config-acl-ip)# permit ip 30.1.1.1 232.1.1.1 switch(config-acl-ip)# permit ip 20.1.1.1 232.1.1.2
Applying SSM_MAP ACL on a SVI:
switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp apply ssm-map access-list SSM_MAP
Creating SSM map ACL using object groups:
switch(config)# object-group ip address source-group switch(config-addrgroup-ip)# 10.1.1.1 switch(config-addrgroup-ip)# 10.1.1.2 switch(config)# object-group ip address destination-group switch(config-addrgroup-ip)# 232.2.1.1 switch(config-addrgroup-ip)# 232.3.1.1 switch(config)# access-list ip SSM_MAP_OB switch(config-acl-ip)# permit ip source-group 232.1.1.3 switch(config-acl-ip)# permit ip 20.1.1.1 destination-group

In the above configuration:
n When lower version joins are received for group 232.1.1.3, they will be converted to (S,G) channels (10.1.1.1, 232.1.1.3) and (10.1.1.2, 232.1.1.3).
n When lower version joins are received from group 232.2.1.1 and 232.3.1.1, they will be converted to (S, G) channels (20.1.1.1, 232.2.1.1) and (20.1.1.1, 232.3.1.1)

Applying SSM_MAP_OB ACL on a SVI:

switch(config)# interface vlan 10 switch(config-if-vlan)# ip igmp apply ssm-map access-list SSM_MAP_OB

Command History
Release 10.11

Modification Command introduced

Command Information

Platforms
6300 6400

Command context config-if-vlan

Authority
Administrators or local user group members with execution rights for this command.

show ip igmp ssm-map
show ip igmp [ssm-map [vrf <VRF-NAME> | all-vrfs]]

PIM-SSM commands | 2025

Description
Shows IGMP SSM map.
Parameter <VRF-NAME> all-vrfs

Description (Optional) Shows SSM map in a specific VRF. (Optional) Shows SSM map in all VRFs.

Examples
Showing IGMP SSM map:

switch# show ip igmp ssm-map

IGMP SSM-map Information

VRF Name :default

Interface Name SSM-map ACL name

--------------- -----------------

vlan10

ssm-map-1

vlan20

ssm-map-2

1/1/1

ssm-map-1

2/1/1.1

ssm-map-3

Showing IGMP SSM map for all VRFs:

switch# show ip igmp ssm-map all-vrfs

IGMP SSM-map Information

VRF Name :test

Interface Name SSM-map ACL name

--------------- -----------------

vlan30

ssm-map-1

VRF Name :default

Interface Name SSM-map ACL name

--------------- ------------------

vlan10

ssm-map-1

vlan20

ssm-map-2

1/1/1

ssm-map-1

2/1/1.1

ssm-map-3

Command History
Release 10.11

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2026

Chapter 108 PIM-SSM commands for IPv4

PIM-SSM commands for IPv4
pim-ssm
pim-ssm no pim-ssm
Description
Enables PIM source-specific multicast globally on the router. When PIM SSM is enabled, the RP configuration is ignored/ not required for a particular range of multicast addresses. The no form of this command disables PIM-SSM globally on the router. When PIM-SSM is enabled for the SSM range for multicast groups, the following behavior is observed: n PIM joins and prunes are directly sent towards the source. No (*,G) joins or prunes are sent towards
RP. n Only IGMPv3/MLDv2 joins with source include filter are considered for SSM.
Usage
n PIM-SSM is recommended to be configured only on the last hop router or receiver DR if the topology contains a combination of IGMPv2 and IGMPv3, or MLDv1 and MLDv2, clients.
n Configuring or unconfiguring PIM SSM can lead to momentary traffic loss until PIM rebuilds the states.
n PIM-SSM is not supported with VxLAN.
Example
Enabling PIM-SSM on the router:
switch(config)# router pim switch(config-pim)# pim-ssm
Disabling PIM-SSM on the router:
switch(config)# router pim switch(config-pim)# no pim-ssm
For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide

2027

Release 10.09

Command Information

Platforms
6300 6400

Command context config-pim

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

pim-ssm range-access-list
pim-ssm range-access-list <ACL-RULE> no pim-ssm range-access-list <ACL-RULE>
Description
Enables the PIM router to modify the default SSM range. The IPv4 default PIM-SSM group range is 232.0.0.0/8. The no form of this command removes the currently configured ACL rule.

Parameter <ACL-RULE>

Description (Required) Specifies the ACL rule name.

Usage
n In the ACL used to specify the PIM-SSM range, ACEs should contain only multicast group addresses in the destination IP field, else the ACE is ignored.
n Modifying the PIM-SSM range can lead to momentary traffic loss until PIM rebuilds the states. n It is recommended to keep the SSM range the same across the network.
Examples
Creating an IPv4 ACL named pim_ssm_grp_range_acl and applying the ACL as a PIM-SSM range ACL:

switch# configure terminal switch(config)# access-list ip pim_ssm_grp_range_acl switch(config-acl-ip)# 10 permit any any 225.1.1.2/255.255.255.0 switch(config-acl-ip)# 20 permit any any 239.1.1.2/255.255.255.0
switch(config)# router pim switch(config-pim)# pim-ssm range-access-list pim_ssm_grp_range_acl switch(config-pim)# pim-ssm range-access-list pim_ssm_grp_range_acl_1 Failed to configure PIM-SSM Range ACL. ACL pim_ssm_grp_range_acl_1 does not exist.

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

PIM-SSM commands for IPv4 | 2028

Release 10.09

Command Information

Platforms
6300 6400

Command context config-pim

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

show ip mroute
show ip mroute [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows multicast routing information. Optionally, you can show specific information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows mroute information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing IP mroute for the default VRF:

Switch(config-vlan-20)# show ip mroute IP Multicast Route Entries

VRF : default Total number of entries : 1

Group Address

: 232.10.10.10

Source Address

: 192.168.20.2

SSM Mroute

: True

Neighbor

: 192.168.3.0

Uptime

: 02:08:31

State

: route

Incoming interface

: 1/1/5

Outgoing Interface List :

Interface

State

-----------

----------

vlan20

forwarding

Showing IP mroute for all VRFs:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2029

switch# do show ip mroute all-vrfs IP Multicast Route Entries

VRF : default Total number of entries : 1

Group Address

: 232.10.10.10

Source Address

: 192.168.2.100

SSM Mroute

: True

Neighbor

: 192.168.3.0

Uptime

: 00:38:24

State

: route

Incoming interface

: 1/1/4

Outgoing Interface List :

Interface

State

-----------

----------

vlan20

forwarding

VRF : red Total number of entries : 1

Group Address

: 232.11.11.11

Source Address

: 30.0.0.3

SSM Mroute

: True

Neighbor

: 31.0.0.1

Uptime

: 00:32:55

State

: route

Incoming interface

: vlan31

Outgoing Interface List :

Interface

State

-----------

----------

vlan32

forwarding

switch#

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip multicast summary
show ip multicast summary
Description

PIM-SSM commands for IPv4 | 2030

Displays multicast summary information.
Example
Showing multicast summary information:

Switch# show ip multicast summary

Total number of IGMP interfaces

:1

Total number of IGMP snooping VLANS

:0

Total number of IGMP joins

:1

Total number of IGMP snooping joins

:0

Total number of PIM SM enabled VRFs

:1

Total number of PIM SSM enabled VRFs

:1

Total number of PIM DM enabled VRFs

:0

Total number of PIM SM interfaces

:2

Total number of PIM DM interfaces

:0

Total number of PIM SM neighbors

:1

Total number of PIM DM neighbors

:0

Total number of PIM A/A enabled VRF

:0

Total number of PIM A/A enabled interfaces

:0

Total number of PIM SM Mroutes in route state

:1

Total number of PIM SM Mroutes in bridge state

:0

Total number of PIM SSM Mroutes in route state

:1

Total number of PIM SSM Mroutes in bridge state

:0

Total number of PIM DM Mroutes in route state

:0

Total number of PIM DM Mroutes in bridge state

:0

Total number of local multicast flows registered in this RP : 0

Total number of MLD interfaces

:1

Total number of MLD snooping VLANS

:1

Total number of MLD joins

:1

Total number of MLD snooping joins

:1

Total number of PIMv6 SM enabled VRFs

:1

Total number of PIMv6 SSM enabled VRFs

:0

Total number of PIMv6 DM enabled VRFs

:0

Total number of PIMv6 SM interfaces

:2

Total number of PIMv6 DM interfaces

:0

Total number of PIMv6 SM neighbors

:1

Total number of PIMv6 DM neighbors

:0

Total number of PIMv6 A/A enabled VRF

:0

Total number of PIMv6 A/A enabled interfaces

:0

Total number of PIMv6 SM Mroutes in route state

:1

Total number of PIMv6 SM Mroutes in bridge state

:0

Total number of PIMv6 SSM Mroutes in route state

:1

Total number of PIMv6 SSM Mroutes in bridge state

:0

Total number of PIMv6 DM Mroutes in route state

:0

Total number of PIMv6 DM Mroutes in bridge state

:0

Total number of MSDP peers

:0

Total number of SA's learned by MSDP

:0

VRF: default

Total number of IGMP interfaces

:1

Total number of IGMP snooping VLANS

:0

Total number of IGMP joins

:1

Total number of IGMP snooping joins

:0

Total number of PIM SM interfaces

:2

Total number of PIM DM interfaces

:0

Total number of PIM SM neighbors

:1

Total number of PIM DM neighbors

:0

Total number of PIM A/A enabled interfaces

:0

Total number of PIM SM Mroutes in route state

:1

Total number of PIM SM Mroutes in bridge state

:0

Total number of PIM SSM Mroutes in route state

:1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2031

Total number of PIM SSM Mroutes in bridge state

:0

Total number of PIM DM Mroutes in route state

:0

Total number of PIM DM Mroutes in bridge state

:0

Total number of local multicast flows registered in this RP : 0

Total number of MLD interfaces

:1

Total number of MLD snooping VLANS

:1

Total number of MLD joins

:1

Total number of MLD snooping joins

:1

Total number of PIMv6 SM interfaces

:2

Total number of PIMv6 DM interfaces

:0

Total number of PIMv6 SM neighbors

:1

Total number of PIMv6 DM neighbors

:0

Total number of PIMv6 A/A enabled interfaces

:0

Total number of PIMv6 SM Mroutes in route state

:1

Total number of PIMv6 SM Mroutes in bridge state

:0

Total number of PIMv6 SSM Mroutes in route state

:1

Total number of PIMv6 SSM Mroutes in bridge state

:0

Total number of PIMv6 DM Mroutes in route state

:0

Total number of PIMv6 DM Mroutes in bridge state

:0

Total number of MSDP peers

:0

Total number of SA's learned by MSDP

:0

Switch#

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip pim interface interface-name counters
show ip pim interface <INTERFACE-NAME> counters [vsx-peer]
Description
Shows the PIM packet counters information for the specified interface.

Parameter <INTERFACE-NAME> vsx-peer

Description Specifies the interface to show packet counter information. Shows the output from the VSX peer switch. If the switches do not

PIM-SSM commands for IPv4 | 2032

Parameter

Description
have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
Loopback interfaces are special interfaces where only unicast PIM messages are updated. This includes Register, Register Stop, and Candidate RP Advertisements. When a loopback interface is configured as the RP, the ACL drop counters will be updated on the interface on which the packets are received.
Example
Showing PIM packet counters for interface 1/1/5:

Switch(config)# show ip pim interface 1/1/5 counters

Interface : 1/1/5

VRF

: default

Tx Counters :

Hello

310

State Refresh

0

Join/Prune

141

SSM Join/Prune

141

RP Advertisement

0

Graft

0

Graft Ack

0

Assert

0

Bsm

0

Register

0

Register Stop

0

SSM Register Stop

0

Rx Counters :

Hello

308

State Refresh

0

Join/Prune

0

SSM Join/Prune

0

RP Advertisement

0

Graft

0

Graft Ack

0

Assert

0

Bsm

0

Register

0

SSM Register

0

Register Stop

0

Register Drops(Register ACL hitcount) 0

Join/Prune Drops(RP ACL hitcount)

0

Rx Drop Counters :

Hello

0

State Refresh

0

Join/Prune

0

RP Advertisement

0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2033

Graft

0

Graft Ack

0

Assert

0

Bsm

0

Switch(config)#

Showing PIM packet counters for interface VLAN 1:

switch# show ip pim interface vlan1 counters

Interface VRF

: vlan1 : default

Rx Counters :

Hello

4

State Refresh

0

Join/Prune

1

RPadv

0

Graft

0

GraftAck

0

Assert

0

Bsm

0

Register

0

Register Stop

0

Register Drops(Register ACL hitcount) 10

Join/Prune Drops(RP ACL hitcount)

5

Tx Counters :

Hello

9

State Refresh

0

Join/Prune

0

RPadv

0

Graft

0

GraftAck

0

Assert

0

Bsm

0

Register

0

Register Stop

0

Invalid Rx Counters :

Hello

0

State Refresh

0

Join/Prune

0

RPadv

0

Graft

0

GraftAck

0

Assert

0

Bsm

0

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

PIM-SSM commands for IPv4 | 2034

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2035

Chapter 109 PIM-SSM commands for IPv6

PIM-SSM commands for IPv6
ipv6 mld apply ssm-map access-list
ipv6 mld apply ssm-map access-list <ACL-NAME> no ipv6 mld apply ssm-map access-list <ACL-NAME>
Description
Configures SSM-map ACL on a specific interface. The no form of this command removes the currently configured ACL.
Existing calssifier commands are used to configure ACL.

Parameter <ACL-NAME>

Description Required. Specifies the ACL name.

Restrictions
n ACE using mask for source address will be ignored. n ACE must include unicast source (address/source group) and multicast destination
(address/destination group) as matching criteria. Entries using "any" for source address or destination address will be ignored. n IGMPv3/MLDv2 dynamic joins will be ignored for groups in SSM-map (SSM-map is higher priority).
Usage
n When configured, every incoming MLDv1 join packet sent to the same SSMv6 range group address is converted to (S, G) channels where S is the source address specified in the SSM-map ACL.
n Object-groups can be used to group multiple sources or multiple destination addresses.
Recommendations related to SSM-map:
n Interfaces with SSM-map configured should use version 3 for IGMP and version 2 for MLD. If older versions are used, sources will not be learned.
n If SSM-map configuration is dynamically changed by adding or deleting sources associated with a group, the change will take effect when the next incoming join packet is received.
n SSM-map configuration must be consistent across all L3 nodes in the network. n Multiple ACEs with same destination (address/destination object group) are not recommended as
only the first match will be implemented. If a group must be mapped with multiple sources, source object group can be used instead of having multiple ACEs with the same destination match.
Examples
Creating SSM map v6 ACL:

AOS-CX 10.14 Command-Line Interface Guide

2036

switch(config)# access-list ipv6 SSM_MAP_V6 switch(config-acl-ip)# permit ipv6 2003::1 ff34::1 switch(config-acl-ip)# permit ipv6 2002::1 ff36::1 switch(config-acl-ip)# exit
Applying SSM_MAP_V6 ACL on SVI 2:
switch(config)# interface vlan 2 switch(config-if-vlan)# ipv6 mld apply ssm-map access-list SSM_MAP_V6
Creating SSM map V6 ACL with object groups:
switch(config)# object-group ipv6 address source-group-ipv6 switch(config-addrgroup-ipv6)# 2001::1 switch(config-addrgroup-ipv6)# 2001::2 switch(config)# object-group ipv6 address destination-group-ipv6 switch(config-addrgroup-ipv6)# ff31::1 switch((config-addrgroup-ipv6)# ff32::1 switch(config)# access-list ipv6 SSM_MAP_V6_OB switch(config-acl-ip)# permit ipv6 source-group-ipv6 ff36::1 switch(config-acl-ip)# permit ipv6 2004::1 destination-group-ipv6
Applying SSM_MAP_V6_OB ACL on SVI 10:
switch(config)# interface vlan 10 switch(config-if-vlan)# ipv6 mld apply ssm-map access-list SSM_MAP_V6_OB

In the above configuration:
n When lower version joins are received for group ff36::1, they will be converted to (S, G) channels (2001::1, ff36::1) and (2001::2, ff36::1).
n When lower version joins are received for group ff31::1 and ff32::1, they will be converted to (S, G) channels (2003::1, ff31::1) and (2003::1, ff32::1).

Command History
Release 10.11

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

pim-ssm

PIM-SSM commands for IPv6 | 2037

pim-ssm no pim-ssm
Description
Enables PIM-SSM globally on the router. When PIM-SSM is enabled, the RP configuration is ignored/ not required for a particular range of multicast addresses. The no form of this command disables PIM-SSM globally on the router. When PIM-SSM is enabled for the SSM range for multicast groups, the following behavior is observed:
n PIM joins and prunes are directly sent towards the source. No (*,G) joins or prunes are sent towards RP.
n Only IGMPv3/MLDv2 joins with source include filter are considered for SSM.
Usage
n PIM-SSM is recommended to be configured only on the last hop router or receiver DR if the topology contains a combination of IGMPv2 and IGMPv3, or MLDv1 and MLDv2, clients.
n Configuring or unconfiguring PIM SSM can lead to momentary traffic loss until PIM rebuilds the states.
n PIM-SSM is not supported with VxLAN.
Example
Entering the PIMv6 configuration context and enabling PIM-SSM on the router:
switch(config)# router pim6 switch(config-pim6)# pim-ssm
Disabling PIM-SSM on the router:
switch(config)# router pim6 switch(config-pim6)# no pim-ssm

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms
6300 6400

Command context config-pim6

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2038

pim-ssm range-access-list
pim-ssm range-access-list <ACL-RULE> no pim-ssm range-access-list <ACL-RULE>
Description
Enables the PIM router to modify the default SSM range. The IPv6 default PIM-SSM group range is FF3x::/32. The no form of this command removes the currently configured ACL rule.

Parameter <ACL-RULE>

Description Required. Specifies the ACL rule name.

Usage
n In the ACL used to specify the PIM-SSM range, ACEs should contain only multicast group addresses in the destination IP field, else the ACE will be ignored.
n Modifying the PIM-SSM range can lead to momentary traffic loss until PIM rebuilds the states. n It is recommended to keep the SSM range the same across the network.
Examples
Creating an IPv6 ACL named pim_ssm_v6grp_range_acl with two entries and applying the ACL as a PIMSSM range ACL:

switch# configure terminal switch(config-pim)# access-list ipv6 pim_ssm_v6grp_range_acl switch(config-acl-ipv6)# 10 permit any any ff2e::2/64 switch(config-acl-ipv6)# 20 permit any any ff1e::1/64
switch(config)# router pim6 switch(config-pim6)# pim-ssm range-access-list pim_ssm_v6grp_range_acl

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.09

Command Information

Platforms
6300 6400

Command context config-pim6

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

show ip multicast summary

PIM-SSM commands for IPv6 | 2039

show ip multicast summary
Description
Displays multicast summary information.
Example
Showing multicast summary information:

Switch# show ip multicast summary

Total number of IGMP interfaces

:1

Total number of IGMP snooping VLANS

:0

Total number of IGMP joins

:1

Total number of IGMP snooping joins

:0

Total number of PIM SM enabled VRFs

:1

Total number of PIM SSM enabled VRFs

:1

Total number of PIM DM enabled VRFs

:0

Total number of PIM SM interfaces

:2

Total number of PIM DM interfaces

:0

Total number of PIM SM neighbors

:1

Total number of PIM DM neighbors

:0

Total number of PIM A/A enabled VRF

:0

Total number of PIM A/A enabled interfaces

:0

Total number of PIM SM Mroutes in route state

:1

Total number of PIM SM Mroutes in bridge state

:0

Total number of PIM SSM Mroutes in route state

:1

Total number of PIM SSM Mroutes in bridge state

:0

Total number of PIM DM Mroutes in route state

:0

Total number of PIM DM Mroutes in bridge state

:0

Total number of local multicast flows registered in this RP : 0

Total number of MLD interfaces

:1

Total number of MLD snooping VLANS

:1

Total number of MLD joins

:1

Total number of MLD snooping joins

:1

Total number of PIMv6 SM enabled VRFs

:1

Total number of PIMv6 SSM enabled VRFs

:0

Total number of PIMv6 DM enabled VRFs

:0

Total number of PIMv6 SM interfaces

:2

Total number of PIMv6 DM interfaces

:0

Total number of PIMv6 SM neighbors

:1

Total number of PIMv6 DM neighbors

:0

Total number of PIMv6 A/A enabled VRF

:0

Total number of PIMv6 A/A enabled interfaces

:0

Total number of PIMv6 SM Mroutes in route state

:1

Total number of PIMv6 SM Mroutes in bridge state

:0

Total number of PIMv6 SSM Mroutes in route state

:1

Total number of PIMv6 SSM Mroutes in bridge state

:0

Total number of PIMv6 DM Mroutes in route state

:0

Total number of PIMv6 DM Mroutes in bridge state

:0

Total number of MSDP peers

:0

Total number of SA's learned by MSDP

:0

VRF: default

Total number of IGMP interfaces

:1

Total number of IGMP snooping VLANS

:0

Total number of IGMP joins

:1

Total number of IGMP snooping joins

:0

Total number of PIM SM interfaces

:2

Total number of PIM DM interfaces

:0

Total number of PIM SM neighbors

:1

Total number of PIM DM neighbors

:0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2040

Total number of PIM A/A enabled interfaces

:0

Total number of PIM SM Mroutes in route state

:1

Total number of PIM SM Mroutes in bridge state

:0

Total number of PIM SSM Mroutes in route state

:1

Total number of PIM SSM Mroutes in bridge state

:0

Total number of PIM DM Mroutes in route state

:0

Total number of PIM DM Mroutes in bridge state

:0

Total number of local multicast flows registered in this RP : 0

Total number of MLD interfaces

:1

Total number of MLD snooping VLANS

:1

Total number of MLD joins

:1

Total number of MLD snooping joins

:1

Total number of PIMv6 SM interfaces

:2

Total number of PIMv6 DM interfaces

:0

Total number of PIMv6 SM neighbors

:1

Total number of PIMv6 DM neighbors

:0

Total number of PIMv6 A/A enabled interfaces

:0

Total number of PIMv6 SM Mroutes in route state

:1

Total number of PIMv6 SM Mroutes in bridge state

:0

Total number of PIMv6 SSM Mroutes in route state

:1

Total number of PIMv6 SSM Mroutes in bridge state

:0

Total number of PIMv6 DM Mroutes in route state

:0

Total number of PIMv6 DM Mroutes in bridge state

:0

Total number of MSDP peers

:0

Total number of SA's learned by MSDP

:0

Switch#

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 pim interface counters
show ipv6 pim interface <INTERFACE-NAME> counters [vsx-peer]
Description
Shows the PIM packet counters information for the specified interface.

PIM-SSM commands for IPv6 | 2041

Parameter <INTERFACE-NAME> vsx-peer

Description
Specifies the interface to show packet counter information.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
Loopback interfaces are special interfaces where only unicast PIM messages are updated. This includes Register, Register Stop, and Candidate RP Advertisements. When a loopback interface is configured as the RP, the ACL drop counters will be updated on the interface on which the packets are received.
Example
Showing IPv6 PIM packet counters:

Switch# Switch# show ipv6 pim interface 1/1/5 counters

Interface : 1/1/5

VRF

: default

Tx Counters :

Hello

275

State Refresh

0

Join/Prune

32

SSM Join/Prune

32

RP Advertisement

0

Graft

0

Graft Ack

0

Assert

0

Bsm

0

Register

0

Register Stop

0

SSM Register Stop

0

Rx Counters :

Hello

272

State Refresh

0

Join/Prune

0

SSM Join/Prune

0

RP Advertisement

0

Graft

0

Graft Ack

0

Assert

0

Bsm

0

Register

0

SSM Register

0

Register Stop

0

Register Drops(Register ACL hitcount) 0

Join/Prune Drops(RP ACL hitcount)

0

Rx Drop Counters :

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2042

Hello

0

State Refresh

0

Join/Prune

0

RP Advertisement

0

Graft

0

Graft Ack

0

Assert

0

Bsm

0

Switch#

For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 mld ssm-map
show ipv6 mld [ssm-map [vrf <VRF-NAME> | all-vrfs]]
Description
Shows MLD SSM map.

Parameter <VRF-NAME> all-vrfs

Description Optional. Shows MLD SSM map in a specific VRF. Optional. Shows MLD SSM map in all VRFs.

Examples
Showing MLD SSM-map:

switch# show ipv6 mld ssm-map MLD SSM-map Information VRF Name :default Interface Name SSM map ACL name --------------- ------------------

PIM-SSM commands for IPv6 | 2043

vlan10 vlan20 1/1/1 2/1/1.1

ipv6-ssm-map-1 ipv6-ssm-map-2 ipv6-ssm-map-3 ipv6-ssm-map-1

Showing MLD SSM-map for all VRFs:

switch# show ipv6 mld ssm-map all-vrfs

MLD SSM-map Information

VRF Name :test

Interface Name SSM map ACL name

--------------- ------------------

vlan30

ipv6-ssm-map-1

VRF Name :default

Interface Name SSM map ACL name

--------------- ------------------

vlan10

ipv6-ssm-map-1

vlan20

ipv6-ssm-map-2

1/1/1

ipv6-ssm-map-3

2/1/1.1

ipv6-ssm-map-1

Release 10.11

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show ipv6 mroute
show ipv6 mroute [all-vrfs | vrf <VRF-NAME>] [vsx-peer]
Description
Shows multicast routing information. Optionally, you can show specific information by VRF. If no options are specified, it shows information for the default VRF.

Parameter all-vrfs vrf <VRF-NAME> vsx-peer

Description
Shows information for all VRFs.
Specifies the name of a VRF. Default: default.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing IPv6 mroute information for the default VRF:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2044

Switch# show ipv6 mroute IP Multicast Route Entries

VRF : default Total number of entries : 1

Group Address

: ff32::10

Source Address

: fd00:192:168:20::2

SSM Mroute

: True

Neighbor

: fe80::f403:4301:1422:2600

Uptime

: 00:14:05

State

: route

Incoming interface

: 1/1/5

Outgoing Interface List :

Interface

State

-----------

----------

vlan20

forwarding

Showing IPv6 mroute information for all VRFs:

switch# do show ipv6 mroute all-vrfs IP Multicast Route Entries

VRF : default Total number of entries : 1

Group Address

: ff32::10

Source Address

: fd00:192:168:2::100

SSM Mroute

: True

Neighbor

: fe80::eceb:b801:14e4:2900

Uptime

: 00:19:20

State

: route

Incoming interface

: 1/1/4

Outgoing Interface List :

Interface

State

-----------

----------

vlan20

forwarding

VRF : red Total number of entries : 1

Group Address

: ff32::11

Source Address

: 30::3

SSM Mroute

: True

Neighbor

: fe80::eceb:b880:1fe4:2900

Uptime

: 00:01:13

State

: route

Incoming interface

: vlan31

Outgoing Interface List :

Interface

State

-----------

----------

vlan32

forwarding

For more information on features that use this command, refer to the Multicast Guide for your switch model.
Command History

PIM-SSM commands for IPv6 | 2045

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2046

Chapter 110 Ping commands

Ping commands

ping
ping <IPv4-ADDR> | <hostname> [data-fill <pattern> | datagram-size <size> | interval <time> | repetitions <number> | timeout <time> | tos <number> | ip-option {include-timestamp | include-timestamp-and-address | record-route} | vrf <vrfname> | do-not-fragment][source {IPv4-ADDR | IFNAME}]
Ping on VXLAN with ip-option such as include-timestamp-and-address, include-timestamp and record-route is not supported.

Description
Pings the specified IPv4 address or hostname with or without optional parameters.

Parameter ping <IPv4-ADDR> <HOSTNAME> data-fill <PATTERN>
datagram-size <SIZE> interval <TIME>
repetitions <NUMBER>
timeout <TIME>
tos <NUMBER>
ip-option {include-timestamp | include-timestamp-and-address | record-route}
include-timestamp include-timestamp-and-address record-route

Description Selects the IPv4 address to ping.
Selects the hostname to ping. Range: 1-256 characters
Specifies the data pattern in hexadecimal digits to send. A maximum of 16 "pad" bytes can be specified to fill out the ICMP packet. Default: AB
Specifies the ping datagram size. Range: 0-65399, default: 100.
Specifies the interval between successive ping requests in seconds. Range: 1-60 seconds, default: 1 second.
Specifies the number of packets to send. Range: 1-10000 packets, default: Five packets.
Specifies the ping timeout in seconds. Range: 1-60 seconds, default: 2 seconds.
Specifies the IP Type of Service to be used in Ping request. Range: 0-255
Specifies an IP option (record-route or timestamp option).
Specifies the intermediate router time stamp.
Specifies the intermediate router time stamp and IP address.
Specifies the intermediate router addresses.

AOS-CX 10.14 Command-Line Interface Guide

2047

Parameter vrf <VRF-NAME>
source {IPv4-ADDR | IFNAME} do-not-fragment

Description
Specifies the virtual routing and forwarding (VRF) to use. When VRF option is not given, the default VRF is used.
Specifies the source IPv4 address or interface to use.
Specifies the do-not-fragment (DF) bit in IP header of the Ping packet. This option does not allow the packet to be fragmented when it has to go through a segment with a smaller maximum transmission unit (MTU).

Examples
Pinging an IPv4 address:

switch# ping 10.0.0.0 PING 10.0.0.0 (10.0.0.0) 100(128) bytes of data. 108 bytes from 10.0.0.0: icmp_seq=1 ttl=64 time=0.035 ms 108 bytes from 10.0.0.0: icmp_seq=2 ttl=64 time=0.034 ms 108 bytes from 10.0.0.0: icmp_seq=3 ttl=64 time=0.034 ms 108 bytes from 10.0.0.0: icmp_seq=4 ttl=64 time=0.034 ms 108 bytes from 10.0.0.0: icmp_seq=5 ttl=64 time=0.033 ms
--- 10.0.0.0 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 3999ms rtt min/avg/max/mdev = 0.033/0.034/0.035/0.000 ms

Pinging the localhost:

switch# ping localhost PING localhost (127.0.0.1) 100(128) bytes of data. 108 bytes from localhost (127.0.0.1): icmp_seq=1 ttl=64 time=0.060 ms 108 bytes from localhost (127.0.0.1): icmp_seq=2 ttl=64 time=0.035 ms 108 bytes from localhost (127.0.0.1): icmp_seq=3 ttl=64 time=0.043 ms 108 bytes from localhost (127.0.0.1): icmp_seq=4 ttl=64 time=0.041 ms 108 bytes from localhost (127.0.0.1): icmp_seq=5 ttl=64 time=0.034 ms
--- localhost ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 3998ms rtt min/avg/max/mdev = 0.034/0.042/0.060/0.011 ms

Pinging a server with a data pattern:

switch# ping 10.0.0.2 data-fill 1234123412341234acde123456789012 PATTERN: 0x1234123412341234acde123456789012 PING 10.0.0.2 (10.0.0.2) 100(128) bytes of data. 108 bytes from 10.0.0.2: icmp_seq=1 ttl=64 time=0.207 ms 108 bytes from 10.0.0.2: icmp_seq=2 ttl=64 time=0.187 ms 108 bytes from 10.0.0.2: icmp_seq=3 ttl=64 time=0.225 ms 108 bytes from 10.0.0.2: icmp_seq=4 ttl=64 time=0.197 ms 108 bytes from 10.0.0.2: icmp_seq=5 ttl=64 time=0.210 ms
--- 10.0.0.2 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 3999ms rtt min/avg/max/mdev = 0.187/0.205/0.225/0.015 ms

Pinging a server with a datagram size:

Ping commands | 2048

switch# ping 10.0.0.0 datagram-size 200 PING 10.0.0.0 (10.0.0.0) 200(228) bytes of data. 208 bytes from 10.0.0.0: icmp_seq=1 ttl=64 time=0.202 ms 208 bytes from 10.0.0.0: icmp_seq=2 ttl=64 time=0.194 ms 208 bytes from 10.0.0.0: icmp_seq=3 ttl=64 time=0.201 ms 208 bytes from 10.0.0.0: icmp_seq=4 ttl=64 time=0.200 ms 208 bytes from 10.0.0.0: icmp_seq=5 ttl=64 time=0.186 ms
--- 10.0.0.0 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 4000ms rtt min/avg/max/mdev = 0.186/0.196/0.202/0.016 ms
Pinging a server with an interval specified:
switch# ping 9.0.0.2 interval 2 PING 9.0.0.2 (9.0.0.2) 100(128) bytes of data. 108 bytes from 9.0.0.2: icmp_seq=1 ttl=64 time=0.199 ms 108 bytes from 9.0.0.2: icmp_seq=2 ttl=64 time=0.192 ms 108 bytes from 9.0.0.2: icmp_seq=3 ttl=64 time=0.208 ms 108 bytes from 9.0.0.2: icmp_seq=4 ttl=64 time=0.182 ms 108 bytes from 9.0.0.2: icmp_seq=5 ttl=64 time=0.194 ms
--- 9.0.0.2 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 7999ms rtt min/avg/max/mdev = 0.182/0.195/0.208/0.008 ms
Pinging a server with a specified number of packets to send:
switch# ping 9.0.0.2 repetitions 10 PING 9.0.0.2 (9.0.0.2) 100(128) bytes of data. 108 bytes from 9.0.0.2: icmp_seq=1 ttl=64 time=0.213 ms 108 bytes from 9.0.0.2: icmp_seq=2 ttl=64 time=0.204 ms 108 bytes from 9.0.0.2: icmp_seq=3 ttl=64 time=0.201 ms 108 bytes from 9.0.0.2: icmp_seq=4 ttl=64 time=0.184 ms 108 bytes from 9.0.0.2: icmp_seq=5 ttl=64 time=0.202 ms 108 bytes from 9.0.0.2: icmp_seq=6 ttl=64 time=0.184 ms 108 bytes from 9.0.0.2: icmp_seq=7 ttl=64 time=0.193 ms 108 bytes from 9.0.0.2: icmp_seq=8 ttl=64 time=0.196 ms 108 bytes from 9.0.0.2: icmp_seq=9 ttl=64 time=0.193 ms 108 bytes from 9.0.0.2: icmp_seq=10 ttl=64 time=0.200 ms
--- 9.0.0.2 ping statistics --10 packets transmitted, 10 received, 0% packet loss, time 8999ms rtt min/avg/max/mdev = 0.184/0.197/0.213/0.008 ms
Pinging a server with a specified timeout:
switch# ping 9.0.0.2 timeout 3 PING 9.0.0.2 (9.0.0.2) 100(128) bytes of data. 108 bytes from 9.0.0.2: icmp_seq=1 ttl=64 time=0.175 ms 108 bytes from 9.0.0.2: icmp_seq=2 ttl=64 time=0.192 ms 108 bytes from 9.0.0.2: icmp_seq=3 ttl=64 time=0.190 ms 108 bytes from 9.0.0.2: icmp_seq=4 ttl=64 time=0.181 ms 108 bytes from 9.0.0.2: icmp_seq=5 ttl=64 time=0.197 ms
--- 9.0.0.2 ping statistics ---
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2049

5 packets transmitted, 5 received, 0% packet loss, time 4000ms rtt min/avg/max/mdev = 0.175/0.187/0.197/0.007 ms

Pinging a server with the specified IP Type of Service:

switch# ping 9.0.0.2 tos 2 PING 9.0.0.2 (9.0.0.2) 100(128) bytes of data. 108 bytes from 9.0.0.2: icmp_seq=1 ttl=64 time=0.033 ms 108 bytes from 9.0.0.2: icmp_seq=2 ttl=64 time=0.034 ms 108 bytes from 9.0.0.2: icmp_seq=3 ttl=64 time=0.031 ms 108 bytes from 9.0.0.2: icmp_seq=4 ttl=64 time=0.034 ms 108 bytes from 9.0.0.2: icmp_seq=5 ttl=64 time=0.031 ms
--- 9.0.0.2 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 3999ms rtt min/avg/max/mdev = 0.031/0.032/0.034/0.006 ms

Pinging a local host with the specified VRF.

switch# ping localhost vrf red PING localhost (127.0.0.1) 100(128) bytes of data. 108 bytes from localhost (127.0.0.1): icmp_seq=1 ttl=64 time=0.048 ms 108 bytes from localhost (127.0.0.1): icmp_seq=2 ttl=64 time=0.052 ms 108 bytes from localhost (127.0.0.1): icmp_seq=3 ttl=64 time=0.044 ms 108 bytes from localhost (127.0.0.1): icmp_seq=4 ttl=64 time=0.036 ms 108 bytes from localhost (127.0.0.1): icmp_seq=5 ttl=64 time=0.055 ms
--- localhost ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 4005ms rtt min/avg/max/mdev = 0.036/0.047/0.055/0.006 ms

Pinging the localhost with the default VRF:

switch# ping localhost vrf mgmt PING localhost (127.0.0.1) 100(128) bytes of data. 108 bytes from localhost (127.0.0.1): icmp_seq=1 ttl=64 time=0.085 ms 108 bytes from localhost (127.0.0.1): icmp_seq=2 ttl=64 time=0.057 ms 108 bytes from localhost (127.0.0.1): icmp_seq=3 ttl=64 time=0.047 ms 108 bytes from localhost (127.0.0.1): icmp_seq=4 ttl=64 time=0.038 ms 108 bytes from localhost (127.0.0.1): icmp_seq=5 ttl=64 time=0.059 ms
--- localhost ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 3999ms rtt min/avg/max/mdev = 0.038/0.057/0.085/0.016 ms

Pinging a server with the intermediate router time stamp:

switch# ping 9.0.0.2 ip-option include-timestamp

PING 9.0.0.2 (9.0.0.2) 100(168) bytes of data.

108 bytes from 9.0.0.2: icmp_seq=1 ttl=64 time=0.031 ms

TS:

59909005 absolute

0

0

0

108 bytes from 9.0.0.2: icmp_seq=2 ttl=64 time=0.034 ms

Ping commands | 2050

TS:

59910005 absolute

0

0

0

108 bytes from 9.0.0.2: icmp_seq=3 ttl=64 time=0.038 ms

TS:

59911005 absolute

0

0

0

108 bytes from 9.0.0.2: icmp_seq=4 ttl=64 time=0.035 ms

TS:

59912005 absolute

0

0

0

108 bytes from 9.0.0.2: icmp_seq=5 ttl=64 time=0.037 ms

TS:

59913005 absolute

0

0

0

--- 9.0.0.2 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 3999ms rtt min/avg/max/mdev = 0.031/0.035/0.038/0.002 ms

Pinging a server with the intermediate router time stamp and address:

switch# ping 9.0.0.2 ip-option include-timestamp-and-address

PING 9.0.0.2 (9.0.0.2) 100(168) bytes of data.

108 bytes from 9.0.0.2: icmp_seq=1 ttl=64 time=0.030 ms

TS:

9.0.0.2 60007355 absolute

9.0.0.2 0

9.0.0.2 0

9.0.0.2 0

108 bytes from 9.0.0.2: icmp_seq=2 ttl=64 time=0.037 ms

TS:

9.0.0.2 60008355 absolute

9.0.0.2 0

9.0.0.2 0

9.0.0.2 0

108 bytes from 9.0.0.2: icmp_seq=3 ttl=64 time=0.037 ms

TS:

9.0.0.2 60009355 absolute

9.0.0.2 0

9.0.0.2 0

9.0.0.2 0

108 bytes from 9.0.0.2: icmp_seq=4 ttl=64 time=0.038 ms

TS:

9.0.0.2 60010355 absolute

9.0.0.2 0

9.0.0.2 0

9.0.0.2 0

108 bytes from 9.0.0.2: icmp_seq=5 ttl=64 time=0.039 ms

TS:

9.0.0.2 60011355 absolute

9.0.0.2 0

9.0.0.2 0

9.0.0.2 0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2051

--- 9.0.0.2 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 3999ms rtt min/avg/max/mdev = 0.030/0.036/0.039/0.005 ms

Pinging a server with the intermediate router address:

switch# ping 9.0.0.2 ip-option record-route

PING 9.0.0.2 (9.0.0.2) 100(168) bytes of data.

108 bytes from 9.0.0.2: icmp_seq=1 ttl=64 time=0.034 ms

RR:

9.0.0.2

9.0.0.2

9.0.0.2

9.0.0.2

108 bytes from 9.0.0.2: icmp_seq=2 ttl=64 time=0.038 ms (same route) 108 bytes from 9.0.0.2: icmp_seq=3 ttl=64 time=0.036 ms (same route) 108 bytes from 9.0.0.2: icmp_seq=4 ttl=64 time=0.037 ms (same route) 108 bytes from 9.0.0.2: icmp_seq=5 ttl=64 time=0.035 ms (same route)

--- 9.0.0.2 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 3999ms rtt min/avg/max/mdev = 0.034/0.036/0.038/0.001 ms

Pinging a server with do-not-fragment:

switch# ping 192.168.1.8 datagram-size 2000 do-not-fragment PING 192.168.1.8 (192.168.1.8) 2000(2028) bytes of data. 2008 bytes from 192.168.1.8: icmp_seq=1 ttl=64 time=0.721 ms 2008 bytes from 192.168.1.8: icmp_seq=2 ttl=64 time=0.792 ms 2008 bytes from 192.168.1.8: icmp_seq=3 ttl=64 time=0.857 ms 2008 bytes from 192.168.1.8: icmp_seq=4 ttl=64 time=0.833 ms 2008 bytes from 192.168.1.8: icmp_seq=5 ttl=64 time=0.836 ms
--- 192.168.1.8 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 4056ms rtt min/avg/max/mdev = 0.721/0.807/0.857/0.048 ms

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager Operators or Administrators or local user group members with

Ping commands | 2052

Platforms

Command context (#)

Authority
execution rights for this command. Operators can execute this command from the operator context (>) only.

ping6
ping6 {<IPv6-ADDR> | <HOSTNAME>} [data-fill <PATTERN> | datagram-size <SIZE> | interval <TIME> | repetitions <NUMBER> | timeout <TIME> | vrrp <VRID> | vrf <VRF-NAME> | source <IPv6-ADDR> | <IFNAME>]
Description
Pings the specified IPv6 address or hostname with or without optional parameters. The VRRP option is provided to self-ping the configured link-local address on the VRRP group.

Parameter IPv6-ADDR HOSTNAME data-fill <PATTERN>
datagram-size <SIZE> interval <TIME> repetitions <NUMBER> timeout <TIME> vrrp <VRID> vrf <VRF-NAME> source <IPv6-ADDR> | <IFNAME>

Description
Selects the IPv6 address to ping.
Selects the hostname to ping. Range: 1-256 characters
Specifies the data pattern in hexadecimal digits to send. A maximum of 16 "pad" bytes can be specified to fill out the ICMP packet. Default: AB
Specifies the ping datagram size. Range: 0-65399, default: 100.
Specifies the interval between successive ping requests in seconds. Range: 1-60 seconds, default: 1 second.
Specifies the number of packets to send. Range: 1-10000 packets, default: Five packets.
Specifies the ping timeout in seconds. Range: 1-60 seconds, default: 2 seconds.
Specifies the VRRP group ID.
Specifies the virtual routing and forwarding (VRF) to use. When this option is not provided, the default VRF is used.
Specifies the source IPv6 address or interface to use.

Examples
Pinging an IPv6 address:

switch# ping6 2020::2 PING 2020::2(2020::2) 100 data bytes 108 bytes from 2020::2: icmp_seq=1 ttl=64 time=0.386 ms 108 bytes from 2020::2: icmp_seq=2 ttl=64 time=0.235 ms 108 bytes from 2020::2: icmp_seq=3 ttl=64 time=0.249 ms 108 bytes from 2020::2: icmp_seq=4 ttl=64 time=0.240 ms 108 bytes from 2020::2: icmp_seq=5 ttl=64 time=0.252 ms
--- 2020::2 ping statistics ---

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2053

5 packets transmitted, 5 received, 0% packet loss, time 4000ms rtt min/avg/max/mdev = 0.235/0.272/0.386/0.059 ms
Pinging the localhost:
switch# ping6 localhost PING localhost(localhost) 100 data bytes 108 bytes from localhost: icmp_seq=1 ttl=64 time=0.093 ms 108 bytes from localhost: icmp_seq=2 ttl=64 time=0.051 ms 108 bytes from localhost: icmp_seq=3 ttl=64 time=0.055 ms 108 bytes from localhost: icmp_seq=4 ttl=64 time=0.046 ms 108 bytes from localhost: icmp_seq=5 ttl=64 time=0.048 ms
--- localhost ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 3998ms rtt min/avg/max/mdev = 0.046/0.058/0.093/0.019 ms
Pinging a server with a data pattern:
switch# ping6 2020::2 data-fill ab PATTERN: 0xab PING 2020::2(2020::2) 100 data bytes 108 bytes from 2020::2: icmp_seq=1 ttl=64 time=0.038 ms 108 bytes from 2020::2: icmp_seq=2 ttl=64 time=0.074 ms 108 bytes from 2020::2: icmp_seq=3 ttl=64 time=0.076 ms 108 bytes from 2020::2: icmp_seq=4 ttl=64 time=0.075 ms 108 bytes from 2020::2: icmp_seq=5 ttl=64 time=0.077 ms
--- 2020::2 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 3999ms rtt min/avg/max/mdev = 0.038/0.068/0.077/0.015 ms
Pinging a server with a datagram size:
switch# ping6 2020::2 datagram-size 200 PING 2020::2(2020::2) 200 data bytes 208 bytes from 2020::2: icmp_seq=1 ttl=64 time=0.037 ms 208 bytes from 2020::2: icmp_seq=2 ttl=64 time=0.076 ms 208 bytes from 2020::2: icmp_seq=3 ttl=64 time=0.076 ms 208 bytes from 2020::2: icmp_seq=4 ttl=64 time=0.077 ms 208 bytes from 2020::2: icmp_seq=5 ttl=64 time=0.066 ms
--- 2020::2 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 3999ms rtt min/avg/max/mdev = 0.037/0.066/0.077/0.016 ms
Pinging a server with an interval specified:
switch# ping6 2020::2 interval 5 PING 2020::2(2020::2) 100 data bytes 108 bytes from 2020::2: icmp_seq=1 ttl=64 time=0.043 ms 108 bytes from 2020::2: icmp_seq=2 ttl=64 time=0.075 ms 108 bytes from 2020::2: icmp_seq=3 ttl=64 time=0.074 ms 108 bytes from 2020::2: icmp_seq=4 ttl=64 time=0.075 ms 108 bytes from 2020::2: icmp_seq=5 ttl=64 time=0.075 ms
Ping commands | 2054

--- 2020::2 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 19999ms rtt min/avg/max/mdev = 0.043/0.068/0.075/0.014 ms
Pinging a server with a specified number of packets to send:
switch# ping6 2020::2 repetitions 6 PING 2020::2(2020::2) 100 data bytes 108 bytes from 2020::2: icmp_seq=1 ttl=64 time=0.039 ms 108 bytes from 2020::2: icmp_seq=2 ttl=64 time=0.070 ms 108 bytes from 2020::2: icmp_seq=3 ttl=64 time=0.076 ms 108 bytes from 2020::2: icmp_seq=4 ttl=64 time=0.076 ms 108 bytes from 2020::2: icmp_seq=5 ttl=64 time=0.071 ms 108 bytes from 2020::2: icmp_seq=6 ttl=64 time=0.078 ms
--- 2020::2 ping statistics --6 packets transmitted, 6 received, 0% packet loss, time 4999ms rtt min/avg/max/mdev = 0.039/0.068/0.078/0.015 ms
Pinging a local host with the specified VRF.
switch# ping6 localhost vrf red PING localhost(localhost) 100 data bytes 108 bytes from localhost: icmp_seq=1 ttl=64 time=0.038 ms 108 bytes from localhost: icmp_seq=2 ttl=64 time=0.050 ms 108 bytes from localhost: icmp_seq=3 ttl=64 time=0.039 ms 108 bytes from localhost: icmp_seq=4 ttl=64 time=0.040 ms 108 bytes from localhost: icmp_seq=5 ttl=64 time=0.027 ms
--- localhost ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 4001ms rtt min/avg/max/mdev = 0.027/0.038/0.050/0.010 ms
Pinging the localhost with the default VRF:
switch# ping6 localhost vrf mgmt PING localhost(localhost) 100 data bytes 108 bytes from localhost: icmp_seq=1 ttl=64 time=0.032 ms 108 bytes from localhost: icmp_seq=2 ttl=64 time=0.022 ms 108 bytes from localhost: icmp_seq=3 ttl=64 time=0.040 ms 108 bytes from localhost: icmp_seq=4 ttl=64 time=0.022 ms 108 bytes from localhost: icmp_seq=5 ttl=64 time=0.046 ms
--- localhost ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 3998ms rtt min/avg/max/mdev = 0.022/0.032/0.046/0.010 ms
For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2055

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Ping commands | 2056

Chapter 111 PKI commands

PKI commands

crypto pki application
crypto pki application <APP-NAME> certificate <CERT-NAME> no crypto pki application <APP-NAME> certificate <CERT-NAME>
Description
Associates a leaf certificate with a feature (application) on the switch. By default, all features are associated with the default, self-signed certificate local-cert. This certificate is created by the switch the first time it starts. The no form of this command associates the specified feature with the default certificate.

Parameter <APP-NAME>
<CERT-NAME>

Description
Specifies the name of a feature on the switch: n captive-portal: Captive portal n dot1x-supplicant: 802.1X supplicant n est-client: EST client n hsc: Hardware switch controller n https-server: HTTPS server n radsec-client: RadSec client n syslog-client: Syslog client syslog-client communicates with syslog server over TLS. You can associate a certificate with the syslog-client application by enrolling the certificate manually or through EST.
Specifies the name of an installed leaf certificate.

Examples
Associating the EST client with leaf certificate leaf-cert1:

switch(config)# crypto pki application est-client certificate leaf-cert1

Associating the syslog client with leaf certificate leaf-cert:

switch(config)# crypto pki application syslog-client certificate leaf-cert

Setting the syslog client to use the default certificate:

switch(config)# no crypto pki application syslog-client certificate

AOS-CX 10.14 Command-Line Interface Guide

2057

Setting the RadSec client to use the default certificate: switch(config)# no crypto pki application radsec-client certificate
Associating the RadSec client with leaf certificate leaf-cert: switch(config)# crypto pki application radsec-client certificate leaf-cert
Associating the HTTPS server with leaf certificate leaf-cert2: switch(config)# crypto pki application https-server certificate leaf-cert2
Associating the 802.1X supplicant with leaf certificate cert1: switch(config)# crypto pki application dot1x-supplicant certificate cert1

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

crypto pki certificate
crypto pki certificate <CERT-NAME> no crypto pki certificate <CERT-NAME>
Description
Creates a leaf certificate and changes to its context config-cert-<CERT-NAME>. If the specified leaf certificate exists, this command changes to its context. The first time the switch starts it creates a self-signed, default leaf certificate called local-cert. This certificate is used by any switch application that does not have an associated leaf certificate. The no form of this command deletes the specified leaf certificate. The default leaf certificate local-cert cannot be deleted.

PKI commands | 2058

Parameter <CERT-NAME>

Description
Specifies the name of a leaf certificate. Range: 1 to 32 alphanumeric characters (excluding ").

Examples
Creating leaf certificate leaf-cert:

switch(config)# crypto pki certificate leaf-cert switch(config-cert-leaf-cert)#

Deleting leaf certificate leaf-cert:

switch(config)# no crypto pki certificate leaf-cert The leaf certificate has associated applications. Deleting the certificate will make the applications use the default certificate local-cert. Continue (y/n)? y switch(config)#

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

crypto pki ta-profile
crypto pki ta-profile <TA-NAME> no crypto pki ta-profile <TA-NAME>
Description
Creates a trust anchor (TA) profile and changes to the config-ta-<TA-NAME> context for the profile. Each TA profile stores the certificate for a trusted CA. Up to 64 profiles can be defined. If the specified TA profile exists, this command changes to the config-ta-<TA-NAME> context for the profile. The no form of this command removes the specified TA profile.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2059

When creating a new profile, If you exit the config-ta-<TA-NAME> context without importing the TA certificate, the profile is discarded.

Parameter <TA-NAME>

Description
Specifies the TA profile name. Range: 1 to 48 alphanumeric characters excluding ".
NOTE: The TA profile name cannot end with est-ta<nn> where <nn> is 00 to 99. For example, company-trust-anchor-est-ta01 is not allowed. This TA profile name suffix is reserved for TA profiles that are created for CA certificates from EST servers.

Examples
Creating the TA profile root-cert:
switch(config)# crypto pki ta-profile root-cert switch(config-ta-root-cert)#
Removing TA profile root-cert:
switch(config)# no crypto pki ta-profile root-cert

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

enroll self-signed
enroll self-signed
Description
Generates a key pair and generates a self-signed certificate with it. The subject fields and key type of the current leaf certificate must be defined before running this command. If not, you are prompted to fill in the subject fields, and the key type is set to RSA 2048.

PKI commands | 2060

Example
Enrolling the leaf certificate leaf-cert:
switch(config-cert-leaf-cert)# enroll self-signed You are enrolling a certificate with the following attributes: Subject: C=US, ST=CA, L=Rocklin, OU=Site, O=Comp,
CN=Leaf01 Key Type: RSA (2048)
Continue (y/n)? y Self-signed certificate is created and enrolled successfully.
switch(config-cert-leaf-cert)#

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-cert-<CERT-NAME>

Authority
Administrators or local user group members with execution rights for this command.

enroll terminal
enroll terminal
Description
Generates a key pair and certificate signing request (CSR) for the current leaf certificate. Use the CSR to obtain a signed certificate from a certificate authority (CA), and then import the certificate onto the switch with the command import terminal. The key type, and the certificate common name in the subject fields of the current leaf certificate must be completed before running this command.
Example
Enrolling the leaf certificate leaf-cert:
switch(config-cert-leaf-cert)# enroll terminal You are enrolling a certificate with the following attributes: Subject: C=US, ST=CA, L=Rocklin, OU=Site, O=Comp,
CN=Leaf01 Key Type: RSA (2048)
Continue (y/n)? y

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2061

-----BEGIN CERTIFICATE REQUEST----MIIBozCCAQwCAQAwYzEVMBMGA1UEAxMMcG9kMDEtODQwMC0xMQ4wDAYDVQQLEwV nViYTEMMAoGA1UEChMDSFBFMRIwEAYDVQQHEwlSb3NldmlsbGUxCzAJBgNVBAgT NBMQswCQYDVQQGEwJVUzCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAtKcLS ... GBAJ4L3lFFfWBEL+KAKpOGjZcVmwlBMqSKFtOFNF9nzmUmONmU3SKy6dzQ+6ynR 7Au22mf3lWDxzrtCC/dj5RtWJeJekxp2LCIK/3eRXUwbYveQDKcxH7j9ZB+BAp2 ace+2tA68F2vlgRCQ/hcQH0YmNuaq4Ne3w0dhm7HlUrx -----END CERTIFICATE REQUEST----switch(config-cert-leaf-cert)#

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-cert-<CERT-NAME>

Authority
Administrators or local user group members with execution rights for this command.

import (CA-signed leaf certificate)
import terminal ta-profile <TA-NAME> [password <PW>] import <REMOTE-URL> ta-profile <TA-NAME> [password <PW>][vrf <VRF-NAME>] import <STORAGE-URL> ta-profile <TA-NAME> [password <PW>]
Description
Imports a CA-signed leaf certificate and then validates the certificate against the specified TA profile. If the imported data includes a private key, the private key must match the leaf certificate being imported. If the imported data does not include a private key, the certificate must match a CSR that was previously generated with the command enroll terminal and must be signed by the CA whose root certificate is installed in the specified TA profile. The TA profile must exist and have a TA certificate configured.

Parameter terminal
ta-profile <TA-NAME>

Description
Import the certificate by pasting PEM-format data at the console. Upon execution, the config-cert-import context is entered for certificate pasting. To complete certificate data entry press Control-D in your terminal program. Alternatively, the pasted certificate data can include at its end the delimiter END_OF_ CERTIFICATE (after the -----END CERTIFICATE----- line), making entry of Control-D unnecessary.
Specifies the TA profile name. Range: 1 to 48 alphanumeric

PKI commands | 2062

Parameter password <PW> <REMOTE-URL>
vrf <VRF-NAME> <STORAGE-URL>

Description
characters excluding ".
Specifies the plaintext password used to decrypt the private key in the imported certificate data. When this parameter is omitted, the password is prompted for as required. Range: 1 to 32 alphanumeric characters.
Specifies a certificate data file on a remote TFTP or SFTP server. The URL syntax is: {tftp:// | sftp://<USER>@} {<IP>|<HOST>} [:<PORT>] [;blocksize=<SIZE>]/<FILE>
Specifies the name of the VRF to use for the remote URL file transfer. The default is mgmt.
Available on switch families that provide USB device file import capability, specifies a certificate data file on a USB storage device inserted in the switch USB port. The URL syntax is usb:/<FILE>.

Usage
n The imported data must include all the intermediate CA certificates in the certificate chain leading to the certificate imported into the specified TA profile.
n This command cannot be used with the default certificate local-cert. n The PEM data format is supported for all import sources. The PKCS#12 data format is supported for
<REMOTE-URL> and <STORAGE-URL>. n The PEM data must be delimited with these lines for the certificate data: -----BEGIN CERTIFICATE---------END CERTIFICATE----And the PEM data must be delimited with either of these line pairs for the private key data: -----BEGIN PRIVATE KEY---------END PRIVATE KEY-----
-----BEGIN ENCRYPTED PRIVATE KEY---------END ENCRYPTED PRIVATE KEY-----
Examples
Importing a leaf certificate from the console:

switch(config)# crypto pki certificate leaf-cert switch(config-cert-leaf-cert1)# import terminal ta-profile root-cert Paste the certificate in PEM format below, then hit enter and ctrl-D: switch(config-cert-import)# -----BEGIN CERTIFICATE----switch(config-cert-import)# MIIFRDCCAyygAwIBAgQP8nS2Vp15u0xXMdkDJzANBgkqhkiG9w0Bv switch(config-cert-import)# MQswCQYDVQGEwJVUEOMAwGA1UCgwFXJ1YmDAgNBAMM1Jvb3QgQ0Ew switch(config-cert-import)# HhcNMTkNDEwMjIwNT1WhcjIwMT0MjwNE1WjzQswQDVQQGEwJVUzEL ... switch(config-cert-import)# 1fIYZYGQyla0AwFuPTTxBXHYwRxTPbUYU5umJfRPmE4VY8S9DQgcr switch(config-cert-import)# 1NGNm3NG03GqPScs/TF9bVyFA5BOS5lmmkfRYK8D/kMTfRreSdxis switch(config-cert-import)# YQ1u1NqShps= switch(config-cert-import)# -----END CERTIFICATE----switch(config-cert-import)# -----BEGIN ENCRYPTED PRIVATE KEY----switch(config-cert-import)# MIIFDjBABgkqhkiG9wBBQ0wMzAbBgqkw0QwwDQIpJMN7sVGwCAggA switch(config-cert-import)# MBQGCCqGSIb3DQMHAit+2qadNAASCgLYJ4Am3EfhH5p51Ggr86VqS

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2063

switch(config-cert-import)# IJ6L/UhEtH523nUkdV6gvAgoYaD83PswToAGv5VS8OMFTPttrn5/K ... switch(config-cert-import)# OgSecqZsG6arbx0ESaYBir1c/6rPspcjbx283iD1MWOpeoS2aEmOX switch(config-cert-import)# iKnXnUMpVPfLc74ty2S41DtH0X9gf6aa1jStg+7cND9XfGtjaV2+/ switch(config-cert-import)# cb4= switch(config-cert-import)# -----END ENCRYPTED PRIVATE KEY----switch(config-cert-import)# Enter import password: ******* Leaf certificate is validated with root-cert and imported successfully. switch(config-cert-leaf-cert)#

Importing a leaf certificate from a remote file:

switch(config)# crypto pki certificate leaf-cert2

switch(config-cert-leaf-cert2)# import tftp://1.1.1.2/c2.p12 ta-profile root-cert

% Total % Received % Xferd Average Speed Time Time

Time Current

Dload Upload Total Spent Left Speed

100 3722 100 3722 0

0 391k

0 --:--:-- --:--:-- --:--:-- 391k

100 3722 100 3722 0

0 376k

0 --:--:-- --:--:-- --:--:-- 376k

Enter import password: *******

Leaf certificate is validated with root-cert and imported successfully.

switch(config-cert-leaf-cert2)#

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-cert-<CERT-NAME>

Authority
Administrators or local user group members with execution rights for this command.

import (self-signed leaf certificate)
import terminal self-signed [password <PW>] import <REMOTE-URL> self-signed [password <PW>][vrf <VRF-NAME>] import <STORAGE-URL> self-signed [password <PW>]
Description
Imports a self-signed leaf certificate including its matching private key.

Parameter terminal

Description Import the certificate by pasting PEM-format data at the console.

PKI commands | 2064

Parameter
password <PW> <REMOTE-URL> vrf <VRF-NAME> <STORAGE-URL>

Description
Upon execution, the config-cert-import context is entered for certificate pasting. To complete certificate data entry press Control-D in your terminal program. Alternatively, the pasted certificate data can include at its end the delimiter END_OF_ CERTIFICATE (after the -----END CERTIFICATE----- line), making entry of Control-D unnecessary.
Specifies the plaintext password used to decrypt the private key in the imported certificate data. When this parameter is omitted, the password is prompted for as required. Range: 1 to 32 alphanumeric characters.
Specifies a certificate data file on a remote TFTP or SFTP server. The URL syntax is: {tftp:// | sftp://<USER>@} {<IP>|<HOST>} [:<PORT>] [;blocksize=<SIZE>]/<FILE>
Specifies the name of the VRF to use for the remote URL file transfer. The default is mgmt.
Available on switch families that provide USB device file import capability, specifies a certificate data file on a USB storage device inserted in the switch USB port. The URL syntax is usb:/<FILE>.

Usage
n This command cannot be used with the default certificate local-cert. n The PEM data format is supported for all import sources. The PKCS#12 data format is supported for
<REMOTE-URL> and <STORAGE-URL>. n The PEM data must be delimited with these lines for the certificate data: -----BEGIN CERTIFICATE---------END CERTIFICATE----And the PEM data must be delimited with either of these line pairs for the private key data: -----BEGIN PRIVATE KEY---------END PRIVATE KEY-----
-----BEGIN ENCRYPTED PRIVATE KEY---------END ENCRYPTED PRIVATE KEY-----
Example
Importing a self-signed leaf certificate from the console:

switch(config)# crypto pki certificate ss-leaf-cert switch(config-cert-ss-leaf-cert)# import terminal self-signed Paste the certificate in PEM format below, then hit enter and ctrl-D: switch(config-cert-import)# -----BEGIN CERTIFICATE----switch(config-cert-import)# MIID2TCCAsGgAwIBAgIJAKcrqokm6p9GMA0GCSqGSIb3DQEBCwUAM switch(config-cert-import)# tDCCA5ygAwIBAgICEAEwDQYJKoZIhvcNAQELBQAwgYgxCzABAYTAl switch(config-cert-import)# VQQGEwJVUzELMAkGA1UECAwCQ0ExDTALBgNVBAcMBFJvc2UxDDAKB ... switch(config-cert-import)# +fWQLxhp+jKJGZGOZz/FENt2uSfZHzlXiu8n3g+EgqExenY1pBRJr switch(config-cert-import)# VuEEoNb/YfkPXHHva4Zfx223q+f694wlVsHkENSzqr2goHpa2fOzq switch(config-cert-import)# alewwdmVqCES+x8bvhf3C/6IB6ePkEsnMlHNTeM= switch(config-cert-import)# -----END CERTIFICATE----switch(config-cert-import)# -----BEGIN ENCRYPTED PRIVATE KEY-----

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2065

switch(config-cert-import)# MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIt8Ni3 switch(config-cert-import)# MBQGCCqGSIb3DQMHBAiBHrejkcdpdASCBMjVxrrYYPNt3V1abr9k8 switch(config-cert-import)# 5GE0U99awh9ys4360WR95xOFGThvjkTyRWG511nGwVeLZs/7TPXWI ... switch(config-cert-import)# hzc5ZT/w2F08icRI5mFbGoTAAw9IIWMOXGweaWQJDyKGrhg89GrnV switch(config-cert-import)# M2UuP/tYuuO328QcenKZEJmZKCbx78oFRR+pgma4oeMaFTIyXE6Pr switch(config-cert-import)# GAdCK8tkDiJ9DKbqdM5W0/nTJfqwUQlfl27dNrBAodsHdrw3UR99H switch(config-cert-import)# SPo= switch(config-cert-import)# -----END ENCRYPTED PRIVATE KEY----switch(config-cert-import)# Enter import password: ******* Leaf certificate is validated as self-signed certificate and imported successfully. switch(config-cert-ss-leaf-cert)#

Importing a leaf certificate from a remote file:

switch(config)# crypto pki certificate ss-leaf-cert2

switch(config-cert-ss-leaf-cert2)# import tftp://1.1.1.2/ss2.p12 self-signed

% Total % Received % Xferd Average Speed Time Time

Time Current

Dload Upload Total Spent Left Speed

100 3230 100 3230 0

0 875k

0 --:--:-- --:--:-- --:--:-- 875k

100 3230 100 3230 0

0 831k

0 --:--:-- --:--:-- --:--:-- 831k

Enter import password: *******

Leaf certificate is validated as self-signed certificate and imported

successfully.

switch(config-cert-ss-leaf-cert2)#

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-cert-<CERT-NAME>

Authority
Administrators or local user group members with execution rights for this command.

key-type
key-type {rsa [key-size <K-SIZE>] | ecdsa [curve-size <C-SIZE>]}
Description
Sets the key type and key size for the current leaf certificate. The key type of the default certificate localcert cannot be changed.

PKI commands | 2066

Parameter rsa key-size <K-SIZE>
ecdsa curve-size <C-SIZE>

Description
Selects the RSA key type.
Specifies the RSA key size in bits. Supported values: 2048, 3072, 4096. Default: 2048
Selects the ECDSA key type.
Specifies the ECDSA elliptic curve size in bits. Supported values: 256, 348, 521. Default: 256

Examples
Setting RSA encryption on the leaf certificate leaf-cert:

switch(config)# crypto pki certificate leaf-cert switch(config-cert-leaf-cert)# key-type rsa key-size 3072

Setting ECDSA encryption on the leaf certificate leaf-cert:

switch(config)# crypto pki certificate leaf-cert switch(config-cert-leaf-cert)# key-type ecdsa curve-size 521

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-cert-<CERT-NAME>

Authority
Administrators or local user group members with execution rights for this command.

ocsp disable-nonce
ocsp disable-nonce no ocsp disable-nonce
Description
Configures exclusion of the nonce from OCSP requests. A nonce is a unique identifier that an OCSP client inserts in an OCSP request and expects the OCSP responder to include it in the corresponding OCSP response. The nonce mechanism helps prevent replay attacks in which a malicious player attempts to masquerade as the OCSP responder. Although the nonce is included by default, it can be

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2067

excluded. Some OCSP responders choose to not support the use of the nonce due to performance considerations. The no form of this command re-enables nonce inclusion in OCSP requests.
Examples
Disable inclusion of the nonce in OCSP requests for TA profile root-cert:
switch(config)# crypto pki ta-profile root-cert switch(config-ta-root-cert)# ocsp disable-nonce
Enable inclusion of the nonce in OCSP requests for TA profile root-cert:
switch(config)# crypto pki ta-profile root-cert switch(config-ta-root-cert)# no ocsp disable-nonce

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-ta-<TA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

ocsp enforcement-level
ocsp enforcement-level {strict | optional} no enforcement-level
Description
Sets either strict or reduced enforcement of the OCSP check of certificates. Strict enforcement is enabled by default. The no form of this command resets enforcement to its default of strict.

Parameter strict
optional

Description
Sets strict OCSP checking of certificates. The certificate is accepted only if all possible checking (including validation failures, software system errors, configuration errors, transactional errors) is successful.
Sets reduced OCSP checking of certificates. The certificate is

PKI commands | 2068

Parameter

Description
accepted unless one or more of these validation errors occur: n Response signature invalid. n Nonce in response mismatch. n Certificate revoked, but only when revocation checking is
possible. if revocation check is not possible, the certificate is still accepted if there are no other validation errors.

Examples
Setting reduced OCSP checking of certificates:

switch(config)# crypto pki ta-profile root-cert switch(config-ta-root-cert)# ocsp enforcement-level optional

Setting strict OCSP checking of certificates:

switch(config)# crypto pki ta-profile root-cert switch(config-ta-root-cert)# ocsp enforcement-level strict

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-ta-<TA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

ocsp url
ocsp url {primary | secondary} <URL> no ocsp url {primary | secondary}
Description
Configures the OCSP responder URLs that the current TA profile uses to verify the revocation status of an X.509 digital certificate. These URLs override the OCSP responder URL contained within the peer certificate being verified (as well as URLs defined in any intermediate CAs in the chain of trust). If no OCSP responder URLs are defined for a TA profile (default setting), then the OCSP responder URL in the peer certificate is used for revocation status checking. (The OCSP responder URL is contained in a certificate's Authority Information Access field, which is an X.509 v3 certificate extension.)

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2069

The no form of this command deletes the specified OCSP responder URL (primary or secondary) from the current TA profile.

Parameter {primary | secondary} <URL>

Description
Specify the HTTP URL of the primary or secondary OCSP responder using either a fully qualified domain name or IPv4 address.

Examples
Defining the primary OCSP URL for the TA profile root-cert:

switch(config)# crypto pki ta-profile root-cert switch(config-ta-root-cert)# revocation-check ocsp switch(config-ta-root-cert)# ocsp url primary http://ocsp-server.site.com

Removing the primary OCSP URL from the TA profile root-cert:

switch(config)# crypto pki ta-profile oot-cert switch(config-ta-root-cert)# revocation-check ocsp switch(config-ta-root-cert)# no ocsp url primary

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-ta-<TA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

ocsp vrf
ocsp vrf <VRF-NAME> no ocsp vrf
Description
Sets the VRF that the switch uses to communicate with OCSP responders for OCSP checking. VRF mgmt is used by default. The no form of this command resets the VRF to its default mgmt.

PKI commands | 2070

Parameter <VRF-NAME>

Description
Specifies the name of the VRF the switch uses to communicate with OCSP responders. Default: mgmt.

Examples
Setting the OCSP responder VRF to corp1:

switch(config)# crypto pki ta-profile root-cert switch(config-ta-root-cert)# ocsp vrf corp1

Reverting the OCSP responder VRF to its default:

switch(config)# crypto pki ta-profile root-cert switch(config-ta-root-cert)# no ocsp vrf

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-ta-<TA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

revocation-check ocsp
revocation-check ocsp no revocation-check
Description
Enables certificate revocation checking for the current profile using the online certificate status protocol (OCSP). The no form of this command disables certificate revocation checking for the current profile.
Examples
Enabling revocation checking for the TA profile root-cert:
switch(config)# crypto pki ta-profile root-cert switch(config-ta-root-cert)# revocation-check ocsp

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2071

Disabling revocation checking for the TA profile root-cert:
switch(config)# crypto pki ta-profile root-cert switch(config-ta-root-cert)# no revocation-check

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-ta-<TA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

show crypto pki application
show crypto pki application
Description
Shows certificate information for all features (applications) using leaf certificates that are managed by PKI.
Examples
Showing certificate information for all features (applications) using leaf certificates:

switch# show crypto pki application1

Associated Applications Certificate Name

Cert Status

------------------------ ---------------------- --------------------------------

https-server

not configured, using local-cert

syslog-client

local-cert

valid

hsc

xhsccert

invalid, using local-cert

radsec-client

device-identity

valid

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

PKI commands | 2072

Command Information

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show crypto pki certificate
show crypto pki certificate [<CERT-NAME> [plaintext | pem]]
Description
Shows a list of all configured leaf certificates, or detailed information for a specific leaf certificate. Possible values for Cert Status are: CSR pending, expired, expires soon, installed, malformed, not yet known. Possible values for EST Status are: enroll failed, enroll pending, enroll retrying, enroll success, n/a (certificate is not EST-enrolled), reenroll failed, reenroll pending, reenroll retrying.

Parameter <CERT-NAME>
plaintext pem

Description
Specifies the leaf certificate name. Range: 1 to 32 alphanumeric characters excluding ".
Shows certificate information in plain text.
Shows certificate information in PEM format.

Examples
Showing a list of all configured leaf certificates:

switch# show crypto pki certificate

Certificate Name

Cert Status EST Status

Associated Applications

-------------------- -------------- ----------------- ----------------------------

--

local-cert

installed

n/a

radsec-client, captive-

portal

device-identity

installed

n/a

none

pod01-test-1

installed

n/a

dot1x-supplicant

pod01-99-1

installed

n/a

https-server, est-client

syslog-1

CSR pending enroll retrying syslog-client

leaf-cert1

installed

enroll success none

leaf-cert2

CSR pending enroll failed

none

Showing detailed information (in plaintext format) for leaf certificate pod01-99-1:

switch# show crypto pki certificate pod01-99-1 plaintext
Certificate Name: pod01-99-1 Associated Applications:
https-server, est-client Certificate Status: installed

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2073

EST Status: n/a Certificate Type: regular Intermediates:
Subject: C = US, ST = CA, O = Company, OU = Lab-IT, CN = DeviceCA Issuer: C = US, ST = CA, O = Company, OU = Lab-IT, CN = Lab-CA Serial Number: 0x02
Subject: C = US, ST = CA, O = Company, OU = Lab-IT, CN = Lab-CA Issuer: C = US, ST = CA, O = Company, OU = Lab-IT, CN = Lab-Root Serial Number: 0x01
Certificate: Data: Version: 1 (0x0) Serial Number: 14529416756121781768 (0xc9a2db8f3e3f4608) Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, ST=CA, OU=Lab-IT, O=Company, CN=DeviceCA Validity Not Before: Jan 12 23:36:57 2018 GMT Not After : Nov 1 23:36:57 2020 GMT Subject: C=US, ST=CA, OU=Lab-IT, O=Company, CN=pod01-99-1 Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus:
00:a0:cd:ef:1b:f9:b8:bd:39:fc:7a:0e:00:17:ff: 2b:72:d8:4e:d4:df:49:36:ca:3a:f9:05:05:d7:e3: d1:97:29:71:e6:33:b8:bb:8e:f0:ee:a6:e4:4a:f8: ... fe:dd:d9:a0:af:59:47:25:b4:34:06:af:03:1d:33: 30:c3:85:fe:5c:e7:19:7f:ff:3a:b2:21:b8:e8:ed: 83:09 Exponent: 65537 (0x10001) Signature Algorithm: sha256WithRSAEncryption 39:f6:03:86:03:d9:05:61:39:25:5f:0d:75:cc:05:ae:04:7e: 4c:a3:13:0b:f0:1e:af:68:0e:40:9f:ed:48:b6:5e:56:8c:53: 46:5b:c9:a4:e0:b0:bc:31:4b:a7:5d:0a:ed:7c:9c:f6:bf:1e: ... 39:f5:26:58:68:e2:13:ec:94:ac:60:8e:4b:b0:ba:45:cf:d6: 6a:4b:9f:7d:ae:3f:e5:2e:81:fe:ac:b3:65:44:35:47:a5:2f: 89:e7:58:a0
Showing detailed information (in PEM format) for leaf certificate leaf-cert1 with a status of CSR pending:
switch# show crypto pki certificate leaf-cert1 pem
Certificate Name: leaf-cert1
Associated Applications: syslog-client
Certificate Status: CSR pending EST Status: enroll retrying Certificate Type: regular
-----BEGIN CERTIFICATE REQUEST-----
MIICtTCCAZ0CAQAwcDEWMBQGA1UEAxMNc3lzbG9nLTg0MBYGA1UECxMPQ XJ1YmEtUm9zZXZpbGxlMQ4wDAYDVQQKEYTESMBAGA1EBxMJUm9zZXZpbG xlMQswCQYDVQQIEwJDQTELMAGA1UEBhMCVVMwggEiMSIb3DQEBAQUAA4I ... cw2ytN6Idgh81k59x6DH7V/eORaKd5lq+oO7nkr6+QBf5L3f5Kb+TOFio lei+EdCHMxxc07MK0n3dkziSW25HFUGsyEXVMK+BID3zbKDoUe6XVhvqI
PKI commands | 2074

mamXyghigLYDcbsn6WVw== -----END CERTIFICATE REQUEST-----

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show crypto pki ta-profile
show crypto pki ta-profile [<TA-NAME>]
Description
Shows a list of all configured TA profiles, or detailed information for a specific profile.
This command shows information for both directly-configured TA profiles and TA profiles that were dynamically downloaded from EST servers.

Parameter <TA-NAME>

Description
Specifies the TA profile name. Range: 1 to 48 alphanumeric characters excluding ".

Examples
Showing a list of all configured TA profiles:

switch# show crypto pki ta-profile

Profile Name

TA Certificate

Revocation Check

-------------------------------- ------------------ ----------------

BASE_CA

Installed,valid disabled

BASE02_CA

Installed,expired disabled

root-cert

Installed,valid OCSP

ROOT-A_CA

Not Installed

OCSP

EST-Service1

Installed,valid None

EST-Service2

Installed,valid None

Showing detailed information for TA profile root-cert:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2075

switch# show crypto pki ta-profile root-cert

TA Profile Name

: root-cert

Revocation Check

: OCSP

OSCP Primary URL

: http://ocsp1.domain.com

OCSP Secondary URL : Not Configured

OCSP Disable-nonce : false

OCSP Enforcement Level: strict

OCSP VRF

: mgmt

TA Certificate: Installed and valid

Version: 3 (0x2)

Serial Number:

74:e6:6d:22:3f:52:cc:94:43:41:ab:66:a8:8d:47:b1

Signature Algorithm: sha1withRSAEncryption

Issuer: OU=DeviceTrust, OU=Operations, O=Site, C=US,

CN=Site Trusted Computing Root CA 1.0

Validity

Not Before: Sep 14 03:12:06 2007 GMT

Not After : Sep 14 03:21:14 2032 GMT

Subject: OU=DeviceTrust, OU=Operations, O=Site, C=US,

CN=Site Trusted Computing Root CA 1.0

Subject Public Key Info:

Public Key Algorithm: rsaEncryption

RSA Public Key: (2048 bit)

Modulus (2048 bit):

30:0d:06:09:2a:86:48:86:f7:0d:01:01:01:05:33:

03:82:01:0f:00:30:82:01:3a:02:82:01:01:00:ac:

3d:60:3a:2e:ca:a4:34:db:5c:3b:6b:07:df:73:62:

...

20:c8:df:63:14:5a:e8:d3:ea:83:d8:47:a3:b5:2e:

bb:64:51:f0:be:13:b6:91:e4:32:45:58:5e:1f:0d:

02:03:01:00:01

Exponent: 65537 (0x10001)

X509v3 extensions:

X509v3 Key Usage:

Digital Signature, Certificate Signing, CRL Signing

X509v3 Basic Constraints:

CA:TRUE, pathlen:4

X509v3 Subject Key Identifier:

eb:d7:ec:db:8a:cb:f2:51:d5:06:e1:42:7b:39:a7:d0:1e:31:6e:bf

Signature Algorithm: sha1withRSAEncryption 1c:90:f3:a4:f0:0d:e2:e3:e9:ae:01:e1:7d:a7:13:e2:cc:0b: 17:31:26:92:a2:5d:1d:19:60:54:03:13:9b:e1:73:6c:e4:b3: 01:4f:4e:ae:61:bd:ae:b6:12:d3:ab:08:ae:8c:47:92:d7:0d: ... ca:cf:11:78:55:6d:06:49:fa:d4:8d:f3:ef:7f:79:38:35:5d: 16:5a:57:7f:a8:dc:b0:f8:a2:04:0d:17:0b:bb:58:32:30:e0: 2d:a8:37:a2

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

PKI commands | 2076

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

ta-certificate
ta-certificate { [import [terminal]] | import {<REMOTE-URL> | <STORAGE-URL>} }
Description
Imports a CA certificate for use in the current TA profile. The certificate must be in PEM format. The PEM data must be delimited with these lines: -----BEGIN CERTIFICATE---------END CERTIFICATE-----
Only the first certificate in the PEM data is imported. Any additional certificates are ignored.

Parameter [import [terminal]]
import <REMOTE-URL> import <STORAGE-URL>

Description
Import the certificate by pasting PEM-format data at the console. Upon execution, the config-cert-import context is entered for certificate pasting. To complete certificate data entry press Control-D in your terminal program. Alternatively, the pasted certificate data can include at its end the delimiter END_OF_ CERTIFICATE (after the -----END CERTIFICATE----- line), making entry of Control-D unnecessary.
Import the certificate from a file on a remote TFTP or SFTP server. The URL syntax is: {tftp:// | sftp://<USER>@} {<IP>|<HOST>} [:<PORT>] [;blocksize=<SIZE>]/<FILE>
Available on switch families that provide USB device file import capability, import the certificate from a file on a USB storage device inserted in the switch USB port. The URL syntax is usb:/<FILE>.

Example
Importing a certificate into the TA profile root-cert by pasting PEM-format certificate data at the console:

switch(config)# crypto pki ta-profile root-cert switch(config-ta-root-cert)# ta-certificate import terminal Paste the certificate in PEM format below, then hit enter and ctrl-D: switch(config-ta-cert)# -----BEGIN CERTIFICATE----switch(config-ta-cert)# MIIDuTCCAqECCQCuoxeJ2ZNYcjANBgkqhkiG9w0BAQsFADCBqzELMAEBh switch(config-ta-cert)# VVMxEzARBgNVBAgMCkNhbGlmb3JuaWExEDAOBgNVBAcMB1JvY2tsDAKBg switch(config-ta-cert)# BAoMA0hQTjEVMBMGA1UECwwMSFBOUm9zZXZpbGxlMSowKAYDVQocG5zdz ... switch(config-ta-cert)# x3WFf3dFZ8o9sd5LVAHneH/ztb9MP34z+le1V346r12L2kpxmTOVJVyTO switch(config-ta-cert)# BIzD/ST/HaWI+0S+S80rm93PSscEbb9GWk7vshh5EnW/moehBKcE4O1zy switch(config-ta-cert)# 3LvMLZcssSe5J2Ca2XIhfDme8UaNZ7syGYMsAW0nG7yYHWkEOQu9s switch(config-ta-cert)# -----END CERTIFICATE----switch(config-ta-cert)#

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2077

The certificate you are importing has the following attributes: Issuer: C=US, ST=CA, L=Rocklin, O=Company, OU=Site,
CN=site.com/emailAddress=test.ca@site.com Subject: C=US, ST=CA, L=Rocklin, O=Company, OU=Site,
CN=9000/emailAddress=test.ca@site.com Serial Number: 12121221634631568498 (0xaea51217d5945772)
TA certificate import is allowed only once for a TA profile Do you want to accept this certificate (y/n)? y TA certificate accepted. switch(config-ta-root-cert)#
Importing a certificate into the TA profile root-cert2 from file rcert2-data on the USB device:
switch(config)# crypto pki ta-profile root-cert2 switch(config-ta-root-cert2)# ta-certificate import usb:/rcert2-data The certificate you are importing has the following attributes: Issuer: C=US, ST=California, L=Rocklin, O=Company, OU=Site, CN=site.com/emailAddress=test.ca@site.com Subject: C=US, ST=California, L=Rocklin, O=Company, OU=Site, CN=9000/emailAddress=test.ca@site.com Serial Number: 12121221634631568498 (0xaea51217d5945772)
TA certificate import is allowed only once for a TA profile Do you want to accept this certificate (y/n)? y TA certificate accepted. switch(config-ta-root-cert2)#

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-ta-<TA-NAME>

Authority
Administrators or local user group members with execution rights for this command.

subject
subject [common-name <COMMON-NAME>] [country <COUNTRY>] [locality <LOCALITY>] [org <ORG-NAME>] [org-unit <ORG-UNIT>] [state <STATE>]
Description
Sets the subject fields for the current leaf certificate. If the common-name parameter is not specified, then you are prompted to define a value for each field. If a configured value exists for any field, it is presented as the default. The subject fields of the default certificate local-cert cannot be changed.

PKI commands | 2078

Parameter common-name <COMMON-NAME> country <COUNTRY> locality <LOCALITY> org <ORG-NAME> org-unit <ORG-UNIT> state <STATE>

Description Specifies the common name. Specifies the country or region. Specifies the locality such as city. Specifies the organization. Specifies the organizational unit. Specifies the state.

Examples
Setting subject fields for the leaf certificate leaf-cert:

switch(config-cert-leaf-cert)# subject common-name Leaf01 country US locality CA org Company org-unit Site state CA

Setting subject fields for the leaf certificate leaf-cert interactively:

switch(config-cert-leaf-cert)# subject Do you want to use the switch serial number as the common name (y/n)? n Enter Common Name : Leaf01 Enter Org Unit : Site Enter Org Name : Company Enter Locality : Rocklin Enter State : CA Enter Country : US switch(config-cert-leaf-cert)#

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-cert-<CERT-NAME>

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2079

Chapter 112 PKI EST commands

PKI EST commands

arbitrary-label
arbitrary-label <LABEL> no arbitrary-label
Description
Within the EST profile context, configures the generic optional label (also known as arbitrary label) to be concatenated to the EST server URL that is configured with the url command. There is no arbitrary label configured by default. Any existing arbitrary label is replaced by this command. The use of arbitrary labels is optional.
RFC 7030 allows the use of arbitrary labels so that one EST server may serve multiple CAs with the same server URL that gets concatenated with different arbitrary labels. The same label is used for every request made under a particular EST profile.
Some EST schemes use arbitrary labels in a more sophisticated way, defining different labels for different types of requests under the same EST profile. For example, the CA certificate request could use the generic label (configured with this arbitrary-label command) , the certificate enrollment request could use the enrollment label (configured with the arbitrary-label-enrollment command), and the reenrollment request could use the re-enrollment label (configured with the arbitrary-labelreenrollment command). Note that only one label of each of the three available types can be configured in any EST profile.
The no form of this command removes the generic arbitrary label.

Parameter <LABEL>

Description Specifies the generic arbitrary label. Range: Up to 64 characters.

Examples
Configuring the URL and generic arbitrary label. Note that with the URL and arbitrary label configured in this example, the final URL the switch uses to request CA certificates from the EST server is https://estservice999.com/.well-known/est/rsa2048/cacerts.

switch(config)# crypto pki est-profile EST-service1 switch(config)# url https://est-service999.com/.well-known/est switch(config-est-EST-service1)# arbitrary-label rsa2048

Removing the generic arbitrary label:

switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# no arbitrary-label

AOS-CX 10.14 Command-Line Interface Guide

2080

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-est-<EST-NAME>

Authority
Administrators or local user group members with execution rights for this command.

arbitrary-label-enrollment
arbitrary-label-enrollment <LABEL> no arbitrary-label-enrollment
Description
Within the EST profile context, configures the arbitrary enrollment label to be concatenated to the EST server URL that is configured with the url command. This label is specific to the enrollment operation. There is no arbitrary enrollment label configured by default. Any existing arbitrary enrollment label is replaced by this command. The use of arbitrary enrollment labels is optional.
When the enrollment label is not configured, the generic arbitrary label (created with the arbitrarylabel command) is used (if configured) for enrollment.
RFC 7030 allows the use of arbitrary labels so that one EST server may serve multiple CAs with the same server URL that gets concatenated with different arbitrary labels. The same label is used for every request made under a particular EST profile.
Some EST schemes use arbitrary labels in a more sophisticated way, defining different labels for different types of requests under the same EST profile. For example, the CA certificate request could use the generic label (configured with the arbitrary-label command) , the certificate enrollment request could use the enrollment label (configured with this arbitrary-label-enrollment command), and the re-enrollment request could use the re-enrollment label (configured with the arbitrary-labelreenrollment command). Note that only one label of each of the three available types can be configured in any EST profile.
The no form of this command removes the arbitrary enrollment label.

Parameter <LABEL>

Description
Specifies the arbitrary enrollment label. Range: Up to 64 characters.

Examples
Configuring the arbitrary enrollment label:

PKI EST commands | 2081

switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# arbitrary-label-enrollment ipsec-v7
Removing the arbitrary enrollment label :
switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# no arbitrary-label-enrollment

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-est-<EST-NAME>

Authority
Administrators or local user group members with execution rights for this command.

arbitrary-label-reenrollment
arbitrary-label-reenrollment <LABEL> no arbitrary-label-reenrollment
Description
Within the EST profile context, configures the arbitrary re-enrollment label to be concatenated to the EST server URL that is configured with the url command. This label is specific to the re-enrollment operation. There is no arbitrary re-enrollment label configured by default. Any existing arbitrary reenrollment label is replaced by this command. The use of arbitrary re-enrollment labels is optional.
When the re-enrollment label is not configured, the generic arbitrary label (created with the arbitrarylabel command) is used (if configured) for re-enrollment.
RFC 7030 allows the use of arbitrary labels so that one EST server may serve multiple CAs with the same server URL that gets concatenated with different arbitrary labels. The same label is used for every request made under a particular EST profile.
Some EST schemes use arbitrary labels in a more sophisticated way, defining different labels for different types of requests under the same EST profile. For example, the CA certificate request could use the generic label (configured with the arbitrary-label command) , the certificate enrollment request could use the enrollment label (configured with the arbitrary-label-enrollment command), and the reenrollment request could use the re-enrollment label (configured with this arbitrary-labelreenrollment command). Note that only one label of each of the three available types can be configured in any EST profile.
The no form of this command removes the arbitrary re-enrollment label.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2082

Parameter <LABEL>

Description
Specifies the arbitrary re-enrollment label. Range: Up to 64 characters.

Examples
Configuring the arbitrary re-enrollment label:

switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# arbitrary-label-reenrollment ipsec-v7

Removing the arbitrary re-enrollment label :

switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# no arbitrary-label-reenrollment

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-est-<EST-NAME>

Authority
Administrators or local user group members with execution rights for this command.

crypto pki est-profile
crypto pki est-profile <EST-NAME> no crypto pki est-profile <EST-NAME>
Description
Creates a certificate Enrollment over Secure Transport (EST) profile and changes to the config-est-<ESTNAME> context for the profile. Each EST profile stores information about the EST service, including EST server URL Up to 16 profiles can be created. If the specified EST profile exists, this command changes to the config-est-<EST-NAME> context for the profile. The no form of this command deletes the specified EST profile. It also deletes the TA profiles whose CA certificates were downloaded from the corresponding EST server, and the leaf certificates that were enrolled using this EST profile.

PKI EST commands | 2083

The deletion of the related TA profiles and enrolled certificates is permanent. If the EST profile is in the startup configuration and the EST profile is deleted but this deletion is not updated in the startup configuration before a switch reboot, the EST profile will still exist after the reboot but the related TA profiles and enrolled certificates will not exist.

Parameter <EST-NAME>

Description
Specifies the EST profile name. Range: Up to 32 alphanumeric characters (excluding ").

Examples
Creating EST profile EST-Service1:

switch(config)# crypto pki est-profile EST-Service1 switch(config-est-service1)#

Removing EST profile service1:

switch(config)# no crypto pki est-profile EST-Service1

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

enroll est-profile
enroll est-profile <EST-NAME>
Description
Enrolls a leaf certificate through a remote EST (Enrollment over Secure Transport) server. Per RFC 7030, EST enables clients to request certificate signing services over secure TLS connections. The switch generates a key pair and the corresponding CSR. The CSR is sent to the EST server to request signing, and the signed certificate is be returned to the switch where it is validated. If the whole process succeeds, the certificate can be used as a leaf certificate on the switch. When the leaf certificate approaches its expiry date, it will be renewed automatically through the same EST server.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2084

Each enrollment or re-enrollment attempt starts with a /cacerts request sent to the EST server to get the latest chain of CA certificates. After the enrollment or re-enrollment succeeds, this chain of CA certificates will be compared with those downloaded previously from the same EST server. Updates will be made as appropriate.
The subject fields of the current leaf certificate must be defined before running this command. If the common name subject field is not configured, this command is rejected.
This command cannot be used to enroll or renew the default certificate "local-cert."

Parameter <EST-NAME>

Description
Specifies an existing EST profile name. Range: Up to 32 alphanumeric characters (excluding ").

Example
Enrolling leaf certificate leaf-cert1 through the EST server identified in EST profile EST-service1:

switch(config-cert-leaf-cert1)# enroll est-profile EST-service1 You are enrolling a certificate with the following attributes:
Subject: C=US, ST=CA, L=Roseville, OU=Aruba-Roseville, O=Aruba, CN=leaf-cert1
Key Type: RSA (2048 bits)
Continue (y/n)? y Certificate enrollment via EST-service1 has been initiated. Please use `show crypto pki certificate leaf-cert1` to check its status.
switch(config-cert-leaf-cert1)#

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-cert-<CERT-NAME>

Authority
Administrators or local user group members with execution rights for this command.

reenrollment-lead-time
reenrollment-lead-time <LEAD-TIME> no reenrollment-lead-time
Description

PKI EST commands | 2085

Within the EST profile context, sets the certificate re-enrollment lead time which is the number of days before certificate expiry date that certificate re-enrollment will be initiated.
The no form of this command resets the EST server re-enrollment lead time to its default of 2 days.

Parameter <LEAD-TIME>

Description
Specifies the certificate re-enrollment lead time in days. Range: 0 to 30 days. Default: 2 days.

Examples
Setting the certificate re-enrollment lead time to 15 days:

switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# reenrollment-lead-time 15

Resetting the certificate re-enrollment lead time to its default of 2 days :

switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# no reenrollment-lead-time

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-est-<EST-NAME>

Authority
Administrators or local user group members with execution rights for this command.

retry-count
retry-count <RETRIES> no retry-count
Description
Within the EST profile context, sets the maximum number of retires to be attempted after the initial certificate enrollment request fails. The no form of this command resets the maximum number of certificate enrollment request retries to its default of 3.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2086

Parameter <RETRIES>

Description
Specifies the maximum number of certificate enrollment request retries. Range: 0 to 32 retries. Default: 3 retries.

Examples
Setting the retry count to 5 retries:

switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# retry-count 5

Resetting the retry count to its default of 3 retries:

switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# no retry-count

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-est-<EST-NAME>

Authority
Administrators or local user group members with execution rights for this command.

retry-interval
retry-interval <INTERVAL> no retry-interval
Description
Within the EST profile context, sets the interval at which a failed certificate enrollment request is retried. The no form of this command resets the enrollment request retry interval to its default of 30 seconds.

Parameter <INTERVAL>

Description
Specifies the enrollment request retry interval in seconds. Range: 30 to 600 seconds. Default: 30 seconds.

Examples
Setting the certificate enrollment request retry interval to 45 seconds:

PKI EST commands | 2087

switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# retry-interval 45
Resetting the retry interval to its default of 30 seconds:
switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# no retry-interval

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-est-<EST-NAME>

Authority
Administrators or local user group members with execution rights for this command.

show crypto pki est-profile
show crypto pki est-profile [<EST-NAME>]
Description
Shows a list of all configured EST profiles, or detailed information for a specific profile.

Parameter <EST-NAME>

Description
Specifies the EST profile name. Range: Up to 32 alphanumeric characters (excluding ").

Examples
Showing a list of all configured EST profiles:

switch# show crypto pki est-profile

Downloaded Enrolled

Profile Name

TA Profiles Certificates

-------------------------------- ----------- ------------

EST-service1

2

3

EST-service2

1

2

EST-service3

2

0

Showing detailed information for EST profile EST-service1:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2088

switch# show crypto pki est-profile EST-service1

Profile Name

: EST-service1

Service VRF

: mgmt

Service URL

: https://est-service999.com

Arbitrary Label

: not configured

Arbitrary Label Enrollment : /ipsec-VP7

Arbitrary Label Reenrollment : not configured

Authentication Username : est1

Authentication Password :

AQBapREALpWYm2z7L1LanOtR3vGkqhBN1hBUU2CuvQXUF/ggYgAAnAnGTnKq49P4c

dNQ6UqPbjHL4XzCO0T04djkhSUxPKGfnsWuFEONveh+JbEobqKImfwJjc3eWHiaUb

eNpPx2zN2Q1DdyxAAQi4rmKr8LITMTTMd7qr

Retry Interval

: 45 seconds

Retry Count

: 5 times

Reenrollment Lead Time : 2 days

Downloaded TA Profiles : 2

Enrolled Certificates :

leaf-cert1

leaf-cert2

leaf-cert3

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

url
url <URL> no url
Description
Within the EST profile context, configures the URL of the certificate enrollment EST server. This is not configured by default. Any existing URL is replaced by this command. The no form of this command removes the EST server URL within the selected EST profile. The removal of the URL does not affect the TA profiles and enrolled certificates from the EST server.

Parameter <URL>

Description Specifies the EST server URL. Range: Up to 192 characters.

Usage

PKI EST commands | 2089

n The configuration and update of the EST profile URL triggers the sending of a /cacerts request to the EST server. A successful request will result in a chain of trusted CA certificates being downloaded from the EST server. Each CA certificate, either root CA certificates or intermediate CA certificates, will be saved as a TA profile, with TA profile name <est-name>-est-taNN with NN representing two numerical digits. This TA profile naming scheme with the -est-taNN suffix is reserved for TA profiles downloaded from EST servers.
n Upon connection with an EST server, the switch authenticates the server by validating the server certificate. For this validation to succeed, a TA profile needs to pre-exist in the switch with a CA certificate from the issuer chain of the server certificate. Once the server is authenticated, all CA certificates in its /cacerts response will be trusted, with no further validation occurring for them.
n The TA profiles with CA certificates downloaded from an EST server will have their revocation check set to OCSP, enforcement set to optional, and the OCSP VRF set to the same as that of the EST profile.
Examples
Configuring the EST server URL:
switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# url https://est-service999.com/.well-known/est
Removing the EST server URL:
switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# no url

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-est-<EST-NAME>

Authority
Administrators or local user group members with execution rights for this command.

username
username <USERNAME> password [ciphertext <CIPHERTEXT-PASSWORD> | plaintext <PLAINTEXT-PASSWORD>]
no username
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2090

Within the EST profile context, configures the user account information for the EST server that is used to authenticate the switch before accepting requests from the switch. This is not configured by default. Any existing username and password is replaced by this command.
When entered without either optional ciphertext or plaintext parameters, the plaintext password is prompted for twice, with the characters entered masked with "*" symbols.
The no form of this command removes the user account information within the selected EST profile.
There are two ways the EST client on a CX switch can prove itself to an EST server: a certificate, and/or username and password. At least one of the two must be configured for the EST request to succeed. If both are configured, certificate authentication will be used. If a certificate is not configured or certificate authentication fails, and username and password is configured, the username and password will be sent to the EST server for authentication.

Parameter <USERNAME>
ciphertext <CIPHERTEXT-PASSWORD>

Description
Specifies the EST server account user name. The exact user name requirements are set by the chosen EST service. Range: Up to 32 alphanumeric characters.
Specifies the EST server account password as Base64 ciphertext. No password prompts are provided and the ciphertext password is validated before the configuration is applied for the user.
NOTE: The ciphertext password must be gotten from the EST service.

plaintext <PLAINTEXT-PASSWORD>

Specifies the password without prompting. The password is visible as cleartext when entered but is encrypted thereafter. The exact password requirements are set by the chosen EST service. Range: Up to 64 alphanumeric characters.

Examples
Configuring an EST user with prompted cleartext password entry :

switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# username est1 password Enter password: ******** Confirm password: ******** switch(config-est-EST-service1)#

Configuring an EST user with direct cleartext password entry:

switch(config)# crypto pki est-profile EST-service2 switch(config-est-EST-service2)# username est1 password plaintext concept_leap739

Configuring an EST user with ciphertext password entry :

switch(config)# crypto pki est-profile EST-service3 switch(config-est-EST-service3)# username est1 password ciphertext AQBpRALpWYm2z7L1LanOtR3vGkqhN1hBU2CuvQXUF/ggYgAAAHWaPqxU6nAnGTnKq49P4cdNQ6U qPbjHL4XzO0T04djkUPKGfnsWuFEONveh+JbEobq63+1k80qBKImfwJjc3eWHiaUbeNpPx2zN2Q 1DdyxAAQi4rmKr8LITMTTMd7qr

PKI EST commands | 2091

Removing the EST user account information for EST profile EST-service2:
switch(config)# crypto pki est-profile EST-service2 switch(config-est-EST-service2)# no username

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-est-<EST-NAME>

Authority
Administrators or local user group members with execution rights for this command.

vrf
vrf <VRF-NAME> no vrf
Description
Within the EST profile context, selects the VRF through which the EST server can be reached. Any existing VRF selection is replaced by this command. When this command is not used, VRF mgmt is used by default on switch families supporting the mgmt VRF, otherwise the default VRF named default is used. The no form of this command selects the default VRF either mgmt or default.

Parameter <VRF-NAME>

Description
Specifies the name of the VRF to use for EST server communication.

Examples
Selecting VRF it-services for EST server communications:

switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# vrf it-services

Resetting the VRF to its default of mgmt for EST server communications:

switch(config)# crypto pki est-profile EST-service1 switch(config-est-EST-service1)# no vrf

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2092

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-est-<EST-NAME>

Authority
Administrators or local user group members with execution rights for this command.

PKI EST commands | 2093

Chapter 113 PoE commands

PoE commands
All PoE configuration commands except threshold configuration and always-on poe configuration are entered at the config-if context. The PoE threshold command is used at the system level whereas the always-on poeand power-over-ethernet quick-poe commands are set at the slot level. These commands can only be configured in the global configuration context.
lldp dot3 poe
lldp dot3 poe no lldp dot3 poe
Description
Enables 802.3 TLV list in LLDP to advertise for Power over Ethernet Data Link Layer Classification. LLDP dot3 TLV is by default enabled for PoE. The no form of this command disables 802.3 TLV list in LLDP.
Examples
On the 6400 Switch Series, interface identification differs. Enabling 802.3 TLV list in LLDP:
switch(config)# interface 1/1/1 switch(config-if)# lldp dot3 poe
Disabling 802.3 TLV list in LLDP:
switch(config-if)# no lldp dot3 poe

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide

2094

lldp med poe
lldp med poe [priority-override] no lldp med poe [priority-override]
Description
Enables MED TLV list in LLDP to advertise for Power over Ethernet Data Link Layer Classification. Also enables the lldp-MED TLV priority to override user configured port priority for Power over Ethernet. When both dot3 and MED are enabled, dot 3 will take precedence. MED TLV is by default enabled for PoE. Priority over-ride is by default disabled. The no form of this command disables MED TLV list in LLDP.

Parameter [priority-override]

Description System defined name of the interface.

Examples
On the 6400 Switch Series, interface identification differs. Enabling and disabling LLDP MED PoE:

switch(config)# interface 1/1/1 switch(config-if)# lldp med poe switch(config-if)# no lldp med poe

Enabling and disabling LLDP MED PoE priority override:

switch(config-if)# lldp med poe priority-override

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

power-over-ethernet
power-over-ethernet no power-over-ethernet

PoE commands | 2095

Description
Enables per-interface power distribution. Per-port power is enabled by default with priority low. PoE cannot be disabled for individual ports when Quick PoE is enabled for the entire switch or line module. The no form of this command disables per-interface power distribution.
Examples
On the 6400 Switch Series, interface identification differs. Enabling per-interface power distribution:
switch(config)# interface 1/1/1 switch(config-if)# power-over-ethernet
Disabling per-interface power distribution:
switch(config-if)# no power-over-ethernet
Showing Quick PoE enabled:
switch(config-if)# power-over-ethernet quick-poe 1/1 switch(config-if)# interface 1/1/1 switch(config-if)# no power-over-ethernet Interface PoE cannot be disabled when Quick PoE is enabled.

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

power-over-ethernet allocate-by
power-over-ethernet allocate-by {usage | class} no power-over-ethernet allocate-by {usage | class}
Description
Configures the power allocation method. Power allocation method is initially based on usage. PSE Allocated power value will change to LLDP negotiated power if and when LLDP exchange takes place between PSE and PD. When there is no LLDP negotiation, PSE Allocated Power Value will be the actual

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2096

instantaneous power draw and reserve power based on actual consumption. In allocate-by class, power allocation is based on PD requested class and PSE allocated power value will be the LLDP negotiated power when LLDP exchange takes place between PSE and PD. When there is no LLDP negotiation, PSE Allocate Power will be based on PD class. Reserve power is based on PD Class. By default, power allocation is by usage.
The power allocation method can be changed on an interface through port-access (User roles or RADIUS). An allocation method when configured through port-access will replace the user configured method.
The no form of this command resets the action to default.

Parameter usage class

Description Configures the usage-based allocation method. Configures the class-based allocation method.

Usage
If you enable pd-class-override for an interface, the allocate-by configuration of that interface will be automatically changed to class. However, if you change the allocation method to usage when pd-classoverride is still enabled, you will receive an error message stating that "The power allocation method cannot be changed when pd-class-override is enabled." To remove pd-class-override, you can use the no power-over-ethernet pd-class-override command . It is important to note that pd-class-override requires the allocation method to be set to class and is enforced when configured through CLI. However, if you override the allocation method to usage via port-access, pd-class-override will not be in effect. Therefore, it is recommended that you do not override the allocation method to usage through port-access on interfaces configured with pd-classoverride.
Examples
On the 6400 Switch Series, interface identification differs. Configuring the power allocation method:

switch(config)# interface 1/1/1 switch(config-if)# power-over-ethernet allocate-by usage switch(config-if)# power-over-ethernet allocate-by class

Resetting power allocation method:

switch(config-if)# no power-over-ethernet allocate-by class

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

PoE commands | 2097

Command Information

Platforms
6300 6400

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

power-over-ethernet always-on
power-over-ethernet always-on <MODULE-ID> no power-over-ethernet always-on <MODULE-ID>
Description
Always-on PoE is a feature that provides the ability to the switch to continue to provide power across a soft reboot. It is applicable only to the interfaces which were connected and delivering before the soft reboot. Also, power will not be delivered if power to the switch is interrupted. This command enables or disables the always-on PoE feature at the switch or the slot level. By default, always-on PoE is enabled at the switch or the slot level. The no form of this command disables power distribution on soft reboot.

Parameter <MODULE-ID>

Description Module number to apply always-on PoE configuration.

Examples
Enabling per-interface power distribution:

switch(config)# power-over-ethernet always-on 1/1

Disabling per-interface power distribution:

switch(config)# no power-over-ethernet always-on 1/1

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2098

power-over-ethernet assigned-class
power-over-ethernet assigned-class {3 | 4 | 6} no power-over-ethernet assigned-class
Description
Limit PoE power based on the assigned class. When an user assigns a maximum class to an interface, the PSE will limit the maximum power delivered to the PD up to a total power draw not exceeding the PSE assigned-class power. Power demotion occurs when a PD requested class is higher than the PSE assigned class, permitting the PD to receive power and operate in a reduced power mode. PoE ports cannot set an assigned class when Quick PoE is enabled on the sybsystem. The default assigned class is 4 for 2-pair capable PSE and 6 for 4-pair capable PSE. The no form of this command resets the action to default.
Examples
On the 6400 Switch Series, interface identification differs. Setting PoE assigned class:
switch(config)# interface 1/1/1 switch(config-if)# power-over-ethernet assigned-class 4
Resetting PoE assigned class to default:
switch(config-if)# no power-over-ethernet assigned-class 4
Showing Quick PoE enabled:
switch(config)# power-over-ethernet quick-poe 1/1 switch(config)# interface 1/1/1 switch(config)# power-over-ethernet assigned-class 4 Interface assigned class cannot be configured when Quick PoE is enabled.

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

PoE commands | 2099

power-over-ethernet power-pairs
power-over-ethernet power-pairs {alt-a | alt-a-and-alt-b} no power-over-ethernet power-pairs {alt-a | alt-a-and-alt-b}
Description
Configures the four-pair capable switch to operate in a mode, that restricts the power delivery for class 0 to class 4 single signature devices to operate only on ALT-A power pair.

When configured, a warning message is displayed. User must accept the warning by entering Y to enable the mode.
The no form of this command resets the power pairs to default PoE pairs.

Parameter alt-a alt-a-and-alt-b

Description
Delivers power only on the ALT-A pair.
Delivers power on the ALT-A and ALT-B pairs. This is the default configuration on all PoE interfaces.

Usage
IEEE 802.3bt devices such as four-pair (class 5 and higher) and dual signature powered devices require power on both pairs. However, there is no such restriction on IEEE 802.3af (class 0 to class 3) and IEEE 802.3at (class 4) powered devices not to draw power on both pairs if the overall consumption does not violate the power class limit. For such powered devices, a power-pairs configuration is provided to configure the 4-pair capable switch to restrict power on only one power pair.
Examples
Configuring PoE power pairs:

switch(config)# interface 1/1/1 switch(config-if)# power-over-ethernet power-pairs alt-a
This setting configures the interface to deliver power only on the ALT-A cable pair when a Class 0-4 device is connected. Devices that require power on all pairs may not operate correctly.
Continue (y/n)? y

Resetting the PoE power pair to default:

switch(config-if)# no power-over-ethernet power-pairs alt-a

This setting configures the interface to deliver power on the ALT-A and ALT-B cable pairs. This is the default and most devices work properly with this setting, however some older Class 0-4 devices may not operate correctly.
Continue (y/n)? y

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2100

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms
6300 6400

Command context config-if

Modification Command Introduced
Authority Administrators or local user group members with execution rights for this command.

power-over-ethernet pre-std-detect
power-over-ethernet pre-std-detect no power-over-ethernet pre-std-detect
Description
Before IEEE 802.3 released the first Power over Ethernet standard (802.3af), vendors had shipped PoE capable switches and PD's. As we are backward compatible Aruba will support both IEEE standard and pre-standard 802.3af Power over Ethernet PD's concurrently. This CLI allows the user to enable or disable pre-802.3af-standard device detection and powering on the specific port. When pre-std-detect is enabled, power will be delivered on PairA only. Default is disabled. The no form of this command resets the action to default.
Examples
On the 6400 Switch Series, interface identification differs. Enabling standard device detection:
switch(config)# interface 1/1/1 switch(config-if)# power-over-ethernet pre-std-detect
Disabling standard device detection:
switch(config-if)# no power-over-ethernet pre-std-detect

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

PoE commands | 2101

Command Information

Platforms
6300 6400

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

power-over-ethernet priority
power-over-ethernet priority {critical | high | low} no power-over-ethernet priority {critical | high | low}
Description
Sets PoE priority for an interface Specifying critical, high, or low indicates the priority of the interface in the event of power over-subscription. Within the same priority level, higher power-priority line-module ports have higher precedence. With same PoE priority and same line-module priority, lower numbered line-module ports have higher precedence. Per-interface PoE priority is low by default. The no form of this command resets the priority to default PoE priority "low".
Examples
Configuring PoE priority:
switch(config)# interface 1/1/1 switch(config-if)# power-over-ethernet priority critical switch(config-if)# power-over-ethernet priority high
Resetting the PoE priority to default:
switch(config-if)# no power-over-ethernet priority high

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

power-over-ethernet quick-poe
power-over-ethernet quick-poe <MODULE-ID>

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2102

no power-over-ethernet
Description
Quick PoE is a feature that provides the ability for the switch to provide power to the connected powered device as soon as switch goes through cold reboot. When quick PoE is enabled on the subsystem PoE port disablement and PD demotion is not allowed. also quick PoE enablement is not allowed if any of the port is disabled on the subsystem. User should not over-subscribe the PoE power when quick PoE is enabled. Quick PoE saved configuration will work irrespective of the configuration change at reboot. Enables quick PoE feature on the switch or the subsystem level. By default, quick-PoE is disabled for the subsystem. The no form of this command disables quick PoE.

Parameter <MODULE-ID>

Description Specifies module number for quick PoE configuration .

Examples
On the 6400 Switch Series, interface identification differs. Enabling and disabling quick PoE:

switch(config)# power-over-ethernet quick-poe 1/2 switch(config)# no power-over-ethernet quick-poe 1/2

switch(config-if)# power-over-ethernet quick-poe 1/1 PoE must be enabled on all interfaces before enabling Quick PoE

switch(config-if)# power-over-ethernet quick-poe 1/3 All interfaces must use the default assigned class before enabling Quick PoE

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

power-over-ethernet threshold

PoE commands | 2103

power-over-ethernet threshold <PERCENTAGE> no power-over-ethernet threshold <PERCENTAGE>
Description
Sets the threshold at which the system will send an excess power consumption notification trap. Default value is 80 percentage. The no form of this command resets the action to default.

Parameter <PERCENTAGE>

Description Excess power consumption trap threshold. Range 1-99.

Examples
Setting the power-over-ethernet threshold:

switch(config)# power-over-ethernet threshold 75

Resetting the power-over-ethernet threshold to default:

switch(config-if)# no power-over-ethernet threshold 75

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

power-over-ethernet trap
power-over-ethernet trap no power-over-ethernet trap
Description
This command enables/disables the SNMP trap generation for PoE related events at system level. PoE trap generation is enabled by default. The no form of this command resets the priority to default PoE priority "low".
Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2104

Enabling SNMP trap generation for PoE: switch(config)# power-over-ethernet trap
Disabling SNMP trap generation for PoE: switch(config-if)# no power-over-ethernet trap

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

show lldp local
show lldp local-device [<INTERFACE-ID>]
Description
Displays information advertised by the switch if the LLDP feature is enabled by user.

Parameter <INTERFACE-ID>

Description Specifies an interface. Format: member/slot/port

Examples
On the 6400 Switch Series, interface identification differs. Showing LLDP local device:

switch# show lldp local-device 1/1/10 Local Port Data ===============

Port-ID Port-Desc Port VLAN ID

: 1/1/10 : "1/1/10" :0

PoE Plus Information

PoE commands | 2105

PoE Device Type : Type 2 PSE

Power Source

: Primary

Power Priority

: low

PSE Allocated Power: 25.0 W

PD Requested Power : 25.0 W

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show lldp neighbor
show lldp neighbor [<INTERFACE-ID>]
Description
Displays detailed information about a particular neighbor connected to a particular interface.

Parameter <INTERFACE-ID>

Description Specifies an interface. Format: member/slot/port

Examples
On the 6400 Switch Series, interface identification differs. Showing LLDP neighbor information when there is only one neighbor:

switch# show lldp neighbor-info 1/1/10

Port

: 1/1/10

Neighbor Entries

:1

Neighbor Entries Deleted

:0

Neighbor Entries Dropped

:0

Neighbor Entries Aged-Out

:0

Neighbor Chassis-Name

: 84:d4:7e:ce:5d:68

Neighbor Chassis-Description : ArubaOS (MODEL: 325), Version Aruba IAP

Neighbor Chassis-ID

: 84:d4:7e:ce:5d:68

Neighbor Management-Address : 169.254.41.250

Chassis Capabilities Available : Bridge, WLAN

Chassis Capabilities Enabled :

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2106

Neighbor Port-ID Neighbor Port-Desc TTL Neighbor Port VLAN ID Neighbor PoEplus information Neighbor Device Type Neighbor Power Priority Neighbor Power Source Neighbor Power Requested Neighbor Power Allocated Neighbor Power Supported Neighbor Power Enabled Neighbor Power Class Neighbor Power Paircontrol Neighbor Power Pairs

: 84:d4:7e:ce:5d:68 : eth0 : 120 : : DOT3 : TYPE2 PD : Unkown : Primary : 25.0 W : 0.0 W : No : No :5 : No : SIGNAL

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show power-over-ethernet
6300 Switch Series: show power-over-ethernet [member <MEMBER-ID>] [brief] 6400 Switch Series: show power-over-ethernet [<MODULE-ID>] [brief] 6300, 6400 Switch Series: show power-over-ethernet [<IFRANGE>] [brief]
Description
Displays the status information of the full system. Displays the brief status of all port or given port if parameter brief is used. Displays the detailed status of given port.

Parameter <MODULE-ID> <IFRANGE>

Description Displays detailed status for the given module. Port identifier range.

PoE commands | 2107

Parameter <IFNAME> brief

Description Display the detailed status of given port. Display the brief status of all ports or the given port.

Examples
Showing sample output for show power-over-ethernet on standalone box with VSF capabiity:

switch# show power-over-ethernet

System Power Status for member 1

Configured Power Status Operational Power Status Total Available Power Total Failover Pwr Avl Total Redundancy Power Total Power Drawn Total Power Reserved Total Remaining Power Trap Threshold Trap Enabled Always-on PoE Enabled Quick PoE Enabled

: No redundancy : No redundancy : 740 W : 0W : 0W : 0 W +/- 6W : 0W : 740 W : 80 % : Yes : 1/1 : None

Internal Power

Total Power

PS (Watts)

----- -------------

1

0

2

740

Status --------------------Absent Ok

System Power Status for member 2

Configured Power Status Operational Power Status Total Available Power Total Failover Pwr Avl Total Redundancy Power Total Power Drawn Total Power Reserved Total Remaining Power Trap Threshold Trap Enabled Always-on PoE Enabled Quick PoE Enabled

: No redundancy : No redundancy : 600 W : 0W : 0W : 0 W +/- 6W : 0W : 600 W : 80 % : Yes : None : None

Internal Power

Total Power

PS (Watts)

----- -------------

1

0

2

600

Status --------------------Absent Ok

Showing sample output for power-over-ethernet member:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2108

switch# show power-over-ethernet member 1

System Power Status for member 1

Configured Power Status Operational Power Status Total Available Power Total Failover Pwr Avl Total Redundancy Power Total Power Drawn Total Power Reserved Total Remaining Power Trap Threshold Trap Enabled Always-on PoE Enabled Quick PoE Enabled

: No redundancy : No redundancy : 740 W : 0W : 0W : 0 W +/- 6W : 0W : 740 W : 80 % : No : 1/1 : 1/1

Internal Power

Total Power

PS (Watts)

----- -------------

1

0

2

740

Status --------------------Absent Ok

Showing sample output for power-over-ethernet brief in a VSF stack:

switch# show power-over-ethernet brief

Status and Configuration Information for PoE

Member 1 Power Status Available: 370 W Reserved: 55.60 W Always-on PoE Enabled: 1/1 Quick PoE Enabled: None

Remaining: 314.40 W

PoE Port ------1/1/1 1/1/2 1/1/3 1/1/4

Pwr Power Pre-std Alloc PSE Pwr PD Pwr PoE Port

PD

Cls Type

En Priority Detect Act Rsrvd Draw Status

Sign

--- ------ ------- ----- ------ ------ --------- ----- --- ----

Yes Low

Off

Class 0.0 W 0.0 W Denied

None 4 2

Yes Critical Off

Usage 1.6 W 1.5 W Delivering* Single 0 1

Yes High

Off

Class 54.0 W 25.5 W Delivering*^ Dual 1/3 3

No Low

On

Usage 0.0 W 0.0 W Disabled

None N/A N/A

Member 2 Power Status Available: 600 W Reserved: 0.00 W Always-on PoE Enabled: None Quick PoE Enabled: None

Remaining: 600 W

PoE Port ------2/1/1 2/1/2 2/1/3 2/1/4

Pwr Power Pre-std Alloc PSE Pwr PD Pwr PoE Port

En Priority Detect Act Rsrvd Draw Status

--- ------ ------- ----- ------ ------ ---------

Yes Low

Off

Class 0.0 W 0.0 W Searching

Yes Critical Off

Usage 0.0 W 0.0 W Searching

Yes High

Off

Class 0.0 W 0.0 W Searching

No Low

On

Usage 0.0 W 0.0 W Disabled

PD Sign ----None None None None

Cls Type
--- ---N/A N/A N/A N/A N/A N/A N/A N/A

*This port may go down in the event of a PSU failure. ^This port is power demoted due to user config or power availabilty.

Showing sample output for power-over-ethernet brief for a Chassis system:

PoE commands | 2109

switch# show power-over-ethernet brief

Status and Configuration Information for PoE

Power Status Available: 370 W Reserved: 55.60 W Remaining: 314.40 W Always-on PoE Enabled: 1/1,1/3,1/4,1/7 Quick PoE Enabled: None

PoE Port ------1/1/1 1/1/2 1/1/3 1/1/4

Pwr Power Pre-std Alloc PSE Pwr PD Pwr PoE Port

En Priority Detect Act Rsrvd Draw Status

--- ------ ------- ----- ------ ------ ---------

Yes Low

Off

Class 0.0 W 0.0 W Denied

Yes Critical Off

Usage 1.6 W 1.5 W Delivering*

Yes High

Off

Class 54.0 W 25.5 W Delivering^

No Low

On

Usage 0.0 W 0.0 W Disabled

PD

Cls Type

Sign

----- --- ----

None 4 2

Single 0 1

Dual 1/3 3

None N/A N/A

*This port may go down in the event of a PSU failure. ^This port is power demoted due to user config or power availabilty.

Showing sample output for power-over-ethernet brief per-port:

switch# show power-over-ethernet 1/1/1 brief

Status and Configuration Information for port 1/1/1

Member 1Power Status

Available: 370 W Reserved: 55.60 W Remaining: 314.40 W

Always-on PoE Enabled: 1/1

PoE

Pwr Power Pre-std Alloc PSE Pwr PD Pwr PoE Port

Port

En Priority Detect Act Rsrvd Draw Status

------- --- ------ ------- ----- ------ ------ ---------

1/1/1 Yes Low

Off

Class 0.0 W 0.0 W Denied

PD Sign ----None

Cls Type
--- ---42

Showing sample output for power-over-ethernet brief for interface range: For 6300 Switch series:

switch# show power-over-ethernet 1/1/1-1/1/2 brief

Status and Configuration Information for port 1/1/1-1/1/2

Member 1Power Status

Available: 370 W Reserved: 55.60 W Remaining: 314.40 W

Always-on PoE Enabled: 1/1

Quick PoE Enabled: None

PoE

Pwr Power Pre-std Alloc PSE Pwr PD Pwr PoE Port

Port

En Priority Detect Act Rsrvd Draw Status

------- --- ------ ------- ----- ------ ------ ---------

1/1/1 Yes Low

Off

Class 0.0 W 0.0 W Denied

1/1/2 Yes Critical Off

Usage 1.6 W 1.5 W Delivering*

PD

Cls Type

Sign

----- --- ----

None 4 2

Single 0 1

For 6400 Switch series:

switch# show power-over-ethernet 1/1/1-1/1/2 brief Status and Configuration Information for port 1/1/1-1/1/2

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2110

Power Status

Available: 360 W Reserved: 0.00 W Remaining: 360.00 W

Always-on PoE Enabled: 1/1

Quick PoE Enabled: None

PoE

Pwr Power Pre-std Alloc PSE Pwr PD Pwr PoE Port

Port

En Priority Detect Act Rsrvd Draw Status

------- --- ------ ------- ----- ------ ------ ---------

1/1/1 Yes Low

Off

Usage 0.0 W 0.0 W Searching

1/1/2 Yes Low

Off

Usage 0.6 W 0.0 W Searching

PD Sign ----N/A N/A

Cls Type
--- ---N/A N/A N/A N/A

Showing sample output for power-over-ethernet for a missing line card:

switch# show power-over-ethernet 1/3 brief Module 1/3 is not physically present.

Showing sample output for power-over-ethernet brief for a missing member: switch# show power-over-ethernet member 3 brief Member 3 is not physically present.

Showing sample output for power-over-ethernet port when physical interface is not present:

switch# show power-over-ethernet 2/1/1 Interface 2/1/1 is not present.

Showing power-over-ethernet port with dual signature PD connected:

switch# show power-over-ethernet 1/1/1

Status and Configuration Information for port 1/1/1*

Power Enable PoE PairA Status Alloc-by Configured User Profile Priority Port Priority PD Type PairA Requested Class PairA Assigned Class Fault Status PairA PD Class Override

: Yes : Delivering : Class : High : High : Type3 : Class1 : Class1 : None : Disabled

alt-b

PD signature PoE PairB Status Alloc-by Actual Port Config Priority Pre-std Detect User Assigned Class PairB Requested Class PairB Assigned Class Fault Status PairB Power Pairs Configured Power Pairs Applied

: Dual : Delivering : Class : Low : Disabled : Class6 : Class4 : Class4 : None : alt-a : alt-a-and-

PoE Counter Information

Over Current Cnt PairA : 0 Power Denied Cnt PairA : 0 Over Current Cnt PairB : 0 Power Denied Cnt PairB : 0

MPS Absent Cnt PairA

:0

Short Cnt PairA

:0

MPS Absent Cnt PairB

:0

Short Cnt PairB

:0

PoE commands | 2111

Power Information

PSE Voltage

: 56.3 V

PD Current Draw

: 4.1 A

PD Average Power Draw : 24.0 W

PSE Reserved power PD Power Draw PD Peak Power Draw

LLDP Information

MED Override

: Enabled

MED Priority

: High

PSE TLV Configured

: dot3, med

PSE TLV Sent Type

: dot3-ext

PD TLV Sent Type

: med, dot3-ext

DS PSE Allocated Power Value Alt A : 2.5 W

DS PD Requested Power Value Mode A : 2.5 W

DS PSE Allocated Power Value Alt B : 25.0 W

DS PD Requested Power Value Mode B : 25.0 W

: 34.0 W : 24.6 W : 25.1 W

Showing power-over-ethernet port with single signature PD connected: switch# show power-over-ethernet 1/1/1

Status and Configuration Information for port 1/1/9*

Power Enable PoE Port Status Alloc-by Configured User Profile Priority Port Priority PD Requested Class Fault Status PD Class Override b

: Yes : Delivering : Usage : High : High : Class1 : None : Disabled

b

PD signature

: None

PD Type

: Type3

Alloc-by Actual

: Usage

Port Config Priority : Low

Pre-std Detect

: Disabled

PSE Assigned Class

: Class1

User set Assigned Class : Class6

Power Pairs Configured : alt-a-and-alt-

Power Pairs Applied

: alt-a-and-alt-

PoE Counter Information

Over Current Cnt

:0

Power Denied Cnt

:0

MPS Absent Cnt

:0

Short Cnt

:0

Power Information

PSE Voltage

: 56.3 V

PD Current Draw

: 1.1 A

PD Average Power Draw : 8.0 W

PSE Reserved power PD Power Draw PD Peak Power Draw

: 8.6 W : 8.6 W : 9.1 W

LLDP Information

LLDP Detect

: Disabled

PSE TLV Configured

: N/A

PSE TLV Sent Type

: N/A

PD TLV Sent Type

: N/A

PSE Allocated Power Value : 0.0 W

PD Requested Power Value : 0.0 W

Showing power-over-ethernet for a port range:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2112

switch# show power-over-ethernet 1/1/3-1/1/4

Status and Configuration Information for port 1/1/3

Power Enable PoE Port Status Alloc-by Config User Profile Priority Port Priority PD Requested Class Fault Status PD Class Override b

: Yes : Delivering : Usage : High : High : Class1 : None : Disabled

b

PD signature

: None

PD Type

: Type3

Alloc-by Actual

: Usage

Port Config Priority : Low

Pre-std Detect

: Disabled

PSE Assigned Class

: Class1

User set Assigned Class : Class6

Power Pairs Configured : alt-a-and-alt-

Power Pairs Applied

: alt-a-and-alt-

PoE Counter Information

Over Current Cnt

:0

Power Denied Cnt

:0

MPS Absent Cnt

:0

Short Cnt

:0

Power Information

PSE Voltage

: 56.3 V

PD Current Draw

: 1.1 A

PD Average Power Draw : 8.0 W

PSE Reserved power PD Power Draw PD Peak Power Draw

: 8.6 W : 8.6 W : 9.1 W

LLDP Information

LLDP Detect

: Disabled

PSE TLV Configured

: N/A

PSE TLV Sent Type

: N/A

PD TLV Sent Type

: N/A

PSE Allocated Power Value : 0.0 W

PD Requested Power Value : 0.0 W

Status and Configuration Information for port 1/1/4*

Power Enable PoE Port Status Alloc-by Config User Profile Priority Port Priority PD Requested Class Fault Status PD Class Override

: Yes : Delivering : Usage : High : High : Class1 : None : Disabled

PD signature

: None

PD Type

: Type3

Alloc-by Actual

: Usage

Port Config Priority : Low

Pre-std Detect

: Disabled

PSE Assigned Class

: Class1

User set Assigned Class : Class6

Power Pairs Configured : alt-a

Power Pairs Applied

: alt-a

PoE Counter Information

Over Current Cnt

:0

Power Denied Cnt

:0

MPS Absent Cnt

:0

Short Cnt

:0

Power Information

PSE Voltage

: 56.3 V

PD Current Draw

: 1.1 A

PD Average Power Draw : 4.0 W

PSE Reserved power PD Power Draw PD Peak Power Draw

: 4.3 W : 4.3 W : 4.3 W

LLDP Information

PoE commands | 2113

LLDP Detect

: Disabled

PSE TLV Configured

: N/A

PSE TLV Sent Type

: N/A

PD TLV Sent Type

: N/A

PSE Allocated Power Value : 0.0 W

PD Requested Power Value : 0.0 W

For more information on features that use this command, refer to the Monitoring Guide for your switch model.

Command History
Release 10.09
10.07 or earlier

Modification
Added power-pairs configuration in the show power-overethernet <IFRANGE> output.
--

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2114

Chapter 114
Port access 802.1X authentication commands

Port access 802.1X authentication commands
aaa authentication port-access dot1x authenticator
aaa authentication port-access dot1x authenticator {enable | disable} no aaa authentication port-access dot1x authenticator {enable | disable}
Description
Enables or disables 802.1X authentication globally or at the port-level. The no form of the command deletes global 802.1X configuration details and disables 802.1X authentication.
Examples
Enabling 802.1X authentication globally:
switch(config)# aaa authentication port-access dot1x authenticator enable
Disabling 802.1X authentication globally:
switch(config)# aaa authentication port-access dot1x authenticator disable
Deleting and disabling global 802.1X authentication:
switch(config)# no aaa authentication port-access dot1x authenticator
Enabling 802.1X authentication on a port:
switch(config-if)# aaa authentication port-access dot1x authenticator enable
Disabling 802.1X authentication on a port:
switch(config-if)# aaa authentication port-access dot1x authenticator disable
Deleting and disabling 802.1X authentication configuration on a port:
switch(config-if)# no aaa authentication port-access dot1x authenticator

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
AOS-CX 10.14 Command-Line Interface Guide

2115

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator authmethod
aaa authentication port-access dot1x authenticator auth-method eap-radius no aaa authentication port-access dot1x authenticator auth-method eap-radius
Description
Configures the authentication mechanism used to control access to the network. The configured authentication method will be used to authenticate 802.1X clients. The no form of the command resets the authentication mechanism to the default, eap-radius.

Parameter eap-radius

Description Specifies the EAP RADIUS as the 802.1X authentication method.

Examples
Enabling the EAP RADIUS 802.1X authentication method on the switch:

switch(config)# aaa authentication port-access dot1x authenticator auth-method eap-radius

Resetting the EAP RADIUS 802.1X authentication method on the switch:

switch(config)# no aaa authentication port-access dot1x authenticator auth-method eap-radius

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Port access 802.1X authentication commands | 2116

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator cachedreauth
aaa authentication port-access dot1x authenticator cached-reauth no aaa authentication port-access dot1x authenticator cached-reauth
Description
Enables cached reauthentication on a port. Cached reauthentication allows 802.1X reauthentications to succeed when the RADIUS server is unavailable. Users already authenticated retain their currently assigned RADIUS attributes. The no form of the command disables the cached reauthentication on a port.
Examples
Enabling cached reauthentication on a port:
switch(config-if)# aaa authentication port-access dot1x authenticator cachedreauth
Disabling cached reauthentication on a port:
switch(config-if)# no aaa authentication port-access dot1x authenticator cachedreauth

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator cachedreauth-period
aaa authentication port-access dot1x authenticator cached-reauth-period <PERIOD>

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2117

no aaa authentication port-access dot1x authenticator cached-reauth-period
Description
Configures the period during which an authenticated client, which has failed to reauthenticate because the RADIUS server is unreachable, remains authenticated. The no form of the command resets the cached reauthentication period to the default, 30 seconds.

Parameter <PERIOD>

Description
Specifies the cached reauthentication period (in seconds). Default: 3600. Range: 1 to 4294967295.

Examples
Configuring the cached reauthentication period on a port:

switch(config-if)# aaa authentication port-access dot1x authenticator cachedreauth-period 300

Resetting the cached reauthentication period to the default value:

switch(config-if)# no aaa authentication port-access dot1x authenticator cachedreauth-period

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator discovery-period
aaa authentication port-access dot1x authenticator discovery-period <PERIOD> no aaa authentication port-access dot1x authenticator discovery-period
Description
Configures the period the port waits to retransmit the next EAPOL request identity frame on an 802.1X enabled port that has no authenticated clients.

Port access 802.1X authentication commands | 2118

The no form of the command resets the discovery period to the default, 30 seconds.

Parameter <PERIOD>

Description
Specifies the discovery period (in seconds). Default: 30. Range: 1 to 65535.

Examples
Configuring the discovery period on a port:

switch(config-if)# aaa authentication port-access dot1x authenticator discoveryperiod 120

Resetting the discovery period to the default value:

switch(config-if)# no aaa authentication port-access dot1x authenticator discovery-period

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator eap-tlsfragment
aaa authentication port-access dot1x authenticator eap-tls-fragment towards-server <maxfragment-size> no aaa authentication port-access dot1x authenticator eap-tls-fragment towards-server
Description
Configure the maximum size in bytes of an EAP-TLS fragment encoded in a single RADIUS request packet. The no form of the command resets the size to the default value of 3072 bytes.
Examples
Setting the EAP-TLS fragment size for RADIUS request to 1024 bytes:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2119

switch(config)# aaa authentication port-access dot1x authenticator eap-tlsfragment towards-server 1024
Resetting EAP-TLS fragment size back to the default value of 3072 bytes
switch(config-if)# no aaa authentication port-access dot1x authenticator eap-tlsfragment towards-server

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms
6300 6400

Command context config-if

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator eapoltimeout
aaa authentication port-access dot1x authenticator eapol-timeout <EAPOL-TIMEOUT> no aaa authentication port-access dot1x authenticator eapol-timeout
Description
Configure the period the switch waits for a response from a client before retransmitting an EAPOL PDU. If the value is 0, the time period is calculated as per RFC 2988.
As per RFC 2988 2.1: Before Round-Trip Time (RTT) measurement, set Retransmission Timeout (RTO) to 3 seconds for initial retransmission and then double the RTO to provide back off as per section 5.5. Limit the maximum RTO (RTOmax) to 20 seconds as per section 4.3 of RFC 3748.
The no form of the command resets the timeout period to the default.

Parameter <EAPOL-TIMEOUT>

Description
Specifies the EAPOL timeout period (in seconds). Range: 1 to 65535.

Examples
Configuring EAPOL timeout on a port:

Port access 802.1X authentication commands | 2120

switch(config-if)# aaa authentication port-access dot1x authenticator eapoltimeout 120
Resetting the EAPOL timeout to the default value:
switch(config-if)# no aaa authentication port-access dot1x authenticator eapoltimeout

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator initialauth-response-timeout
aaa authentication port-access dot1x authenticator initial-auth-response-timeout <TIMEOUT>
no aaa authentication port-access dot1x authenticator initial-auth-response-timeout [<TIMEOUT>]
Description
Configures the period of time (in seconds) the switch waits for the first EAPOL frame from a client before deeming the client to be incapable of 802.1X and therefore attempting the next authentication method, if any. The default is for this timeout to be disabled. The no form of this command disables the timeout.

Parameter <TIMEOUT>

Description Specifies the timeout period (in seconds). Range: 1 to 65535.

Examples
Setting a 30 second timeout:

switch(config-if)# aaa authentication port-access dot1x authenticator initial-auth-response-timeout 30

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2121

Disabling the timeout:
switch(config-if)# no aaa authentication port-access dot1x authenticator initial-auth-response-timeout

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator macsec
aaa authentication port-access dot1x authenticator macsec no aaa authentication port-access dot1x authenticator macsec
Description
Enables the switch to provision a MACsec channel dynamically when the 802.1X client is authenticated using an EAP method that supports mutual authentication. MACsec is supported in device mode and in client mode with a client limit of one on MACsec-capable ports.
If a MACsec policy is not associated with the role applied to the client on the port with MACsec enabled, a MACsec channel will not be established and the port will be blocked on the data-plane.
The no form of the command disables MACsec using EAP on the port.
Examples
Enabling MACsec using EAP on a port:
switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x authenticator macsec OR switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x authenticator switch(config-if-dot1x-auth)# macsec
Disabling MACsec using EAP on a port:

Port access 802.1X authentication commands | 2122

switch(config)# interface 1/1/1 switch(config-if)# no aaa authentication port-access dot1x authenticator macsec OR switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x authenticator switch(config-if-dot1x-auth)# no macsec

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.10

Modification Command introduced.

Command Information

Platforms 6300

Command context
config-if config-if-dot1x-auth

Authority
Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator maxeapol-requests
aaa authentication port-access dot1x authenticator max-eapol-requests <MAX-EAPOLREQUESTS> no aaa authentication port-access dot1x authenticator max-eapol-requests
Description
Configures the number of EAPOL requests to send to a supplicant that must time out before authentication fails and the authentication session ends. The no form of the command resets the maximum number of EAPOL requests to the default, 5.

Parameter <MAX-EAPOL-REQUESTS>

Description
Specifies the maximum number of EAPOL requests. Default: 5. Range: 1 to 10.

Examples
Configuring maximum EAPOL requests on a port:

switch(config-if)# aaa authentication port-access dot1x authenticator max-eapolrequests 3

Resetting the maximum EAPOL requests on a port to default:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2123

switch(config-if)# no aaa authentication port-access dot1x authenticator maxeapol-requests

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator maxretries
aaa authentication port-access dot1x authenticator max-retries <max-retries> no aaa authentication port-access dot1x authenticator max-retries
Description
Configures the maximum number of retries that the switch attempts to authenticate a client on a port before marking the client as unauthenticated. The no form of the command resets the maximum number of retries to the default, 2.

Parameter <max-retries>

Description
Indicates the number of authentication attempts. Default: 2. Range: 1 to 10.

Examples
Configuring maximum authentication attempts on a port:

switch(config-if)# aaa authentication port-access dot1x authenticator max-retries 5

Resetting the maximum authentication attempts on a port to default:

switch(config-if)# no aaa authentication port-access dot1x authenticator maxretries

Port access 802.1X authentication commands | 2124

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator mka cak-length
aaa authentication port-access dot1x authenticator mka cak-length {16|32} no aaa authentication port-access dot1x authenticator mka cak-length {16|32}
Description
Configures the length of the Connectivity Association Key (CAK) to generate for EAP based MACsec. The no form of this command resets the length to the default value of 32 bytes.

Parameter {16|32}

Description Specifies the CAK length. Default: 32.

Examples
Configuring the CAK length to 16 bytes:

switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x authenticator mka caklength 16 OR switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x authenticator switch(config-if-dot1x-auth)# mka cak-length 16

Configuring the CAK length to default:

switch(config)# interface 1/1/1 switch(config-if)# no aaa authentication port-access dot1x authenticator mka caklength OR switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x authenticator switch(config-if-dot1x-auth)# no mka cak-length

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2125

OR switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x authenticator switch(config-if-dot1x-auth)# no mka cak-length 16

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10.1000

Modification Command introduced.

Command Information

Platforms 6300

Command context
config-if config-if-dot1x-auth

Authority
Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator quietperiod
aaa authentication port-access dot1x authenticator quiet-period <PERIOD> no aaa authentication port-access dot1x authenticator quiet-period
Description
Configures the period during which the port does not try to acquire a supplicant. This period begins after the last authentication attempt, authorized by the maximum retries parameter, fails. You can configure the number of maximum retries with the aaa authentication port-access dot1x authenticator max-retries command. The no form of the command resets the quiet period to the default, 60 seconds.

Parameter <PERIOD>

Description
Specifies the quiet period (in seconds). Default: 60. Range: 0 to 65535.

Examples
Configuring quiet period on a port:

switch(config-if)# aaa authentication port-access dot1x authenticator quiet-period 100

Resetting the quiet period on a port to default:

Port access 802.1X authentication commands | 2126

switch(config-if)# no aaa authentication port-access dot1x authenticator quietperiod

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator radius server-group
aaa authentication port-access dot1x authenticator radius server-group <GROUP-NAME> no aaa authentication port-access dot1x authenticator radius server-group <GROUP_NAME>
Description
Configures the switch to use an existing RADIUS server group for 802.1X authentication globally or for a particular port. The no form of the command resets the server group to the default, radius. When configured on a port, the no form of the command resets the server group on that port to the globally configured group. If no global RADIUS server group is configured, the no form of the command resets the configuration to the default group, radius.
When the RADIUS server group for 802.1X authentication is updated on a port, any existing clients on the port that were authenticated using the previous globally configured group will associate with the new group for the port during the next re-authentication cycle. Any new client that is onboarding on the port after the server group update will associate with the new group immediately.

Parameter <GROUP-NAME>

Description Specifies the name of the RADIUS server group.

Examples
Configuring the switch to use RADIUS server group employee:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2127

switch(config)# aaa authentication port-access dot1x authenticator radius servergroup employee
Resetting RADIUS server group configuration to default:
switch(config)# no aaa authentication port-access dot1x authenticator radius server-group
Configuring the RADIUS authentication server group on 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x authenticator switch(config-if-dot1x-auth)# radius server-group group2
Resetting 802.1X RADIUS server group configuration on 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x authenticator switch(config-if-dot1x-auth)# no radius server-group

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.12 10.07 or earlier

Modification Command is now configurable on a port --

Command Information

Platforms
6300 6400

Command context
config config-dot1x-auth config-if-dot1x-auth

Authority
Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator reauth
aaa authentication port-access dot1x authenticator reauth no aaa authentication port-access dot1x authenticator reauth
Description
Enables periodic reauthentication of authenticated clients on the port. The no form of the command disables periodic reauthentication.
Examples

Port access 802.1X authentication commands | 2128

Enabling periodic reauthentication on a port: switch(config-if)# aaa authentication port-access dot1x authenticator reauth
Disabling periodic reauthentication on a port: switch(config-if)# no aaa authentication port-access dot1x authenticator reauth

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x authenticator reauthperiod
aaa authentication port-access dot1x authenticator reauth-period <PERIOD> no aaa authentication port-access dot1x authenticator reauth-period
Description
Configures the period after which the authenticated clients are reauthenticated on the port. You must enable reauthentication on the port before configuring the reauthentication period. The no form of the command resets the reauthentication period to the default, 3600 seconds.

Parameter <PERIOD>

Description
Specifies the reauthentication period (in seconds). Default: 3600. Range: 1 to 4294967295.

Examples
Configuring reauthentication period on a port:

switch(config-if)# aaa authentication port-access dot1x authenticator reauthperiod 100

Resetting the reauthentication period to the default value:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2129

switch(config-if)# no aaa authentication port-access dot1x authenticator reauthperiod

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

clear dot1x authenticator statistics interface
clear dot1x authenticator statistics [interface <IF-NAME>]
Description
Clears the 802.1X authentication statistics associated with the port and all the authenticator clients attached to this port. If no interface is specified, the statistics is cleared for all 802.1X enabled ports.

Parameter <IF-NAME>

Description Specifies the interface name.

Examples
Clearing authentication statistics on a port:

switch# clear dot1x authenticator statistics interface 1/3/1

Clearing authentication statistics on all ports:

switch# clear dot1x authenticator statistics

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

Port access 802.1X authentication commands | 2130

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show aaa authentication port-access dot1x authenticator interface client-status
show aaa authentication port-access dot1x authenticator interface {all|<IF-NAME>} client-status [mac <MAC-ADDRESS>]
Description
Shows information about active 802.1X authentication sessions. The output can be filtered by interface or MAC address.

Parameter all <IF-NAME> <MAC-ADDRESS>

Description Specifies all interfaces. Specifies the interface name. Specifies the client MAC address.

Examples
On the 6400 Switch Series, interface identification differs. Showing client status information for all ports.

switch# show aaa authentication port-access dot1x authenticator interface all client-status

Client FE:04:D7:50:89:37, johndoe, 1/1/1 =========================================

Authentication Details ----------------------
Status Type EAP-Method Time Since Last State Change

: Authenticated : Pass-Through : MD5 : 10s

Authentication Statistics

-------------------------

Authentication

:0

Authentication Timeout

:0

EAP-Start While Authenticating

:0

EAP-Logoff While Authenticating

:0

Successful Authentication

:0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2131

Failed Authentication

:0

Re-Authentication

:0

Successful Re-Authentication

:0

Failed Re-Authentication

:0

EAP-Start When Authenticated

:0

EAP-Logoff When Authenticated

:0

Re-Auths When Authenticated

:0

Cached Re-Authentication

:0

Client 9A:B4:59:97:D0:7E, janedoe, 1/1/1 =========================================

Authentication Details ----------------------
Status Type EAP-Method Time Since Last State Change

: Authenticated : Pass-Through : TLS : 5s

Authentication Statistics

-------------------------

Authentication

:0

Authentication Timeout

:0

EAP-Start While Authenticating

:0

EAP-Logoff While Authenticating

:0

Successful Authentication

:0

Failed Authentication

:0

Re-Authentication

:0

Successful Re-Authentication

:0

Failed Re-Authentication

:0

EAP-Start When Authenticated

:0

EAP-Logoff When Authenticated

:0

Re-Auths When Authenticated

:0

Cached Re-Authentication

:0

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show aaa authentication port-access dot1x authenticator interface port-statistics
show aaa authentication port-access dot1x authenticator interface {all|<IF-NAME>} portstatistics

Port access 802.1X authentication commands | 2132

Description
Shows information about 802.1X ports. The output can be filtered by interface.

Parameter all <IF-NAME>

Description Specifies all interfaces. Specifies the interface name.

Examples
On the 6400 Switch Series, interface identification differs. Showing information for all ports.

switch# show aaa authentication port-access dot1x authenticator interface all port-statistics

Port 1/1/1 ==========

Client Details

--------------

Number of Clients

:1

Number of Authenticated Clients : 1

Number of Unauthenticated Clients : 0

Number of authenticating clients : 0

Statistics

----------

EAPOL Frames Received

:4

EAPOL Frames Transmitted

:3

EAPOL Start Frames Received

:1

EAPOL Logoff Frames Received

:0

EAPOL Response ID Frames Received

:2

EAPOL Response Frames Received

:1

EAPOL Request ID Frames Transmitted : 2

EAPOL Request Frames Transmitted

:1

EAPOL Invalid Frames Received

:0

EAPOL EAP Length Error Frames Received : 0

EAPOL Last Received Frame Version

:0

EAPOL Last Received Frame Client MAC : 0

Port 1/1/2 ==========

Client Details

--------------

Number of Clients

:1

Number of Authenticated Clients : 1

Number of Unauthenticated Clients : 0

Statistics

----------

EAPOL Frames Received

:4

EAPOL Frames Transmitted

:3

EAPOL Start Frames Received

:1

EAPOL Logoff Frames Received

:0

EAPOL Response ID Frames Received

:2

EAPOL Response Frames Received

:1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2133

EAPOL Request ID Frames Transmitted : 2

EAPOL Request Frames Transmitted

:1

EAPOL Invalid Frames Received

:0

EAPOL EAP Length Error Frames Received : 0

EAPOL Last Received Frame Version

:0

EAPOL Last Received Frame Client MAC : 0

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Port access 802.1X authentication commands | 2134

Chapter 115 Port access 802.1X supplicant commands

Port access 802.1X supplicant commands
aaa authentication port-access dot1x supplicant (global)
aaa authentication port-access dot1x supplicant
Description
Enters the 802.1X supplicant global configuration context.
Example
Enter the 802.1X supplicant configuration context:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)#

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms
6300 6400

Command context
config config-dot1x-supp

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access dot1x supplicant (port)
aaa authentication port-access dot1x supplicant
Description
Enters the 802.1X supplicant port context.
The 802.1X supplicant is only supported on L2 physical interfaces that are not members of a LAG.

AOS-CX 10.14 Command-Line Interface Guide

2135

Example
Enter the 802.1X supplicant port context:
switch(config)# interface 1/1/1 switch(config-if)# no routing switch(config-if)# aaa authentication port-access dot1x supplicant switch(config-if-dot1x-supp)#
When entering the context on a L3 port, an error message displays:
switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x supplicant The operation is allowed only on a L2 physical interface.
When entering the context on a LAG, an error message displays:
switch(config)# interface lag 1 switch(config-if)# aaa authentication port-access dot1x supplicant The operation is allowed only on a L2 physical interface.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms
6300 6400

Command context
config config-if config-dot1x-supp

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

associate policy
associate policy <POLICY-NAME> no associate policy <POLICY-NAME>
Description
Associates a supplicant policy with the port. The no form of the command dissociates the policy from the port and reverts to the default policy.
If an 802.1X supplicant is enabled on the port without associating a policy or dissociating a policy from the port, it results in the port using the default policy.

Port access 802.1X supplicant commands | 2136

Parameter <POLICY-NAME>

Description Specifies the name of the policy. (Maximum 32 characters).

Examples
Associating a supplicant policy with the port:

switch(config)# interface 1/1/1 switch(config)# no routing switch(config-if)# aaa authentication port-access dot1x supplicant switch(config-if-dot1x-supp)# associate policy CX_Policy

Removing the supplicant policy on the port:

switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x supplicant switch(config-if-dot1x-supp)# no associate policy OR
switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x supplicant switch(config-if-dot1x-supp)# no associate policy CX_Policy

When the policy being associated does not exist:

switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x supplicant switch(config-if-dot1x-supp)# associate policy New_Supp_Policy The policy does not exist.

When the policy being dissociated is not the one configured on the port:

switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x supplicant switch(config-if-dot1x-supp)# associate policy New_Supp_Policy The input value does not match the currently configured value.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09
Command Information

Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2137

Platforms
6300 6400

Command context
config config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

canned-eap-success
canned-eap-success no canned-eap-success
Description
Configures the switch to accept an EAP success from the authenticator without going through the complete authentication cycle. Default: disabled. The no form of the command resets it to the default.
Examples
Configuring the switch to accept a canned EAP success:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# canned-eap-success
Resetting the allow canned EAP success configuration to the default value in the system:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)#policy CX_Policy switch(config-dot1x-supp-policy)# no canned-eap-success

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

clear dot1x supplicant statistics
clear dot1x supplicant statistics [interface <IFRANGE>]

Port access 802.1X supplicant commands | 2138

Description
Clears the 802.1X supplicant statistics associated with the interface. If no interface is specified, the statistics are cleared for all 802.1X supplicant-enabled interfaces.

Parameter <IFRANGE>

Description
Specifies the range of VLAN interfaces for which the supplicant statistics are cleared.

Examples
Clearing authenticator statistics on a specific interface:

switch# clear dot1x supplicant statistics 1/1/1

Clearing authenticator statistics on all interfaces:

switch# clear dot1x supplicant statistics

Showing the message when the feature is not enabled on any interface of the system:

switch# clear dot1x supplicant statistics 802.1X supplicant is not configured.

Showing the message when the feature is not enabled on the interface:

switch# clear dot1x supplicant statistics 1/1/1 802.1X supplicant is not configured.

Showing the message when there are no 802.1X supplicants on the system:

switch# clear dot1x supplicant statistics No 802.1X supplicants found.

Showing the message when there are no 802.1X supplicants on the interface:

switch# clear dot1x supplicant statistics 1/1/1 No 802.1X supplicants found.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09

Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2139

Command Information

Platforms
6300 6400

Command context Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

discovery-timeout
discovery-timeout <DISCOVERY-TIMEOUT> no discovery-timeout <DISCOVERY-TIMEOUT>
Description
Configures the time period (in seconds) to wait for a potential 802.1X authenticator on the other end before considering the link to be non-802.1X-capable and opening the interface on the data-plane. On a timeout, the switch will not use the authentication result to determine the forwarding behavior of the interface until a link flap. If not set, the switch will wait for the 802.1X authentication cycle to complete before determining the forwarding state of the interface. The no form of the command removes the configuration.

Parameter <DISCOVERY-TIMEOUT>

Description
Specifies discovery timeout in seconds. Range: 0-300 seconds.

Examples
Configuring a discovery timeout of 15 seconds in the supplicant policy:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# discovery-timeout 15

Removing the discovery timeout from the policy:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp)# no discovery-timeout
OR
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# no discovery-timeout 15

When the value entered does not match the currently configured non-default value for EAPoL timeout, the following message is displayed:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy

Port access 802.1X supplicant commands | 2140

switch(config-dot1x-supp-policy)# discovery-timeout 15 switch(config-dot1x-supp-policy)# no discovery-timeout 5 The input value does not match the currently configured value.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.09

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

eap-identity
eap-identity identity <IDENTITY> no eap-identity identity <IDENTITY> eap-identity password {plaintext [<PLAINTEXT-PASSWORD>] | ciphertext <CIPHERTEXTPASSWORD>} no eap-identity password {plaintext [<PLAINTEXT-PASSWORD>] | ciphertext <CIPHERTEXTPASSWORD>}
Description
Configures the EAP identity to use for authentication including an identity name and an optional password. The no form of the command removes the configuration.

Parameter <IDENTITY> <PLAINTEXT-PASSWORD>
<CIPHERTEXT-PASSWORD>

Description
Specifies the EAP identity name. Maximum: 64 characters.
Specifies the password associated with the EAP identity in plaintext. Maximum: 32 characters.
Specifies the password without prompting. The password is visible as cleartext when entered but is encrypted thereafter. Command history does show the password as cleartext.
Specifies a ciphertext password. No password prompts are provided and the ciphertext password is validated before the configuration is applied for the user. The variable <CIPHERTEXTPASSWORD> is Base64 and is typically copied from another switch using the show running-config command output and then pasted into this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2141

Parameter

Description
NOTE: The administrator cannot construct ciphertext passwords themselves. The ciphertext is only created by an AOS-CX switch. The ciphertext is created by setting a password for a user with the user command. The ciphertext is available for copying from the show running-config output and pasting into the configuration on any other AOS-CX switch. The target switch must have the same export password (default or otherwise) as the source switch.

Examples
Configuring the EAP identity and password:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# eap-identity identity John Doe switch(config-dot1x-supp-policy)# eap-identity password plaintext johndoe
OR
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# eap-identity identity John Doe switch(config-dot1x-supp-policy)# eap-identity password plaintext Enter password: ****** Confirm password: ******
OR
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# eap-identity identity John Doe switch(config-dot1x-supp-policy)# eap-identity password ciphertext AQBapUwNK5Uf+r1vmhBIncQPw1YPVH0V1nYr7Yjm/bPn3bBVCgAAAHFKt8mcSv/A/g8=
Removing the EAP identity configuration:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp)# no eap-identity identity
OR
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# no eap-identity identity John Doe
Removing the EAP identity password configuration:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# no eap-identity password
OR
switch(config)# aaa authentication port-access dot1x supplicant

Port access 802.1X supplicant commands | 2142

switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# no eap-identity ciphertext AQBapUwNK5Uf+r1vmhBIncQPw1YPVH0V1nYr7Yjm/bPn3bBVCgAAAHFKt8mcSv/A/g8=
When the EAP identity string is longer than 64 characters, the following message is displayed:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# eap-identity identity This is a really long string with more than sixty four characters in it The EAP identity string is more than 64 characters long.
When the EAP identity password string is longer than 32 characters, the following message is displayed:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# eap-identity password plaintext This is a password with more than 32 characters The password is more than 32 characters long.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.09

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

eapol-force-multicast
eapol-force-multicast no eapol-force-multicast
Description
Configures the switch to send only multicast EAPoL packets irrespective of receiving unicast EAPoL packets from the authenticator. Default: disabled. The no form of the command resets it to the default.
Examples
Configuring the switch to always send EAPoL multicast packets:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2143

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# eapol-force-multicast
Resetting the EAPoL force multicast setting to the default value in the system:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# no eapol-force-multicast

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

eapol-method
eapol-method {eap-tls | eap-md5} no eapol-method {eap-tls | eap-md5}
Description
Configures the Extensible Authentication Protocol (EAP) method to use for authentication. The no form of the command resets it to the default. The default is EAP-TLS.

Parameter eapol-method eap-tls eap-md5

Description
Specifies the EAPoL method to use for authentication. Default: eap-tls.
Specifies the EAP method as EAP with TLS (EAP with transport layer security)
Specifies the EAP method as EAP with MD5 digest.

Examples
Configuring the EAP method as EAP-MD5:

Port access 802.1X supplicant commands | 2144

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# eap-method eap-md5
Resetting the EAP method to the default value in the system:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp)# no eap-method
OR
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# no eap-method eap-md5
When the value entered does not match the currently configured non-default value for EAP method, the following message is displayed:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# eap-method eap-md5 switch(config-dot1x-supp-policy)# no eap-method eap-tls The input value does not match the currently configured value.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.09

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

eapol-protocol-version
eapol-protocol-version no eapol-protocol-version
Description
Configures the EAPoL protocol version to use in EAPoL frames transmitted by the supplicant. The no form of the command resets it to the default.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2145

When the EAPoL protocol version is modified while the policy is in use on one or more ports, all the supplicant sessions on such ports are restarted.

Parameter protocol-version

Description
Required. Specifies the protocol-version. Options: 2 or 3. Default: 3.

Examples
Configuring the EAPoL protocol version as 2 in the supplicant policy:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# eapol-protocol-version 2

Reset the EAPoL protocol version to the default value:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp)# no eapol-protocol-version
OR
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# no eapol-protocol-version 2

When the value entered does not match the currently configured non-default value for EAPoL protocol version, the following message is displayed:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# eapol-protocol-version 2 switch(config-dot1x-supp-policy)# no eapol-protocol-version 3 The input value does not match the currently configured value.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09
Command Information

Modification Command introduced.

Port access 802.1X supplicant commands | 2146

Platforms
6300 6400

Command context
config config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

eapol-source-mac
eapol-source-mac (interface-mac | system-mac) no eapol-source-mac (interface-mac | system-mac)
Description
Configures the source MAC address to use in the EAPoL frames transmitted by the 802.1X supplicant. The default is interface MAC address. The no form of the command resets to its default EAPoL source MAC value.

Parameter interface-mac system-mac

Description Specifies the interface MAC address. Specifies the system MAC address.

Examples
Configuring the EAPoL source MAC as system MAC address:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# eapol-source-mac system-mac

Resetting the EAPoL source MAC to its default address:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# no eapol-source-mac system-mac

Removing the source MAC address that is not configured for EAPoL source MAC:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# eapol-source-mac system-mac switch(config-dot1x-supp-policy)# no eapol-source-mac interface-mac The input value does not match the currently configured value.

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2147

Release 10.10.1000

Modification Command introduced on the 6300 Switches.

Command Information

Platforms 6300

Command context
config config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

eapol-timeout
eapol-timeout <EAPOL-TIMEOUT> no eapol-timeout <EAPOL-TIMEOUT>
Description
Configures the time period (in seconds) to wait for a response from an authenticator before reattempting authentication. The no form of the command resets it to the default.

Parameter <EAPOL-TIMEOUT>

Description Specifies EAPoL timeout in seconds. Default: 30 seconds.

Examples
Configuring an EAPoL timeout of 10 seconds in the supplicant policy:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# eapol-timeout 10
Resetting the EAPoL timeout to the default value in the system:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp)# no eapol-timeout
OR
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# no eapol-timeout 10
When the value entered does not match the currently configured non-default value for EAPoL timeout, the following message is displayed:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy

Port access 802.1X supplicant commands | 2148

switch(config-dot1x-supp-policy)# eapol-timeout 10 switch(config-dot1x-supp-policy)# no eapol-timeout 5 The input value does not match the currently configured value.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.09

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

enable
enable no enable
Description
Enables the 802.1X supplicant on the port. By default, the 802.1X supplicant is disabled on the port. The no form of the command disables the 802.1X supplicant on the port.
Example
Enable the 802.1X supplicant on the port:
switch(config)# interface 1/1/1 switch(config)# no routing switch(config-if)# aaa authentication port-access dot1x supplicant switch(config-if-dot1x-supp)# enable
Disable the 802.1X supplicant on the port:
switch(config)# interface 1/1/1 switch(config-if)# no aaa authentication port-access dot1x supplicant switch(config-if-dot1x-supp)# no enable

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2149

Release 10.09

Command Information

Platforms
6300 6400

Command context
config config-dot1x-supp

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

enable
enable no enable
Description
Enables the 802.1X supplicant on the system. By default, 802.1X supplicant is disabled on the system. The no form of the command disables the 802.1X supplicant on the system.
Example
Enable the 802.1X supplicant on the system:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# enable
Disable the 802.1X supplicant on the system:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# no enable

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.09

Command Information

Platforms
6300 6400

Command context
config config-dot1x-supp

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

fail-mode

Port access 802.1X supplicant commands | 2150

fail-mode [fail-closed | fail-open] no fail-mode [fail-closed | fail-open]
Description
Configures the forwarding behavior of the when the 802.1X authentication fails. Default: fail-open. The no form of the command resets it to the default.
Examples
Configuring the fail mode as fail-closed:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# fail-mode fail-closed
Resetting the fail mode to the default value in the system:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)#policy CX_Policy switch(config-dot1x-supp-policy)# no fail-mode
OR
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)#policy CX_Policy switch(config-dot1x-supp-policy)# no fail-mode fail-closed
When the fail-mode value entered does not match the currently configured non-default value:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# fail-mode fail-closed switch(config-dot1x-supp-policy)# no fail-mode fail-open The input value does not match the currently configured value.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2151

held-period
held-period <HELD-PERIOD> no held-period <HELD-PERIOD>
Description
Configure the time period (in seconds) to wait after a failed authentication attempt before another attempt is permitted. The no form of the command resets it to default.

Parameter <HELD-PERIOD>

Description Specifies the held period in seconds. Default: 60 seconds.

Usage
When the value entered does not match the currently configured non-default value for held-period, the following message is displayed:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# held-period 30 switch(config-dot1x-supp-policy)# held-period 50 The input value does not match the currently configured value.

Examples
Configuring a held period of 30 seconds in the supplicant policy:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# held-period 30

Resetting the held period to the default value in the system:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp)# no held-period
OR
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# no held-period 30

When the value entered does not match the currently configured non-default value for held-period, the following message is displayed:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# held-period 30 switch(config-dot1x-supp-policy)# held-period 50 The input value does not match the currently configured value.

Port access 802.1X supplicant commands | 2152

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

macsec
macsec no macsec
Description
Enables the switch to provision a MACsec channel dynamically when the 802.1X supplicant is authenticated using an EAP method that supports mutual authentication. By default, MACsec is disabled on the port. The no form of the command disables MACsec for an 802.1X supplicant on the port.
A MACsec policy must be associated with the supplicant policy attached to the port with MACsec enabled. Otherwise, a MACsec channel will not be established and the port will be blocked on the data plane.
Example
Enabling MACsec using EAP for an 802.1X supplicant on the port:
switch(config)# interface 1/1/1 switch(config)# no routing switch(config-if)# aaa authentication port-access dot1x supplicant switch(config-if-dot1x-supp)# macsec
Disabling MACsec using EAP for an 802.1X supplicant on the port:
switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access dot1x supplicant switch(config-if-dot1x-supp)# no macsec
Attempting to enable MACsec on a port that is not MACsec capable:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2153

switch(config)# interface 1/1/10 switch(config)# no routing switch(config-if)# aaa authentication port-access dot1x supplicant switch(config-if-dot1x-supp)# macsec MACsec is not supported on the interface.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms 6300

Command context config-if-dot1x-supp

Authority
Administrators or local user group members with execution rights for this command.

macsec-policy
macsec-policy <POLICY-NAME> no macsec-policy <POLICY-NAME>
Description
Associates a MACsec policy with a supplicant policy for the supplicant to use when the supplicant is running MACsec on a port. The no form of the command disassociates the MACsec policy from the supplicant policy.

Parameter <POLICY-NAME>

Description
Specifies the name of the MACsec policy. (Maximum 128 characters).

Examples
Associating a MACsec policy with the supplicant policy:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy Supp_Policy switch(config-dot1x-supp-policy)# macsec-policy MSec_Policy1

Disassociating a MACsec policy from the supplicant policy:

Port access 802.1X supplicant commands | 2154

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy Supp_Policy switch(config-dot1x-supp-policy)# no macsec-policy

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.10

Modification Command introduced.

Command Information

Platforms 6300

Command context config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

max-retries
max-retries <MAX-RETRIES> no max-retries <MAX-RETRIES>
Description
Configures the maximum number of authentication attempts before authentication fails. The no form of the command resets it to the default.

Parameter <MAX-RETRIES>

Description
Specifies the maximum retry attempts allowed. Range: 1-5. Default: 2.

Examples
Configuring the maximum retries to 5 in the supplicant policy:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# max-retries 5

Resetting the max retries to the default value in the system:

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp)# no max-retries
OR

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2155

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# no max-retries 5
When the value entered does not match the currently configured non-default value for max-retries, the following message is displayed:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# max-retries 5 switch(config-dot1x-supp-policy)# max-retries 3 The input value does not match the currently configured value.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

mka cak-length
mka cak-length {16|32} no mka cak-length {16|32}
Description
Configures the length of the Connectivity Association Key (CAK) to generate for EAP based MACsec. The no form of this command resets it to the default length of 32 bytes.

Parameter {16|32}

Description Specifies the CAK length. Default: 32.

Examples
Configuring the CAK length to 16 bytes:

Port access 802.1X supplicant commands | 2156

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# mka cak-length 16
Configuring the CAK length to default:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# no mka cak-length OR switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# no mka cak-length 16

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10.1000

Modification Command introduced on the 6300 switch series.

Command Information

Platforms 6300

Command context
config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

policy (supplicant)
policy <POLICY-NAME> no policy <POLICY-NAME>
Description
Creates an 802.1X supplicant policy on the system. The no form of the command deletes the 802.1X supplicant policy on the system.

Parameter <POLICY-NAME>

Description Specifies the name of the policy. (Maximum 32 characters).

Usage
Configure an 802.1X supplicant policy on the system:
Examples
Configure an 802.1X supplicant policy on the system:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2157

switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)#
Delete the 802.1X supplicant policy from the system:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# no policy CX_Policy

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.09

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

port-access dot1x supplicant restart
port-access dot1x supplicant restart [interface <IFRANGE>]
Description
Restarts the 802.1X supplicant on the specified interface. The current authentication state is discarded and the supplicant restarts the authentication process.

Parameter <IFRANGE>

Description
Optional. Specifies the range of physical interfaces for which the supplicant is restarted.

Examples
Restarting the 802.1X supplicant on a specific interface:

switch# port-access dot1x supplicant restart interface 1/1/1 switch#

Restarting the 802.1X supplicant on all interfaces:

Port access 802.1X supplicant commands | 2158

switch# port-access dot1x supplicant restart switch#
Showing the message when the feature is not enabled on any interface of the system:
switch# port-access dot1x supplicant restart 802.1X supplicant is not configured.
Showing the message when the feature is not enabled on the given interface:
switch# port-access dot1x supplicant restart 1/1/1 802.1X supplicant is not configured.
Showing the message when there are no 802.1X supplicants on the system:
switch# port-access dot1x supplicant restart No 802.1X supplicants found.
Showing the message when there are no 802.1X supplicants on the interface:
switch# port-access dot1x supplicant restart 1/1/1 No 802.1X supplicants found.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show aaa authentication port-access dot1x supplicant policy
show aaa authentication port-access dot1x supplicant policy <POLICY-NAME>
Description
Shows information about the 802.1X supplicant policies on the system.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2159

Parameter <POLICY-NAME>

Description Specifies the name of the policy. (Maximum 32 characters).

Examples
Showing all 802.1X supplicant policies on the system:

switch# show aaa authentication port-access dot1x supplicant policy

802.1X Supplicant Policy Details

Policy Name: default

----------------------------------------------------------------------------

Type

: Default

EAP Method

: EAP-TLS

Held Period

: 60 seconds

Maximum Retries

:2

EAPoL Timeout

: 30 seconds

EAP Identity

: --

EAP Identity Password : --

EAPoL Force Multicast : False

EAPoL Source MAC

: Interface-MAC

EAPoL Protocol Version : 3

Canned EAP Success

: False

Discovery Timeout

: --

Start Mode

: Start-Open

Fail Mode

: Fail-Open

MKA CAK Length

: 32

MACsec Policy

: --

Policy Name: CX_Policy

----------------------------------------------------------------------------

Type

: Static

EAP Method

: EAP-MD5

Held Period

: 30 seconds

Maximum Retries

:5

EAPoL Timeout

: 10 seconds

EAP Identity

: John Doe

EAP Identity Password :

QBapUwNK5Uf+r1vmhBIncQPw1YPVH0V1nYr7Yjm/bPn3bBVCgAAAHFKt8mcSv/A/g8=

EAPoL Force Multicast : True

EAPoL Source MAC

: Interface-MAC

EAPoL Protocol Version : 2

Canned EAP Success

: True

Discovery Timeout

: 15 seconds

Start Mode

: Start-Closed

Fail Mode

: Fail-Closed

MKA CAK Length

: 16

MACsec Policy

: Aggregator-Connect

Showing a specific 802.1X supplicant policy:

switch# show aaa authentication port-access dot1x supplicant policy CX_Policy

802.1X Supplicant Policy Details

Policy Name: CX_Policy

----------------------------------------------------------------------------

Type

: Static

Port access 802.1X supplicant commands | 2160

EAP Method

: EAP-MD5

Held Period

: 30 seconds

Maximum Retries

:5

EAPoL Timeout

: 10 seconds

EAP Identity

: John Doe

EAP Identity Password :

AQBapUwNK5Uf+r1vmhBIncQPw1YPVH0V1nYr7Yjm/bPn3bBVCgAAAHFKt8mcSv/A/g8=

EAPoL Force Multicast : True

EAPoL Source MAC

: Interface-MAC

EAPoL Protocol Version : 2

Canned EAP Success

: True

Discovery Timeout

: 15 seconds

Start Mode

: Start-Closed

Fail Mode

: Fail-Closed

MKA CAK Length

: 16

MACsec Policy

: Aggregator-Connect

If the policy with given name does not exist:

switch# show aaa authentication port-access dot1x supplicant policy New_CX_Policy The policy does not exist.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10.1000
10.09

Modification
Added EAPoL source MAC address and MKA CAK length on 6300 Switches.
Command introduced.

Command Information

Platforms
6300 6400

Command context Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show aaa authentication port-access dot1x supplicant statistics
show aaa authentication port-access dot1x supplicant statistics [interface {<IFRANGE> | vlan <VLAN-ID>}]
Description
Shows the 802.1X supplicant statistics on each 802.1X supplicant-enabled interface.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2161

Parameter <IFRANGE>
vlan <VLAN-ID>

Description
Specifies the range of VLAN interfaces for which the supplicant status is shown.
Specifies a VLAN interface for which the supplicant status is shown.

Examples
Showing the 802.1X supplicant statistics on all enabled interfaces:

switch# show aaa authentication port-access dot1x supplicant statistics

802.1X Supplicant Statistics

Interface 1/1/1 ===================

EAPOL Frames Received

:4

EAPOL Frames Transmitted

:3

EAPOL Start Frames Transmitted

:1

EAPOL Logoff Frames Transmitted

:0

EAPOL Invalid Frames Received

:0

EAPOL EAP Length Error Frames Received : 0

Authentication

:0

Authentication Timeout

:0

EAP-Logoff While Authenticating

:0

Successful Authentication

:0

Failed Authentication

:0

Re-Authentication

:0

EAP-Logoff When Authenticated

:0

Interface 1/1/2 ===================

EAPOL Frames Received

:0

EAPOL Frames Transmitted

:1

EAPOL Start Frames Transmitted

:1

EAPOL Logoff Frames Transmitted

:0

EAPOL Invalid Frames Received

:0

EAPOL EAP Length Error Frames Received : 0

Authentication

:0

Authentication Timeout

:0

EAP-Logoff While Authenticating

:0

Successful Authentication

:0

Failed Authentication

:0

Re-Authentication

:0

EAP-Logoff When Authenticated

:0

Showing the 802.1X supplicant status on a specific interface:

switch# show aaa authentication port-access dot1x supplicant statistics interface 1/1/1
802.1X Supplicant Statistics
Interface 1/1/1 ===================

Port access 802.1X supplicant commands | 2162

EAPOL Frames Received

:4

EAPOL Frames Transmitted

:3

EAPO Start Frames Transmitted

:1

EAPOL Logoff Frames Transmitted

:0

EAPOL Invalid Frames Received

:0

EAPOL EAP Length Error Frames Received : 0

Authentication

:0

Authentication Timeout

:0

EAP-Logoff While Authenticating

:0

Successful Authentication

:0

Failed Authentication

:0

Re-Authentication

:0

EAP-Logoff When Authenticated

:0

Showing the message when the feature is not enabled on any interface of the system:

switch# show aaa authentication port-access dot1x supplicant statistics 802.1X supplicant is not configured.

Showing the message when the feature is not enabled on the interface:

switch# show aaa authentication port-access dot1x supplicant statistics interface 1/1/1 802.1X supplicant is not configured.

Showing the message when there are no 802.1X supplicants on the system:

switch# show aaa authentication port-access dot1x supplicant status No 802.1X supplicants found.

Showing the message when there are no 802.1X supplicants on the interface:

switch# show aaa authentication port-access dot1x supplicant status interface 1/1/1 No 802.1X supplicants found.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09

Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2163

Command Information

Platforms
6300 6400

Command context Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show aaa authentication port-access dot1x supplicant status
show aaa authentication port-access dot1x supplicant status [interface {<IFRANGE> | vlan <VLAN-ID>}]
Description
Shows the 802.1X supplicant status on each 802.1X supplicant-enabled interface.

Parameter <IFRANGE>
vlan <VLAN-ID>

Description
Specifies the range of VLAN interfaces for which the supplicant status is shown.
Specifies a VLAN interface for which the supplicant status is shown.

Usage
n Physical Address Extension (PAE) state: o Initialize--Authentication is yet to start for the PAE. o Authenticating--Authentication is in-progress for the PAE. o Authenticated--Authentication is successful for the PAE. o Held--Authentication has failed for the PAE and no further authentication attempts will be made till the held period expires. o Unauthenticated--Authentication has failed for the PAE and no further authentication attempts will be made. o Logoff--The PAE no longer wishes to be authenticated.
n Status and forwarding state (FS): o Open--The PAE did not find a 802.1X authenticator within the discovery period. FS: Forwarding o Blocked--The PAE is currently authenticating and the port is operating in start-mode start-closed or has failed authentication and the port is operating in fail-mode fail-closed. FS: Blocked o Disabled--The port to which the interface is attached is not ready or has an invalid configuration. FS: Blocked o Secured--The PAE is authenticated. FS: Forwarding o Start-Open--The PAE is currently authenticating and the port is operating in start-mode startopen. FS: Forwarding o Fail-Open--The PAE has failed authentication and the port is operating in fail-mode fail-open. FS: Forwarding

Port access 802.1X supplicant commands | 2164

Examples
Showing the 802.1X supplicant status on all enabled interfaces:

switch# show aaa authentication port-access dot1x supplicant status

802.1X Supplicant Status

Interface Policy

PAE State

Authenticator

EAP Method Status

-------- --------------- ---------------- ------------------ ----------- --------

--

1/1/1

CX_Policy_01 Authenticated 38:21:c7:59:ad:27 EAP-TLS

Secured

1/1/2

CX_Policy_02 Authenticating 38:21:c7:59:ad:28 EAP-MD5

Blocked

1/1/3

CX_Policy_01 Unauthenticated 38:21:c7:59:ad:29 EAP-TLS

Fail-

Open

1/1/4

CX_Policy_03 Unauthenticated --

--

Open

Showing the 802.1X supplicant status on a specific interface:

switch# show aaa authentication port-access dot1x supplicant status interface 1/1/1

802.1X Supplicant Status

Interface Policy

PAE State

Authenticator

EAP Method Status

---------- --------------- --------------- ------------------ ----------- -------

---

1/1/1

CX_Policy_01 Authenticated 38:21:c7:59:ad:27 EAP-TLS

Secured

Showing the message when the feature is not enabled on any interface of the system:

switch# show aaa authentication port-access dot1x supplicant status 802.1X supplicant is not configured.

Showing the message when the feature is not enabled on the interface:

switch# show aaa authentication port-access dot1x supplicant status interface 1/1/1 802.1X supplicant is not configured.

When an interface range is entered, this message is displayed only if the 802.1X supplicant is disabled either globally or on each interface specified in the user input.
Showing the message when there are no 802.1X supplicants on the system:
switch# show aaa authentication port-access dot1x supplicant status No 802.1X supplicants found.
Showing the message when there are no 802.1X supplicants on the interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2165

switch# show aaa authentication port-access dot1x supplicant status interface 1/1/1 No 802.1X supplicants found.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.09

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

start-mode
start-mode[start-closed | start-open] no start-mode [start-closed | start-open]
Description
Configures the forwarding behavior of the interface on the data-plane when the authentication is inprogress during the first run of the supplicant. Default: start-open. The no form of the command resets it to the default.
Examples
Configuring the start mode as start-closed:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# start-mode start-closed
Resetting the start mode to the default value in the system:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# no start-mode
OR
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)#policy CX_Policy switch(config-dot1x-supp-policy)# no start-mode start-closed

Port access 802.1X supplicant commands | 2166

When the value does not match the currently configured non-default value for start-mode:
switch(config)# aaa authentication port-access dot1x supplicant switch(config-dot1x-supp)# policy CX_Policy switch(config-dot1x-supp-policy)# start-mode start-closed switch(config-dot1x-supp-policy)# no start-mode start-open The input value does not match the currently configured value.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config config-dot1x-supp config-dot1x-supp-policy

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2167

Chapter 116
Port access cached-critical role commands
Port access cached-critical role commands
aaa authentication port-access cached-critical-role (global)
aaa authentication port-access cached-critical-role enable disable cache-timeout <HOURS> cache-replace-mode {fifo|none} no ... persistent-storage {enable |write-interval <INTERVAL>}
Description
Enters the cached-critical role context (shown in the switch prompt as config-aaa-ccr). The cached-critical role allows the authorization of authenticated clients with the previously applied roles when the RADIUS server is unreachable. By default, the cached-critical role is disabled at the global level. When the cached-critical user role is enabled, the MAC address of clients and their applied roles are cached in the following cases:
n During the client log-off. n When a client fails to reach the server during reauthentication. n All the RADIUS servers in the server group are not reachable. In this case, the details of the clients
authenticated with the server group are cached.
When the RADIUS server is unreachable, the cached-critical role is applied as a special role. The cachedcritical role can be applied only on authentication-enabled ports.
If a server group configured on a port becomes unreachable, caching is not performed for individual clients dependent that group.
By enabling the persistent-storage configuration, the cached-critical role support for the clients will be available across switch reboots. With this configuration enabled, the client information is cached in the persistent memory of the switch. The information stored in the persistent storage is updated periodically and the interval between the updates is configurable using the write-interval CLI option, with a default interval of 3600 seconds. The update to the persistent storage is only done if there is a difference in the client information since the last write. The no form of the command disables the cached-critical role. This is the default.

AOS-CX 10.14 Command-Line Interface Guide

2168

n The persistent-storage option must be enabled before the clients are onboarded. If the configuration is disabled after a client has onboarded, the feature might not work across a reboot for the clients which are onboarded with DUR/RADIUS roles.
n If the cached-critical user role needs to be modified to add a captive portal profile, use the port-access clear cached-client role <ROLE> command to clear the cached clients on the role before it is modified.
n Enabling persistent-storage on the switch might reduce the lifespan of persistent memory.

Parameter enable disable cache-timeout <HOURS>
cache-replace-mode {fifo|none}
no ... persistent-storage {enable |write-interval <900-86400>}

Description
Enables the cached-critical role on the authenticationenabled ports.
Disables the cached-critical role. (Default)
Specifies the timeout period for the client details to be cached in the switch. A timer runs for every 30 minutes interval to check whether the client is valid to stay cached. On a timeout, the cached entry is removed from the switch within the buffer time of 30 minutes. Default: 96 hours. Range: 1 to 168 hours.
Sets the cache replacement mode. n fifo: Sets the cache replace mode to fifo (First in, first
out). If the number of cached clients in the system exceeds the limit of 1024, the oldest cache entry of the client is replaced with a new entry. n none: Sets the cache replace mode to none. If the number of cached clients in the system exceeds the limit of 1024, the new client details will not be cached. This is the default.
Negates any existing parameter.
Configures the persistent storage for cached clients. n enable: Enables persistent storage for the cached
clients. n write-interval: Configures the interval between
consecutive writes to persistent storage in seconds. Range: 900 to 86400 seconds. Default: 3600 seconds.

Examples
Enabling the cached-critical-role at the global level with a cache timeout period of 72 hours and cache replace mode as fifo:
switch(config)# aaa authentication port-access cached-critical-role switch(config-aaa-ccr)# enable switch(config-aaa-ccr)# cache-timeout 72 switch(config-aaa-ccr)# cache-replace-mode fifo
Disabling the cached-critical role at the global level:

Port access cached-critical role commands | 2169

switch(config)# aaa authentication port-access cached-critical-role switch(config-aaa-ccr)# disable
Enabling and configuring persistent storage:
switch(config)#aaa authentication port-access cached-critical-role switch(config-aaa-ccr)# persistent-storage switch(config-aaa-ccr-ps)# enable switch(config-aaa-ccr-ps)# write-interval 7200

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11.1000 10.10

Command Information

Platforms
6300 6400

Command context
config config-aaa-ccr

Modification The persistent-storage parameter is added. Command introduced on the 4100i, 6200, 6300, 6400, 8100, 8360.
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access cached-critical-role (per interface)
aaa authentication port-access cached-critical-role no aaa authentication port-access cached-critical-role
Description
Enables or disables cached-critical role feature on a specific interface. The cached-critical role allows the authenticated client to be authorized with the previously applied roles when the RADIUS server is unreachable. By default, the cached-critical role feature is enabled at the port level if the cached-critical role is already enabled globally. This command can be used to configure the cached-user role on the specific ports where the caching is needed. The no form of the command disables the cached-critical role on a specific interface.
Examples
Enabling the cached-critical role on the specific port:
switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access cached-critical-role

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2170

Disabling the cached-critical role on the specific port:
switch(config)# interface 1/1/1 switch(config-if)# no aaa authentication port-access cached-critical-role

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context config-if

Modification Command introduced on the 4100i, 6200, 6300, 6400, 8100, 8360.
Authority Administrators or local user group members with execution rights for this command.

port-access clear cached-client
port-access clear cached-client [all | mac <MACADDR> | role <ROLENAME>]
Description
Clears all the cached clients or clears cached clients based on the MAC address or role name.

Parameter all mac <MACADDR> role <ROLENAME>

Description Clears all the cached clients. Clears cached clients based on the MAC address. Clears cached clients based on the role.

Examples
Clearing all the cached clients:

switch# port-access clear cached-client all

Clearing the cached clients based on the MAC address:

switch# port-access clear cached-client mac 00:0a:0b:0c:0d:0e

Clearing the cached clients based on the role:

switch# port-access clear cached-client ap_role

Port access cached-critical role commands | 2171

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced on the 4100i, 6200, 6300, 6400, 8100, 8360.
Authority Administrators or local user group members with execution rights for this command.

show port-access cached-clients
show port-access cached-clients [mac <MAC-ADDRESS>][role <ROLE-NAME>]
Description
Shows summarized information of all cached port-access clients on the system. The output can be filtered by MAC address or role. The role name is not displayed for clients that use a RADIUS role without a base role.

Parameter <MAC-ADDRESS> <ROLE-NAME>

Description Specifies the MAC address of the client. Specifies the role of the client.

Examples
Showing summarized information for all cached port-access clients on the system:

switch# show port-access cached-clients

Port Access Cached-Clients

RADIUS overridden user roles are suffixed with '*'

---------------------------------------------------------------------------

MAC-Address

Role

Cached-Duration

---------------------------------------------------------------------------

00:50:56:bd:04:c8 ap-role

3 Days, 22 Hours, 33 Minutes, 44 Seconds

00:50:56:bd:32:07

1 Day, 1 Hour, 1 Minute, 1 Second

00:50:56:bd:32:08

12 Hours, 34 Minutes, 56 Seconds

00:50:56:cd:32:09 ap-role

12 Hours, 56 Seconds

00:50:56:bd:50:43 employee

12 Hours

00:50:56:bd:50:45 printer

34 Minutes

08:97:34:ad:e4:00 role_01_Student 56 Seconds

10:2f:09:89:00:35 A-Role*

54 Minutes, 26 Seconds

Showing information for a specific client based on the MAC address:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2172

switch# show port-access cached-clients clients mac 00:50:57:bd:32:09

Port Access Cached-Clients

RADIUS overridden user roles are suffixed with '*'

---------------------------------------------------------------------------

MAC-Address

Role

Cached-Duration

---------------------------------------------------------------------------

00:50:56:bd:32:08

12 Hours, 34 Minutes, 56 Seconds

Showing information for a specific client based on the role:

switch# show port-access cached-clients role

ROLE The role name.

switch# show port-access cached-clients role intern

No port-access cached-clients found

switch# show port-access cached-clients role ap-role

Port Access Cached-Clients

RADIUS overridden user roles are suffixed with '*'

---------------------------------------------------------------------------

MAC-Address

Role

Cached-Duration

---------------------------------------------------------------------------

00:50:56:bd:04:c8 ap-role

3 Days, 22 Hours, 33 Minutes, 44 Seconds

00:50:56:cd:32:09 ap-role

12 Hours, 56 Seconds

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.12
10.10

Modification
Command output modified to be suffixed with * for RADIUS overridden user roles. The role name will not displayed for clients that use a RADIUS role without a base role.
Command introduced on the 4100i, 6200, 6300, 6400, 8100, 8360.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show port-access cached-critical-role info
show port-access cached-critical-role info
Description
Shows summarized information of port-access cached-critical role configuration.
Examples

Port access cached-critical role commands | 2173

Showing summarized information of the cached-critical role configuration with the status of cachedcritical role Disabled:

switch# show port-access cached-critical-role info

Port Access Cached-Critical-Role ================================

Cached-Critical-Role Status

: Disabled

Cache-Timeout

: 96 Hours

Cache Replace Mode

: None

Cached-Critical-Role Disabled Ports :

Persistent Storage Status

: Disabled

Persistent Storage Write Interval : 900 Seconds

Last Write To Persistent Storage : N/A

Showing summarized information of the cached-critical role configuration with the status of cachedcritical role Enabled:

switch# show port-access cached-critical-role info

Port Access Cached-Critical-Role ================================

Cached-Critical-Role Status

: Enabled

Cache-Timeout

: 100 Hours

Cache Replace Mode

: FIFO

Cached-Critical-Role Disabled Ports : 1/1/1-1/1/5,1/1/10

Persistent Storage Status

: Enabled

Persistent Storage Write Interval : 7200 Seconds

Last Write To Persistent Storage : Mon Aug 08 04:40:49 UTC 2022

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11.1000
10.10

Modification
The output is updated to display persistent storage related information.
Command introduced on the 4100i, 6200, 6300, 6400, 8100, 8360.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2174

Chapter 117 Port access general commands

Port access general commands
aaa authentication port-access allow-lldp-auth
aaa authentication port-access allow-lldp-auth [mac chassis-mac|source-mac] no aaa authentication port-access allow-lldp-auth [mac chassis-mac|source-mac]
Description
This command is an extension of aaa authentication port-access allow-lldp-auth. By default, authentication on chassis-mac is allowed via LLDP packets which are received on the port. Use the Chassis MAC shown in the LLDP TLV or the source MAC in the LLDP frame. Use the no version of this command to prevent authentication using LLDP packets received on the port. This command can be issued from the interface (config-if) or Link Aggregation Group (config-lag-if) contexts along with the following commands:
interface lag 1 aaa authentication port access
allow-lldp-bpdu aaa authentiction port access
allow-lldp-auth mac source-mac

Parameter mac
chassis-mac
source-mac

Description
(Optional) Specify the LLDP authentication-mac type.
Configure LLDP authentication-mac type as a chassis MAC address. This is the default value.
Configure LLDP authentication-mac type as an interface MAC address

Examples
Configuring authentication via LLDP packets:

switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access allow-lldp-auth switch(config)# interface lag 1 switch(config-lag-if)# aaa authentication port-access allow-lldp-auth

Enabling/disabling authentication via LLDP BPDU packets:

switch(config-if)# aaa authentication port-access allow-lldp-auth Allow or block authentication on LLDP BPDU. (Default: allow)

AOS-CX 10.14 Command-Line Interface Guide

2175

switch(config-if)# no aaa authentication port-access allow-lldp-auth Allow or block authentication on LLDP BPDU. (Default: allow) switch(config-if)# aaa authentication port-access allow-lldp-auth switch(config-if)# no aaa authentication port-access allow-lldp-auth
switch(config-if)# aaa authentication port-access block-lldp-auth Allow or block authentication on LLDP BPDU. (Default: block) switch(config-if)# no aaa authentication port-access block-lldp-auth Allow or block authentication on LLDP BPDU. (Default: block)
Configuring the MAC to use for authentication:
switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access allow-lldp-auth mac source-mac switch(config-if)# aaa authentication port-access allow-lldp-auth mac chassis-mac

switch(config-if)# aaa authentication port-access allow-lldp-auth mac Configure the MAC to use for LLDP based authentication (Default: chassismac)

switch(config-if)# aaa authentication port-access allow-lldp-auth mac

chassis-mac Use the chassis MAC in LLDP TLV.

source-mac

Use the source MAC in the LLDP frame.

Disabling authentication via LLDP packets based on MAC source:

switch(config-if)# no aaa authentication port-access allow-lldp-auth mac

chassis-mac

Use the chassis MAC in LLDP TLV.

source-mac

Use the source MAC in the LLDP frame.

Disabling authentication via LLDP packets on a LAG port:

switch (config) interface lag 1 switch(config-lag if)# no aaa authentication port-access allow-lldp-auth

When a client such as dual-homed access points and switches, connects to the switch over multiple physical interfaces and use LLDP packets to onboard, it is recommended to use LLDP authentication MAC as the source MAC on the interfaces. This prevents the switch from learning the client MAC from the chassis MAC in the LLDP TLV (default), similarly to the LLDP BPDUs received on all interfaces connected to the same device. If the MAC learned is the chassis MAC, it will cause the switch to treat the client as moving between the different interfaces each time a LLDP BPDU is received on an interface. Additionally, using a different LLDP authentication MAC type on interfaces connecting to the same device may lead to undesired behavior.
For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

Port access general commands | 2176

Release 10.13

10.09

Command Information

Platforms
6300 6400

Command context
config-if config-lag-if

Modification This command can be issued from a Link Aggregation Group (LAG) context. Command introduced
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access allow-cdp-auth
aaa authentication port-access allow-cdp-auth no aaa authentication port-access allow-cdp-auth
Description
By default authentication is allowed via CDP packets which are received on the port. Use the no version of this command to prevent authentication using CDP packets received on the port. This command can be issued from the interface (config-if) or Link Aggregation Group (config-lag-if) contexts.
Examples
Disabling authentication via CDP packets:
switch(config-if)# no aaa authentication port-access allow-cdp-auth

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13 10.09

Command Information

Platforms
6300 6400

Command context
config-if config-lag-if

Modification This command can be issued on a LAG port Command introduced
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access auth-mode
aaa authentication port-access auth-mode {client-mode | device-mode | multi-domain}

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2177

Description
Configures the authentication mode for the port. By default, client mode is enabled. This command can be issued from the interface (config-if) or Link Aggregation Group (config-lag-if) contexts.

Parameter client-mode
device-mode
multi-domain

Description
Selects client mode. In this mode, all clients connecting to the port are sent for authentication. The maximum number of clients allowed to connect to the port is limited by the client limit value configured with the aaa authentication port-access client-limit command.
Selects device mode. In this mode, only the first client connecting to the port is sent for authentication. Once this client is authenticated, the port is considered as open and all subsequent clients trying to connect on that port are not sent for authentication.
Selects multidomain mode. In this mode only one voice device is allowed to be authenticated in addition to the configured data devices on a port. By default only one data device is allowed to be authenticated on the multidomain mode along with one voice device. You can configure the maximum number of data devices allowed with the aaa authentication port-access client-limit multi-domain command. If a second voice device or a data device greater than the configured data client limit onboards, a violation is triggered. You must configure a voice VLAN for IP phones to onboard a voice device in the multidomain authentication mode. To authorize a voice device, you must perform one of the following:
n Configure the AAA server to send the Aruba-Device-Traffic-
Class Aruba VSA with value 1. n Configure the device-traffic-class parameter in the role to be
applied to indicate a voice device. Without this VSA value or the device type in the role, the switch considers the voice device as a data device.
NOTE: This parameter is not supported when the command is issued from the LAG (config-lag-if) context.

Examples
Configuring device mode authentication for interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access auth-mode device-mode
Configuring device mode authentication for a LAG port:
switch(config)# interface lag 1 switch(config-lag if)# aaa authentication port-access auth-mode device-mode
Configuring multidomain mode authentication for a port:

Port access general commands | 2178

switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access auth-mode multi-domain

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13

10.08 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-lag-if

Modification This command can be issued from a Link Aggregation Group (LAG) context. Added multi-domain parameter --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access auth-precedence
aaa authentication port-access auth-precedence [dot1x mac-auth | mac-auth dot1x] no aaa authentication port-access auth-precedence [dot1x mac-auth | mac-auth dot1x] no aaa authentication port-access auth-precedence
Description
Configures the per port authentication precedence using the space separator. By default, 802.1X authentication (dot1x) takes a higher precedence than MAC authentication (macauth). The no form of the command resets the port access authentication precedence to the default, 802.1X authentication followed by MAC authentication.

Parameter dot1x mac-auth
mac-auth dot1x

Description
Specifies that the port access authentication precedence is 802.1X authentication followed by MAC authentication.
Specifies that the port access authentication precedence is MAC authentication followed by 802.1X authentication.

Examples
Configuring MAC authentication precedence on a port:

switch(config-if)# aaa authentication port-access auth-precedence mac-auth dot1x

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2179

Resetting the authentication precedence to the default value:
switch(config-if)# no aaa authentication port-access auth-precedence mac-auth dot1x

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access auth-priority
aaa authentication port-access auth-priority [dot1x mac-auth | mac-auth dot1x] no aaa authentication port-access auth-priority [dot1x mac-auth | mac-auth dot1x] no aaa authentication port-access auth-priority
Description
Configures the authentication priority using the space separator to specific interface. Default auth-priority with concurrent onboarding is 802.1X followed by MAC authentication. With authentication precedence, the default auth-priority follows the auth-precedence order. The no form of the command resets the port access authentication priority to the default, is same as the configured auth-precedence order. The authentication priority is useful in deployments where clients such as wireless access points (APs), IT-compliant-laptops or phones, or laptops without pre-loaded supplicant software must download the supplicant software or firmware patches before attempting 802.1X authentication. In such cases, configure the MAC authentication as the primary authentication method followed by 802.1X for the authentication order. Meanwhile, configure 802.1X as the primary authentication priority and MAC authentication as secondary to enforce access based on 802.1X. Thus the client (or end access device) will initially be authenticated by MAC authentication with the access required to onboard and install the software or patches, and subsequently attempt the 802.1X authentication. Reauthentication will be triggered for all high priority methods and not just the final successful authentication method.

Parameter dot1x mac-auth

Description
Specifies that the port access authentication precedence is 802.1X authentication followed by MAC authentication.

Port access general commands | 2180

Parameter mac-auth dot1x

Description
Specifies that the port access authentication precedence is MAC authentication followed by 802.1X authentication.

Examples
Configuring MAC authentication priority on a port:

switch(config-if)# aaa authentication port-access auth-priority mac-auth dot1x

Resetting the authentication priority to the default value:

switch(config-if)# no aaa authentication port-access auth-priority mac-auth dot1x switch(config-if)# no aaa authentication port-access auth-priority

Sample configuration:

interface 1/1/1 no shutdown no routing vlan access 1 aaa authentication port-access auth-precedence mac-auth dot1x aaa authentication port-access auth-priority dot1x mac-auth

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access auth-role
aaa authentication port-access [critical-role|preauth-role|reject-role| auth-role|critical-voice-role] <ROLE-NAME>
no aaa authentication port-access [critical-role|preauth-role|reject-role| auth-role|critical-voice-role]
Description
Configures the role to assign to the clients depending on the client authentication state.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2181

The no form of the command disassociates the roles that you assign to clients based on the authentication state.

Parameter critical-role preauth-role reject-role auth-role critical-voice-role
<ROLE-NAME>

Description
Specifies the role that is applied when the RADIUS server is unreachable for authentication or when there is a request timeout.
Specifies the role that is applied when authentication is still in progress.
Specifies the role that is applied when authentication has failed.
Specifies the role that is applied to authenticated clients when a specific role is not assigned in the RADIUS server.
Specifies the role for a voice client when the RADIUS server is unreachable for authentication during reauthentication period. This is applicable when multidomain authentication mode is enabled with the aaa authentication port-access auth-mode command.
Specifies the role name.

Examples
Configuring critical role for clients:

switch(config-if)# aaa authentication port-access critical-role role1

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification Added critical-voice-role parameter --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access client-auto-log-off finalauthentication-failure
aaa authentication port-access client-auto-log-off final-authentication-failure no aaa authentication port-access client-auto-log-off final-authentication-failure

Port access general commands | 2182

Description
Use this command to automatically remove a client when authentication fails due to any reason except server-reject or server-timeout. This feature is disabled by default. The no form of this command disables this feature if it has been previously enabled.
Automatic client log-off is not supported on Layer-3 interfaces.
Examples
Configuring the client-auto-log-off feature on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access client-auto-log-off finalauthentication-failure

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08.1090

Command Information

Platforms
6300 6400

Command context config-if

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access client-limit
aaa authentication port-access client-limit <CLIENTS> no aaa authentication port-access client-limit
Description
Configures the maximum number of clients that can simultaneously connect to a port. This command can be issued from the interface (config-if) or Link Aggregation Group (config-lag-if) contexts. The no form of this command resets the number of clients to the default.

Parameter <CLIENTS>

Description
Specifies the maximum number of clients. Default: 1. Range: 1 to 256 (6300, 6400).

Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2183

Configuring the client limit for on port 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access client-limit 25
Configuring the client limit for on a LAG port:
switch(config)# interface lag 1 switch(config-lag-if)# aaa authentication port-access client-limit 25

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13

10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-lag-if

Modification This command can be issued from a Link Aggregation Group (LAG) context. --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access client-limit multi-domain
aaa authentication port-access client-limit multi-domain <DATA-CLIENT-LIMIT>
Description
Configures the data client limit on the multidomain enabled interface. By default, the data client limit on a multidomain enabled interface is 1, and the maximum number of data clients supported on a multidomain enabled port is 5.

Parameter <DATA-CLIENT-LIMIT>

Description
Specifies the maximum data client limit on the multidomain enabled interface. Range: 1 to 5.

Examples
Configuring data client limit of 4 on the multidomain enabled interface 1/1/4:

switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access client-limit multi-domain 4

Port access general commands | 2184

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms
6300 6400

Command context config-if

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access radius-override
aaa authentication port-access radius-override {enable | disable} no aaa authentication port-access radius-override {enable | disable}
Description
Enables or disables radius-override support at the interface context. When radius-override support is enabled, a new RADIUS overridden role is created with a combination of LUR/DUR along with RADIUS attributes for the corresponding client-role attributes such as VLANs, captive portal URL, and downloadable gateway role. When the RADIUS override support is disabled, then only the user-roles get applied to the client. The no form of this command disables the support for radius-override.
The radius-override support is applicable only for Auth-role.

Usage
The following table describes the access-response for the combination of roles with radius-override enabled and disabled:

Combination of roles in Access-Accept

Action with radius-override disabled

Action with radius-override enabled

Local User Role and RADIUS attributes

Local User Role is applied

New RADIUS Overridden role with Local User Role and RADIUS attributes is created and applied

Downloadable User Role and RADIUS attributes

Downloadable User Role is applied

New RADIUS Overridden role with Downloadable User Role and RADIUS attribute is created and applied

Local User Role and Downloadable Local User Role is applied User Role

Local User Role is applied

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2185

Combination of roles in Access-Accept
Local User Role, Downloadable User Role, and RADIUS attributes

Action with radius-override disabled
Local User Role is applied

Action with radius-override enabled
New RADIUS Overridden role with Local User Role and RADIUS attributes is created and applied

Examples
Enabling radius-override support:

switch(config-if)# aaa authentication port-access radius-override enable

switch(config-if)# no aaa authentication port-access radius-override disable Disabling radius-override support:
switch(config-if)# aaa authentication port-access radius-override disable

switch(config-if)# no aaa authentication port-access radius-override enable

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.08

Command Information

Platforms
6300 6400

Command context config-if

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

port-access allow-flood-traffic
port-access allow-flood-traffic {enable | disable}
Description
Enables or disables transmission of flood traffic, such as broadcast, multicast, and unknown unicast messages through a security enabled port on which no client has been authenticated. This command can be issued from the interface (config-if) or Link Aggregation Group (config-lag-if) contexts. By default, transmission of flood traffic is disabled.
Usage

Port access general commands | 2186

This command can be used to allow Wake-on-LAN packets on security enabled ports, before a client is authenticated.
Examples
Enabling flood traffic on a port on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# port-access allow-flood-traffic
Enabling flood traffic on a port on a LAG port:
switch(config)# interface lag 1 switch(config-lag-if)# port-access allow-flood-traffic

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13

10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-lag-if

Modification This command can be issued from a Link Aggregation Group (LAG) context. --
Authority Administrators or local user group members with execution rights for this command.

port-access auto-vlan
port-access auto-vlan no port-access auto-vlan
Description
Creates VLAN automatically for the port-access clients globally, if the VLAN is not configured statically on the switch. By default, port-access auto-vlan is disabled. The no form of this command disables the port-access automatic VLAN creation globally on the switch.
The type for the VLAN created using the auto-vlan feature is displayed as port-access in the show vlan command.
Examples
Enabling automatic VLAN creation for clients:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2187

switch(config)# port-access auto-vlan Disabling automatic VLAN creation for clients(default):
switch(config)# no port-access auto-vlan

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.08

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

port-access client-move
port-access client-move {enable | disable | secure}
Description
When client move is enabled (the default), a port access client can move to other port access-enabled interfaces, at which time they will be re-authenticated on the new interface. When client move is disabled, a client cannot move to other port access-enabled interfaces.
An authenticated client will be moved immediately if the new port to which the client will move has a pre-auth role configured, even when client move is enabled as secure.

Parameter enable disable secure

Description
Enables this feature so port access clients can move to other port access-enabled interfaces.
Disables this feature so port access clients cannot move to other port access-enabled interfaces.
Use this configuration setting to stop a potential attacker from denying a genuine client access by spoofing the client's MAC on a different port-access enabled port of the switch.
An authenticated client will be moved immediately if the new port to which the client moved has a pre-authentication role configured, even when client-move is enabled as secure.

Port access general commands | 2188

Parameter

Description NOTE: Secure client move is enabled by default.

Examples
Enabling client move: switch(config)# port-access client-move enable
Enabling secure client move: switch(config)# port-access client-move enable secure
Disabling client move: switch(config)# port-access client-move disable

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

port-access event-log client
port-access event-log client no port-access event-log client
Description
Enables port access informational event logs for the client. These event logs help with client telemetry on a remote management station such as Aruba Central. By default, these informational event logs are disabled.
Starting with AOS-CX 10.10, the event IDs 10510 and 10511 are logged when the port access informational event log configuration is enabled.
The no form of the command disables port access informational event logs for the client.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2189

Example
Enabling port access event log: switch(config)# port-access event-log client
Disabling port access event log: switch(config)# no port-access event-log client

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.10

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

port-access fallback-role
port-access fallback-role <ROLE-NAME> no port-access fallback-role <ROLE-NAME>
Description
Configures the fallback role to assign to the clients onboarding on a port. This role is applied only when no derived role is applied to the clients. The no form of the command resets the fallback role.

Parameter <ROLE-NAME>

Description
Specifies the fallback role name. The maximum number of characters supported is 64.

Usage
Following are the conditions for the fallback role to be applied on onboarding devices:
n The device profile local MAC match feature with block-until-profile-applied mode is configured. n Device profile along with AAA is configured but no match was found for the device profile client. n AAA method with no reject or critical role is configured, and the connection to RADIUS server failed.

Port access general commands | 2190

n 802.1X authentication is enabled on the port, but the supplicant of the device timed out to respond to the authentication request.
Example
On the 6400 Switch Series, interface identification differs. Configuring fallback role for a port:
switch(config)# interface 1/1/3 switch(config-if)# port-access fallback-role fallback01

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

port-access log-off client
port-access log-off client mac <MAC-ADDRESS> port-access log-off client interface <INTERFACE-NAME> port-access log-off client role <ROLE-NAME>
Description
Logs off the client connected to a port access-enabled interface.

Parameter <MAC-ADDRESS> <INTERFACE-NAME> <ROLE-NAME>

Description Specifies the client MAC address. Specifies the client interface. Specifies the client MAC address.

Example
Logging a client off from the switch, specifying the MAC address:

switch# port-access log-off client mac 00:50:56:bd:04:2d

Logging a client off from the switch, specifying the interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2191

switch# port-access log-off client interface 1/1/1 Logging a client off from the switch, specifying the role:
switch# port-access log-off client role r1

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

port-access onboarding-method precedence
port-access onboarding-method precedence [aaa device-profile | device-profile aaa] no port-access onboarding-method precedence [aaa device-profile | device-profile aaa]
Description
Configures the precedence for the method to be used to authenticate onboarding devices for each interface. The no form of the command resets the authentication method precedence to the default precedence of AAA followed by device profile. AAA includes the 802.1X and MAC authentication methods whose precedence can be configured using the aaa authentication port-access auth-precedence command. Here, the default precedence is 802.1X authentication. For example, if you configure AAA (both 802.1X and MAC) authentication methods and device profile on a port, by default, the authentication precedence would be 802.1X, then MAC, and lastly device profile.
aaa in the parameters refers to the authentication precedence configured using the aaa authentication portaccess auth-precedence command.

Parameter aaa device-profile
device-profile aaa

Description
Specifies that the precedence for per port onboarding authentication method is AAA followed by device profile.
Specifies that the precedence for per port onboarding authentication method is device profile followed by AAA.

Port access general commands | 2192

Examples
On the 6400 Switch Series, interface identification differs. Configuring AAA method precedence on a port:
switch(config)# interface 1/1/1 switch(config-if)# port-access onboarding-method precedence device-profile aaa
Resetting the authentication method precedence:
switch(config)# interface 1/1/1 switch(config-if)# no port-access onboarding-method precedence device-profile aaa

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

port-access onboarding-method concurrent
port-access onboarding-method concurrent <enable | disable>
Description
Configures all methods to start concurrently for faster onboarding process. If authentication priority is not configured when enabling concurrent onboarding, the priority will be 802.1X followed by mac-auth and device-profile. Default priority for concurrent onboarding is 802.1X followed by mac-auth and device-profile. When enabling concurrent onboarding on the port, existing clients will be de-authenticated and freshly onboarded concurrently. When concurrent onboarding is enabled, then auth-precedence will be ignored. If concurrent onboarding is configured, the client will stay in pre-auth role till it gets succeeded by one authentication method or gets failed by all the authentication methods. When the authentication method with the highest priority fails, the profile of the next successful authentication method is applied. If all methods fail, the reject or critical role is applied based on the 802.1X authentication failure reason and continues to reauthenticate with the 802.1X method.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2193

Reauthentication will be triggered for all high priority methods and not just the final successful authentication method.
Some RADIUS server may block the client when it receives two requests, mac-auth and 802.1X, from the same client at the same time. This is because the RADIUS server allows only one authentication request. In such cases, concurrent onboarding is not feasible. To prevent such scenarios, configure auth-precedence with auth-priority.

Parameter enable disable

Description Enable clients to be onboarded concurrently. Disable clients to be onboarded concurrently.

Examples
On the 6400 Switch Series, interface identification differs. Enabling concurrent onboarding on a port:

switch(config)# interface 1/1/1 switch(config-if)# port-access onboarding-method concurrent enable

Disabling concurrent onboarding on a port:

switch(config)# interface 1/1/1 switch(config-if)# port-access onboarding-method concurrent disable

Sample configuration:

interface 1/1/1 no shutdown no routing vlan access 999 !aaa authentication port-access auth-precedence mac-auth dot1x port-access onboarding-method concurrent enable

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

Port access general commands | 2194

port-access reauthenticate interface
port-access reauthenticate interface <INTERFACE-NAME>
Description
Forcefully reauthenticates all clients connected to an interface.
Clients that are in the HELD state are ignored.

Parameter <INTERFACE-NAME>

Description Specifies the interface name.

Examples
Configuring reauthentication of all clients on a port:

switch# port-access reauthenticate interface 1/1/1

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

port-access ubt-fallback-role
port-access ubt-fallback-role <ROLE-NAME> no port-access ubt-fallback-role <ROLE-NAME>
Description
Configures the UBT fallback role to assign to the clients on a port. This role is applied to a client only when the corresponding UBT zone is not reachable. The role on the client is reverted to the previous role to which it was assigned to when the UBT zone is reachable. The no form of the command deletes the UBT fallback role on a port.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2195

Parameter <ROLE-NAME>

Description
Specifies the UBT fallback role name. The maximum number of characters supported is 64.

Usage
The UBT fallback role is applied to a client only when the corresponding UBT zone is not reachable. When the UBT zone is reachable, the role on the client is reverted to the previous role to which it was assigned.
The UBT fallback role is configurable at the port level. In deployments where a single controller or cluster setup is used, it is required to provide access to end clients even when the controller or the cluster failure occurs.
The application of the UBT fallback role depends on the authentication state of the client. That is, if the reauthentication of a client, with UBT fallback role applied, fails because of RADIUS reject or timeout reason, then the corresponding special role, reject or critical role, is applied.
Following are some of the scenarios where the UBT fallback role will be applied depending on the UBT operational state:

UBT Operational State Down (UBT zone not ready) Up (UBT zone ready) Up --> Down (Controller not reachable) Down --> Up (Controller reachable) Up --> Down (UBT profile disabled) Down --> Up (UBT profile enabled) Up --> Down (MM/VSF switchover after 25 seconds)

UBT Fallback Role Applied? Yes No Yes No Yes No Yes

n This configuration is supported in both UBT versions 1.0 and 2.0. n UBT fallback role is assigned to only those clients within the UBT client limit. Any clients beyond this limit will
not be associated with this role. n When a client is already assigned with the UBT fallback role, you cannot remove the UBT fallback role
configuration on a port. To remove the configuration, no clients must be associated with this role. n Accounting stop and start events are generated when a client transitions from UBT role to a UBT fallback
role.
Example
On the 6400 Switch Series, interface identification differs. Configuring UBT fallback role on a port:

Port access general commands | 2196

switch(config)# interface 1/1/3 switch(config-if)# port-access ubt-fallback-role fallback01

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms
6300 6400

Command context config-if

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

show aaa authentication port-access interface client-status
show aaa authentication port-access interface {all | <IFRANGE>} client-status [mac <MAC-ADDRESS>]
Description
Shows information about the status of the role applied on ports. RADIUS overridden user roles are suffixed with *. The role name is not displayed for clients that do not use local, downloaded, or RADIUS overridden role.

Parameter all <IFRANGE> <MAC-ADDRESS>

Description Specifies all interfaces. Specifies the interface name. Specifies the client MAC address.

Examples
Showing information about a client:

switch# show aaa authentication port-access interface all client-status Port Access Client Status Details RADIUS overridden user roles are suffixed with '*' Client 00:50:56:96:93:d6, John Doe ============================

Session Details

---------------

Port

: 1/1/13

Session Time : 30s

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2197

IPv4 Address : 10.0.0.1 IPv6 Address :

Authentication Details

----------------------

Status

: dot1x Authenticated

Auth Precedence : dot1x - Authenticated, mac-auth - Not attempted

Auth History : dot1x - Authenticated, 5s ago

mac-auth - Unauthenticated, Server-Reject, 10s ago

mac-auth - Unauthenticated, Server-Reject, 15s ago

dot1x - Unauthenticated, Server-Timeout, 15s ago

dot1x - Attempted, 20s ago

Authorization Details ---------------------Role : Employee* Status : Applied

Client 00:50:56:96:50:28

============================

Session Details

---------------

Port

: 1/1/14

Session Time : 10s

IPv4 Address : 10.0.0.2

IPv6 Address :

Authentication Details

----------------------

Status

: mac-auth Authenticated

Auth Precedence : dot1x - Unauthenticated, mac-auth - Authenticated

Auth History : dot1x - Unauthenticated, Server-Reject, 5s ago

mac-auth - Authenticated, 10s ago

Authorization Details ---------------------Status : Applied

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.12
10.08 10.07 or earlier

Modification
Command output modified to be suffixed with * for RADIUS overridden user roles. The role name will not be displayed for clients that do not use local, downloaded, or RADIUS overridden role.
Command output updated to display multidomain mode information
--

Port access general commands | 2198

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show port-access clients
show port-access clients [dhcp-info|ubt|vxlan] [interface <INTERFACE-NAME>] [mac <MACADDRESS>]
Description
Shows summarized active port access client information.
The User-Role column in the output will not display any value for clients not using local, downloaded or RADIUS overridden role. When an explicit client name is not available, only the MAC address of the client will be displayed. The VLANs in the output display the tags, u, t, and multi to indicate untagged VLAN, single tagged VLAN, and multiple VLANs respectively.

Parameter dhcp

Description
Shows DHCP information of port access clients.
NOTE: To view the DHCP information of port access clients, either client IP tracker or DHCP snooping must be enabled. If client IP tracker is enabled, then the command does not display the lease time. This command does not display information about tagged VLAN.

ubt

Shows port access information about UBT clients.

NOTE: The output displays information only about untagged VLAN.

vxlan

Shows port access information about VXLAN clients.
NOTE: The output displays information about both tagged and untagged VLAN without the tags, u and t.

<INTERFACE-NAME> <MAC-ADDRESS>

Specifies the interface name. Specifies the client MAC address.

Examples
On the 6400 Switch Series, interface identification differs. Showing information about a specific client:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2199

switch# show port-access clients mac 00:50:56:bd:50:43 Port Access Clients RADIUS overridden user roles are suffixed with '*'

Flags: Onboarding-Method|Mode|Device-Type|Status

Onboarding-Method: 1x 802.1X, ma MAC-Auth, ps Port-Security, dp Device-Profile,m Multi-Domain

Mode: c Client-Mode, d Device-Mode, , m Multi-Domain

Device-Type: d Data, v Voice

Status: s Success, f Failed, p In-Progress, d Role-Download-Failed

----------------------------------------------------------------------------------

---------------------------

Port

Client-Name

IPv4-Address User-Role

VLAN

Flags

----------------------------------------------------------------------------------

---------------------------

1/1/5 00:50:56:bd:50:43

reject-role, reject

(u)1234,(t)1000 1x|c|-|s

Showing information for clients on a particular interface:

switch# show port-access clients interface 1/1/5 Port Access Clients RADIUS overridden user roles are suffixed with '*'

Flags: Onboarding-Method|Mode|Device-Type|Status

Onboarding-Method: 1x 802.1X, ma MAC-Auth, ps Port-Security, dp Device-Profile

Mode: c Client-Mode, d Device-Mode, m Multi-Domain

Device-Type: d Data, v Voice

Status: s Success, f Failed, p In-Progress, d Role-Download-Failed

----------------------------------------------------------------------------------

---------------------------

Port

Client-Name

IPv4-Address User-Role

VLAN

Flags

----------------------------------------------------------------------------------

---------------------------

1/1/5 00:50:56:bd:32:07

reject-role, reject

(u)1234,(t)1000 1x|c|-|s

1/1/5 test

critical-..., critical

(u)56

1x|c|-|f

1/1/9 00:50:56:bd:50:c7

rp-role

rp|p|-|s

Showing DHCP information of port access clients:

switch# show port-access clients dhcp-info Port Access Clients -----------------------------------------------------------------------------------------------

Port access general commands | 2200

Port

Client-Name

IP-Address

VLAN Lease-Time

----------------------------------------------------------------------------------

--------------

1/1/1 Camera-1023

10.10.10.10

10

268

1/1/2 CAP-8-G22

aaaa:bbbb:cccc:dddd:eeee:1234:5678:abcd

20

500

```

Showing port access information about UBT clients:

switch# show port-access clients ubt Port Access Clients RADIUS overridden user roles are suffixed with '*'

Flags: Onboarding-Method|Mode|Device-Type|Status

Onboarding-Method: 1x 802.1X, ma MAC-Auth, ps Port-Security, dp Device-Profile

Mode: c Client-Mode, d Device-Mode,m Multi-Domain

Device-Type: d Data, v Voice

Status: s Success, f Failed, p In-Progress, d Role-Download-Failed

----------------------------------------------------------------------------------

-------------------------------------

Port

Client-Name

IPv4-Address User-Role

Gateway-Role

UBT

VLAN Flags

Zone

----------------------------------------------------------------------------------

-------------------------------------

1/1/12 00:50:56:96:93:d6 10.10.10.10

test_role

authenticated

zone1

10 ma|c|-|s

1/1/10 CAP-8-G22

10.10.10.11

student

authenticated_gate... zone1

9857 1x|c|-|s

Showing port access information about VXLAN clients:

switch# show port-access clients vxlan Port Access Clients RADIUS overridden user roles are suffixed with '*'

Flags: Onboarding-Method|Mode|Device-Type|Status

Onboarding-Method: 1x 802.1X, ma MAC-Auth, ps Port-Security, dp Device-Profile

Mode: c Client-Mode, d Device-Mode, m Multi-Domain

Device-Type: d Data, v Voice

Status: s Success, f Failed, p In-Progress, d Role-Download-Failed

----------------------------------------------------------------------------------

----------------------

Port

Client-Name

IPv4-Address User-Role

VLAN VNI Flags

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2201

----------------------------------------------------------------------------------

----------------------

1/1/21 00:50:56:96:93:d6

10.10.10.10

student

5678 2432 ma|c|-|s

1/1/21 user_12@gmail.com

employee

9857 4678 1x|c|-|s

Command History
Release 10.12
10.08 10.07 or earlier

Modification
The following changes were introduced: n The dhcp-info, ubt, and vxlan parameters were introduced. n Command output modified to display only Port, Client-Name,
IPv4-Address, User-Role, VLAN, and Flags.
Command output updated to display multidomain mode information
--

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show port-access clients detail
show port-access clients [interface <INTERFACE-NAME>] [mac <MAC-ADDRESS>] detail
Description
Shows detailed active port access clients information including the VLAN group and VLAN association for each of the authenticated clients. The output can be filtered by interface or MAC address.

Parameter <INTERFACE-NAME> <MAC-ADDRESS>

Description Specifies the interface name. Specifies the client MAC address.

Examples
On the 6400 Switch Series, interface identification differs. Showing detailed information for clients on a particular interface:

switch# show port-access clients interface 1/1/7-1/1/8 detail Port Access Client Status Details:

Port access general commands | 2202

---------------------------------

RADIUS overridden user roles are suffixed with '*'

Client 2c:41:38:7f:35:b9, John Doe

============================

Session Details

---------------

Port

: 1/1/7

Session Time : 203s

IPv4 Address : 10.10.10.10

IPv6 Address :

Authentication Details

----------------------

Status

: mac-auth Authenticated

Auth Precedence : dot1x - Unauthenticated, mac-auth - Authenticated

Auth History : mac-auth - Authenticated, 5s ago

dot1x - Unauthenticated, Server-Reject, 10s ago

Authorization Details ---------------------Status : Applied

RADIUS Attributes

------------------

User-Name

: Student

Filter-ID

: DHCP, WebServices-Student, DataCenter-Student,

RemoteAccess-Student, Printer-Student

Framed-MTU

: 1500 bytes

Session-Timeout

: 500 seconds

Idle-Timeout

: 200 seconds

Termination-Action

: RADIUS-Request

Egress-VLAN-ID

: 10(t), 15(t), 20(u)

Egress-VLAN-Name

: VLAN100(t), VLAN200(u)

Tunnel-Type

: 13

Tunnel-Medium-Type

:6

Tunnel-Private-Group-ID

: 20

NAS-Filter-Rule

: permit in 17 from any to any

deny in tcp from any to 10.10.10.3/8

Aruba-Captive-Portal-URL

: http://arubanetworks.com/student/captiveportal.php

Aruba-PoE-Priority

: Low

Aruba-Port-Auth-Mode

: client-mode

Aruba-NAS-Filter-Rule

: deny in icmp from 10.10.10.1 to any 27

Aruba-QoS-Trust-Mode

: dscp

Aruba-UBT-Gateway-Role

: gateway_student_role

Aruba-Gateway-Zone

: student_zone

Aruba-STP-Admin-Edge-Port

: false

Aruba-UBT-Gateway-CPPM-Role : ubt_gateway_cppm_student_role

Aruba-Device-Traffic-Class : data

Aruba-PVLAN-Port-Type

: secondary

Aruba-PoE-Allocate-By-Method : class

RADIUS Role Name : RADIUS_115315236

Showing information for a particular client MAC address:

switch# show port-access clients mac 2c:41:38:7f:35:c8 detail Port Access Client Status Detail -------------------------------RADIUS overridden user roles are suffixed with '*'

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2203

Client 2c:41:38:7f:35:c8, John Doe ============================

Session Details

---------------

Port

: 1/1/8

Session Time : 33s

IPv4 Address :

IPv6 Address :

VLAN Details

---------------

VLAN Group Name :

VLANs Assigned : 10,20,30

Access

:

Native Untagged : 10

Alllowed Trunk : 20,30

Authentication Details

----------------------

Status

: mac-auth Authenticated

Auth Precedence : dot1x - Unauthenticated, mac-auth - Authenticated

Auth History : mac-auth - Authenticated, 5s ago

dot1x - Unauthenticated, Server-Timeout, 10s ago

Authorization Details

----------------------

Role : student

Status : Applied

Role Information:

-----------------

Name : student

Type : local

----------------------------------------------

Reauthentication Period

: 333 secs

Authentication Mode

: device

Native VLAN

: 10

Allowed Trunk VLANs

: 20,30

PoE Allocation method

: usage

PoE Priority

: low

Captive Portal Profile

: testcpprof_29451201

Policy

: PERMIT-ALL_87364653

Captive Portal Profile Configuration:

------------------------------------

Name

: testcpprof_29451201

Type

: local

URL

: http://google.com

URL Hash Key

: SWNGWyMeYubHPDgVIirpEUwNK5Uf+r1vmhBIncQPw1Y=

Access Policy Details:

---------------------

Policy Name : PERMIT-ALL_87364653

Policy Type : Local

Policy Status : Applied

Base Policy : N/A

ACL Names

: N/A

Port access general commands | 2204

SEQUENCE CLASS

TYPE ACTION

----------- ---------------------------- ---- ----------------------------------

10

dns

ipv4 permit

20

dhcp

ipv4 permit

Class Details: ------------class ip dns 10 match tcp any any class ip dhcp 20 match any any any

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.12
10.08 10.07 or earlier

Modification
The following changes were introduced: n Command output modified to display RADIUS attributes for
clients not using local, downloaded or RADIUS overridden role. n Command output modified to display Base Policy and ACL
Names. n Command output modified to display PoE Allocation method.
Added RADIUS overridden role to example
--

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show port-access clients onboarding-method
show port-access clients onboarding-method <METHOD>
Description
Shows active port access client information for the specified onboarding method.

Parameter <METHOD>

Description
Selects the onboarding method. Available methods: deviceprofile, dot1x, mac-auth, port-security.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2205

Examples
On the 6400 Switch Series, interface identification differs. Showing information for clients onboarded using MAC authentication.

switch# show port-access clients onboarding-method mac-auth

Port Access Clients

Status codes: device-mode

----------------------------------------------------------------------------------

-

Port

MAC-Address

Onboarding

Status

Role

Method

----------------------------------------------------------------------------------

-

1/1/6

00:50:56:bd:50:43 mac-auth

Success

auth-role, auth

1/1/212 00:60:56:bd:50:43 mac-auth

Success

fallback-role,

fallback

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show port-access interface
show port-access interface all|<ifrange> status
Description
Display the interface status for port-access enabled interfaces. It includes the name of the port, the member interfaces associated with the port along with the security state of the interface. A port-access interface can be in one of the following states:
1. Blocked: Indicates that the interface is blocked by port-access. 2. Secured: Indicates the interface is secured by port-access. 3. Down: Indicates port-access is not yet operational on the interface

Port access general commands | 2206

Parameter all
<ifrange>

Description Display port-access information for all interfaces.
Display port-access information for the specified interface.

Examples
Showing the port-access status for all interfaces:

switch# show port-access interface all status

Port

Interface Status

--------- ---------- -------

1/1/1

1/1/1

Blocked

lag1

1/1/3

Secured

lag1

1/1/4

Down

Showing port-access status for interface 1/1/1:

switch# show port-access interface 1/1/1 status

Port

Interface Status

--------- ---------- -------

1/1/1

1/1/1

Blocked

Showing port-access status for LAG 1:

switch# show port-access interface lag1 status

Port

Interface Status

--------- ---------- -------

lag1

1/1/3

Secured

lag1

1/1/4

Down

When port-access is not configured on an interface, following message will be displayed:

switch# show port-access interface all status Port-access is not configured

Release 10.13

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2207

Chapter 118
Port access MAC authentication commands

Port access MAC authentication commands

aaa authentication port-access allow-lldp-auth [mac {source-mac|chassis-mac}]
aaa authentication port-access allow-lldp-auth [mac {source-mac|chassis-mac}] [no] aaa authentication port-access allow-lldp-auth [mac {source-mac|chassis-mac}]
Description
By default authentication is allowed via LLDP packets which are received on the port. Use the no version of this command to prevent authentication using LLDP packets received on the port. Chassis MAC and Source MAC addresses can be used for authentication via LLDP frames.
Examples
Configuring authentication via LLDP packets:

switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access allow-lldp-auth < pd platform="4100i,6000,6100,6200,6300,6400,8100,8360" > switch(config)# interface lag 1 switch(config-lag-if)# aaa authentication port-access allow-lldp-auth < /pd >

Enabling authentication via LLDP packets on a MAC source:

switch(config)# interface 1/1/1 switch(config-if)# aaa authentication port-access allow-lldp-auth mac source-mac
switch(config-if)# aaa authentication port-access allow-lldp-auth mac chassis-mac

Enabling authentication via LLDP BDU packets:

switch(config-if)# aaa authentication port-access

allow-lldp-auth

Allow or block authentication on LLDP BPDU. (Default:

allow)

switch(config-if)# no aaa authentication port-access

allow-lldp-auth

Allow or block authentication on LLDP BPDU. (Default:

allow)

switch(config-if)# aaa authentication port-access allow-lldp-auth switch(config-if)# no aaa authentication port-access allow-lldp-auth

Configuring MAC via LLDP packets:
AOS-CX 10.14 Command-Line Interface Guide

2208

switch(config-if)# aaa authentication port-access allow-lldp-auth

mac

Configure the MAC to use for LLDP based authentication (Default: chassis-

mac)

switch(config-if)# aaa authentication port-access allow-lldp-auth mac

chassis-mac

Use the chassis MAC in LLDP TLV.

source-mac

Use the source MAC in the LLDP frame.

Disabling authentication via LLDP packets on a MAC source:

switch(config-if)# no aaa authentication port-access allow-lldp-auth mac

chassis-mac

Use the chassis MAC in LLDP TLV.

source-mac

Use the source MAC in the LLDP frame.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms
6300 6400

Command context config-if

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access mac-auth
aaa authentication port-access mac-auth {enable | disable} no aaa authentication port-access mac-auth {enable | disable}
Description
Enables or disables MAC authentication globally or at the port-level.
Examples
Enabling MAC authentication on all interfaces:
switch(config)# aaa authentication port-access mac-auth switch(config-macauth)# enable
Disabling MAC authentication on all interfaces:
switch(config)# aaa authentication port-access mac-auth switch(config-macauth)# disable
Enabling MAC authentication on an interface:

Port access MAC authentication commands | 2209

switch(config-if)# aaa authentication port-access mac-auth switch(config-if-macauth)# enable
Disabling MAC authentication on an interface:
switch(config-if)# aaa authentication port-access mac-auth switch(config-if-macauth)# disable

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access mac-auth addr-format
aaa authentication port-access mac-auth addr-format {no-delimiter | single-dash | multi-dash |multi-colon | no-delimiter-uppercase | single-dash-uppercase | multi-dash-uppercase | multi-colon-uppercase}
no aaa authentication port-access mac-auth addr-format {no-delimiter | single-dash | multi-dash |multi-colon | no-delimiter-uppercase | single-dash-uppercase | multi-dash-uppercase | multi-colon-uppercase}
Description
Configures the MAC address format that the switch must use in the RADIUS request message. The no form of the command resets the MAC address format to the default, no-delimiter.
Examples
Setting the MAC address format on the switch:
switch(config)# aaa authentication port-access mac-auth switch(config-macauth)# addr-format single-dash
Resetting the MAC address format on the switch to its default:
switch(config)# aaa authentication port-access mac-auth switch(config-macauth)# no addr-format

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2210

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access mac-auth auth-method
aaa authentication port-access mac-auth auth-method {chap | pap} no aaa authentication port-access mac-auth auth-method
Description
Configures the RADIUS authentication method for MAC authentication. Following are the MAC authentication methods supported: n CHAP n PAP
The PEAP-MSCHAPv2 method of authentication is not supported.
The no form of the command resets the authentication method to the default, chap.
Examples
Configuring the RADIUS authentication method on the switch:
switch# config switch(config)# aaa authentication port-access mac-auth switch(config-macauth)# auth-method pap
Resetting the RADIUS authentication method on the switch:
switch(config)# no aaa authentication port-access mac-auth auth-method

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

Port access MAC authentication commands | 2211

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access mac-auth cached-reauth
aaa authentication port-access mac-auth cached-reauth no aaa authentication port-access mac-auth cached-reauth
Description
Enables cached reauthentication on a port. Cached reauthentication allows MAC reauthentications to succeed when the RADIUS server is unavailable. Users who are already authenticated, retain their currently assigned RADIUS attributes. The no form of the command disables cached reauthentication.
Examples
Enabling cached reauthentication on a port:
switch(config-if)# aaa authentication port-access mac-auth switch(config-if-macauth)# cached-reauth
Disabling cached reauthentication on a port:
switch(config-if)# aaa authentication port-access mac-auth switch(config-if-macauth)# no cached-reauth

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2212

aaa authentication port-access mac-auth cached-reauthperiod
aaa authentication port-access mac-auth cached-reauth-period <PERIOD> no aaa authentication port-access mac-auth cached-reauth-period
Description
Configures the period during which an authenticated client, which has failed to reauthenticate because the RADIUS server is unreachable, remains authenticated. The no form of the command resets the cached reauthentication period to the default, 3600 seconds.

Parameter <PERIOD>

Description
Specifies the cached reauthentication period (in seconds). Default: 3600. Range: 1 to 4294967295.

Examples
Configuring cached reauthentication period on a port:

switch(config-if)# aaa authentication port-access mac-auth switch(config-if-macauth)# cached-reauth-period 300

Resetting the cached reauthentication period to the default value:

switch(config-if)# aaa authentication port-access mac-auth switch(config-if-macauth)# no cached-reauth-period

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access mac-auth password
aaa authentication port-access mac-auth password {plaintext|ciphertext}<PASSWORD> no aaa authentication port-access mac-auth password
Description

Port access MAC authentication commands | 2213

Enables and configures the global password that the switch must use for MAC authentication. The password can be either in ciphertext or plaintext format.
The no form of the command disables the password for MAC authentication.

Parameter {plaintext|ciphertext}<PASSWORD>

Description
Specifies the global password to be used by all MAC authenticating devices in either plaintext or ciphertext format.

Examples
Setting the MAC authentication password:

switch(config)# aaa authentication port-access mac-auth switch(config-macauth)# password plaintext maX99J#

Disabling the MAC authentication password:

switch(config)# aaa authentication port-access mac-auth switch(config-macauth)# no password

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access mac-auth quiet-period
aaa authentication port-access mac-auth quiet-period <PERIOD> no aaa authentication port-access mac-auth quiet-period
Description
Configures the period during which the switch does not try to authenticate a rejected client. The no form of the command resets the quiet period to the default, 60 seconds.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2214

Parameter <PERIOD>

Description
Specifies the quiet period (in seconds). Default: 60. Range: 0 to 65535.

Examples
Configuring the quiet period on a port:

switch(config-if)# aaa authentication port-access mac-auth switch(config-if-macauth)# quiet-period 65

Resetting the quiet period on a port to default:

switch(config-if)# aaa authentication port-access mac-auth switch(config-if-macauth)# no quiet-period

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access mac-auth radius servergroup
aaa authentication port-access mac-auth radius server-group <GROUP-NAME> no aaa authentication port-access mac-auth radius server-group <GROUP-NAME>
Description
Configures the MAC authentication server group globally or for a particular port. The no form of the command resets the authentication server group to the default value, radius. When configured on a port, the no form of the command resets the server group on that port to the globally configured group. If no global RADIUS server group is configured, the no form of the command resets the configuration to the default group, radius.

Port access MAC authentication commands | 2215

When the RADIUS server group for MAC authentication is updated on a port, any existing clients on the port that were authenticated using the previous globally configured group will associate with the new group for the port during the next re-authentication cycle. Any new client that is onboarding on the port after the server group update will associate with the new group immediately.

Parameter <GROUP-NAME>

Description Specifies the name of the MAC authentication server group.

Examples
Configuring the RADIUS server group for MAC authentication globally:

switch# config switch(config)# aaa authentication port-access mac-auth switch(config-macauth)# radius server-group group1

Configuring the RADIUS server group for MAC authentication on 1/1/5:

switch(config)# interface 1/1/5 switch(config-if)# aaa authentication port-access mac-auth switch(config-if-macauth)# radius server-group group2

Resetting the RADIUS server group configuration on 1/1/5:

switch(config)# interface 1/1/5 switch(config-if)# aaa authentication port-access mac-auth switch(config-if-macauth)# no radius server-group

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.12 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config config-macauth config-if-macauth

Modification Command is now configurable on a port --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2216

aaa authentication port-access mac-auth reauth
aaa authentication port-access mac-auth reauth no aaa authentication port-access mac-auth reauth
Description
Enables periodic MAC reauthentication of authenticated clients on the port. The no form of the command disables periodic MAC reauthentication on the port.
Examples
Enabling reauthentication on a port:
switch(config-if)# aaa authentication port-access mac-auth switch(config-if-macauth)# reauth
Disabling reauthentication on a port:
switch(config-if)# aaa authentication port-access mac-auth switch(config-if-macauth)# no reauth

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication port-access mac-auth reauth-period
aaa authentication port-access mac-auth reauth-period <PERIOD> no aaa authentication port-access mac-auth reauth-period
Description
Configures the period after which MAC authenticated clients must be reauthenticated on the port. You must first enable MAC reauthentication on the port before configuring the MAC reauthentication period. The no form of the command resets the MAC reauthentication period to the default, 3600 seconds.

Port access MAC authentication commands | 2217

Parameter <PERIOD>

Description
Specifies the MAC reauthentication period (in seconds). Default: 3600. Range: 1 to 4294967295.

Examples
Configuring the MAC reauthentication period on a port:

switch(config-if)# aaa authentication port-access mac-auth switch(config-if-macauth)# reauth-period 60

Resetting the MAC reauthentication period to its default:

switch(config-if)# aaa authentication port-access mac-auth switch(config-if-macauth)# no reauth-period

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

clear mac-auth statistics
clear mac-auth statistics [interface <IF-NAME>]
Description
Clears the MAC authentication statistics associated with the port and all the authenticator state machines associated to this port. If no interface is specified, the statistics is cleared for all MAC authentication enabled ports.

Parameter <IF-NAME>

Description Specifies the interface name.

Examples
Clearing MAC authentication statistics on a port (6400 Switch Series):

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2218

switch# clear mac-auth statistics interface 1/3/1 Clearing MAC authentication statistics on all ports:
switch# clear mac-auth statistics

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show aaa authentication port-access mac-auth interface client-status
show aaa authentication port-access mac-auth interface {all|<IF-NAME>} client-status [mac <MAC-ADDRESS>]
Description
Shows information about MAC authentication clients status. The output can be filtered by interface or MAC address.

Parameter all <IF-NAME> <MAC-ADDRESS>

Description Specifies all interfaces. Specifies the interface name. Specifies the client MAC address.

Examples
On the 6400 Switch Series, interface identification differs. Showing client status information for all ports:

switch# show aaa authentication port-access mac-auth interface all client-status

Port access MAC authentication commands | 2219

Port Access Client Status Details

Client AB:CD:DE:FF:AA:BB, 1/1/1 =========================================
Authentication Details ----------------------
Status Type Auth-Method Time Since Last State Change

: Authenticated : Pass-Through : CHAP : 10 secs

Authentication Statistics

-------------------------

Authentication

:1

Authentication Timeout

:0

Successful Authentication

:1

Failed Authentication

:0

Re-Authentication

:0

Successful Re-Authentication : 0

Failed Re-Authentication

:0

Re-Auths When Authenticated : 0

Cached Re-Authentication

:0

Client DD:CD:AB:CS:EE:OI, 1/1/2 =========================================
Authentication Details ----------------------
Status Type Auth-Method Auth Failure reason Time Since Last State Change

: Unauthenticated : Pass-Through : CHAP : Server reject/ Server timeout : 15 secs

Authentication Statistics

-------------------------

Authentication

:1

Authentication Timeout

:0

Successful Authentication

:0

Failed Authentication

:1

Re-Authentication

:0

Successful Re-Authentication : 0

Failed Re-Authentication

:0

Re-Auths When Authenticated : 0

Cached Re-Authentication

:0

Showing status information for a client:

switch# show aaa authentication port-access mac-auth interface 1/1/1 client-status mac ab:cd:de:ff:aa:bb

Port Access Client Status Details

Client AB:CD:DE:FF:AA:BB, 1/1/1 =========================================
Authentication Details ----------------------
Status Type Auth-Method Time Since Last State Change

: Authenticated : Pass-Through : CHAP : 10 secs

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2220

Authentication Statistics

-------------------------

Authentication

:1

Authentication Timeout

:0

Successful Authentication

:1

Failed Authentication

:0

Re-Authentication

:0

Successful Re-Authentication : 0

Failed Re-Authentication

:0

Re-Auths When Authenticated : 0

Cached Re-Authentication

:0

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show aaa authentication port-access mac-auth interface port-statistics
show aaa authentication port-access mac-auth interface {all|<IF-NAME>} port-statistics
Description
Shows information about MAC authentication ports. The output can be filtered by interface.

Parameter all <IF-NAME>

Description Specifies all interfaces. Specifies the interface name.

Examples
On the 6400 Switch Series, interface identification differs. Showing information for all ports.

switch# show aaa authentication port-access mac-auth interface all port-statistics Port 1/1/1

Port access MAC authentication commands | 2221

==========

Client Details

--------------

Number of Clients

:3

Number of authenticated clients : 2

Number of unauthenticated clients : 1

Number of authenticating clients : 0

Port 1/1/2 ==========

Client Details

--------------

Number of Clients

:4

Number of authenticated clients : 2

Number of unauthenticated clients : 2

Number of authenticating clients : 0

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2222

Chapter 119 Port access policy commands

Port access policy commands

port-access policy
port-access policy <POLICY-NAME> [<SEQUENCE-NUMBER>] class {ip|ipv6} <CLASS-NAME> action {<REMARK-ACTIONS> | <POLICE-ACTIONS> | <OTHERACTIONS>} comment <text>
Description
Creates or modifies a policy and policy entries. A policy is made up of one or more policy entries ordered and prioritized by sequence numbers. Each entry has an IPv4/IPv6 class and one or more policy actions associated with it. A policy must be applied to a role using the associate policy command. The no form of the command can be used to delete either a policy (use no with the policy command) or an individual policy entry (use no with the sequence number).

Parameter <POLICY-NAME> <SEQUENCE-NUMBER> class {ip|ipv6} <CLASS-NAME> <REMARK-ACTIONS>
<POLICE-ACTIONS>

Description
Specifies the policy name.
Specifies the policy entry sequence number. Range: 1 to 4294967295.
Specifies the class type and name.
These remark actions are available: ip-precedence <IP-PRECEDENCE-VALUE>
Specifies the numeric IP precedence value. Range: 0 to 7. dscp <DSCP-VALUE>
Specifies a Differentiated Services Code Point (DSCP) value. Enter either a keyword or numeric value (0 to 63). See DSCP keywords and corresponding values below. pcp <PCP-VALUE> Specifies a pcp value. local-priority <LOCAL-PRIORITY-VALUE> Specifies a local priority value. Range: 0 to 7.
These police actions are available: cir kbps <RATE-KBPS>
Specifies a Committed Information Rate (CIR) value in kbps. Range: 1 to 4294967295. cbs <BYTES> Specifies a Committed Burst Size (CBS) value in bytes. Range: 1 to 4294967295.

AOS-CX 10.14 Command-Line Interface Guide

2223

Parameter <OTHER-ACTIONS> comment

Description
exceed Specifies the action to take on packets that exceed the rate limit.
These other actions are available: drop
Selects drop of all traffic. redirect
Selects redirect of all traffic to a captive portal server. reflect
Enables the switch to allow a packet destined to the client only if the flow is learned (the flow is initiated by the client).
Specifies a policy entry comment.

DSCP keywords and corresponding values

Keyword AF11 AF12 AF13 AF21 AF22 AF23 AF31 AF32 AF33 AF41 AF42 AF43 CS0 CS1 CS2 CS3

Value 10 12 14 18 20 22 26 28 30 34 36 38 0 8 16 24

Description DSCP 10 (Assured Forwarding Class 1, low drop probability) DSCP 12 (Assured Forwarding Class 1, medium drop probability) DSCP 14 (Assured Forwarding Class 1, high drop probability) DSCP 18 (Assured Forwarding Class 2, low drop probability) DSCP 20 (Assured Forwarding Class 2, medium drop probability) DSCP 22 (Assured Forwarding Class 2, high drop probability) DSCP 26 (Assured Forwarding Class 3, low drop probability) DSCP 28 (Assured Forwarding Class 3, medium drop probability) DSCP 30 (Assured Forwarding Class 3, high drop probability) DSCP 34 (Assured Forwarding Class 4, low drop probability) DSCP 36 (Assured Forwarding Class 4, medium drop probability) DSCP 38 (Assured Forwarding Class 4, high drop probability) DSCP 0 (Class Selector 0: Default) DSCP 8 (Class Selector 1: Scavenger) DSCP 16 (Class Selector 2: OAM) DSCP 24 (Class Selector 3: Signaling)

Port access policy commands | 2224

Keyword CS4 CS5 CS6 CS7 EF

Value 32 40 48 56 46

Description DSCP 32 (Class Selector 4: Real time) DSCP 40 (Class Selector 5: Broadcast video) DSCP 48 (Class Selector 6: Network control) DSCP 56 (Class Selector 7) DSCP 46 (Expedited Forwarding)

Usage
n An applied policy processes the packet sequentially against policy and class entries in the list, until either the last policy entry in the list has been evaluated or the packet matches an entry. If there is no match, the packet will be dropped by one of the implicit deny all IPv4 and IPv6 entries.
n Entering an existing <POLICY-NAME> value will cause the existing policy to be modified, with any new <SEQUENCE-NUMBER> value creating an additional policy entry, and any existing <SEQUENCENUMBER> value replacing the existing policy entry with the same sequence number.
n If no sequence number is specified, a new policy entry will be appended to the end of the entry list with a sequence number equal to the highest policy entry currently in the list plus 10. The sequence numbers may be reordered with the port-access policy <POLICY-NAME> resequence <STARTINGSEQ-NUM> <INCREMENT> command.
n If a policy is configured without any action, the default action, permit, is applied for that policy.
Examples
Creating a policy with several class entries:

switch(config)# port-access policy POL1 switch(config-pa-policy)# 10 class ip dns switch(config-pa-policy)# 20 class ip dhcp switch(config-pa-policy)# 30 class ip test action cir kbps 1024 exceed drop switch(config-pa-policy)# exit switch(config)# show port-access policy POL1

Access Policy Details: ======================

Policy Name : POL1

Policy Type : Local

Policy Status :

SEQUENCE CLASS

TYPE ACTION

----------- --------------------------- ---- ----------------------------------

10

dns

ipv4 permit

20

dhcp

ipv4 permit

30

test

ipv4 cir kbps 1024 cbs 2048 exceed drop

Adding a comment to an existing class entry:

switch(config)# port-access policy POL1 switch(config-pa-policy)# 20 comment DHCP-PERMIT switch(config-pa-policy)# exit

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2225

switch(config)# show run port-access policy POL1
port-access policy POL1 10 class ip dns 20 class ip dhcp 20 comment DHCP-PERMIT 30 class ip test action cir kbps 1024 cbs 2048

exceed drop

Removing a comment from an existing class entry:

switch(config)# port-access policy POL1 switch(config-pa-policy)# no 20 comment switch(config-pa-policy)# exit switch(config)# show run port-access policy POL1
port-access policy POL1 10 class ip dns 20 class ip dhcp 30 class ip test action cir kbps 1024 cbs 2048 exceed drop

Modifying a policy by replacing one class with another at the same sequence number:

switch(config)# port-access policy POL1 switch(config-pa-policy)# 10 class ip mds action dscp af21 switch(config-pa-policy)# exit switch(config)# show port-access policy POL1

Access Policy Details: ======================

Policy Name : POL1 Policy Type : Local Policy Status : Applied

SEQUENCE CLASS

TYPE ACTION

----------- ---------------------------- ---- ----------------------------------

10

mds

ipv4 dscp AF21

20

dhcp

ipv4 permit

30

test

ipv4 cir kbps 1024 cbs 2048 exceed drop

Removing a class:

switch(config)# port-access policy POL1 switch(config-pa-policy)# no 10 switch(config-pa-policy)# exit switch(config)# show port-access policy POL1

Access Policy Details: ======================

Policy Name : POL1 Policy Type : Local Policy Status : Applied

SEQUENCE CLASS

TYPE ACTION

----------- ---------------------------- ---- ----------------------------------

Port access policy commands | 2226

20

dhcp

30

clearpass-web

ipv4 permit ipv4 cir kbps 1024 cbs 2048 exceed drop

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
config The policy command takes you into the config-pa-policy context where you enter the policy entries.

Authority
Administrators or local user group members with execution rights for this command.

port-access policy copy
port-access policy <POLICY-NAME> copy <DESTINATION-POLICY>
Description
Copies an existing policy to a new policy.

Parameter <POLICY-NAME> <DESTINATION-POLICY>

Description Specifies the existing policy name. Specifies the destination policy name.

Examples
Copying a policy:

switch(config)# port-access policy POL1 copy POL1_copy switch(config)# show port-access policy

Access Policy Details: ======================

Policy Name : POL1 Policy Type : Local Policy Status : Applied

SEQUENCE CLASS

TYPE ACTION

----------- --------------------------- ---- ----------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2227

20

dhcp

30

test

ipv4 permit ipv4 cir kbps 1024 exceed drop

Policy Name : POL1_copy Policy Type : Local Policy Status : Applied

SEQUENCE CLASS

TYPE ACTION

----------- --------------------------- ---- ----------------------------------

20

dhcp

ipv4 permit

30

test

ipv4 cir kbps 1024 exceed drop

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

port-access policy resequence
port-access policy <POLICY-NAME> resequence <STARTING-SEQ-NUM> <INCREMENT>
Description
Resequences numbering in a policy.

Parameter <POLICY-NAME> <STARTING-SEQ-NUM> <INCREMENT>

Description Specifies the policy to be resequenced. Specifies the starting sequence number. Range: 1 to 4294967295. Specifies the sequence number increment.

Examples
Resequencing a policy starting at 5 with an increment of 10:

switch(config)# port-access policy POL1 resequence 5 10 switch(config)# show port-access policy POL1
Access Policy Details: ======================

Port access policy commands | 2228

Policy Name : POL1 Policy Type : Local Policy Status : Applied

SEQUENCE CLASS

TYPE ACTION

----------- --------------------------- ---- ----------------------------------

5

dhcp

ipv4 permit

15

test

ipv4 cir kbps 1024 exceed drop

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

port-access policy reset
port-access policy <POLICY-NAME> reset
Description
Resets the policy configuration to match the current hardware configuration of the policy.

Parameter <POLICY-NAME>

Description Specifies the name of the policy to be reset.

Examples
Resetting a policy:

switch(config)# port-access policy POL2 switch(config-pa-policy)# 20 class ip dhcp switch(config-pa-policy)# 40 class test2 action cir kbps 1024 exceed drop switch(config-pa-policy)# exit switch(config)# show port-access policy POL1-V2
Access Policy Details: ======================
Policy Name : POL2 Policy Type : Local

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2229

Policy Status : Applied

SEQUENCE CLASS

TYPE ACTION

----------- ---------------------------- ---- ----------------------------------

20

dhcp

ipv4 permit

40

test2

ipv4 cir kbps 1024 exceed drop

switch(config)# port-access policy POLV2 switch(config-pa-policy)# 50 class ip test3 action cir kbps 1024 exceed drop switch(config-pa-policy)# no 20 switch(config-pa-policy)# exit switch(config)# show port-access policy POL2

Access Policy Details: ======================

Policy Name : POL2 Policy Type : Local Policy Status : Rejected

SEQUENCE CLASS

TYPE ACTION

----------- ---------------------------- ---- ----------------------------------

40

test2

ipv4 cir kbps 1024 exceed drop

50

test3

ipv4 cir kbps 1024 exceed drop

switch(config)# port-access policy POK2 reset Following policy entries will be removed: class ip test3 action cir kbps 1024 exceed drop

Following policy entries will be added: 20 class ip dhcp

Do you want to continue (y/n)? y switch(config)# show port-access policy POL2

Access Policy Details: ======================

Policy Name : POL1-V2 Policy Type : Local Policy Status : Applied

SEQUENCE CLASS

TYPE ACTION

----------- ---------------------------- ---- ----------------------------------

20

dhcp

ipv4 permit

40

test2

ipv4 cir kbps 1024 exceed drop

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Port access policy commands | 2230

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

port-access reflexive
port-access reflexive {gbp|policy} enable no...
Description
This command enables the use of reflexive port access and group-based policies. Regular stateless policies allow or deny traffic in the ingress or the egress direction. As a result, reverse traffic that belongs to the same flow will require a separate policy in the opposite direction. This can require complex policies that can be difficult to manage. When reflexive port access policies are enabled, the switch maintains an internal flow table for permitted traffic, and automatically allows return traffic for permitted flows. When reflexive port access or group-based policies are enabled using this command, all existing portaccess clients associated with a reflexive port-access policy, application based policy or group-based policy are logged off from the system. The no form of the command disables reflexive policies and returns port access and group-based policies to the regular stateless status.
This feature can only be used with TCP/UDP Unicast traffic protocols. Protocols like TFTP, DHCP, and ICMP that use a different IP address or port in the request and the corresponding response must not be configured as a reflect entry.

Parameter gbp policy

Description Enables reflexive group-based policies. Enables reflexive port access policies.

Prerequisites
Before you can enable reflexive policies, you must first configure a role ID using the following command:

switch(config)# gbp role <ROLE_NAME> <ROLE_ID>

Next,, enable flow tracking using the following commands:

switch(config)# no ip source-lockdown resource-extended Do you want to continue (y/n)? y
switch(config)# flow-tracking switch(config-flow-tracking)# enable

Examples
Enable reflexive port-access policies:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2231

switch(config)# port-access reflexive policy enable

Enable reflexive group-based policies:

switch(config)# port-access reflexive gbp enable

Creating a policy with two entries with reflexive action:

switch(config)# port-access policy CPPM switch(config-pa-policy)# 10 class ip dns action reflect switch(config-pa-policy)# 20 class ip ssh action reflect switch(config-pa-policy)# 30 class ip clearpass-web action cir kbps 1024 cbs 2048 exceed drop switch(config-pa-policy)# 40 class ip web-traffic action redirect captive-portal switch(config-pa-policy)# exit switch(config)# show port-access policy

Access Policy Details: ======================

Policy Name : CPPM Policy Type : Local Policy Status : Applied

SEQUENCE

CLASS

TYPE ACTION

-------- ------------ ---- ---------------------------

10

dns

ipv4 reflect

20

ssh

ipv4 reflect

30

clearpass-web

ipv4 cir kbps 1024 cbs 2048 exceed drop

40

web-traffic

ipv4 redirect captive-portal

The Reflect action enables the switch to allow a packet destined to the client only if the flow is learned, that is, the flow is initiated by the client.

Command History
Release 10.13

Modification Command introduced.

Command Information

Platforms
6300 6400v2

Command context
config config-class-<CLASS-TYPE>

Authority
Administrators or local user group members with execution rights for this command.

clear port-access policy hitcounts
clear port-access policy <POLICY-NAME> hitcounts {port|client}
Description

Port access policy commands | 2232

Clears statistics and conform rate of a policy applied on a port or client.

Parameter <POLICY-NAME> port client

Description Specifies the policy name. Selects port mode. Selects client mode.

Examples
Clearing policy hit counts:

switch# show port-access policy POL6 hitcounts port

Port Access Policy Hit-Counts Details: ======================================

Policy Name : POL4 Policy Type : Local Policy Status : Applied

SEQUENCE CLASS

TYPE ACTION

CUR-RATE(kbps)

-------- ----------------- ---- --------------------------------- --------------

3

test8

ipv4 cir kbps 1024 exceed drop

512

Class Name : dhcp Class Type : ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match icmp any any count

0

Class Name : clearpass-web Class Type : ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

15

match udp any any count

15101830

Class Name : web-traffic Class Type : ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match any any any count

241

20

match any 10.1.1.1 10.1.1.2 dscp AF11 count

50

Class Name : class6 Class Type : ipv6

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match any any any count

173

20

match icmpv6 2001:db8:a::123 2001:db8:a::125 dscp AF11

count

32

switch#

switch# clear port-access policy POL6 hitcounts port

switch#

switch# show port-access policy POL6 hitcounts port

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2233

Port Access Policy Hit-Counts Details: ======================================

Policy Name : POL4 Policy Type : Local Policy Status : Applied

SEQUENCE CLASS

TYPE ACTION

CUR-RATE(kbps)

-------- ----------------- ---- --------------------------------- --------------

3

test8

ipv4 cir kbps 1024 exceed drop

512

Class Name : dhcp Class Type : ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match icmp any any count

0

Class Name : clearpass-web Class Type : ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

15

match udp any any count

0

Class Name : web-traffic Class Type : ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match any any any count

0

20

match any 10.1.1.1 10.1.1.2 dscp AF11 count

0

Class Name : class6 Class Type : ipv6

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match any any any count

0

20

match icmpv6 2001:db8:a::123 2001:db8:a::125 dscp AF11

count

0

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Port access policy commands | 2234

show port-access policy
show port-access policy [<POLICY-NAME>]
Description
Shows various aspects of policies and their current usage. Details of a policy including the content of a specific policy is shown. Policy type values:
n Local--User configured policy n Downloaded--Downloaded user policy n RADIUS--Policy obtained from the RADIUS server
Policy status values:
n Applied--Policy is successfully applied in the hardware. n Rejected--Policy is not supported in the hardware. n In-Progress--Policy is being processed in the hardware. n Failed--Displayed when the switch fails to apply the policy configuration because the TCAM
resources are unavailable or full.
Base Policy Values:
n Name of the policy--Policy associated with the RADIUS overridden base role. n N/A--Non-RADIUS policy or policy derived from RADIUS attributes such as Filter ID or [Aruba-]NAS-
Filter-Rule
ACL Names Values:
n Name of the ACL--Name of the ACL associated with the RADIUS policy derived from RADIUS FilterID attribute.
n N/A--Non-RADIUS policy or policy derived from [Aruba-]NAS-Filter-Rule RADIUS attribute.
If a policy is configured without any action, the show command will represent such an entry with the permit action .

Parameter <POLICY-NAME>

Description Specifies the policy name.

Examples
Showing information for all policies:

switch(config)# show port-access policy
Access Policy Details: ======================
Policy Name : POL1 Policy Type : Local

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2235

Policy Status : Applied Base Policy: N/A ACL Name: N/A

SEQUENCE CLASS

TYPE ACTION

----------- --------------------------- ---- ----------------------------------

20

dhcp

ipv4 permit

30

test

ipv4 cir kbps 1024 exceed drop

Policy Name : POL1_copy Policy Type : Local Policy Status : Applied Base Policy: N/A ACL Name: N/A

SEQUENCE CLASS

TYPE ACTION

----------- --------------------------- ---- ----------------------------------

20

dhcp

ipv4 permit

30

test

ipv4 cir kbps 1024 exceed drop

Showing information for a particular policy:

switch(config)# show port-access policy RADIUS_115315236 Access Policy Details: ----------------------

Policy Name : RADIUS_115315236

Policy Type : Radius

Policy Status : Applied

Base Policy : N/A

ACL Names

: DHCP, WebServices-Student

SEQUENCE CLASS

TYPE ACTION

----------- ---------------------------- ---- ----------

10

RADIUS_3241199543_2521983626 ipv4 permit

switch(config)# show port-access policy RADIUS_407949976 Access Policy Details: ----------------------

Policy Name : RADIUS_407949976

Policy Type : Radius

Policy Status : Applied

Base Policy : test_policy_test_cppm_role-3006-1

ACL Names

: N/A

SEQUENCE CLASS

TYPE ACTION

----------- ---------------------------- ---- ---------

10

RADIUS_407949976_4016176641 ipv4 permit

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

Port access policy commands | 2236

Release 10.12
10.07 or earlier

Modification
Command output modified to display Base Policy and ACL Names.
--

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show port-access policy hitcounts
show port-access policy <POLICY-NAME> hitcounts {port | client}
Description
Shows port access hit count statistics.

Parameter <POLICY-NAME> port client

Description Specifies the policy name. Selects port mode. Selects client mode.

Examples
Showing policy hit counts (statistics) with current rate:

switch# show port-access policy POL6 hitcounts port

Port Access Policy Hit-Counts Details: ======================================

Policy Name : POL1 Policy Type : Local Policy Status : Applied

SEQUENCE CLASS

TYPE ACTION

CUR-RATE(kbps)

-------- ----------- ---- ------------------------------------- --------------

30

test8

ipv4 cir kbps 1024 exceed cbs 2048 drop

512

Class Name : dhcp Class Type : ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match icmp any any count

982150

Class Name : clearpass-web

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2237

Class Type : ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

70

match udp any any count

15101830

Class Name : web-traffic

Class Type : ipv4

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

4

match any any any count

3194

5

match any 10.1.1.1 10.1.1.2 dscp AF11 count

1716

Class Name : class6 Class Type : ipv6

SEQUENCE CLASS-ENTRY

HIT-COUNT

----------- ------------------------------------------------------- -----------

10

match any any any count

0

20

match icmpv6 2001:db8:a::123 2001:db8:a::125 dscp AF11

count

0

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Port access policy commands | 2238

Chapter 120 Port access role commands

Port access role commands
app-recognition enable
[no] app-recognition enable
Description
Enable the application recognition role on a port. The app-recognition is disabled by default. The no form of this command disables the application recognition role.
Examples
Configuring application recognition port for a role:
switch(config)# port-access role role01 switch(config-pa-role)# app-recognition enable
Disable application recognition for a role:
switch(config)# port-access role role01 switch(config-pa-role)# no app-recognition enable

For more information on features that use this command, refer to the Security Guide for your switch model.
For more information on application recognition feature, refer to the Application Visibility and Control Guide for your switch model.

Command History
Release 10.11

Modification Command introduced

Command Information

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into

Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide

2239

Platforms

Command context
the config-pa-role context.

Authority

associate captive-portal-profile
associate captive-portal-profile <PROFILE-NAME> no associate captive-portal-profile <PROFILE-NAME>
Description
Associates the captive portal profile with the current role. The no form of this command dissociates the captive portal profile with the role.

Parameter <PROFILE-NAME>

Description
Specifies the captive portal profile name to associate with the current role. The profile must be present in the switch before associating it with a role. Length: 1 to 64 characters.

Examples
Associating a captive portal profile with a role:

switch(config)# port-access role role01 switch(config-pa-role)# associate captive-portal-profile prof01

Dissociating a captive portal profile from the role:

switch(config-pa-role)# no associate captive-portal-profile

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

Port access role commands | 2240

associate macsec-policy
associate macsec-policy <POLICY-NAME> no associate macsec-policy [<POLICY-NAME>]
Description
Associates a MACsec policy with a role. When a role that has a MACsec policy associated is applied to a port, all data traffic is blocked on the port until a secure channel is successfully established.

If a MACsec policy is associated with a role that is applied on a non-MACsec capable interface, the client will be in an unauthorized state and the port will remain in a blocked state.
The no form of this command disassociates the policy from the role.

Parameter <POLICY-NAME>

Description Specifies the MACsec policy name. Range: Up to 128 characters.

Examples
Associating a MACsec policy with a role.:

switch(config)# port-access role role01 switch(config-pa-role)# associate macsec-policy Client-Connect

Disassociating a MACsec policy from a role:

switch(config-pa-role)# no associate macsec-policy

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms 6300

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

associate policy
associate policy <POLICY-NAME>

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2241

no associate policy <POLICY-NAME>
Description
Associates the policy with the current role. The no form of this command dissociates the policy from the role.

Parameter <POLICY-NAME>

Description
Specifies the policy name to associate with the current role. Range: Up to 64 characters.
NOTE: Only those policies created by using the port-access policy command are allowed to be associated with a role. Policies created using the policy command are not allowed to be associated with a role.
Policies that are of the downloaded type are not allowed to be associated with a role.

Examples
Associating a policy with a role:

switch(config)# port-access role role01 switch(config-pa-role)# associate policy policy01

Dissociating a policy from the role:

switch(config-pa-role)# no associate policy poilcy01

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

auth-mode
auth-mode {client-mode | device-mode | multi-domain}

Port access role commands | 2242

Description
Configures the authentication mode for the clients that are associated with the current role.

Parameter client-mode device-mode
multi-domain

Description
Selects client mode. In this mode, all clients connecting to the port are sent for authentication.
Selects device mode. In this mode, only the first client connecting to the port is sent for authentication. Once this client is authenticated, the port is considered as open and all subsequent clients trying to connect on that port are not sent for authentication.
Selects multidomain mode. In this mode only one voice device is allowed to be authenticated in addition to the configured data devices on a port. By default only one data device is allowed to be authenticated on the multidomain mode along with one voice device. You can configure the maximum number of data devices allowed with the aaa authentication port-access client-limit multi-domain command. If a second voice device or a data device greater than the configured data client limit onboards, a violation is triggered. You must configure a voice VLAN for IP phones to onboard a voice device in the multidomain authentication mode. To authorize a voice device, you must perform one of the following:
n Configure the AAA server to send the Aruba-Device-Traffic-
Class Aruba VSA with value 1. n Configure the device-traffic-class parameter in the role to be
applied to indicate a voice device. Without this VSA value or the device type in the role, the switch considers the voice device as a data device.

Examples
Configuring the client authentication mode:

switch(config-pa-role)# auth-mode client-mode

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08 10.07 or earlier
Command Information

Modification Added multi-domain parameter --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2243

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

cached-reauth-period
cached-reauth-period [<PERIOD>] no cached-reauth-period
Description
Enables cached reauthentication, setting the period after which clients that associated with the current role must be reauthenticated. The no form of this command disables cached authentication.

Parameter <PERIOD>

Description
Specifies the cached reauthentication period (in seconds) for clients associated with the role. Default: 30. Range: 30 to 4294967295.

Examples
Enabling cached reauthentication and setting its period to 200 seconds:

switch(config-pa-role)# cached-reauth-period 200

Disabling cached reauthentication:

switch(config-pa-role)# no cached-reauth-period

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

config-pa-role

Administrators or local user group members with execution rights

The port-access role for this command.

Port access role commands | 2244

Platforms

Command context

Authority

command takes you into the config-pa-role context.

client-inactivity timeout
client-inactivity timeout {<CLIENT-INACTIVITY-PERIOD> | none} no client-inactivity timeout
Description
Configures the period that the switch waits for a response from a client after which it removes the client from the role. The no form of the command resets the timeout period to the default.

Parameter <CLIENT-INACTIVITY-PERIOD>
none

Description
Specifies the client inactivity time (in seconds). Default: Dynamic client age-out. Range: 60 to 4294967295
Selects no client deletion due to inactivity.

Examples
Configuring client inactivity timer for a role:

switch(config-pa-role)# client-inactivity timeout 3600

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.14
10.07 or earlier

Modification
The range of the command has been modified from 60 to 4294967295 seconds.
--

Command Information

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2245

description
description <ROLE-DESCRIPTION>
Description
Configures the role description.
Parameter <ROLE-DESCRIPTION>

Description Specifies the role description. Range: Up to 255 characters.

Examples
Configuring the role description:

switch(config-pa-role)# description student role

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

device-traffic-class
device-traffic-class voice no device-traffic-class [voice]
Description
Configures the voice class of client to associate with the role.
This attribute is applicable only to critical-voice-role role. It is not applicable to other special roles such as, preauth-role, reject-role, and fallback-role.
The no form of the command resets the class of client to the default, data.
Usage

Port access role commands | 2246

Traffic class of a client will not be considered as voice unless device-traffic-class is set to voice the role. In the multidomain mode, clients with a role that do not have the value of the device-traffic-class attribute set to voice will be considered as data device.
Examples
Configuring voice device traffic class for role role01:
switch(config)# port-access role role01 switch(config-pa-role)# device-traffic-class voice

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08

Modification Command introduced

Command Information

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

gateway-zone zone gateway-role
gateway-zone zone <ZONE-NAME> gateway-role <GATEWAY-ROLE-NAME>
Description
Configures the per-role gateway zone details needed for user-based tunneling (UBT). For information on UBT, see the Fundamentals Guide.

Parameter <ZONE-NAME> <GATEWAY-ROLE-NAME>

Description Specifies the role gateway zone name. Specifies an existing gateway role name.

Examples
Configuring role gateway zone details:

switch(config-pa-role)# gateway-zone zone zone1 gateway-role role1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2247

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

mtu
mtu <MTU-SIZE>
Description
Configures the MTU (maximum transmission unit) size of a client for a role.

Parameter <MTU-SIZE>

Description Specifies the MTU size in bytes. Range: 68 to 9198.

Examples
Configuring client MTU size:

switch(config-pa-role)# mtu 9198

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Port access role commands | 2248

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

poe-allocate-by
poe-allocate-by {class | usage} no poe-allocate-by {class | usage}
Description
Configures the PoE allocation method for the configured port-access role. If the allocation method is not configured, the power allocation method configured on the interface is used. The no form of this command removes the configuration.

Parameter class usage

Description Configures the PoE class-based allocation method. Configures the PoE usage-based allocation method.

Examples
Configuring class as PoE allocation method for the role role01:

switch(config)# port-access role role01 switch(config-pa-role)# poe-allocate-by class

Removing PoE allocation method configured for the port-access role:

switch(config)# port-access role role01 switch(config-pa-role)# no poe-allocate-by

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.12
Command Information

Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2249

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

poe-priority
poe-priority {critical | high | low} no poe-priority
Description
Configures the power distribution priority for the port access roles. High power consumption can be prevented using the poe-priority control mechanism. The no form of this command restores the power distribution to its default priority.

Parameter critical high low

Description Selects critical priority. Selects high priority. Selects low priority.

Examples
Configuring PoE priority for a new role:

switch(config)# port-access role role01 switch(config-pa-role)# poe-priority critical

Resetting PoE priority for the role to its default:

switch(config)# port-access role role01 switch(config-pa-role)# no poe-priority

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Port access role commands | 2250

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

port-access role
port-access role <ROLE-NAME> no port-access role <ROLE-NAME>
Description
Creates a new port access role or modifies an existing role. This command takes you into the config-parole context. A maximum of 32 port access roles can be created. The no form of this command deletes a role.

Parameter <ROLE-NAME>

Description Specifies the role name. Range: Up to 64 characters.

Examples
Creating a new role:

switch(config)# port-access role basic01

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

reauth-period
reauth-period <PERIOD> no reauth-period
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2251

Configures the period after which clients that associated with the current role must be reauthenticated.
The reauthentication period configured here takes precedence over the reauthentication period configured at the port level.

Parameter <PERIOD>

Description
Specifies the reauthentication period (in seconds) for clients associated with the role. Default: None. Range: 1 to 4294967295. A reauthentication period of less than 60 seconds is not recommended.

Examples
Configuring reauthentication period:

switch(config-pa-role)# reauth-period 3000

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

session timeout
session-timeout <SESSION-TIMEOUT> no session-timeout
Description
Configures the session timeout for the role. After the timeout period, the session is disconnected.

Parameter <SESSION-TIMEOUT>

Description
Specifies the session timeout (in seconds). Range: 1 to 4294967295. A timeout of less than 60 seconds is not recommended.

Port access role commands | 2252

Examples
Configuring session timeout for a role:
switch(config-pa-role)# session timeout 3600

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

show aaa authentication port-access interface client-status
show aaa authentication port-access interface {all | <IF-NAME>} client-status [mac <MAC-ADDRESS>]
Description
Shows information about the status of the role applied on ports.

Parameter all <IF-NAME> <MAC-ADDRESS>

Description Specifies all interfaces. Specifies the interface name. Specifies the client MAC address.

Examples
Showing information about a client:

switch# show aaa authentication port-access interface all client-status mac 00:00:00:00:00:01
Port Access Client Status Details
Client 00:00:00:00:00:01 ============================

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2253

Session Details

---------------

Port

: 1/7/24

Session Time : 151s

Authentication Details

----------------------

Status

: mac-auth Authenticated

Auth Precedence : mac-auth - Authenticated, dot1x - Not attempted

Authorization Details ----------------------
Role : UserRole_1 Status : Applied

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show port-access role
show port-access role {local | clearpass | radius | name <ROLE-NAME>}
Description
Shows information about roles configured locally, or downloaded from ClearPass Policy Manager and the RADIUS server. Displays information only about the attributes defined for the role. The base policy name will be suffixed with * for RADIUS overridden roles.

Parameter local clearpass
radius
<ROLE-NAME>

Description
Shows information about locally configured roles.
Shows information about roles downloaded from ClearPass Policy Manager.
Shows information about roles downloaded from the RADIUS server.
Specifies the role name.

Port access role commands | 2254

Examples
Showing locally configured role information:

switch# show port-access role local

Role Information:

Name : local_role_01

Type : local

----------------------------------------------

Reauthentication Period

: 333 secs

Cached Reauthentication Period

: 300 secs

Access VLAN Name

: Hpe

VLAN Group Name

: group1

PoE Priority

: low

Policy

: deny-http-policy

Private-VLAN Port-Type

: secondar

Showing information for roles downloaded from ClearPass Policy Manager:

switch# show port-access role clearpass

Role Information:

Name : CP_GIRI_DUR_GUEST_ROLE-3058-7

Type : clearpass

Status: Completed

----------------------------------------------

Reauthentication Period

: 300 secs

Authentication Mode

:

Session Timeout

: 1000000 secs

Client Inactivity Timeout

:

Description

: Guest role for CP6

Gateway Zone

:

UBT Gateway Role

:

Access VLAN

: 20

Native VLAN

:

Allowed Trunk VLANs

:

Access VLAN Name

: vlan20

Native VLAN Name

:

Allowed Trunk VLAN Names

:

MTU

:

QOS Trust Mode

:

STP Administrative Edge Port

: true

PoE Priority

:

Captive Portal Profile

: CP6_CP_GIRI_DUR_GUEST_ROLE-3058-7

Policy

: CP6_CP_GIRI_DUR_GUEST_ROLE-3058-7

Showing locally configured role information:

switch# show port-access role local

Role Information:

Name : local_role_01

Type : local

----------------------------------------------

Reauthentication Period

: 333 secs

Cached Reauthentication Period

: 300 secs

Access VLAN Name

: Hpe

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2255

VLAN Group Name PoE Priority Policy Private-VLAN Port-Type

: group1 : low : deny-http-policy : secondary

Showing information for roles downloaded from a RADIUS server:

switch# show port-access role radius Role Information: Attributes overridden by RADIUS are prefixed by '*'.
Name : RADIUS_21963402 Type : radius ---------------------------------------------Reauthentication Period: 333 secs Access VLAN: 10 VLAN Group Name: group1 STP Administrative Edge Port : true PoE Priority : low PoE Allocation Method: class Captive Portal Profile : testcpprof_29451201 Policy : PERMIT-ALL_87364653 Private-VLAN Port-Type : secondary

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.12
10.08 10.07 or earlier

Modification
The following changes were introduced: n Command output updated to display information only about
the attributes defined for the role. n Updated output to display PoE Allocation method. n The base policy name will be suffixed with * for RADIUS
overridden roles.
Updated RADIUS role example with radius-overridden attributes
--

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

stp-admin-edge-port

Port access role commands | 2256

stp-admin-edge-port no stp-admin-edge-port
Description
Configures the port as a spanning tree administrative edge port for the role. This configuration removes the port participation from STP interactions when onboarding devices. This in turn helps in faster onboarding of devices. The no form of the command disables STP edge port functionality.
If the port receives STP BPDU on the STP administrative edge configured port, the port will move to the STP state. You must configure the port as an STP administrative edge port only if you are sure that the connected device will not participate in STP interactions.
Example
Configuring STP edge port for a role:
switch(config)# port-access role role01 switch(config-pa-role)# stp-admin-edge-port

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

trust-mode
trust-mode [dscp | cos | none] no trust-mode
Description
Configures QoS trust mode for the role. The no form of this command configures the default trust mode for the role.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2257

Parameter dscp cos none

Description Selects trust DSCP and retain 802.1p priority. Selects trust 802.1p and retain DSCP or IP-ToS. Selects no trusting of priority fields.

Examples
Configuring DSCP trust mode for a role:

switch(config)# port-access role role01 switch(config-pa-role)# trust-mode dscp

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

vlan
vlan {access | trunk native | trunk allowed} <VLAN-ID> no vlan {access | trunk native | trunk allowed} <VLAN-ID>
vlan {access name | trunk native name | trunk allowed name} <VLAN-NAME> no vlan {access name | trunk native name | trunk allowed name} [<VLAN-NAME>]
Description
Configures VLAN IDs or VLAN names, and VLAN modes for a port access role. You can configure either VLAN IDs or VLAN names, or a combination of both for a role. The no form of the command deletes the VLAN configuration from the role. For trunk allowed VLAN names, you can delete the VLAN names individually or all names at once.

Port access role commands | 2258

Parameter access <VLAN-ID> trunk native <VLAN-ID> trunk allowed <VLAN-ID> access name <VLAN-NAME> trunk native name <VLAN-NAME> trunk allowed name <VLAN-NAME>

Description
Specifies the VLAN ID for the access VLAN. Supports a single VLAN ID in the range 1 to 4094.
Specifies the native VLAN ID on the trunk interface. Supports a single VLAN ID. Range: 1 to 4094.
Specifies the list of tagged or allowed VLANs on the trunk interface. Supports a list of VLAN IDs. Range: 1 to 4094.
Specifies the VLAN name for the access VLAN. Supports a single VLAN name. Range: Up to 32 characters.
Specifies the native VLAN name on the trunk interface. Supports a single VLAN name. Range: Up to 32 characters
Specifies the tagged or allowed VLAN name on the trunk interface. Supports a single VLAN name. Range: Up to 32 characters. The switch supports a maximum of 50 trunk allowed VLAN names.

Usage
Note the following points when configuring the VLAN IDs and names for a role:
n For VLAN access and VLAN trunk native respectively, it is recommended to configure only one of either VLAN ID or name for a role. In case both VLAN ID and name are configured, then VLAN ID takes precedence and is applied with the role.
n For VLAN trunk allowed, you can collectively configure a maximum of 50 names and 1024 VLAN IDs. In case this limit is exceeded in the role, then that role is rejected when applying it to an onboarding device.

Platform 6300 6400

Maximum VLAN IDs per role
1024
1024

Maximum VLAN Namesper role
50
50

Total VLANs (ID + Name) per role 1024 1024

Examples
Configuring VLAN modes and VLAN IDs for a new role:

switch(config)# port-access role role01 switch(config-pa-role)# vlan trunk native 10 switch(config-pa-role)# vlan trunk allowed 11-15 switch(config-pa-role)# vlan access 50

Configuring VLAN modes and VLAN names for a new role:

switch(config)# port-access role role10 switch(config-pa-role)# vlan trunk native name hpe01 switch(config-pa-role)# vlan trunk allowed name data

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2259

switch(config-pa-role)# vlan trunk allowed name voice switch(config-pa-role)# vlan trunk allowed name video

Deleting VLAN configuration from a role:
switch(config-pa-role)# no vlan trunk native 10 switch(config-pa-role)# no vlan trunk allowed 10-15 switch(config-pa-role)# no vlan access 50
Deleting trunk allowed VLAN names from a role individually:
switch(config-pa-role)# no vlan trunk native name hpe01 switch(config-pa-role)# no vlan trunk allowed name data switch(config-pa-role)# no vlan trunk allowed name voice switch(config-pa-role)# no vlan trunk allowed name video
Deleting trunk allowed VLAN names from a role all at once:
switch(config-pa-role)# no vlan trunk native name hpe01 switch(config-pa-role)# no vlan trunk allowed name

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

config-pa-role
The port-access role command takes you into the config-pa-role context.

Administrators or local user group members with execution rights for this command.

Port access role commands | 2260

Chapter 121 Port access security violation commands

Port access security violation commands

port-access security violation action
port-access security violation action {notify | shutdown} no port-access security violation action
Description
Configures the action that the switch must take whenever a security violation occurs at a port, such as the number of clients exceeding the configured client limit. This command can be issued from the interface (config-if) or Link Aggregation Group (config-lag-if) contexts. The no form of the command resets the action to the default action, notify.

Parameter notify
shutdown

Description
Specifies that the switch notifies any security violation as an event or log in the syslog server, and also sends an SNMP trap notification. This action is the default. The format of the event log that is generated for notifying the security violation is: Client limit exceeded on port <PORT>, caused by an unauthenticated client <MAC-ADDRESS>.
Specifies that the switch shuts down the port where the client limit has exceeded. A port that is shut down can be configured to auto-recover after a recovery period that can be configured with the port-access security violation action shutdown auto-recovery and portaccess security violation action shutdown recovery-timer commands.

Examples
Configuring the shutdown security violation action for interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# port-access security violation action shutdown

Resetting the security violation action to the default value:

switch(config-if)# no port-access security violation action

Configuring the shutdown security violation action for a LAG port:

switch(config)# interface lag 1 switch(config-lag-if)# port-access security violation action shutdown

AOS-CX 10.14 Command-Line Interface Guide

2261

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13

10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-lag-if

Modification This command can be issued from a Link Aggregation Group (LAG) context. --
Authority Administrators or local user group members with execution rights for this command.

port-access security violation action shutdown autorecovery
port-access security violation action shutdown auto-recovery {enable | disable} no port-access security violation action shutdown auto-recovery {enable | disable}
Description
Configures auto-recovery of the port when the security violation action is configured as shutdown. This configuration allows the port, that is shut down when a security violation occurs, to be automatically enabled after the recovery timer expires. The no form of the command resets auto-recovery to the default, disable.

Parameter enable
disable

Description
Enables auto-recovery of port when the security violation action is configured as shutdown.
Disables auto-recovery of port when the security violation action is configured as shutdown.

Examples
Enabling auto-recovery of port:

switch(config-if)# port-access security violation action shutdown auto-recovery enable

Disabling auto-recovery of port:

switch(config-if)# no port-access security violation action shutdown auto-recovery

Port access security violation commands | 2262

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

port-access security violation action shutdown recoverytimer
port-access security violation action shutdown recovery-timer <RECOVERY-TIME> no port-access security violation action shutdown recovery-timer
Description
Configures security violation recovery timer for the port when the security violation action is configured as shutdown. The no form of the command resets the shutdown recovery timer to the default, 10.

Parameter <RECOVERY-TIME>

Description
Specifies the recovery timer (in seconds) after which the port, which is shut down because of security violation, is automatically enabled. Default: 10. Range: 10 to 600.

Examples
Configuring the shutdown recovery-timer on a port:

switch(config-if)# port-access security violation action shutdown recovery-timer 60

Resetting the shutdown recovery-timer to the default value:

switch(config-if)# no port-access security violation action shutdown recoverytimer

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2263

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

show interface
show interface <INTERFACE-NAME>
Description
Displays active configurations and operational status information for interfaces including the reason for the port shutdown because of a security violation at the port.

Parameter <INTERFACE-NAME>

Description Specifies the interface name.

Examples
The following example shows the status of the interface when it is shutdown because of security violation:

switch# show interface 3/1/35
Interface 3/1/25 is down Admin state is up State information: Disabled by port-access Link state: down for 53 minutes (since Tue Jun 01 01:27:28 UTC 2021)

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Port access security violation commands | 2264

show port-access aaa violation interface
show port-access aaa violation interface {all|<INTERFACE>}
Description
Shows information about violations that have occurred and the count of violations for port access authentication methods at the interfaces.

Parameter all <INTERFACE>

Description
Specifies all interfaces.
Specifies the interface name or a comma-separated list of interfaces, or a hyphen-separated interface range.

Examples
On the 6400 Switch Series, interface identification differs. Showing information for violations for all interfaces:

switch# show port-access aaa violation interface all

Client limit exceeded violation status

----------------------------------------------------

Port

Violation

Violation-Count

----------------------------------------------------

1/1/1

No

0

1/1/2

Yes

10

1/1/5

No

10

Showing information for violations on interfaces 1/1/1 to 1/1/2:

switch# show port-access aaa violation interface 1/1/1-1/1/2

Client limit exceeded violation status

----------------------------------------------------

Port

Violation

Violation-Count

----------------------------------------------------

1/1/1

No

0

1/1/2

Yes

10

Showing information when no violation action is configured:

switch# show port-access aaa violation interface 1/1/1 Port-access aaa violation is not configured

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2265

Release 10.08

Modification Command introduced

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show port-access port-security violation client-limitexceeded interface
show port-access port-security violation client-limit-exceeded interface {all|<INTERFACE>}
Description
Shows information on the number of client-limit-exceeded security violations that have occurred. The output can be filtered by interface.

Parameter all <INTERFACE>

Description
Specifies all interfaces.
Specifies the interface name or a comma-separated list of interfaces, or a hyphen-separated interface range.

Examples
On the 6400 Switch Series, interface identification differs. Showing information for all ports:

switch# show port-access port-security violation client-limit-exceeded interface all

Client limit exceeded violation status

----------------------------------------------------

Port

Violation

Violation-Count

----------------------------------------------------

1/1/1

No

0

1/1/2

Yes

10

1/1/5

No

10

Showing information for a port range:

switch# show port-access port-security violation client-limit-exceeded interface 1/1/1-1/1/2
Client limit exceeded violation status

Port access security violation commands | 2266

----------------------------------------------------

Port

Violation

Violation-Count

----------------------------------------------------

1/1/1

No

0

1/1/2

Yes

10

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.08
10.07 or earlier

Modification
Syntax modified from show port-access security violation client-limit-exceeded interface {all|<INTERFACE-NAME>} to show port-access port-security violation client-limitexceeded interface {all|<INTERFACE-NAME>}
--

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2267

Chapter 122 Port access VLAN group commands

Port access VLAN group commands

associate-vlan
associate-vlan <VLAN-ID> no associate-vlan <VLAN-ID>
Description
Associates VLANs with an existing VLAN group. The no form of this command removes the association of the VLAN with the specified VLAN group.

Parameter <VLAN-ID>

Description Specifies the VLAN or a specific set of VLANs. Range 1 to 4094.

Examples
Associating VLANs with group1:

switch(config)# port-access vlan-group group1 switch(config-pa-vlan-group)# associate-vlan 5,10-15,20,21

Associating additional VLANs with group1:

switch(config)# port-access vlan-group group1 switch(config-pa-vlan-group)# associate-vlan 30-40

Dissociating VLANs 10-15 from VLAN group1:

switch(config-pa-vlan-group)# no associate-vlan 10-15

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide

2268

Platforms
6300 6400

Command context config-pa-vlan-group

Authority
Administrators or local user group members with execution rights for this command.

port-access vlan-group
port-access vlan-group <NAME> no port-access vlan-group <NAME>
Description
Creates the specified VLAN group (if it does not already exist) and then enters its context config-pavlan-group. For an existing VLAN group, this command enters the context of the specified VLAN group. The no form of this command removes the specified VLAN group. In order for the group to be applied to a client, VLANs associated to the group should be configured on the switch. If not, the role displays an error.

Parameter <NAME>

Description Specifies the name of the VLAN group. Range 2 to 32 characters.

Examples
Creating VLAN group1 and associating VLANs with it:

switch(config)# port-access vlan-group group1 switch(config-pa-vlan-group)# associate-vlan 5,10-15,20,21

Dissociating VLANs 10-15 from VLAN group1:

switch(config-pa-vlan-group)# no associate-vlan 10-15

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

Port access VLAN group commands | 2269

show running-config port-access vlan-group
show running-config port-access vlan-group
Description
Shows information for all configured VLAN groups.
Example
Showing the port access VLAN group configuration:
switch# show running-config port-access vlan-group ... port-access vlan-group group1
associate-vlan 5,20,21,30-40 port-access vlan-group group2
associate-vlan 50-60,75-85 ...

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2270

Chapter 123 Port filtering commands

Port filtering commands
portfilter
portfilter <INTERFACE-LIST> no portfilter [<INTERFACE-LIST>]
Description
Configures the specified ports so they do not egress any packets that were received on the source port specified in interface context. The no form of this command removes the port filter setting from one or more ingress ports/LAGs.
This configuration will disable flow tracking statistics collection.

Parameter <INTERFACE-LIST>

Description
Specifies a list of ports/LAGs to be blocked for egressing. Specify a single interface or LAG, or a range as a comma-separated list, or both. For example: 1/1/1, 1/1/3-1/1/6,lag2, lag1-lag4. On the 6400 Switch Series, interface identification differs.

Usage
When a port filter configuration is applied on the same ingress physical port/LAG, the configuration is updated with the new sets of egress ports/LAGs that are to be blocked for egressing and that are not a part of its previous configuration. Duplicate updates on an existing port filter configuration are ignored. When egress ports/LAGs are removed from the existing port filter configuration of an ingress port/LAG, egressing is allowed again on those egress ports/LAGs for all packets originating from the ingress port/LAG. The no portfilter [<IF-NAME-LIST>] command removes port filter configurations from the egress ports/LAGs listed in the <IF-NAME-LIST> parameter only. All other egress ports/LAGs in the port filter configuration of the ingress port/LAG remain intact. If no physical ports or LAGs are provided for the no portfilter command, the command removes the entire port filter configuration for the ingress port/LAG.
Examples
On the 6400 Switch Series, interface identification differs. Creating a filter that prevents packets received on port 1/1/1 from forwarding to ports 1/1/3-1/1/6 and to LAGs 1 through 4:

AOS-CX 10.14 Command-Line Interface Guide

2271

switch(config)# interface 1/1/1 switch(config-if)# portfilter 1/1/3-1/1/6,lag1-lag4
Creating a filter that prevents packets received on LAG 1 from forwarding to ports 1/1/6 and LAGs 2 and 4:
switch(config)# interface lag 1 switch(config-lag-if)# portfilter 1/1/6,lag2,lag4
Removing filters from an existing configuration that allows back packets received on port 1/1/1 to forward to ports 1/1/6 and LAGs 3 and 4:
switch(config)# interface 1/1/1 switch(config-if)# no portfilter 1/1/6,lag3,lag4
Removing all filters from an existing configuration that allows back packets received on LAG 1 to forward to all the ports and LAGs:
switch(config)# interface lag 1 switch(config-lag-if)# no portfilter

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Command Information

Platforms All platforms

Command context
config-if config-lag-if

Modification Added information related to role based IPFIX. --
Authority Administrators or local user group members with execution rights for this command.

show portfilter
show portfilter [<IFNAME>][vsx-peer]
Description
Displays filter settings for all interfaces or a specific interface.

Port filtering commands | 2272

Parameter <IFNAME>
vsx-peer

Description
Specifies the ingress interface name. Specifies one of these values: n <FQDN>: a fully qualified domain name. n <IPV4>: an IPv4 address. n <IPV6>: an IPv6 address.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Displaying all port filter settings on the switch:

switch# show portfilter

Incoming Blocked

Interface Outgoing Interfaces

-------------------------------------------------------------------------------

1/1/1

1/1/3-1/1/6,lag1-lag2

1/1/3

1/1/1,1/1/5,1/1/7,1/1/9,1/1/11,1/1/13,1/1/15,1/1/17,1/1/19,1/1/21,

1/1/23,1/1/25,1/1/27,1/1/29,1/1/31,1/1/33,1/1/35

lag2

1/1/1,1/1/3-1/1/6

Displaying the port filter settings for port 1/1/1:

switch# show portfilter 1/1/1

Incoming Blocked

Interface Outgoing Interfaces

-------------------------------------------------------------------------------

1/1/1

1/1/3-1/1/6,lag1-lag2

Displaying the port filter settings for LAG2:

switch# show portfilter lag2

Incoming Blocked

Interface Outgoing Interfaces

-------------------------------------------------------------------------------

lag2

1/1/1,1/1/3-1/1/6

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2273

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Port filtering commands | 2274

Chapter 124 Port security commands

Port security commands
port-access port-security
port-access port-security {enable | disable} no port-access port-security {enable | disable}
Description
Enables or disables port security globally or at the port level.
Examples
Enabling port security globally:
switch(config)# port-access port-security enable
Disabling port security globally:
switch(config)# port-access port-security disable
Enabling port security on a port:
switch(config-if)# port-access port-security enable
Disabling port security on a port:
switch(config-if)# port-access port-security disable

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide

2275

port-access port-security client-limit
port-access port-security client-limit <CLIENTS> no port-access port-security client-limit
Description
Configures the maximum number of clients that are allowed on a port. After configuring the maximum clients limit, the MAC addresses of the clients can be learned by one of the following methods:
n User can manually configure all MAC addresses by using the mac-address command. n User can allow the port to dynamically learn all MAC addresses. n User can configure a fixed number of MAC addresses and allow the switch to learn the remaining
addresses dynamically.
The no form of the command resets the number of clients to the default, 1.

Parameter <CLIENTS>

Description
Specifies the maximum number of clients. Default: 1. Range: 0 to 32 (4100i, 6000, 6100). 0 to 64 (8325, 10000). 0 to 32 (6200). 0 to 64 (6300, 6400).
NOTE: If client limit is configured to 0, the port will not learn any MAC address from inbound traffic and will be blocked indefinitely. An administrator can use this along with the port-access security violation configuration to get notified of a client attempting to connect to a port.

Examples
Configuring client limit on a port:
switch(config-if)# port-access port-security enable switch(config-if-port-security)# client-limit 24

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-if-port-security

Authority
Administrators or local user group members with execution rights for this command.

Port security commands | 2276

port-access port-security mac-address
port-access port-security mac-address <MAC-ADDRESS> no port-access port-security mac-address <MAC-ADDRESS>
Description
Configures a static client (current interface (port) context) MAC address. The no form of this command removes an authorized static client from the port.

Parameter <MAC-ADDRESS>

Description Specifies the static client MAC address.

Examples
Configuring a static client on a port:

switch(config-if)# port-access port-security switch(config-if-port-security)# mac-address aa:bb:cc:dd:ee:ff

Deleting a static client on a port:

switch(config-if)# port-access port-security switch(config-if-port-security)# no mac-address aa:bb:cc:dd:ee:ff

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-if-port-security

Authority
Administrators or local user group members with execution rights for this command.

show port-access port-security interface client-status
show port-access port-security interface {all|<IF-NAME>} client-status [mac <MAC-ADDRESS>]
Description
Shows port security clients status information for the ports. The output can be filtered by interface or MAC address.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2277

Parameter all <IF-NAME> <MAC-ADDRESS>

Description Selects all interfaces. Specifies the interface name. Specifies the client MAC address.

Examples
On the 6400 Switch Series, interface identification differs. Showing client status information for all ports:

switch# show port-access port-security interface all client-status

Port Security Client Status Details

Authorized-Clients Type

Port

-------------------------------------------

AB:CD:DE:FF:AA:BB

static

1/1/1

DD:CD:AB:CD:EE:O1

dynamic

1/1/2

00:50:56:96:7e:fc

sticky-dynamic 1/3/2

Showing client status information with sticky-learning enabled for all ports:

switch# show port-access port-security interface all client-status

Port Security Client Status Details

Authorized-Clients Type

Port

---------------------------------------------

AB:CD:DE:FF:AA:BB

sticky-static

1/1/1

DD:CD:AB:CD:EE:O1

sticky-dynamic 1/1/2

DE:CD:AB:BB:EE:O2

sticky-dynamic 1/1/2

Showing client status information for a client:

switch# show port-access port-security interface 1/3/2 client-status mac 00:50:56:96:7e:fc

Port Security Client Status Details

Authorized-Clients

Type

Port

--------------------------------------------------

00:50:56:96:7e:fc

sticky-dynamic 1/3/2

Showing client status information for a port:

switch# show port-access port-security interface 1/3/2 client-status

Port Security Client Status Details

Authorized-Clients

Type

Port

--------------------------------------------------

00:50:56:96:7e:fc

sticky-dynamic 1/3/2

Port security commands | 2278

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show port-access port-security interface port-statistics
show port-access port-security interface {all|<IF-NAME>} port-statistics
Description
Shows port security statistics for the ports in a switch. The output can be filtered by interface.

Parameter all <IF-NAME>

Description Selects all interfaces. Specifies the interface name.

Examples
On the 6400 Switch Series, interface identification differs. Showing information for all ports.

switch# show port-access port-security interface all port-statistics

Port 1/1/1 ==========

Client Details

--------------

Number of authorized clients

:0

Number of sticky authorized clients

:2

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2279

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show port-access security violation sticky-mac-client-move interface
show port-access security violation sticky-mac-client-move interface {all|<IF-NAME>}
Description
Shows information about the sticky-mac client move violation. The output can be filtered by interface.

Parameter all <IF-NAME>

Description Selects all interfaces. Specifies the interface name.

Examples
On the 6400 Switch Series, interface identification differs. Showing information for all ports.

switch# show port-access port-security violation sticky-mac-client-move interface all

Sticky MAC Client Move Violation Status Details

----------------------------------------------------

Port

Violation

Violation-Count

----------------------------------------------------

1/1/1

No

0

1/1/2

Yes

10

1/1/5

No

10

Showing information for a particular port.

switch# show port-access port-security violation sticky-mac-client-move interface 1/1/1

Sticky MAC Client Move Violation Status Details

----------------------------------------------------

Port

Violation

Violation-Count

Port security commands | 2280

----------------------------------------------------

1/1/1

No

10

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

sticky-learn enable
sticky-learn enable no sticky-learn enable
Description
Enables sticky learning on the port. All the existing and new MACs learned on the port are made sticky. The no form of this command disables the sticky learning on the port.
Examples
Enabling sticky learning on the port:
switch(config)# interface 1/1/1 switch(config-if)# port-access port-security switch(config-if-port-security)# sticky-learn enable
Disabling sticky learning on the port:
switch(config)# interface 1/1/1 switch(config-if)# port-access port-security switch(config-if-port-security)# no sticky-learn enable

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2281

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-if-port-security

Authority
Administrators or local user group members with execution rights for this command.

sticky-learn mac
sticky-learn mac <MAC-ADDRESS> [vlan <VLAN-ID>] no sticky-learn mac <MAC-ADDRESS> [vlan <VLAN-ID>]
Description
Configures the MAC addresses of sticky static clients. After configuring, clients are directly added to the MAC address table. The no form of this command removes an authorized sticky static client from the port.

Parameter <MAC-ADDRESS> vlan <VLAN-ID>

Description Specifies the static sticky client MAC address. Specifies the static sticky client VLAN ID.

Examples
Configuring a sticky static client on a port:

switch(config)# interface 1/1/1 switch(config-if)# port-access port-security switch(config-if-port-security)# sticky-learn mac-address aa:bb:cc:dd:ee:ff

Configuring a sticky static client with a VLAN ID on a port:

switch(config)# interface 1/1/1 switch(config-if)# port-access port-security switch(config-if-port-security)# sticky-learn mac-address aa:bb:cc:dd:ee:ff vlan 4

Removing a sticky static client from a port:

switch(config)# interface 1/1/1 switch(config-if)# port-access port-security switch(config-if-port-security)# no sticky-learn mac-address aa:bb:cc:dd:ee:ff

For more information on features that use this command, refer to the Security Guide for your switch model.

Port security commands | 2282

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-if-port-security

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2283

Chapter 125 PTP commands

PTP commands

clear ptp statistics
clear ptp statisctics [<IFNAME>]
Description
Clears PTP counters for the given interface.

Parameter <IFNAME>

Description Optional: Specifies the interface name.

Examples
Clearing PTP counters for the given interface:

switch# clear ptp statistics 1/1/8 switch# clear ptp statistics lag1 switch# clear ptp statistics

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10.1000 10.10

10.08

Command Information

Platforms 6300

Command context Manager (#)

Modification Added boundary clock support on the 6300 Switch Series. Command introduced on the 6300 Switch Series for transparent clock. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

clock-domain

AOS-CX 10.14 Command-Line Interface Guide

2284

clock-domain <DOMAIN-NUMBER> no clock-domain
Description
Configures the PTP clock domain to a specified value. The no form of this command removes the PTP domain configuration of the PTP clock.

Parameter <DOMAIN-NUMBER>

Description
Sets the PTP clock domain. Range: 0 to 254. Value configurable subject to limits established by the PTP profile.

Usage
n The one-step end-to-end transparent clock works across domains. n For boundary clocks, the clock-domain has to be identical with the domain used in the network. n All PTP devices must be within same domain to be able to sync with each other. n This command is only enabled in the PTP profile context. n For PTP transparent clock, you must configure the same clock-domain as on clients and GM to
synchronize.
Examples
Entering the PTP profile context and setting the PTP clock domain value:

switch(config)# ptp profile aes-r16 switch(config-ptp)# switch(config-ptp)#clock-domain 4 switch(config-ptp)#

Removing the PTP clock domain value:

switch(config-ptp)# no clock-domain switch(config-ptp)#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10.1000
Command Information

Modification Command introduced on the 6300 Switch series.

PTP commands | 2285

Platforms Command context

6300 (only R8S89A, R8S90A)

config-ptp

Authority
Administrators or local user group members with execution rights for this command.

clock-step
clock-step {one-step|two-step} no clock-step
Description
Configures the clock step mode that determines when the egress-time information is sent. The 6300 Switch Series (models R8S89A and R8S90A) support both one-step and two-step modes for boundary clocks. Transparent clocks only support one-step mode. All other 6300 Switch Series models support only transparent clock one-step mode The no form of this command removes the PTP clock-step configuration of the PTP clock.

Parameter one-step
two-step

Description
Sets the PTP clock-step mode to one-step messaging in which egress-time information is sent along with the SYNC message.
Sets the PTP clock-step mode to two-step messaging in which egress-time information is sent a subsequent follow-up message with the egress timestamp of the previously sent SYNC message.

Usage
n Mandatory command to start the PTP clock. n Boundary clocks can inter-operate with different step modes upstream or downstream.
Example
Setting the clock-step mode to one-step messaging:

switch(config-ptp)# clock-step one-step

Removing the clock-step mode configuration:

switch(config-ptp)# no clock-step

Setting the clock-step mode to two-step messaging:

switch(config-ptp)# clock-step two-step

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2286

Command History
Release 10.11

10.08

Command Information

Platforms 6300

Command context config-ptp

Modification For boundary clock, added support for the two-step parameter on the 6300 Switch Series (models R8S89A and R8S90A). Command introduced.
Authority Administrators or local user group members with execution rights for this command.

enable
enable no enable
Description
Enables the PTP profile globally. However, the PTP clock is started only when all the mandatory commands are set. The no form of this command disables the PTP profile globally.
Usage
Mandatory command to start the PTP clock.
Examples
Enabling the PTP profile:
switch(config)# ptp profile 1588v2 switch(config-ptp)# enable
Disabling the PTP profile:
switch(config)# ptp profile 1588v2 switch(config-ptp)# no enable

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.08

Modification Command introduced.

PTP commands | 2287

Command Information

Platforms 6300

Command context config-ptp

Authority
Administrators or local user group members with execution rights for this command.

mode
mode boundary {end-to-end | peer-to-peer} no mode boundary {end-to-end | peer-to-peer} mode transparent {end-to-end | peer-to-peer} no mode transparent {end-to-end | peer-to-peer} no mode
Description
Configures the switch PTP clock mode, either boundary or transparent, with a delay-request mechanism of either end-to-end or peer-to-peer. A device in transparent clock mode does not synchronize (syntonize) itself to a grandsource clock.

On the Aruba 6300 Switch Series, boundary clock (one-step and two-step modes) are available only on models R8S89A and R8S90A. All other Aruba 6300 Switch Series models support only transparent clock (E2E and P2P). A VSF stack only supports E2E mode.
The no form of this command unconfigures the PTP clock mode and delay-request mechanism.

Parameter boundary transparent end-to-end peer-to-peer

Description Selects boundary clock mode. Selects transparent clock mode. Selects the end-to-end delay-request mechanism. Selects the peer-to-peer delay-request mechanism. Not supported with VSF.

Examples
Configuring PTP boundary clock mode with the end-to-end delay-request mechanism:

switch(config-ptp)# mode boundary end-to-end

Unconfiguring PTP boundary clock mode with the end-to-end delay-request mechanism:

switch(config-ptp)# no mode boundary end-to-end

Configuring PTP boundary clock mode with the peer-to-peer delay-request mechanism:

switch(config-ptp)# mode boundary peer-to-peer

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2288

Unconfiguring PTP boundary clock mode with the peer-to-peer delay-request mechanism: switch(config-ptp)# no mode boundary peer-to-peer
Configuring PTP transparent with the end-to-end delay-request mechanism: switch(config-ptp)# mode transparent end-to-end
Unconfiguring PTP transparent with the end-to-end delay-request mechanism: switch(config-ptp)# no mode transparent end-to-end
Configuring PTP transparent with the peer-to-peer delay-request mechanism: switch(config-ptp)# mode transparent peer-to-peer
Unconfiguring PTP transparent with the peer-to-peer delay-request mechanism: switch(config-ptp)# no mode transparent peer-to-peer

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.11 10.10.1000

10.08

Command Information

Platforms 6300

Command context config-ptp

Modification Added support for the peer-to-peer delay-request mechanism. Added boundary clock to the 6300 Switch Series models R8S89A and, R8S90A. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

priority1
priority1 <PRIORITY> no priority1
Description

PTP commands | 2289

Configures the PTP clock priority1 value of the device. This value is operational when the device is in boundary clock mode and participating in the Best Clock Source Algorithm (BMCA). This value is used to indicate priority to its downstream clock-aware devices.
The no form of this command removes the PTP priority1 configuration of the PTP clock and sets it to the default value of 128.

Parameter <PRIORITY>

Description Sets the priority value. Default 128.

Usage
This value can be configured only for the boundary clock.
Examples
Configuring PTP priority1 value:

switch(config-ptp)# priority1 129

Removing PTP priority1 configuration:

switch(config-ptp)# no priority1

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10.1000

Command Information

Platforms Command context

6300 (only R8S89A, R8S90A)

config-ptp

Modification Command introduced on the 6300 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

priority2
priority2 <PRIORITY> no priority2 <PRIORITY>
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2290

Configures the PTP clock priority2 value of the device. This value is operational when the device is in boundary clock mode and participating in the Best Clock Source Algorithm (BMCA). This value is used to indicate priority to its downstream clock-aware devices.
The no form of this command removes the PTP priority2 configuration of the PTP clock and sets it to the default value of 128.

Parameter <PRIORITY>

Description Sets the priority value. Default 128.

Usage
This value can be configured only for the boundary clock.
Examples
Configuring PTP priority2 value:

switch(config-ptp)# priority2 129

Removing PTP priority2 configuration:

switch(config-ptp)# no priority2

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10.1000

Command Information

Platforms Command context

6300 (only R8S89A, R8S90A)

config-ptp

Modification Command introduced on the 6300 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

ptp announce-interval
ptp announce-interval {1588v2| aes67 | aes-r16 | dot1as | smpte} <LOG-SECONDS> no ptp announce-interval {1588v2| aes67 | aes-r16 | dot1as | smpte}
Description
Sets the announce message transmit interval on a PTP-enabled interface for a specific PTP profile.

PTP commands | 2291

The no form of this command removes the announce message transmit interval configuration on a PTPenabled interface and sets a profile specific default value.

Parameter 1588v2 aes67 aes-r16 dot1as smpte <LOG-SECONDS>

Description Specifies the PTP 1588v2 profile timers. Default: 1. Specifies the PTP AES67 profile timers. Default: 1. Specifies the PTP AES-R16 profile timers. Default: 1. Specifies the PTP 802.1 AS profile timers. Default: 0. Specifies the PTP SMTPE profile timers. Default: -2. Sets the announce message interval in log seconds.

Usage
This value can be configured only for the boundary clock.
Examples
Setting the PTP 1588v2 profile timers:

switch(config)# interface 1/1/1 switch(config-if)# ptp announce-interval 1588v2 1

Setting the PTP AES67 profile timers:

switch(config)# interface 1/1/1 switch(config-if)# ptp announce-interval aes67 2

Removing the PTP AES67 profile timer configuration:

switch(config)# interface 1/1/1 switch(config-if)# no ptp announce-interval aes67

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13 10.10.1000
Command Information

Modification Support extended for 802.1AS profile. Command introduced on the 6300 Switch Series.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2292

Platforms Command context

6300 (only R8S89A, R8S90A)

config-if

Authority
Administrators or local user group members with execution rights for this command.

ptp announce-timeout
ptp announce-timeout {1588v2| aes67 | aes-r16 | dot1as | smpte} <COUNT> no ptp announce-timeout {1588v2| aes67 | aes-r16 | dot1as | smpte}
Description
Sets the announce message receipt timeout on a PTP-enabled interface for a specific PTP profile. The no form of this command resets the announce message receipt timeout configuration on a PTPenabled interface and sets a profile-specific default value.

Parameter 1588v2 aes67 aes-r16 dot1as smpte <LOG-SECONDS>

Description Specifies the PTP 1588v2 profile timers. Default: 3. Specifies the PTP AES67 profile timers. Default: 3. Specifies the PTP AES-R16 profile timers. Default: 3. Specifies the PTP 802.1AS profile timers. Default: 3. Specifies the PTP SMTPE profile timers. Default: 3. Specifies the number of announcement intervals.

Usage
This value can be configured only for the boundary clock.
Examples
Setting the PTP 1588v profile timer:

switch(config)# interface 1/1/1 switch(config-if)# ptp announce-timeout 1588v2

Setting the PTP AES67 profile timer:

switch(config)# interface 1/1/1 switch(config-if)# ptp announce-timeout aes67 4

Resetting the PTP AES67 profile timer:

switch(config)# interface 1/1/1 switch(config-if)#no ptp announce-timeout aes67

PTP commands | 2293

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13 10.10.1000

Command Information

Platforms Command context

6300 (only R8S89A, R8S90A)

config-if

Modification Support extended for 802.1AS profile. Command introduced on the 6300 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

ptp clock-source-only
ptp clock-source-only no ptp clock-source-only
Description
Configures the PTP port state to clock_source state. This prohibits the port from entering into a clock_ sink or passive state. The no form of this command removes the clock_source state configuration on the port and returns it to normal BMCA operation.
Usage
This can only be configured for the boundary clock.
Examples
Configuring the clock_source only role for the port:
switch(config)# interface 1/1/1 switch(config-if)# ptp clock-source-only
Removing the configuration of clock_source only role for the port:
switch(config)# interface 1/1/1 switch(config-if)# no ptp clock-source-only

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2294

Command History

Release 10.10.1000

Command Information

Platforms
6300 (only R8S89A, R8S90A)

Command context config-if

Modification Command introduced on the 6300 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

ptp delay-req-interval
ptp delay-req-interval {1588v2 | aes67 | aes-r16 | smpte} <LOG-SECONDS> no ptp delay-req-interval {1588v2 | aes67 | aes-r16 | smpte}
Description
Sets the delay_req message transmit interval on a PTP-enabled interface for a specific PTP profile. The no form of this command removes the delay_req message transmit interval configuration on a PTP-enabled interface and sets a profile specific default value.

Parameter 1588v2 aes67 aes-r16 smpte <LOG-SECONDS>

Description Specifies the PTP 1588v2 profile timers. Default 0. Specifies the PTP AES67 profile timers. Default 0. Specifies the PTP AES-R16 profile timers. Default 0. Specifies the PTP SMTPE profile timers. Default -3. Sets the delay_req message interval in log seconds.

Usage
n Use this command for end-to-end (E2E) mode and use command ptp pdelay-interval for peer-topeer mode.
n This command is only for boundary clock.
Examples
Setting the PTP 1588v2 profile timers:

switch(config)# interface 1/1/1 switch(config-if)# ptp delay-req-interval 1588v2 2

Removing a PTP 1588v2 profile timer configuration:

PTP commands | 2295

switch(config)# interface 1/1/1 switch(config-if)# no ptp delay-req-interval 1588v2

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10.1000

Command Information

Platforms Command context

6300 (only R8S89A, R8S90A)

config-if

Modification Command introduced on the 6300 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

ptp enable
ptp enable no ptp enable
Description
Enables PTP on the interface. The no form of this command disables PTP on the interface. PTP can be enabled only on physical L2 or L3 interfaces and LAG L2 or L3 interfaces.
Examples
Enabling PTP on a physical interface:
switch(config)# interface 1/1/1 switch(config-if)# ptp enable
Disabling PTP on the interface context:
switch(config)# interface 1/1/1 switch(config-if)# no ptp enable

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2296

Release 10.08

Command Information

Platforms 6300

Command context config-if

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

ptp lag-role
ptp lag-role {primary | secondary} no ptp lag-role
Description
Configures the PTP role for the member interfaces of a Link Aggregation (LAG) . When there are two or more member interfaces for a LAG, only one link can be configured as primary and only one other link can be configured as secondary. The primary member interface is used for transmitting the PTP packets generated by the boundary clock. When the primary member goes down, the secondary member is used for PTP packet transmission. If both primary and secondary members go down, PTP does not flip over to the other links of the LAG. The no form of this command removes the PTP role configuration for the LAG member interface.
This command is not supported when configured as a transparent clock.

Parameter primary secondary

Description Sets the primary PTP lag-role for the LAG member interface. Sets the secondary PTP lag-role for the LAG member interface.

Usage
n LAG roles must be configured for boundary clock. n For the primary or secondary LAG roles, ensure that the same link ports are configured on both ends
of the LAG.
Examples
Setting the primary PTP lag-role for the LAG member interface:

switch(config)# interface 1/1/1 switch(config-if)# ptp lag-role primary

Setting the secondary PTP lag-role for the LAG member interface:

PTP commands | 2297

switch(config)# interface 1/1/2 switch(config-if)# ptp lag-role secondary
Removing the PTP lag-role configuration for the LAG member interface:
switch(config)# interface 1/1/1 switch(config-if)# no ptp lag-role

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10.1000

Command Information

Platforms Command context

6300 (only R8S89A, R8S90A)

config-if

Modification Command introduced on the 6300 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

ptp neighbor-propagation-delay-threshold
ptp neighbor-propagation-delay-threshold <threshold value>
Description
Configures PTP neighbor propagation delay threshold in nanoseconds. The no form of this command removes the PTP neighbor propagation delay threshold configuration.

Parameter <threshold value>

Description
Sets the PTP neighbor propagation delay threshold in nanoseconds. The supported range is 0-2147483648. Default threshold value: 800 nanoseconds.

Examples
Setting the PTP neighbor-propagation-delay-threshold:

switch(config)# interface 1/1/1 switch(config-if)# ptp neighbor-propagation-delay-threshold 200

Removing the PTP neighbor-propagation-delay-threshold:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2298

switch(config)# interface 1/1/1 switch(config-if)# no ptp neighbor-propagation-delay-threshold

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms Command context

6300 (only R8S89A, R8S90A)

config-if

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

ptp pdelay-req-interval
ptp pdelay-req-interval {1588v2| aes67 | aes-r16 | dot1as | smpte} <LOG-SECONDS> no ptp pdelay-req-interval {1588v2| aes67 | aes-r16 | dot1as | smpte}
Description
Sets the pdelay_req message transmit interval on a PTP-enabled interface for a specific PTP profile. The no form of this command removes the pdelay_req message transmit interval configuration on a PTP-enabled interface and sets a profile specific default value.

Parameter 1588v2 aes67 aes-r16 dot1as smpte <LOG-SECONDS>

Description Specifies the PTP 1588v2 profile timers. Default 0. Specifies the PTP AES67 profile timers. Default 0. Specifies the PTP AES-R16 profile timers. Default 0. Specifies the PTP 802.1AS profile timers. Default: 0. Specifies the PTP SMTPE profile timers. Default -3. Sets the delay_req message interval in log seconds.

Usage
n Use this command for peer-to-peer (P2P) mode and use command ptp delay-interval for end-toend (E2E) mode.
Examples

PTP commands | 2299

Setting the PTP 1588v2 profile timers:
switch(config)# interface 1/1/1 switch(config-if)# ptp pdelay-req-interval 1588v2 2
Removing the PTP 1588v2 profile timer configuration:
switch(config)# interface 1/1/1 switch(config-if)# no ptp pdelay-req-interval 1588v2
Setting the PTP AES67 profile timers:
switch(config)# interface 1/1/1 switch(config-if)# ptp pdelay-req-interval aes67 1
Removing the PTP AES67 profile timer configuration:
switch(config)# interface 1/1/1 switch(config-if)# no ptp pdelay-req-interval aes67
Setting the PTP smpte profile timers:
switch(config)# interface 1/1/1 switch(config-if)# ptp pdelay-req-interval smpte 1
Removing the PTP smpte profile timer configuration:
switch(config)# interface 1/1/1 switch(config-if)# no ptp pdelay-req-interval smpte

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13 10.11

Modification Support extended for 802.1AS profile. Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2300

Command Information

Platforms
6300 (only R8S89A, R8S90A)

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

ptp peer ip
ptp peer ip <IP-ADDRESS> no ptp peer ip <IP-ADDRESS>
Description
Configures destination IP addresses for the interfaces in unicast transmission. The no form of this command removes the PTP destination IP address configuration for the interfaces in unicast transmission.

Parameter ip <IP-ADDRESS>

Description Specifies the peer IPv4 address. Syntax: A.B.C.D

Usage
n This command has no effect when configured as a transparent clock.
Example
Configuring ptp peer ip on the interface:

switch(config)# interface 1/1/1 switch(config-if)# ptp peer ip 10.0.0.1

Removing ptp peer ip on the interface:

switch(config-if)# no ptp peer ip 10.0.0.1

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10.1000

Modification Command introduced on the 6300 Switch Series.

PTP commands | 2301

Command Information

Platforms
6300 (only R8S89A, R8S90A)

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

ptp profile
ptp profile {<PROFILE NAME>} no ptp profile
Description
Enters the PTP context to configure the PTP profile in which the device will operate. Configure PTP profile before configuring mode or other profile-specific parameters. The device can be operating in any one profile at a given point of time. The no form of this command removes the PTP profile configuration in which the device will operate. This command clears the PTP profile and all parameters related to that profile.

Parameter <PROFILE NAME>

Description
Specifies the profile to be used. Profiles include: n 1588v2: Specifies the IEEE 1588-2008 profile to be used. n aes-r16: Specifies the IEEE AES-R16-2016 profile to be used. n aes67: Specifies the IEEE AES67 profile to be used. n dot1as: Specifies the IEEE 802.1AS profile to be used. n smpte: Specifies the IEEE SMPTE-ST-2059-2 profile to be used.
NOTE: The 802.1AS (2011) PTP profile specification supports only two-step clock, Ethernet transport, and peer-to-peer delay mechanism. The 802.1AS PTP profile is supported only on following SKUs: JL717C, JL718C, JL719C, JL721C, JL722C, R8S89A, and R8S90A.

Usage
Configure PTP profile before configuring mode or other profile-specific parameters.
Example
Configuring PTP profiles:
switch(config)# ptp profile 1588v2
Configuring PTP profiles:
switch(config)# ptp profile dot1as
Configuring more than one PTP profile:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2302

switch(config)# ptp profile 1588v2 switch(config-ptp)# exit switch(config)# ptp profile smpte switch(config-ptp)# The existing profile must be removed using the 'no ptp profile' command before configuring a different profile.
Configuring Ethernet transport for the 802.1AS PTP profile:
switch(config)# ptp profile dot1as switch(config-ptp)# transport-protocol ethernet
Configuring peer-to-peer delay mechanism for the 802.1AS PTP profile:
switch(config)# ptp profile dot1as switch(config-ptp)# mode boundary peer-to-peer
Configuring two-setp clock for the 802.1AS PTP profile:
switch(config)# ptp profile dot1as switch(config-ptp)# clock-step two-step
Removing the PTP profile:
switch(config-ptp)# no ptp profile

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13 10.08

Command Information

Platforms 6300

Command context config

Modification Support extended for 802.1AS profile. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

ptp sync-interval
ptp sync-interval {1588v2 | dot1as | aes67 | smpte} <LOG-SECONDS> no ptp sync-interval {1588v2 | dot1as | aes67 | smpte} <LOG-SECONDS>

PTP commands | 2303

Description
Sets the sync message transmit interval on a PTP-enabled interface for a specific PTP profile. The no form of this command removes the sync message transmit interval configuration on a PTP enabled interface and sets it to a profile-specific default value.

Parameter 1588v2 dot1as aes67 smpte <LOG-SECONDS>

Description Specifies the PTP 1588v2 profile timers. Default 0. Specifies the PTP 802.1 AS profile timers. Default -3. Specifies the PTP AES67 profile timers. Default -3. Specifies the PTP SMTPE profile timers. Default -3 Sets the sync message interval in log seconds.

Examples
Setting the PTP 802.1 AS sync interval :

switch(config)# interface 1/1/1 switch(config-if)# ptp sync-interval dot1as -2

Setting the PTP 1588v2 sync interval :

switch(config)# interface 1/1/1 switch(config-if)# ptp sync-interval 1588v2 2

Setting the PTP AES67 sync interval :

switch(config)# interface 1/1/1 switch(config-if)# ptp sync-interval aes67 -2

Removing the PTP AES67 sync interval:

switch(config)# interface 1/1/1 switch(config-if)# no ptp sync-interval aes67

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13 10.10.1000

Modification Support extended for 802.1AS profile. Command introduced on the 6300 Switch Series.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2304

Command Information

Platforms
6300 (only R8S89A, R8S90A)

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

ptp sync-timeout
ptp sync-timeout dot1as <COUNT> no ptp sync-timeout dot1as
Description
Sets the synchronization message receipt timeout on a PTP enabled interface. The no form of this command resets the synchronization message receipt timeout configuration on a PTP-enabled interface and sets a profile-specific default value.

Parameter dot1as <LOG-SECONDS>

Description Specifies the PTP 802.1AS profile timers. Default: 3. Specifies the number of announcement intervals.

Examples
Setting the PTP 802.1 AS profile timer:

switch(config)# interface 1/1/1 switch(config-if)# ptp sync-timeout dot1as 4

Resetting the PTP 802.1 AS profile timer:

switch(config)# interface 1/1/1 switch(config-if)# no ptp sync-timeout dot1as

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13

Modification Command introduced.

PTP commands | 2305

Command Information

Platforms
6300 (only R8S89A, R8S90A)

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

ptp vlan
ptp vlan <VLAN-ID> no ptp vlan
Description
Configures a VLAN for PTP messages. It is necessary when the boundary clock port is a VLAN trunk L2 interface (no routing). The no form of this command removes the VLAN configuration for PTP messages.

Parameter <VLAN-ID>

Description Specifies a VLAN. Range: 1-4094.

Usage
n This configuration has no bearing on the one-step transparent clock. n In boundary clock mode, only PTP packets in PTP VLAN are processed; PTP packets from other VLANs
are dropped. n ptp vlan should be configured on interfaces only when the specific VLAN is a trunk/tagged member
of that port. This configuration should not be performed on an access port.
Examples
Configuring a specific VLAN for PTP messages:

switch(config)# interface 1/1/1 switch(config-if)# ptp vlan 4

Removing the VLAN configuration for PTP messages:

switch(config)# interface 1/1/1 switch(config-if)# no ptp vlan

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2306

Release 10.10.1000

Command Information

Platforms Command context

6300 (only R8S89A, R8S90A)

config-if

Modification Command introduced on the 6300 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

show ptp clock
show ptp clock
Description
Shows PTP clock-related information.
Example
Showing PTP transparent clock information:

switch# show ptp clock PTP Profile PTP Mode Delay Mechanism Clock Identity Network Transport Protocol Clock Step Clock Domain Number of PTP Ports Priority1 Priority2 Clock Quality :
Class Accuracy Offset (log variance) Offset From Clock-Source Mean Delay Steps Removed

: smpte : transparent : end-to-end : NA : ipv4 : One : NA :1 : NA : NA
: NA : NA : NA : NA : NA : NA

Showing PTP boundary clock information (boundary clock is available only on the 6300 Switch Series models R8S89A and R8S90A that first released with AOS-CX 10.10.1000):

switch# show ptp clock PTP Profile PTP Mode Delay Mechanism Clock Identity Network Transport Protocol Clock Step Clock Domain Number of PTP Ports Priority1

: aes67 : boundary : end-to-end : 00:fd:45:ff:fe:68:f3:00 : ipv4 : Two :0 :3 : 128

PTP commands | 2307

Priority2
Clock Quality : Class Accuracy Offset (log variance)
Offset From Clock-Source Mean Delay Steps Removed

: 128
: 248 : 49 : 52592
: - 0.000000006 (s) : + 0.000000277 (s) :1

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms 6300

Command context Manager (#)

Modification Command introduced.
Authority Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ptp foreign-clock-sources
show ptp foreign-clock-sources
Description
Shows the priority1, priority2, class, accuracy, offset-scaled-log-variance (OSLV), and steps removed information for foreign clock-source nodes.
Example
Showing PTP foreign clock-source information:

switch(config-if)# show ptp foreign-clock-sources P1=Priority1, P2=Priority2, C=Class, A=Accuracy, OSLV=Offset-scaled-log-variance, SR=Steps-removed

---------- -------------------------------- ------------------------ ---- ---- ---- ---- ------ ---

Interface Foreign Port ID

Clock Source ID

P1 P2 C A OSLV SR

---------- -------------------------------- ------------------------ ---- ---- ---- ---- ------ ---

1/1/4

00:00:00:00:00:00:00:01(0x0001) 00:00:00:00:00:00:00:01 0 0 6 35 0

1

1/1/5

b4:99:ba:ff:fe:54:2b:00(0x0002) 00:00:00:00:00:00:00:01 0 0 6 35 0

2

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2308

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10.1000

Command Information

Platforms Command context

6300 (only R8S89A, R8S90A)

Manager (#)

Modification Command introduced on the 6300 Switch Series.
Authority Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ptp interface
show ptp interface [<IFNAME> profile-data dot1as | [brief]
Description
Shows PTP port-related information.

Parameter <IFNAME> profile-data dot1as brief

Description Specifies the interface name. Shows additional information of the profile. Shows port data specific to the 802.1 AS profile. Shows information in a brief format.

Examples
Showing PTP port information when the switch is acting as a transparent clock:

switch# show ptp interface 1/1/1

Port Identity

: 00:00:00:00:00:00:00:00 (0x0000)

Port Number

:0

PTP Version

:2

PTP Enable

: Enabled

PTP Transport

: ipv4

Port State

: Disabled

Delay Mechanism

: peer-to-peer

Announce Interval (log mean)

:0

Announce Receipt Timeout

:0

Sync Interval (log mean)

:0

Sync Timeout

: NA

Delay Request Interval (log mean)

: NA

Peer Delay Request Interval (log mean) : 0

PTP commands | 2309

Mean Path Delay switch#

: 0 (ns)

switch# show ptp interface lag20

Port Identity

: NA

Port Number

: NA

PTP Version

:2

PTP Enable

: Enabled

Transport of PTP

: ipv4

Port State

: NA

Delay Mechanism

: end-to-end

Announce Interval (log mean)

: NA

Announce Receipt Timeout

: NA

Sync Interval (log mean)

: NA

Sync Timeout

: NA

Delay Request Interval (log mean)

:N

Peer Delay Request Interval (log mean) : 0

Mean Path Delay

: 0 (ns)

switch#

Showing PTP port information when the switch is acting as a boundary clock (boundary clock is available only on the 6300 Switch Series models R8S89A and R8S90A that first released with AOS-CX 10.10.1000):

switch# show ptp interface 1/1/1

Interface : 1/1/1

Port Identity

: 88:3a:30:ff:fe:05:c9:80 (port: 0x0002)

Port Number

:2

PTP Version

:2

PTP Enable

: Enabled

Transport of PTP

: ethernet

Port State

: Clock Source

Delay Mechanism

: end-to-end

Announce Interval (log mean)

:0

Announce Receipt Timeout

:3

Sync Interval (log mean)

: -3

Sync Timeout

: NA

Delay Request Interval (log mean)

:0

Peer Delay Request Interval (log mean) : 0

Mean Path Delay

: 0 (ns)

switch# show ptp interface lag1

Port Identity

: 00:fd:45:ff:fe:68:f3:00 (port: 0x0002)

Port Number

:2

PTP Version

:2

PTP Enable

: Enabled

Transport of PTP

: ipv4

Port State

: Clock Source

Delay Mechanism

: end-to-end

Announce Interval (log mean)

:0

Announce Receipt Timeout

:3

Sync Interval (log mean)

: -3

Sync Timeout

: NA

Delay Request Interval (log mean)

: -3

Peer Delay Request Interval (log mean) : 0

Mean Path Delay

: 0 (ns)

Primary Interface

: 1/1/5

Secondary Interface

: 1/1/6

switch# show ptp interface Interface lag20: Port Identity

: 00:fd:45:ff:fe:68:f3:00 (port: 0x0002)

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2310

Port Number

:2

PTP Version

:2

PTP Enable

: Enabled

Transport of PTP

: ipv4

Port State

: Clock Source

Delay Mechanism

: end-to-end

Announce Interval (log mean)

:0

Announce Receipt Timeout

:3

Sync Interval (log mean)

: -3

Sync Timeout

: NA

Delay Request Interval (log mean)

: -3

Peer Delay Request Interval (log mean) : 0

Mean Path Delay

: 0 (ns)

Primary Interface

: 1/1/5

Secondary Interface

: 1/1/6

Member Interface 1/1/5:

Port Identity

: 00:fd:45:ff:fe:68:f3:00 (port: 0x0002)

Port Number

:2

PTP Version

:2

PTP Enable

: Enabled

Transport of PTP

: ipv4

Port State

: Running

Delay Mechanism

: end-to-end

Announce Interval (log mean)

:0

Announce Receipt Timeout

:3

Sync Interval (log mean)

: -3

Sync Timeout

: NA

Delay Request Interval (log mean)

: -3

Peer Delay Request Interval (log mean) : 0

Mean Path Delay

: 0 (ns)

Member Interface 1/1/6:

Port Identity

: 00:fd:45:ff:fe:68:f3:00 (port: 0x0003)

Port Number

:3

PTP Version

:2

PTP Enable

: Enabled

Transport of PTP

: ipv4

Port State

: Not Running

Delay Mechanism

: end-to-end

Announce Interval (log mean)

:0

Announce Receipt Timeout

:3

Sync Interval (log mean)

: -3

Sync Timeout

: NA

Delay Request Interval (log mean)

: -3

Peer Delay Request Interval (log mean) : 0

Mean Path Delay

: 0 (ns)

Interface 1/1/15:

Port Identity

: 00:fd:45:ff:fe:68:f3:00 (port: 0x0001)

Port Number

:1

PTP Version

:2

PTP Enable

: Enabled

Transport of PTP

: ipv4

Port State

: Clock Sink

Delay Mechanism

: end-to-end

Announce Interval (log mean)

:0

Announce Receipt Timeout

:3

Sync Interval (log mean)

: -3

Sync Timeout

: NA

Delay Request Interval (log mean)

: -3

Peer Delay Request Interval (log mean) : 0

PTP commands | 2311

Mean Path Delay

: 0 (ns)

Showing PTP port information (in brief form) when the switch is acting as a boundary clock (boundary clock is available only on the 6300 Switch Series models R8S89A and R8S90A that first released with AOS-CX 10.10.1000):

switch# show ptp interface brief

Interface

PTP State

--------------------------

1/1/11

Clock Sink

1/1/12

Clock Source

1/1/15

Clock Source

1/1/16

Clock Source

Showing PTP port information of 802.1AS profile:

switch# show ptp int 1/1/1 profile-data dot1as

asCapable

: TRUE

Compute Neighbor RateRatio

: TRUE

Neighbor RateRatio

: 1.2

Compute Neighbor PropDelay

: TRUE

Neighbor Propagation Delay

: 35 ns

PDelay Lost Response Threshold : 3

Lost Response Threshold Exceeded : FALSE

Showing PTP port information in brief format: Showing PTP port information in brief format:

switch# show ptp interface brief

Interface PTP State

--------------------------

1/1/1

Running

1/1/2

Running

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13 10.08

Modification Support extended for 802.1AS profile. Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2312

Command Information

Platforms 6300

Command context Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ptp parent
show ptp parent
Description
Shows parent node information for the PTP device.
Example
Showing PTP parent node information:

switch# show ptp parent PTP Parent Properties

Parent Clock

----------------------------

Parent Clock Identity

: 00:00:00:00:00:00:00:01

Parent Port Number

: 0x0001

Observed Parent Offset (log variance) : 65535

Observed Parent Clock Phase Change Rate: 2147483647

Grandsource Clock ---------------------------Grandsource Clock Identity Grandsource Clock Quality
Class Accuracy Offset (log variance) Priority1 Priority2

: 00:00:00:00:00:00:00:01
:6 : 35 :0 :0 :0

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10.1000

Modification Command introduced on the 6300 Switch Series.

PTP commands | 2313

Command Information

Platforms
6300 (only R8S89A, R8S90A)

Command context Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ptp statistics
show ptp statistics [<IFNAME>]
Description
Shows PTP port statistics.
Parameter <IFNAME>

Description Optional. Specifies the interface name.

Examples
Showing PTP port statistics:

switch# show ptp statistics

PTP Interface Statistics

Received Packets

Interface: 1/1/15

Announce

0

Sync

0

Signaling

0

DelayReq

0

DelayResp

0

FollowUp

0

PdelayReq

81957

PdelayResp

655750

PdelayRespFollowUp

655749

Management

0

Sent Packets
1019 2038
0 0 0 0 655750 81957 81957 0

Discarded Packets
0 0 0 0 0 0 0 0 0 0

Lost Packets
0 0 0 0 0 0 0 0 0 0

Received Packets

Interface: 1/1/16

Announce

0

Sync

0

Signaling

0

DelayReq

0

DelayResp

0

FollowUp

0

PdelayReq

81957

PdelayResp

655750

PdelayRespFollowUp

655749

Management

0

Sent Packets
1019 2038
0 0 0 0 655750 81957 81957 0

Discarded Packets
0 0 0 0 0 0 0 0 0 0

Lost Packets
0 0 0 0 0 0 0 0 0 0

Showing PTP port statistics for the specified interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2314

switch# show ptp statistics 1/1/15

PTP Interface Statistics

Received Packets

Interface: 1/1/15

Announce

0

Sync

0

Signaling

0

DelayReq

0

DelayResp

0

FollowUp

0

PdelayReq

81957

PdelayResp

655750

PdelayRespFollowUp

655749

Management

0

Sent Packets
1024 2048
0 0 0 0 655750 81957 81957 0

Discarded Packets
0 0 0 0 0 0 0 0 0 0

Lost Packets
0 0 0 0 0 0 0 0 0 0

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms 6300

Command context Manager (#)

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

show ptp time-property
show ptp time-property
Description
Shows PTP clock-time properties for the PTP device.

Parameter

Description

Example
Showing PTP clock time properties:

switch # show ptp time-property

PTP Clock Time Property

----------------------------

Current UTC Offset Valid : FALSE

Current UTC Offset

: 37

PTP commands | 2315

Leap59

: FALSE

Leap61

: FALSE

Time Traceable

: FALSE

Frequency Traceable

: FALSE

PTP Timescale

: FALSE

Synchronization Uncertain : FALSE

Time Source

: 160

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10.1000

Command Information

Platforms
6300 (only R8S89A, R8S90A)

Command context Manager (#)

Modification Command introduced on the 6300 Switch Series.
Authority Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show running-config ptp
show running-config ptp
Description
Shows PTP running configuration related information.
Example
Showing PTP running configuration information (boundary clock is available only on the 6300 Switch Series models R8S89A and R8S90A that first released with AOS-CX 10.10.1000):
switch# show running-config ptp ptp profile smpte
enable clock-step two-step transport-protocol ipv4 mode boundary peer-to-peer interface 1/1/15 no shutdown ip address 30.1.1.1/16 ptp enable

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2316

Command History

Release 10.08

Command Information

Platforms 6300

Command context Manager (#)

Modification Command introduced.
Authority Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

transport-protocol
transport-protocol {ethernet | ip} no transport-protocol
Description
Sets the transport protocol for PTP packets. In the case of IPv4, the UDP check-sum is reset. There is no default transport-protocol. The no form of this command disconnects the clock from its source.

Parameter ethernet ip

Description Specifies the Ethernet (Layer 2) transport protocol. Specifies the IPv4 transport protocol.

Usage
Mandatory command to start the PTP clock.
Example
Setting the Ethernet transport protocol for PTP packets:

switch(config-ptp)# transport-protocol ethernet

Removing the transport protocol for PTP packets:

switch(config-ptp)# no transport-protocol

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

PTP commands | 2317

Release 10.14

10.08

Command Information

Platforms 6300

Command context config-ptp

Modification Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2318

Chapter 126 Private VLAN commands

Private VLAN commands

diag-dump private-vlan basic
diag-dump private-vlan basic
Description
Collects the debug information in the case of any issue in the PVLAN feature.
For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.08

Modification
Command introduced for 6200, 6300, 6400, 8100, 8360 Switch series

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

private-vlan
private-vlan {primary | isolated | community} primary-vlan <VLAN-ID> no private-vlan {primary | isolated | community} primary-vlan <VLAN-ID>
Description
Configures a VLAN as either a primary, isolated, or community private VLAN and associates secondary VLANs to a primary VLAN. The no form of this command removes the private VLAN configuration of a VLAN.

Parameter primary

Description Configures the VLAN as PVLAN type primary. NOTE: The number of primary VLANs are restricted to 512

AOS-CX 10.14 Command-Line Interface Guide

2319

Parameter

Description

instances for the Aruba 10000 Switch Series. All other switches that support PVLAN support up to 32 primary VLAN instances.
Up to 8 secondary VLANs can be configured under a primary VLAN for the Aruba 4100i, 6000, and 6100 Switch Series.
Up to 24 secondary VLANs can be configured under a primary VLAN for the Aruba 6200, 6300, 6400, 8325, 8360, and 10000 Switch Series.

isolated community <VLAN-ID>

Configures the VLAN as PVLAN type isolated. Configures the VLAN as PVLAN type community. Specifies the primary VLAN ID to be associated. Range: 2-4094.

Examples
Configuring VLAN 100 as PVLAN type primary

switch(config)# vlan 100 switch(config-vlan-100)# private-vlan primary

Removing the private VLAN configuration from VLAN 100

switch(config)# vlan 100 switch(config-vlan-100)# no private-vlan primary

Associating community VLAN 200 with primary VLAN 100

switch(config)# vlan 200 switch(config-vlan-200)# private-vlan community primary-vlan 100

Removing the association of community VLAN 200 from primary VLAN 100

switch(config)# vlan 200 switch(config-vlan-200)# no private-vlan community primary-vlan 100

Associating isolated VLAN 300 with primary VLAN 100

switch(config)# vlan 300 switch(config-vlan-300)# private-vlan isolated primary-vlan 100

Removing the association of isolated VLAN 300 from primary VLAN 100

switch(config)# vlan 300 switch(config-vlan-300)# no private-vlan isolated primary-vlan 100

Private VLAN commands | 2320

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.08

Modification
Command introduced for 6200, 6300, 6400, 8100, 8360 Switch series

Command Information

Platforms
6300 6400

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

private-vlan port-type
private-vlan port-type {promiscuous | secondary} no private-vlan port-type {promiscuous | secondary}
Description
Configures a port as either promiscuous or secondary when in the interface context. Configures PVLAN port type for a role when in the config-pa-role context. Multiple secondary VLANs associated with the same primary VLAN cannot be tagged under a secondary port. The no form of this command removes the PVLAN port type configuration.
When an interface has been configured as "vlan trunk allowed all" private-vlan port-type cannot be configured.

Parameter promiscuous secondary

Description Configures the port as promiscuous. Configures the port as secondary.

Examples
Configuring interface 1/1/1 as promiscuous:

switch(config)# interface 1/1/1 switch(config-if)# private-vlan port-type promiscuous

Configuring port type as secondary for the port access role:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2321

switch(config)# port-access role Role1 switch(config-pa-role)# private-vlan port-type secondary
Removing the promiscuous configuration from interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no private-vlan port-type promiscuous
Removing port type as secondary for the port access role:
switch(config)# port-access role Role1 switch(config-pa-role)# no private-vlan port-type secondary

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms
6300 6400

Command context
config-if config-pa-role

Modification Command introduced for 6200, 6300, 6400, 8100, 8360 Switch series
Authority Administrators or local user group members with execution rights for this command.

show capacities private-vlan
show capacities private-vlan
Description
Shows the maximum number of primary and secondary VLANs per domain and secondary ports per LC that can be configured.
Examples
For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

Private VLAN commands | 2322

Release 10.08

Modification
Command introduced for 6200, 6300, 6400, 8100, 8360 Switch series

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show capacities-status private-vlan
show capacities-status private-vlan
Description
Shows the number of primary VLANs currently configured and the maximum capacity of primary VLANs on the switch.
Examples
Showing the current capacity status of private-VLAN on the switch

switch# show capacities-status private-vlan

System Capacities Status: Filter Private-VLAN

Capacities Status Name

Value Maximum

---------------------------------------------------------------

Number of Private-VLAN domains currently configured

2

32

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.08

Modification
Command introduced for 6200, 6300, 6400, 8100, 8360 Switch series

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show private-vlan

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2323

show private-vlan [type {<VLAN-ID> | primary | isolated | community}]
Description
Shows the private VLAN configuration for all private VLANs or the private VLAN type specified.

Parameter <VLAN-ID> primary isolated community

Description Specifies a list of VLANs. Range: 2-4094. Shows primary private VLANs. Shows isolated private VLANs. Shows community private VLANs.

Examples
Showing all private VLANs

switch# show private-vlan

---------------------------------------------

Primary Isolated

Community

---------------------------------------------

100

201

-

342

-

1342,3000-3022

343

-

1343

344

-

1344

345

-

1345

Showing private VLANs 100 through 102

switch# show private-vlan type 100-102

-------------------

VLAN

Type

-------------------

100

Primary

101

Isolated

102

Community

Showing all primary VLANs

switch# show private-vlan type primary

-------------------

VLAN

Type

-------------------

100

Primary

200

Primary

300

Primary

400

Primary

500

Primary

600

Primary

605

Primary

700

Primary

705

Primary

Private VLAN commands | 2324

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.08

Modification
Command introduced for 6200, 6300, 6400, 8100, 8360 Switch series

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show private-vlan association
show private-vlan association <VLAN-ID>
Description
Shows primary and secondary VLAN associations for all private VLANs or a specified private VLAN.

Parameter <VLAN-ID>

Description Specifies a list of VLANs. Range: 2-4094.

Examples
Showing all private VLAN associations

switch# show private-vlan association

---------------------------------------------------

Primary Isolated Community

---------------------------------------------------

100

101

102,103

200

201

205,210-214

300

301

-

400

-

405-410,411

500

-

502,504,506-508,510,512,514,

516,518

600

601,603, -

605

700

701,703, 707-709,711,713-715,717-719,

705

721,723-724

Showing private VLAN associations for VLAN 100

switch# show private-vlan association 100

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2325

---------------------------------------------------

Primary Isolated Community

---------------------------------------------------

100

101

102,103

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.08

Modification
Command introduced for 6200, 6300, 6400, 8100, 8360 Switch series

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show private-vlan inconsistency
show private-vlan inconsistency
Description
Shows the list of interfaces and VLANs which are disabled or ignored by private VLAN due to private VLAN configuration and operational inconsistencies.
Possible interface inconsistencies:
n Hardware resource allocation failure n Interface is a member of multiple secondary VLANs in the same domain n Interface is a member of both primary and secondary VLAN n Interface of private vlan port-type promiscuous is not allowed to join secondary VLAN n Protocol VLANs and private VLANs are mutually exclusive features n Interface of private vlan port-type secondary is not allowed to join the primary VLAN n Interface has reached the private-vlan port limit of 24 ports n Interface is a member of a secondary VLAN which has an SVI configured on it n Interface trunk-allowed-all configuration is not allowed on promiscuous or secondary private-vlan
port-type n VSX ISL configuration is not allowed on private-vlan ports
Possible VLAN inconsistencies:

Private VLAN commands | 2326

n Default VLAN is not allowed to join private-vlan domain n ERPS instances must match for all VLANs in a private-VLAN domain n VLAN has invalid or no private-vlan primary VLAN association n MSTP instances must match for all VLANs in a private-VLAN domain n MVRP and private-VLAN are mutually exclusive features n VLAN has no primary associated VLAN n VLAN has reached the private VLAN limit of 32 primary VLANs for the Aruba 4100i, 6000, 6100, 6200,
6300, 6400, 8325, and 8360 Switch Series. (The private VLAN limit is 512 on the Aruba 10000 Switch Series). n RPVST and private VLAN are mutually exclusive features n VLAN has reached the private VLAN limit of 24 secondary VLANs on the Aruba 6200, 6300, 6400, 8325, 8360, and 10000 Switch Series or 8 secondary VLANs on the Aruba 4100i, 6000, or 6100 Switch Series. n Smartlink groups must match for all VLANs in a private-VLAN domain n VLAN translation and private-VLAN are mutually exclusive features n VLAN is a secondary VLAN with SVI configured n Primary VLAN's IGMP snooping configuration is applied n Primary VLAN's MLD snooping configuration is applied n Primary VLAN's ND snooping configuration is applied n Primary VLAN's DHCPV4 snooping configuration is applied n Primary VLAN's DHCPV6 snooping configuration is applied n Primary VLAN's CIPT configuration is applied
Examples
Showing interfaces which have been disabled due to private VLAN inconsistencies. In the example below vlan101, vlan201, and vlan301 are secondary VLANs:

switch# show private-vlan inconsistency

------------------------------------------------------------------------

Interface/VLAN Action Inconsistency-Reason

------------------------------------------------------------------------

1/1/1

Down

Interface is a member of multiple secondary VLANs

1/2/5

Down

Interface is a member of both primary and secondary

VLAN

vlan20

Down

VLAN has invalid or no private-vlan primary VLAN

association

vlan101

Ignore Primary VLAN's IGMP snooping config is applied.

vlan201

Ignore Primary VLAN's ND snooping config is applied.

vlan301

Ignore Primary VLAN's DHCPV4 snooping config is applied.

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2327

Release 10.08

Modification
Command introduced for 6200, 6300, 6400, 8100, 8360 Switch series

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show private-vlan port-type
show private-vlan port-type
Description
Shows all the private VLAN port type configurations.
Examples
Showing the ports with private-vlan port-type configuration

switch# show private-vlan port-type

---------------------------------------------------

Port

Port Type

--------------------------------------------------

1/1/1

promiscuous

1/1/2

secondary

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.08

Modification
Command introduced for 6200, 6300, 6400, 8100, 8360 Switch series

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-configuration private-vlan

Private VLAN commands | 2328

show running-configuration private-vlan
Description
Shows all private VLAN configurations on the switch.
Examples
Showing the current private VLAN configuration
switch# show running-configuration private-vlan vlan 300 private-vlan type primary vlan 100 private-vlan type isolated primary-vlan 300 vlan 200 private-vlan type community primary-vlan 300 interface 1/1/1 vlan trunk allowed 300 private-vlan port-type promiscuous interface 1/1/2 vlan trunk allowed 100 private-vlan port-type secondary interface 1/1/3 vlan trunk allowed 200 private-vlan port-type secondary `````

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.08

Modification
Command introduced for 6200, 6300, 6400, 8100, 8360 Switch series

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show tech private-vlan
show tech private-vlan
Description
Shows the output of show tech for the private-VLAN feature.
Example

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2329

Showing the output of show tech for private-VLAN

switch# show tech private-vlan

====================================================

Show Tech executed on Mon Sep 28 06:05:02 2020

====================================================

====================================================

[Begin] Feature private-vlan

====================================================

*********************************

Command : show running-config private-vlan

*********************************

vlan 100

private-vlan primary

vlan 101

private-vlan isolated primary-vlan 100

vlan 102

private-vlan community primary-vlan 100

vlan 200

private-vlan primary

vlan 201

private-vlan community primary-vlan 200

interface 1/1/1

vlan access 1

private-vlan promiscuous

interface 1/1/2

vlan access 1

private-vlan secondary

*********************************

Command : show private-vlan type

*********************************

--------------------

VLAN

Type

--------------------

100

primary

101

isolated

102

community

200

primary

201

community

*********************************

Command : show private-vlan association

*********************************

---------------------------------------------

Primary Isolated

Community

---------------------------------------------

100

101

102

200

-

201

*********************************

Command : show private-vlan port-type

*********************************

----------------------

Port

Port-type

----------------------

1/1/1

promiscuous

1/1/2

secondary

====================================================

[End] Feature private-vlan

====================================================

====================================================

Private VLAN commands | 2330

Show Tech commands executed successfully ====================================================

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.08

Modification
Command introduced for 6200, 6300, 6400, 8100, 8360 Switch series

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

system private-vlan share-hw-resource
system private-vlan share-hw-resource no system private-vlan share-hw-resource
Description
Enables hardware resource sharing for private VLAN (PVLAN) secondary ports and enables you to configure additional secondary ports beyond the capacity limit. There are no parameters for this command. The no form of this command turns off the hardware resource sharing mode for PVLAN.
Examples
Configure PVLAN default mode :
switch(config)# system private-vlan share-hw-resource
Unconfigure PVLAN default mode:
switch(config)# no system private-vlan share-hw-resource

This command will be available only on the platforms which had a limit of 24 PVLAN secondary ports in the legacy mode. For more information on features that use this command, refer to the Private VLAN topic in Layer 2 Bridging Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2331

Release 10.14

Command Information

Platforms
6300 6400

Command context
config-if config-pa-role

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

Private VLAN commands | 2332

Chapter 127 QoS commands

QoS commands
apply qos
apply qos [queue-profile <QUEUE-NAME>] schedule-profile <SCHEDULE-NAME> no apply qos [queue-profile <QUEUE-NAME>] schedule-profile <SCHEDULE-NAME>
Description
Applies a queue profile and schedule profile globally to all Ethernet and LAG interfaces on the switch, or applies a schedule profile to a specific interface. When applied globally, the specified schedule profile is configured only on Ethernet interfaces and LAGs that do not already have their own schedule profile. The same profile can be applied both globally and locally to an interface. This guarantees that an interface always uses the specified profile, even if the global profile is changed. The no form of this command removes the specified schedule profile from an interface and the interface uses the global schedule profile. This is the only way to remove a schedule profile override from the interface.
Interfaces may shut down briefly during reconfiguration.

Parameter queue-profile <QUEUE-NAME>
schedule-profile <SCHEDULE-NAME>

Description
Specifies the name of the queue profile to apply. Range: 1 to 64 alphanumeric characters, including period (.), underscore (_), and hyphen (-). This parameter is not supported in the config-if context.
Specifies the name of the schedule profile to apply. Range: 1 to 64 alphanumeric characters, including period (.), underscore (_), and hyphen (-).

Usage
n The switch must always have a globally-applied queue and schedule profile. To stop using a given profile, apply a different profile.
n For a queue profile to be complete and ready to be applied, all eight local priorities must be mapped to a queue.
n For a schedule profile to be complete and ready to be applied, it must define all queues specified in the queue profile. All queues must use the same algorithm, except for the highest numbered queue, which can be strict.
n Both the queue profile and the schedule profile must specify the same number of queues. n Schedule profiles can be modified while applied, but only in ways where a single command will not
result in the profile becoming invalid. For example, queue 7 can have the algorithm changed, and weighted queues can have their weights changed.

AOS-CX 10.14 Command-Line Interface Guide

2333

n Queues must be consecutively defined starting at queue number zero. For example, a four-queue profile with priority values defined for queues 0, 1, 2, 3 is valid, but a four-queue profile which defines priority values for queues 1, 3, 5, and 7 is not.
If the number of queues was changed from the previous queue profile to the new one, any Ethernet or LAG interfaces with locally applied schedule profiles will program the newly applied global scheduleprofile. The show running-config interface command will list the existing apply qos schedule-profile command with a comment describing the actual profile applied:
apply qos schedule-profile Old_Schedule !actual schedule-profile New_Schedule
Examples
The following commands illustrate a valid configuration where every local priority value is assigned to a queue and all assigned queues are defined:
switch(config)# qos cos-map 1 local-priority 1 switch(config)# qos queue-profile Q1 switch(config)# map queue 0 local-priority 0 switch(config)# map queue 1 local-priority 1 switch(config)# map queue 2 local-priority 2 switch(config)# map queue 3 local-priority 3 switch(config)# map queue 4 local-priority 4 switch(config)# map queue 5 local-priority 5 switch(config)# map queue 6 local-priority 6 switch(config)# map queue 7 local-priority 7 switch(config)# qos schedule-profile S1 switch(config)# dwrr queue 0 weight 5 switch(config)# dwrr queue 1 weight 10 switch(config)# dwrr queue 2 weight 15 switch(config)# dwrr queue 3 weight 20 switch(config)# dwrr queue 4 weight 25 switch(config)# dwrr queue 5 weight 50
The following commands illustrate an invalid configuration because local priority 2 is not assigned to a queue:
switch(config)# qos cos-map 1 local-priority 1 switch(config)# qos queue-profile Q1 switch(config)# map queue 0 local-priority 0 switch(config)# map queue 1 local-priority 1 switch(config)# map queue 3 local-priority 3 switch(config)# map queue 4 local-priority 4 switch(config)# map queue 5 local-priority 5 switch(config)# map queue 5 local-priority 6 switch(config)# map queue 5 local-priority 7 switch(config)# qos schedule-profile S1 switch(config)# dwrr queue 0 weight 5 switch(config)# dwrr queue 1 weight 10 switch(config)# dwrr queue 3 weight 15 switch(config)# dwrr queue 4 weight 25 switch(config)# dwrr queue 5 weight 50
Applying the QoS profile Q1 and the schedule profile S1 to all interfaces that do not have an applied interface-specific schedule profile:
QoS commands | 2334

switch(config)# apply qos queue-profile Q1 schedule-profile S1

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config config-if config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

dwrr queue
dwrr queue <QUEUE-NUMBER> [weight <WEIGHT>] no dwrr queue <QUEUE-NUMBER>
Description
Assigns the deficit weighted round robin (DWRR) algorithm and its weight to a queue in a schedule profile. DWRR allocates available bandwidth among all non-empty queues in relation to the queue weights. Use show qos schedule-profile <NAME> to view the settings of a specific schedule profile. The no form of this command removes the DWRR algorithm from a queue in a schedule profile.

Parameter <QUEUE-NUMBER> weight <WEIGHT>

Description Specifies the queue number. Range: 0 to 7. Specifies the scheduling weight. Range: 1 to 1023.

Examples
Assigning DWRR with a weight of 17 to queue 2 in the schedule profile MySchedule:

switch(config)# qos schedule-profile MySchedule switch(config-schedule)# dwrr queue 2 weight 17

Deleting DWRR for queue 2 from the schedule profile MySchedule:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2335

switch(config)# qos schedule-profile MySchedule switch(config-schedule)# no dwrr queue 2

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-schedule-<NAME>

Authority
Administrators or local user group members with execution rights for this command.

map queue
map queue <QUEUE-NUMBER> local-priority <PRIORITY-NUMBER>
Description
Assigns a local priority to a queue in a queue profile. By default, the larger the queue number the higher its priority. A queue without a local priority value assigned to it is not used to store packets. The same queue can be assigned multiple local priorities. The no form of this command removes the specified local priority from a specific queue. If no local priority number is specified, then all local priorities are removed from the queue.

Parameter <QUEUE-NUMBER> <PRIORITY-NUMBER>

Description
Specifies the queue number. Range: 0 to 7.
Specifies the local priority. Range: 0 to 7, where 0 is the lowest priority and 7 is the highest.

Usage
The following commands illustrate a valid configuration, where every local priority value is assigned to a queue:

map queue 0 local-priority 0 map queue 1 local-priority 1 map queue 1 local-priority 2 map queue 3 local-priority 3 map queue 4 local-priority 4 map queue 5 local-priority 5 map queue 5 local-priority 6

QoS commands | 2336

map queue 5 local-priority 7
The following commands illustrate an invalid configuration, because local priority 2 is not assigned to a queue:
map queue 0 local-priority 0 map queue 1 local-priority 1 map queue 2 local-priority 3 map queue 3 local-priority 4 map queue 4 local-priority 5 map queue 5 local-priority 6 map queue 5 local-priority 7
Examples
Assigning priority 7 to queue 7 in profile myprofile:
switch(config)# qos queue-profile myprofile switch(config-queue)# map queue 7 local-priority 7
Removing priority 7 from queue 7 in profile myprofile:
switch(config)# qos queue-profile myprofile switch(config-queue)# no map queue 7 local-priority 7

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-queue

Modification --
Authority Administrators or local user group members with execution rights for this command.

min-bandwidth
The min-bandwidth command only applies to Aruba 6200 and 6300 Series Switches.
min-bandwidth queue <QUEUE-NUMBER> percent <PERCENTAGE> [max-bandwidth <RATE> {kbps|percent}] no min-bandwidth queue <QUEUE-NUMBER> percent <PERCENTAGE> [max-bandwidth <RATE> {kbps|percent}]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2337

Description
Assigns the Guaranteed Minimum Bandwidth (GMB) algorithm and a percentage of bandwidth to a queue. GMB allocates available bandwidth among all non-empty queues in relation to their configured minimum bandwidth. Non-empty queues are serviced first in strict order up to their minimum bandwidth. If there is any remaining bandwidth, the scheduler will strictly service any remaining nonempty queues. Egress queue shaping can be configured using the max-bandwidth option to limit the amount of traffic transmitted per output queue at all times, even when there is leftover bandwidth available on the port. The buffer associated with each egress queue stores the excess traffic to smooth the output rate. Sustained rates of traffic above the maximum bandwidth will eventually fill the output queue, causing tail drops. Use show interface <IF-NAME> queues to determine if any tail-drop errors have occurred. To remove only egress queue shaping, re-enter the min-bandwidth queue command without the max-bandwidth parameter. The no form of this command only clears the algorithm for a queue if GMB has been assigned. Occasionally, the following errors may occur:
n *The schedule profile total sum of GMB percentages must not exceed 100.* This error occurs when attempting to apply a schedule profile with sum of GMB percentages of queues exceed 100 percentage. The solution is to configure GMB perecntage for queues, so that the sum of percentage must not exceed 100.
n *The max-bandwidth cannot be greater than 100 percent.* This error occurs when a max-bandwidth value greater than 100 percent is configured on a queue.
n *The max-bandwidth cannot be less than <NUM> kbps.* This error occurs when a kbps max-bandwidth value less than the supported minimum kbps shape value is configured on a queue. The supported minimum kbps shape value can be retrieved using the show capacities command.

Parameter <QUEUE-NUMBER> <PERCENTAGE>
max-bandwidth <RATE>

Description
Specifies the queue number. Range: 0 to 7.
Specifies bandwidth percentage used for GMB scheduling. Range: 0 to 100.
Specifies the maximum bandwidth rate allowed on the queue in Kbps. Range: 64 to 100000000. Alternatively, the maximum bandwidth rate can be configured on the queue as a percentage of the port shape or link bandwidth if a port shape is not configured. The allowed range is 1-100.

Examples
Assigning queue 0 of schedule profile S1 the GMB scheduling algorithm with minimum bandwidth of 5 percent:

switch(config)# qos schedule-profile S1 switch(config-schedule)# min-bandwidth queue 0 percent 5

Removing GMB from queue 0:

QoS commands | 2338

switch(config)# qos schedule-profile s1 switch(config-schedule)# no min-bandwidth queue 0

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.13 10.07 or earlier

Modification Added max-bandwidth parameter. --

Command Information

Platforms
6300 6400

Command context config-schedule-<NAME>

Authority
Administrators or local user group members with execution rights for this command.

name queue
name queue <QUEUE-NUMBER> <DESCRIPTION> no name queue <QUEUE-NUMBER>
Description
Assigns a description to a queue in a queue profile. This is for identification purposes and has no effect on configuration. The no form of this command removes the description associated with a queue.

Parameter <QUEUE-NUMBER> <DESCRIPTION>

Description
Specifies the queue number. Range: 0 to 7.
Specifies a queue description for identification purposes. Range: 1 to 64 alphanumeric characters, including period (.), underscore (_), and hyphen (-).

Examples
Assigning the description priority-traffic to queue 7:

switch(config)# qos queue-profile myprofile switch(config-queue)# name queue 7 priority-traffic

Removing the description from queue 7:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2339

switch(config)# qos queue-profile myprofile switch(config-queue)# no name queue 7

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-queue

Modification --
Authority Administrators or local user group members with execution rights for this command.

qos cos
qos cos <CODE-POINT> no qos cos
Description
Configures a CoS PCP remark for an Ethernet or LAG interface. Packets that ingress on the interface are remarked at egress using the configured CoS PCP value. The remark only occurs when QoS trust mode on the interface is set to none. If QoS trust mode is not set to none, then the remark is ignored, and the following commands will show the CoS remark status as ignored (incompatible Port Access Trust configuration) or not applied' (incompatible QoS global/port Trust configuration):
n show running-configuration n show interface <PORT-NUM> n show interface <PORT-NUM> qos
The no form of this command removes a CoS remark on an interface.

Parameter <CODE-POINT>

Description Specifies an 802.1 VLAN priority CoS value. Range: 0 to 7.

Examples
On the 6400 Switch Series, interface identification differs. Configuring a CoS remark of 3 on interface 1/1/1:

QoS commands | 2340

switch(config)# interface 1/1/1 switch(config-if)# qos trust none switch(config-if)# qos cos 3
Deleting a CoS remark of 3 on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no qos cos

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

qos cos-map
qos cos-map <CODE-POINT> local-priority <PRIORITY-NUMBER> [color <COLOR>] [name <DESCRIPTION>] no qos cos-map <CODE-POINT>
Description
Defines the local priority assigned to incoming packets for a specific 802.1 VLAN priority code point (CoS) value. The CoS map values are used to mark incoming packets when QoS trust mode is set to cos. In trust none mode, CoS map entry 0 is used to set the port default local priority and color. To see the default CoS map settings, use the following command:

switch# show qos cos-map default

code_point local_priority color name

---------- -------------- ------- ----

0

1

green Best_Effort

1

0

green Background

2

2

green Excellent_Effort

3

3

green Critical_Applications

4

4

green Video

5

5

green Voice

6

6

green Internetwork_Control

7

7

green Network_Control

The no form of this command restores the assignments for a CoS map value to the default setting.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2341

Parameter <CODE-POINT>
local-priority <PRIORITY-NUMBER>
color <COLOR> name <DESCRIPTION>

Description
Specifies an 802.1 VLAN priority CoS value. Range: 0 to 7. Default 0.
Specifies a local priority value to associate with the CODE-POINT value. Range: 0 to 7. Default: 0.
Reserved for future use.
Specifies a description for the CoS setting. The name is for identification only, and has no effect on queue configuration. Range: 1 to 64 alphanumeric characters, including period (.), underscore (_), and hyphen (-).

Usage Examples
Mapping CoS value 1 to a local priority of 2:

switch(config)# qos cos-map 1 local-priority 2

Mapping CoS value 1 to the default local priority value:

switch(config)# no qos cos-map 1

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

qos dscp
qos dscp <CODE-POINT> no qos dscp
Description

QoS commands | 2342

Configures a differentiated services code point (DSCP) remark for an Ethernet or LAG interface. IPV4 and IPV6 packets that ingress on the interface are remarked at egress using the configured DSCP value. The remark only occurs when QoS trust mode on the interface is set to none. If a DSCP remark is configured and then trust mode is subsequently set to cos or dscp, then the DSCP remark is ignored. The following commands will show the remark status as ignored (incompatible Port Access Trust configuration) or not applied (incompatible QoS global or port trust configuration):
n show running-configuration n show interface <INTERFACE-NAME> n show interface <INTERFACE-NAME> qos
The no form of this command removes a CoS remark on an interface.

Parameter <CODE-POINT>

Description
Specifies an IP differentiated services code point value. Range: 0 to 63.

Usage
Order of operation for arriving IPv4 or IPv6 packets:
1. Trust none is applied with initial local-priority and color metadata assigned from the CoS Map entry index 0.
2. The local-priority value and the queue profile are then used to determine the queue for the packet.
3. The remark of the packet's DSCP metadata field is performed. When the packet is transmitted, its IPv4 or IPv6 DS header is remarked with the DSCP metadata.
For arriving non-IP packets: Trust none is applied with initial local-priority and color metadata assigned from the CoS Map entry index 0. This selects the queue for packet scheduling. The PCP of any tagged non-IP packets is unchanged.
Examples
On the 6400 Switch Series, interface identification differs. Configuring a DSCP remark of 43 on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# qos trust none switch(config-if)# qos dscp 43

Deleting a DSCP remark of 43 on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# no dscp 43

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2343

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

qos dscp-map
qos dscp-map <CODE-POINT> local-priority <PRIORITY-NUMBER> [color <COLOR>] [cos <PCPVALUE>] [name <DESCRIPTION>] no qos dscp-map <CODE-POINT>
Description
Defines the local priority color assigned to incoming packets for a specific IP differentiated services code point (DSCP) value. The DSCP map values are used to prioritize incoming packets when QoS trust mode is set to dscp. The no form of this command restores the assignments for a code point to the default setting. Use show qos dscp-map to view the current settings. To see the default DSCP map settings, use the following command:

switch# show qos dscp-map default

code_point local_priority cos color name

---------- -------------- --- ------- ----

0

1

green CS0

1

1

green

2

1

green

3

1

green

4

1

green

5

1

green

...

45

5

green

46

5

green EF

47

5

green

48

6

green CS6

...

61

7

green

62

7

green

63

7

green

Parameter <CODE-POINT>
local-priority <PRIORITY-NUMBER>

Description
Specifies an IP differentiated services code point. Range: 0 to 63. Default: 0.
Specifies a local priority value to associate with the CODE-POINT value. Range: 0 to 7. Default: 0.

QoS commands | 2344

Parameter color <COLOR> cos <PCP-VALUE> name <DESCRIPTION>

Description
Configures the QoS CoS map color. The supported colors are green, red, and yellow. The default color is green.
Specifies an optional 802.1p VLAN Priority Code Point remark value. Range: 0 to 7. Default: No remark.
Specifies a description for the DSCP setting. The name is used for identification only, and has no effect on queue configuration. Range: 1 to 64 alphanumeric characters, including period (.), underscore (_), and hyphen (-).

Examples
Setting code point 1 to a local priority of 2 and a CoS of 0:

switch(config)# qos dscp-map 1 local-priority 2 cos 0

Setting code point 1 to the default value:

switch(config)# no qos dscp-map 1

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.13 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Added <COLOR> parameters. --
Authority Administrators or local user group members with execution rights for this command.

qos queue-profile
qos queue-profile <NAME> no qos queue-profile <NAME>
Description
Creates a new QoS queue profile and switches to the config-queue context for the profile. Or, if the specified QoS queue profile exists, this command switches to the config-queue context for the profile.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2345

A queue profile maps queues to local-priority values. Each profile has one to eight queues numbered 0 to 7. The larger the queue number, the higher its priority during transmission scheduling.
The no form of this command removes the specified QoS queue profile. Only profiles that are not currently applied can be removed.

Parameter <NAME>

Description
Specifies the name of the QoS queue profile to create or configure. Range: 1 to 64 alphanumeric characters, including period (.), underscore (_), and hyphen (-).

Examples
Creating the profile myprofile:

switch(config)# qos queue-profile myprofile switch(config-queue)#

Deleting the profile myprofile:

switch(config)# no qos queue-profile myprofile

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

qos schedule-profile
qos schedule-profile <NAME> no qos schedule-profile <NAME>
Description
Creates a QoS schedule profile and switches to the config-schedule context for the profile. If the specified schedule profile exists, this command switches to the config-schedule context for the profile. The schedule profile determines the order in which queues are selected to transmit a packet, and the amount of service defined for each queue.

QoS commands | 2346

Parameter <NAME>

Description
Specifies the name of the QoS queue profile to create or configure. Range: 1 to 64 alphanumeric characters, including period (.), underscore (_), and hyphen (-).

Usage
Queues in a schedule profile are numbered consecutively starting from zero. Queue zero is the lowest priority queue. The larger the queue number, the higher priority the queue has in scheduling algorithms.
A profile named factory-default is defined by default and applied to all interfaces. It cannot be edited or deleted. To see its settings, use the command:

switch# show qos schedule-profile factory-default

queue_num algorithm weight

--------- --------- ------

0

dwrr

1

1

dwrr

1

2

dwrr

1

3

dwrr

1

4

dwrr

1

5

dwrr

1

6

dwrr

1

7

dwrr

1

A profile named strict is predefined and cannot be edited or deleted. The strict profile services all queues of the queue profile to which it is applied, using the strict priority algorithm. A schedule profile must be defined on all interfaces at all times. There are two permitted configurations for a schedule profile:
1. All queues use the same scheduling algorithm (for example, DWRR). 2. The highest queue number uses strict priority, and all remaining (lower) queues use the same
algorithm (for example, DWRR). This supports priority scheduling behavior necessary for the IETF RFC 3246 Expedited Forwarding specification (https://tools.ietf.org/html/rfc3246).
Only limited changes can be made to an applied schedule profile:
n The weight of a dwrr queue. n The bandwidth of a strict queue or a min-bandwidth queue. n The algorithm of the highest numbered queue can be swapped between dwrr and strict, and vice
versa.
Applicable to REST: Any other changes will result in an unusable schedule profile, and the switch will revert to the factory-default profile until the profile is corrected. The no form of this command removes the specified QoS schedule profile when it is not applied. Only profiles that are not currently applied to an interface can be removed.
Examples
Creating the schedule profile MySchedule:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2347

switch(config)# qos schedule-profile MySchedule switch(config-schedule)#
Deleting the schedule profile MySchedule:
switch(config)# no qos schedule-profile MySchedule

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

qos shape
qos shape <RATE> [kbps|percent] no qos shape
Description
Limits the egress bandwidth on an interface to a value that is lower than its line rate. Errors will be generated in the following events:
n A user configures a port-shaping value that is greater than 100 percent n A user configures a kbps port-shaping value that is less than the supported minimum kbps value.
The supported minimum kbps shaping value can be retrieved using the show capacities command.
The no form of this command removes shaping from an interface.

Parameter <RATE>

Description
Specifies the maximum traffic rate in kbps. Range: 1 to 100000000. Alternatively, the bandwidth can also be configured as a percentage of link bandwidth. The supported range is 1-100. Default units are kilobits per second.

Usage
When the traffic rate destined for the port exceeds the configured egress bandwidth, the switch will buffer the excess up to the limit of the queues. Rates larger than the interface's link rate will have no

QoS commands | 2348

effect. When set on a LAG, each member Ethernet port independently shapes its egress bandwidth to the specified rate.
Examples
On the 6400 Switch Series, interface identification differs. Configuring an egress port shaping rate of 400 Mbps on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# qos shape 400000 kbps
Configuring an egress port-shaping rate of 40% on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# qos shape 40 percent
Deleting egress port shaping on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no qos shape

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.13 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification Added optional kbps and percent parameters. --
Authority Administrators or local user group members with execution rights for this command.

qos trust
qos trust {none|cos|dscp} no qos trust
Description
In the config context:
n This command sets the trust mode that is globally applied to all interfaces that do not have a trust mode configured.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2349

n The no form of this command restores all interfaces that do not currently have a trust mode configured to the default setting.
In the config-if context:
n This command sets the trust mode override for a specific interface. n The no form of this command clears a trust mode override. The interface then uses the global
setting. This is the only way to remove a trust mode override.

Parameter none cos
dscp

Description
Ignores all packet headers. Ingress packets are assigned the local priority and color values configured for CoS map entry 0. Default.
For 802.1 VLAN tagged packets, use the priority code point field from the outermost VLAN header as the index into the CoS map to obtain the local priority and color values for the packet. If the packet is untagged, use the local priority and color values configured for CoS map entry 0.
For IP packets, use the DSCP field from the IP header as the index into the DSCP Map. For non-IP packets with 802.1 VLAN tags, use the priority code point field from the outermost VLAN header as the index into the CoS map to obtain the local priority and color values for the packet. For untagged, non-IP packets, use the local priority and color values configured for CoS map entry 0.

Example
Setting the global trust mode to dscp, which is applied to all interfaces that do not already have an individual trust mode configured. An override is then applied to interface 2/2/2, and LAG 100, setting trust mode to cos:

switch(config)# qos trust dscp switch(config)# interface 2/2/2 switch(config-if)# qos trust cos switch(config-if)# interface lag 100 switch(config-if)# qos trust cos

WARNING: QoS port remark configurations are not applied when the QoS trust mode is mode. This warning message is seen if a port trust command other than trust none is attempted when there is already a remark configuration on the port. To restore the old remark configuration, configure the port trust mode to none.

WARNING: QoS port remark configurations are not applied when the global QoS trust mode is mode. This warning message is seen if a port no qos trust command is attempted when there is already a remark configuration on the port and the global trust mode is not none. To re-apply the remark configuration, set the port trust mode to none.

QoS commands | 2350

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config config-if config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

queue action
WRED
6200, 6300, 6400v1 Switch Series queue <0-7> action wred-resp { green | yellow | red } min-threshold <WRED-MIN-LIMIT> percent max-threshold <WRED-MAX-LIMIT> percent queue <0-7> action wred-non-resp { green | yellow | red } min-threshold <WRED-MIN-LIMIT> percent max-threshold <WRED-MAX-LIMIT> percent 6400v2 Switch Series queue <0-7> action wred-resp { green | yellow | red } min-threshold <WRED-MIN-LIMIT> percent max-threshold <WRED-MAX-LIMIT> percent max-prob <WRED-MAX-PROB> percent queue <0-7> action wred-non-resp { green | yellow | red } min-threshold <WRED-MIN-LIMIT> percent max-threshold <WRED-MAX-LIMIT> percent max-prob <WRED-MAX-PROB> percent
Description
Defines the threshold settings and action for a specified queue in a threshold-profile. For ECN, when queue utilization exceeds the threshold value, ECT (ECN-Capable Transport) packets will be CE (Congestion Encountered) marked when transmitted. For WRED, when queue utilization exceeds the threshold value, WRED action will randomly early-drop packets to signal congestion. More than one WRED action can be configured on a single queue for different packet colors. The no form of this command removes the settings for a queue.

Parameter <0-7>

Description Specifies the queue number. Range: 0 to 7.

<WRED-MIN-LIMIT> <WRED-MAX-LIMIT>

Specifies the queue minimum utilization threshold value for WRED to probabilistically start dropping packets.
Specifies the queue maximum utilization threshold value for

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2351

Parameter <WRED-MAX-PROB>

Description
WRED, after which every packet is dropped.
Specifies the maximum WRED probability of dropping a packet for the specified queue.
NOTE: Applicable only on the 6400v2, 8100, 8360v2, 8320, 8325, 8400, 9300, and 10000 Switch Series.

Examples
Configuring a responsive WRED action on queue 2 for red-, yellow-, and green-colored packets: Applicable only on the 6200, 6300, and 6400v1 Switch Series
switch(config)# qos threshold-profile threshprofile switch(config-threshold)# queue 2 action wred-resp green min-threshold 70 percent max-threshold 100 percent switch(config-threshold)# queue 2 action wred-resp yellow min-threshold 60 percent max-threshold 95 percent switch(config-threshold)# queue 2 action wred-resp red min-threshold 50 percent max-threshold 80 percent
Applicable only on the 6400v2 Switch Series
switch(config)# qos threshold-profile threshprofile switch(config-threshold)# queue 2 action wred-resp green min-threshold 70 percent max-threshold 100 percent max-prob 70 percent switch(config-threshold)# queue 2 action wred-resp yellow min-threshold 60 percent max-threshold 95 percent max-prob 85 percent switch(config-threshold)# queue 2 action wred-resp red min-threshold 50 percent max-threshold 80 percent max-prob 90 percent
Configuring a non-responsive WRED action on queue 4 for red-, yellow-, and green-colored packets: Applicable only on the 6200, 6300, and 6400v1 Switch Series
switch(config)# qos threshold-profile threshprofile switch(config-threshold)# queue 4 action wred-non-resp green min-threshold 70 percent max-threshold 100 percent switch(config-threshold)# queue 4 action wred-non-resp yellow min-threshold 65 percent max-threshold 95 percent switch(config-threshold)# queue 4 action wred-non-resp red min-threshold 50 percent max-threshold 80 percent
Applicable only on the 6400v2 Switch Series
switch(config)# qos threshold-profile threshprofile switch(config-threshold)# queue 4 action wred-non-resp green min-threshold 70 percent max-threshold 100 percent max-prob 71 percent switch(config-threshold)# queue 4 action wred-non-resp yellow min-threshold 65 percent max-threshold 95 percent max-prob 82 percent switch(config-threshold)# queue 4 action wred-non-resp red min-threshold 50 percent max-threshold 80 percent max-prob 95 percent
Removing a threshold from queue 7 in profile mythreshold:

QoS commands | 2352

switch(config)# qos threshold-profile mythreshold switch(config-threshold)# no queue 7

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-threshold

Modification --
Authority Administrators or local user group members with execution rights for this command.

rate-limit
rate-limit {broadcast|multicast|unknown-unicast|icmp {ip-all|ip|ipv6}} <RATE> {kbps|percent|pps} no rate-limit {broadcast|multicast|icmp}
Description
Sets the amount of traffic of a specific type that can ingress on an Ethernet interface, or on each port of a LAG interface. Rate limits are enforced separately on each individual member of a LAG, not on the LAG as a whole. The no form of this command removes the traffic limit for the specified traffic type.

Parameter {broadcast|multicast|unknown-unicast|icmp {ip-all|ip|ipv6}

Description
Specifies the type of ingress traffic to which the rate limit applies: broadcast, multicast, unknown-unicast, or ICMP. The multicast rate limit affects multicast and broadcast traffic. The broadcast rate limit only affects broadcast traffic. When both types are applied to the same interface, broadcast packets are limited to the lower of the two rate values. Layer 2 BPDU packets, like spanning tree, are also included in the multicast rate limit. The ICMP rate limit can be configured to apply to IPv4, IPv6, or all IP traffic. Only one

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2353

Parameter
<RATE> {kbps|percent|pps}
Examples
On the 6400 Switch Series, interface identification differs. Limiting broadcast traffic to 2000pps on interface 1/1/3:
switch(config)# interface 1/1/3 switch(config-if)# rate-limit broadcast 500 kbps Limiting all ICMP IPv4 traffic to 10000kbps on interface 1/1/3: switch(config)# interface 1/1/3 switch(config-if)# rate-limit icmp ip 10000 kbps Viewing the results of the previous configuration settings: switch# show interface 1/1/3 qos
Interface 1/1/3 is up Admin state is up Description: Hardware: Ethernet, MAC Address: 08:97:34:b1:20:00 MTU 1500 Type 1000BT qos trust none rate-limit broadcast 2000 pps (2000 actual) rate-limit icmp ip-all 10000 kbps (10000 actual) Speed 1000 Mb/s

Description
ICMP rate-limit can be configured at a time. Applying a new ICMP rate-limit replaces any previous ICMP rate-limit.
Specifies the rate limit in kilobits per second, packets per second, or as a percentage of link bandwidth. Range: 64 to 100000000 kbps (in steps of 64 kbps), 64 to 209090910 pps (in steps of 64 pps), or 1-100 percent. The actual rate limit will be approximately equivalent to the minimum of the two step values that are closest to the configured rate (or for percent mode, the kbpsconverted rate). The actual applied rate limit can be verified using the show interface <IF-NAME> qos command. For percentage mode, ratelimits may be shown as "not applied" until after link-up has occurred on the configured port or LAG.

QoS commands | 2354

L3 Counters: Rx Disabled, Tx Disabled

Auto-Negotiation is on

Flow-control: off

Rx

0 input packets

0 bytes

0 input error

0 dropped

0 CRC/FCS

L3:

0 packets, 0 bytes

Tx

127 output packets

16510 bytes

0 input error

0 dropped

0 collision

L3:

0 packets, 0 bytes

Configuring a multicast rate-limit as a percentage of link bandwidth:

switch(config)# interface 1/1/3 switch(config-if)# rate-limit multicast 1 percent

Configuring an unknown-unicast rate-limit in packets per second:

switch(config)# interface 1/1/4 switch(config-if)# rate-limit unknown-unicast 100 pps

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.14

10.13 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated. Added the percent parameter. --
Authority Administrators or local user group members with execution rights for this command.

show interface queues
show interface <INTERFACE-NAME> queues
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2355

Displays interface-level queue statistics.

Parameter <INTERFACE-NAME>

Description
Specifies the name of an Ethernet port or LAG on the switch. Format: member/slot/port or lag number.

Usage
Statistics include:
n Tx Bytes: Total bytes transmitted. The byte count may include packet headers and internal metadata that are removed before the packet is transmitted. Packet headers added when the packet is transmitted may not be included. The byte count includes any packets subsequently dropped by an egress ACL (6300 Series Switch only).
n Tx Packets: Total packets transmitted. The count includes packets subsequently dropped by an egress ACL (6300 Series Switch only).
n Tx Drops:For the 6300 Series Switch total packets dropped by an egress queue due to insufficient capacity. For the 6400 Series Switch sum of packets that were dropped across all line modules by Virtual Output Queues (VOQs) destined for the egress port queue due to insufficient capacity. As the counts are read separately from each line module, the sum is not an instantaneous snapshot.
Examples
On the 6400 Switch Series, interface identification differs. Showing queue statistics for interface 1/1/5:

switch# show interface 1/1/5 queues

Interface 1/1/5 is down

Admin state is up

Tx Bytes

Tx Packets

Q0

0

0

Q1

15356

73

Q2

0

0

Q3

0

0

Q4

0

0

Q5

0

0

Q6

0

0

Q7

0

0

Tx Drops 3 0 0 0 0 0 0 0

Showing queue statistics for interface lag 1:

switch# show interface lag 1 queues

Aggregate-name lag1

Aggregated-interfaces :

1/1/6 1/1/7

Speed 20000 Mb/s

Tx Bytes

Tx Packets

Q0

0

0

Q1

0

0

Q2

0

0

Q3

0

0

Q4

0

0

Q5

0

0

Q6

0

0

Tx Drops 0 0 0 0 0 0 0

QoS commands | 2356

Q7

3450

25

0

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show interface qos
show interface <INTERFACE-NAME> qos
Description
Shows various QoS settings for a specific interface.

Parameter <INTERFACE-NAME>

Description
Specifies the name of an interface on the switch. Format: member/slot/port or lag number.

Examples
On the 6400 Switch Series, interface identification differs. Showing QoS settings for interface 1/1/5:

switch# show interface 1/1/5 qos

Interface 1/1/5 is up

Admin state is up

qos trust none (global)

qos queue-profile factory-default (global)

qos schedule-profile factory-default (global)

qos cos 5

qos dscp 47

rate-limit broadcast 4 percent (40000 actual)

rate-limit icmp ip-all 10000 kbps (10000 actual)

Forwarded Pkts

Dropped Pkts

Dropped Bytes

Broadcast:

944468

1044

85662408

Forwarded Bytes 1044658890

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2357

ICMP:

82210

0

qos shape 200000 kbps (199999 kbps actual)

0

2689008

Showing QoS settings for a two-member lag:

switch# show interface lag1 qos

Aggregate-name lag1

Admin state is up

qos trust cos (global)

qos queue-profile factory-default (global)

qos schedule-profile test (override)

qos cos 5

qos dscp 47

rate-limit broadcast 4 percent (40000 actual)

rate-limit icmp ip-all 10000 kbps (10000 actual)

Forwarded Pkts

Dropped Pkts

Forwarded Bytes

Dropped Bytes

Broadcast:

944468

1044

1044658890

85662408

ICMP:

82210

0

2689008

0

qos shape 200000 kbps (199999 kbps actual per interface, 399998 kbps total for

LAG)

Per Interface Status

Maximum Bandwidh

Queue

Bandwidth Units

--------------------------------

Q1

20000 kbps

Q4

30000 kbps

Q7

40000 kbps

Showing QoS settings for the VSF interface 1/1/49: The following example applies only to the 6300 Switch Series.

switch# show interface 1/1/49 qos Interface 1/1/49 is up
Admin state is up qos trust none (global) qos queue-profile factory-default (global) qos schedule-profile factory-default (global) qos shape 10000000 kbps (10000000 kbps actual)

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.
Command History

QoS commands | 2358

Release 10.13.1000 10.07 or earlier

Modification Command updated to display qos shape <SPEED>. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show qos cos-map
show qos cos-map [default] [vsx-peer]
NOTE: The vsx-peer parameter is not supported by the 6300 Series Switch

Description
Shows the global QoS CoS code point settings, or the factory default settings.

Parameter default vsx-peer

Description
Shows the factory default CoS code point settings.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing the current CoS map:

switch# show qos cos-map

code_point local_priority color name

---------- -------------- ------- ----

0

2

green Best_Effort

1

0

green Background

2

1

green Spare

3

3

green Excellent_Effort

4

4

green Controlled_Load

5

5

green Video

6

6

green Voice

7

7

green Network_Control

Showing the default CoS map:

switch# show qos cos-map default code_point local_priority color name

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2359

---------- -------------- ------- ----

0

1

green Best_Effort

1

0

green Background

2

2

green Excellent_Effort

3

3

green Critical_Applications

4

4

green Video

5

5

green Voice

6

6

green Internetwork_Control

7

7

green Network_Control

(Color is reserved for future use.)

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show qos dscp-map
show qos dscp-map [default] [vsx-peer]
NOTE: The vsx-peer parameter is not supported by the 6300 Series Switch

Description
Displays the current or default global QoS dscp-map.

Parameter default vsx-peer

Description
Shows the factory default DSCP code point settings.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing the current QoS DSCP map:

QoS commands | 2360

switch# show qos dscp-map

code_point local_priority cos color name

---------- -------------- --- ------- ----

0

1

green CS0

1

1

green

2

1

3 green

3

1

green

4

1

green

5

1

green

6

1

green

7

1

green

8

0

green CS1

...

45

5

green

46

7

green EF

47

5

7 green

48

6

green CS6

...

61

7

green

62

7

green

63

7

green

Showing the default QoS DSCP map:

switch# show qos dscp-map default

code_point local_priority cos color name

---------- -------------- --- ------- ----

0

1

green CS0

1

1

green

2

1

green

3

1

green

4

1

green

5

1

green

...

45

5

green

46

5

green EF

47

5

green

48

6

green CS6

...

61

7

green

62

7

green

63

7

green

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2361

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show qos queue-profile
show qos queue-profile [<NAME> | factory-default] [vsx-peer]
NOTE: The vsx-peer parameter is not supported by the 6300 Series Switch

Description
Shows the status of all queue profiles, or a specific queue profile.

Parameter <NAME>
[factory-default] vsx-peer

Description
Specifies the name of a queue profile. Range 1 to 64 alphanumeric characters, including period (.), underscore (_), and hyphen (-).
Specifies the factory default queue profile.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
The status of a queue profile can be:
n Applied - The profile is actively being used by the switch. n Complete - The profile meets the criteria to be applied. n Incomplete - The profile does not meet the criteria to be applied.
For a queue profile to be complete and ready to be applied:
n All eight local priorities must be mapped to some queue. n There can be 1 to 8 queues. n The queues must be consecutively numbered starting at zero.
Examples
Showing the settings of the factory default queue profile:

switch# show qos queue-profile factory-default

queue_num local_priorities name

--------- ---------------- ----

0

0

1

1

2

2

3

3

QoS commands | 2362

4

4

5

5

6

6

7

7

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show qos schedule-profile
show qos schedule-profile [<NAME> | factory-default | strict] [vsx-peer]
NOTE: The vsx-peer parameter is not supported by the 6300 Series Switch

Description
Shows the status of all schedule profiles, or a specific schedule profile.

Parameter <NAME>
[factory-default] vsx-peer

Description
Specifies the name of a queue or schedule profile. Range: 1 to 64 alphanumeric characters, including period (.), underscore (_), and hyphen (-).
Specifies the factory default queue profile.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
The status of a schedule profile can be:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2363

n Applied - The profile is actively being used by one or more ports. n Complete - The profile meets the criteria to be applied. n Incomplete - The profile does not meet the criteria to be applied.
For a schedule profile to be complete and ready to be applied it must have:
n An algorithm for each queue defined by the applied queue profile. n All queues must use the same algorithm except for the highest numbered queue, which may be
strict.
Example
Showing the status of all schedule profiles:

switch# show qos schedule-profile

profile_status profile_name

-------------- ------------

applied

MySchedule

complete

factory-default

complete

Test

Showing the configuration of factory default schedule profile:

switch# show qos schedule-profile factory-default

Queue

Number Algorithm

Weight

------- -------------- --------

0

dwrr

1

1

dwrr

1

2

dwrr

1

3

dwrr

1

4

dwrr

1

5

dwrr

1

6

dwrr

1

7

dwrr

1

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

QoS commands | 2364

show qos trust
show qos trust [default] [vsx-peer]
NOTE: The vsx-peer parameter is not supported by the 6300 Series Switch

Description
Shows the global QoS trust settings, or the factory default settings.

Parameter default vsx-peer

Description
Shows the factory default QoS trust settings.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing the current QoS trust settings:

switch# show qos trust qos trust cos

Showing the default QoS trust settings:

switch# show qos trust default qos trust none

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

strict queue

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2365

strict queue <0-7> [max-bandwidth <RATE> [kbps|percent] no strict queue <0-7> [max-bandwidth <RATE> [kbps|percent]
Description
Assigns the strict priority algorithm to a queue. Strict priority services all packets waiting in a queue, before servicing the packets in lower priority queues. Egress queue shaping can be configured using the max-bandwidth option to limit the amount of traffic transmitted per output queue. The buffer associated with each egress queue stores the excess traffic to smooth the output rate. Sustained rates of traffic above the maximum bandwidth will eventually fill the output queue, causing tail drops. Use show interface <IF-NAME> queues to determine if any tail-drop errors have occurred. The no form of this command removes the queue configuration from the schedule profile. To remove only egress queue shaping, re-enter the strict queue command without the max-bandwidth parameter.

Parameter <QUEUE-NUMBER> max-bandwidth <BANDWIDTH>

Description
Specifies the number of the queue. Range: 0 to 7.
Specifies the maximum bandwidth allowed on the queue in Kbps. Range: 64 to 100000000. Alternatively, the maximum bandwidth rate can also be configured on the queue as a percentage of the port shape or link bandwidth if a port shape is not configured. The allowed range is 1-100.

Usage
Either all the queues of the schedule profile can be strict or just the highest numbered queue. When applied to a LAG, each member Ethernet port independently schedules its egress transmissions using the strict settings. Only limited changes can be made to a strict queue that is part of an applied schedule profile:
n The max-bandwidth settings. n The highest numbered queue can be swapped between strict and dwrr` or min-bandwidth (only
applicable for the Aruba 6300 Series Switch) n The highest numbered queue can be swapped between strict and dwrr (only applicable for the Aruba
6400 Series Switch)
Any other changes or removing a queue (no strict queue) will result in an unusable schedule profile. If that schedule profile is applied in the interface context, the switch will revert to the schedule profile applied in the global context until the profile is corrected. If that schedule profile is applied in the global context, the switch will revert to using the factory-default profile until the profile is corrected.

It is possible for the following errors to occur:
n The max-bandwidth cannot be greater than 100 percent.
This error occurs when a max-bandwidth value greater than 100 percent is configured on a queue.
n The max-bandwidth cannot be less than <NUM> kbps.
This error occurs when a kbps max-bandwidth value less than the supported minimum kbps shape value is configured on a queue. The supported minimum kbps shape value can be retrieved using the show capacities command.

QoS commands | 2366

Examples
Assigning strict priority to queue 7 in the schedule profile MySchedule:
switch(config)# qos schedule-profile MySchedule switch(config-schedule)# strict queue 7
Deleting strict priority from queue 7 in the schedule profile MySchedule:
switch(config)# qos schedule-profile MySchedule switch(config-schedule)# no strict queue 7
Assigning strict priority to queue 7 in the schedule profile MySchedule with a maximum bandwidth of 10000 Kbps:
switch(config)# qos schedule-profile MySchedule switch(config-schedule)# strict queue 7 max-bandwidth 10000 kbps

For more information on features that use this command, refer to the Quality of Service Guide for your switch model.

Command History
Release 10.13 10.07 or earlier

Modification Added the kbps and percent parameters. --

Command Information

Platforms All platforms

Command context config-schedule-<NAME>

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2367

Chapter 128 QinQ commands

QinQ commands

debug vlan qinq
debug vlan qinq severity
Description
Enables the VLAN debug logs to trace the QinQ changes and filtering with minimum log severity.
Examples
Enabling the debug logs for QinQ

switch# debug vlan qinq

severity

Minimum log severity to filter debug logs

<cr>

switch# debug vlan qinq severity

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.10

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

diag-dump l2vlan basic
diag-dump l2vlan basic
Description
Collects the debug information in the case of any issue in the QinQ daemon. Diagnostic for QinQ is part of VLAN daemon.
Examples

AOS-CX 10.14 Command-Line Interface Guide

2368

Configuring diagnostic dump for QinQ switch# diag-dump l2vlan basic

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.10

Modification Command introduced

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show qinq
show qinq
Description
Shows the configuration details of QinQ.
Examples
Showing the QinQ configuration

switch# show qinq QinQ Configuration Information

Encapsulation Ethertype: 0x88A8

SVLAN List: 100-103

------------------------------------------------------

Port

Type

VLAN Membership

------------------------------------------------------

1/1/1

customer-network (access) 100

1/1/3

provider-network (trunk) 100-103

1/1/5

customer-network (access) 101

1/1/7

customer-network (access) 102

1/1/9

customer-network (access) 103

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

QinQ commands | 2369

Command History

Release 10.10

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config qinq
show running-config qinq
Description
Shows all the QinQ configurations in the switch.
Examples
Showing the QinQ running configuration
switch# show running-config qinq Current configuration: ... vlan 300
svlan
```

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.10

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2370

show tech qinq
show tech qinq
Description
Shows the tech support for QinQ feature.
Examples
Showing the tech support for QinQ feature

switch# show tech qinq
==================================================== Show Tech executed on Thu Mar 17 03:07:03 2022 ==================================================== ==================================================== [Begin] Feature qinq ====================================================

********************************* Command : show running-config qinq ********************************* vlan 300
svlan

********************************* Command : show qinq *********************************

switch# show qinq

QinQ Configuration Information

Encapsulation Ethertype: 0x88A8

SVLAN List: 100-103

---------------------------------------------------

Port

Type

VLAN Membership

---------------------------------------------------

1/1/1

customer-network (access) 100

1/1/3

provider-network (trunk) 100-103

1/1/5

customer-network (access) 101

1/1/7

customer-network (access) 102

1/1/9

customer-network (access) 103

====================================================

[End] Feature qinq

====================================================

==================================================== Show Tech commands executed successfully

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

QinQ commands | 2371

Release 10.10

Modification Command introduced

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

svlan
svlan no svlan
Description
Configures a VLAN as a service VLAN. A port will implicitly become customer-network port, when it is an access member (untagged) of SVLAN. A port will implicitly become provider-network port, when it is a trunk member (tagged) of SVLAN. The no form of this command removes the service VLAN configuration.
A QinQ CN or PN port, which was a member of the SVLAN, will become normal VLAN port after removing service VLAN configuration from VLAN.
Usage
n VLAN 1 cannot be configured as an SVLAN. n An L2 port can be a member of either service VLANs or normal VLANs but cannot be used on both
the VLANs. n An L2 port with vlan trunk allowed all will not include service VLANs. n Native VLAN configuration will be non-operational on PN port.
Examples
Configuring VLAN 300 and enabling service VLAN mode
switch(config)# vlan 300 switch(config-vlan-300)# svlan
Removing the service VLAN mode configuration from VLAN 300
switch(config)# vlan 100 switch(config-vlan-100)# no svlan

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2372

Command History

Release 10.10

Modification Command introduced

Command Information

Platforms
6300 6400

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

QinQ commands | 2373

Chapter 129
Configurable RADIUS attribute commands

Configurable RADIUS attribute commands
aaa radius-attribute group
aaa radius-attribute group <GROUP-NAME> no aaa radius-attribute group <GROUP-NAME>
Description
Configures an existing RADIUS server group for which the configured RADIUS attributes will be included in request packets. Enters the config-radius-attr context. The no form of this command unconfigures the RADIUS server group for the configured RADIUS attributes.
Nas-id and tunnel-private-group-id attributes only apply to port access requests. Nas-ip-addr attributes only apply to management user requests.

Parameter <GROUP-NAME>

Description Specifies an existing RADIUS server group name.

Examples
Configuring port access request RADIUS attributes for rad_group1:

switch(config)# aaa radius-attribute group rad_group1 switch(config-radius-attr)# nas-id value ARUBA_NAS-01 switch(config-radius-attr)# nas-id request-type authentication switch(config-radius-attr)# tunnel-private-group-id value static switch(config-radius-attr)# tunnel-private-group-id request-type authentication

Configuring management user request RADIUS attributes for rad_group2:

switch(config)# aaa radius-attribute group rad_group2 switch(config-radius-attr)# nas-ip-addr request-type authentication switch(config-radius-attr)# nas-ip-addr service-type user-management

Unconfiguring RADIUS attributes for rad_group1:

switch(config)# no aaa radius-attribute group rad_group1

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
AOS-CX 10.14 Command-Line Interface Guide

2374

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

nas-id request-type
nas-id request-type {authentication | accounting | both} no nas-id request-type {authentication | accounting | both}
Description
For the selected (by context) RADIUS server group, configures the Network Access Server (NAS) ID request type for which the attribute configured with command nas-id value will be included. The no form of this command unconfigures the specified request type.
Nas-id attributes only apply to port access requests.

Parameter authentication accounting both

Description Selects the authentication request type. Selects the accounting request type. Selects both the authentication and accounting request types.

Examples
Configuring the authentication request type for rad_group1:

switch(config)# aaa radius-attribute group rad_group1 switch(config-radius-attr)# nas-id request-type authentication

Configuring both the authentication and accounting request types for rad_group2:

switch(config)# aaa radius-attribute group rad_group2 switch(config-radius-attr)# nas-id request-type both

Unconfiguring the authentication request type for rad_group1:

switch(config)# aaa radius-attribute group rad_group1 switch(config-radius-attr)# no nas-id request-type authentication

Configurable RADIUS attribute commands | 2375

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-radius-attr

Authority
Administrators or local user group members with execution rights for this command.

nas-id value
nas-id value <NAS-ID> no nas-id [value <NAS-ID>]
Description
For the selected (by context) RADIUS server group, configures the Network Access Server Identifier (NAS ID) (type 32, RFC 2865). The NAS ID is sent in the RADIUS access request and accounting packets to notify the source of the RADIUS access request. The no form of this command unconfigures the specified NAS ID.
Nas-id attributes only apply to port access requests.

Parameter <NAS-ID>

Description
Specifies the FQDN or other unique identifying name of the Network Access Server (NAS). Range 1 to 253 characters.

Examples
Configuring the Network Access Server (NAS) ID for rad_group1:

switch(config)# aaa radius-attribute group rad_group1 switch(config-radius-attr)# nas-id value ARUBA_NAS-01

Unconfiguring the NAS ID for rad_group1:

switch(config)# aaa radius-attribute group rad_group1 switch(config-radius-attr)# no nas-id value ARUBA_NAS-01

Unconfiguring both the NAS-ID value and the request type for rad_group2:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2376

switch(config)# aaa radius-attribute group rad_group2 switch(config-radius-attr)# no nas-id

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-radius-attr

Authority
Administrators or local user group members with execution rights for this command.

nas-ip-addr request-type authentication
nas-ip-addr request-type authentication no nas-ip-addr request-type authentication
Description
For the selected (by context) RADIUS server group, configures the NAS-IP-Address attribute for inclusion in management user request packets. The no form of this command unconfigures the NAS-IP-Address attribute for inclusion in management user request packets.
Nas-ip-addr attributes only apply to management user requests.
Examples
Configuring the NAS-IP-Address attribute for inclusion in management user request packets for rad_ group1:
switch(config)# aaa radius-attribute group rad_group1 switch(config-radius-attr)# nas-ip-addr request-type authentication
Unconfiguring the NAS-IP-Address attribute for inclusion in management user request packets for rad_ group1:
switch(config)# aaa radius-attribute group rad_group1 switch(config-radius-attr)# no nas-ip-addr request-type authentication

For more information on features that use this command, refer to the Security Guide for your switch model.

Configurable RADIUS attribute commands | 2377

Command History

Release 10.09

Modification Command introduced

Command Information

Platforms
6300 6400

Command context config-radius-attr

Authority
Administrators or local user group members with execution rights for this command.

nas-ip-addr service-type user-management
nas-ip-addr service-type user-management no nas-ip-addr service-type user-management
Description
For the selected (by context) RADIUS server group, configures the NAS-IP-Address attribute for inclusion in management user service type request packets. The no form of this command unconfigures the NAS-IP-Address attribute for inclusion in management user service type request packets.
Nas-ip-addr attributes only apply to management user requests.
Examples
Configuring the NAS-IP-Address attribute for inclusion in management user service type request packets for rad_group1:
switch(config)# aaa radius-attribute group rad_group1 switch(config-radius-attr)# nas-ip-addr service-type user-management
Unconfiguring the NAS-IP-Address attribute for inclusion in management user service type request packets for rad_group1:
switch(config)# aaa radius-attribute group rad_group1 switch(config-radius-attr)# no nas-ip-addr service-type user-management

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09

Modification Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2378

Command Information

Platforms
6300 6400

Command context config-radius-attr

Authority
Administrators or local user group members with execution rights for this command.

tunnel-private-group-id request-type
tunnel-private-group-id request-type {authentication | accounting | both} no tunnel-private-group-id request-type {authentication | accounting | both}
Description
For the selected (by context) RADIUS server group, configures the request type for which the attribute configured with command tunnel-private-group-id value will be included. The no form of this command unconfigures the specified request type.
Tunnel-private-group-id attributes only apply to port access requests.

Parameter authentication accounting both

Description Selects the authentication request type. Selects the accounting request type. Selects both the authentication and accounting request types.

Examples
Configuring the authentication request type for rad_group1:

switch(config)# aaa radius-attribute group rad_group1 switch(config-radius-attr)# tunnel-private-group-id request-type authentication

Configuring both the authentication and accounting request types for rad_group2:

switch(config)# aaa radius-attribute group rad_group2 switch(config-radius-attr)# tunnel-private-group-id request-type both

Unconfiguring the authentication request type for rad_group2:

switch(config)# aaa radius-attribute group rad_group2 switch(config-radius-attr)# no tunnel-private-group-id request-type authentication

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

Configurable RADIUS attribute commands | 2379

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-radius-attr

Authority
Administrators or local user group members with execution rights for this command.

tunnel-private-group-id value
tunnel-private-group-id value {static | dynamic} no tunnel-private-group-id value {static | dynamic}
Description
For the selected (by context) RADIUS server group, configures the tunnel-private-group-id value (type 81, RFC 2868) that will be sent in RADIUS access-request packets. This is used for VLAN identification. The no form of this command unconfigures specified tunnel-private-group-id value.
Tunnel-private-group-id attributes only apply to port access requests.

Parameter static
dynamic

Description
Causes the switch to send (as an attribute value) the native VLAN of the client port.
Causes the switch to send (as an attribute value) the client VLAN assigned by server. This is applicable during re-authentication scenarios.

Examples
Configuring rad_group1 for the RADIUS attribute to identify the native VLAN of the client port:

switch(config)# aaa radius-attribute group rad_group1 switch(config-radius-attr)# tunnel-private-group-id value static

Configuring rad_group2 for the RADIUS attribute to identify the client VLAN assigned by the server:

switch(config)# aaa radius-attribute group rad_group2 switch(config-radius-attr)# tunnel-private-group-id value dynamic

Unconfiguring (for rad_group1) the RADIUS attribute to identify the native VLAN of the client port:

switch(config)# aaa radius-attribute group rad_group1 switch(config-radius-attr)# no tunnel-private-group-id value static

Unconfiguring (for rad_group3) both the group-ID value and request type:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2380

switch(config)# aaa radius-attribute group rad_group3 switch(config-radius-attr)# no tunnel-private-group-id

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-radius-attr

Authority
Administrators or local user group members with execution rights for this command.

vsa vendor
vsa vendor aruba type avpair group dfp-client-info {no} vsa vendor aruba type avpair group dfp-client-info
Description
This command enables AOS-CX integration with Aruba Clearpass by allowing the switch to send VendorSpecific Attributes (VSAs) for the Aruba vendor in RADIUS interim packets (such as accounting packets). Device fingerprints are sent to a ClearPass RADIUs server through accounting updates using ArubaAVPair(67) VSAs. When configured, device fingerprint information for an authenticated port-access client is obtained from protocols such as LLDP, DHCP, CDP, and HTTP and sent to RADIUS accounting interim packets.
Examples
The following command configures Clearpass integration using device fingerprinting information sent through RADIUS accounting updates.
switch(config)# aaa radius-attribute group radius switch(config-radius-attr)#vsa vendor aruba type avpair group dfp-client-info
The following command stops the switch from sending device fingerprinting infromation through RADIUS accounting updates.
switch(config-radius-attr)#no vsa vendor aruba type avpair group dfp-client-info

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

Configurable RADIUS attribute commands | 2381

Release 10.12

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2382

Chapter 130
RADIUS dynamic authorization commands

RADIUS dynamic authorization commands
radius dyn-authorization enable
radius dyn-authorization enable no radius dyn-authorization enable
Description
Enables RADIUS dynamic authorization. This command must be issued before the configuration set with other radius dyn-authorization commands takes effect. The no form of this command disables RADIUS dynamic authorization.
Examples
Enabling RADIUS dynamic authorization:
switch(config)# radius dyn-authorization enable

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

radius dyn-authorization client
radius dyn-authorization client {<IPV4> | <IPV6> | <HOSTNAME>} [secret-key [plaintext <PASSKEY> | ciphertext <PASSKEY>]] [time-window <WIDTH>] [vrf <VRF-NAME>] [replay-protection {enable|disable}] [rfc5176-enforcement-mode <strict|loose>] no...
Description
Configures RADIUS dynamic authorization for the specified client on the specified (or default) VRF.

AOS-CX 10.14 Command-Line Interface Guide

2383

The no form of this command unconfigures RADIUS dynamic authorization for the specified client on the specified (or default) VRF.
Guidelines
Configure rfc5176-enforcement-mode loose when integrating with the Adaptive Network Control (ANC) feature of Cisco ISE, as authorization attributes are sent as part of Disconnect-Requests (code 40) instead of CoA-Requests(code 43). The following are the only authorization attributes that are accepted in the disconnect requests in the loose mode:
1. Cisco-AVPair='subscriber:command=bounce-host-port' 2. Cisco-AVPair='subscriber:command=disable-host-port' 3. Cisco-AVPair='subscriber:command=reauthenticate' and Cisco-AVPair='subscriber:reauthenticate-
type=<last|rerun>
The reauthenticate-type=rerun option is not supported if concurrent onboarding is enabled for the client.

Parameter <IPV4> | <IPV6> | <HOSTNAME> secret-key [plaintext <PASSKEY> |
ciphertext <PASSKEY>]
rfc5176-enforcement-mode <strict|loose)
time-window <WIDTH> replay-protection {enable|disable} vrf <VRF-NAME>

Description
Specifies the client IPv4 address, IPv6 address, or host name.
Specifies the dynamic authorization server (RADIUS server) shared secret key required for client access. Provide either a plaintext or an encrypted shared-secret passkey. As per RFC 2865, the shared-secret can be a mix of alphanumeric and special characters. Plaintext passkeys are between 1 and 32 alphanumeric and special characters.
NOTE: When secret-key is entered without either subparameter, plaintext shared secret prompting occurs upon pressing Enter. Enter must be pressed immediately after the secret-key parameter without entering other parameters. The entered shared secret characters are masked with asterisks.
Configure the enforcement mode of RFC5176. The default mode is strict and in this mode, no authorization attributes are allowed as part of disconnect requests. When configured mode is loose, then the authorization attributes are accepted in disconnect requests.
Specifies the width of the synchronization window (in seconds) between the RADIUS dynamic authorization client and the RADIUS dynamic authorization server. Default 300. Range: 1 to 65535.
Enables or disables RADIUS dynamic authorization replay protection for the specified client on the specified (or default) VRF. By default, the replayprotection is set to disabled.
Specifies the VRF on which the identified client is connected. When omitted, VRF default is assumed.

RADIUS dynamic authorization commands | 2384

Examples
Configuring RADIUS dynamic authorization with replay protection for a client on the default VRF:
switch(config)# radius dyn-authorization client 1.1.2.5 replay-protection enable
Configuring RADIUS dynamic authorization with time window and shared secret for a client on the default VRF:
switch(config)# radius dyn-authorization client 1.1.2.7 time-window 8 secret-key plaintext skF82#450
Configuring loose enforcement of RFC5176:
switch(config)# radius dyn-authorization client 1.1.1.1 rfc5176-enforcement-mode loose
Configuring RADIUS dynamic authorization with a prompted shared secret:
switch(config)# radius dyn-authorization client 1.1.2.7 secret-key Enter the RADIUS dyn-authorization key: ********* Re-Enter the RADIUS dyn-authorization key: *********
Configuring RADIUS dynamic authorization for a client on the adm2 VRF:
switch(config)# radius dyn-authorization client 1.1.2.1 vrf adm2

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification The rfc5176-enforcement-mode parameter was introduced. --
Authority Administrators or local user group members with execution rights for this command.

radius dyn-authorization client tls (RadSec)
radius dyn-authorization client [<IPV4> | <IPV6> | <HOSTNAME>] tls [replay-protection {enable|disable}][time-window <WIDTH>] [vrf <VRF-NAME>]
[rfc5176-enforcement-mode <strict|loose>]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2385

no radius dyn-authorization client [<IPV4> | <IPV6> | <HOSTNAME>] tls [replay-protection {enable|disable}][time-window <WIDTH>] [vrf <VRF-NAME>]
[rfc5176-enforcement-mode <strict|loose>]
Description
Enables TLS protection for a RADIUS dynamic authorization client on the specified (or default) VRF. RadSec is a protocol that supports RADIUS over TLS. The no form of this command deletes TLS protection for the dynamic authorization client.
RadSec server must be configured before configuring dynamic authorization.
Guidelines
Configure rfc5176-enforcement-mode loose when integrating with the Adaptive Network Control (ANC) feature of Cisco ISE, as authorization attributes are sent as part of Disconnect-Requests (code 40) instead of CoA-Requests(code 43). The following are the only authorization attributes that are accepted in the disconnect requests in the loose mode:
1. Cisco-AVPair='subscriber:command=bounce-host-port' 2. Cisco-AVPair='subscriber:command=disable-host-port' 3. Cisco-AVPair='subscriber:command=reauthenticate' and Cisco-AVPair='subscriber:reauthenticate-
type=<last|rerun>
The reauthenticate-type=rerun option is not supported if concurrent onboarding is enabled for the client.

Parameter <IPV4> | <IPV6> | <HOSTNAME> replay-protection {enable|disable}
time-window <WIDTH>
vrf <VRF-NAME> rfc5176-enforcement-mode <strict|loose>

Description
Specifies the client IPv4 address, IPv6 address, or host name.
Enables or disables RADIUS dynamic authorization replay protection for the specified client on the specified (or default) VRF. By default, the replayprotection is set to disabled.
Specifies the width of the synchronization window (in seconds) between the RADIUS dynamic authorization client and the RADIUS dynamic authorization server. Default 300. Range: 1 to 65535.
Specifies the VRF on which the identified client is connected. When omitted, VRF default is assumed.
Configure the enforcement mode of RFC5176. The default mode is strict and in this mode, no authorization attributes are allowed as part of disconnect requests. When configured mode is loose, then the authorization attributes are accepted in disconnect requests.

Examples
Enables TLS protection for a RADIUS dynamic authorization client with replay protection and time window for a client on the default VRF:

RADIUS dynamic authorization commands | 2386

switch(config)# radius dyn-authorization client 1.1.2.5 tls replay-protection enable time-window 8
Configuring loose enforcement of RFC5176:
switch(config)# radius dyn-authorization client 1.1.1.1 tls rfc5176-enforcementmode loose
Deleting TLS protection for a dynamic authorization client on the adm2 VRF:
switch(config)# no radius dyn-authorization client 1.1.2.7 tls VRF adm2

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.13 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification The rfc5176-enforcement-mode parameter was introduced. --
Authority Administrators or local user group members with execution rights for this command.

radius dyn-authorization port
radius dyn-authorization port <PORT-NUMBER>
Description
Sets the RADIUS dynamic authorization server UDP or TCP port.

Parameter <PORT-NUMBER>

Description Specifies the UDP or TCP port. Default UDP: 3799 and TCP:2083.

Examples
Setting the RADIUS dynamic authorization server UDP port back to its default 3799:

switch(config)# radius dyn-authorization port 3799

Setting the RADIUS dynamic authorization server TCP port back to its default 2083:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2387

switch(config)# radius dyn-authorization port 2083

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show radius dyn-authorization
show radius dyn-authorization
Description
Shows RADIUS dynamic authorization configuration and summarized statistics for all clients configured for dynamic authorization.
Usage
Show command output item identification:
n Radius Dynamic Authorization: Enabled or Disabled status, system wide. n Radius Dynamic Authorization Port: The UDP or TCP port used for dynamic authorization (default
3799). n Invalid Client Address in CoA Requests: The number of CoA (change of authorization) requests
received with an incorrect DAC (dynamic authorization client) address. n Invalid Client Address in Disconnect Requests: The number of disconnect requests received with
incorrect DAC address. n Disconnect Requests: The number of disconnect requests received from the DAC. n Disconnect ACKs: The number of Disconnect-ACKs sent to the DAC. n Disconnect NAKs: The number of Disconnect-NAKs sent to the DAC. n CoA Requests: The number of CoA-requests received from the DAC. n CoA ACKs: The number of CoA-ACKs sent to the DAC. n CoA NAKs: The number of CoA-NAKs sent to the DAC.
Example
Showing RADIUS dynamic authorization summarized statistics for all clients configured for dynamic authorization:

RADIUS dynamic authorization commands | 2388

switch# show radius dyn-authorization Status and Counters - RADIUS Dynamic Authorization Information

RADIUS Dynamic Authorization

: Enabled

RADIUS Dynamic Authorization UDP Port

: 3799

Invalid Client Addresses in CoA Requests

:0

Invalid Client Addresses in Disconnect Requests: 0

Dynamic Authorization Client Information =========================================

IP Address

: 1.1.2.1

VRF

: adm2

Replay Protection : Disabled

TLS Enabled

: Yes

Time Window

: 20

Disconnect Requests : 1

Disconnect ACKs

:1

Disconnect NAKs

:0

CoA Requests

:7

CoA ACKs

:2

CoA-NAKs

:5

Shared-Secret

:

AQBapb+HsdpqV1Q3CPCBMQTG8ekK1cA+CyD0RvfbeA8BEgikCgAAAJOwZSNzA2SWrLA=

IP Address

: 1.1.2.5

VRF

: default

Replay Protection : Enabled

TLS Enabled

: No

Time Window

: 20

Disconnect Requests : 6

Disconnect ACKs

:6

Disconnect NAKs

:0

CoA Requests

:9

CoA ACKs

:5

CoA-NAKs

:4

Shared-Secret

:

AQBapb+HsdpqV1Q3CPCBMQTG8ekK1cA+CyD0RvfbeA8BEgikCgAAAJOwZSNzA2SWrLA=

IP Address

: 1.1.2.7

VRF

: default

Replay Protection : Disabled

TLS Enabled

: Yes

Time Window

:8

Disconnect Requests : 6

Disconnect ACKs

:6

Disconnect NAKs

:0

CoA Requests

:9

CoA ACKs

:5

CoA-NAKs

:4

Shared-Secret

:

AQBapb+HsdpqV1Q3CPCBMQTG8ekK1cA+CyD0RvfbeA8BEgikCgAAAJOwZSNzA2SWrLA=

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2389

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show radius dyn-authorization client
show radius dyn-authorization client <IP-ADDR> [vrf <VRF-NAME>]
Description
Shows RADIUS dynamic authorization statistics for the specified client on the specified VRF.

Parameter <IP-ADDR> vrf <VRF-NAME>

Description
Specifies the client IPv4 or IPv6 address.
Specifies the VRF on which the identified client is connected. When omitted, VRF default is assumed.

Usage
Show command output item identification:
n Total Requests: The number of Disconnect and CoA (change of authorization) requests received from the DAC (dynamic authorization client).
n Authorize Only Requests: The number of Disconnect and CoA requests received from the DAC with an "Authorize only" Service-Type attribute.
n Malformed Requests: The number of malformed Disconnect and CoA requests received from the DAC.
n Bad Authenticator Requests: The number of Disconnect and CoA requests received from this DAC with an invalid authenticator field.
n Dropped Requests: The number of Disconnect and CoA requests from this DAC that have been silently discarded for reasons other than malformed, bad authenticators, or unknown type.
n Total ACK Responses: The number of Disconnect-ACKs sent to the DAC. n Total NAK Responses: The number of Disconnect-NAKs sent to the DAC. n Session Not Found Responses: The number of Disconnect-NAKs sent to the DAC because no
session context could be found. n User Sessions Modified: The number of user sessions for which authorization changed due to
Disconnect and CoA requests received from the DAC.
Example
Showing RADIUS dynamic authorization statistics for client 1.1.2.1 on VRF default:

RADIUS dynamic authorization commands | 2390

switch# show radius dyn-authorization client 1.1.2.1 vrf default Status and Counters - RADIUS Dynamic Authorization Client Information

VRF Name

: default

Authorization Client

: 1.1.2.1

Unknown Packets

: 55

Message-Type

Disconnect

CoA

---------------------------------------------------------------

Total Requests

2147483647

10

Authorize Only Requests

10

10

Malformed Requests

10

10

Bad Authenticator Requests

2147483647

2147483647

Dropped Requests

10

10

Total ACK Responses

10

10

Total NAK Responses

10

10

Session Not Found Responses 10

10

User Sessions Modified

20

20

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show radius dyn-authorization client tls (RadSec)
show radius dyn-authorization client <IP-ADDR> tls [vrf <VRF-NAME>]
Description
Shows RADIUS dynamic authorization statistics for the specified client (with TLS) on the specified VRF.

Parameter <IP-ADDR> vrf <VRF-NAME>

Description
Specifies the client IPv4 or IPv6 address.
Specifies the VRF on which the identified client is connected. When omitted, VRF default is assumed.

Usage
Show command output item identification:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2391

n Total Requests: The number of Disconnect and CoA (change of authorization) requests received from the DAC (dynamic authorization client).
n Authorize Only Requests: The number of Disconnect and CoA requests received from the DAC with an "Authorize only" Service-Type attribute.
n Malformed Requests: The number of malformed Disconnect and CoA requests received from the DAC.
n Bad Authenticator Requests: The number of Disconnect and CoA requests received from this DAC with an invalid authenticator field.
n Dropped Requests: The number of Disconnect and CoA requests from this DAC that have been silently discarded for reasons other than malformed, bad authenticators, or unknown type.
n Total ACK Responses: The number of Disconnect-ACKs sent to the DAC. n Total NAK Responses: The number of Disconnect-NAKs sent to the DAC. n Session Not Found Responses: The number of Disconnect-NAKs sent to the DAC because no
session context could be found. n User Sessions Modified: The number of user sessions for which authorization changed due to
Disconnect and CoA requests received from the DAC.
Example
Showing RADIUS dynamic authorization statistics for client 1.1.2.1 with TLS enabled on VRF default:

switch# show radius dyn-authorization client 1.1.2.1 vrf default Status and Counters - RADIUS Dynamic Authorization Client Information

VRF Name

: default

Authorization Client

: 1.1.2.1

TLS Enabled

: Yes

Unknown Packets

: 55

Message-Type

Disconnect

CoA

---------------------------------------------------------------

Total Requests

2147483647

10

Authorize Only Requests

10

10

Malformed Requests

10

10

Bad Authenticator Requests

2147483647

2147483647

Dropped Requests

10

10

Total ACK Responses

10

10

Total NAK Responses

10

10

Session Not Found Responses 10

10

User Sessions Modified

20

20

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

RADIUS dynamic authorization commands | 2392

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2393

Chapter 131 RA guard policy commands

RA guard policy commands
hop limit
hop limit [minimum | maximum] <HOP-LIMIT> no hop limit [minimum | maximum] <HOP-LIMIT>
Description
Enables verification of the advertised hop count limit if the RA guard policy is applied on a VLAN or interface. RA packets with the hop limit within the specified minimum and maximum values are processed. If none of the values are specified for hop limit, the default range is 1-255. If hop limit is not enabled, packets are not validated for hop limit. The no form of the command disables the hop limit on the specified RA guard policy.
ND snooping must be enabled in both the global context and the config-vlan context before this command can be used.

Parameter <HOP-LIMIT> minimum
maximum

Description
Specifies the hop-limit value. Range: 1-255.
Specifies the minimum value for the hop-limit range. Default: 1, Range 1-255. The range is minimum­255 if only a minimum value is specified.
Specifies the maximum value for the hop-limit range. Default: 255, Range 1-255. The range is 1­maximum if only a maximum value is specified.

Examples
Enabling the hop limit on the RA guard policy and adding minimum and maximum values for hop limit on the policy:

switch(config)# ipv6 nd-snooping ra-guard policy <POLICY-NAME> switch(config-raguard-policy)# hop-limit enable switch(config-raguard-policy)# hop-limit maximum 150 switch(config-raguard-policy)# hop-limit minimum 50

Disabling the hop limit on the RA guard policy:

switch(config)# ipv6 nd-snooping ra-guard policy <POLICY-NAME> switch(config-raguard-policy)# no hop-limit enable

Removing minimum and maximum values for the hop limit on the RA guard policy:

AOS-CX 10.14 Command-Line Interface Guide

2394

switch(config)# ipv6 nd-snooping ra-guard policy <POLICY-NAME> switch(config-raguard-policy)# no hop-limit maximum 150 switch(config-raguard-policy)# no hop-limit minimum 50 switch(config-raguard-policy)# no hop-limit maximum switch(config-raguard-policy)# no hop-limit minimum

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-raguard-policy

Authority
Administrators or local user group members with execution rights for this command.

ipv6 nd-snooping ra-guard policy
ipv6 nd-snooping ra-guard policy <POLICY-NAME> no ipv6 nd-snooping ra-guard policy <POLICY-NAME>
Description
Creates the Router Advertisement (RA) guard policy with the given name and enters the RA guard policy configuration context. The no form of the command removes the specified RA guard policy from the switch.
ND snooping must be enabled in both the global context and the config-vlan context before this command can be used.

Parameter <POLICY-NAME>

Description Specifies the name of the RA guard policy. Maximum length: 64.

Examples
Creating the RA guard policy globally with a specified name:

switch(config)# ipv6 nd-snooping ra-guard policy <POLICY-NAME> switch(config-raguard-policy)#

Deleting the specified RA guard policy:

RA guard policy commands | 2395

switch(config)# no ipv6 nd-snooping ra-guard policy <POLICY-NAME>

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

managed-config-flag
managed-config-flag [on | off] no managed-config-flag [on | off]
Description
Enables the verification of the advertised manage configuration flag. Verifies that the advertised managed address configuration flag is On or Off based on the configured value. The no form of the command disables the manage configuration flag verification.
ND snooping must be enabled in both the global context and the config-vlan context before this command can be used.

Parameter on
off

Description
Verifies that the advertised managed address configuration flag is On.
Verifies that the advertised managed address configuration flag is Off.

Examples
Enabling managed configuration flag verification:

switch(config)# ipv6 nd-snooping ra-guard policy <POLICY-NAME> switch(config-raguard-policy)# managed-config-flag off switch(config-raguard-policy)# managed-config-flag on

Disabling managed configuration flag verification:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2396

switch(config)# ipv6 nd-snooping ra-guard policy <POLICY-NAME> switch(config-raguard-policy)# no managed-config-flag switch(config-raguard-policy)# no managed-config-flag off switch(config-raguard-policy)# no managed-config-flag on

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-raguard-policy

Authority
Administrators or local user group members with execution rights for this command.

match access-list
match access-list <ACL-NAME> no match access-list <ACL-NAME>
Description
Configures the access list to an RA guard policy. The access list has to be created with the desired match criteria before adding it into RA guard policy. Advertised packets are verified for the match criteria when an RA guard policy with matched access list is enabled on a trusted port or VLANs. The no form of the command removes the access list from the RA guard policy.
ND snooping must be enabled in both the global context and the config-vlan context before this command can be used.

Parameter <ACL-NAME>

Description Specifies the name of the access list to be matched.

Examples
Adding an access list named Example_ACL to the RA guard policy POL1:

switch(config)# ipv6 nd-snooping ra-guard policy POL1 switch(config-raguard-policy)# match access-list Example_ACL
Deleting the access list named Example_ACL from the RA guard policy POL1:

RA guard policy commands | 2397

switch(config)# ipv6 nd-snooping ra-guard policy POL1 switch(config-raguard-policy)# no match access-list Example_ACL

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-raguard-policy

Authority
Administrators or local user group members with execution rights for this command.

match prefix-list
match prefix-list <PREFIX-LIST-NAME> no match prefix-list <PREFIX-LIST-NAME>
Description
Configures a prefix-list for the RA guard policy. Advertised prefixes in RA packets are compared against the configured prefix-list and if there is no match, the RA packets are dropped. If the RA prefix list is not configured, this check is not performed. The no form of the command removes the prefix list from the RA guard policy.
ND snooping must be enabled in both the global context and the config-vlan context before this command can be used.

Parameter <PREFIX-LIST-NAME>

Description Specifies the name of the prefix list to be matched.

Examples
Adding a prefix list named PREFIX_LIST_EXAMPLE to the POLICY1 RA guard policy:
switch(config)# ipv6 nd-snooping ra-guard policy POLICY1 switch(config-raguard-policy)# match prefix-list PREFIX_LIST_EXAMPLE
Deleting the prefix list named PREFIX_LIST_EXAMPLE from the POLICY1 RA guard policy:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2398

switch(config)# ipv6 nd-snooping ra-guard policy POLICY1 switch(config-raguard-policy)# no match pefix-list PREFIX_LIST_EXAMPLE

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-raguard-policy

Authority
Administrators or local user group members with execution rights for this command.

nd-snooping ra-guard attach-policy
nd-snooping ra-guard attach-policy <POLICY-NAME> no nd-snooping ra-guard attach-policy <POLICY-NAME>
Description
Applies the created RA guard policy to a specific L2 port or VLAN. The no form of the command detaches the specified RA guard policy from the L2 port or VLAN.

Parameter <POLICY-NAME>

Description Specifies the name of the RA guard policy.

Usage
In the interface configuration (config-if) context:
n RA guard must be enabled on member VLANs of the port for which RA packets need to be inspected using the policy.
In the interface configuration (config-if) and VLAN configuration (config-vlan) contexts:
n RA packets received on untrusted ports are dropped without any inspection. n RA packets received on trusted ports are validated against the policy. n The applied policy takes effect only if ND snooping is enabled globally and both ND snooping and RA
guard are enabled under the VLAN context.
Policy precedence between VLAN and port:
n If the policy is attached to both VLAN and port, the port policy takes precedence over the VLAN policy.

RA guard policy commands | 2399

n Only one policy can be attached per VLAN or port. n If the port belongs to a different VLAN (for example, in the case of a trunk port) the tagged VLAN
takes priority. If the packets are untagged, the native VLAN policy takes precedence.
Examples
Attaching the RA guard policy to an L2 port:
switch(config)# interface 1/1/10 switch(config-if)# nd-snooping ra-guard attach-policy POLICY_NAME
Attempting to attach the RA guard policy to a port where routing is enabled, the policy is not configured, or it is an untrusted port: (When prompted, enter "Y" to create the policy and attach it to the interface. )
switch(config)# interface 1/1/10 switch(config-if)# nd-snooping ra-guard attach-policy POLICY_NAME RA Guard policy can't be attached to an interface with routing enabled.
switch(config-if)# no routing switch(config-if)# nd-snooping trust switch(config-if)# nd-snooping ra-guard attach-policy POLICY_NAME switch(config-if)#6300(config-if)# nd-snooping ra-guard attach-policy POLICY_NOT_ CREATED RA guard policy does not exist. Do you want to create (y/n)?
switch(config)# interface 1/1/10 switch(config-if)# nd-snooping ra-guard attach-policy AA RA Guard policy is ineffective, as 1/1/10 is configured as untrusted port.
Attaching the RA guard policy to a VLAN:
switch(config)# vlan 10 switch(config-vlan-10)# nd-snooping ra-guard attach-policy POLICY_NAME
Detaching the RA guard policy:
switch(config)# interface 1/1/10 switch(config-if)# no nd-snooping ra-guard attach-policy POLICY_NAME
Attempting to detach a RA guard policy which is not applied on the port or VLAN:
switch(config)# interface 1/1/10 switch(config-if)# no nd-snooping ra-guard attach-policy POLICY_NAME RA Guard Policy POLICY_NAME is not applied on this port.
Attempting to detach a non-existent RA guard policy:
switch(config-if)# no nd-snooping ra-guard attach-policy POLICY_NOT_CREATED Could not find the policy POLICY_NOT_CREATED.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2400

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
config-if config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

other-config-flag
other-config-flag [on | off] no other-config-flag [on | off]
Description
Enables the verification of the advertised other configuration flag. Verifies that the advertised Other Stateful Configuration flag is On or Off based on the configured value. The no form of the command disables other configuration flag verification.
ND snooping must be enabled in both the global context and the config-vlan context before this command can be used.

Parameter on

Description Verifies that the advertised Other Stateful Configuration flag is On.

off

Verifies that the advertised Other Stateful Configuration flag is

Off.

Examples
Enabling other configuration flag verification:

switch(config)# ipv6 nd-snooping ra-guard policy <POLICY-NAME> switch(config-raguard-policy)# other-config-flag off switch(config-raguard-policy)# other-config-flag on

Disabling other configuration flag verification:
switch(config)# ipv6 nd-snooping ra-guard policy <POLICY-NAME> switch(config-raguard-policy)# no other-config-flag

RA guard policy commands | 2401

switch(config-raguard-policy)# no other-config-flag off switch(config-raguard-policy)# no other-config-flag on

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-raguard-policy

Authority
Administrators or local user group members with execution rights for this command.

router-preference
router-preference {high | medium | low} no router-preference [high | medium | low]
Description
Enables the router preference verification on the RA guard policy for advertised packets and processes the packets only if the router preference is lower than the configured value. If the router preference is not configured, this validation is bypassed. The no form of this command disables router preference verification on the RA guard policy.

Parameter high medium low

Description Sets the maximum router preference to high. Sets the maximum router preference to medium. Sets the maximum router preference to low.

Examples
Enabling router preference verification with the maximum router preference set to high:

switch(config)# ipv6 nd-snooping ra-guard policy <POLICY-NAME> switch(config-raguard-policy)# router-preference high

Disabling router preference verification:

switch(config)# ipv6 nd-snooping ra-guard policy <POLICY-NAME> switch(config-raguard-policy)# no router-preference

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2402

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10 or earlier

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-raguard-policy

Authority
Administrators or local user group members with execution rights for this command.

show nd-snooping ra-guard interface
show nd-snooping ra-guard interface <INTERFACE-ID>
Description
Shows RA guard counters for the specified interface. Counters are cleared once the RA guard policy is detached from the interface.

Parameter <INTERFACE-ID>

Description
Specifies the interface for which the RA guard counters are displayed.

Examples
Showing RA guard counters for interface 1/1/1:

switch# show nd-snooping ra-guard interface 1/1/1

RA Guard Policy Counters ========================

RA Guard Policy Applied RA Packets Received RA Packets Forwarded RA Packets Dropped

: POLICY_2 : 10 :5 : 5 [Total]

reason : Managed flag error

[0]

Other flag error

[0]

Access list error

[0]

Prefix list error

[0]

Router preference error[0]

Hop limit error

[5]

For more information on features that use this command, refer to the IP Services Guide for your switch model.

RA guard policy commands | 2403

Command History

Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show nd-snooping ra-guard policy
show nd-snooping ra-guard policy [<POLICY-NAME>]
Description
Shows the RA guard policy configuration.

Parameter <POLICY-NAME>

Description Specifies the name of the RA guard policy to be displayed.

Examples
Showing RA guard configuration:

switch# show nd-snooping ra-guard policy

RA Guard Policy

Applied Ports

Applied VLANs

----------------------------------------------------------------------------------

--------

POLICY_NAME1

1/1/25,1/1/27,1/1/29-1/1/44,1/1/46

10,20,50-100

POLICY_NAME2

1/1/1-1/1/24

switch# show nd-snooping ra-guard policy POLICY_NAME1

RA Guard policy Information

========================

Policy name

: POLICY_NAME1

Policy Applied Ports : 1/1/25,1/1/27,1/1/29-1/1/44,1/1/46

Policy Applied VLANs : 10,20,50-100

Hop Limit

: enabled

minimum

: 50

maximum

: 150

Managed config flag

: On

Other config flag

: On

Access List

: ACL1

Prefix List

: PREFIX_LIST_NAME

Router Preference

: high

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2404

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show nd-snooping ra-guard vlan
show nd-snooping ra-guard vlan <VLAN-ID>]
Description
Shows RA guard counters for the specified VLAN. Counters are cleared once the RA guard policy is detached from the VLAN.

Parameter <VLAN-ID>

Description
Specifies a VLAN ID for which the RA guard counters are displayed. Range: 1 to 4094.

Examples
Showing RA guard counters for VLAN 2:

switch# show nd-snooping ra-guard vlan 2

RA Guard Policy Counters ========================

RA Guard Policy Applied RA Packets Received RA Packets Forwarded RA Packets Dropped

: POLICY_1 : 20 :5 : 15 [Total]

reason : Managed flag error

[1]

Other flag error

[4]

Access list error

[1]

Prefix list error

[4]

Router preference error[0]

Hop limit error

[5]

RA guard policy commands | 2405

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.10

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2406

Chapter 132
Remote AAA (TACACS+, RADIUS) commands

Remote AAA (TACACS+, RADIUS) commands
aaa accounting allow-fail-through
aaa accounting allow-fail-through no aaa accounting allow-fail-through
Description
Enables accounting fail-through. When this option is enabled, the next server or accounting method is attempted after an accounting failure. The no form of this command disables accounting fail-through.The system only attempts to reach the next server or accounting method if there is an accounting failure due to an unreachable TACACS+ or RADIUS server or a shared key mismatch error between the switch and the server.
Example
Enabling accounting fail-through:
switch(config)# aaa accounting allow-fail-through

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.12.1000

Command Information

Platforms All platforms

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

aaa accounting all-mgmt
aaa accounting all-mgmt <CONNECTION-TYPE> start-stop {local | group <GROUP-LIST>} no aaa accounting all-mgmt <CONNECTION-TYPE> start-stop {local | group <GROUP-LIST>}
Description

AOS-CX 10.14 Command-Line Interface Guide

2407

Defines accounting as being local (with the name local) (the default). Or defines a sequence of remote AAA server groups to be accessed for accounting purposes.
For remote accounting, the information is sent to the first reachable remote server that was configured with this command for remote accounting. If no remote server is reachable, local accounting remains available. Each available connection type (channel) can be configured individually as either local or using remote AAA server groups. All server groups named in your command, must exist. This command can be issued multiple times, once for each connection type. Local is always available for any connection type not configured for remote accounting.

The system accounting log is not associated with any connection type (channel) and is therefore sent to the accounting method configured on the default connection type (channel) only.
The no form of this command removes for the specified connection type, any defined remote AAA server group accounting sequence. Local accounting is available for connection types without a configured remote AAA server group list (whether default or for the specific connection type).

Parameter <CONNECTION-TYPE>
start-stop local group <GROUP-LIST>

Description
One of these connection types (channels): default
Defines a list of accounting server groups to be used for the default connection type. This configuration applies to all other connection types (console, ssh, https-server, telnet) that are not explicitly configured with this command. For example, if you do not use aaa accounting all-mgmt console... to define the console accounting list, then this default configuration is used for console.
console Defines a list of accounting server groups to be used for the console connection type.
ssh Defines a list of accounting server groups to be used for the ssh connection type.
https-server Defines a list of accounting server groups to be used for the https-server (REST, Web UI) connection type.
telnet Defines a list of accounting server groups to be used for the telnet connection type.
Selects accounting information capture at both the beginning and end of a process.
Selects local-only accounting when used without the group parameter.
Specifies the list of remote AAA server group names. Each name can be specified one time. Predefined remote AAA group names tacacs and radius are available. Although not a group name, predefined name local is available. User-defined TACACS+ and RADIUS server group names may also be used. The remote AAA server groups are accessed in the order that the group names are listed in this command. Within each group, the servers are accessed in the order in which the servers were added to the group. Server groups are defined using command aaa

Remote AAA (TACACS+, RADIUS) commands | 2408

Parameter

Description
group server and servers are added to a server group with the command server. If the remote server(s) in the group is unreachable or if there is a key mismatch error between the switch and the AAA Server, then the next accounting method is attempted.

Usage
Local accounting is always active. It cannot be turned off.
Examples
Defining the default accounting sequence based on two user-defined TACACS+ server groups, then the default TACACS+ server group, and finally (if needed), local accounting.

switch(config)# aaa accounting all-mgmt default start-stop group tg1 tg2 tacacs local

Defining the console accounting sequence based on two user-defined TACACS+ server groups, then the default TACACS+ server group, and finally (if needed), local accounting.

switch(config)# aaa accounting all-mgmt console start-stop group tg2 tg3 tacacs local

Defining the ssh accounting sequence based on one user-defined TACACS+ server group and then the default TACACS+ server group.

switch(config)# aaa accounting all-mgmt ssh start-stop group tg2 tacacs

Defining the Telnet accounting sequence based on one user-defined TACACS+ server group and then the default TACACS+ server groups.

switch(config)# aaa accounting all-mgmt telnet start-stop group tg1 tacacs

Defining the default accounting sequence based on two user-defined RADIUS server groups, then the default RADIUS server group, and finally (if needed), local accounting.

switch(config)# aaa accounting all-mgmt default start-stop group rg1 rg2 radius local

Defining the https-server accounting sequence based on one user-defined RADIUS server group and then the default RADIUS server group.

switch(config)# aaa accounting all-mgmt https-server start-stop group rg1 radius

Setting local accounting for the default connection type:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2409

switch(config)# aaa accounting all-mgmt default start-stop local

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08.0001

10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Added the telnet parameter for the 6200, 6300, 6400 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

aaa accounting port-access (RADIUS only)
General syntax definition: aaa accounting port-access {start-stop {{local | group <GROUP-NAME>} |{interim <INTERVAL> group <GROUP-NAME>}}} aaa accounting port-access {stop-only {local | group <GROUP-NAME>}} no aaa accounting port-access [local | group | interim]
List of all possible syntax for this command: aaa accounting port-access start-stop local aaa accounting port-access start-stop group <GROUP-NAME> aaa accounting port-access start-stop interim <INTERVAL> group <GROUP-NAME> aaa accounting port-access stop-only local aaa accounting port-access stop-only group <GROUP-NAME>
no aaa accounting port-access no aaa accounting port-access local no aaa accounting port-access group no aaa accounting port-access interim
Description
Configures port access accounting information that is captured for 802.1X and MAC-authenticated clients.
Defines port access accounting as being local (with the parameter local) (the default). Or defines port access accounting as being remote (with the parameter group <GROUP-NAME>) with a sequence of remote RADIUS servers in a single RADIUS server group to be accessed for port access accounting purposes.
For remote RADIUS port access accounting, the information is sent to the first reachable remote RADIUS server in the specified group. If a user-defined RADIUS server group is named in your command, it must exist.

Remote AAA (TACACS+, RADIUS) commands | 2410

The no form of this command works as follows:
n no aaa accounting port-access: Globally unconfigures port access accounting. n no aaa accounting port-access local: Unconfigures local port access accounting. n no aaa accounting port-access group: Unconfigures remote port access accounting. n no aaa accounting port-access interim: Unconfigures interim accounting updates.

Parameter start-stop stop-only local group <GROUP-NAME>
interim <INTERVAL>

Description
Selects accounting information capture from the point at which the client is authenticated until the client disconnects.
Selects accounting information capture only at the time when a client disconnects.
Selects local-only accounting.
Specifies a single RADIUS server group, either the built-in group named radius or a user-defined RADIUS server group. Only one RADIUS server group name can be provided.
Enables interim accounting updates (between the start and stop) and specifies the interval at which the interim updates will be provided. Default: 60 minutes. Range: 1 to 525600 minutes.

Examples
Configuring start-stop port access local accounting:

switch(config)# aaa accounting port-access start-stop local

Configuring start-stop port access remote accounting using the built-in radius server group:

switch(config)# aaa accounting port-access start-stop group radius

Configuring start-stop port access remote accounting using the built-in radius server group and enabling interim accounting updates with an interval of 60 minutes:

switch(config)# aaa accounting port-access start-stop interim 60 group radius

Configuring stop-only port access remote accounting using the built-in radius server group:

switch(config)# aaa accounting port-access stop-only group radius

Unconfiguring remote port access accounting:

switch(config)# no aaa accounting port-access group

For more information on features that use this command, refer to the Security Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2411

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

aaa authentication allow-fail-through
aaa authentication allow-fail-through no aaa authentication allow-fail-through
Description
Enables authentication fail-through. If this feature is enabled, the next server or authentication method is tried after an authentication failure. The no form of this command disables authentication fail-through. The system only attempts to reach the next server or authentication method if there is an accounting failure due to an unreachable TACACS+/RADIUS server or a shared key mismatch error between the switch and the server.
If your switch uses command authorization, best practices is to configure authorization fail-through before configuring authentication fail-through. If not, the switch may fall into an unusable state where authorization will fail for all commands.
Example
Enabling authentication fail-through:
switch(config)# aaa authentication allow-fail-through

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Remote AAA (TACACS+, RADIUS) commands | 2412

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

aaa authentication login
aaa authentication login <CONNECTION-TYPE> {local | group <GROUP-LIST>} no aaa authentication login <CONNECTION-TYPE> {local | group <GROUP-LIST>}
Description
Defines authentication as being local (with the name local) (the default). Or defines a sequence of remote AAA server groups to be accessed for authentication purposes. Each available connection type (channel) can be configured individually as either local or using remote AAA server groups. All server groups named in your command, must exist. This command can be issued multiple times, once for each connection type. Local is always available for any connection type not configured for remote AAA authentication.

If you do not want local authentication to occur in cases where all AAA servers contacted reject the user's credentials, do not enable authentication fail-through (command aaa authentication allow-fail-through).
The no form of this command removes for the specified connection type, any defined remote AAA server group authentication sequence. Local authentication is available for connection types without a configured remote AAA server group list (whether default or for the specific connection type).

Parameter <CONNECTION-TYPE>
local

Description
One of these connection types (channels): default
Defines a list of AAA server groups to be used for the default connection type. This configuration applies to all other connection types (console, ssh, https-server, telnet) that are not explicitly configured with this command. For example, if you do not use aaa accounting all-mgmt console... to define the console accounting list, then this default configuration is used for console.
console Defines a list of AAA server groups to be used for the console connection type.
ssh Defines a list of AAA server groups to be used for the ssh connection type.
https-server Defines a list of AAA server groups to be used for the httpsserver (REST, Web UI) connection type.
telnet Defines a list of AAA server groups to be used for the telnet connection type.
Selects local-only authentication when used without the group parameter.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2413

Parameter group <GROUP-LIST>

Description
Specifies the list of remote AAA server group names. Each name can be specified one time. Predefined remote AAA group names tacacs and radius are available. Although not a group name, predefined name local is available. User-defined TACACS+ and RADIUS server group names may also be used. The remote AAA server groups are accessed in the order that the group names are listed in this command. Within each group, the servers are accessed in the order in which the servers were added to the group. Server groups are defined using command aaa group server and servers are added to a server group with the command server. If the remote server(s) in the group is unreachable or if there is a key mismatch error between switch and the AAA Server, then the next authentication method is attempted.

Examples
Defining the default authentication sequence based on two user-defined TACACS+ server groups, then the default TACACS+ server group, and finally (if needed), local authentication.

switch(config)# aaa authentication login default group tg1 tg2 tacacs local

Defining the default authentication sequence based on two user-defined TACACS+ server groups, then the default TACACS+ server group, and finally (if needed), local authentication.

switch(config)# aaa authentication login console group tg2 tg3 tacacs local

Defining the ssh authentication sequence based on one user-defined TACACS+ server group and then the default TACACS+ server group.

switch(config)# aaa authentication login ssh group tg2 tacacs

Defining the Telnet authentication sequence with two user-defined TACACS+ server groups, the default TACACS+ server group, and finally (if needed), local authentication.

switch(config)# switch(config)# aaa authentication login telnet group tg1 tg2 tacacs local

Defining the default authentication sequence based on two user-defined RADIUS server groups, then the default RADIUS server group, and finally (if needed), local authentication.

switch(config)# aaa authentication login default group rg1 rg2 radius local

Defining the https-server authentication sequence based on one user-defined RADIUS server group and then the default RADIUS server group.

switch(config)# aaa authentication login https-server group rg1 radius

Setting local authentication for the default connection type:

Remote AAA (TACACS+, RADIUS) commands | 2414

switch(config)# aaa authentication login default local

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08.0001

10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Added the telnet parameter for the 6200, 6300, 6400 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

aaa authorization allow-fail-through
aaa authorization allow-fail-through no aaa authorization allow-fail-through
Description
Enables authorization fail-through. When this option is enabled, the next server or authorization method is attempted after an authorization failure. The no form of this command disables authorization fail-through. The system only attempts to reach the next server or authorization method if there is an authorization failure due to an unreachable TACACS+ server or a shared key mismatch error between the switch and the server.
If your switch uses command authorization, best practices is to configure authorization fail-through before configuring authentication fail-through. If not, the switch may fall into an unusable state where authorization will fail for all commands.
Example
Enabling authorization fail-through:
switch(config)# aaa authorization allow-fail-through
The following configurations use authorization fail-through in different scenarios. Example configuration one:
aaa authentication allow-fail-through aaa authorization allow-fail-through

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2415

aaa group server tacacs CPPM-TACACS server 172.16.1.12 aaa authentication login ssh group CPPM-TACACS local aaa authorization commands ssh group CPPM-TACACS local
Example configuration one does not support authentication via the TACACS+ server for a locally configured user. If the user is configured locally and that user does not have a profile present in the TACACS+ server, authentication fails with TACACS+, but the user is authenticated successfully with local authentication. Similarly, if authorization is rejected, the user is authorized locally with a fail-through configuration. Example configuration two:
aaa group server tacacs CPPM-TACACS server 172.16.1.12 aaa authentication allow-fail-through aaa authorization allow-fail-through aaa authentication login ssh group CPPM-TACACS local aaa authorization commands ssh group local CPPM-TACACS
With configuration two, if a user's profile is configured only in the TACACS+ server, user authorization is rejected locally and is authorized with TACACS using the fail-through configuration. When authentication fail-through is configured, if the first authentication method fails, authentication is attempted using the next server or authentication method. The authorization fail-through is based on the authorization sequence, and is independent of the authentication method of the user. Example configuration three:
aaa group server tacacs CPPM-TACACS server 172.16.1.12 aaa group server tacacs TACACS server 192.168.10.15 aaa authentication allow-fail-through aaa authorization allow-fail-through aaa authentication login ssh group CPPM-TACACS local aaa authorization commands ssh group TACACS local
Example configuration four:
aaa group server radius RAD-GRP server 172.16.1.12 aaa group server tacacs TACACS server 192.168.10.15 aaa authentication allow-fail-through aaa authorization allow-fail-through aaa authentication login ssh group RAD-GRP local aaa authorization commands ssh group TACACS local
With configurations three and four, the CPPM-TACACS or RAD-GRP groups reject authentication requests for locally configured users, and the users are authenticated locally with fail-through. Authorization is attempted with the TACACS group in these configurations, and if this authorization attempt fails, the user will be authorized locally due to the fail-through configuration.
Remote AAA (TACACS+, RADIUS) commands | 2416

When authorization is rejected by multiple servers/server groups due to the fail-through configuration, a delay may be seen while executing commands.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.12.1000

Command Information

Platforms All platforms

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

aaa authorization commands
aaa authorization commands <CONNECTION-TYPE> {local | none} no aaa authorization commands <CONNECTION-TYPE> {local | none} aaa authorization commands <CONNECTION-TYPE> group <GROUP-LIST> no aaa authorization commands <CONNECTION-TYPE> group <GROUP-LIST>
Description
Defines authorization as being basic local RBAC (specified as none), or as full-fledged local RBAC specified as local (the default), or as remote TACACS+ (specified with group <GROUP-LIST>). Each available connection type (channel) can be configured individually. All server groups named in the command, must exist. This command can be issued multiple times, once for each connection type. The no form of this command unconfigures authorization for the specified connection type, reverting to the default of local.
Although only TACACS+ servers are supported for remote authorization, local authorization (basic or full-fledged) can be used with remote RADIUS authentication. If your switch uses command authorization, best practices is to configure authorization fail-through before configuring authentication fail-through. If not, the switch may fall into an unusable state where authorization will fail for all commands.

Parameter <CONNECTION-TYPE>

Description
One of these connection types (channels): default
Selects the default connection type for configuration. This configuration applies to all other connection types (console, ssh, telnet) that are not explicitly configured with this command. For example, if you do not use aaa authorization commands console... to define the console authorization list, then this default configuration is used for console.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2417

Parameter local

Description
console Selects the console connection type for configuration.
ssh Selects the ssh connection type for configuration.
telnet Selects the telnet connection type for configuration.
When used alone without group <GROUP-LIST>, selects local authorization which can be used to provide authorization for a purely local setup without any remote AAA servers and also for when RADIUS is used for remote Authentication and Accounting but Authorization is local. When used after group, provides for fallback (to full-fledged local authorization) when every server in every specified TACACS+ server group cannot be reached.
NOTE: If any TACACS+ server in the specified groups is reachable, but the command fails to be authorized by that server, the command is rejected and local authorization is never attempted. Local authorization is only attempted if every TACACS+ server cannot be reached.

none

When used alone without group <GROUP-LIST>, selects basic local RBAC authorization, for use with the built-in user groups (administrators, operators, auditors). When used after group, provides for fallback (to basic local RBAC authorization) when every server in every specified TACACS+ server group cannot be reached.
NOTE: With none, for users belonging to user-defined user groups, all commands can be executed regardless of what authorization rules are defined in such groups. For per-command local authorization, use local instead.

group <GROUP-LIST>

Specifies the list of remote AAA server group names. Predefined remote AAA group name tacacs is available. User-defined TACACS+ server group names may also be used. The remote AAA server groups are accessed in the order that the group names are listed in this command. Within each group, the servers are accessed in the order in which the servers were added to the group. Server groups are defined using command aaa server group and servers are added to a server group using command server.
It is recommended to always include either the special name local or none as the last name in the group list. If both local and none are omitted, and no remote AAA server is reachable (or the first reachable server cannot authorize the command), command execution for the current user will not be possible.
If the AAA server(s) in the group are not reachable, or if there is a key mismatch error between the server and the switch, the next authorization method is attempted.

Usage
TACACS+ server authorization considerations

Remote AAA (TACACS+, RADIUS) commands | 2418

Use caution when configuring authorization, as it has no fail through. If the switch is not configured properly, the switch might get into an unusable state in which all command execution is prohibited.
To prevent authorization difficulties:
n Make sure that all listed TACACS+ servers can authorize users for command execution. n Make sure that credential database changes are promptly synchronized across all TACACS+ servers. n Make sure either local or none is included as the last name in the group list. If both local and none
are omitted, and no remote TACACS+ server is reachable (or the first reachable server cannot authorize), authorization will not be possible. n Although not recommended, if you choose to omit both local and none from the list, and are manipulating configuration files, special caution is necessary. If the source configuration includes TACACS+ authorization and you are copying configuration from an existing switch into the running configuration of a new switch, and you have not yet configured the interface or routing information to reach the TACACS+ server, the switch will enter an unusable state, requiring hard reboot. To avoid getting into this situation that can occur when local and none have been omitted, do either of the following: o In the configuration source, delete or comment-out the line configuring remote authorization. Then, after the configuration copy and paste, manually configure authorization. o Move the line configuring the authorization to the end of the source configuration before copying and pasting.
Examples
Defining the default authorization sequence based on a user-defined TACACS+ server group, then the default TACACS+ server group, and finally (as a precaution), local authorization:
switch(config)# aaa authorization commands default group tg1 tacacs local All commands will fail if none of the servers in the group list are reachable. Continue (y/n)? y
Defining the Telnet authorization sequence based on a user-defined TACACS+ server group, then the default TACACS+ server group, and finally (as a precaution), local authorization:
switch(config)# aaa authorization commands telnet group tg1 tacacs local All commands will fail if none of the servers in the group list are reachable. Continue (y/n)? y
Defining the console authorization sequence based on two user-defined TACACS+ server groups, and finally (as a precaution), local authorization:
switch(config)# aaa authorization commands console group tg1 tg2 local All commands will fail if none of the servers in the group list are reachable. Continue (y/n)? y
Setting the authorization for default to local:
switch(config)# aaa authorization commands default local

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2419

Setting the authorization for the SSH interface to none: switch(config)# aaa authorization commands ssh none

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.08.0001

10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Added the telnet parameter for the 6200, 6300, 6400 Switch Series. --
Authority Administrators or local user group members with execution rights for this command.

aaa group server
aaa group server {tacacs | radius} <SERVER-GROUP-NAME> no aaa group server {tacacs | radius} <SERVER-GROUP-NAME>
Description
Creates an AAA server group that is either empty or contains preconfigured RADIUS/TACACS+ servers. You can create a maximum of 28 server groups. The no form of this command deletes a server group. Only a preconfigured user-defined RADIUS/TACACS+ server group can be deleted. RADIUS or TACACS+ servers that were in a deleted server group remain a part of their default server group. The default server group for TACACS+ servers is tacacs. The default server group for RADIUS servers is radius.

Parameter server {tacacs | radius} <SERVER-GROUP-NAME>

Description
Select either tacacs or radius for the server type.
Specifies the name of the server group to be created. The name of the server group can have a maximum of 32 characters.

Examples
Creating TACACS+ server group sg1:

switch(config)# aaa group server tacacs sg1

Creating RADIUS server group sg3:

Remote AAA (TACACS+, RADIUS) commands | 2420

switch(config)# aaa group server radius sg3 Deleting TACACS+ server group sg1:
switch(config)# no aaa group server tacacs sg1 Deleting RADIUS server group sg3:
switch(config)# no aaa group server radius sg3

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

radius-server auth-type
radius-server auth-type {pap | chap} no radius-server auth-type {pap | chap}
Description
Enables the CHAP or PAP authentication protocol, which is used for communication with the RADIUS servers, at the global level. You can override this command with a fine-grained per server auth-type configuration. The no form of this command resets the global authentication mechanism for RADIUS to PAP or CHAP. PAP is the default authentication mechanism for RADIUS.

Parameter auth-type {pap | chap}

Description Selects either the PAP or CHAP authentication protocol.

Examples
Authenticating CHAP:

switch(config)# radius-server auth-type chap

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2421

Authenticating PAP: switch(config)# radius-server auth-type pap
Removing CHAP authentication: switch(config)# no radius-server auth-type chap

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

radius-server host
radius-server host {<FQDN> | <IPV4> | <IPV6>} [key [plaintext <PASSKEY> | ciphertext <PASSKEY>]] [timeout <TIMEOUT-SECONDS>] [port <PORT-NUMBER>] [auth-type {pap | chap}] [acct-port <ACCT-PORT>] [retries <RETRY-COUNT>] [tracking {enable | disable}] [tracking-mode {any | dead-only}][vrf <VRF-NAME>]
no radius-server host {<FQDN> | <IPV4> | <IPV6>} [key [plaintext <PASSKEY> | ciphertext <PASSKEY>]] [timeout <TIMEOUT-SECONDS>] [port <PORT-NUMBER>] [auth-type {pap | chap}] [acct-port <ACCT-PORT>] [retries <RETRY-COUNT>] [tracking {enable | disable}] [tracking-mode {any | dead-only}][vrf <VRF-NAME>]
Description
Adds a RADIUS server. By default, the RADIUS server is associated with the server group named radius. The no form of this command removes a previously added RADIUS server.
For enhanced security with IPsec, the alternative command radius-server host secure ipsec is available. The standard non-IPsec radius-server host command does not modify any existing IPsec configuration. If IPsec is already configured for the RADIUS server, then IPsec will remain enabled for the server.

Parameter {<FQDN> | <IPV4> | <IPv6>}

Description Specifies the RADIUS server as:

Remote AAA (TACACS+, RADIUS) commands | 2422

Parameter key [plaintext <PASSKEY> |
ciphertext <PASSKEY>]
timeout <TIMEOUT-SECONDS> port <PORT-NUMBER> auth-type {pap | chap} acct-port <ACCT-PORT> retries <RETRY-COUNT> tracking {enable | disable}
tracking-mode {any | dead-only}

Description
n <FQDN>: a fully qualified domain name. n <IPV4>: an IPv4 address. n <IPV6>: an IPv6 address.
Selects either a plaintext or an encrypted local shared-secret passkey for the server. As per RFC 2865, shared-secret can be a mix of alphanumeric and special characters. Plaintext passkeys are between 1 and 32 alphanumeric and special characters.
NOTE: When key is entered without either sub-parameter, plaintext passkey prompting occurs upon pressing Enter. Enter must be pressed immediately after the key parameter without entering other parameters. The entered passkey characters are masked with asterisks. When key is omitted, the server uses the global passkey. This command requires either the global or local passkey to be set; otherwise the server will not be contacted. Command radius-server key is available for setting the global passkey.
Specifies the timeout. Range: 1 to 60 seconds. If a timeout is not specified, the value from the global timeout for RADIUS is used.
Specifies the authentication port number. Range: 1 to 65535. Default: 1812.
Selects either the PAP (the default) or CHAP authentication types. If this parameter is not specified, the RADIUS global default is used.
Specifies the UDP accounting port number. Range: 1 to 65535. Default: 1813.
Specifies the number of retry attempts for contacting the specified RADIUS server. Range is 0 to 5 attempts. If no retry value is provided, the default value of 1 is used.
Enables or disables server tracking for the RADIUS server. Tracked servers are probed at the start of each server tracking interval to check if they are reachable. Use command radius-server tracking to configure RADIUS server tracking globally.
NOTE: Server tracking uses authentication request and response packets to determine server reachability status. The server tracking user name and password are used to form the request packet which is sent to the server with tracking enabled. Upon receiving a response to the request packet, the server is considered to be reachable.
Configures tracking mode for the RADIUS server that has tracking enabled with the server. The tracking mode is used to monitor the status of RADIUS server reachability The default tracking mode is any. any
Track the RADIUS server irrespective of its server reachability. dead-only

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2423

Parameter vrf <VRF-NAME>

Description
Track the RADIUS server only when the server is marked as unreachable.
Specifies the VRF name to be used for communicating with the server. If no VRF name is provided, the default VRF named default is used.

Usage
If the fully qualified domain name is provided for the RADIUS server, a DNS server must be configured and accessible through the same VRF which is configured for the RADIUS server. This configuration is required for the resolution of the RADIUS server hostname to its IP address. If a DNS server is not available for this VRF, the RADIUS servers reachable through this VRF must be configured by means of their IP addresses only.
Examples
Adding a RADIUS server with an IPv4 address and a prompted passkey:

switch(config)# radius-server host 1.1.1.5 key Enter the RADIUS server key: ********* Re-Enter the RADIUS server key: *********

Deleting a RADIUS server with an IPv4 address and a prompted passkey:

switch(config)# no radius-server host 1.1.1.5 key Enter the RADIUS server key: ********* Re-Enter the RADIUS server key: *********

Adding a RADIUS server with an IPv4 address and a named VRF:

switch(config)# radius-server host 1.1.1.1 vrf mgmt

Deleting a RADIUS server with an IPv4 address and a named VRF:

switch(config)# no radius-server host 1.1.1.1 vrf mgmt

Adding a RADIUS server with an IPv4 address, a port, and a named VRF:

switch(config)# radius-server host 1.1.1.2 port 32 vrf mgmt

Deleting a RADIUS server with an IPv4 address, a port, and a named VRF:

switch(config)# no radius-server host 1.1.1.2 port 32 vrf mgmt

Remote AAA (TACACS+, RADIUS) commands | 2424

Adding a RADIUS server with an FQDN, a timeout, port number, and a named VRF: switch(config)# radius-server host abc.com timeout 15 port 32 vrf vrf_blue
Deleting a RADIUS server with an FQDN, a timeout, port number, and a named VRF: switch(config)# no radius-server host abc.com timeout 15 port 32 vrf vrf_blue
Adding a RADIUS server with an IPv6 address: switch(config)# radius-server host 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Deleting a RADIUS server with an IPv6 address: switch(config)# no radius-server host 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Adding a RADIUS server with tracking enabled and tracking mode is set to dead-only: switch(config)# radius-server host 1.1.1.1 tracking enable tracking-mode dead-only
Deleting a RADIUS server with tracking enabled and tracking mode is set to dead-only: switch(config)# no radius-server host 1.1.1.1 tracking enable tracking-mode deadonly
Adding a RADIUS server with tracking disabled: switch(config)# radius-server host 1.1.1.1 tracking disable
Deleting a RADIUS server with tracking disabled: switch(config)# no radius-server host 1.1.1.1 tracking disable
Adding a RADIUS server with an IPv4 address, key, encrypted passkey, number of retries, and VRF name: switch(config)# radius-server host 1.1.1.6 key ciphertext AQBapStbgHt1X2JlbcEcQl xbbzWjrFr9UsfH3+00x5Qj0qcQBAAAAJ5WZBQ= retries 3 vrf vrf_red
Deleting a RADIUS server with an IPv4 address, key, encrypted passkey, number of retries, and VRF name:
switch(config)# no radius-server host 1.1.1.6 key ciphertext AQBapStbgHt1X2JlbcEcQl xbbzWjrFr9UsfH3+00x5Qj0qcQBAAAAJ5WZBQ= retries 3 vrf vrf_red

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2425

Deleting a RADIUS server with an IPv4 address and specified VRF: switch(config)# no radius-server host 1.1.1.1 vrf mgmt
Deleting a RADIUS server with an FQDN, port, and specified VRF: switch(config)# no radius-server host abc.com port 32 vrf vrf_blue

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

radius-server host (ClearPass)
radius-server host {<FQDN> | <IPV4> | <IPV6>} clearpass-username <CP-USERNAME> clearpass-password [plaintext <PLAINTEXT-PASSWORD> | ciphertext <CIPHERTEXT-PASSWORD>]
Description
Configures the ClearPass username and password for a radius server.

Parameter {<FQDN> | <IPV4> | <IPv6>}
clearpass-username <CP-USERNAME> clearpass-password plaintext
<PLAINTEXT-PASSWORD>
clearpass-password ciphertext <CIPHERTEXT-PASSWORD>

Description
Specifies the RADIUS server as: n <FQDN>: a fully qualified domain name. n <IPV4>: an IPv4 address. n <IPV6>: an IPv6 address.
Specifies the ClearPass username.
Specifies the password as plaintext. The password is visible as cleartext when entered but is encrypted thereafter. Command history does show the password as cleartext.
Specifies the password as Base64 ciphertext.
NOTE: When clearpass-password is entered without a following sub-parameter, plaintext password prompting occurs upon pressing Enter. The entered password characters are masked with asterisks.

Remote AAA (TACACS+, RADIUS) commands | 2426

Examples
Configuring a ClearPass username and password for a radius server with a plaintext password:
switch(config)# radius-server host 1.1.1.2 clearpass-username admn1 clearpass-password plaintext uni@#1
Configuring a ClearPass username and password for a radius server with a prompted plaintext password:
switch(config)# radius-server host 1.1.1.3 clearpass-username op clearpasspassword Enter the ClearPass server password: ********* Re-Enter the ClearPass server password: *********
Configuring a ClearPass username and password for a radius server with a ciphertext password:
switch(config)# radius-server host 1.1.1.4 clearpass-username bx clearpasspassword
ciphertext AQBpXz13c1U1Jt7KMjAIOgjE/lPDfgrYxT6SCi+Di2B+CAAAOnPZmUvMVpq

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

radius-server host secure ipsec
Syntax for a RADIUS server that uses IPsec for authentication: radius-server host {<FQDN> | <IPV4> | <IPV6>}
[key [plaintext <PASSKEY> | ciphertext <PASSKEY>]] [timeout <TIMEOUT-SECONDS>] [port <PORT-NUMBER>] [auth-type {pap | chap}] [acct-port <ACCT-PORT>] [retries <RETRY-COUNT>] [tracking {enable | disable}] [tracking-mode {any | dead-only}] [vrf <VRF-NAME>] secure ipsec authentication spi <SPI-INDEX> <AUTH-TYPE> <AUTH-KEY-TYPE> [<AUTH-KEY>] no radius-server host {<FQDN> | <IPV4> | <IPV6>} [key [plaintext <PASSKEY> | ciphertext <PASSKEY>]] [timeout <TIMEOUT-SECONDS>] [port <PORT-NUMBER>] [auth-type {pap | chap}] [acct-port <ACCT-PORT>] [retries <RETRY-COUNT>] [tracking {enable | disable}] [tracking-mode {any | dead-only}] [vrf <VRF-NAME>] secure ipsec authentication spi <SPI-INDEX><AUTH-TYPE><AUTH-KEY-TYPE> [<AUTH-KEY>]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2427

Syntax for a RADIUS server that uses IPsec for both authentication and encryption: radius-server host {<FQDN> | <IPV4> | <IPV6>}
[key [plaintext <PASSKEY> | ciphertext <PASSKEY>]] [timeout <TIMEOUT-SECONDS>] [port <PORT-NUMBER>] [auth-type {pap | chap}] [acct-port <ACCT-PORT>] [retries <RETRY-COUNT>] [tracking {enable | disable}] [tracking-mode {any | dead-only}] [vrf <VRF-NAME>] secure ipsec encryption spi <SPI-INDEX> <AUTH-TYPE> <AUTH-KEY-TYPE> [<AUTH-KEY>] <ENCRYPT-TYPE> <ENCRYPT-KEY-TYPE> [<ENCRYPT-KEY>] no radius-server host {<FQDN> | <IPV4> | <IPV6>} [key [plaintext <PASSKEY> | ciphertext <PASSKEY>]] [timeout <TIMEOUT-SECONDS>] [port <PORT-NUMBER>] [auth-type {pap | chap}] [acct-port <ACCT-PORT>] [retries <RETRY-COUNT>] [tracking {enable | disable}] [tracking-mode {any | dead-only}] [vrf <VRF-NAME>] secure ipsec encryption spi <SPI-INDEX><AUTH-TYPE><AUTH-KEY-TYPE> [<AUTH-KEY>] <ENCRYPT-TYPE><ENCRYPT-KEY-TYPE> [<ENCRYPT-KEY>]
Description
Adds a RADIUS server that uses IPsec for enhanced security (authentication and possibly encryption). By default, the RADIUS server is associated with the server group named radius. The no form of this command removes a previously added RADIUS (with IPsec) server.
Unless enhanced security with IPsec is required, use the radius-server host command instead.

Parameter {<FQDN> | <IPV4> | <IPv6>} key [plaintext <PASSKEY> |
ciphertext <PASSKEY>]
timeout <TIMEOUT-SECONDS> port <PORT-NUMBER> auth-type {pap | chap}

Description
Specifies the RADIUS server as: n <FQDN>: a fully qualified domain name. n <IPV4>: an IPv4 address. n <IPV6>: an IPv6 address.
Selects either a plaintext or an encrypted local shared-secret passkey for the server. As per RFC 2865, shared-secret can be a mix of alphanumeric and special characters. Plaintext passkeys are between 1 and 32 alphanumeric and special characters.
NOTE: When key is entered without either sub-parameter, plaintext passkey prompting occurs upon pressing Enter. Enter must be pressed immediately after the key parameter without entering other parameters. The entered passkey characters are masked with asterisks. When key is omitted, the server uses the global passkey. This command requires either the global or local passkey to be set; otherwise the server will not be contacted. Command radius-server key is available for setting the global passkey.
Specifies the timeout. Range: 1 to 60 seconds. If a timeout is not specified, the value from the global timeout for RADIUS is used.
Specifies the authentication port number. Range: 1 to 65535. Default: 1812.
Selects either the PAP (the default) or CHAP authentication types. If this parameter is not specified, the RADIUS global default is used.

Remote AAA (TACACS+, RADIUS) commands | 2428

Parameter acct-port <ACCT-PORT> retries <RETRY-COUNT> tracking {enable | disable}
tracking-mode {any | dead-only}
vrf <VRF-NAME> spi <SPI-INDEX> <AUTH-TYPE> <AUTH-KEY-TYPE> [<AUTH-KEY>]

Description
Specifies the UDP accounting port number. Range: 1 to 65535. Default: 1813.
Specifies the number of retry attempts for contacting the specified RADIUS server. Range is 0 to 5 attempts. If no retry value is provided, the default value of 1 is used.
Enables or disables server tracking for the RADIUS server. Tracked servers are probed at the start of each server tracking interval to check if they are reachable. Use command radius-server tracking to configure RADIUS server tracking globally.
NOTE: Server tracking uses authentication request and response packets to determine server reachability status. The server tracking user name and password are used to form the request packet which is sent to the server with tracking enabled. Upon receiving a response to the request packet, the server is considered to be reachable.
Configures tracking mode for the RADIUS server that has tracking enabled with the server. The tracking mode is used to monitor the status of RADIUS server reachability The default tracking mode is any. any
Track the RADIUS server irrespective of its server reachability. dead-only
Track the RADIUS server only when the server is marked as unreachable.
Specifies the VRF name to be used for communicating with the server. If no VRF name is provided, the default VRF named default is used.
Specifies the Security Parameters Index. The SPI is an identification tag carried in the IPsec AH header. The SPI must be unique on the switch. Range: 256 to 4294967295.
Specifies the authentication algorithm: md5, sha1, or sha256.
Specifies the authentication key type: plaintext, hex-string, or ciphertext.
Specifies the authentication key. For <AUTH-TYPE> of ciphertext, this is the ciphertext string. For <AUTH-TYPE> of plaintext or hex-string: n md5 (plaintext): 1 to 16 characters, (hex-string): 2 to 32
hexadecimal digits. n sha1 (plaintext): 1 to 20 characters, (hex-string): 2 to 40
hexadecimal digits. n sha256 (plaintext): 1 to 32 characters, (hex-string): 2 to 64
hexadecimal digits.
NOTE: When <AUTH-KEY-TYPE> is not followed by <AUTH-KEY>, plaintext authentication key prompting occurs upon pressing

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2429

Parameter
<ENCRYPT-TYPE> <ENCRYPT-KEY-TYPE> [<ENCRYPT-KEY>]

Description
Enter. Enter must be pressed immediately after the <AUTH-KEYTYPE> parameter without entering other parameters. The entered authentication key characters are masked with asterisks.
Specifies the encryption algorithm: 3des, aes, des, or null.
Specifies the encryption key type: plaintext, hex-string, or ciphertext.
Specifies the encryption key. For <ENCRYPT-TYPE> of ciphertext, this is the ciphertext string. For <ENCRYPT-TYPE> of plaintext or hex-string: n 3des (plaintext): 24 characters, (hex-string): 48 hexadecimal
digits. n aes (plaintext): 16, 24, or 32 characters, (hex-string): 32, 48,
or 64 hexadecimal digits. n des (plaintext): 8 characters, (hex-string): 16 hexadecimal
digits.
NOTE: When <ENCRYPT-KEY-TYPE> is not followed by <ENCRYPT-KEY>, plaintext encryption key prompting occurs upon pressing Enter. Enter must be pressed immediately after the <ENCRYPT-KEY-TYPE> parameter without entering other parameters. The entered encryption key characters are masked with asterisks.

Usage
If the fully qualified domain name is provided for the RADIUS server host, a DNS server must be configured and accessible through the same VRF as mentioned for the server host. This configuration is required for the resolution of the RADIUS server hostname to its IP address. If a DNS server is not available for this VRF, the RADIUS servers reachable through this VRF must be configured by means of their IP addresses only.
Examples
Adding a RADIUS server with an IPv4 address, a plaintext passkey, and IPsec authentication (md5 plaintext).
switch(config)# radius-server host 1.1.1.1 key plaintext 98ab vrf mgmt secure ipsec authentication spi 261 md5 plaintext 1abc
Deleting a RADIUS server with an IPv4 address, a plaintext passkey, and IPsec authentication (md5 plaintext).
switch(config)# no radius-server host 1.1.1.1 key plaintext 98ab vrf mgmt secure ipsec authentication spi 261 md5 plaintext 1abc
Adding a RADIUS server with an IPv4 address and a prompted IPsec authentication (md5) plaintext authentication key.

Remote AAA (TACACS+, RADIUS) commands | 2430

switch(config)# radius-server host 1.1.1.1 secure ipsec authentication spi 261 md5 Enter the IPsec authentication key: ******** Re-Enter the IPsec authentication key: ********
Deleting a RADIUS server with an IPv4 address and a prompted IPsec authentication (md5) plaintext authentication key.
switch(config)# no radius-server host 1.1.1.1 secure ipsec authentication spi 261 md5 Enter the IPsec authentication key: ******** Re-Enter the IPsec authentication key: ********
Adding a RADIUS server with an IPv4 address, IPsec authentication (MD5 plaintext), and IPsec encryption (AES plaintext):
switch(config)# radius-server host 1.1.1.2 vrf mgmt secure ipsec encryption spi 262 md5 plaintext 9xyz aes plaintext 1234567890abcdef
Deleting a RADIUS server with an IPv4 address, IPsec authentication (MD5 plaintext), and IPsec encryption (AES plaintext):
switch(config)# no radius-server host 1.1.1.2 vrf mgmt secure ipsec encryption spi 262 md5 plaintext 9xyz aes plaintext 1234567890abcdef
Adding a RADIUS server by providing an IPv4 address and IPsec MD5 authentication type, and then responding to prompts for the keys and encryption type:
switch(config)# radius-server host 1.1.1.6 secure ipsec encryption spi 262 md5 Enter the IPsec authentication key: ******** Re-Enter the IPsec authentication key: ********
Enter the IPsec encryption type (3des/aes/des/null)? aes
Enter the IPsec encryption key: ******** Re-Enter the IPsec encryption key: ********
Deleting a RADIUS server by providing an IPv4 address and IPsec MD5 authentication type, and then responding to prompts for the keys and encryption type:
switch(config)# no radius-server host 1.1.1.6 secure ipsec encryption spi 262 md5 Enter the IPsec authentication key: ******** Re-Enter the IPsec authentication key: ********
Enter the IPsec encryption type (3des/aes/des/null)? aes
Enter the IPsec encryption key: ******** Re-Enter the IPsec encryption key: ********
Adding a RADIUS server with an IPv4 address, tracking enabled, tracking mode, IPsec authentication (MD5 plaintext), IPsec encryption (AES plaintext) is set to dead-only:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2431

switch(config)# radius-server host 1.1.1.1 tracking enable tracking-mode dead-only vrf mgmt secure ipsec encryption spi 262 md5 plaintext 9xyz aes plaintext 1234567890abcdef
Deleting a RADIUS server with an IPv4 address, tracking enabled, tracking mode, IPsec authentication (MD5 plaintext), IPsec encryption (AES plaintext) is set to dead-only:
switch(config)# no radius-server host 1.1.1.1 tracking enable tracking-mode deadonly
vrf mgmt secure ipsec encryption spi 262 md5 plaintext 9xyz aes plaintext 1234567890abcdef
Removing a RADIUS server:
switch(config)# no radius-server host 1.1.1.1 vrf mgmt
Removing the ipsec configuration from a RADIUS server:
switch(config)# no radius-server host 1.1.1.2 vrf mgmt secure ipsec encryption

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

radius-server host tls (RadSec)
radius-server host {<FQDN> | <IPV4> | <IPV6>}tls [timeout <TIMEOUT-SECONDS>] [port <PORTNUMBER>][auth-type {pap | chap}] [tracking {enable | disable}] [tracking-mode {any |
deadonly}] [vrf <VRF-NAME>]
no radius-server host {<FQDN> | <IPV4> | <IPV6>}tls [timeout <TIMEOUT-SECONDS>] [port <PORT-
NUMBER>][auth-type {pap | chap}] [tracking {enable | disable}] [tracking-mode {any | dead-
only}] [vrf <VRF-NAME>]
Description

Remote AAA (TACACS+, RADIUS) commands | 2432

Adds a RadSec server. By default, the RADIUS server is associated with the server group named radius. RadSec is used to secure the communication between RADIUS server and RADIUS client using TLS. The no form of this command removes a previously added RadSec server.
The shared key will be added as radsec for connection establishment.

Parameter {<FQDN> | <IPV4> | <IPv6>}
tls timeout <TIMEOUT-SECONDS> port <PORT-NUMBER> auth-type {pap | chap}
acct-port <ACCT-PORT> tracking {enable | disable}

Description
Specifies the RADIUS server as: n <FQDN>: a fully qualified domain name. n <IPV4>: an IPv4 address. n <IPV6>: an IPv6 address.
Establishes RADIUS connection over TLS.
Specifies the timeout. Range: 1 to 60 seconds. If a timeout is not specified, the value from the global timeout for RADIUS is used.
Specifies the authentication port number. Range: 1 to 65535. Default: 1812.
Selects either the PAP (the default) or CHAP authentication types. If this parameter is not specified, the RADIUS global default is used.
Specifies the UDP accounting port number. Range: 1 to 65535. Default: 1813.
Enables or disables server tracking for the RADIUS server. Tracked servers are probed at the start of each server tracking interval to check if they are reachable. Use command radius-server tracking to configure RADIUS server tracking globally.
NOTE: Server tracking uses authentication request and response packets to determine server reachability status. The server tracking user name and password are used to form the request packet which is sent to the server with tracking enabled. Upon receiving a response to the request packet, the server is considered to be reachable.

tracking-mode {any | dead-only} vrf <VRF-NAME>

Configures tracking mode for the RADIUS server that has tracking enabled with the server. The tracking mode is used to monitor the status of RADIUS server reachability The default tracking mode is any. any
Track the RADIUS server irrespective of its server reachability. dead-only
Track the RADIUS server only when the server is marked as unreachable.
Specifies the VRF name to be used for communicating with the server. If no VRF name is provided, the default VRF named default is used.

Examples
Adding a RADIUS server over TLS with an IPv4 address and a named VRF:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2433

switch(config)# radius-server host 1.1.1.1 tls vrf mgmt Deleting a RADIUS server over TLS with an IPv4 address and a named VRF:
switch(config)# no radius-server host 1.1.1.1 tls vrf mgmt Adding a RADIUS server over TLS with an IPv4 address and default port:
switch(config)# radius-server host 1.1.1.1 tls port Deleting a RADIUS server over TLS with an IPv4 address and default port:
switch(config)# no radius-server host 1.1.1.1 tls port Adding a RADIUS server over TLS with tracking enabled and tracking mode is set to dead-only:
switch(config)# radius-server host 1.1.1.1 tls tracking enable tracking-mode deadonly Deleting a RADIUS server over TLS with tracking enabled and tracking mode is set to dead-only: switch(config)# no radius-server host 1.1.1.1 tls tracking enable tracking-mode dead-only Adding a RADIUS server over TLS with an IPv4 address, a port, and a named VRF: switch(config)# radius-server host 1.1.1.2 tls port 32 vrf mgmt Deleting a RADIUS server over TLS with an IPv4 address, a port, and a named VRF: switch(config)# no radius-server host 1.1.1.2 tls port 32 vrf mgmt Adding a RADIUS server over TLS with an IPv6 address: switch(config)# radius-server host 2001:0db8:85a3:0000:0000:8a2e:0370:7334 tls Deleting a RADIUS server over TLS with an IPv6 address: switch(config)# no radius-server host 2001:0db8:85a3:0000:0000:8a2e:0370:7334 tls
For more information on features that use this command, refer to the Security Guide for your switch model.
Command History
Remote AAA (TACACS+, RADIUS) commands | 2434

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

radius-server host tls port-access
radius-server host {<FQDN> | <IPV4> | <IPV6>} tls port-access {status-server | keepalive} no radius-server host {<FQDN> | <IPV4> | <IPV6>} tls port-access {status-server | keepalive}

Description
Configures the type of messages to be sent inside RadSec sessions for port access authentication. Default message type for port access authentication sessions is status-server. The no form of this command removes the message type configured for port access authentication sessions and sets the default, status-server.

Parameter {<FQDN> | <IPV4> | <IPv6>}
port-access {status-server | keep-alive}

Description
Specifies the RADIUS server as: n <FQDN>: a fully qualified domain name. n <IPV4>: an IPv4 address. n <IPV6>: an IPv6 address.
Specifies the message type to be used for port access authentication in RadSec sessions. Following message types are supported: n status-server: Sets status server message type for authentication. n keep-alive: Sets keep-alive message type for authentication.
NOTE: Keep-alive as tracking method and for port access sessions is recommended in networks where a RadSec server is connected to more number of RadSec clients. The server requires additional resources to process status-server and access-request messages when compared to keep-alive messages. This is because status-server and access-request messages are RADIUS protocol packets. However, keep-alive packets are TCP control packets that does not require any additional resources for processing by the RadSec server.

Examples
Configuring the keep-alive messages for port access authentication in RadSec session on host 1.1.1.1:
switch(config)# radius-server host 1.1.1.1 tls port-access keep-alive

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2435

Deleting the message type configured on host 1.1.1.1 for port access authentication session and setting the method to the default, status-server:
switch(config)# no radius-server host 1.1.1.1 tls port-access status-server

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

radius-server host tls tracking-method
radius-server host {<FQDN> | <IPV4> | <IPV6>} tls tracking-method {status-server | keepalive | access-request} no radius-server host {<FQDN> | <IPV4> | <IPV6>} tls tracking-method {status-server | keep-alive | access-request}
Description
Configures the tracking method to be used for RADIUS server tracking. RADIUS server tracking must be configured for enabling the tracking method. Default tracking method is access-request. The no form of this command sets the tracking method to the default option, access-request.

Parameter {<FQDN> | <IPV4> | <IPv6>}
tracking-method {status-server | keep-alive | access-request}

Description
Specifies the RADIUS server as: n <FQDN>: a fully qualified domain name. n <IPV4>: an IPv4 address. n <IPV6>: an IPv6 address.
Specifies the tracking method for RadSec tracking. Following methods are supported: n status-server: Status server responses are
used to update the reachability status of the RadSec server. n keep-alive: Server socket status is verified to update the reachability status of the RadSec server.

Remote AAA (TACACS+, RADIUS) commands | 2436

Parameter

Description

NOTE: keep-alive as tracking method and for port access sessions is recommended in networks where a RadSec server is connected to more number of RadSec clients. The server requires additional resources to process status-server and access-request messages when compared to keep-alive messages. This is because status-server and access-request messages are RADIUS protocol packets. However, keep-alive packets are TCP control packets that does not require any additional resources for processing by the RadSec server.
n access-request: Access response messages
are used to update the reachability status of
the RadSec server.

Usage
n If the network has a RADIUS proxy, then it is recommended to use the access-request tracking method to track the RadSec server.
n If keep-alive is the tracking method, then make sure to check whether the server has the capability to treat the keep-alive messages sent in RadSec sessions as valid RadSec messages to keep the session active.
Examples
Configuring the RADIUS server tracking method on host 1.1.1.1:

switch(config)# radius-server host 1.1.1.1 tls tracking-method status-server

Deleting the RADIUS server tracking method on host 1.1.1.1 and setting the method to the default, access-request:

switch(config)# no radius-server host 1.1.1.1 tls tracking-method access-request

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.10
Command Information

Modification Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2437

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

radius-server key
radius-server key [plaintext <GLOBAL-PASSKEY> | ciphertext <GLOBAL-PASSKEY>] no radius-server key [plaintext <GLOBAL-PASSKEY> | ciphertext <GLOBAL-PASSKEY>]
Description
Creates or modifies a RADIUS global passkey. The RADIUS global passkey is used as a shared-secret for encrypting the communication between all RADIUS servers and the switch. The RADIUS global passkey is required for authentication unless local passkeys have been set. By default, the RADIUS global passkey is empty. If the administrator has not set this key, the switch will not be able to perform RADIUS authentication. The switch will instead rely on the authentication mechanism configured with aaa authentication login.
When this command is entered without parameters, plaintext passkey prompting occurs upon pressing Enter. The entered passkey characters are masked with asterisks.
The no form of the command removes the global passkey.

Parameter plaintext <GLOBAL-PASSKEY>
ciphertext <GLOBAL-PASSKEY>

Description
Specifies the RADIUS global passkey in plaintext format with a length of 1 to 31 characters. As per RFC 2865, a shared-secret can be a mix of alphanumeric and special characters.
Specifies the RADIUS global passkey in encrypted format.

Examples
Adding the global passkey:

switch(config)# radius-server key plaintext mypasskey123

Adding the global passkey with prompting: switch(config)# radius-server key Enter the RADIUS server key: ********* Re-Enter the RADIUS server key: *********
Removing the global passkey: switch(config)# no radius-server key
For more information on features that use this command, refer to the Security Guide for your switch model.

Remote AAA (TACACS+, RADIUS) commands | 2438

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

radius-server retries
radius-server retries <0-5> no radius-server retries <0-5>
Description
Sets at the global level the number of retries the switch makes before concluding that the RADIUS server is unreachable. You can override this setting with a fine-grained per RADIUS server retries configuration. The no form of this command resets the RADIUS global retries to the default retries value of 1.

Parameter retries <0-5>

Description
Specifies the number of retry attempts for contacting RADIUS servers. Range is 0 to 5 retries.

Example

switch(config)# radius-server retries 3

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2439

radius-server status-server interval
radius-server status-server interval <10-86400> no radius-server status-server interval <10-86400>
Description
Configures the time interval in seconds to send the status server requests to the RADIUS server. The no form of this command configures the default time interval, 300 seconds.

Parameter <10-86400>

Description Specifies the status server time interval in seconds. Default: 300.

Examples
Configuring the status server time interval of 200 seconds:

switch(config)# radius-server status-server interval 200

Resetting the status server time interval to the default, 300 seconds:

switch(config)# no radius-server status-server interval 200

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.10

Command Information

Platforms All platforms

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

radius-server timeout
radius-server timeout [<1-60>] no radius-server timeout [<1-60>]
Description
Specifies the number of seconds to wait for a response from the RADIUS server before trying the next RADIUS server. If a value is not specified, a default value of 5 seconds is used. You can override this value with a fine-grained per server timeout configured for individual servers.

Remote AAA (TACACS+, RADIUS) commands | 2440

The no form of this command resets the RADIUS global authentication timeout to the default of 5 seconds.

Parameter timeout <1-60>

Description
Specifies the timeout interval of 1 to 60 seconds. Default: 5 seconds.

Examples
Setting the RADIUS server timeout:

switch(config)# radius-server timeout 10

Resetting the timeout for the RADIUS server to the default:

switch(config)# no radius-server timeout

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

radius-server tls timeout (RadSec)
radius-server tls timeout [<1-60>] no radius-server tls timeout [<1-60>]
Description
Specifies the number of seconds to wait for a response from the RadSec server before trying the next RADIUS or RadSec server. If a value is not specified, a default value of 5 seconds is used. You can override this value with a fine-grained per server timeout configured for individual servers. The no form of this command resets the RadSec global authentication timeout to the default of 5 seconds.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2441

Parameter timeout <1-60>

Description
Specifies the timeout interval of 1 to 60 seconds. Default: 5 seconds.

Examples
Setting the RadSec server timeout:

switch(config)# radius-server tls timeout 10

Resetting the timeout for the RadSec to the default:

switch(config)# no radius-server tls timeout

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

radius-server tracking
radius-server tracking interval <INTERVAL> no radius-server tracking interval
radius-server tracking retries <RETRIES> no radius-server tracking retries
radius-server tracking user-name <NAME> [password [plaintext <PASSWORD> | ciphertext <PASSWORD>]]
no radius-server tracking user-name <NAME> [password [plaintext <PASSWORD> | ciphertext <PASSWORD>]]
Description
Configures RADIUS server tracking settings globally for all configured RADIUS servers that have tracking enabled with the radius-server host command on individual servers. The no form of the command removes the specified configuration, reverting it to its default. The no form with user-name also clears the password (resets it to empty).

Remote AAA (TACACS+, RADIUS) commands | 2442

Parameter interval <INTERVAL>
retries <RETRIES>
user-name <NAME> [password [plaintext <PASSWORD> | ciphertext <PASSWORD>]]

Description
Specifies the time interval, in seconds, to wait before checking the server reachability status. Default: 300. Range 60 to 84600.
Specifies the number of server retries. Default: Global RADIUS retries. Range: 0 to 5.
Specifies the user name (and optionally a password) to be used for server checking. The default user name is radiustracking-user with an empty password. The password is optional and may be entered as plaintext or pasted in as ciphertext. The plaintext password is visible as cleartext when entered but is encrypted thereafter. Command history does show the password as cleartext.
NOTE: When password is entered without a following subparameter, plaintext password prompting occurs upon pressing Enter. The entered password characters are masked with asterisks.
NOTE: The user does not have to be configured on the server. Server tracking can still be performed with a user which is not configured on the server because authentication failure on the server achieves confirmation that the server is reachable.
NOTE: Server tracking uses authentication request and response packets to determine server reachability status. The server tracking user name and password are used to form the request packet which is sent to the server with tracking enabled. Upon receiving a response to the request packet, the server is considered to be reachable.

Examples
Configuring a tracking interval of 120 seconds: switch(config)# radius-server tracking interval 120
Reverting the tracking interval to its default of 300 seconds: switch(config)# no radius-server tracking interval
Configuring three retries: switch(config)# radius-server tracking retries 3
Configuring user radius-tracker with a plaintext password. switch(config)# radius-server tracking user-name radius-tracker password plaintext track$1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2443

Configuring user radius-tracker with a prompted plaintext password.
switch(config)# radius-server tracking user-name radius-tracker password Enter the RADIUS server tracking password: ******* Re-Enter the RADIUS server tracking password: *******
Reverting the tracking user name to its default of radius-tracking-user:
switch(config)# no radius-server tracking user-name

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

server
server {<FQDN> | <IPV4> | <IPV6>} [tls] [port <PORT-NUMBER>] [vrf <VRF-NAME>] no server {<FQDN> | <IPV4> | <IPV6>} [tls] [port <PORT-NUMBER>] [vrf <VRF-NAME>]
Description
Adds a TACACS+ or RADIUS server to a server group. Only the configured TACACS+ or RADIUS servers are allowed to be added within the server group. If the same server name exists with multiple ports or multiple VRFs, specify the server name, port, and VRF when adding the server to the server-group. The no form of this command removes a TACACS+/RADIUS server from a server-group.
On the 4100i, 6000, 6100, 6200, 6300, 6400, 8100, 8325, 8360, and 10000 Switch Series, a RADIUS server can be associated with a maximum of four different user-defined server groups.
On the 8320, 8400, and 9300 Switch Series, a RADIUS server can be associated with only one user-defined server group.

Parameter {<FQDN> | <IPV4> | <IPv6>}

Description
Specifies the RADIUS server as: n <FQDN>: a fully qualified domain name.

Remote AAA (TACACS+, RADIUS) commands | 2444

Parameter tls port <PORT-NUMBER> vrf <VRF-NAME>

Description
n <IPV4>: an IPv4 address. n <IPV6>: an IPv6 address.
Specifies the TLS protection for the RADIUS server. If TLS is configured without a port number, the system searches the RADIUS server by host name and sets the default authentication port (2083). Group server priority is assigned based on the sequence in which the servers are added.
Specifies the authentication port number. Range: 1 to 65535. Default TACACS+ (TCP): 49, RADIUS (UDP): 1812 and RadSec: 2083. If a port number is not provided, the system searches the TACACS+/RADIUS server by host name and sets the default authentication port. Group server priority is assigned based on the sequence in which the servers are added.
Specifies the VRF name to be used for communicating with the server. If no VRF name is provided, the default VRF named default is used.

Examples
Adding a server to TACACS+ server group sg1 by providing an IPv4 address, port number, and VRF name:

switch(config)# aaa group server tacacs sg1 switch(config-sg)# server 1.1.1.2 port 32 vrf default

Adding a server to TACACS+ server group sg2 by providing an IPv6 address and default VRF:

switch(config)# aaa group server tacacs sg2 switch(config-sg)# server 2001:0db8:85a3:0000:0000:8a2e:0370:7334 vrf default

Adding a server to RADIUS server group sg3 by providing an IPv4 address, port number, and VRF name:

switch(config)# aaa group server radius sg3 switch(config-sg)# server 1.1.1.5 port 12 vrf default

Adding a server to RADIUS server group sg3 with TLS protection by providing an IPv4 address, port number, and VRF name:

switch(config)# aaa group server radius sg3 switch(config-sg)# server 1.1.1.5 tls port 12 vrf default

Adding a server to RADIUS server group sg4 by providing an IPv6 address and default VRF:

switch(config)# aaa group server radius sg4 switch(config-sg)# server 2001:0db8:85a3:0000:0000:8a2e:0371:7334 vrf default

Adding a server to RADIUS server group sg4 by providing an IPv4 address, port number, and VRF name:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2445

switch(config)# aaa group server radius sg4 switch(config-sg)# server 1.1.1.6 port 32 vrf vrf_red
Specifying an IPv4 address when removing a TACACS+ server from server group sg1:
switch(config)# aaa group server tacacs sg1 switch(config-sg)# no server 1.1.1.2 port 12 vrf default
Specifying an IPv6 address when removing a TACACS+ server from server group sg2 with the default VRF:
switch(config)# aaa group server tacacs sg2 switch(config-sg)# no server 2001:0db8:85a3:0000:0000:8a2e:0370:7334 vrf default

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-sg

Modification --
Authority Administrators or local user group members with execution rights for this command.

show aaa accounting
show aaa accounting [vsx-peer]
Description
Shows the accounting configuration per connection type (channel).

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Configuring and then showing the accounting sequence for TACACS+ groups and local:

Remote AAA (TACACS+, RADIUS) commands | 2446

(config)# aaa accounting all-mgmt default start-stop group sg1 tacacs radius

(config)# aaa accounting all-mgmt console start-stop local

(config)# aaa accounting all-mgmt ssh start-stop group radius tacacs local

(config)# aaa accounting all-mgmt https-server start-stop group sg1 tacacs

(config)# aaa accounting all-mgmt telnet start-stop group radius tacacs local

(config)# show aaa accounting

AAA Accounting:

Accounting Type

: all

Accounting Mode

: start-stop

Accounting Failthrough

: Enabled

Accounting for https-server channel:

--------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

--------------------------------------------------------------------------------

sg1

|0

tacacs

|1

--------------------------------------------------------------------------------

Accounting for console channel:

--------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

--------------------------------------------------------------------------------

local

|0

--------------------------------------------------------------------------------

Accounting for default channel:

--------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

--------------------------------------------------------------------------------

sg1

|0

tacacs

|1

radius

|2

--------------------------------------------------------------------------------

Accounting for ssh channel:

--------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

--------------------------------------------------------------------------------

radius

|0

tacacs

|1

local

|2

--------------------------------------------------------------------------------

Accounting for telnet channel:

--------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

--------------------------------------------------------------------------------

radius

|0

tacacs

|1

local

|2

--------------------------------------------------------------------------------

Configuring and then showing the accounting sequence for RADIUS groups and local:

switch(config)# aaa accounting all default start-stop group rg1 rg2 radius local

switch(config)# aaa accounting all console start-stop group rg4 radius local

switch(config)# exit

switch# show aaa accounting

AAA Accounting:

Accounting Type

: all

Accounting Mode

: start-stop

Accounting Failthrough

: Enabled

Accounting for default channel:

---------------------------------------------------------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2447

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

rg1

|0

rg2

|1

radius

|2

local

|3

---------------------------------------------------------------------------------

Accounting for console channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

tg4

|0

radius

|1

local

|2

---------------------------------------------------------------------------------

Configuring and then showing only local accounting for default:

switch(config)# aaa accounting all default start-stop local

switch(config)# exit

switch# show aaa accounting

AAA Accounting:

Accounting Type

: all

Accounting Mode

: start-stop

Accounting for default channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

local

|0

---------------------------------------------------------------------------------

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show aaa accounting port-access (RADIUS only)
show aaa accounting port-access [interface {<IF-NAME> | all} client-status [mac <MAC-ADDR>]] [vsx-peer]
Description
Shows overall or specific port access accounting information.

Remote AAA (TACACS+, RADIUS) commands | 2448

Parameter interface {<IF-NAME> | all} mac <MAC-ADDR>
vsx-peer

Description
Selects either one interface or all interfaces for showing.
Specifies a client station MAC address (xx:xx:xx:xx:xx:xx), where x is a hexadecimal number from 0 to F.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing the overall port access accounting information:

switch# show aaa accounting port-access

AAA Accounting Port Access ===========================
Radius Accounting Enabled Radius Server Group Local Accounting Enabled Accounting Mode Interim Update Enabled Interim Interval

: yes : acct_group : no : start-stop : yes : 12 minutes

Showing the port access accounting information for a client.

switch# show aaa accounting port-access interface 1/1/1 client-status

Port Access Client Status Details

Client a6:4f:1e:6a:3d:2c, test1

============================

Session Details

---------------

Port

: 1/1/1

Session Time

: 100s

Accounting Details ------------------
Accounting Session ID Input Packets Input Octets Output Packets Output Octets Input Gigaword Output Gigaword

: 1234 : 1028 : 8224 : 2048 : 8000 :0 :0

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2449

Release 10.04

Modification Command introduced

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show aaa authentication
show aaa authentication [vsx-peer]
Description
Shows the authentication configuration per connection type (channel).

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Configuring TACACS+ authentication sequences and then showing the configuration per connection type (channel):

switch(config)# aaa authentication login default group sg1 sg2 sg3 sg4 tacacs local switch(config)# aaa authentication login ssh group sg1 sg2 switch(config)# aaa authentication login console group sg4 tacacs local switch(config)# aaa authentication login https-server local group tacacs sg3 switch(config)# aaa authentication login telnet group sg1 sg2 switch(config)# exit

switch# show aaa authentication

AAA Authentication:

Fail-through

: Enabled

Limit Login Attempts

: Not set

Lockout Time

: 300

Minimum Password Length : Not set

Authentication for ssh channel:

----------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

----------------------------------------------------------------------------------

sg1

|0

sg2

|1

----------------------------------------------------------------------------------

Authentication for https-server channel:

Remote AAA (TACACS+, RADIUS) commands | 2450

----------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

----------------------------------------------------------------------------------

local

|0

tacacs

|1

sg3

|2

----------------------------------------------------------------------------------

Authentication for console channel:

----------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

----------------------------------------------------------------------------------

sg4

|0

tacacs

|1

local

|2

----------------------------------------------------------------------------------

Authentication for default channel:

----------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

----------------------------------------------------------------------------------

sg1

|0

sg2

|1

sg3

|2

sg4

|3

tacacs

|4

local

|5

----------------------------------------------------------------------------------

Authentication for telnet channel:

----------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

----------------------------------------------------------------------------------

sg1

|0

sg2

|1

----------------------------------------------------------------------------------

Configuring RADIUS authentication sequences and then showing the configuration per connection type (channel):

switch(config)# aaa authentication login default group rg1 rg2 rg3 rg4 radius

local

switch(config)# aaa authentication login console group rg4 radius local

switch(config)# exit

switch# show aaa authentication

AAA Authentication:

Fail-through

: Enabled

Limit Login Attempts

: Not set

Lockout Time

: 300

Minimum Password Length : Not set

Authentication for default channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

rg1

|0

rg2

|1

rg3

|2

rg4

|3

radius

|4

local

|5

---------------------------------------------------------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2451

Authentication for console channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

rg4

|0

radius

|1

local

|2

---------------------------------------------------------------------------------

Configuring only default authentication and then showing the default connection type (channel):

switch(config)# aaa authentication login default local switch(config)# exit switch# show aaa authentication

AAA Authentication: Fail-through Limit Login Attempts Lockout Time Minimum Password Length

: Disabled : Not set : 300 : Not set

Authentication for default channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

local

|0

---------------------------------------------------------------------------------

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show aaa authorization
show aaa authorization [vsx-peer]
Description
Shows the authorization configuration per connection type (channel).

Remote AAA (TACACS+, RADIUS) commands | 2452

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Configuring and then showing the authorization sequence for default and console connection types (channels):

(config)# aaa authorization commands default group sg1 tacacs local All commands will fail if none of the servers in the group list are reachable. Continue (y/n)? y (config)# aaa authorization commands ssh group sg2 All commands will fail if none of the servers in the group list are reachable. Continue (y/n)? y (config)# aaa authorization commands telnet group sg2 All commands will fail if none of the servers in the group list are reachable. Continue (y/n)? y (config)# aaa authorization commands console group sg1 local All commands will fail if none of the servers in the group list are reachable. Continue (y/n)? y (config)# aaa authorization radius ssh group sg1 All commands will fail if none of the radsec servers in the group list are reachable. Continue (y/n)? y (config)# aaa authorization radius https-server group sg2 All commands will fail if none of the radsec servers in the group list are reachable. Continue (y/n)? y

(config)# show aaa authorization

******* Command authorization *******

Authorization for console channel:

--------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

--------------------------------------------------------------------------------

sg1

|0

local

|1

--------------------------------------------------------------------------------

Authorization for default channel:

--------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

--------------------------------------------------------------------------------

sg1

|0

tacacs

|1

local

|2

--------------------------------------------------------------------------------

Authorization for ssh channel:

--------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

--------------------------------------------------------------------------------

sg2

|0

--------------------------------------------------------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2453

Authorization for telnet channel:

--------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

--------------------------------------------------------------------------------

sg2

|0

--------------------------------------------------------------------------------

******* User authorization through radius *******

Authorization for ssh channel:

--------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

--------------------------------------------------------------------------------

sg1

|0

--------------------------------------------------------------------------------

Authorization for https-server channel:

--------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

--------------------------------------------------------------------------------

sg2

|0

--------------------------------------------------------------------------------

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show aaa server-groups
show aaa server-groups [tacacs | radius] [vsx-peer]
Description
Shows TACACS+ and RADIUS AAA server group information for all server types or for the specified server type.

Parameter tacacs radius

Description Narrows the command output to only TACACS+ servers. Narrows the command output to only RADIUS servers.

Remote AAA (TACACS+, RADIUS) commands | 2454

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing all AAA server group information:

switch# show aaa server-groups

******* AAA Mechanism TACACS+ *******

--------------------------------------------------------------------------------

GROUP NAME

| SERVER NAME

| PORT | VRF

| PRIORITY

--------------------------------------------------------------------------------

sg2

| 2001:0db8:85a3:0000:0000:8a2e:

0370:7334

| 49 | default | 1

--------------------------------------------------------------------------------

sg1

| 1.1.1.2

| 12 | mgmt | 1

--------------------------------------------------------------------------------

tacacs (default) | FQDN.com

| 32 | mgmt | 1

tacacs (default) | 1.1.1.1

| 49 | mgmt | 2

tacacs (default) | 1.1.1.2

| 12 | mgmt | 3

tacacs (default) | abc.com

| 32 | vrf_red | 4

tacacs (default) | 2001:0db8:85a3:0000:0000:8a2e:

0370:7334

| 49 | default | 5

tacacs (default) | 1.1.1.3

| 32 | vrf_blue| 6

--------------------------------------------------------------------------------

******* AAA Mechanism RADIUS *******

--------------------------------------------------------------------------------

GROUP NAME

| SERVER NAME

| PORT | VRF

| PRIORITY

--------------------------------------------------------------------------------

sg4

| 2001:0db8:85a3:0000:0000:8a2e:

0370:7334

| 1812 | default | 1

--------------------------------------------------------------------------------

sg3

| 1.1.1.5

| 12 | mgmt | 1

--------------------------------------------------------------------------------

radius (default) | 1.1.1.4

| 1812 | mgmt | 1

radius (default) | 1.1.1.5

| 12 | mgmt | 2

radius (default) | abc1.com

| 32 | mgmt | 3

radius (default) | 2001:0db8:85a3:0000:0000:8a2e:

0370:7334

| 1812 | default | 4

radius (default) | 1.1.1.6

| 32 | vrf_red | 5

radius (default) | 1.1.1.7

| 32 | vrf_blue| 6

--------------------------------------------------------------------------------

Showing TACACS+ server group information:

switch# show aaa server-groups tacacs

******* AAA Mechanism TACACS+ *******

--------------------------------------------------------------------------------

GROUP NAME

| SERVER NAME

| PORT | VRF

| PRIORITY

--------------------------------------------------------------------------------

sg2

| 2001:0db8:85a3:0000:0000:8a2e:

0370:7334

| 49 | default | 1

--------------------------------------------------------------------------------

sg1

| 1.1.1.2

| 12 | mgmt | 1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2455

--------------------------------------------------------------------------------

tacacs (default) | FQDN.com

| 32 | mgmt | 1

tacacs (default) | 1.1.1.1

| 49 | mgmt | 2

tacacs (default) | 1.1.1.2

| 12 | mgmt | 3

tacacs (default) | abc.com

| 32 | vrf_red | 4

tacacs (default) | 2001:0db8:85a3:0000:0000:8a2e:

0370:7334

| 49 | default | 5

tacacs (default) | 1.1.1.3

| 32 | vrf_blue| 6

--------------------------------------------------------------------------------

Showing RADIUS server group information:

switch# show aaa server-groups radius

******* AAA Mechanism RADIUS *******

--------------------------------------------------------------------------------

GROUP NAME

| SERVER NAME

| PORT | VRF

| PRIORITY

--------------------------------------------------------------------------------

sg4

| 2001:0db8:85a3:0000:0000:8a2e:

0370:7334

| 1812 | default | 1

--------------------------------------------------------------------------------

sg3

| 1.1.1.5

| 12 | mgmt | 1

--------------------------------------------------------------------------------

radius (default) | 1.1.1.4

| 1812 | mgmt | 1

radius (default) | 1.1.1.5

| 12 | mgmt | 2

radius (default) | abc1.com

| 32 | mgmt | 3

radius (default) | 2001:0db8:85a3:0000:0000:8a2e:

0370:7334

| 1812 | default | 4

radius (default) | 1.1.1.6

| 32 | vrf_red | 5

radius (default) | 1.1.1.7

| 32 | vrf_blue| 6

--------------------------------------------------------------------------------

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show accounting log
show accounting log [last <QTY-TO-SHOW> | all]
Description

Remote AAA (TACACS+, RADIUS) commands | 2456

Entered without optional parameters, this command shows all accounting log records for the current boot. Sensitive information is masked from the log, by being represented as asterisks.
This show accounting log command replaces the show audit-log command that is supported only in 10.00 releases.

Parameter last <QTY-TO-SHOW>
all

Description
Specifies how many most-recent accounting log records to show for the current boot. Range: 1 to 1000.
Selects for showing, all accounting records from the current boot and the previous boot.

Usage
The log message starts with the record type, which is specific to AOS-CX. Values are the following: USER_START
Record of a user login action. USER_END
Record of a user logout action. USYS_CONFIG
Record of a command executed by the user. The three types of accounting log information are identified by the msg= element starting with the rec= item as follows:
n Exec is identified with: msg='rec=ACCT_EXEC n Command is identified with: msg='rec=ACCT_CMD n System is identified with: msg='rec=ACCT_SYSTEM
The user group is indicated by priv-lvl, which is specific to AOS-CX. Values are the following:

Privilege level 1
15
19

User group operators administrators auditors

The value of service indicates which user interface was used: service=shell
Indicates that the log entry is a result of a CLI command. service=https-server
Indicates that the log entry is a result of a REST API request or a Web UI action. The string value of data identifies the CLI command or REST API request that was executed. These elements are shown in context under Examples.
Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2457

Showing the accounting log for the previous and current boot. Line breaks have been added for readability.
switch# show accounting log all
--------------------------------------------------------------------------------Local accounting logs from previous boot -----------------------------------------------------------------------------------type=DAEMON_START msg=audit(Nov 05 2018 23:00:58.607:9057) : auditd start, ver=2.4.3 format=raw kernel=4.9.119-yocto-standard res=success ---type=USER_START msg=audit(Nov 05 2018 23:06:42.398:42) : msg='rec=ACCT_EXEC op=start session=CONSOLE timezone=UTC user=user1 priv-lvl=15 auth-method=LOCAL auth-type=LOCAL service=shell isconfig=no hostname=8xxx addr=0.0.0.0 res=success' ---type=USYS_CONFIG msg=audit(Nov 05 2018 23:06:42.399:43) : msg='rec=ACCT_CMD op=stop session=CONSOLE timezone=UTC user=user1 priv-lvl=15 auth-method=LOCAL auth-type=LOCAL service=shell isconfig=no data="enable" hostname=8xxx addr=0.0.0.0 res=success' ---type=USYS_CONFIG msg=audit(Nov 05 2018 23:08:24.693:51) : msg='rec=ACCT_CMD op=stop session=CONSOLE timezone=UTC user=user1 priv-lvl=1 auth-method=LOCAL auth-type=LOCAL service=shell isconfig=no data="configure terminal" hostname=8xxx addr=0.0.0.0 res=success' ---type=USYS_CONFIG msg=audit(Nov 05 2018 23:08:39.108:52) : msg='rec=ACCT_CMD op=stop session=CONSOLE timezone=UTC user=user1 priv-lvl=15 auth-method=LOCAL auth-type=LOCAL service=shell isconfig=yes data="https-server rest access-mode read-write" hostname=8xxx addr=0.0.0.0 res=success' ---type=USER_START msg=audit(Nov 05 2018 23:10:57.238:58) : msg='rec=ACCT_EXEC op=start session=REST timezone=UTC user=admin priv-lvl=15 auth-method=LOCAL auth-type=LOCAL service=https-server data="http-method=POST http-uri=/rest/v1/login" hostname=8xxx addr=127.0.0.1 res=success' ---type=USYS_CONFIG msg=audit(Nov 05 2018 23:15:11.958:75) : msg='rec=ACCT_CMD op=stop session=CONSOLE timezone=UTC user=user1 priv-lvl=15 auth-method=LOCAL auth-type=LOCAL service=shell isconfig=yes data="tacacs-server host 2.2.2.2" hostname=8xxx addr=0.0.0.0 res=success' ---type=USYS_CONFIG msg=audit(Nov 05 2018 23:15:37.090:76) : msg='rec=ACCT_CMD op=stop session=REST timezone=UTC user=admin priv-lvl=15 auth-method=LOCAL auth-type=LOCAL service=https-server data="http-method=GET http-uri=/rest/v1/system/vrfs/mgmt/tacacs_servers" hostname=8xxx addr=127.0.0.1 res=success' ---type=USER_END msg=audit(Nov 05 2018 23:26:59.207:90) : msg='rec=ACCT_EXEC op=stop session=REST timezone=UTC user=admin priv-lvl=15 auth-method=LOCAL auth-type=LOCAL service=https-server data="http-method=POST http-uri=/rest/v1/logout" hostname=8xxx addr=127.0.0.1 res=success' ---type=USER_END msg=audit(Nov 05 2018 23:27:49.164:93) : msg='rec=ACCT_EXEC op=stop session=CONSOLE timezone=UTC user=user1 priv-lvl=15 auth-method=LOCAL auth-type=LOCAL service=shell isconfig=no hostname=8xxx addr=0.0.0.0 res=success'
--------------------------------------------------------------------------------Local accounting logs from current boot
Remote AAA (TACACS+, RADIUS) commands | 2458

-----------------------------------------------------------------------------------type=DAEMON_START msg=audit(Nov 05 2018 23:32:05.642:626) : auditd start, ver=2.4.3 format=raw kernel=4.9.119-yocto-standard res=success ---type=USER_START msg=audit(Nov 05 2018 23:35:52.915:11) : msg='rec=ACCT_EXEC op=start session=CONSOLE timezone=UTC user=admin priv-lvl=15 auth-method=LOCAL auth-type=LOCAL service=shell isconfig=no hostname=8xxx addr=0.0.0.0 res=success' ---type=USYS_CONFIG msg=audit(Nov 05 2018 23:35:52.917:12) : msg='rec=ACCT_CMD op=stop session=CONSOLE timezone=UTC user=admin priv-lvl=15 auth-method=LOCAL auth-type=LOCAL service=shell isconfig=no data="enable" hostname=8xxx addr=0.0.0.0 res=success'

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Manager (#) or Auditor (auditor)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show accounting log port-access
show accounting log port-access [last <QTY-TO-SHOW> | all]
Description
Shows network user accounting log records.

Parameter last <QTY-TO-SHOW>
all

Description
Specifies how many most-recent accounting log records to show for the current boot. Range: 1 to 1000.
Selects for showing, all accounting records from the current boot and the previous boot.

Examples
Showing port access log output. Line breaks have been added for readability.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2459

switch# show accounting log port-access all ... ----type=USER_ACCT msg=audit(Jan 25 2020 11:03:59.458:70) :
msg='rec=ACCT_NETWORK session=PORT-ACCESS timezone=Asia/Kolkata user=NETWORK_USER auth-method=PORT-ACCESS auth-type=RADIUS service=shell isconfig=no "System-accounting-STOP-for-session-port-access User-Name = 0006000000c7, Calling-Station-Id = 00:06:00:00:00:c7, NAS-Port-Id = 1/1/2, NAS-Port = 2, Acct-Session-Id = 1579930311220, Acct-Session-Time = 128 Acct-Input-Octets = 85607360, Acct-Output-Octets = 4305, Acct-Input-Packets = 1337615, Acct-Output-Packets = 32, Acct-Input-Gigawords = 0, Acct-Output-Gigawords = 0 Acct-Terminate-Cause = NAS Request " hostname=main1 res=success' ----...

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Manager (#) or Auditor (auditor)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show radius-server
show radius-server [detail] [vsx-peer]
Description
Shows configured RADIUS servers information.

Parameter detail
vsx-peer

Description
Selects additional RADIUS server details and global parameters for showing.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage

Remote AAA (TACACS+, RADIUS) commands | 2460

n When the show radius-server command shows None for the shared-secret, the passkey is missing. n The Tracking-Last-Attempted and Next-Tracking-Request fields are applicable only when the
RADIUS server tracking method is access-request. n The TLS Connection Status section of the output of the show radius-server detail command
displays the connection status of the TLS connection created for port-access (network client) authentication. If no port-access related configuration is present, the TLS Connection Status field displays a status of N/A.
Examples
Showing a summary of the global RADIUS configuration:

switch# show radius-server ******* Global RADIUS Configuration *******

Shared-Secret:<password> Timeout: 60 Auth-Type: pap Retries: 5 TLS Timeout: 60 Tracking Time Interval (seconds): 60 Tracking Retries: 5 Tracking User-name: radius-tracking-user Tracking Password: None Number of Servers: 1

---------------------------------------------------------------------------

SERVER NAME

| TLS | PORT | VRF

---------------------------------------------------------------------------

20.1.1.129

|

| 1812 | default

1.1.1.4

|

| 1812 | mgmt

1.1.1.5

|

| 12 | mgmt

abc1.com

|

| 32 | mgmt

2001:0db8:85a3:0000:0000:8a2e:0371:7334

|

| 1812 | default

1.1.1.6

|

| 32 | vrf_red

1.1.1.7

|

| 32 | vrf_blue

---------------------------------------------------------------------------

Showing a summary of a RADIUS server when the status server time interval is configured:

switch# show radius-server Unreachable servers are preceded by * ******* Global RADIUS Configuration *******

Shared-Secret: None

Timeout: 5

Auth-Type: pap

Retries: 1

TLS Timeout: 5

Tracking Time Interval (seconds): 300

Tracking Retries: 1

Tracking User-name: radius-tracking-user

Tracking Password: None

Status-Server Time Interval (seconds): 400

Number of Servers: 2

--------------------------------------------------------------------------------

SERVER NAME

| TLS | PORT | VRF

--------------------------------------------------------------------------------

1.1.1.1

| Yes | 2083 | default

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2461

2.2.2.2

|

| 1812 | default

--------------------------------------------------------------------------------

Showing details of a global RADIUS configuration:

switch# show radius-server detail ******* Global RADIUS Configuration *******

Shared-Secret: *** Timeout: 5 Auth-Type: pap Retries: 5 TLS Timeout: 60 Tracking Time Interval (seconds): 60 Tracking Retries: 5 Tracking User-name: radius-tracking-user Tracking Password: None Number of Servers: 1

****** RADIUS Server Information ******

Server-Name

: 20.1.1.129

Auth-Port

: 1812

Accounting-Port

: 1813

VRF

: default

TLS Enabled

: No

Shared-Secret

: None

Timeout

: 60

Retries

:5

Auth-Type

: pap

Server-Group:Priority : radius:1

Tracking

: disabled

Tracking-Mode

: any

Reachability-Status

: N/A

ClearPass-Username

:

ClearPass-Password

: None

Showing details of a RADIUS server when the per-server shared key and the global RADIUS shared key are not set:

switch# show radius-server detail ******* Global RADIUS Configuration *******

Shared-Secret: None Timeout: 5 Auth-Type: pap Retries: 1 TLS Timeout : 5 Number of Servers: 1

****** RADIUS Server Information ******

Server-Name

: 1.1.1.1

Auth-Port

: 2083

VRF

: default

Shared-Secret (default) : None

Timeout (default)

:5

Retries (default)

:1

Auth-Type (default)

: pap

Server-Group:Priority : radius:1

Default-Priority

:1

Remote AAA (TACACS+, RADIUS) commands | 2462

Showing details of a RADIUS server with TLS:

switch# show radius-server detail ******* Global RADIUS Configuration *******

Shared-Secret: None Timeout: 5 Auth-Type: pap Retries: 1 TLS Timeout: 5 TLS Connection Timeout: 5 TLS Connection Retries: 1 Tracking Time Interval (seconds): 60 Tracking Retries: 1 Tracking User-name: jim Tracking Password: *** Number of Servers: 1

****** RADIUS Server Information ******

Server-Name

: 172.20.30.30

Auth-Port

: 2083

Accounting-Port

: 2083

VRF

: default

TLS Enabled

: Yes

TLS Connection Timeout (default): 5

TLS Connection Retries (default): 1

TLS Connection Status : tls_connection_established

Timeout (default)

:5

Auth-Type (default)

: pap

Server-Group:Priority : radius:1

Tracking

: enabled

Tracking-Mode

: any

Reachability-Status

: reachable

ClearPass-Username

: admin

ClearPass-Password

: ***

Showing details of a RADIUS server when the status-server tracking method is configured:

switch# show radius-server detail ******* Global RADIUS Configuration *******

Shared-Secret: None Timeout: 5 Auth-Type: pap Retries: 1 TLS Timeout: 5 Tracking Time Interval (seconds): 300 Tracking Retries: 1 Tracking User-name: radius-tracking-user Tracking Password: None Status-Server Time Interval (seconds) Number of Servers: 1

: 600

****** RADIUS Server Information ****** Server-Name Auth-Port Accounting-Port VRF TLS Enabled TLS Connection Status Timeout

: 2.2.2.2 : 2083 : 2083 : default : Yes : tls_connection_established :5

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2463

Auth-Type Server-Group:Priority Default-Priority ClearPass-Username ClearPass-Password Tracking Tracking-Mode Tracking-Method Reachability-Status Tracking-Last-Attempted Next-Tracking-Request Port-Access session

: pap : radius:1 :1 : : None : disabled : any : status-server : unknown : N/A : N/A : status-server

Showing details of a RADIUS server when the keep-alive tracking method is configured:

switch# show radius-server detail ******* Global RADIUS Configuration *******

Shared-Secret: None Timeout: 5 Auth-Type: pap Retries: 1 TLS Timeout: 5 Tracking Time Interval (seconds): 300 Tracking Retries: 1 Tracking User-name: radius-tracking-user Tracking Password: None Status-Server Time Interval (seconds) Number of Servers: 1

: 400

****** RADIUS Server Information ****** Server-Name Auth-Port Accounting-Port VRF TLS Enabled TLS Connection Status Timeout Auth-Type Server-Group:Priority ClearPass-Username ClearPass-Password Tracking Tracking-Mode Tracking-Method Reachability-Status Tracking-Last-Attempted Next-Tracking-Request Port-Access session

: 1.1.1.1 : 2083 : 2083 : default : Yes : tcp_connection_failed :5 : pap : radius:1 : : None : disabled : any : keep-alive : unknown : N/A : N/A : status-server

Showing details of a RADIUS server when the access-request tracking method is configured:

switch# show radius-server detail ******* Global RADIUS Configuration *******
Shared-Secret: None Timeout: 5 Auth-Type: pap Retries: 1

Remote AAA (TACACS+, RADIUS) commands | 2464

TLS Timeout: 5 Tracking Time Interval (seconds): 300 Tracking Retries: 1 Tracking User-name: radius-tracking-user Tracking Password: None Status-Server Time Interval (seconds) Number of Servers: 1
****** RADIUS Server Information ****** Server-Name Auth-Port Accounting-Port VRF TLS Enabled TLS Connection Status Timeout Auth-Type Server-Group:Priority ClearPass-Username ClearPass-Password Tracking Tracking-Mode Tracking-Method Reachability-Status Tracking-Last-Attempted Next-Tracking-Request Port-Access session

: 500
: 4.4.4.4 : 2083 : 2083 : default : Yes : tcp_connection_failed :5 : pap : radius:1 : : None : disabled : any : access-request : unknown : N/A : N/A : keep-alive

Showing details of a RADIUS server when the server group is configured:

switch# show radius-server detail ******* Global RADIUS Configuration *******

Shared-Secret: None Timeout: 10 Auth-Type: pap Retries: 5 TLS Timeout: 5 Tracking Time Interval (seconds): 60 Tracking Retries: 5 Tracking User-name: radius Tracking Password: None Status-Server Time Interval (seconds): 300 Number of Servers: 12 AAA Server Status Trap: Enabled

****** RADIUS Server Information ******

Server-Name

: cppm2.cxsecurity.com

Auth-Port

: 1812

Accounting-Port

: 1813

VRF

: sss

TLS Enabled

: No

Shared-Secret

: ***

Timeout

: 10

Retries

:5

Auth-Type

: pap

Server-Group:Priority : RG1:1, RG2:1, RG3:1, RG4:1

ClearPass-Username

:

ClearPass-Password

: None

Tracking

: enabled

Tracking-Mode

: any

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2465

Reachability-Status

: reachable, Since Tue Mar 14 19:58:45 UTC 2023

Tracking-Last-Attempted : Thu Mar 16 10:23:46 UTC 2023

Next-Tracking-Request : 36 seconds

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show radius-server secure ipsec
show radius-server secure ipsec { server-list | host {<FQDN> | <IPV4> | <IPv6>} [port <PORT-NUMBER>] [vrf <VRF-NAME>] [vsx-peer] }
Description
Shows information for one or all RADIUS servers configured with IPsec.

Parameter server-list {<FQDN> | <IPV4> | <IPv6>}
port <PORT-NUMBER> vrf <VRF-NAME> vsx-peer

Description
Selects all servers for showing.
Specifies the RADIUS server as: n <FQDN>: a fully qualified domain name. n <IPV4>: an IPv4 address. n <IPV6>: an IPv6 address.
Specifies the authentication port number. Range: 1 to 65535. Default: 1812.
Specifies the VRF name to be used for communicating with the server. If no VRF name is provided, the default VRF named default is used.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
The IPsec key is shown in an exportable ciphertext format.

Remote AAA (TACACS+, RADIUS) commands | 2466

Examples
Showing information for RADIUS server 1.1.1.1 secured with IPsec:

switch# show radius-server secure ipsec host 1.1.1.1

IPsec

: enabled

Protocol

: ESP

Authentication

: MD5

Encryption

: AES

SPI

: 1234

Showing information for all RADIUS servers secured with IPsec:

switch# show radius-server secure ipsec server-list

Server

: 1.1.1.1

IPsec

: enabled

Protocol

: ESP

Authentication

: MD5

Encryption

: AES

SPI

: 1234

Server IPsec Protocol Authentication Encryption SPI

: 1.1.1.2 : enabled : ESP : MD5 : AES : 12341

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platorms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show radius-server statistics
show radius-server statistics {authentication | accounting} [vsx-peer]
Description
Shows authentication or accounting statistics for all configured RADIUS servers.
The accounting statistics are only for port access.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2467

Parameter {authentication | accounting} vsx-peer

Description
Selects the type of statistics to show.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing RADIUS server authentication statistics:

switch# show radius-server statistics authentication

Server Name

: rad1

Auth-Port

: 1812

Accounting-Port : 1813

VRF

: mgmt

TLS Enabled

: Yes

Authentication Statistics

-------------------------

Round Trip Time

: 100

Pending Requests

:0

Timeouts

:6

Bad Authenticators

:2

Packets Dropped

:0

Access Requests

: 20

Access Challenge

:8

Access Accepts

: 14

Access Rejects

:0

Access Response Malformed : 0

Access Retransmits

:0

Tracking Requests

:5

Tracking Responses

:5

Unknown Response Code

:0

Showing RADIUS server accounting statistics:

switch# show radius-server statistics accounting

Server Name

: rad1

Auth-Port

: 1812

Accounting-Port : 1813

VRF

: mgmt

TLS Enabled

: No

Accounting Statistics

-------------------------

Round Trip Time

: 100

Pending Requests

:0

Timeouts

:5

Bad Authenticators

:1

Packets Dropped

:0

Accounting Requests

: 15

Accounting Responses

: 10

Accounting Response Malformed : 0

Accounting Retransmits

:0

Unknown Response Code

:0

Showing RADIUS server authentication statistics when RADIUS server tracking method is configured:

Remote AAA (TACACS+, RADIUS) commands | 2468

switch# show radius-server statistics authentication

Server Name

: 10.93.48.200

Auth-Port

: 2083

Accounting-Port : 2083

VRF

: mgmt

TLS Enabled

: yes

Authentication Statistics -------------------------
Round Trip Time Pending Requests Timeouts Bad Authenticators Packets Dropped Access Requests Access challenge Access Accepts Access Rejects Access Response Malformed Access Retransmits Tracking Requests Tracking Responses Status-Server Requests (Tracking session) Status-Server Responses (Tracking session) Status-Server Requests (port-access session) Status-Server Responses (port-access session) Unknown Response Code

: 101 :0 : 342 :0 :0 : 779 : 182 :4 : 251 :0 : 200 : 280 : 142 : 280 : 280 : 280 : 280 :0

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show radius-server statistics host
show radius-server statistics {authentication | accounting} host {<FQDN> | <IPV4> | <IPv6>} [tls] [port <PORT-NUMBER>] [vrf <VRF-NAME>] [vsx-peer]
Description
Shows authentication or accounting statistics for the specified RADIUS server.
The accounting statistics are only for port access.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2469

Parameter {authentication | accounting} {<FQDN> | <IPV4> | <IPv6>}
tls port <PORT-NUMBER> vrf <VRF-NAME>
vsx-peer

Description
Selects the type of statistics to show.
Specifies the RADIUS server as: n <FQDN>: a fully qualified domain name. n <IPV4>: an IPv4 address. n <IPV6>: an IPv6 address.
Selects TLS.
Specifies the authentication port number. Range: 1 to 65535. Default: 1812.
Specifies the VRF name to be used for communicating with the server. If no VRF name is provided, the default VRF named default is used.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing RADIUS server authentication statistics with TLS enabled:

switch# show radius-server statistics authentication host 20.1.1.49 tls

Server Name

: 20.1.1.49

Auth-Port

: 2083

Accounting-Port : 2083

VRF

: default

TLS Enabled

: Yes

Authentication Statistics

-------------------------

Round Trip Time

:3

Pending Requests

:0

Timeouts

:0

Bad Authenticators

:0

Packets Dropped

:0

Access Requests

: 13

Access challenge

:6

Access Accepts

:3

Access Rejects

:4

Access Response Malformed : 0

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Remote AAA (TACACS+, RADIUS) commands | 2470

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show tacacs-server
show tacacs-server [detail] [vsx-peer]
Description
Shows the configured TACACS+ servers.

Parameter detail
vsx-peer

Description
Selects additional TACACS+ server details and global parameters for showing.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing a summary of a global TACACS+ configuration with a shared-secret:

switch# show tacacs-server ******* Global TACACS+ Configuration *******

Shared-Secret: AQBapb+HsdpqV1Q3CPCBMQTG8e1cA+CyD0RvfbeA8BEgikCgAAAJOwZSNzA2SWrLA= Timeout: 5 Auth-Type: pap Number of Servers: 5

-------------------------------------------------------------------------------

SERVER NAME

| PORT | VRF

-------------------------------------------------------------------------------

1.1.1.1

| 49 | mgmt

1.1.1.2

| 12 | mgmt

abc.com

| 32 | vrf_blue

2001:0db8:85a3:0000:0000:8a2e:0370:7334

| 49 | default

1.1.1.3

| 32 | vrf_red

-------------------------------------------------------------------------------

Showing details of a global TACACS+ configuration:

switch# show tacacs-server detail ******* Global TACACS+ Configuration *******
Shared-Secret: AQBapb+HsdpqV1Q3CPCBMQTG8e1cA+CyD0RvfbeA8BEgikCgAAAJOwZSNzA2SWrLA= Timeout: 5 Auth-Type: pap Number of Servers: 5

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2471

****** TACACS+ Server Information ******

Server-Name

: 1.1.1.2

Auth-Port

: 12

VRF

: mgmt

Shared-Secret (default) : AQBapb+HsdpqV1Q3CPCBMQTG8eeA8BEgikCgAAAJOwZSNzA2SWrLA=

Timeout (default)

:5

Auth-Type (default)

: pap

Server-Group

: sg1

Group-Priority

:1

Server-Name Auth-Port VRF Shared-Secret (default) Timeout (default) Auth-Type (default) Server-Group Group-Priority

: 2001:0db8:85a3:0000:0000:8a2e:0370:7334 : 49 : default : AQBapb+HsdpqV1Q3CPCBMQTG8eeA8BEgikCgAAAJOwZSNzA2SWrLA= :5 : pap : sg2 :1

Server-Name Auth-Port VRF Shared-Secret (default) Timeout (default) Auth-Type (default) Server-Group (default) Default-Priority

: 1.1.1.1 : 49 : mgmt : AQBapb+HsdpqV1Q3CPCBMQTG8eeA8BEgikCgAAAJOwZSNzA2SWrLA= :5 : pap : tacacs :1

Server-Name Auth-Port VRF Shared-Secret (default) Timeout Auth-Type (default) Server-Group (default) Default-Priority

: abc.com : 32 : vrf_red : AQBapb+HsdpqV1Q3CPCBMQTG8eeA8BEgikCgAAAJOwZSNzA2SWrLA= : 15 : pap : tacacs :3

Server-Name Auth-Port VRF Shared-Secret Timeout Auth-Type Server-Group (default) Default-Priority

: 1.1.1.3 : 32 : vrf_blue : AQBapfnqbSswqKC476tdUFZ+AncIRY92hDTYkQCAAAAFEAaHn43vNC : 15 : chap : tacacs :5

Showing TACACS+ server when per-server shared key and global TACACS+ shared key is not set:

switch# show tacacs-server ******* Global TACACS+ Configuration *******

Shared-Secret: None Timeout: 5 Auth-Type: pap Number of Servers: 1

-------------------------------------------------------------------------------

SERVER NAME

| PORT | VRF

-------------------------------------------------------------------------------

1.1.1.1

| 49 | default

-------------------------------------------------------------------------------

Remote AAA (TACACS+, RADIUS) commands | 2472

Showing TACACS+ server details when per-server shared key and global TACACS+ shared key is not set:

switch# show tacacs-server detail ******* Global TACACS+ Configuration *******

Shared-Secret: None Timeout: 5 Auth-Type: pap Number of Servers: 1

****** TACACS+ Server Information ******

Server-Name

: 1.1.1.1

Auth-Port

: 49

VRF

: default

Shared-Secret (default) : None

Timeout (default)

:5

Auth-Type (default)

: pap

Server-Group (default) : tacacs

Default-Priority

:1

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show tacacs-server statistics
show tacacs-server statistics [vsx-peer]
Description
Shows authentication statistics for all configured TACACS+ servers.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing TACACS+ server authentication statistics:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2473

switch# show tacacs-server statistics

Server Name

: tac1

Auth-Port

: 49

VRF

: mgmt

Authentication Statistics

----------------------------------------------

Round Trip Time

:1

Pending Requests

:0

Timeout

:0

Unknown Types

:0

Packet Dropped

:0

Auth Start

:8

Auth challenge

:0

Auth Accepts

:4

Auth Rejects

:4

Auth reply malformed

:0

Tracking Requests

:0

Tracking Responses

:0

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show tech aaa
show tech aaa
Description
Shows the AAA configuration settings.
Example
Showing the AAA configuration settings:
switch# show tech aaa
==================================================== Show Tech executed on Tue Feb 14 02:19:11 2017 ==================================================== ==================================================== [Begin] Feature aaa

Remote AAA (TACACS+, RADIUS) commands | 2474

====================================================

*********************************

Command : show aaa authentication

*********************************

AAA Authentication:

Fail-through

: Enabled

Limit Login Attempts

: Not set

Lockout Time

: 300

Minimum Password Length : Not set

Authentication for ssh channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

local

|0

---------------------------------------------------------------------------------

Authentication for https-server channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

local

|0

---------------------------------------------------------------------------------

Authentication for console channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

local

|0

---------------------------------------------------------------------------------

Authentication for default channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

tacacs

|0

local

|1

---------------------------------------------------------------------------------

Authentication for telnet channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

local

|0

---------------------------------------------------------------------------------

********************************* Command : show aaa accounting ********************************* AAA Accounting:

Accounting for default channel:

Accounting Type

: all

Accounting Mode

: start-stop

Default Accounting for login Channels:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

local

|0

---------------------------------------------------------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2475

Accounting for ssh channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

tacacs

|0

local

|1

---------------------------------------------------------------------------------

Accounting for https-server channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

tacacs

|0

---------------------------------------------------------------------------------

Accounting for telnet channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

tacacs

|0

local

|1

---------------------------------------------------------------------------------

**********************************************

Command : show aaa accounting port-access

**********************************************

```

AAA Accounting Port Access

===========================

Radius Accounting Enabled

: yes

Radius Server Group

: acct_group

Local Accounting Enabled

: no

Accounting Mode

: start-stop

Interim Update Enabled

: true

Interim Interval

: 12 minutes

Interim Update on-reauth Enabled : true

```

**************************************** Syntax : show aaa accounting port-access interface <IFNAME | all> client-status [mac <MAC-ADDRESS>] Command : show aaa accounting port-access interface 1/1/1 client-status **************************************** ``` Port Access Client Status Details

Client 00:50:56:96:5b:9f, steve

============================

Session Details

---------------

Port

: 1/1/22

Session Time

: 141s

IPv4 Address

: 10.0.0.3

IPv6 Address

: 2001::1

2001::3

Accounting Details ----------------------
Accounting Session ID : 1584556574841

Remote AAA (TACACS+, RADIUS) commands | 2476

Input Packets Input Octets Output Packets Output Octets Input Gigaword Output Gigaword ```

: 265 : 28348 : 341 : 37761 :0 :0

```

##### No aaa clients

When there are no port-access accounting sessions:

``` switch# show aaa accounting port-access interface all client-status Port-access accounting sessions not found.

switch# show aaa accounting port-access interface 1/1/2 client-status Port-access accounting sessions not found.

switch# show aaa accounting port-access interface 1/1/2 client-status mac 6e:93:79:d9:cb:ee Port-access accounting sessions not found. ```

******************************************* Syntax : show accounting log {all | port-access} Command : show accounting log port-access ******************************************* Command to display the Local accouting logs for the network user. ``` ----May 29 2018 20:29:03.714:53 'acct-id=56789453 type=network user=NWUSER authmethod=dot1x auth-type=radius rec=ACCT_START mac=00:0d:6a:4f:2a:44 input-pkt=0 ouput-pkt=0 input-octet=0 output-octets=0' ----May 29 2018 20:30:03.714:53 'acct-id=56789453 type=network user=NWUSER authmethod=dot1x auth-type=radius rec=ACCT_INTRM mac=00:0d:6a:4f:2a:44 input-pkt=2 ouput-pkt=30 input-octet=20 output-octets=50' ----May 29 2018 24:29:03.714:53 'acct-id=56789453 type=network user=NWUSER authmethod=dot1x auth-type=radius rec=ACCT_STOP mac=00:0d:6a:4f:2a:44 input-pkt=20 ouput-pkt=300 input-octet=200 output-octets=500' ----May 29 2018 20:29:03.714:53 'acct-id=56789453 type=network user=NWUSER aauthmethod=macauth auth-type=local rec=ACCT_START mac=00:0d:6a:4f:2a:44 input-pkt=0 ouput-pkt=0 input-octet=0 output-octets=0' -----```

*******************************************************************************

Syntax : show radius-server statistics {authentication | accounting}

*******************************************************************************

****************************************************************

Command : show radius-server statistics authentication

****************************************************************

```

Server Name

: 2.2.2.2

Auth-Port

: 1812

Accounting-Port : 1813

VRF

: mgmt

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2477

Authentication Statistics

-------------------------

Round Trip Time

: 100

Pending Requests

:0

Timeouts

:6

Bad Authenticators

:2

Packets Dropped

:0

Access Requests

: 20

Access Challenge

:8

Access Accepts

: 14

Access Rejects

:0

Access Response Malformed : 0

Access Retransmits

:0

Tracking Requests

:5

Tracking Responses

:5

Unknown Response Code

:0

```

****************************************************************

Command : show radius-server statistics accounting

****************************************************************

```

Server Name

: 2.2.2.2

Auth-Port

: 1812

Accounting-Port : 1813

VRF

: mgmt

Accounting Statistics

-------------------------

Round Trip Time

: 100

Pending Requests

:0

Timeouts

:5

Bad Authenticators

:1

Packets Dropped

:0

Accounting Requests

: 15

Accounting Responses

: 10

Accounting Response Malformed : 0

Accounting Retransmits

:0

Unknown Response Code

:0

```

********************************* Command : show aaa authorization *********************************

Authorization for default channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

local

|0

---------------------------------------------------------------------------------

Authorization for console channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

local

|0

---------------------------------------------------------------------------------

Authorization for ssh channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

Remote AAA (TACACS+, RADIUS) commands | 2478

---------------------------------------------------------------------------------

tacacs

|0

local

|1

---------------------------------------------------------------------------------

Authorization for telnet channel:

---------------------------------------------------------------------------------

GROUP NAME

| GROUP PRIORITY

---------------------------------------------------------------------------------

tacacs

|0

local

|1

---------------------------------------------------------------------------------

********************************* Command : show aaa server-groups *********************************

******* AAA Mechanism TACACS+ *******

----------------------------------------------------------------------------------

-----

GROUP NAME

| SERVER NAME

| PORT | PRIORITY | VRF

----------------------------------------------------------------------------------

-----

tacacs

| 1.1.1.1

| 49 | 1

|

mgmt

----------------------------------------------------------------------------------

-----

******* AAA Mechanism RADIUS *******

----------------------------------------------------------------------------------

-----

GROUP NAME

| SERVER NAME

| PORT | PRIORITY | VRF

----------------------------------------------------------------------------------

-----

*********************************** Command : show tacacs-server detail *********************************** ******* Global TACACS+ Configuration *******

Shared-Secret: AQBapb+HsdpqV1Q3CPCBMQTG8ekK1c...fbeA8BEgikCgAAAJOwZSNzA2SWrLA= Timeout: 5 Auth-Type: pap Tracking Time Interval (seconds): 300 Tracking User-name: tacacs-tracking-user Tracking Password: None Number of Servers: 1

****** TACACS+ Server Information ******

Server-Name

: 1.1.1.1

Auth-Port

: 49

VRF

: mgmt

Shared-Secret

: AQBapfiTREwB7yUKCdmOMT0f...9j2AUxlGAAAAF2MkfMTojqX

Timeout Auth-Type Server-Group Default-Priority Tracking Reachability-Status

:5 : pap : tacacs :1 : disabled : N/A

***********************************

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2479

Command : show radius-server detail *********************************** ******* Global RADIUS Configuration *******
Shared-Secret: AQBapb+HsdpqV1Q3CPCBMQTG8ekK1cA+Cy...8BEgikCgAAAJOwZSNzA2SWrLA= Timeout: 5 Auth-Type: pap Retries: 1 Number of Servers: 0
==================================================== [End] Feature aaa ====================================================
==================================================== Show Tech commands executed successfully ====================================================

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

tacacs-server auth-type
tacacs-server auth-type {pap | chap} no tacacs-server auth-type [pap | chap]
Description
Enables the CHAP or PAP authentication protocol, which is used for communication with the TACACS+ servers, at the global level. You can override this command with a fine-grained per server auth-type configuration. The no form of this command resets the global authentication mechanism for TACACS+ to PAP, which is the default authentication mechanism for TACACS+.

Parameter auth-type {pap | chap}

Description Selects either the PAP or CHAP authentication protocol.

Examples

Remote AAA (TACACS+, RADIUS) commands | 2480

Enabling command for CHAP authentication: switch(config)# tacacs-server auth-type chap
Enabling command for PAP authentication: switch(config)# tacacs-server auth-type pap

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

tacacs-server host
tacacs-server host {<FQDN> | <IPV4> | <IPV6>} [key [plaintext <PASSKEY> | ciphertext <PASSKEY>]] [timeout <TIMEOUT-SECONDS>] [port <PORT-NUMBER>] [auth-type {pap | chap}] [tracking {enable | disable}] [vrf <VRF-NAME>]

no tacacs-server host {<FQDN> | <IPV4> | <IPV6>} [key [plaintext <PASSKEY> | ciphertext <PASSKEY>]] [timeout <TIMEOUT-SECONDS>] [port <PORT-NUMBER>] [auth-type {pap | chap}] [tracking {enable | disable}] [vrf <VRF-NAME>]
Description
Adds a TACACS+ server. By default, the TACACS+ server is associated with the server group named tacacs. The no form of this command removes a previously added TACACS+ server.

Parameter {<FQDN> | <IPV4> | <IPv6>}
key [plaintext <PASSKEY> |

Description
Specifies the TACACS+ server as: n <FQDN>: a fully qualified domain name. n <IPV4>: an IPv4 address. n <IPV6>: an IPv6 address.
Selects either a plaintext or an encrypted local shared-secret

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2481

Parameter ciphertext <PASSKEY>]

Description
passkey for the server. As per RFC 2865, shared-secret can be a mix of alphanumeric and special characters. Plaintext passkeys are between 1 and 32 alphanumeric and special characters.
NOTE: When key is entered without either sub-parameter, plaintext passkey prompting occurs upon pressing Enter. Enter must be pressed immediately after the key parameter without entering other parameters. The entered passkey characters are masked with asterisks. When key is omitted, the server uses the global passkey. This command requires either the global or local passkey to be set; otherwise the server will not be contacted. Command tacacs-server key is available for setting the global passkey.

timeout <TIMEOUT-SECONDS> port <PORT-NUMBER> auth-type {pap | chap} tracking {enable | disable}
vrf <VRF-NAME>

Specifies the timeout. Range: 1 to 60 seconds. Default : 5 seconds.
Specifies the TCP authentication port number. Range: 1 to 65535. Default: 49.
Selects either the PAP (the default) or CHAP authentication types. If this parameter is not specified, the TACACS+ global default is used.
Enables or disables server tracking for the RADIUS server. Tracked servers are probed at the start of each server tracking interval to check if they are reachable. Use command tacacs-server tracking to configure TACACS+ server tracking globally.
Specifies the VRF name to be used for communicating with the server. If no VRF name is provided, the default VRF named default is used.

Usage
If the fully qualified domain name is provided for the TACACS+ server, a DNS server must be configured and accessible through the same VRF which is configured for the TACACS+ server. This configuration is required for the resolution of the TACACS+ server hostname to its IP address. If a DNS server is not available for this VRF, the TACACS+ servers reachable through this VRF must be configured by means of their IP addresses only.
Examples
Adding a TACACS+ server with an IPv4 address, plaintext passkey, timeout, port, authentication type, and VRF name:

switch(config)# tacacs-server host 1.1.1.3 key plaintext test-123 timeout 15 port 32 auth-type chap vrf vrf_red

Adding a TACACS+ server with an IPv4 address and prompted plaintext passkey:

switch(config)# tacacs-server host 1.1.1.5 key Enter the TACACS server key: ********* Re-Enter the TACACS server key: *********

Remote AAA (TACACS+, RADIUS) commands | 2482

Adding a TACACS+ server with an IPv4 address and a named VRF: switch(config)# tacacs-server host 1.1.1.1 vrf mgmt
Adding a TACACS+ server with an IPv4 address, a port, and a named VRF: switch(config)# tacacs-server host 1.1.1.2 port 32 vrf mgmt
Adding a TACACS+ server with an FQDN, a timeout, port number, and a named VRF: switch(config)# tacacs-server host abc.com timeout 15 port 32 vrf vrf_blue
Adding a TACACS+ server with an IPv6 address: switch(config)# tacacs-server host 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Deleting a TACACS+ server with an IPv4 address and specified VRF: switch(config)# no tacacs-server host 1.1.1.1 vrf mgmt
Deleting a TACACS+ server with an FQDN, port, and specified VRF: switch(config)# no tacacs-server host abc.com port 32 vrf vrf_blue

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

tacacs-server key
tacacs-server key [plaintext <GLOBAL-PASSKEY> | ciphertext <GLOBAL-PASSKEY>] no tacacs-server key [plaintext <GLOBAL-PASSKEY> | ciphertext <GLOBAL-PASSKEY>]
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2483

Creates or modifies a TACACS+ global passkey. The TACACS+ global passkey is used as a shared-secret for encrypting the communication between all TACACS+ servers and the switch. The TACACS+ global passkey is required for authentication unless local passkeys have been set. By default, the TACACS+ global passkey is empty. If the administrator has not set this key, the switch will not be able to perform TACACS+ authentication. The switch will instead rely on the authentication mechanism configured with aaa authentication login.

When this command is entered without parameters, plaintext passkey prompting occurs upon pressing Enter. The entered passkey characters are masked with asterisks.
The no form of the command removes the global passkey.

Parameter plaintext <GLOBAL-PASSKEY>
ciphertext <GLOBAL-PASSKEY>

Description
Specifies the TACACS+ global passkey in plaintext format with a length of 1 to 31 characters. As per RFC 2865, a shared-secret can be a mix of alphanumeric and special characters.
Specifies the TACACS+ global passkey in encrypted format.

Examples
Adding the global passkey:

switch(config)# tacacs-server key plaintext mypasskey123

Adding the global passkey with prompting:

switch(config)# tacacs-server key Enter the TACACS server key: ********* Re-Enter the TACACS server key: *********

Removing the global passkey:

switch(config)# no tacacs-server key

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Remote AAA (TACACS+, RADIUS) commands | 2484

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

tacacs-server timeout
tacacs-server timeout [<1-60>] no tacacs-server timeout [<1-60>]
Description
Specifies the number of seconds to wait for a response from the TACACS+ server before trying the next TACACS+ server. If a value is not specified, a default value of 5 seconds is used. You can override this value with a fine-grained per server timeout configured for individual servers. The no form of this command resets the TACACS+ global authentication timeout to the default of 5 seconds.

Parameter timeout <1-60>

Description
Specifies the timeout interval of 1 to 60 seconds. Default: 5 seconds.

Examples
Specifying the TACACS+ server timeout:

switch(config)# tacacs-server timeout 10

Resetting the timeout for the TACACS+ server to the default:

switch(config)# no tacacs-server timeout

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2485

tacacs-server tracking
tacacs-server tracking interval <INTERVAL> no tacacs-server tracking interval [<INTERVAL>]
tacacs-server tracking user-name <NAME> [password [plaintext <PASSWORD> | ciphertext <PASSWORD>]]
no tacacs-server tracking [user-name [<NAME>] [ciphertext <PASSWORD>]]
Description
Configures TACACS+ server tracking settings globally for all configured TACACS+ servers that have tracking enabled with the tacacs-server host command on individual servers. The no form of the command removes the specified configuration, reverting it to its default. The no form with user-name also clears the password (resets it to empty).

Parameter interval <INTERVAL>
user-name <NAME> [password [plaintext <PASSWORD> | ciphertext <PASSWORD>]]

Description
Specifies the time interval, in seconds, to wait before checking the server reachability status. Default: 300. Range 60 to 84600.
Specifies the user name (and optionally a password) to be used for server checking. The default user name is tacacstracking-user with an empty password. The password is optional and may be entered as plaintext or pasted in as ciphertext. The plaintext password is visible as cleartext when entered but is encrypted thereafter. Command history does show the password as cleartext.
NOTE: When password is entered without a following subparameter, plaintext password prompting occurs upon pressing Enter. The entered password characters are masked with asterisks.

NOTE: The user does not have to be configured on the server. Server tracking can still be performed with a user which is not configured on the server because authentication failure on the server achieves confirmation that the server is reachable.

NOTE: Server tracking uses authentication request and response packets to determine server reachability status. The server tracking user name and password are used to form the request packet which is sent to the server with tracking enabled. Upon receiving a response to the request packet, the server is considered to be reachable.

Examples
Configuring a tracking interval of 120 seconds: switch(config)# tacacs-server tracking interval 120
Reverting the tracking interval to its default of 300 seconds:

Remote AAA (TACACS+, RADIUS) commands | 2486

switch(config)# no tacacs-server tracking interval
Configuring user tacacs-tracker with a plaintext password.
switch(config)# tacacs-server tracking user-name tacacs-tracker password plaintext track$1
Configuring user tacacs-tracker with a prompted plaintext password.
switch(config)# tacacs-server tracking user-name tacacs-tracker password Enter the TACACS server tracking password: ******* Re-Enter the TACACS server tracking password: *******
Reverting the tracking user name to its default of tacacs-tracking-user:
switch(config)# no tacacs-server tracking user-name

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2487

Chapter 133 Remote syslog commands

Remote syslog commands
clear accounting-logs
clear accounting-logs
Description
Use this command to clear accounting logs. Once issued, only logs generated after this command is run will be displayed in the output of the show accounting log commands.
This command will not clear logs when the logging accounting-format-native feature is configured. To clear accounting logs on switches with this feature enabled, users should first revert the native accounting format back to the default AOS-CX format by executing the no logging accounting-format-native command.
Example
switch(config)# clear accounting-logs
The following example shows that accounting logs cannot be cleared using the clear accounting-logs command if the logging accounting-native-format command has been enabled, and that disabling this option with the no logging accounting-format-native command again allows the accounting logs to be cleared.
switch# logging audit-format-native switch# clear accounting-logs Warning: Clear accounting-logs is not supported for 'audit-format-native'. switch# no logging audit-format-native switch# clear accounting-logs switch# show accounting log last 5 --------------------------------------------------Command logs from current boot --------------------------------------------------No command logs has been logged in the system

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.11

Modification Command introduced.

Command Information
AOS-CX 10.14 Command-Line Interface Guide

2488

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

logging
logging {<IPV4-ADDR> | <IPV6-ADDR> | <FQDN | HOSTNAME>} {udp [<PORT-NUM>]}|{tcp [<PORTNUM>]}|{|tls [<PORT-NUM>]}
auth-mode {certificate|subject-name} disable filter <FILTER-NAME> include-auditable-events legacy-tls-renegotiation] rate-limit-burst <BURST> rate-limit-interval <INTERVAL>] ] severity <LEVEL>] vrf <VRF-NAME>]
no logging {<IPV4-ADDR> | <IPV6-ADDR> | <FQDN | HOSTNAME> }
Description
Enables syslog forwarding to a remote syslog server. The no form of this command disables syslog forwarding to a remote syslog server. Starting with AOS-CX 10.11, payload information is present in accounting logs. The maximum REST payload that can be sent to RADIUS/TACACS server is 1024 characters, and the maximum of REST payload that can be sent to syslog server is 3500 characters. If this limit is is reached, the log will display three dots (...) to indicate that the log an exceeded the character limit and is incomplete.

Parameter {<IPV4-ADDR> | <IPV6-ADDR> | <HOSTNAME>}
[udp [<PORT-NUM>] | tcp [<PORT-NUM> | tls [<PORT-NUM>]]
udp [<PORT-NUM>] tcp [<PORT-NUM>] tls [<PORT-NUM>] auth-mode

Description
Selects the IPv4 address, IPv6 address, or host name of the remote syslog server. Required.
Specifies the UDP port, TCP port, or TLS port of the remote syslog server to receive the forwarded syslog messages.
Range: 1 to 65535. Default: 514
Range: 1 to 65535. Default: 1470
Range: 1 to 65535. Default: 6514
Specifies the TLS authentication mode used to validate the certificate. n certificate: Validates the peer using trust anchor
certificate based authentication. Default. n subject-name: Validates the peer using trust
anchor certificates as well as subject-name based authentication.

Remote syslog commands | 2489

Parameter disable

Description
Disable remote syslog confguration. This does not delete the configuration, just disables/pauses the forwarding of syslog messagesto the remote server. The config/forwarding can be reenabled (un-paused) again using the no logging <hostname> disable command.

filter <FILTER-NAME> include-auditable-events legacy-tls-renegotiation rate-limit-burst <BURST> rate-limit-interval <INTERVAL> severity <LEVEL>
vrf <VRF-NAME>

Specifies the name of the filter to be applied on the syslog messages.
Specifies that auditable messages are also logged to the remote syslog server.
Enables the TLS connection with a remote syslog server supporting legacy renegotiation.
Specifies the rate limit for the messages sent to the remote syslog server.
Specifies the rate limit interval in seconds. Default: 30 Seconds
Specifies the severity of the syslog messages: n alert: Forwards syslog messages with the severity
of alert (6) and emergency (7). n crit: Forwards syslog messages with the severity of
critical (5) and above. n debug: Forwards syslog messages with the severity
of debug (0) and above. n emerg: Forwards syslog messages with the severity
of emergency (7) only. n err: Forwards syslog messages with the severity of
err (4) and above n info: Forwards syslog messages with the severity of
info (1) and above. Default. n notice: Forwards syslog messages with the severity
of notice (2) and above. n warning: Forwards syslog messages with the
severity of warning (3) and above.
Specifies the VRF used to connect to the syslog server. Optional. Default: default

Examples
Enabling the syslog forwarding to remote syslog server 10.0.10.2:

switch(config)# logging 10.0.10.2

Enabling the syslog forwarding of messages with a severity of err (4) and above to TCP port 4242 on remote syslog server 10.0.10.9 with VRF lab_vrf:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2490

switch(config)# logging 10.0.10.9 tcp 4242 severity err vrf lab_vrf Disabling syslog forwarding to a remote syslog server:
switch(config)# no logging Enabling syslog forwarding over TLS to a remote syslog server using subject-name authentication mode:
switch(config)#logging example.com tls auth-mode subject-name Applying log filtering for syslog server forwarding:
switch(config)# logging 10.0.10.6 severity info filter filter_lldp_logs vrf mgmt Applying log filtering and enabling the rate limit for syslog server forwarding over TCP port:
switch(config)# logging 10.0.10.2 tcp 3440 severity err vrf mgmt includeauditable-events filter filter_lldp_logs rate-limit-burst 3 rate-limit-interval 35

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.12.1000 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification The disable parameter is introduced --
Authority Administrators or local user group members with execution rights for this command.

logging accounting-format-native
logging accounting-format-native [no] logging accounting-format-native
Description
Change the accounting log message format to native Linux format. (Default: ArubaOS-CX format) The 'no' form of this command will change the accounting log message format to ArubaOS-CX format.
Usage

Remote syslog commands | 2491

This option enables the switch to show all types of accounting records to the user. When configured, the same format will be used while sending messages to syslog servers. When upgrading from an earlier version of AOS-CX to AOS-CX 10.11 or later versions, if native accounting logs are preferred, then best practices is to issue this command as a part of the upgrade. If the switch upgrades from an earlier version to AOS-CX 10.11 or later without configuring this setting, by default, the accounting log message format will be ArubaOS-CX Format.
Example
This example changes the accounting log message format to native Linux format.
switch(config)# logging accounting-format-native
The following example returns the accounting log message format to the default ArubaOS-CX format.
switch(config)# no logging accounting-format-native

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History

Release 10.11

Command Information

Platforms All platforms

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

logging filter
logging filter <FILTER-NAME>
[{enable | disable}] [<SEQUENCE-ID>] {permit | deny} [event-id <EVENT-ID-RANGE>] [includes <REGEX>] [severity <COMPARISON-OPERATOR> <LEVEL>] no <SEQUENCE-ID>
resequence <OLD-SEQUENCE-ID> <NEW-SEQUENCE-ID> no logging filter <FILTER-NAME>
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2492

Creates a filter to restrict what event or debug logs are logged. A filter can be used to either permit or deny:
n The event logs from being generated on the switch, or n The event or debug logs generated on the switch from being forwarded to a syslog server.
A filter is identified by a filter name and can have up to 20 rules or entries, each with a different sequence number, matching criteria, and corresponding action (deny or permit). When a filter is applied on a log, the log is matched against the criteria mentioned in the rules or entries in ascending numerical order of their sequence numbers until a matching entry is found. Once a matching entry is found, its corresponding action is applied on the log. If no matching rule is found, the default action (permit) is applied. The no form of this command removes the filter.

Parameter <FILTER-NAME> enable <SEQUENCE-ID>
deny permit <event-id>
includes <REGEX> severity

Description
Specifies the unique name to identify the filter.
Filter event logs generated on the switch.
Specifies the filter criteria sequence number. Default: Increments by 10 from the largest sequence-id currently used in this filter.
Prevents the matching log from being logged.
Allows the matching log.
Matches logs by event ID. Specify an event ID or a range of event IDs. It supports a maximum of 100 event IDs.
Matches the log message against a regular expression string.
Matches the logs by severity level. The following options are used to compare the severity: n eq: Match events of severity equal to the specified. n ge: Match events of severity greater than or equal to the
specified. n gt: Match events of severity greater than the specified. n le: Match events of severity lesser than or equal to the
specified. n lt: Match events of severity lesser than the specified. The following are the severity levels: n alert: Logs with the severity alert (6). n crit: Logs with the severity critical (5). n debug: Logs with the severity debug (0). n emerg: Logs with the severity emergency (7). n err: Logs with the severity err (4). n info: Logs with the severity info (1). n notice: Logs with the severity notice (2). n warning: Logs with the severity warning (3).

Usage
Filtering event logs on the switch: To permit or deny event logs from being generated on the switch. In this case, the matching event logs are filtered at generation. The denied event logs are neither logged

Remote syslog commands | 2493

to the switch events nor forwarded to any remote syslog servers. Multiple filters can be configured, but only one filter can be applied to filter the events on the switch. Such a filter can be chosen by adding the enable command under its configuration. Configuring the enable command under a new filter automatically removes it from the filter where it was previously used. For example:
logging filter low_severity_logs
enable
10 deny severity lt info
This configuration denies the event logs which have a severity less than info.
If a filter contains enable command, it is not recommended to configure this filter in the logging command used for remote syslog server configuration. This is because, any event logs denied by the filter are already not available for forwarding to a remote server.
A filter with enable command will not affect debug logs. Consider the configuration in the following example of a filter with enable command and two rules applied 10 permit severity ge info and 20 deny. This implies permit only those event logs which have severity greater than or equal to info. Example:
logging filter low_severity_logs enable 10 permit severity ge info 20 deny
Filtering event or debug logs when forwarding to a remote syslog server: The filter name must be configured in the logging command that is used to configure remote syslog server. The logs will be generated on the switch and the filter only decides whether to deny or permit the syslog forwarding for the matching log. For example: logging 10.0.10.6 filter filter_lldp_logs
The filter affects debug logs only when the command debug destination syslog is configured on the switch.
The severity mentioned in the remote syslog server configuration using logging command under configuration context has more precedence than the severity mentioned in a filter entry. If a log with warning severity is permitted by a filter, but the remote syslog configuration has severity err mentioned in it, the log will not be forwarded to the remote syslog server (since warning(3) is lesser than err(4)). On the other hand, if a log with err severity is permitted by a filter and the remote syslog configuration has severity warning mentioned in it, the log will be forwarded to the remote syslog server.
Examples
Configuring a new logging filter:
switch(config)# logging filter example_filter

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2494

To deny logs having event ID 1301 and a range of event IDs from 1305 to 1309: switch(config-logging-filter)# 20 deny event-id 1301,1305-1309
To permit logs having event ID 1300: switch(config-logging-filter)# 30 permit event-id 1300
To permit logs with severity greater than or equal to err: switch(config-logging-filter)# 30 permit severity ge err
To deny logs with severity greater than info: switch(config-logging-filter)# 30 deny severity gt info
To deny logs with event ID 1024 and a message matching the regular expression LLDP: switch(config-logging-filter)# 40 deny event-id 1024 includes LLDP
Denying all logs: switch(config-logging-filter)# 40 deny
Changing the sequence ID of an existing rule: switch(config-logging-filter)# resequence 20 70

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config and configlogging-filter

Modification --
Authority Administrators or local user group members with execution rights for this command.

Remote syslog commands | 2495

logging facility
logging facility {local0 | local1 | local2 | local3 | local4 | local5 | local6 | local7} no logging facility
Description
Sets the logging facility to be used for remote syslog messages. Default: local7 The no form of this command disables the logging facility to be used for remote syslog messages.

Parameter
{local0 | local1 | local2 | local3 | local4 | local5 | local6 | local7}

Description
Selects the logging facility to be used for remote syslog messages. Required. Specifies the severity of the syslog messages: n local0 n local1 n local2 n local3 n local4 n local5 n local6 n local7

Examples
Sets the local5 logging facility to be used for remote syslog messages:

switch(config)# logging facility local5

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

logging persistent-storage
logging persistent-storage [severity {alert|crit|debug|emerg|err|info|notice|warning}] no logging persistent-storage

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2496

Description
Enables or disables storage of logs in storage. Only logs of the specified severity and above will be preserved in the storage. The no form of this command disables storage of logs in storage.

Parameter severity <LEVEL>

Description
Specifies the severity of the syslog messages: n alert: Preserves syslog messages with the severity of alert (6)
and emergency (7) n crit: Preserves syslog messages with the severity of critical (5)
and above. Default. n debug: Preserves syslog messages with the severity of debug
(0) and above. n emerg: Preserves syslog messages with the severity of
emergency (7) only. n err: Preserves syslog messages with the severity of err (4) and
above. n info: Preserves syslog messages with the severity of info (1)
and above. n notice: Preserves syslog messages with the severity of notice
(2) and above. n warning: Preserves syslog messages with the severity of
warning (3) and above.

Usage
These logs can be copied out by using the copy support-files all or copy support-files previous-boot.

Examples
Enabling storage of logs in storage with severity info:
switch(config)#logging persistent-storage severity info Logs will be written to storage and made available across reboot. Do you want to continue (y/n)?
Disabling storage of logs in storage:
switch(config)# no logging persistent-storage

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Remote syslog commands | 2497

Command Information

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2498

Chapter 134 RIPv2 (IPv4) commands

RIPv2 (IPv4) commands

Configuration commands

router rip
router rip <PROCESS-ID> [vrf <VRF-NAME>] no router rip <PROCESS-ID> [vrf <VRF-NAME>]
Description
Creates RIP process if not already created and enters the router rip <PROCESS-ID> context for the VRF mentioned. If no VRF is mentioned, a default is used. Only one RIP process is allowed per VRF. The no form of this command deletes the RIP instance for the VRF. If no VRF is mentioned the default is deleted.

Parameter <PROCESS-ID> vrf <VRF-NAME>

Description Specifies name of the RIP process ID. Range: 1-63. Specifies VRF name.

Examples
Creating RIP process and naming the VRF:

switch(config)# router rip 2 vrf red

Deleting RIP process:

switch(config)# no router rip 2 vrf red

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide

2499

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

Interface commands

ip rip
ip rip <PROCESS-ID> {all-ip | ip-address} no ip rip <PROCESS-ID> {all-ip | ip-address}
Description
Enables RIP process on an interface. The no form of this command deletes the RIP process from an interface.

Parameter ip rip <PROCESS-ID> all-ip ip-address

Description Specifies RIP process ID. Range: 1-63. Specifies RIP for all IP addresses configured on the interface. Specifies IP address for RIP on the interface.

Usage
n If an IP address is removed from an interface configured with RIP, all RIP configurations will be removed from the interface.
n If ip rip 1 all-ip is configured and a new IP address is added to the interface, RIP configurations will not be applicable for the newly added IP address.
Examples
Configuring RIP for all IP addresses configured on the interface:

switch(config)# interface 1/1/1 switch(config-if)# ip rip 1 all-ip

Deleting RIP for all IP addresses configured on the interface:

switch(config)# interface 1/1/1 switch(config-if)# no ip rip 1 all-ip

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

RIPv2 (IPv4) commands | 2500

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip rip all-ip enable
ip rip all-ip enable no ip rip all-ip enable
Description
Enables RIP process for all RIP enabled IP addresses configured on interface. The no form of this command disables RIP process on the interface.
Usage
n Default settings allow an interface to receive RIP packets. n If an IP address is removed from an interface configured with RIP, all RIP configurations will be
removed from the interface.
Examples
Enabling RIP process for all RIP enabled IP addresses on interface:
switch(config)# interface 1/1/1 switch(config-if)# ip rip all-ip enable
Disabling RIP process on interface:
switch(config)# interface 1/1/1 switch(config-if)# no ip rip all-ip enable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2501

Platforms
6300 6400

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

ip rip all-ip disable
ip rip all-ip disable no ip rip all-ip disable
Description
Disables RIP process for all RIP enabled IP addresses configured on the interface. The no form of this command enables RIP process for all RIP enabled IP addresses configured on the interface.
Usage
n Default settings allow an interface to receive RIP packets. n If an IP address is removed from an interface configured with RIP, all RIP configurations will be
removed from the interface.
Examples
Disabling RIP process for all RIP enabled IP addresses on interface:
switch(config)# interface 1/1/1 switch(config-if)# ip rip all-ip enable
Enabling RIP process for all RIP enabled IP addresses on interface:
switch(config)# interface 1/1/1 switch(config-if)# no ip rip all-ip enable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

RIPv2 (IPv4) commands | 2502

ip rip all-ip send disable
ip rip all-ip send disable no ip rip all-ip send disable
Description
Disables interface from sending RIP packets for all RIP enabled IP addresses. The no form of this command enables interface to send RIP packets for all RIP enabled IP addresses.
Usage
n Default settings allow an interface to send RIP packets. n If an IP address is removed from an interface configured with RIP, all RIP configurations will be
removed from the interface.
Examples
Disabling interface from sending RIP packets for all RIP enabled IP addresses on interface:
switch(config)# interface 1/1/1 switch(config-if)# ip rip all-ip send disable
Enabling interface to send RIP packets for all RIP enabled IP addresses on interface:
switch(config)# interface 1/1/1 switch(config-if)# no ip rip all-ip send disable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip rip all-ip receive disable
ip rip all-ip receive disable no ip rip all-ip receive disable
Description
Disables interface from receiving RIP packets for all enabled IP addresses. The no form of this command enables interface to receive RIP packets for all RIP enabled IP addresses.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2503

Usage
n Default settings allow an interface to receive RIP packets. n If an IP address is removed from an interface configured with RIP, all RIP configurations will be
removed from the interface.
Examples
Disabling interface from receiving RIP packets for all RIP enabled IP addresses on interface:
switch(config)# interface 1/1/1 switch(config-if)# ip rip all-ip receive disable
Enabling interface to receive RIP packets for all RIP enabled IP addresses on interface:
switch(config)# interface 1/1/1 switch(config-if)# no ip rip all-ip receive disable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

Routing commands
enable
enable no enable
Description
Enables RIP process if disabled. By default RIP process is enabled. The no form of this command disables the RIP process.
Examples
Enabling RIP process when disabled:

RIPv2 (IPv4) commands | 2504

switch(config)# router rip 1 switch(config-rip-1)# enable
Disabling RIP process when enabled:
switch(config)# router rip 1 switch(config-rip-1)# no enable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

disable
disable no disable
Description
Disables RIP process. The no form of this command enables the RIP process.
Examples
Disabling RIP process:
switch(config)# router rip 1 switch(config-rip-1)# disable
Enabling RIP process:
switch(config)# router rip 1 switch(config-rip-1)# no disable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2505

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

distance
distance <DISTANCE> no distance
Description
Configures administrative distance for RIP. Administrative distance is used as criteria to select the best route when multiple protocols have the same route. The no form of this command sets the RIP administrative distance to the default. Default: 120.

Parameter <DISTANCE>

Description Specifies RIP administrative distance. Range: 1 to 255.

Examples
Configuring administrative distance for RIP:

switch(config)# router rip 1 switch(config-rip-1)# distance 100

Setting administrative distance for RIP to default values:

switch(config)# router rip 1 switch(config-rip-1)# no distance

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

RIPv2 (IPv4) commands | 2506

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

maximum-paths
maximum-paths <MAX-VALUE> no maximum-paths
Description
Sets the maximum number of ECMP routes that RIP can support. The no form of this command sets the maximum number of ECMP routes to the default value of 4.

Parameter <MAX-VALUE>

Description Sets the number of RIP ECMP routes. Range: 1-8.

Examples
Setting maximum number of RIP ECMP routes:

switch(config)# router rip 1 switch (config-rip-1)# maximum-paths 8

Setting maximum number of RIP ECMP routes to default:

switch(config)# router rip 1 switch (config-rip-1)# no maximum-paths

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

redistribute
redistribute {bgp | connected | ospf <PROCESS-ID> | static} no redistribute {bgp | connected | ospf <PROCESS-ID> | static}

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2507

Description
Redistributes routes originating from other protocols into RIP. The no form of this command disables redistribution of routes originating from other protocols into RIP.

Parameter bgp connected
ospf <PROCESS-ID>
static

Description
Specifies BGP routes to redistribute into RIP.
Specifies connected routes (directly attached subnet or host) to redistribute into RIP.
Specifies the OSPF route to redistribute into RIP. Range: <165535>
Specifies static route to redistribute into RIP.

Examples
Redistributing BGP routes into RIP:

switch(config)# router rip 1 switch(config-rip-1)# redistribute bgp

Disabling BGP routes that originate from other protocols and redistribute into RIP:

switch(config)# router rip 1 switch(config-rip-1)# no redistribute bgp

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Supported process ID range expanded from 1-63 to 1-65535. --
Authority Administrators or local user group members with execution rights for this command.

timers update
timers update <INTERVAL> timeout <DURATION> garbage-collection <PERIOD> no timers

RIPv2 (IPv4) commands | 2508

Description
Configures RIP timers with specific values. The no form of this command sets all RIP timers to default values.

Parameter timers update <INTERVAL> timeout <DURATION>
garbage-collection <PERIOD>

Description
Specifies frequency at which RIP sends updates to all of its peers. Range: 1 to 2147484. Default: 30.
Specifies timeout duration from the point of the last refresh after a route is received from a peer timeout and is marked as expired. Range: 1 to 255. Default: 180.
Specifies amount of time route remains in routing table after route expiration. Range: 1 to 255. Default: 120.

Examples
Configuring RIP timers with specific values:

switch(config)# router rip 1 switch(config-rip-1)# timers update 40 timeout 200 garbage-collection 150

Configuring RIP timers with default values:

switch(config)# router rip 1 switch(config-rip-1)# no timers

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

RIPv2 clear commands
clear ip rip statistics
clear ip rip [<PROCESS-ID>] statistics [all-vrfs | vrf <VRF-NAME>]
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2509

Clears RIP event statistics.

Parameter <PROCESS-ID> all-vrfs vrf <VRF-NAME>

Description Specifies RIP process ID. Range: 1-63 Clears statistics for all VRFs. Selects VRF to clear statistics for. Specifies VRF name.

Examples
Clearing RIP event statistics:

switch# clear ip rip statistics

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

RIPv2 interface commands
enable
enable no enable
Description
Enables RIP process for RIP enabled IP address configured on interface. The no form of this command disables RIP process on interface.
Usage
n Default settings allow an interface to receive RIP packets. n If an IP address is removed from an interface configured with RIP, all RIP configurations will be
removed from the interface.

RIPv2 (IPv4) commands | 2510

Examples
Enabling RIP process for RIP enabled IP address:
switch(config)# interface 1/1/1 switch(config-if)# ip rip 1 10.1.1.1 switch(config-if-rip)# enable
Disabling RIP process on interface:
switch(config)# interface 1/1/1 switch(config-if)# ip rip 1 10.1.1.1 switch(config-if-rip)# no enable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

disable
disable no disable
Description
Disables RIP process for RIP enabled IP addresses configured on interface. The no form of this command enables RIP process on interface.
Examples
Disabling RIP process for RIP enabled IP addresses configured on interface:
switch(config)# interface 1/1/1 switch(config-if)# ip rip 1 10.1.1.1 switch(config-if-rip)# disable
Enabling RIP process on interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2511

switch(config)# interface 1/1/1 switch(config-if)# ip rip 1 10.1.1.1 switch(config-if-rip)# no disable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

send disable
send disable no send disable
Description
Disables an interface from sending RIP packets for a specific IP address. The no form of this command enables interface for sending RIP packets for a specific IP address.
Usage
n Default settings allow an interface to send and receive RIP packets. n If an IP address is removed from an interface configured with RIP, all RIP configurations will be
removed from the interface.
Examples
Disabling interface from sending RIP packets for a specific IP address :
switch(config)# interface 1/1/1 switch(config-if)# ip rip 1 10.1.1.1 switch(config-if-rip)# send disable
Enabling interface to send RIP packets for a specific IP address:
switch(config)# interface 1/1/1 switch(config-if)# ip rip 1 10.1.1.1 switch(config-if-rip)# no send disable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

RIPv2 (IPv4) commands | 2512

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

receive disable
receive disable no receive disable
Description
Disables interface from receiving RIP packets for a specific IP address. The no form of this command enables interface for receiving RIP packets for a specific IP address.
Usage
n Default settings allow an interface to receive RIP packets. n If an IP address is removed from an interface configured with RIP, all RIP configurations will be
removed from the interface.
Examples
Disabling interface from receiving RIP packets for a specific IP address:
switch(config)# interface 1/1/1 switch(config-if)# ip rip 1 10.1.1.1 switch(config-if-rip)# receive disable
Enabling interface for receiving RIP packets for a specific IP address:
switch(config)# interface 1/1/1 switch(config-if)# ip rip 1 10.1.1.1 switch(config-if-rip)# no receive disable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2513

Command Information

Platforms
6300 6400

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

RIPv2 show commands
show capacities rip
show capacities rip
Description
Displays maximum number of RIP interfaces, routes and process.
Examples
Displaying maximum number of RIP interfaces, routes and process:

switch# show capacities rip

System Capacities: Filter RIP

Capacities Name

Value

----------------------------------------------------------------------------------

Maximum number of RIP interfaces configurable in the system

32

Maximum number of RIP processes supported across each VRF

1

Maximum number of routes in RIP supported across all VRFs

2540

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show capacities-status rip
show capacities-status rip
Description
Displays number of RIP interfaces, routes and process configured in the system.

RIPv2 (IPv4) commands | 2514

Examples
Displaying number of RIP interfaces, routes and process:

switch# show capacities-status rip

System Capacities Status: Filter RIP

Capacities Name

Value Maximum

----------------------------------------------------------------------

Number of RIP interfaces configured in the system

0

32

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ip rip
show ip rip [<PROCESS-ID>] [all-vrfs | vrf <VRF-NAME>]
Description
Displays general RIP configuration.

Parameter <PROCESS-ID> all vrfs vrf <VRF-NAME>

Description Specifies RIP process ID. Range: 1-63. Displays general RIP information for all VRFs. Selects VRF to display general RIP information for. Specifies VRF name.

Usage
n Parameters display general RIP information for a specific RIP process. n Parameters display general RIP information for a specific or all VRFs. n If a VRF is not mentioned, information for the default VRF is displayed.
Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2515

Displaying general RIP configuration for all VRFs:

switch# show ip rip 34 all-vrfs

VRF : Default

Process-ID : 34

---------------------------------------------------------------------

RIP Version

: RIPv2

Protocol Status : Enabled

Update Time

: 60 sec Timeout Time : 240 sec

Garbage Collection Time : 250 sec ECMP

:6

Distance

: 100

Redistribution : static,

ospf 1

VRF : vrf_1

Process-ID : 34

---------------------------------------------------------------------

RIP Version

: RIPv2

Protocol Status : Enabled

Update Time

: 30 sec Timeout Time : 180 sec

Garbage Collection Time : 120 sec ECMP

:4

Distance

: 120

Redistribution : None

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ip rip interface
show ip rip [<PROCESS-ID>] interface [<INTERFACE-NAME>] [brief] [all-vrfs | vrf <VRFNAME>]
Description
Displays information about RIP enabled interfaces.

Parameter <PROCESS-ID> <INTERFACE-NAME> brief all-vrfs

Description Specifies RIP process ID. Range: 1-63. Specifies interface. Shows brief overview information for the RIP interface. Displays interface information for all VRFs.

RIPv2 (IPv4) commands | 2516

Parameter vrf <VRF-NAME>

Description Selects specific VRF. Specifies VRF.

Usage
n Parameters display general RIP information for a specific RIP process. n If a VRF is not mentioned, information for the default VRF is displayed.
Examples

switch# show ip rip interface

Interface 1/1/1 is up, IP Address is 10.10.10.1/24

-----------------------------------------------------------------------

VRF

: Default

Process-ID

:1

Status

: Oper Up

Mode

: Send and Receive

MTU

: 500

Version

: RIPv2

Poision Reverse : Enabled

Interface 1/1/2 is up, IP Address is 20.10.10.1/24

-----------------------------------------------------------------------

VRF

: Default

Process-ID

:1

Status

: Admin Down

Mode

: Receive

MTU

: 500

Version

: RIPv2

Poision Reverse : Enabled

Interface 1/1/3 is up, IP Address is 30.10.10.1/24

-----------------------------------------------------------------------

VRF

: Default

Process-ID

:1

Status

: Admin Down

Mode

: Send

MTU

: 500

Version

: RIPv2

Poision Reverse : Enabled

switch# show ip rip interface brief VRF : default Process-ID : 1 -------------------------------

Total Number of Interfaces: 2

Interface

IP-Address/Mask Status MTU

--------------------------------------------------

1/1/1

10.10.10.1/24

up

500

1/1/2

20.10.10.1/24

up

500

1/1/3

30.10.10.1/24

up

500

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2517

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ip rip neighbors
show ip rip [<PROCESS-ID>] neighbors [<IP-ADDRESS>] [all-vrfs | vrf <VRF-NAME>]
Description
Displays information about RIP neighbors.

Parameter <PROCESS-ID> <IP-ADDRESS>
all-vrfs vrf <VRF-NAME>

Description Specifies RIP process ID. Range: 1-63. Specifies IP address of a specific neighbor to display information on. Displays neighbor information for all VRFs.
Selects VRF to display neighbor information. Specifies VRF name.

Usage
n Parameters display RIP neighbor information for a specific RIP process. n Parameters display RIP neighbor information for a specific neighbor. n If a VRF is not mentioned, information for the default VRF is displayed.
Examples
Displaying RIP neighbor information for all VRFs:

switch# show ip rip neighbors all-vrfs

VRF : default

Process-ID : 1

----------------------------------------

Total Number of Neighbors: 1

Peer-Address Type Last-Update Rcvd-Bad-Pkts Rcvd-Bad-Routes

------------------------------------------------------------------

1.1.1.2

RIPv2 0:0:7

4

5

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

RIPv2 (IPv4) commands | 2518

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ip rip routes
show ip rip [<PROCESS-ID>] routes [<PREFIX/LENGTH>] [all-vrfs | vrf <VRF-NAME>]
Description
Displays RIP routing table for a specific RIP process.

Parameter <PROCESS-ID>
<PREFIX/LENGTH> all-vrfs vrf <VRF-NAME>

Description Specifies RIP process ID to display information for a specific RIP process. Range: 1-63. Specifies the network prefix. Displays RIP routing information for all VRFs. Selects VRF to display RIP routing information. Specifies VRF name.

Usage
n <PREFIX/LENGTH> is an optional parameter that displays RIP routing table information for a specific subnet.
n If a VRF is not mentioned, information for the default VRF is displayed.
Examples
Displaying RIP routing table for all VRFs:

switch# show ip rip routes all-vrfs

VRF : default

Process-ID : 1

----------------------------------------

Total Number of Routes : 6

Prefix

Metric

Interface

Nexthop

--------------------------------------------------------

10.1.0.0/16

2

1/1/1

30.1.1.2

20.1.2.0/24

3

1/1/1

30.1.1.2

30.1.1.0/24

1

1/1/1

VRF : vrf_1

Process-ID : 34

----------------------------------------

Prefix

Metric

Interface

Nexthop

--------------------------------------------------------

20.1.0.0/16

10

1/1/2

50.1.1.2

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2519

40.1.2.0/24 50.1.1.0/24

14

1/1/2

50.1.1.2

1

1/1/2

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ip rip statistics
show ip rip [<PROCESS-ID>] statistics [all-vrfs | vrf <VRF-NAME>]
Description
Displays RIP statistics.

Parameter <PROCESS-ID> all-vrfs vrf <VRF-NAME>

Description Specifies RIP process ID. Range: 1-63. Displays statistics information for all VRFs. Selects VRF to display RIP statistics information for. Specifies VRF name.

Usage
n Parameters can display information for all VRFs or a specific VRF. n If a VRF is not mentioned, information for the default VRF is displayed.
Examples
Displaying RIP statistics for all VRFs:

switch# show ip rip statistics all-vrfs VRF : default Process-ID : 1 -------------------------------------

Global Route Changes : 50

Global Queries

:2

RIPv2 (IPv4) commands | 2520

Last Cleared

: 0h 30m 28s ago

VRF : vrf_1 Process-ID : 34 -------------------------------------

Global Route Changes : 20

Global Queries

:0

Last Cleared

: 0h 30m 28s ago

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ip rip statistics interface
show ip rip [<PROCESS-ID>] statistics interface [<INTERFACE-NAME>] [all-vrfs | vrf <VRFNAME>]
Description
Displays RIP statistics for RIP enabled interfaces.

Parameter <PROCESS-ID> <INTERFACE-NAME> all-vrfs vrf <VRF-NAME>

Description Specifies RIP process ID. Range: 1-63. Specifies name of interface. Displays RIP interface statistics for all VRFs. Selects VRF to display RIP interface statistics. Specifies VRF name.

Usage
n Parameters can display information for all VRFs or a specific VRF. n If a VRF is not mentioned, information for the default VRF is displayed.
Examples
Displaying RIP statistics for a RIP enabled interface:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2521

switch# show ip rip statistics interface 1/1/1

VRF : default Process-ID : 1

interface 1/1/1

--------------------------------------------------

IP-Address Trigger-Updates Rcvd-Bad-Packets Rcvd-Bad-Routes

-----------------------------------------------------------------------

10.1.1.1

15

3

4

Last Cleared : 0h 30m 28s ago

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show running-config
show running config
Description
Displays all running configurations for all protocols including RIP.
Examples
Displaying all running configurations for all protocols including RIP:
switch# show running-config Current configuration: ! !Version Halon 0.1.0 (Build: genericx86-64-Halon-0.1.0-master-20170309054955-dev) !Schema version 0.1.8 lldp enable timezone set utc vrf blue vrf green vrf red led base-loc_fdc on led base-loc on led base-hlth_fdc fast_blink led base-pwr_fdc on ! ! !

RIPv2 (IPv4) commands | 2522

! ! ! aaa authentication login default local aaa authorization commands default none ! ! ! ! router ospf 1 vrf red router rip 1
maximum-paths 5 distance 1 router rip 1 vrf red default-information originate always maximum-paths 7 distance 5 redistribute ospf 1 timers update 40 timeout 200 garbage-collection 120 vlan 1 no shutdown interface lag 44 no shutdown ip address 33.1.1.1/24 ip rip 1 33.1.1.1
send disable interface 1/1/1
no shutdown ip address 33.44.1.1/24 ip address 44.44.1.1/24 secondary ip rip 1 33.44.1.1
send disable ip rip 1 44.44.1.1
send disable interface 1/1/2 interface loopback 2
ip address 55.55.55.55/32 ip rip 1 55.55.55.55

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2523

Chapter 135 RIPng (IPv6) commands

RIPng (IPv6) commands

Configuration commands

router ripng
router ripng <PROCESS-ID> [vrf <VRF-NAME>] no router ripng <PROCESS-ID> [vrf <VRF-NAME>]
Description
Creates RIPng process if not already created and enters the router ripng <PROCESS-ID> context for the VRF mentioned. If no VRF is mentioned, a default is used. Only one RIPng process is allowed per VRF. The no form of this command deletes the RIPng instance for the VRF. If no VRF is mentioned the default is deleted.

Parameter <PROCESS-ID> vrf <VRF-NAME>

Description Specifies name of the RIPng process ID. Range: <1-63> Sets VRF name for RIPng process. VRF name for VRF.

Examples
Creating RIPng process and naming the VRF:

switch(config)# router ripng 2 vrf red

Deleting RIPng process:

switch(config)# no router ripng 2 vrf red

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide

2524

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

Interface commands

ipv6 ripng
ipv6 ripng <PROCESS-ID> no ipv6 ripng <PROCESS-ID>
Description
Enables RIPng process on interface and creates a new context. The no form of this command deletes RIPng process on interface.

Parameter <PROCESS-ID>

Description Specifies RIPng process ID. Range: 1-63.

Examples
Enabling RIPng process on an interface:

switch(config)# interface 1/1/1 switch (config-if)# ipv6 ripng 1 switch (config-if-ripng)#

Deleting RIPng process on an interface:

switch(config)# interface 1/1/1 switch (config-if)# no ipv6 ripng 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

RIPng (IPv6) commands | 2525

Routing commands
enable
enable no enable
Description
Enables RIPng process if disabled. By default RIPng process is enabled. The no form of this command disables the RIPng process.
Examples
Enabling RIPng process when disabled:
switch(config)# router ripng 1 switch(config-ripng-1)# enable
Disabling RIPng process when enabled:
switch(config)# router ripng 1 switch(config-ripng-1)# no enable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

disable
disable no disable
Description
Disables RIPng process. The no form of this command enables the RIPng process.
Examples
Disabling RIPng process:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2526

switch(config)# router ripng 1 switch(config-ripng-1)# disable
Enabling RIPng process:
switch(config)# router ripng 1 switch(config-ripng-1)# no disable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

distance
distance <DISTANCE> no distance
Description
Configures administrative distance for RIPng. Administrative distance is used as criteria to select the best route when multiple protocols have the same route. The no form of this command sets the RIPng administrative distance to the default. Default: 120.

Parameter <DISTANCE>

Description Specifies RIPng administrative distance. Range: 1 to 255.

Examples
Configuring administrative distance for RIPng:

switch(config)# router ripng 1 switch(config-ripng-1)# distance 100

Setting administrative distance for RIPng to default values:

RIPng (IPv6) commands | 2527

switch(config)# router ripng 1 switch(config-ripng-1)# no distance

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

maximum-paths
maximum-paths <MAX-VALUE> no maximum-paths
Description
Sets the maximum number of ECMP routes that RIPng can support. The no form of this command sets the maximum number of ECMP routes to the default value of 4.

Parameter <MAX-VALUE>

Description Sets the number of RIPng ECMP routes. Range: 1-8.

Examples
Setting maximum number of RIPng ECMP routes:

switch(config)# router ripng 1 switch (config-ripng-1)# maximum-paths 8

Setting maximum number of RIPng ECMP routes to default:

switch(config)# router ripng 1 switch (config-ripng-1)# no maximum-paths

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2528

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

redistribute
redistribute {bgp | connected | ospfv3 <PROCESS-ID> | static} no redistribute {bgp | connected | ospfv3 <PROCESS-ID> | static}
Description
Redistributes routes originating from other protocols into RIPng. The no form of this command disables redistribution of routes originating from other protocols into RIPng.

Parameter bgp connected
ospfv3 <PROCESS-ID>
static

Description
Specifies BGP routes to redistribute into RIPng.
Specifies connected routes (directly attached subnet or host) to redistribute into RIPng.
Specifies the OSPFv3 route to redistribute into RIPng. Range: <165535>
Specifies static route to redistribute into RIPng.

Examples
Redistributing BGP routes into RIPng:

switch(config)# router ripng 1 switch(config-ripng-1)# redistribute bgp

Disabling BGP routes that originate from other protocols and redistribute into RIPng:

switch(config)# router ripng 1 switch(config-ripng-1)# no redistribute bgp

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

RIPng (IPv6) commands | 2529

Release 10.14 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Supported process ID range expanded from 1-63 to 1-65535. --
Authority Administrators or local user group members with execution rights for this command.

timers update
timers update <INTERVAL> timeout <DURATION> garbage-collection <PERIOD> no timers
Description
Configures RIPng timers with specific values. The no form of this command sets all RIPng timers to default values.

Parameter timers update <INTERVAL> timeout <DURATION>
garbage-collection <PERIOD>

Description
Specifies frequency at which RIPng sends updates to all of its peers. Range: 1 to 2147484. Default: 30.
Specifies timeout duration from the point of the last refresh after a route is received from a peer timeout and is marked as expired. Range: 1 to 255. Default: 180.
Specifies amount of time route remains in routing table after route expiration. Range: 1 to 255. Default: 120.

Examples
Configuring RIPng timers with specific values:

switch(config)# router ripng 1 switch(config-ripng-1)# timers update 40 timeout 200 garbage-collection 150

Configuring RIPng timers with default values:

switch(config)# router ripng 1 switch(config-ripng-1)# no timers

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2530

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

RIPng clear commands
clear ipv6 ripng statistics
clear ipv6 ripng [<PROCESS-ID>] statistics [all-vrfs | vrf <VRF-NAME>]
Description
Clears RIPng event statistics.

Parameter <PROCESS-ID> all-vrfs vrf <VRF-NAME>

Description Specifies RIPng process ID. Range: 1-63 Clears statistics for all VRFs. Selects VRF to clear statistics for. Specifies VRF name.

Examples
Clearing RIPng event statistics:

switch# clear ipv6 ripng statistics

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

RIPng (IPv6) commands | 2531

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

RIPng interface commands
enable
enable no enable
Description
Enables RIPng process on interface. The no form of this command disables RIPng process on interface.
Examples
Enabling RIPng process on interface:
switch(config)# interface 1/1/1 switch(config-if)# ipv6 ripng 1 switch(config-if-ripng)# enable
Disabling RIPng process on interface:
switch(config)# interface 1/1/1 switch(config-if)# ipv6 ripng 1 switch(config-if-ripng)# no enable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

disable
disable no disable

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2532

Description
Disables RIPng process on interface. The no form of this command enables RIPng process on interface.
Examples
Disabling RIP process for all RIP enabled IP addresses on interface:
switch(config)# interface 1/1/1 switch(config-if)# ipv6 ripng 1 switch(config-if-ripng)# disable
Enabling RIP process for all RIP enabled IP addresses on interface:
switch(config)# interface 1/1/1 switch(config-if)# ipv6 ripng 1 switch(config-if-ripng)# no disable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

send disable
send disable no send disable
Description
Disables interface from sending RIPng packets. An interface can send RIPng packets by default. The no form of this command enables interface to send RIPng packets, if disabled.
Examples
Disabling interface from sending RIPng packets:
switch(config)# interface 1/1/1 switch (config-if)# ipv6 ripng 1 switch (config-if-ripng)# send disable

RIPng (IPv6) commands | 2533

Enabling interface to send RIPng packets:
switch(config)# interface 1/1/1 switch (config-if)# ipv6 ripng 1 switch (config-if-ripng)# no send disable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

receive disable
receive disable no receive disable
Description
Disables interface from receiving RIPng packets for all enabled IP addresses. An interface can receive RIPng packets by default. The no form of this command enables interface to receive RIPng packets, if disabled.
Examples
Disabling interface from receiving RIPng packets:
switch(config)# interface 1/1/1 switch(config-if)# ipv6 ripng 1 switch (config-if-ripng)# receive disable
Enabling interface to receive RIPng packets when disabled:
switch(config)# interface 1/1/1 switch(config-if)# ipv6 ripng 1 switch (config-if-ripng)# no receive disable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2534

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

RIPng show commands

show capacities ripng
show capacities ripng
Description
Displays the maximum number of RIPng interfaces, routes and process.
Examples
Displaying maximum number of RIPng interfaces, routes and process:

switch# show capacities ripng

System Capacities: Filter RIPng

Capacities Name

Value

----------------------------------------------------------------------------

Maximum number of RIPng interfaces configurable in the system

32

Maximum number of RIPng processes supported across each VRF

1

Maximum number of routes in RIPng supported across all VRFs

2540

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show capacities-status ripng

RIPng (IPv6) commands | 2535

show capacities-status ripng
Description
Displays number of RIPng interfaces, routes and process configured in the system.
Examples
Displaying number of RIPng interfaces, routes and process:

switch# show capacities-status ripng

System Capacities Status: Filter RIPng

Capacities Name

Value Maximum

----------------------------------------------------------------------------------

-------------------------

Number of RIPng interfaces configured in the system

0

32

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ipv6 ripng
show ipv6 ripng [<PROCESS-ID>] [all-vrfs | vrf <VRF-NAME>]
Description
Displays general RIPng configuration.

Parameter <PROCESS-ID> all vrfs vrf <VRF-NAME>

Description Specifies RIPng process ID. Range: 1-63. Displays general RIPng information for all VRFs. Selects VRF to display general RIPng information for.
Specifies VRF name.

Usage

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2536

n Parameters display general RIPng information for a specific RIPng process. n Parameters display general RIPng information for a specific or all VRFs. n If a VRF is not mentioned, information for the default VRF is displayed.
Examples
Displaying general RIPng configuration for all VRFs:

switch# show ipv6 ripng 34 all-vrfs

VRF : Default

Process-ID : 34

---------------------------------------------------------------------

Protocol Status

: Enabled ECMP

:6

Update Time

: 60 sec Timeout Time : 240 sec

Garbage Collection Time : 250 sec Distance

: 100

Redistribution

: static,

ospfv3 1

VRF : vrf_1

Process-ID : 34

---------------------------------------------------------------------

Protocol Status

: Enabled ECMP

:4

Update Time

: 30 sec Timeout Time : 180 sec

Garbage Collection Time : 120 sec Distance

: 120

Redistribution

: None

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ipv6 ripng interface
show ipv6 ripng [<PROCESS-ID>] interface [<INTERFACE-NAME>] [brief] [all-vrfs | vrf <VRFNAME>]
Description
Displays information about RIPng enabled interfaces.

Parameter <PROCESS-ID>

Description Specifies RIPng process ID. Range: 1-63.

RIPng (IPv6) commands | 2537

Parameter <INTERFACE-NAME> brief all-vrfs vrf <VRF-NAME>

Description Specifies interface. Shows brief overview information for RIPng interface. Displays interface information for all VRFs. Selects specific VRF. Specifies VRF.

Usage
n Parameters display general RIPng information for a specific RIPng process. n Parameters display general RIPng information for a specific or all VRFs. n If a VRF is not mentioned, information for the default VRF is displayed.
Examples

switch# show ipv6 ripng interface

Interface 1/1/1 is up, IPv6 Address is fe80::7272:cfff:fe70:67a

-----------------------------------------------------------------------

VRF

: Default

Process-ID

:1

Status

: Oper Up

Mode

: Send and Receive

MTU

: 500

Poision Reverse : Enabled

Interface 1/1/2 is up, IPv6 Address is fe80::7272:cfff:fe70:67a

-----------------------------------------------------------------------

VRF

: Default

Process-ID

:1

Status

: Admin Down

Mode

: Receive

MTU

: 500

Poision Reverse : Enabled

Interface 1/1/3 is up, IPv6 Address is fe80::7272:cfff:fe70:67a

-----------------------------------------------------------------------

VRF

: Default

Process-ID

:1

Status

: Admin Down

Mode

: Send

MTU

: 500

Poision Reverse : Enabled

switch# show ipv6 ripng interface brief VRF : default Process-ID : 1 -------------------------------

Total Number of Interfaces: 2

Interface

IPv6-Address

Status MTU

-----------------------------------------------------------

1/1/1

fe80::7272:cfff:fe70:67a

up

500

1/1/2

fe80::7272:cfff:fe71:67a

up

500

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2538

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ipv6 ripng neighbors
show ipv6 ripng [<PROCESS-ID>] neighbors [<LINK-LOCAL-ADDRESS>] [all-vrfs | vrf <VRFNAME>]
Description
Displays information about RIPng neighbors.

Parameter <PROCESS-ID> neighbors <LINK-LOCAL-ADDRESS> all-vrfs vrf <VRF-NAME>

Description Specifies RIPng process ID. Range: 1-63. Specifies neighbor IP address. Specifies link-local address. Displays neighbor information for all VRFs. Selects VRF to display neighbor information. Specifies VRF name.

Usage
n Parameters display RIPng neighbor information for a specific RIPng process. n Parameters display RIPng neighbor information for a specific neighbor. n Parameters display general RIPng information for a specific or all VRFs. n If a VRF is not mentioned, information for the default VRF is displayed.
Examples
Displaying RIPng neighbor information for all VRFs:

switch# show ipv6 ripng neighbors all-vrfs

VRF : default

Process-ID : 1

----------------------------------------

Total Number of Neighbors: 1

Peer-Address

Type Last-Update Rcvd-Bad-Pkts Rcvd-Bad-Routes

----------------------------------------------------------------------

RIPng (IPv6) commands | 2539

fe80::7272:cfff:fe70:86ae

RIPng 0:0:7

4

5

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ipv6 ripng routes
show ipv6 ripng [<PROCESS-ID>] routes [<PREFIX/LENGTH>] [all-vrfs | vrf <VRF-NAME>]
Description
Displays RIPng routing table for a specific RIPng process.

Parameter <PROCESS-ID>
<PREFIX/LENGTH> all-vrfs vrf <VRF-NAME>

Description Specifies RIPng process ID to display information for a specific RIPng process. Range: 1-63. Specifies the network prefix. Displays RIPng routing information for all VRFs. Selects VRF to display RIPng routing information. Specifies VRF name.

Usage
n <PREFIX/LENGTH> is an optional parameter that displays RIPng routing table information for a specific subnet.
n If a VRF is not mentioned, information for the default VRF is displayed.
Examples
Displaying RIPng routing table for all VRFs:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2540

switch# show ipv6 ripng routes all-vrfs

VRF : default

Process-ID : 1

------------------------------------------

Prefix

Metric

Interface

Nexthop

-----------------------------------------------------------------------

2001:DB8:10::/64

2

1/1/1

FE80::2E0:E6FF:FE1B:8242

2002:DB8:10::/64

3

1/1/1

FE80::2E0:E6FF:FE1B:8242

2003:DB8:10::/64

1

1/1/1

VRF : vrf_1

Process-ID : 34

-------------------------------------------

Prefix

Metric

Interface

Nexthop

------------------------------------------------------------------------

3001:DB8:10::/64

10

1/1/2

FE80::2E0:E6FF:FE1B:8232

3002:DB8:10::/64

14

1/1/2

FE80::2E0:E6FF:FE1B:8232

3003:DB8:10::/64

1

1/1/2

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ipv6 ripng statistics
show ipv6 ripng [<PROCESS-ID>] statistics [all-vrfs | vrf <VRF-NAME>]
Description
Displays RIPng statistics.

Parameter <PROCESS-ID> all-vrfs vrf <VRF-NAME>

Description Specifies RIPng process ID. Range: 1-63. Displays statistics information for all VRFs. Selects VRF and displays RIPng statistics for it. Specifies VRF name.

Usage

RIPng (IPv6) commands | 2541

n Parameters can display information for all VRFs or a specific VRF. n If a VRF is not mentioned, information for the default VRF is displayed.
Examples
Displaying RIPng statistics for all VRFs:

switch# show ipv6 ripng statistics all-vrfs VRF : default Process-ID : 1 -------------------------------------

Global Route Changes : 50

Global Queries

:2

Last Cleared

: 0h 30m 28s ago

VRF : vrf_1 Process-ID : 34 -------------------------------------

Global Route Changes : 20

Global Queries

:0

Last Cleared

: 0h 30m 28s ago

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show ipv6 ripng statistics interface
show ipv6 ripng [<PROCESS-ID>] statistics interface [<INTERFACE-NAME>] [all-vrfs | vrf <VRF-NAME>]
Description
Displays RIPng statistics for RIPng enabled interfaces.

Parameter <PROCESS-ID> <INTERFACE-NAME>

Description Specifies RIPng process ID. Range: 1-63. Specifies name of interface.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2542

Parameter all-vrfs vrf <VRF-NAME>

Description Displays RIPng interface statistics for all VRFs. Selects VRF to display RIPng interface statistics. Specifies VRF name.

Usage
n Parameters can display information for all VRFs or a specific VRF. n If a VRF is not mentioned, information for the default VRF is displayed.
Examples
Displaying RIPng statistics for a RIPng enabled interface:

switch# show ipv6 ripng statistics interface 1/1/1

VRF : default Process-ID : 1

interface 1/1/1

--------------------------------------------------

IPv6-Address

Trigger-Updates Rcvd-Bad-Packets Rcvd-Bad-Routes

-----------------------------------------------------------------------------

fe80::7272:cfff:fe70:86ae

15

3

4

Last Cleared: 0h 30m 28s ago

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show running-config
show running config
Description
Displays all running configurations for all protocols including RIPng.
Examples
Displaying all running configurations for all protocols including RIPng:

RIPng (IPv6) commands | 2543

switch# show running-config Current configuration: ! !Version Halon 0.1.0 (Build: genericx86-64-Halon-0.1.0-master-20170309054955-dev) !Schema version 0.1.8 lldp enable timezone set utc vrf green vrf red led base-loc_fdc on led base-loc on led base-hlth_fdc fast_blink led base-pwr_fdc on ! ! ! ! ! ! aaa authentication login default local aaa authorization commands default none ! ! ! ! router ospfv3 1 router ripng 1
maximum-paths 5 distance 1 redistribute ospfv3 1 timers update 40 timeout 200 garbage-collection 150 router ripng 1 vrf red default-information originate always maximum-paths 7 distance 5 vlan 1 no shutdown interface lag 44 no shutdown ipv6 address link-local ipv6 ripng 1
send disable interface 1
no shutdown ipv6 address link-local ipv6 ripng 1
receive disable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2544

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

RIPng (IPv6) commands | 2545

Chapter 136 Route policy and route map commands

Route policy and route map commands
This section describes general and filtering commands, as well as match, set and show commands for configuring route policies and route maps.

General or filtering commands

ip aspath-list
ip aspath-list <ASPATH-LIST-NAME> [seq <SEQ>] {permit | deny} <REGEXP> no ip aspath-list <ASPATH-LIST-NAME> [seq <SEQ>] {permit | deny} <REGEXP>
Description
Configures an AS Path list to match a specific AS path. AS Path lists are named lists of regular expression rules. They are used to match AS Path attributes in the routes for inclusion in or exclusion from route policies. The sequence number is optional and is autogenerated whenever it is not explicitly mentioned. All AS Path list rules with the same name are grouped together. The no form of this command removes the AS Path list configuration.

Parameter <ASPATH-LIST-NAME> seq <SEQ> {permit | deny}
<REGEXP>

Description
Specifies the name of the AS Path list.
Specifies the order of reference of the regular expression rules.
Specifies whether the route is available for further processing when there is a match.
Specifies the regular expression to match the AS Path. Standard regular expression wildcards are supported. The _ character can be used to match the AS Path boundary.

Examples
Configuring an AS Path list with sequence numbering:

switch(config)# ip aspath-list ASLst seq 5 permit _4*

Configuring a prefix list without sequence numbering:

switch(config)# ip aspath-list ASLst permit _4*

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
AOS-CX 10.14 Command-Line Interface Guide

2546

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip community-list
ip community-list standard <COMM-LIST-NAME> <DESCRIPTION> [seq <SEQ>] {permit | deny} <COMMUNITY-NUMBER> no ip community-list standard <COMM-LIST-NAME> <DESCRIPTION> [seq <SEQ>] {permit | deny} <COMMUNITY-NUMBER>
Description
Configures a community list to match a specific community number attribute. Community-list is a named list of regular expressions. They are used to match the community number attributes in the routes for inclusion in, or exclusion from route policies. The sequence number is optional and is autogenerated whenever it is not explicitly mentioned. All community-list rules with the same name are grouped. The no form of this command removes the community list configuration.

Parameter <COMM-LIST-NAME> <DESCRIPTION> seq <SEQ> {permit | deny} <COMMUNITY-NUMBER>

Description
Specifies the name of the community list that matches community number of a route.
Specifies the description of the community list. Maximum character limit is 80.
Specifies the order of reference of the regular expression rules.
Specifies whether the route is available for further processing when there is a match.
Specifies the community number. The community number must be in AA: NN format or from the list of well-known community.

Examples
Configuring a community list with sequence numbering:

switch(config)# ip community-list standard CommLst seq 5 permit 101:41

Configuring a community list without sequence numbering:

switch(config)# ip community-list standard CommLst no-export permit

Route policy and route map commands | 2547

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip prefix-list
ip prefix-list <PREFIX-LIST-NAME> [seq <SEQ>] <IP-PREFIX/MASK> [ge <0-32>] [le <0-32>] no ip prefix-list <PREFIX-LIST-NAME> [seq <SEQ>] <IP-PREFIX/MASK> [ge <0-32>] [le <0-32>]
Description
Configures a prefix list to match a set of prefixes. Prefix lists are named lists of route prefixes. They are used to match routes for inclusion in or exclusion from route policies. The sequence number determines the order of matching. The matches are performed starting from the lowest sequence number to the highest sequence number until there is a match. The sequence number is however optional and is autogenerated whenever it is not explicitly mentioned. All prefixes with the same prefix list name are grouped.
The autogenerated sequence number is derived by adding 10 to the highest sequence number available. This technique makes it possible to insert new prefix list sequence number in between.
The ge and le parameters are used to combine prefixes with a range of network mask. For example, 172.131.0.0/16 ge 16 le 24 will match all prefixes within the 172.131.0.0/16 network that have a mask greater than or equal to 16 bits and less than or equal to 24 bits in length. For instance, 172.131.1.0/18 would match, because its length is between 16 and 24 but 172.0.0.0/8 or 172.131.1.128/25 would not match.
The no form of this command removes the prefix list configuration. Prefix-list commands which generate sequence numbers must explicity use sequence numbers in the no form.

Parameter <PREFIX-LIST-NAME> seq <SEQ> {permit | deny}
IP-PREFIX/MASK> ge <0-32> le <0-32>

Description Specifies the name of the prefix list. Specifies the order of reference of the prefix rules. Specifies whether the route is available for further processing when there is a match. Specifies the IP prefix or mask. Specifies the minimum prefix length to be matched. Specifies the maximum prefix length to be matched.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2548

Examples
Configuring a prefix list with sequence numbering: switch(config)# ip prefix-list PFXLST seq 5 permit 4.0.0.0/8 ge 9 le 12
Configuring a prefix list without sequence numbering: switch(config)# ip prefix-list PSXLST permit 5.0.0.0/8

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 prefix-list
ipv6 prefix-list <PREFIX-LIST-NAME> [seq <SEQ>] <IPV6-PREFIX/MASK> [ge <0-128>] [le <0128>] no ipv6 prefix-list <PREFIX-LIST-NAME> [seq <SEQ>] {ip | ipv6} <IPV6-PREFIX/MASK> [ge <0128>] [le <0-128>]
Description
Configures a prefix list to match a set of prefixes. Prefix lists are named lists of route prefixes. They are used to match routes for inclusion in or exclusion from route policies. The sequence number determines the order of matching. The matches are performed starting from the lowest sequence number to the highest sequence number until there is a match. The sequence number is however optional and is autogenerated whenever it is not explicitly mentioned. All prefixes with the same prefix list name are grouped.
The autogenerated sequence number is derived by adding 10 to the highest sequence number available. This technique makes it possible to insert new prefix list sequence number in between.
The ge and le parameters are used to combine prefixes with a range of network mask. For example, 2000::/64 ge 65 le 70 will match all prefixes within the 2000::/64 network that have a mask greater than or equal to 65 bits and less than or equal to 70 bits in length.
The no form of this command removes the prefix list configuration. Prefix-list commands which generate sequence numbers must explicity use sequence numbers in the no form.

Route policy and route map commands | 2549

Parameter <PREFIX-LIST-NAME> seq <SEQ> {permit | deny}
IP-PREFIX/MASK> ge <0-128> le <0-128>

Description Specifies the name of the prefix list. Specifies the order of reference of the prefix rules. Specifies whether the route is available for further processing when there is a match. Specifies the IP prefix or mask. Specifies the minimum prefix length to be matched. Specifies the maximum prefix length to be matched.

Examples
Configuring a prefix list with sequence numbering:

switch(config)# ipv6 prefix-list PFXLST seq 10 permit 2000::64 ge 65 le 70

Configuring a prefix list without sequence numbering:

switch(config)# ipv6 prefix-list PSXLST permit 2000::1/128

Removing the configuring of a prefix list:

switch(config)# no ipv6 prefix-list P2 seq 10 permit any

Removing the configuring of a prefix list:

switch(config)# no ipv6 prefix-list P1 seq 10

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

route-map

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2550

route-map <NAME> {permit | deny} seq <NUMBER> no route-map <NAME> {permit | deny} seq <NUMBER>
Description
Configures a route map entry with the given name and action by taking the CLI in the route map context. All route map entries with the same name belong to the same route map. The route map entry rules are processed in order by sequence number, until a match is found. The no form of this command removes the route map entry configuration.

Parameter <NAME> {permit | deny}
<NUMBER>

Description
Specifies the name of the route map. Required.
Specifies whether the route is available for further processing when there is a match. Required.
Specifies the sequence number of the entry. Required.

Examples
Configuring a route map entry:

switch(config)# route-map GlobalMap permit seq 10

Removing a route map entry configuration:

switch(config)# no route-map GlobalMap permit seq 10

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

continue
continue <SEQUENCE NUMBER> no continue
Description

Route policy and route map commands | 2551

Allows you to execute additional entries in a route map. The sequence number specifies the route-map entry's sequence number that will be executed next if the existing entry's match clause is successful. If a successful match occurs and continue command exists, the route map saves the set value first and then jumps to the specified route map entry. Set clauses are saved during the match clause evaluation and are executed only after the route map evaluation is completed. The set clauses are executed in the order in which they were configured. Set clauses can be accumulative or additive as set as-path prepend or it can be absolute as set metric. For set commands that configures an accumulative value, subsequent values are added in order in which they were configured. For set commands that configures an absolute value, The values from the last instance will be applied. The no form of this command removes the route map continue configuration.
If the specified route-map sequence entry does not exist, route-map processing will be terminated at the current sequence number if its clause is matched. The continue sequence number must be higher than the current route map sequence number for this command to take effect.

Parameter <SEQUENCE NUMBER>

Description
Specifies the value of the route map entry to be executed next after a successful match clause.

Examples
Configuring a route map to continue to execute an additional entry:

switch(config)# route-map GlobalMap permit 10 switch(config-route-map-GlobalMap-10)# continue 40

Removing a route map continue configuration:

switch(config)# route-map GlobalMap permit seq 10 switch(config-route-map-GlobalMap-10)# no continue 40

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2552

Match commands

match aspath-list
match aspath-list <ASPATH-LIST-NAME> no match aspath-list <ASPATH-LIST-NAME>
Description
Matches the AS path attribute of the route with one or more regular expressions in the AS path list. The no form of this command restores the default behavior of not matching the AS path attribute of the route.

Parameter <ASPATH-LIST-NAME>

Description
Specifies the name of the AS path list to match the AS path attribute of the route.

Example
Configuring a match clause in the route map to match the AS path list:

switch(config)# ip aspath-list ASLst permit 1001 switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# match aspath-list ASLst

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

match community-list
match community-list <COMMUNITY-LIST-NAME> [exact-match] no match community-list <COMMUNITY-LIST-NAME> [exact-match]
Description
Matches the community number attribute of the route with one, or more regular expressions in the community-list. The no form of this command restores the default behavior of not matching the community number attribute of the route.

Route policy and route map commands | 2553

Parameter <COMMUNITY-LIST-NAME>
[exact-match]

Description
Specifies the name of the community-list to match the community number attribute of the route.
Indicates that the community number attribute must match exactly with the expressions in the community-list. However, the order of the communities in the community-list is of no significance.

Example
Configuring a match clause in the route map to match the community list:

switch(config)# ip community-list standard CommLst 101:41 permit 12:201 switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# match community-list CommLst

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

match interface
match interface <INTERFACE-NAME> no match interface <INTERFACE-NAME>
Description
Matches the outgoing interface value of the route with the value configured in the match clause. This command is applicable to static and connected routes which will be redistributed to the BGP protocol. The no form of this command restores the default behavior of not matching the outgoing interface value of the route.

Parameter <INTERFACE-NAME>

Description
Specifies the value to be matched with the outgoing interface of the route entry.

Example
Configuring a match clause in the route map to match the outgoing interface of the route:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2554

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# match interface 1/1/1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

match ip address prefix-list
match ip address prefix-list <PREFIX-LIST-NAME> no match ip address prefix-list <PREFIX-LIST-NAME>
Description
Matches the destination IP address prefix of the routes with one or more addresses in the prefix list. The no form of this command restores the default behavior of not matching the destination IP address prefix of the routes to their default value. This command is applicable to OSPF, static, and connected routes which will be redistributed to the BGP protocol.

Parameter <PREFIX-LIST-NAME>

Description
Specifies the name of the prefix list to be matched with the network address of the route.

Example
Configuring a prefix list and a match clause in route map to match the prefix list:

switch(config)# ip prefix-list PfxLst permit 4.0.0.0/8 switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# match ip address prefix-list PfxLst

When the IP prefix list with prefix and mask-length of 0.0.0.0/0 is used, the route matches default-route 0.0.0.0/0 as well as any other route. This behavior would be changed to match only the default-route in the next release.
For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Route policy and route map commands | 2555

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

match ip next-hop
match {ip | ipv6} next-hop {<ADDRESS> | prefix-list <PREFIX-LIST-NAME>} no match {ip | ipv6} next-hop [<ADDRESS> | prefix-list <PREFIX-LIST-NAME>]
Description
Matches the next-hop address of the route with the configured address in the match clause. This command is applicable to static routes which will be redistributed to BGP protocol. The no form of this command restores the default behavior of not matching the next-hop address of the route.

Parameter <ADDRESS>
prefix-list <PREFIX-LIST-NAME>

Description
Specifies the IPv4 address to match with the next-hop address of the route.
Specifies the name of the IP prefix list to be matched with the next-hop address of the route.

Example
Configuring a match clause in the route map to match the next-hop address of the route:

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# match ip next-hop 1.1.1.2

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2556

Platforms
6300 6400

Command context config-route-map

Authority
Administrators or local user group members with execution rights for this command.

match ip route-source
match ip route-source prefix-list <PREFIX-LIST-NAME> no match ip route-source prefix-list <PREFIX-LIST-NAME>
Description
Matches the IP address of the source of the route using IP prefix lists. The no form of this command restores the default behavior of not matching the IP address of the route.

Parameter <PREFIX-LIST-NAME>

Description
Specifies the name of the prefix list to match the IP address of the source of the route.

Example
Configuring a match clause in the route map to match the source of the route:

switch(config)# ip prefix-list RouterLst 4.4.4.4/32 switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# match ip route-source prefix-list RouterLst

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

match local-preference
match local-preference <VALUE> no match local-preference <VALUE>
Description
Matches the local preference value of the route with the value configured in the match clause.

Route policy and route map commands | 2557

The no form of this command restores the default behavior of not matching the local preference value of the route.

Parameter <VALUE>

Description
Specifies the value to be matched with the route entry local preference in the range of 1 to 4294967295.

Example
Configuring a match clause in the route map to match the local preference of the route:

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# match local-preference 100

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

match metric
match metric <VALUE> no match metric <VALUE>
Description
Matches the MED value of the route with the value configured in the match clause. The no form of this command restores the default behavior of not matching the MED value of the route.

Parameter <VALUE>

Description Specifies the value to be matched with the route entry MED.

Example
Configuring a match clause in the route map to match the metric of the route:

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# match metric 10

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2558

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

match origin
match origin {igp | egp | incomplete} no match origin [igp | egp | incomplete]
Description
Matches the route origin attribute of the route with route configured in the match clause. The no form of this command restores the default behavior of not matching the route origin attribute of the route.

Parameter {igp | egp | incomplete}

Description
Specifies if the route origin attribute is matched with a match clause which originated as IGP, EGP, or has unknown origin. The unknown origin is typically redistributed from another routing protocol.

Example
Configuring a match clause in the route map to match the origin:

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# match origin igp

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Route policy and route map commands | 2559

Platforms
6300 6400

Command context config-route-map

Authority
Administrators or local user group members with execution rights for this command.

match route-type
match route-type {external <type-1|type-2> | <evpn-type-2|evpn-type-3|evpn-type-5>} no match route-type {external <type-1|type-2> | <evpn-type-2|evpn-type-3|evpn-type-5>}
Description
This command matches the OSPF external route or EVPN route-type against the value configured in the match clause. Furthermore, the type-1 and type-2 metric can be matched for OSPF external route.

The no form of this command restores the default behavior of not matching the metric-type value of the OSPF external route.

Parameter {type-1 | type-2}
evpn-type-2 evpn-type-3 evpn-type-5

Description Specifies the type-1 or type-2 OSPF value to be matched with the external route. Match MAC/IP advertisement routes Match inclusive multicast ethernet tag routes Match IP prefix routes

Example
Configuring a match clause in the route map to match the metric-type value of the OSPF external route:

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# match route-type external type-1

Configure a match clause in route-map to match EVPN route-type's.

switch(config)# route-map GlobalMap permit 11 switch(config-route-map)# match route-type evpn-type-2

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14 10.07 or earlier
Command Information

Modification Additional EVPN type parameters are introduced. --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2560

Platforms
6300 6400

Command context config-route-map

Authority
Administrators or local user group members with execution rights for this command.

match source-protocol
match source-protocol {bgp | connected | ospf | static} no match source-protocol [bgp | connected | ospf | static]
Description
Matches the source routing protocol value of the route with the value configured in the match clause. The no form of this command restores the default behavior of not matching the source routing protocol value of the route.

Parameter {bgp | connected | ospf | static}

Description
Specifies the bgp, connected, ospf, or static value to be matched with the route entry source protocol.

Example
Configuring a match clause in the route map to match the source protocol route:

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# match source-protocol ospf

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

match tag
match tag <value> no match tag <value>
Description
Matches the tag value of the route with the one configured in the match clause. Applies to static routes that will be redistributed to BGP, OSPFv3 and OSPFv3 protocols.

Route policy and route map commands | 2561

The no form of this command removes the tag value of the route.

Parameter value

Description Numeric value to match with the route tag. Required.

Example
Configuring a match clause in route-map to match the tag value of the route:

switch(config)# route-map GlobalMap permit 11 switch(config-route-map)# match tag 20

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

match vni
match vni <value> no match vni <value>
Description
Matches the VNI value of the route with the one configured in the match clause. Applies to matching L2VNIs or L3VNIs. Use the continue clause if both L2VNI and L3VNI are to be matched. Route maps with the match vni clause can be used with L2VPN EVPN neighbors only. The no form of this command removes the match for the VNI value of the route.

Parameter <value>

Description
Numeric value to match with the route tag. Required. Range: 1 to 16777214

Example
Configuring a match clause in route map to match the VNI value of the route:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2562

switch(config)# route-map GlobalMap permit 11 switch(config-route-map)# match vni 10000
Configuring a match clause in route map to match both L2VNI and L3VNI in a single route map:
switch(config)# route-map GlobalMap permit 11 switch(config-route-map)# match vni 10000 switch(config-route-map)# continue 12 switch(config)# route-map GlobalMap permit 12 switch(config-route-map)# match vni 10
The following example is different from the one above, as it configures a match clause in route map to match any one of the two VNIs:
switch(config)# route-map GlobalMap permit 10 switch(config-route-map)# match vni 10000 switch(config)# route-map GlobalMap permit 20 switch(config-route-map)# match vni 10 switch(config)# route-map GlobalMap deny 30

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms
6300 6400

Command context config-route-map

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

Set commands
set as-path exclude
set as-path exclude <AS> no set as-path exclude <AS>
Description
Removes all occurrences of the configured AS Path from the AS Path attribute of the route. The no form of this command restores the default behavior of not modifying the AS Path attribute list.

Route policy and route map commands | 2563

Parameter <AS>

Description
Specifies the AS number to be removed from the AS Path attribute of the route.

Example
Configuring a set clause in the route map to remove the AS from the AS Path attribute of the route:

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# set as-path exclude 1001

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

set as-path prepend
set as-path prepend <AS> <AS>... no set as-path prepend <AS> <AS>...
Description
Pretends the list of the configured AS numbers to the AS Path attribute of the routes. To ensure that the AS path conforms to standards, the local AS is prepended after this command is executed. The no form of this command restores the default behavior of not modifying the AS Path attribute list.

Parameter <AS> <AS>...

Description
Specifies the AS numbers to be prepended from the AS Path attribute of the route.

Example
Configuring a set clause in the route map to prepend the AS from the AS Path attribute of the route:

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# set as-path prepend 1 switch(config-route-map-GlobalMap-11)# no set as-path prepend 102

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2564

The no form of the command deletes the entire list of AS-Path prepend configuration regardless of the parameter list. In this example, the no form command would result in deletion of all the three AS numbers that were earlier configured.

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

set community
set community {<AA:NN> | internet | no-export | no-advertise | local-as} [additive | delete] no set community [<AA:NN> | internet | no-export | no-advertise | local-as] [additive | delete]
Description
Modifies the community number attribute of the route with the value configured in the set clause. This command is applicable to OSPF, static, and connected routes which will be redistributed to the BGP protocol. The no form of this command restores the default behavior of not modifying the community number attribute of the route.

Parameter {<AA:NN> | internet | no-export | no-advertise | local-as}
[additive] [delete]

Description
Selects the value to be set as the community number attribute of the route in the AA:NN format (quotation marks required when multiple communities are listed, for example: set community "65001:100 65001:200") or as a known community name internet, no-export, no-advertise, and local-as.
Specifies that the specified community number is added to the existing community number attribute of the route.
Specifies that the specified community number is removed from the existing community number attribute of the route.

Example
Configuring a set clause in the route map to modify the community number attribute of the route:

Route policy and route map commands | 2565

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# no set community 11:101 switch(config-route-map-GlobalMap-11)# set community no-advertise

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

set dampening
set dampening {half-life <VALUE> reuse <VALUE> suppress <VALUE> max-suppress-time <VALUE>} no set dampening
Description
Sets parameters of route flap dampening feature.

Parameter half-life reuse suppress max-suppress-time

Description Time to reduce the penalty to half. Lower threshold of penalty. Upper threshold of penalty. Max time to keep route suppressed.

Example

switch(config-route-map-abc-20)# set dampening half-life 5 reuse 50 suppress 125 max-suppress-time 255
switch(config-route-map-abc-20)# no set dampening half-life 5 reuse 50 suppress 125 max-suppress-time 255
switch(config-route-map-abc-20)# set dampening
switch(config-route-map-abc-20)# no set dampening

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2566

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

set ip nexthop
set {ip | ipv6} nexthop {global} <IP-ADDR> no set {ip | ipv6} nexthop {global} <IP-ADDR>
Description
Sets the IP address of the next-hop of the route with the value configured in the set clause. The no form of this command restores the default behavior of not modifying the IP address of the nexthop of the route.

Parameter <IP-ADDR>

Description
Specifies the IPv4 address to be set as the next-hop address of the route.

Example
Configuring a set clause in the route map to modify the next-hop address of the route entry:

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# set ip nexthop 1.1.1.2

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Route policy and route map commands | 2567

Platforms
6300 6400

Command context config-route-map

Authority
Administrators or local user group members with execution rights for this command.

set ipv6 nexthop global
set ipv6 nexthop global <IP-ADDRESS> no set ip nexthop global <IP-ADDRESS>
Description
Sets the IPv6 address of the nexthop of the routes with the IPv6 address configured in the set clause. The no form of this command removes this configuration.

Parameter <IP-ADDRESS>

Description Specifies the IPv6 address of the nexthop router.

Examples
Configuring a set clause in route-map to modify the nexthop address of route entry:

switch(config)# route-map GlobalMap premit 11 switch(config-route-map)# set ipv6 nexthop global 1.1.1.2

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

set local-preference
set local-preference <VALUE> no set local-preference <VALUE>
Description
Modifies the local-preference attribute of the route entry with the value configured in the set clause. The no form of this command restores the default behavior of not modifying the local-preference attribute of the route entry.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2568

Parameter <VALUE>

Description
Specifies the value to be set as the local-preference attribute of the route entry. Range: 0 to 4294967295.

Example
Configuring a set clause in the route map to modify the metric value of the route:

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# set local-preference 100

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

set metric
set metric <VALUE> no set metric <VALUE>
Description
Modifies the metric value of the route with the value configured in the set clause. This command is applicable to OSPF, static, and connected routes which will be redistributed to the BGP protocol. The no form of this command restores the default behavior of not modifying the metric value of the route.

Parameter <VALUE>

Description
Specifies the value to be set as the metric value of the route. Range: 0 to 4294967295.

Example
Configuring a set clause in the route map to modify the metric value of the route:

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# set metric 10

Route policy and route map commands | 2569

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

set origin
set origin [igp | egp | incomplete] no set origin [igp | egp | incomplete]
Description
Modifies the route origin attribute of the route update with the value configured in the set clause. The no form of this command restores the default behavior of not modifying the route origin attribute of the route.

Parameter {igp | egp | incomplete}

Description
Selects the route update originated to IGP, EGP, or incomplete. When incomplete is selected, the route update origin is set to unknown.

Example
Configuring a set clause in the route map to modify the origin attribute of the route:

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap-11)# set origin igp

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2570

Platforms
6300 6400

Command context config-route-map

Authority
Administrators or local user group members with execution rights for this command.

set tag
set tag <value> [no] set tag <value>
Description
Modifies the tag value of the route with the one configured in the set clause. Applicable to static routes that will be redistributed to ospfv2 and ospfv3 protocols. The no form of this command removes the set clause tag value.

Parameter value

Description
Numeric value to change the route entry tag. Range: 04294967295. Required.

Example
Configuring a set clause in route-map to modify the tag value of the route:

switch(config)# route-map GlobalMap permit 11 switch(config-route-map)# set tag 10

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

set weight
set weight <VALUE> no set weight <VALUE>
Description
Modifies the weight attribute of the route with the value configured in the set clause.

Route policy and route map commands | 2571

The no form of this command restores the default behavior of not modifying the weight attribute of the route.

Parameter <VALUE>

Description
Specifies the value to be set as the weight attribute of the route. Range: 0 to 65535.

Example
Configuring a set clause in the route map to modify the metric value of the route:

switch(config)# route-map GlobalMap permit seq 11 switch(config-route-map-GlobalMap=11)# set weight 100

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-route-map

Modification --
Authority Administrators or local user group members with execution rights for this command.

Show commands

show ip aspath-list
show ip aspath-list [<NAME>] [vsx-peer]
Description
Shows the configuration details of the AS path list.

Parameter <NAME> vsx-peer

Description
Specifies name of the AS path list.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2572

Showing the IP AS path list configuration information:
switch# show ip aspath-list ip aspath-list ASLst
seq 10 permit 22 33 seq 20 deny 44

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show ip community-list
show ip community-list [<NAME>] [vsx-peer]
Description
Shows the configuration details of the community-list.

Parameter <NAME> vsx-peer

Description
Specifies name of the community-list.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing the community list configuration information:
switch# show ip community-list ip community-list standard CommLst
seq 10 permit 11:101 seq 20 deny 12:201

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Route policy and route map commands | 2573

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show ip prefix-list
show ip prefix-list [<NAME>] [vsx-peer]
Description
Shows the configuration details of the IP prefix lists.

Parameter <NAME> vsx-peer

Description
Specifies name of the IP prefix lists.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing the IP prefix list configuration information:
switch# show ip prefix-list ip prefix-list PfxLst: 2 entries
seq 10 permit 3.0.0.0/8 ge 8 le 8 seq 20 deny 4.0.0.0/8 ge 8 le 8

switch# show ipv6 prefix-list

ipv6 prefix-list x: 1 entries

seq

10 permit 2011::/64ge 64le 64

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2574

Command Information

Platforms
6300 6400

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show route-map
show route-map [<NAME>] [vsx-peer]
Description
Shows the configuration details of the route map.

Parameter <NAME> vsx-peer

Description
Specifies name of the route map.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing the route map configuration information:
switch# show route-map Route map: InternetFilter
Seq 10, permit, Match : origin : egp metric : 123 Set : community : 23:34 metric : 3 as_path_exclude : 123 local_preference : 3456 origin : igp weight : 25
Seq 20, permit, Match : origin : egp metric : 456 Set : community : 44:44 metric : 5 as_path_prepend : 444 local_preference : 66 origin : igp weight : 250
Route map: LocalFilter Seq 10, permit, origin : egp metric : 10

ip next-hop address

: 2.2.2.3

Route policy and route map commands | 2575

local-preference

: 20

route-type

: external_type1

source-protocol

: static

prefix-list

: PfxLst

aspath-list

: ASLst

community-list

: CommLst

ip next-hop prefix-list

: PfxLst

ip route-source prefix-list : PfxLst

Set :

community : 22:33

metric : 25

as_path prepend : 65535 65534

ip next-hop address : 2.2.2.4

local_preference : 30

origin : igp

weight : 30

dampening

: half-life = 5, reuse = 50, suppress = 125,

max-suppress-time = 15

All the match clauses are grouped. All the set clauses are grouped. For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2576

Chapter 137 RPVST+ commands

RPVST+ commands

clear spanning-tree statistics
clear spanning-tree statistics [VLAN-ID]
Description
Clears the spanning tree BPDU statistics, either all statistics or those related to a specified VLAN.

Parameter VLAN-ID

Description Specifies the VLAN ID.

Example
Clearing all spanning tree BPDU statistics:

switch(config)# clear spanning-tree statistics

Clearing spanning tree BPDU statistics for a particular VLAN :

switch(config)# clear spanning-tree statistics 10

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show capacities rpvst
show capacities rpvst

AOS-CX 10.14 Command-Line Interface Guide

2577

Description
Shows the capacities of RPVST VLANs configurable on a system and RPVST VPORTs supported in a system.
Examples
Showing capacities on a 6400 switch:

switch# show capacities rpvst

System Capacities : Filter RPVST

Capacities Name

Value

--------------------------------------------------------------------------

Maximum number of RPVST VLANs configurable on the system

768

Maximum number of RPVST VPORTs supported in a system

2048

Showing capacities on a 6300 switch:

switch# show capacities rpvst

System Capacities : Filter RPVST

Capacities Name

Value

--------------------------------------------------------------------------

Maximum number of RPVST VLANs configurable on the system

512

Maximum number of RPVST VPORTs supported in a system

2048

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.09 10.07 or earlier

Modification Increased RPVST VLAN capacity to 768 on 6400 switch series. --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show capacities-status rpvst
show capacities-status rpvst
Description
Shows the number of RPVST VLANs and RPVST VPORTs currently configured.
Examples

RPVST+ commands | 2578

Showing capacities-status on a 6400 switch:

switch# show capacities rpvst

System Capacities Status : Filter RPVST

Capacities Status Name

Value

Maximum

--------------------------------------------------------------------------

Number of RPVST VLANs configured

5

768

Number of RPVST VPORTs configured

9

2048

Showing capacities-status on a 6300 switch:

switch# show capacities-status rpvst

System Capacities Status : Filter RPVST

Capacities Status Name

Value

Maximum

--------------------------------------------------------------------------

Number of RPVST VLANs configured

3

254

Number of RPVST VPORTs configured

9

2048

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.09 10.07 or earlier

Modification Increased RPVST VLAN capacity to 768 on 6400 switch series. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree
show spanning-tree [vsx-peer]
Description
Shows the spanning tree mode and information on the RPVST instances. When Port security is enabled on the port and the client is not-yet authenticated, the security feature keeps the port in the Down state. STP also keeps the port in the Blocking state and the role as Disabled in the show spanning-tree command output, whereas in the hardware, the state is maintained as Learning. After client authentication is successful, the port state changes to Forwarding.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2579

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing spanning tree mode and RPVST instance information:

switch# show spanning-tree Spanning tree status Extended System-id Ignore PVID Inconsistency Path cost method RPVST-MSTP Interconnect VLAN Current Virtual Ports Count Maximum Allowed Virtual Ports

: Enabled Protocol: RPVST : Enabled : Enabled : Long :1 :7 : 2048

VLAN1 Root ID

Priority : 32768 MAC-Address: 70:72:cf:31:c9:23 This bridge is the root Hello time(in seconds):2 Max Age(in seconds):20 Forward Delay(in seconds):15

Bridge ID

Priority : 32768 MAC-Address: 70:72:cf:31:c9:23 Hello time(in seconds):2 Max Age(in seconds):20 Forward Delay(in seconds):15

PORT

ROLE

STATE

COST PRIORITY TYPE

BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx

-------- ----------- ---------- ------- --------- --------- --------- --------- --------- -------

1/1/1 Designated Forwarding 20000 128

P2P Edge 100

60

20

10

1/1/2 Designated Forwarding 20000 128

P2P

100

60

20

10

1/1/3 Designated Forwarding 20000 128

Shr

100

60

20

10

1/1/4 Designated Forwarding 20000 128

Shr Edge 100

60

20

10

1/1/5 Alternate Loop-Inc 20000 128

Shr Edge 100

60

20

10

1/1/6 Alternate Root-Inc 20000 128

Shr Edge 100

60

20

10

1/1/7 Disabled Down

20000 128

P2P

100

60

20

10

Number of topology changes : 4 Last topology change occurred : 516 seconds ago

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.09 10.07 or earlier

Modification A new state Down is added in the output. --

RPVST+ commands | 2580

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree detail
show spanning-tree detail [vsx-peer]
Description
Shows the detailed spanning tree mode and information on the RPVST instances. When Port security is enabled on the port and the client is not-yet authenticated, the security feature keeps the port in the Down state. STP also keeps the port in the Blocking state and the role as Disabled in the show spanning-tree command output, whereas in the hardware, the state is maintained as Learning. After client authentication is successful, the port state changes to Forwarding.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing spanning tree mode and detailed RPVST instance information:

switch# show spanning-tree detail

Spanning tree status

: Enabled Protocol: RPVST AUTO

Extended System-id

: Enabled

Ignore PVID Inconsistency

: Disabled

Path cost method

: Long

RPVST-MSTP Interconnect VLAN : 1

Current Virtual Ports Count : 2032

Maximum Allowed Virtual Ports : 2048

Maximum Allowed RPVST Instances: 254

Configured RPVST Enable Vlans : 20-30,100

Configured RPVST Disable Vlans : 1-10

Auto RPVST Enable Vlans

: 11-19,31-99,101-264

Vlans with no RPVST Instance due to Max limit reach : 265-300

VLAN1 Root ID

Priority : 32768 MAC-Address: 70:72:cf:31:c9:23 This bridge is the root Hello time(in seconds):2 Max Age(in seconds):20 Forward Delay(in seconds):15

Bridge ID

Priority : 32768 MAC-Address: 70:72:cf:31:c9:23 Hello time(in seconds):2 Max Age(in seconds):20

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2581

Forward Delay(in seconds):15

PORT

ROLE

STATE

COST PRIORITY TYPE

BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx

-------- ----------- ---------- ------- --------- --------- --------- --------- --------- -------

1/1/1 Designated Forwarding 20000 128

P2P Edge 100

60

20

10

1/1/2 Designated Forwarding 20000 128

P2P

100

60

20

10

1/1/3 Designated Forwarding 20000 128

Shr

100

60

20

10

1/1/4 Designated Forwarding 20000 128

Shr Edge 100

60

20

10

1/1/5 Alternate Loop-Inc 20000 128

Shr Edge 100

60

20

10

1/1/6 Alternate Root-Inc 20000 128

Shr Edge 100

60

20

10

1/1/7 Disabled Down

20000 128

P2P

100

60

20

10

lag1

Disabled Down

20000 128

P2P Bound 100

60

20

10

Topology change flag : False Number of topology changes : 1 Last topology change occurred : 33293 seconds ago

Port 1/1/1 Designated Root Priority Designated Bridge Priority Designated Port Forwarding-State transitions BPDUs sent 1582, received 1506 TCN_Tx: 10, TCN_Rx: 10

: 32768 : 32768 : 1/1/1 :0

Address: 48:0F:CF:AF:22:1D Address: 48:0F:CF:AF:22:1D

Port lag1 Designated Root Priority Designated Bridge Priority Designated Port Forwarding-State transitions BPDUs sent 1402, received 1316 TCN_Tx: 10, TCN_Rx: 10 Multi-chassis role

: 32768 : 32768 : lag1 :0
: active

Address: 48:0F:CF:AF:22:1D Address: 48:0F:CF:AF:22:1D

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.09 10.07 or earlier

Modification A new state Down is added in the output. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree inconsistent-ports
show spanning-tree inconsistent-ports [vlan <VLAN-ID>]

RPVST+ commands | 2582

Description
Shows ports blocked by STP protection functions such as Root guard, Loop guard, BPDU guard, and RPVST guard.

Parameter <VLAN-ID>

Description Specifies a VLAN ID number.

Examples
On the 6400 Switch Series, interface identification differs. Showing inconsistent port information:

switch# show spanning-tree inconsistent-ports

VLAN ID

Blocked Port Reason

------------ -------------- ------------

1

1/1/1

BPDU Guard

2

1/1/1

BPDU Guard

3

1/1/1

BPDU Guard

4

1/1/1

BPDU Guard

5

1/1/1

BPDU Guard

6

1/1/1

BPDU Guard

7

1/1/1

BPDU Guard

8

1/1/1

BPDU Guard

9

1/1/1

BPDU Guard

10

1/1/1

BPDU Guard

Showing inconsistent port information for VLANs 1 to 4:

switch# show spanning-tree inconsistent-ports vlan 1-4

VLAN ID

Blocked Port Reason

------------ -------------- ------------

1

1/1/3

Root Guard

2

1/1/7

BPDU Guard

3

1/1/9

Loop Guard

4

1/1/37

RPVST Guard

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context Operator (>) or Manager

Authority Operators or Administrators or local user group members with

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2583

Platforms

Command context (#)

Authority
execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree summary port
show spanning-tree summary port
Description
Shows a summary of port-related spanning-tree configuration and status.
Example
On the 6400 Switch Series, interface identification differs. Showing a summary of port-related spanning tree information:

switch# show spanning-tree summary port

STP status

: Enabled

Protocol

: RPVST

BPDU guard timeout value

: None

BPDU guard enabled interfaces : 1/1/1

BPDU filter enabled interfaces : None

Root guard enabled interfaces : 1/1/3

Loop guard enabled interfaces : 1/1/2

TCN guard enabled interfaces : 1/1/1-1/1/3

Interface count by state

VLAN

Blocking Listening Learning Forwarding Down

---------------------- -------- --------- -------- ---------- ----

VLAN1

0

0

0

10

VLAN2

0

0

0

10

---------------------- -------- --------- -------- ---------- ----

Total = 2

0

0

0

20

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.09 10.07 or earlier
Command Information

Modification A new state Down is added in the output. --

RPVST+ commands | 2584

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree summary root
show spanning-tree summary root
Description
Shows the summary of spanning tree root and configurations for all VLANs.
Example
On the 6400 Switch Series, interface identification differs. Showing summary of spanning tree configurations:

switch# show spanning-tree summary root

STP status Protocol System ID

: Enabled : RPVST : f8:60:f0:c9:70:40

Root bridge for VLANs : 1-10

Root Hello Max Fwd

VLAN

Priority Root ID

cost Time Age Dly Root Port

-------- -------- ----------------- --------- ----- --- --- ------------

VLAN1

32768 f8:60:f0:c9:70:40

0

2 20 15

0

VLAN2

32768 f8:60:f0:c9:70:40

0

2 20 15

0

VLAN3

32768 f8:60:f0:c9:70:40

0

2 20 15

0

VLAN4

32768 f8:60:f0:c9:70:40

0

2 20 15

0

VLAN5

32768 f8:60:f0:c9:70:40

0

2 20 15

0

VLAN6

32768 f8:60:f0:c9:70:40

0

2 20 15

0

VLAN7

32768 f8:60:f0:c9:70:40

0

2 20 15

0

VLAN8

32768 f8:60:f0:c9:70:40

0

2 20 15

0

VLAN9

32768 f8:60:f0:c9:70:40

0

2 20 15

0

VLAN10

32768 f8:60:f0:c9:70:40

0

2 20 15

0

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2585

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree vlan
show spanning-tree vlan <VLAN-ID> [vsx-peer]
Description
Displays the spanning tree mode and information on the RPVST instance of the specified VLAN.

Parameter <VLAN-ID> vsx-peer

Description
Specifies the number of a VLAN.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing spanning tree mode and RPVST instance information for VLAN 2:

switch# show spanning-tree vlan 2 VLAN2 Spanning tree status: Enabled Protocol: RPVST
Root ID Priority : 32768 MAC-Address: 70:72:cf:76:43:2a This bridge is the root Hello time(in seconds):2 Max Age(in seconds):20 Forward Delay(in seconds):15

Bridge ID

Priority : 32768 MAC-Address: 70:72:cf:76:43:2a Hello time(in seconds):2 Max Age(in seconds):20 Forward Delay(in seconds):15

PORT

ROLE

STATE

COST

PRIORITY TYPE

BPDU-Tx BPDU-Rx

TCN-Tx

TCN-Rx

-------- ----------- ---------- ---------- --------- --------- ---------- --------

-- ---------- ----------

1/1/1 Designated Forwarding 20000

128

P2P Edge 100

60

20

10

1/1/2 Designated Forwarding 20000

128

P2P

100

60

20

10

1/1/3 Designated Forwarding 20000

128

Shr

100

60

20

10

1/1/4 Designated Forwarding 20000

128

Shr Edge 100

60

20

10

1/1/5 Alternate Loop-Inc 20000

128

Shr Edge 100

60

20

10

1/1/6 Alternate Root-Inc 20000

128

Shr Edge 100

60

20

10

RPVST+ commands | 2586

1/1/7 Disabled Down

20000

128

P2P

100

60

20

10

Number of topology changes : 4 Last topology change occurred : 516 seconds ago

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.09 10.07 or earlier

Modification A new state Down is added in the output. --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show spanning-tree vlan detail
show spanning-tree vlan <VLAN-ID> detail [vsx-peer]
Description
Displays the spanning tree mode and information on the RPVST instance of the specified VLAN and optionally displays details on the RPVST instance for the VLAN.

Parameter <VLAN-ID> vsx-peer

Description
Specifies the number of a VLAN.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing spanning tree mode and detailed RPVST instance information for VLAN 2:

switch# show spanning-tree vlan 2 detail VLAN2 Spanning tree status: Enabled Protocol: RPVST

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2587

Root ID

Priority : 32768 MAC-Address: 70:72:cf:76:43:2a This bridge is the root Hello time(in seconds):2 Max Age(in seconds):20 Forward Delay(in seconds):15

Bridge ID

Priority : 32768 MAC-Address: 70:72:cf:76:43:2a Hello time(in seconds):2 Max Age(in seconds):20 Forward Delay(in seconds):15

PORT

ROLE

STATE

COST

PRIORITY TYPE

BPDU-Tx BPDU-Rx

TCN-Tx

TCN-Rx

-------- ----------- ---------- ---------- --------- --------- ---------- --------

-- ---------- ----------

1/1/1 Designated Forwarding 20000

128

P2P Edge 100

60

20

10

1/1/2 Designated Forwarding 20000

128

P2P

100

60

20

10

1/1/3 Designated Forwarding 20000

128

Shr

100

60

20

10

1/1/4 Designated Forwarding 20000

128

Shr Edge 100

60

20

10

1/1/5 Alternate Loop-Inc 20000

128

Shr Edge 100

60

20

10

1/1/6 Alternate Root-Inc 20000

128

Shr Edge 100

60

20

10

1/1/7 Disabled Down

20000

128

P2P

100

60

20

10

Topology change flag : False Number of topology changes : 1 Last topology change occurred : 33293 seconds ago

Port 1/1/1 Designated root has priority :32768 Address: 48:0f:cf:af:22:1d Designated bridge has priority :32768 Address: 48:0f:cf:af:22:1d Designated port :1 Number of transitions to forwarding state : 0 BPDUs sent 1582, received 1506 TCN_Tx: 10, TCN_Rx: 10

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.09 10.07 or earlier
Command Information

Modification A new state Down is added in the output. --

RPVST+ commands | 2588

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

spanning-tree bpdu-guard timeout
spanning-tree bpdu-guard timeout <INTERVAL> no spanning-tree bpdu-guard timeout [<INTERVAL>]
Description
Enables and configures the auto re-enable timeout in seconds for all interfaces with BPDU guard enabled. When an interface is disabled after receiving an unauthorized BPDU it will automatically be reenabled after the timeout expires. The default is for the interface to stay disabled until manually reenabled. The no form of the command disables BPDU guard timeout on the interface. This is the default.

Parameter <INTERVAL>

Description Specifies the re-enable timeout in seconds. Range: 1 to 65535.

Example
On the 6400 Switch Series, interface identification differs. Enabling the BPDU guard timeout on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# spanning-tree bpdu-guard timeout 10

Disabling BPDU guard timeout on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree bpdu-guard

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2589

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

spanning-tree extend-system-id
spanning-tree extend-system-id {enable | disable} no spanning-tree extend-system-id
Description
Configures use of extended system ID. When enabled, the VLAN ID is included in spanning tree packets. When disabled, the VLAN ID is set to NULL in the spanning tree packets. By default, extended system ID is enabled. If you disable extended system ID, the bridge identifier field in the spanning tree packet is filled with zeros. The no form of this command disables extended system ID.

Parameter enable disable

Description Specifies enabling use of extended system ID. Specifies disabling use of extended system ID.

Examples
Enabling extended system ID:

switch# config switch(config)# spanning-tree extend-system-id enable

Disabling extended system ID:

switch# config switch(config)# spanning-tree extend-system-id disable switch(config)# no spanning-tree extend-system-id

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

RPVST+ commands | 2590

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

spanning-tree ignore-pvid-inconsistency
spanning-tree ignore-pvid-inconsistency {enable | disable} no spanning-tree ignore-pvid-inconsistency
Description
Configures port behavior when per-VLAN ID inconsistencies are present. For example, when the ports on both ends of a point-to-point link are untagged members of different VLANs, enabling this option allows RPVST+ to process untagged RPVST+ packets belonging to the peer's untagged VLAN as if they were received on the current device's untagged VLAN. When this option is disabled, RPVST+ blocks the link, causing traffic on the mismatched VLANs to be dropped. If this option is enabled on multiple switches connected by hubs, there could be more than two VLANs involved in PVID mismatches that will be ignored by RPVST+. If port VLAN memberships is misconfigured on a switch in the network, then enabling this option prevents RPVST+ from detecting the problem, which may result in packet duplication in the network since RPVST+ would not converge correctly. This command affects all ports on the switch belonging to VLANs on which RPVST+ is enabled. By default ignore per-VLAN ID inconsistency is disabled. The no form of this command sets the ignore per-VLAN ID inconsistencies to disabled.

Parameter enable
disable

Description
Specifies ignore per-VLAN ID inconsistencies and allow RPVST to run on mismatched links.
Disables the ignore per-VLAN ID inconsistencies functionality.

Examples
Enabling ignore per-VLAN ID inconsistencies:

switch# config switch(config)# spanning-tree ignore-pvid-inconsistency enable

Disabling ignore per-VLAN ID inconsistencies:

switch# config switch(config)# spanning-tree ignore-pvid-inconsistency disable switch(config)# no spanning-tree ignore-pvid-inconsistency

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2591

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree link-type
spanning-tree link-type {point-to-point | shared} no spanning-tree link-type
Description
Configures the link type of a port. The no form of this command sets the spanning tree link type to the default value of point-to-point.

Parameter point-to-point
shared

Description
Sets the spanning tree link type as point-to-point. Use this for fullduplex ports that provide a point-to-point link to devices such as a switch, bridge, or end-node. Default.
Sets the spanning tree link type as shared. Use this when the port is connected to a hub.

Examples
On the 6400 Switch Series, interface identification differs. Setting spanning tree link type to shared:

switch(config)# interface 1/1/1 switch(config-if)# spanning-tree link-type shared

Setting spanning tree link type to point-to-point for a port:

switch(config)# interface 1/1/1 switch(config-if)# no spanning-tree link-type

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

RPVST+ commands | 2592

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree mode
spanning-tree mode {mstp|rpvst [auto-vlan-enable [priority <NUMBER>]]} no spanning-tree mode {mstp|rpvst [auto-vlan-enable [priority <NUMBER>]]}
Description
Sets the spanning tree protocol (STP) mode to either MSTP mode (Multiple-instance Spanning Tree Protocol) or RPVST mode (Rapid Per VLAN Spanning Tree). Enabling the RPVST Auto VLAN feature will run RPVST on all VLANs currently configured on the switch. Default priority of 8 will be assigned to the VLANs being auto created. The no form of this command sets the spanning tree mode to the default mstp.
Enabling auto-VLAN can lead to an undeterministic state if auto scaled beyond the max system limit mentioned in the capacity-status.

Parameter mstp
rpvst auto-vlan-enable priority <NUMBER>

Description
Sets the STP mode to MSTP which applies spanning tree separately for each set of VLANs called an MSTI (multiple spanning tree instance).
Sets the STP mode to RPVST.
Selects RPVST auto VLAN mode.
Specifies the priorites for all auto created RPVST instances. Configured as a multiple of 4096. Default: 8.

Examples
Enabling MSTP mode:

switch(config)# spanning-tree mode mstp

Disabling MSTP mode:

switch(config)# no spanning-tree mode mstp

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2593

Enabling RPVST mode: switch(config)# spanning-tree mode rpvst
Disabling RPVST mode: switch(config)# no spanning-tree mode rpvst
Enabling RPVST auto VLAN with a priority of 1: switch(config)# spanning-tree mode rpvst auto-vlan-enable priority 1
Disabling RPVST auto VLAN with a priority of 1: switch(config)# no spanning-tree mode rpvst auto-vlan-enable priority 1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.12.1000 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Auto VLAN enable added. --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree pathcost-type
spanning-tree pathcost-type {long | short} no spanning-tree pathcost-type [long|short]
Description
Configures the spanning tree path cost type. The long mode provides support for the wider range of link speeds required by high-speed interfaces. All switches in the network must use the same path cost type or errors can occur in the spanning tree. The no form of this command sets the spanning tree path cost type to the default long.

RPVST+ commands | 2594

Parameter long
short

Description
Specifies the spanning tree path cost type as a 32-bit value, allowing port cost values to be set in the range 1-200,000,000. Default.
Specifies the spanning tree path cost type as a 16-bit value, allowing port cost values to be set in the range 1-65535.

Examples
Setting spanning tree path cost type to short:

switch# config switch(config)# spanning-tree pathcost-type short

Setting spanning tree path cost type to long:

switch# config switch(config)# spanning-tree pathcost-type long

Setting spanning tree path cost to default of long:

switch# config switch(config)# no spanning-tree pathcost-type

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree rpvst-mstp interconnect vlan
spanning-tree rpvst-mstp-interconnect-vlan <VLAN-ID> no spanning-tree rpvst-mstp-interconnect-vlan [<VLAN-ID>]
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2595

Configures the VLAN that has to be used to interconnect RPVST and MSTP domains. VLAN 1 is used by default. The no form of this command sets the VLAN configuration to the default of 1.
n It is required to create the interconnect VLAN and then configure RPVST spanning tree on it. n The same interconnect VLAN must be kept on all the switches in the network. n Adding or deleting the interconnect VLAN triggers a re-convergence in the network. n Deleting a VLAN that is configured as the interconnect VLAN does not reset the value to the default.

Parameter <VLAN-ID>

Description Specifies the number of a VLAN.

Examples
This example configures VLAN 10 to used to interconnect RPVST and MSTP domains.

switch#(config)# spanning-tree rpvst-mstp-interconnect-vlan 10

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree tcn-guard
spanning-tree tcn-guard no spanning-tree tcn-guard
Description
Disables propagation of topology change notifications (TCNs) to other STP ports. Use this when you do not want topology changes to be noticed by peer devices. By default, the propagation is enabled. The no form of this command, enables propagation of topology changes which is the default.
Examples
Enabling tcn-guard, which disables propagation of topology changes:

RPVST+ commands | 2596

switch(config-if)# spanning-tree tcn-guard Disabling tcn-guard, which enables propagation of topology changes:
switch(config-if)# no spanning-tree tcn-guard

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree vlan
spanning-tree vlan <VLAN-LIST> [{hello-time | foward-delay | max-age | priority} <VALUE>] no spanning-tree vlan <VLAN-LIST> [hello-time | foward-delay | max-age | priority]
Description
Creates an RPVST instance for the specified VLAN. This command also allows for configuration of RPVST instance-specific time parameters. The no form of this command removes the RPVST instance associated with the specified VLAN, and configures default values for RPVST instance-specific parameters.

Parameter <VLAN-LIST>
hello-time <VALUE> forward-delay <VALUE> max-age <VALUE> priority <VALUE>

Description
Specifies the number of a single VLAN, or a series of numbers for a range of VLANs, separated by commas (1, 2, 3, 4), dashes (1-4), or both (1-4,6).
Specifies the hello-time in seconds for the RPVST instance. Range: 2-10 seconds. Default: 2 seconds.
Specifies the forward-delay time in seconds for the RPVST instance. Range: 4-30 seconds. Default: 15 seconds.
Specifies the maximum age time in seconds for the RPVST instance. Range: 6-40 seconds. Default: 20 seconds.
Specifies the priority for the RPVST instance. Priority value is

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2597

Parameter

Description
configured as a multiple of 4096. Range: 0-15. Default: 8 which is 32768.

Examples
Creating an RPVST instance for a list of VLANs and configuring various time parameters:

switch# config switch(config)# spanning-tree vlan 2-5 switch(config)# spanning-tree vlan 2-5 hello-time 5 switch(config)# spanning-tree vlan 5 max-age 10 switch(config)# spanning-tree vlan 2-5 forward-delay 25 switch(config)# spanning-tree vlan 2-5 priority 5

Removing an RPVST instance for a list of VLANs and setting various time parameters to the default:

switch# config switch(config)# no spanning-tree vlan 2-5 switch(config)# no spanning-tree vlan 2-5 hello-time switch(config)# no spanning-tree vlan 2-5 forward-time switch(config)# no spanning-tree vlan 2-5 max-age switch(config)# no spanning-tree vlan 2-5 priority

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree vlan cost
spanning-tree vlan <VLAN-LIST> cost <PORT-COST> no spanning-tree vlan <VLAN-LIST> cost
Description
Configures the spanning tree cost for the VLAN. This is the cost to reach the root port. The no form of this command sets the port cost to the default value.

RPVST+ commands | 2598

Parameter <VLAN-LIST>
<PORT-COST>

Description
Specifies the number of a single VLAN, or a series of numbers for a range of VLANs, separated by commas (1, 2, 3, 4), dashes (1-4), or both (1-4,6).
Specifies the spanning tree cost for the VLAN. Range: 1200,000,000. Default is calculated from the port link speed: n 10 Mbps link speed equals a path cost of 2,000,000. n 100 Mbps link speed equals a path cost of 200,000. n 1 Gbps link speed equals a path cost of 20,000. n 2 Gbps link speed equals a path cost of 10,000. n 10 Gbps link speed equals a path cost of 2,000. n 100 Gbps link speed equals a path cost of 200. n 1 Tbps link speed equals a path cost of 20.

Examples
Setting port cost:

switch(config-if)# spanning-tree vlan 5 cost 100000

Setting port cost to the default:

switch(config-if)# no spanning-tree vlan 5 cost

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree vlan port-priority
spanning-tree vlan <VLAN-LIST> port-priority <PRIORITY> no spanning-tree vlan <VLAN-LIST> port-priority
Description
Configures port priority. A port with the lowest priority number has the highest priority for use in forwarding traffic.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2599

The no form of this command, sets the port priority to the default of 8.

Parameter <VLAN-LIST>
<PRIORITY>

Description
Specifies the number of a single VLAN, or a series of numbers for a range of VLANs, separated by commas (1, 2, 3, 4), dashes (1-4), or both (1-4,6).
Specifies the port priority. The value, configured as a multiple of 16, helps in determining the designated port. The lower a priority value, the higher the priority. Range: 1 to15. Default: 8.

Examples
Setting port priority:

switch(config-if)# spanning-tree vlan 5 port-priority 10

Setting port priority to the default of 8:

switch(config-if)# no spanning-tree vlan 5 port-priority

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

spanning-tree trap
spanning-tree trap {new-root | topology-change [vlan <VLAN-ID>] | errant-bpdu | root-guard-inconsistency | loop-guard-inconsistency}
no spanning-tree trap {new-root | topology-change [vlan <VLAN-ID>] | errant-bpdu | root-guard-inconsistency | loop-guard-inconsistency}
Description
Enables SNMP traps for new root, topology change event, errant-bpdu received event, root-guard inconsistency, and loop-guard inconsistency notifications. It is disabled by default. The no form of this command disables the notifications for SNMP traps.

RPVST+ commands | 2600

Parameter new-root topology-change <VLAN-ID> errant-bpdu root-guard-inconsistency loop-guard-inconsistency

Description
Enables SNMP notification when a new root is elected on any PVST vlan on the switch.
Enables SNMP notification when a topology change event occurred in specified PVST vlan on the switch.
Specifies the VLAN ID for the topology change trap. Range: 1 to 4094.
Enables SNMP notification when an errant bpdu is received by any PVST vlan on the switch.
Enables SNMP notification when the root-guard finds the port inconsistent for any PVST vlan on the switch.
Enables SNMP notification when the loop-guard finds the port inconsistent for any PVST vlan on the switch.

Examples
Enabling the notifications for the SNMP traps:

switch(config)# spanning-tree trap

new-root

Enable notifications which are sent when a new root is

elected

topology-change

Enable notifications which are sent when a topology

change occurs

errant-bpdu

Enable notifications which are sent when an errant

bpdu is received

root-guard-inconsistency Enable notifications which are sent when root guard

inconsistency occurs

loop-guard-inconsistency Enable notifications which are sent when loop guard

inconsistency occurs

switch(config)# spanning-tree trap new-root

<cr>

switch(config)# spanning-tree trap topology-change

vlan Enable topology change notification for the specified PVST vlan id.

switch(config)# spanning-tree trap topology-change vlan

<1-4094> Enable topology change information on the specified vlan id.

switch(config)# spanning-tree trap topology-change vlan 1

<cr>

switch(config)# spanning-tree trap errant-bpdu

<cr>

switch(config)# spanning-tree trap root-guard-inconsistency

<cr>

switch(config)# spanning-tree trap loop-guard-inconsistency

<cr>

Disabling the notifications for the SNMP traps:

switch(config)# no spanning-tree trap

new-root

Disable notifications which are sent when a new root

is elected

topology-change

Disable notifications which are sent when a topology

change occurs

errant-bpdu

Disable notifications which are sent when an errant

bpdu is received

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2601

root-guard-inconsistency Disable notifications which are sent when root guard inconsistency occurs
loop-guard-inconsistency Disable notifications which are sent when loop guard inconsistency occurs switch(config)# no spanning-tree trap new-root
<cr> switch(config)# no spanning-tree trap topology-change
instance Disable topology change notification for the specified PVST vlan id. switch(config)# no spanning-tree trap topology-change vlan
<1-4094> Disable topology change information on the specified PVST vlan id. switch(config)# no spanning-tree trap topology-change vlan 1
<cr> switch(config)# no spanning-tree trap errant-bpdu
<cr> switch(config)# no spanning-tree trap root-guard-inconsistency
<cr> switch(config)# no spanning-tree trap loop-guard-inconsistency
<cr>

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

RPVST+ commands | 2602

Chapter 138 Runtime diagnostic commands

Runtime diagnostic commands

diagnostic monitor
diagnostic monitor {fan-tray | line-module | management-module} [<SLOT-ID>] no diagnostic monitor {fan-tray | line-module | management-module} [<SLOT-ID>] For 6400 switches only: diagnostic monitor {fabric <SLOT-ID>} no diagnostic monitor {fabric <SLOT-ID>}
Description
Enables runtime diagnostics for all modules or for a specified module. This feature is enabled by default for all modules. The no form of this command disables runtime diagnostics for all modules or for a specified module.

Parameter fan-tray line-module management-module <SLOT-ID>

Description
Specifies the enabling of diagnostic monitoring specific to a fan tray.
Specifies the enabling of diagnostic monitoring specific to a line module.
Specifies the enabling of diagnostic monitoring specific to a management module.
Specifies the slot ID of a module. Format: member/slot.

Usage
When no parameters are used in the command (diagnostic monitor or no diagnostic monitor), the command applies to all modules. This command impacts the diagnostics that run periodically. It does not affect on-demand diagnostics.
Example
Enabling runtime diagnostics for a specified module:

switch(config)# diagnostic monitor management-module 1/1

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide

2603

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

diag on-demand
diag on-demand {fan-tray | line-module | management-module} [<SLOT-ID>] For 6400 switches only: diag on-demand {fabric <SLOT-ID>}
Description
Runs the diagnostic tests for all modules or for a specified module.

Parameter [fan-tray | line-module | management-module] fan-tray line-module management-module <SLOT-ID>

Description
Selects the options for enabling or disabling runtime diagnostics for a specific module.
Specifies the enabling of diagnostic monitoring specific to a fan tray.
Specifies the enabling of diagnostic monitoring specific to a line module.
Specifies the enabling of diagnostic monitoring specific to a management module.
Specifies the member/slot for management modules (1/1 or 1/2), line modules (1/3-1/7, 1/81/12), fan trays (1/1-1/3), and fabric modules (1/11/2) on a 6400 switch. Specifies the member/slot for management modules (1/1), line modules (1/1), and fan trays (1/1-1/2) on a 6300 switch.

Usage
When no parameters are used in the command (diag on-demand), the command applies to all modules.
Examples
Running diagnostic tests for all modules on a 6300 switch:

switch# diag on-demand Fetching Test results. Please wait ...

Runtime diagnostic commands | 2604

Module

ID Diagnostics Success

Performed

-------------------- ----- ----------- -------

FanTray

1/2

1

100%

FanTray

1/1

1

100%

LineModule

1/1

13

100%

ManagementModule

1/1

13

100%

Running diagnostic tests for a specific module on a 6300 switch:

switch# diag on-demand management-module 1/1 Performing diagnostic tests. Please wait ... Fetching Test results. Please wait ...

Module

ID Diagnostics Success

Performed

-------------------- ----- ----------- -------

ManagementModule

1/1

13

100%

Running diagnostic tests for all modules on a 6400 switch:

switch# diag on-demand Fetching Test results. Please wait ...

Module

ID Diagnostics Success

Performed

-------------------- ----- ----------- -------

FanTray

1/2

2

100%

LineModule

1/3

24

100%

ManagementModule

1/1

19

100%

LineModule

1/7

12

100%

Fabric

1/1

6

100%

LineModule

1/5

24

100%

LineModule

1/4

24

100%

FanTray

1/1

2

100%

LineModule

1/6

24

100%

Running diagnostic tests for a specific module on a 6400 switch:

switch# diag on-demand management-module Performing diagnostic tests. Please wait ... Fetching Test results. Please wait ...

Module

ID Diagnostics Success

Performed

-------------------- ----- ----------- -------

ManagementModule

1/1

19

100%

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2605

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show diagnostic
show diagnostic {fan-tray | line-module | management-module} [<SLOT-ID>] {brief | detail} [vsx-peer]
Description
Displays the diagnostic test results for all modules or for a specified module.

Parameter [fan-tray | line-module | management-module]
fan-tray line-module management-module <SLOT-ID>
vsx-peer

Description
Selects the options for enabling or disabling runtime diagnostics for a specific module.
Specifies the enabling of diagnostic monitoring specific to a fan tray.
Specifies the enabling of diagnostic monitoring specific to a line module.
Specifies the enabling of diagnostic monitoring specific to a management module.
Specifies the member/slot for management modules (1/1), line modules (1/1), and fan trays (1/1-1/2) on the 6300 switch.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
When no parameters are used in the command (show diagnostic), the command applies to all modules.
Example
Showing diagnostic test results in brief format for all modules on a 6300 switch:

switch# show diagnostic brief

Module

ID Diagnostics Success

Performed

-------------------- ----- ----------- -------

Runtime diagnostic commands | 2606

ManagementModule

1/1

LineModule

1/1

FanTray

1/1

FanTray

1/2

13

100%

13

100%

1

100%

1

100%

Showing diagnostic test results in brief format for a specified module on a 6300 switch:

switch# show diagnostic line-module brief

Module

ID Diagnostics Success

Performed

-------------------- ----- ----------- -------

LineModule

1/1

13

100%

Showing diagnostic test results in detail format for all modules on a 6300 switch:

switch# show diagnostic detail

Module : ManagementModule 1/1

Diagnostic

Status Error Code History Code Successive Total Failure Total

Last Run Timestamp First Run Timestamp

Failure Count Count

Iteration

-------------- ------ ---------- ------------ ------------- ------------- --------

- -------------------- -------------------

ddr_cecount Pass 0x0

0x0

0

0

109 2019-07-31 16:43:38 2019-07-31 07:44:55

emmc

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:55

fan_ctrlr

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:55

fepld

Pass 0x0

0x0

0

0

109 2019-07-31 16:43:38 2019-07-31 07:44:54

fru_eeprom

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:54

fru_eeprom_ul Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:54

mm_lcb

Pass 0x0

0x0

0

0

109 2019-07-31 16:43:37 2019-07-31 07:44:54

pmc

Pass 0x0

0x0

0

0

109 2019-07-31 16:43:37 2019-07-31 07:44:54

rdimm_spd

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:55

rdimm_tmp

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:55

rtc

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:55

tmp1

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:55

tmp2

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:55

Module : LineModule 1/1

Diagnostic

Status Error Code History Code Successive Total Failure Total

Last Run Timestamp First Run Timestamp

Failure Count Count

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2607

Iteration

-------------- ------ ---------- ------------ ------------- ------------- --------

- -------------------- -------------------

lc_asic

Pass 0x0

0x0

0

0

108 2019-07-31 16:43:37 2019-07-31 07:46:03

poe_ctrlr_1_q1 Pass 0x0

0x0

0

0

4 2019-07-31 16:08:16 2019-07-31 07:46:03

poe_ctrlr_1_q2 Pass 0x0

0x0

0

0

4 2019-07-31 16:08:16 2019-07-31 07:46:04

poe_ctrlr_1_q3 Pass 0x0

0x0

0

0

4 2019-07-31 16:08:16 2019-07-31 07:46:04

poe_ctrlr_2_q1 Pass 0x0

0x0

0

0

4 2019-07-31 16:08:16 2019-07-31 07:46:05

poe_ctrlr_2_q2 Pass 0x0

0x0

0

0

4 2019-07-31 16:08:16 2019-07-31 07:46:05

poe_ctrlr_2_q3 Pass 0x0

0x0

0

0

4 2019-07-31 16:08:16 2019-07-31 07:46:05

poe_ctrlr_3_q1 Pass 0x0

0x0

0

0

4 2019-07-31 16:08:16 2019-07-31 07:46:06

poe_ctrlr_3_q2 Pass 0x0

0x0

0

0

4 2019-07-31 16:08:16 2019-07-31 07:46:06

poe_ctrlr_3_q3 Pass 0x0

0x0

0

0

4 2019-07-31 16:08:17 2019-07-31 07:46:06

poe_ctrlr_4_q1 Pass 0x0

0x0

0

0

4 2019-07-31 16:08:17 2019-07-31 07:46:07

poe_ctrlr_4_q2 Pass 0x0

0x0

0

0

4 2019-07-31 16:08:17 2019-07-31 07:46:07

poe_ctrlr_4_q3 Pass 0x0

0x0

0

0

4 2019-07-31 16:08:17 2019-07-31 07:46:08

Module : FanTray 1/1

Diagnostic

Status Error Code History Code Successive Total Failure Total

Last Run Timestamp First Run Timestamp

Failure Count Count

Iteration

-------------- ------ ---------- ------------ ------------- ------------- --------

- -------------------- -------------------

ft1_eeprom

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:33 2019-07-31 07:44:54

Module : FanTray 1/2

Diagnostic

Status Error Code History Code Successive Total Failure Total

Last Run Timestamp First Run Timestamp

Failure Count Count

Iteration

-------------- ------ ---------- ------------ ------------- ------------- --------

- -------------------- -------------------

ft2_eeprom

Pass 0x0

0x0

0

0

3 2019-07-31 16:07:50 2019-07-31 07:44:54

Showing diagnostic test results in detail format for a specified module on a 6300 switch:

switch# show diagnostic management-module detail

Module : ManagementModule 1/1

Diagnostic

Status Error Code History Code Successive

Total Failure Total

Runtime diagnostic commands | 2608

Last Run Timestamp First Run Timestamp

Failure Count Count

Iteration

-------------- ------ ---------- ------------ ------------- ------------- --------

- -------------------- -------------------

ddr_cecount Pass 0x0

0x0

0

0

109 2019-07-31 16:43:38 2019-07-31 07:44:55

emmc

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:55

fan_ctrlr

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:55

fepld

Pass 0x0

0x0

0

0

109 2019-07-31 16:43:38 2019-07-31 07:44:54

fru_eeprom

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:54

fru_eeprom_ul Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:54

mm_lcb

Pass 0x0

0x0

0

0

109 2019-07-31 16:43:37 2019-07-31 07:44:54

pmc

Pass 0x0

0x0

0

0

109 2019-07-31 16:43:37 2019-07-31 07:44:54

rdimm_spd

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:55

rdimm_tmp

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:55

rtc

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:55

tmp1

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:55

tmp2

Pass 0x0

0x0

0

0

4 2019-07-31 16:08:04 2019-07-31 07:44:55

Showing diagnostic test results in brief format for all modules on a 6400 switch:

switch# show diagnostic brief

Module

ID Diagnostics Success

Performed

-------------------- ----- ----------- -------

ManagementModule

1/1

19

100%

LineModule

1/3

24

100%

LineModule

1/7

12

100%

LineModule

1/5

24

100%

LineModule

1/4

24

100%

LineModule

1/6

24

100%

Fabric

1/1

6

100%

FanTray

1/2

2

100%

FanTray

1/1

2

100%

Showing diagnostic test results in brief format for a specified module on a 6400 switch:

switch# show diagnostic management-module brief

Module

ID Diagnostics Success

Performed

-------------------- ----- ----------- -------

ManagementModule

1/1

19

100%

Showing diagnostic test results in detail format for a specified module on a 6400 switch:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2609

switch# show diagnostic management-module detail

Module : ManagementModule 1/1

Diagnostic

Status Error Code History Code Successive Total Failure Total

Last Run Timestp

Failure Count Count

Iteration

-------------- ------ ---------- ------------ ------------- ------------- --------

- ----------------

curr_sensor Pass 0x0

0x0

0

0

2 2019-10-14 00:25

ddr_cecount Pass 0x0

0x0

0

0

34 2019-10-14 01:26

eeprom

Pass 0x0

0x0

0

0

2 2019-10-14 00:25

eeprom_ul

Pass 0x0

0x0

0

0

2 2019-10-14 00:25

emmc

Pass 0x0

0x0

0

0

2 2019-10-14 00:26

icbbp

Pass 0x0

0x0

0

0

34 2019-10-14 01:24

icbx

Pass 0x0

0x0

0

0

34 2019-10-14 01:25

ledpld

Pass 0x0

0x0

0

0

34 2019-10-14 01:24

mm_mcb

Pass 0x0

0x0

0

0

34 2019-10-14 01:24

psu1

Pass 0x0

0x0

0

0

2 2019-10-14 00:27

psu1_eeprom Pass 0x0

0x0

0

0

2 2019-10-14 00:26

psu2

Pass 0x0

0x0

0

0

2 2019-10-14 00:27

psu2_eeprom Pass 0x0

0x0

0

0

2 2019-10-14 00:27

rdimm_spd

Pass 0x0

0x0

0

0

2 2019-10-14 00:26

rdimm_tmp

Pass 0x0

0x0

0

0

2 2019-10-14 00:26

rtc

Pass 0x0

0x0

0

0

2 2019-10-14 00:26

tmp1

Pass 0x0

0x0

0

0

2 2019-10-14 00:25

tmp2

Pass 0x0

0x0

0

0

2 2019-10-14 00:25

tmp3

Pass 0x0

0x0

0

0

2 2019-10-14 00:25

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Runtime diagnostic commands | 2610

Platforms
6300 6400

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show diagnostic events
show diagnostic events
Description
Displays the diagnostic related event logs.
Example
Showing diagnostic related event logs:
switch# show diagnostic events 2019-08-07:17:19:21.214532|hhmd|106001|ERR| Diagnostic mm_mcbe failed with error code 0x380 on management module 1/1 2019-08-07:17:19:21.214554|hhmd|106001|ERR| Diagnostic pmc failed with error code 0x4 on management module 1/1 2019-08-07:17:19:21.215532|hhmd|106001|ERR| Diagnostic ledpld failed with error code 0x4 on management module 1/1 2019-08-07:17:19:21.353221|hhmd|106001|ERR| Diagnostic mm_mcbe failed with error code 0x380 on management module 1/1 2019-08-07:17:19:21.354421|hhmd|106001|ERR| Diagnostic pmc failed with error code 0x4 on management module 1/1 2019-08-07:17:19:21.453221|hhmd|106001|ERR| Diagnostic ledpld failed with error code 0x4 on management module 1/1
Showing diagnostic related event logs (Output from a 6400 switch):
switch# show diagnostic events --------------------------------------------------Event logs from current boot --------------------------------------------------2019-10-17T20:27:04.066486+00:00 6405 hhmd[9237]: Event|3002|LOG_ ERR|LC|1/6|Diagnostic brd_tmp1 failed with error code 0x1000000 on line card 4 2019-10-17T20:27:04.102968+00:00 6405 hhmd[9237]: Event|3002|LOG_ ERR|LC|1/3|Diagnostic brd_tmp1 failed with error code 0x1000000 on line card 1 2019-10-17T20:27:04.117467+00:00 6405 hhmd[9237]: Event|3002|LOG_ ERR|LC|1/5|Diagnostic brd_tmp1 failed with error code 0x1000000 on line card 3 2019-10-17T20:27:04.210276+00:00 6405 hhmd[9237]: Event|3002|LOG_ ERR|LC|1/4|Diagnostic brd_tmp1 failed with error code 0x1000000 on line card 2 2019-10-17T20:27:04.212133+00:00 6405 hhmd[9237]: Event|3002|LOG_ ERR|LC|1/7|Diagnostic brd_tmp1 failed with error code 0x1000000 on line card 5

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2611

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

Runtime diagnostic commands | 2612

Chapter 139 Security log commands

Security log commands
clear security-logs
clear security-logs
Description
Clears the security logs.
Only members of the security user group have permission to use this command.
Examples
Showing the current boot security logs and then clearing the security logs:
switch# show security-logs --------------------------------------------------Security logs from current boot --------------------------------------------------2021-12-01:12:37:31.733551|restd|15007|INFO|AMM|1|User admin successfully changed password 2021-12-01:12:37:31.734541|restd|4001|WARN|AMM|1|User auditor password change failed 2021-12-01:12:37:32.583256|hpe-credmgr|24002|WARN|AMM|1|An internal error occurred while reading the export password and default export password was used instead.
switch# clear security-logs
switch# show security-logs --------------------------------------------------Security logs from current boot ---------------------------------------------------

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09
Command Information

Modification Command introduced

AOS-CX 10.14 Command-Line Interface Guide

2613

Platforms
6300 6400

Command context
Manager (#)
>

Authority The security user.

copy security-log
copy security-log <REMOTE-URL> [vrf <VRF-NAME>]
Description
Copies the security logs to a remote URL using SFTP, SCP, or TFTP.
Only members of the security user group have permission to use this command.

Parameter <REMOTE-URL>
vrf <VRF-NAME>

Description
Specifies the remote destination URL. URL Syntax: n sftp://<USER>@{<IP>|<HOST>}[:<PORT>]/<FILE> n scp://<USER>@{<IP>|<HOST>}[:<PORT>]/<FILE> n tftp://{<IP>|<HOST>}[:<PORT>][;blocksize=<VAL>]/<FILE>
Specifies the VRF name. When omitted, the VRF named default is used.

Examples
Copying the security log with SFTP:

switch# copy security-log sftp://user1@99.99.99.99/coredump.xz vrf mgmt

Copying the security log with SCP:

switch# copy security-log scp://user2@99.99.99.99/coredump.xz vrf mgmt

Copying the security log with TFTP:

switch# copy security-log tftp://99.99.99.99:9999/coredump.xz vrf mgmt

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09

Modification Command introduced.

Security log commands | 2614

Command Information

Platforms
6300 6400

Command context Manager (#)

Authority The security user.

show security-logs
show security-logs {-s <SEVERITY> | -r | -a | -n <COUNT> | -d {lldpd | bgpd | fand | ...}}
Description
Shows the security logs. Multiple parameters can be used in the same command.
Only members of the security user group have permission to use this command.

Parameter -s <SEVERITY>
-r -a -n <COUNT> -d {lldpd | bgpd | fand |...}

Description
Shows the event logs for the specified severity. n emer: Emergency (7) only. n alert: Alerts (6) and above. n crit: Critical (5) and above. n err: Error (4) and above. n warn: Warning (3) and above. n notice: Notice (2) and above. n info: Info (1) and above. n debug: All severity levels.
Shows the security logs in reverse order with the most recent log items first.
Shows all security logs, including items from previous boots.
Shows the specified number of security log items. Range: 1 to 4294967295.
Shows the security logs for the specified daemon.

Examples
Showing security logs from the current boot:

switch# show security-logs --------------------------------------------------Security logs from current boot --------------------------------------------------2021-12-01:12:37:31.733551|restd|15007|INFO|AMM|1|User admin successfully changed password 2021-12-01:12:37:31.734541|restd|4001|WARN|AMM|1|User auditor password change failed 2021-12-01:12:37:32.583256|hpe-credmgr|24002|WARN|AMM|1|An internal error occurred while reading the export password and default export password was used instead.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2615

Showing security logs in reverse order with the most recent logs first: :
switch# show security-logs -r --------------------------------------------------Security logs from current boot --------------------------------------------------2021-12-01:12:37:32.583256|hpe-credmgr|24002|WARN|AMM|1|An internal error occurred while reading the export password and default export password was used instead. 2021-12-01:12:37:31.734541|restd|4001|WARN|AMM|1|User auditor password change failed 2021-12-01:12:37:31.733551|restd|15007|INFO|AMM|1|User admin successfully changed password
Showing security logs from the current and previous boot:
switch# show security-logs -a --------------------------------------------------Security logs from previous boot --------------------------------------------------2021-12-01:12:31:31.733551|restd|15007|INFO|AMM|1|User admin successfully changed password 2021-12-01:12:31:31.734541|restd|4001|WARN|AMM|1|User auditor password change failed --------------------------------------------------Security logs from current boot --------------------------------------------------2021-12-01:12:37:31.733551|restd|15007|INFO|AMM|1|User admin successfully changed password 2021-12-01:12:37:31.734541|restd|4001|WARN|AMM|1|User auditor password change failed 2021-12-01:12:37:32.583256|hpe-credmgr|24002|WARN|AMM|1|An internal error occurred while reading the export password and default export password was used instead.
Showing security logs with a severity of warn and higher:
switch# show security-logs -s warn --------------------------------------------------Security logs from current boot --------------------------------------------------2021-12-01:12:37:31.734541|restd|4001|WARN|AMM|1|User auditor password change failed 2021-12-01:12:37:32.583256|hpe-credmgr|24002|WARN|AMM|1|An internal error occurred while reading the export password and default export password was used instead.
Showing security logs for the specified daemon :
switch# show security-logs -d hpe-restd --------------------------------------------------Security logs from current boot --------------------------------------------------2021-12-01:12:37:31.733551|restd|15007|INFO|AMM|1|User admin successfully changed password 2021-12-01:12:37:31.734541|restd|4001|WARN|AMM|1|User auditor password change failed
Showing the two most recent security logs:
Security log commands | 2616

switch# show security-logs -n 2 --------------------------------------------------Security logs from current boot --------------------------------------------------2021-12-01:12:37:31.733551|restd|15007|INFO|AMM|1|User admin successfully changed password 2021-12-01:12:37:31.734541|restd|4001|WARN|AMM|1|User auditor password change failed
Showing the two most recent security logs in reverse order for the specified daemon:
switch# show security-logs -r -n 2 -d hpe-restd --------------------------------------------------Security logs from current boot --------------------------------------------------2021-12-01:12:37:31.734541|restd|4001|WARN|AMM|1|User auditor password change failed 2021-12-01:12:37:31.733551|restd|15007|INFO|AMM|1|User admin successfully changed password
Showing the two most recent security logs with a severity of error and higher for the specified daemon:
switch# show security-logs -s err -n 2 -d hpe-credmgr --------------------------------------------------Security logs from current boot --------------------------------------------------2021-12-01:12:37:32.583256|hpe-credmgr|7715|ERR|AMM|1|Failed to download CA certificates from EST server server_1 2021-12-01:12:38:32.583256|hpe-credmgr|7712|ERR|AMM|1|Application association with the root_one certificate is not permitted
Showing security logs with a severity of critical and higher for the specified daemon:
switch# show security-logs -s crit -d ipsavd --------------------------------------------------Security logs from current boot --------------------------------------------------2021-12-01:12:37:32.583256|ipsavd|9802|CRIT|AMM|1|IP_SOURCE_LOCKDOWN resource utilization has exceeded maximum supported limit of 8192 on the system. IP sourcelockdown functionality will not work for new entries

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.09
Command Information

Modification Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2617

Platforms
6300 6400

Command context
Manager (#)
>

Authority The security user.

Security log commands | 2618

Chapter 140 Selftest commands

Selftest commands
fastboot
fastboot no fastboot
Description
Enables fastboot for the system. The no form of this command disables fastboot for the system.
Usage
When fastboot is enabled, most tests under a Power On Self Test (POST) are skipped. By default, fastboot is enabled. After disabling fastboot, save switch configurations and then reboot for POST to run. POST verifies the hardware functionality of various modules during boot-up. Based on the criticality of the test, the selftest module decides whether to go ahead with the boot-up sequence of a particular subsystem or interface during a POST failure. POST runs memory built-in selftest (BISTs) and front-end port loopback tests. Memory BISTs verify the internal and external memory blocks present in the module. The memory tables are critical for proper functionality of the system so any failures in these tests results in the corresponding subsystem to be marked as "Failed" and thus that subsystem is not available for use. Front-end port loopback tests verify the physical port front-end interface. These tests check if a particular interface can function properly. A test failure means that a particular interface has been marked as "Failed" and is now unavailable for use. On 6300 and 6400 switches, the line-module and fabric-module selftest is run regardless of fastboot setting. The interface selftest is only run when fastboot is disabled.
Examples
Enabling fastboot:
switch# configure terminal switch(config)# fastboot switch(config)# end switch# show running-config Current configuration: ! !Version AOS-CX ML.10.06.0001 module 1/1 product-number jl726a!Version AOS-CX FL.10.06.0001 module 1/1 product-number jl661a!Version AOS-CX XL.10.00.0002 module 1/1 product-number jl363a!Version AOS-CX PL.10.06.0001 module 1/1 product-number jl677a ! ! !

AOS-CX 10.14 Command-Line Interface Guide

2619

! ! ! ! vlan 1 interface 1/1/1
no shutdown
Disabling fastboot:
switch# configure terminal switch(config)# no fastboot switch(config)# end switch(config)# write mem Configuration changes will take time to process, please be patient. switch# show running-config Current configuration: ! !Version AOS-CX ML.10.06.0001 module 1/1 product-number jl726a!Version AOS-CX FL.10.06.0001 module 1/1 product-number jl661a!Version AOS-CX XL.10.00.0002 module 1/1 product-number jl363a!Version AOS-CX PL.10.06.0001 module 1/1 product-number jl677a ! ! ! no fastboot ! ! ! ! vlan 1 interface 1/1/1
no shutdown

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show selftest
show selftest [brief] [vsx-peer]

Selftest commands | 2620

show selftest line-module <SLOT-ID> show selftest line-module <SLOT-ID> interface [brief] [vsx-peer] show selftest interface [<PORT-NUM>] [vsx-peer] For 8400 and 6400 switches only: show selftest {line-module | fabric-module} [<SLOT-ID>] [brief] [vsx-peer]
Description
Displays selftest results.

Parameter [brief] line-module fabric-module
<SLOT-ID>
<PORT-NUM> vsx-peer

Description
Shows the selftest results as a brief description. Default.
Shows the selftest results for a line module.
Shows the selftest results for a fabric module. Applicable only for 8400 and 6400 switches.
Shows the selftest results for the slot ID of the line or fabric module.
Shows the selftest results for the port number.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Displaying the output when fastboot is disabled on an 8400 or a 6400 switch:

switch# show selftest

Name

Id Status

ErrorCode LastRunTime

---------- ---- -------------- ---------- -------------------

LineModule 1/1 passed

0x0

2016-10-15 10:10:09

LineModule 1/2 failed

0x09

2016-10-15 10:10:56

Fabric 1/1

passed

0x0

2016-10-15 10:10:09

Fabric 1/2

failed

0x1E

2016-10-15 10:10:56

switch# show selftest line-module

Name

Id Status

ErrorCode LastRunTime

---------- ---- -------------- --------- -------------------

LineModule 1/1 passed

0x0

2016-10-15 10:10:09

LineModule 1/2 failed

0x09

2016-10-15 10:10:56

switch# show selftest fabric-module

Name Id

Status

ErrorCode LastRunTime

------ -------- -------------- --------- -------------------

Fabric 1/1

passed

0x0

2016-10-15 10:10:09

Fabric 1/2

failed

0x1E

2016-10-15 10:10:56

switch# show selftest fabric-module 1/2

Name Id

Status

ErrorCode LastRunTime

------ -------- -------------- --------- -------------------

Fabric 1/2

failed

0x11

2016-10-15 10:10:56

switch# show selftest line-module 1/10

Name

Id Status

ErrorCode LastRunTime

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2621

---------- ---- -------------- --------- -------------------

LineModule 1/10 failed

0x1A

2016-10-15 10:10:56

switch# show selftest interface 1/2/2

Name Status

ErrorCode LastRunTime

------- -------------- --------- -------------------

1/2/2 passed

0x0

2016-11-19 05:10:11

switch# show selftest line-module 1/3 interface

Name Status

ErrorCode LastRunTime

------- -------------- --------- -------------------

1/3/1 passed

0x0

2016-11-19 05:10:11

1/3/2 passed

0x0

2016-11-19 05:10:11

1/3/3 passed

0x0

2016-11-19 05:10:11

1/3/31 failed

0x20

2016-11-19 05:10:11

Displaying the output when fastboot is disabled on a 6300 switch:

switch# show selftest interface

Name

Status

ErrorCode

LastRunTime

---------- ----------------- ---------------- -------------------

1/1/2

skipped

0x0

1/1/44

skipped

0x0

1/1/46

skipped

0x0

switch# show selftest interface 1/1/1

Name

Status

ErrorCode

LastRunTime

---------- ----------------- ---------------- -------------------

1/1/1

skipped

0x0

Displaying the output when fastboot is enabled on a 6400 switch:

switch# show selftest

Name

Id Status

ErrorCode LastRunTime

---------- ---- -------------- ---------- -------------------

LineModule 1/1 passed

0x0

LineModule 1/2 passed

0x0

Fabric

1/1 passed

0x0

Fabric

1/2 passed

0x0

switch# show selftest line-module

Name

Id Status

ErrorCode LastRunTime

---------- ---- -------------- --------- -------------------

LineModule 1/1 passed

0x0

LineModule 1/2 passed

0x0

Selftest commands | 2622

switch# show selftest fabric-module

Name

Id Status

ErrorCode LastRunTime

---------- ---- -------------- ---------- -------------------

Fabric

1/1 passed

0x0

Fabric

1/2 passed

0x0

switch# show selftest fabric-module 1/2

Name Id

Status

ErrorCode LastRunTime

------ -------- -------------- --------- -------------------

Fabric 1/2

passed

0x0

switch# show selftest line-module 1/1

Name

Id Status

ErrorCode LastRunTime

---------- ---- -------------- --------- -------------------

LineModule 1/1 passed

0x0

Displaying the output when fastboot is enabled:

switch# show selftest interface 1/1/2

Name Status

ErrorCode LastRunTime

------- -------------- --------- -------------------

1/1/2 skipped

0x0

switch# show selftest line-module 1/1 interface

Name Status

ErrorCode LastRunTime

------- -------------- --------- -------------------

1/1/1 skipped

0x0

1/1/2 skipped

0x0

1/1/3 skipped

0x0

1/1/31 skipped

0x0

Displaying the output when fastboot is disabled: Testing to register read/write:
This test is run irrespective of fastboot being enabled or disabled.

switch# show selftest

Name

Id Status

ErrorCode LastRunTime

---------- ---- -------------- ---------- -------------------

LineModule 1/1 passed

0x0

2018-02-16 18:15:53

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2623

Platforms All platforms

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Selftest commands | 2624

Chapter 141 sFlow agent commands

sFlow agent commands

clear sflow statistics
clear sflow statistics {global | interface <INTERFACE-NAME>}
Description
This command clears the sFlow sample statistics counter to 0 either globally or for a specific interface.

Parameter global interface <INTERFACE-NAME>

Description Specifies all interfaces on the switch. Specifies the name of an interface on the switch.

Examples
Clearing the global sFlow sample statistics counter to 0 globally:

switch(config)# clear sflow statistics global

Clearing the global sFlow sample statistics counter to 0 for interface 1/1/1:

switch(config)# clear sflow statistics interface 1/1/1

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

sflow
sflow
AOS-CX 10.14 Command-Line Interface Guide

2625

no sflow
Description
Enables the sFlow agent. n In the config context, this command enables the sFlow agent globally on all interfaces. n In an config-if context, this command enables the sFlow agent on a specific interface. sFlow cannot
be enabled on a member of a LAG, only on the LAG. The sFlow agent is disabled by default. The no form of this command disables the sFlow agent and deletes all sFlow configuration settings, either globally, or for a specific interface.
Examples
On the 6400 Switch Series, interface identification differs. Enabling sFlow globally on all interfaces:
switch(config)# sflow
Disabling sFlow globally on all interfaces:
switch(config)# no sflow
Enabling sFlow on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# sflow
Disabling sFlow on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no sflow
Enabling sFlow on interface lag100:
switch(config)# interface lag100 switch(config-if)# sflow
Disabling sFlow on interface lag100:
switch(config)# interface lag100 switch(config-if)# no sflow
For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History
sFlow agent commands | 2626

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

sflow agent-ip
sflow agent-ip <IP-ADDR> no sflow agent-ip [<IP-ADDR>]
Description
Defines the IP address of the sFlow agent to use in sFlow datagrams. This address must be defined for sFlow to function. HPE recommends that the address:
n can uniquely identify the switch n is reachable by the sFlow collector n does not change with time
The no form of this command deletes the IP address of the sFlow agent. This causes sFlow to stop working and no datagrams will be sent to the sFlow collector.

Parameter <IP-ADDR>

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F. The agent address is used to identify the switch in all sFlow datagrams sent to sFlow collectors. It is usually set to an IP address on the switch that is reachable from an sFlow collector.

Examples
Setting the agent address to 10.10.10.100:

switch(config)# sflow agent-ip 10.0.0.100

Setting the agent address to 2001:0db8:85a3:0000:0000:8a2e:0370:7334:

switch(config)# sflow agent-ip 2001:0db8:85a3:0000:0000:8a2e:0370:7334

Removing the address configuration from the switch, which results in sFlow being disabled:

switch(config)# no sflow agent-ip

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2627

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

sflow collector
sflow collector <IP-ADDR> [port <PORT>] [vrf <VRF>] no sflow collector <IP-ADDR> [port <PORT>] [vrf <VRF>]
Description
Defines a collector to which the sFlow agent sends data. Up to three collectors can be defined. At least one collector should be defined, and it must be reachable from the switch for sFlow to work.

Parameter collector <IP-ADDR>
port <PORT> vrf <VRF>

Description
Specifies the IP address of a collector in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255, or IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the UDP port on which to send information to the sFlow collector. Range: 0 to 65536. Default: 6343.
Specifies the VRF on which to send information to the sFlow collector. The VRF must be defined on the switch. If no VRF is specified, the default VRF (default) is used.

Example
Defining a collector with IP address 10.10.10.100 on UDP port 6400:

switch(config)# sflow collector 10.0.0.1 port 6400

For more information on features that use this command, refer to the IP Services Guide for your switch model.
Command History

sFlow agent commands | 2628

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

sflow disable
sflow disable
Description
Disables the sFlow agent, but retains any existing sFlow configuration settings. The settings become active if the sFlow agent is re-enabled.
Example
Disabling sFlow support:
switch(config)# sflow disable

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

sflow header-size
sflow header-size <SIZE> no sflow header-size [<SIZE>]
Description
Sets the sFlow header size in bytes. The no form of this command sets the header size to the default value of 128.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2629

Parameter header-size <SIZE>

Description
Specifies the sFlow header size in bytes. Range: 64 to 256. Default: 128.

Examples
Setting the header size to 64 bytes:

switch(config)# sflow header-size 64

Setting the header size to the default value of 128 bytes:

switch(config)# no sflow header-size

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

sflow max-datagram-size
sflow max-datagram-size <SIZE> no sflow max-datagram-size [<SIZE>]
Description
Sets the maximum number of bytes that are sent in one sFlow datagram. The no form of this command sets maximum number of bytes to the default value of 1400.

Parameter max-datagram-size <SIZE>

Description
Specifies the maximum datagram size in bytes. Range: 1 to 9000. Default: 1400.

Examples
Setting the datagram size to 1000 bytes:

sFlow agent commands | 2630

switch(config)# sflow max-datagram-size 1000 Setting the header size to the default value of 1400 bytes:
switch(config)# no sflow max-datagram-size

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

sflow mode
sflow mode {ingress | egress | both} no sflow mode {ingress | egress | both}
Description
Sets the sFlow sampling mode. The default mode is ingress. The no form of the command sets the sampling mode to ingress. Executing the no form of the command with the ingress option will have no impact as ingress is the default mode.

Parameter ingress egress both

Description Samples only ingress traffic. Samples only egress traffic. Samples both ingress and egress traffic.

Examples
Setting the sFlow mode to only sample egress traffic:

switch# configure terminal switch(config)# sflow mode egress

Setting the sFlow mode to only sample ingress traffic:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2631

switch# configure terminal switch(config)# sflow mode ingress
Setting the sFlow mode to sample both sample ingress and egress traffic:
switch# configure terminal switch(config)# sflow mode both
Resetting the sFlow sampling mode to the default of ingress from previously configured mode of egress:
switch# configure terminal switch(config)# no sflow mode egress

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

sflow polling
sflow polling <INTERVAL> no sflow polling [<INTERVAL>]
Description
Defines the global polling interval for sFlow in seconds. The no form of this command sets the polling interval to the default value of 30 seconds.

Parameter <INTERVAL>

Description
Specifies the polling interval in seconds. Range: 10 to 3600. Default: 30.

Examples
Setting the polling interval to 10:

sFlow agent commands | 2632

switch(config)# sflow polling 10 Setting the polling interval to the default value.
switch(config)# no sflow polling

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

sflow sampling
sflow sampling <RATE> no sflow sampling [<RATE>]
Description
Defines the global sampling rate for sFlow in number of packets. The default sampling rate is 4096, which means that one in every 4096 packets is sampled. A warning message is displayed when the sampling rate is set to less than 4096 and proceeds only after user confirmation. The no form of this command sets the sampling rate to the default value of 4096.

Parameter sampling <RATE>

Description
Specifies the sampling rate. Range: 1 to 1000000000. Default: 4096.

Examples
Setting the sampling rate to 5000:

switch(config)# sflow sampling 5000

Setting the sampling rate to the default:

switch(config)# no sflow sampling

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2633

Setting the sampling rate to 1000:
switch(config)# sflow sampling 1000 Setting the sFlow sampling rate lower than 4096 is not recommended and might affect system performance. Do you want to continue [y/n]? y switch(config)#

For more information on features that use this command, refer to the IP Services Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show sflow
show sflow [interface <INTERFACE-NAME>] [vsx-peer]
Description
Shows sFlow configuration settings and statistics for all interfaces, or for a specific interface. It also displays the current status of sFlow on the device and reports any errors that require attention.
If sFlow is enabled on the interfaces associated with a lag interface, then the interfaces will not be shown as separate entries under sFlow enabled on Interface in the output. Only the associated lag interface will have an entry in the column.

Parameter interface <INTERFACE-NAME> vsx-peer

Description
Specifies the name of an interface on the switch.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing sFlow information for all interfaces:

sFlow agent commands | 2634

switch# show sflow

sFlow Global Configuration

-----------------------------------------

sFlow

enabled

Collector IP/Port/Vrf

10.0.0.2/6343/default

10.0.0.3/6400/default

Agent Address

10.0.0.1

Sampling Rate

1024

Polling Interval

30

Header Size

128

Max Datagram Size

1400

Sampling Mode

ingress

sFlow Status ----------------------------------------Running - Yes

sFlow enabled on Interfaces: ----------------------------------------1/1/2 1/1/3 lag100

sFlow Statistics

-----------------------------------------

Number of Ingress Samples

200

Number of Egress Samples

120

Showing sFlow information for interface 1/1/1:

switch# show sflow interface 1/1/1

sFlow configuration - Interface 1/1/1

-----------------------------------------

sFlow

enabled

Sampling Rate

1024

Sampling Mode

both

Number of Ingress Samples

81

Number of Egress Samples

20

sFlow Sampling Status

success

Showing sFlow information for interface lag 10:

switch# show sflow interface lag 10

sFlow Configuration - Interface lag10

-----------------------------------------

sFlow

enabled

Sampling Rate

4096

Sampling Mode

both

Number of Ingress Samples

0

Number of Egress Samples

0

sFlow Sampling Status

error

Sampling Status on LAG members

------------------------------------

Intf 1/1/2

no agent

Intf 1/1/3

no agent

For more information on features that use this command, refer to the IP Services Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2635

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

sFlow agent commands | 2636

Chapter 142 Smartlink commands

Smartlink commands

Configuration commands
smartlink group
smartlink group <GROUP-ID> no smartlink group <GROUP-ID>
Description
Creates a Smartlink group with specified ID. The no form of this command removes the Smartlink group and all associated configurations for a specified ID.

Parameter <GROUP-ID>

Description Specifies ID for the Smartlink group.

Usage
The maximum number of Smartlink groups is 24.
Examples
Configuring a Smartlink group:

switch(config)# smartlink group 2 switch(config-smartlink-2)#

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide

2637

smartlink recv-control-vlan
smartlink recv-control-vlan <VID-LIST> no smartlink recv-control-vlan <VID-LIST>
Description
Configures control VLANs to receive flush messages. The no form of this command disables VLANs from receiving flush messages.

Parameter <VID-LIST>

Description Specifies VLAN ID.

Usage
n Configure this command on uplink devices where MAC flush is required. n A flush message clears stale MAC and ARP entries enabling fast traffic convergence.
Examples
Configuring control VLAN to receive flush messages:

switch(config)# smartlink recv-control-vlan 2,3

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

Group context commands
description
description <DESC> no description
Description
Adds description to a Smartlink group.

Smartlink commands | 2638

The no form of this command removes a description from a Smartlink group.

Parameter <DESC>

Description
Specifies description for a Smartlink group. 1 to 64 printable ASCII characters are allowed.

Examples
Adding a description to a Smartlink group:

switch(config)# smartlink group 3 switch(config-smartlink-3)# Description for group 3

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-smartlink-<GROUP>

Authority
Administrators or local user group members with execution rights for this command.

diag-dump smartlink basic
diag-dump smartlink basic
Description
Dumps the Smartlink configuration, state and statistics.
Examples
Dump of Smartlink configuration, state, and statistics:
switch# diag-dump smartlink basic ========================================================================= [Start] Feature smartlink Time : Tue Jul 7 10:08:31 2020 ========================================================================= ------------------------------------------------------------------------[Start] Daemon smartlinkd ------------------------------------------------------------------------SL Group 1: Primary port 1/1/1 Secondary port 1/1/2 Control VLAN 4,
Preemption disabled, Preemption-delay 1 Preemption Timer OFF, State primary_with_backup, Active port PRIMARY, Backup port SECONDARY Port 1/1/1: member_groups 1 SL Groups ids: 1, 0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2639

Port 1/1/2: member_groups 1 SL Groups ids: 1, 0

or

SL Group 1: Primary port lag1 (mclag: local_up_remote_up) Secondary port lag2 (mclag: local_down_remote_up), Control VLAN 4, Preemption disabled, Preemption-delay 1 Preemption Timer OFF, State primary_with_backup, Active port PRIMARY, Backup port SECONDARY
Port lag1: member_groups 1 SL Groups ids: 1, 0 Port lag2: member_groups 1 SL Groups ids: 1, 0 VSX Oper Status: Primary/Secondary/NA

-------------------------------------------------------------------------

[End] Daemon smartlinkd

-------------------------------------------------------------------------

-------------------------------------------------------------------------

[Start] Daemon ops-switchd

-------------------------------------------------------------------------

Group-ID | Port Name | Port Status | Vlan-ID | HW-Port-State | Vlan-Type

1

| 1/1/1

| Active

|4

| Forwarding | Control

1

| 1/1/1

| Active

|3

| Forwarding | Protected

1

| 1/1/1

| Active

|2

| Forwarding | Protected

1

| 1/1/1

| Active

|1

| Forwarding | Protected

1

| 1/1/2

| Backup

|4

| Blocking

| Control

1

| 1/1/2

| Backup

|3

| Blocking

| Protected

1

| 1/1/2

| Backup

|2

| Blocking

| Protected

1

| 1/1/2

| Backup

|1

| Blocking

| Protected

------------------------------------------------------------------------[End] Daemon ops-switchd ------------------------------------------------------------------------========================================================================= [End] Feature smartlink ========================================================================= Diagnostic-dump captured for feature smartlink

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

primary-port
primary-port <INTERFACE-NAME> no primary-port

Smartlink commands | 2640

Description
Configures primary port for a Smartlink group. The no form of this command removes primary port from a Smartlink group.

Parameter <INTERFACE-NAME>

Description Specifies interface for primary port.

Examples
Configuring primary port for a Smartlink group:

switch(config)# smartlink group 3 switch(config-smartlink-3)# primary-port 1/1/1

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-smartlink-<GROUP>

Authority
Administrators or local user group members with execution rights for this command.

smartlink group secondary-port
secondary-port <INTERFACE-NAME> no secondary-port
Description
Configures secondary port for a Smartlink group. The no form of this command removes secondary port from a Smartlink group.

Parameter <INTERFACE-NAME>

Description Specifies interface for secondary port.

Examples
Configuring secondary port for a Smartlink group:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2641

switch(config)# smartlink group 3 switch(config-smartlink-3)# secondary-port 1/1/2

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-smartlink-<GROUP>

Authority
Administrators or local user group members with execution rights for this command.

control-vlan
control-vlan <VLAN-ID> no control-vlan <VLAN-ID>
Description
Configures control VLAN in a Smartlink group. The no form of this command removes control VLAN from a Smartlink group.

Parameter <VLAN-ID>

Description Specifies VLAN ID for a Smartlink group.

Usage
n In a Smartlink group, the control VLAN is used to send flush messages. n Control VLAN is configured on the device intended to send flush messages. n Each Smartlink group must use a unique control VLAN. n Control VLAN is protected in the Smartlink group to avoid loops.
Examples
Configuring control VLAN in a Smartlink group:

switch(config)# smartlink group 3 switch(config-smartlink-3)# control-vlan 10

Smartlink commands | 2642

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-smartlink-<GROUP>

Authority
Administrators or local user group members with execution rights for this command.

protected-vlans
protected-vlans <VLAN-ID-LIST> no protected-vlans <VLAN-ID-LIST>
Description
Specifies VLANs protected by a Smartlink group. The no form of this command removes VLANs protected by a Smartlink group.

Parameter <VLAN-ID-LIST>

Description Specifies list of VLAN IDs. Range is 1 to 4094.

Examples
Configuring protected VLANs for a Smartlink group.:

switch(config)# smartlink group 3 switch(config-smartlink-3)# protected-vlans 1, 10-50

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2643

Platforms
6300 6400

Command context config-smartlink-<GROUP>

Authority
Administrators or local user group members with execution rights for this command.

preemption
preemption no preemption
Description
Configures preemption in a Smartlink group. The no form of this command disables preemption in a Smartlink group.
Usage
n If preemption is enabled, a recovered primary port preempts the active interface after the configured preemption delay.
n If preemption is disabled, a recovered primary port serves as a backup interface and does not forward traffic.
Examples
Configuring preemption in a Smartlink group:
switch(config)# smartlink group 3 switch(config-smartlink-3)# preemption

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-smartlink-<GROUP>

Authority
Administrators or local user group members with execution rights for this command.

preemption-delay
preemption-delay <SECONDS> no preemption-delay
Description
Specifies preemption delay for a Smartlink group.

Smartlink commands | 2644

The no form of this command removes previously configured preemption delay from a Smartlink group and sets it to the default of 1 second.

Parameter <SECONDS>

Description Specifies preemption delay in seconds. Range is 0 to 300 seconds.

Usage
When preemption is enabled, a recovered primary port always preempts the active interface after the configured preemption delay.
Examples
Configuring preemption delay on a Smartlink group:

switch(config)# smartlink group 3 switch(config-smartlink-3)# preemption switch(config-smartlink-3)# preemption-delay 10

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-smartlink-<GROUP>

Authority
Administrators or local user group members with execution rights for this command.

Display commands
show smartlink group
show smartlink group <GROUP-ID>
Description
Shows information for a specific Smartlink group.

Parameter <GROUP-ID>

Description Specifies Smartlink group ID.

Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2645

Showing Smartlink group information:

switch# show smartlink group 1

Smartlink Group 1 Information:

=============================

Group description

: Uplink1

Protected VLANs

: 20-30

Control VLAN

: 10

Preemption

: ON

Preemption Delay

: 10

Ports Role

State

Flush Count Last Flush Time

------ --------- ---------- ----------- -------------------------

1/1/1 Primary Active

2

Sat Oct 17 19:09:10 2020

1/1/2 Secondary Backup

0

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show smartlink group all
show smartlink group all
Description
Shows information for all configured Smartlink groups.
Examples
Showing information for all configured Smartlink groups:

switch# show smartlink group all

Smartlink Group Information:

=============================

Primary Secondary Active Backup

Grp Port Port

Port Port

---- ------- --------- ------ -------

1 1/1/1 1/1/2

1/1/1 1/1/2

2 1/1/5 1/1/6

1/1/5 1/1/6

Ctrl

Preemption Preemption

Vlan

Delay

--------- ---------- ----------

10

OFF

1

11

OFF

1

Smartlink commands | 2646

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show smartlink group detail
show smartlink group detail
Description
Shows detailed information for all configured Smartlink groups.
Examples
Showing detailed information for all configured Smartlink groups:

switch# show smartlink group detail

Smartlink Group 1 Information:

===============================

Protected VLAN

: 1-3

Control VLAN

:1

Preemption

: OFF

Preemption Delay

:1

Ports Role

State

Flush Count Last Flush Time

-------- ------------ ------------ ------------ ------------------------

1/3/1 Primary

Backup

0

1/3/2 Secondary Active

0

Smartlink Group 2 Information:

===============================

Protected VLAN

: 4-6

Control VLAN

:4

Preemption

: OFF

Preemption Delay

:1

Ports Role

State

Flush Count Last Flush Time

-------- ------------ ------------ ------------ ------------------------

1/3/2 Primary

Active

0

1/3/1 Secondary Backup

0

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2647

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show smartlink flush-statistics
show smartlink flush-statistics
Description
Shows information for received flush messages.
Usage
This command must be executed on an uplink or peer device configured with recv-control-vlan.
Examples
Showing information for received flush messages:

switch# show smartlink flush-statistics Last Flush Packet Detail: ========================

Flush Packets Received Last Flush Packet Received On Interface Last Flush Packet Received On Device Id Of Last Flush Packet Received Control VLAN Of Last Flush Packet Received

:2 : 1/1/1 : Sat Oct 17 19:09:10 2020 : 5065f3-127080 : 10

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Smartlink commands | 2648

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

clear smartlink group statistics
clear smartlink group [<GROUP-ID>] statistics
Description
Clears Smartlink statistics for the specified Smartlink group or all Smartlink groups.

Parameter <GROUP-ID>

Description Specifies Smartlink group.

Examples
Clearing Smartlink statistics for a specified Smartlink group:

switch# clear smartlink group 1 statistics

Clearing all Smartlink statistics for all Smartlink groups:

switch(config)# clear smartlink group statistics

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

clear smartlink flush-statistics
clear smartlink flush-statistics
Description
Clears Smartlink flush statistics.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2649

Usage
This command must be executed on the uplink device configured with recv-control-vlan.
Examples
Clearing Smartlink flush statistics:
switch# clear smartlink flush-statistics

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config
show running-config
Description
Shows current running configuration.
Examples
Showing currently running configuration:
switch# configure terminal switch(config)# smartlink group 1 switch(config-smartlink-1)# description Uplink1 switch(config-smartlink-1)# primary-port 1/1/1 switch(config-smartlink-1)# secondary-port 1/1/2 switch(config-smartlink-1)# control-vlan 10 switch(config-smartlink-1)# protected-vlans 20-30 switch(config-smartlink-1)# preemption switch(config-smartlink-1)# preemption-delay 10 switch(config)# smartlink group 2 switch(config-smartlink-2)# primary-port 1/1/8 switch(config-smartlink-2)# secondary-port 1/1/9 switch(config-smartlink-2)# control-vlan 11 switch(config-smartlink-2)# protected-vlans 20-30 switch# show running-config Current configuration:

Smartlink commands | 2650

! ! ! smart-link group 1
primary-port 1/1/1 secondary-port 1/1/2 control-vlan 10 protected-vlans 20-30 preemption preemption-delay 10 exit smart-link group 2 primary-port 1/1/8 secondary-port 1/1/9 control-vlan 11 protected-vlans 20-30 exit

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Supportability commands
show capacities smartlink
show capacities smartlink | show capacities-status smartlink
Description
Shows Smartlink capacities or Smartlink capacities and status.
Examples
Showing Smartlink capacities:
switch# show capacities smartlink System Capacities: Filter SMARTLINK Capacities Name

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2651

Value ----------------------------------------------------------------------------------Maximum number of SMARTLINK GROUPS configurable in a system 24

Showing Smartlink capacities and status:

switch# show capacities-status smartlink

System Capacities Status: Filter SMARTLINK

Capacities Status Name

Value

Maximum

----------------------------------------------------------------------------------

--

Number of SMARTLINK GROUPS currently configured

1

24

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Smartlink commands | 2652

Chapter 143 SNMP commands

SNMP commands
event-trap-enable
event-trap-enable no event-trap-enable
Description
Enables the notification of events to be sent as traps to the SNMP management stations. It is enabled by default. The no form of this command disables the event traps.
Examples
Enabling the event traps:
switch(config)# event-trap-enable
Disabling the event traps:
switch(config)# no event-trap-enable

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

lldp trap enable
lldp trap enable no lldp trap enable
Description

AOS-CX 10.14 Command-Line Interface Guide

2653

Enables sending SNMP traps for LLDP related events from a particular interface. LLDP trap generation is enabled by default on all the interfaces and has to be disabled for interfaces on which traps are not required to be generated. The no form of this command disables the LLDP trap generation.
LLDP trap generation is disabled by default at the global level and must be enabled before any LLDP traps are sent.

Examples
Enabling LLDP trap generation on global level: switch(config)# lldp trap enable
Enabling LLDP trap generation on interface level: switch(config-if)# lldp trap enable
Disabling LLDP trap generation on global level: switch(config)# no lldp trap enable
Disabling LLDP trap generation on interface level: switch(config-if)# no lldp trap enable
Displaying LLDP global configuration: switch# show lldp configuration

LLDP Global Configuration

=========================

LLDP Enabled

: No

LLDP Transmit Interval

: 30

LLDP Hold Time Multiplier : 4

LLDP Transmit Delay Interval : 2

LLDP Reinit Timer Interval : 2

LLDP Trap Enabled

: No

TLVs Advertised =============== Management Address Port Description Port VLAN-ID System Description System Name

LLDP Port Configuration

=======================

PORT

TX-ENABLED

RX-ENABLED

INTF-TRAP-ENABLED

SNMP commands | 2654

--------------------------------------------------------------------------

1/1/1

Yes

Yes

Yes

1/1/2

Yes

Yes

Yes

1/1/3

Yes

Yes

Yes

1/1/4

Yes

Yes

Yes

1/1/5

Yes

Yes

Yes

1/1/6

Yes

Yes

Yes

...........

...........

mgmt

Yes

Yes

Yes

Displaying LLDP Configuration for the interface:

switch# show lldp configuration 1/1/1

LLDP Global Configuration

=========================

LLDP Enabled

: Yes

LLDP Transmit Interval

: 30

LLDP Hold Time Multiplier : 4

LLDP Transmit Delay Interval : 2

LLDP Reinit Timer Interval : 2

LLDP Trap Enabled

: No

LLDP Port Configuration

=======================

PORT

TX-ENABLED

RX-ENABLED

INTF-TRAP-ENABLED

--------------------------------------------------------------------------

1/1/1

Yes

Yes

Yes

Displaying LLDP Configuration for the management interface:

switch# show lldp configuration mgmt

LLDP Global Configuration

=========================

LLDP Enabled

: Yes

LLDP Transmit Interval

: 30

LLDP Hold Time Multiplier : 4

LLDP Transmit Delay Interval : 2

LLDP Reinit Timer Interval : 2

LLDP Trap Enabled

: Yes

LLDP Port Configuration

=======================

PORT

TX-ENABLED

RX-ENABLED

INTF-TRAP-ENABLED

--------------------------------------------------------------------------

mgmt

Yes

Yes

Yes

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2655

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config and config-if

Authority
Administrators or local user group members with execution rights for this command.

mac-notify traps
mac-notify traps {aged | learned | moved | removed} no mac-notify traps {aged | learned | moved | removed}
Description
Configures a Layer 2 or VXLAN interface to generate SNMP trap notifications for up to four different types of MAC address related events on the trunk or access in physical or lag interfaces. MAC notification trap addition to or removal from an interface can be in any combination, quantity, or order. The addition of existing configured traps or removal of non-configured traps will be accepted and ignored.

The mac-notify feature must be enabled globally for any interface configurations to generate SNMP traps. Enabling mac-notify traps may impact the system performance on networks with a large number of mac-notify events.
The no form of this command removes the traps from the interface.

Parameter aged learned moved removed

Description Notifies when a MAC address aged out on the interface. Notifies when a MAC address is learned on the interface. Notifies when a MAC address moved from the interface. Notifies when a MAC address is removed from the interface.

MAC notification cannot be configured on a Layer 3 (routing) interface. A Layer 2 interface that is changed to a Layer 3 interface through the routing command will discard any existing MAC notification configurations. When MACs are learned on VXLAN tunnels or port-access port-security enabled ports, the move scenario is handled by the EVPN/port-access feature respectively. It performs the move by deleting the MAC from the old port and installing it on the new port. In this scenario, MAC trap notifications, if enabled, will reflect that by producing removed and learned notifications.
Usage

SNMP commands | 2656

n MAC notify trap will not generate for static MACs. n vsx-sync is not supported. You must enable the MAC notify traps explicitly on secondary to ensure
the traps are generated. n For EVPN MAC move between the following interfaces, the respective event types are produced (not
always removed or learned) o Port to port: moved o Port to tunnel: removed/learned o Tunnel to port: removed/learned o Tunnel to Tunnel: moved
Examples
MAC notification types and the associated events only apply to Layer 2 and VXLAN interfaces, hence routing might need to be disabled on the relevant interfaces.
Enable MAC notification traps within the SNMP module at a global level:

switch(config)# snmp-server trap

aaa-server-reachability-status status
configuration-changes cpu-utilization link-status interfaces mac-notify memory-utilization module port-security
rmon-events snmp

Enable SNMP trap for AAA server reachability
Enable configuration changes traps Enable high CPU utilization traps Enable link status traps for all physical
Enable MAC table change notification traps Enable high memory utilization traps Enable module event traps Enable port-security violation traps.
(Default: enable) Enable RMON event traps Enable snmp traps

For more information, see snmp-server trap mac-notify. Enabling the traps on an L2 interface:

switch(config)# interface 1/1/1 switch(config-if)# mac-notify traps learned 1/1/1 is not an L2 interface or tunnel switch(config-if)# no routing switch(config-if)# mac-notify traps learned removed switch(config-if)# mac-notify traps moved switch(config-if)# mac-notify traps aged

switch(config)# interface vxlan 1 switch(config-vxlan-if)# mac-notify traps learned removed

switch(config)# interface lag101 switch(config-if)# mac-notify traps removed Disabling the learned and removed traps from the interface 1/1/1:
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2657

switch(config)# interface 1/1/1 switch(config-if)# no mac-notify traps learned removed
switch(config)# interface vxlan 1 switch(config-vxlan-if)# no mac-notify traps learned removed

Enable sending SNMP notifications for MAC table changes:

switch(config-vxlan-if)# mac-notify traps

aged

Notify when a MAC address aged out on the interface

learned

Notify when a MAC address was learned on the interface

moved

Notify when a MAC address moved from the interface

removed

Notify when a MAC address was removed from the interface

switch(config-vxlan-if)# mac-notify traps learned aged removed moved

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.13.1000 10.10 10.08

Command Information

Platforms All platforms

Command context config

Modification
Support for SNMP MAC notify traps on VXLAN tunnels.
Support for port access features with mac-notify added.
Command introduced.
Authority
Administrators or local user group members with execution rights for this command. Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only. Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

rmon alarm
rmon alarm index <INDEX> snmp-oid <SNMP-OID> rising-threshold <RISING-THRESHOLD> falling-threshold <FALLING-THRESHOLD> [sample-interval <SAMPLE-INTERVAL>] [sample-
type <ABSOLUTE|DELTA>] no rmon alarm [index <INDEX>]
Description
Stores configuration entries in an alarm table that defines the sample interval, sample-type, and threshold parameters for an SNMP MIB object. Only the SNMP MIB objects that resolve to an ASN.1

SNMP commands | 2658

primitive type of INTEGER (INTEGER, Integer32, Counter32, Counter64, Gauge32, or TimeTicks) will be monitored.
The no form of this command removes all RMON alarms and allows you to specify an index to remove a particular RMON alarm.

Parameter index <INDEX> snmp-oid <SNMP-OID> rising-threshold <RISING-THRESHOLD> falling-threshold <FALLING-THRESHOLD>
sample-interval <SAMPLE-INTERVAL> sample-type <ABSOLUTE|DELTA>

Description
Specifies the RMON alarm index. Range: 1 to 20.
Specifies the SNMP MIB object to be monitored by RMON.
Specifies the upper threshold value for the RMON alarm.
Specifies the falling threshold value for the RMON alarm. The falling threshold must be less than the rising threshold.
Sample interval in seconds. Default: 30.
Specifies the method of sampling of the SNMP MIB object. Default: Absolute.

Examples
Configuring RMON for the MIB object ifOutErrors.15 with an index 1, rising threshold of 2147483647 and falling threshold of -2134 using absolute sampling for a sample interval of 100 seconds:

switch(config)# rmon alarm index 1 snmp-oid ifOutErrors.15 rising-threshold 2147483647
falling-threshold -2134 sample-type absolute sample-interval 100

Removing RMON alarm with the index 5:

switch(config)# no rmon alarm index 5

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2659

rmon alarm {enable | disable} {index | all}
rmon alarm {enable | disable} {index <INDEX> | all} no rmon alarm [enable | disable] [index <INDEX> | all]
Description
Enables and disables the RMON alarm and its index. RMON alarm is enabled by default.

Parameter enable disable index <INDEX> all

Description Enables the RMON alarm index Disables the RMON alarm index. Specifies the RMON alarm index. Range: 1 to 20. Specifies all the RMON alarms.

Examples
Enabling or disabling all the RMON alarm:

switch(config)# rmon alarm enable all switch(config)# rmon alarm disable all

Enabling or disabling RMON alarm by index:

switch(config)# rmon alarm enable index 1 switch(config)# rmon alarm disable index 1

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show configuration-changes trap
show configuration-changes trap
Description

SNMP commands | 2660

Shows the SNMP configuration changes trap settings.
Example
Showing the SNMP configuration changes trap:
switch# show configuration-changes trap
SNMP Configuration changes trap : Enabled ```

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.10

Modification Command introduced

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mac-notify
show mac-notify
Description
Displays whether the MAC notification feature in the SNMP module is enabled or not. It also displays the trap notification types configured on the Layer 2 ports in the system.
Examples
Showing the MAC notification configuration on all configured ports in the system:

switch# show mac-notify

MAC notification global setting : Enabled

Port

Enabled Traps

---------------------------------------

1/1/1

aged learned moved

1/1/5

moved

lag101

removed

lag104

aged learned moved removed

...

...

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2661

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.08

Modification Command introduced

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show mac-notify port
show mac-notify [port <PORTS>]
Description
Displays the MAC notification configuration on a range of ports.

Parameter [port <PORTS>]

Description Specifies a port, range of ports, or list of ports.

Examples
Showing the MAC notification configuration on a range of ports:

switch(config)# show mac-notify port 1/1/1,1/1/3,1/1/5,lag101-lag104

MAC notification global Setting: Enabled

Port

Enabled Traps

---------------------------------------

1/1/1

aged learned moved

1/1/3

--

1/1/5

moved

lag101

removed

lag102

--

lag103

--

lag104

aged learned moved removed

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.
Command History

SNMP commands | 2662

Release 10.08

Modification Command introduced

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show rmon alarm
show rmon alarm [index <INDEX>]
Description
Displays the RMON alarm configurations.

Parameter index <INDEX>

Description Specifies the RMON alarm index. Range: 1 to 20.

Examples
Showing all RMON alarm configurations:

switch# show rmon alarm

Index

:1

Enabled

: true

Status

: valid

MIB object

: ifOutErrors.15

Sample type

: delta

Sampling interval : 6535 seconds

Rising threshold : 100

Falling threshold : 10

Last sampled value : 0

Last sample time : 2020-09-21 05:58:11

Index

:3

Enabled

: true

Status

: invalid

MIB object

: IF-MIB::ifDescr.19

Sample type

: absolute

Sampling interval : 10000 seconds

Rising threshold : 4000

Falling threshold : 10

Last sampled value : 0

Showing RMON alarm with alarm index 1:

switch# show rmon alarm index 1

Index

:1

Enabled

: true

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2663

Status

: valid

MIB object

: ifOutErrors.15

Sample type

: delta

Sampling interval : 6535 seconds

Rising threshold : 100

Falling threshold : 10

Last sampled value : 0

Last sample time : 2020-06-21 05:58:11

Showing disabled RMON alarm information:

switch# show rmon alarm

Index

:1

Enabled

: false

Status

: valid

MIB object

: ifOutErrors.15

Sample type

: delta

Sampling interval : 6535 seconds

Rising threshold : 100

Falling threshold : 10

Last sampled value : 0

Last sample time : 2020-09-21 05:58:11

Index

:3

Enabled

: false

Status

: invalid

MIB object

: IF-MIB::ifDescr.19

Sample type

: absolute

Sampling interval : 10000 seconds

Rising threshold : 4000

Falling threshold : 10

Last sampled value : 0

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show snmp agent-port
show snmp agent-port
Description
Displays SNMP agent UDP port number.

SNMP commands | 2664

Example
Displaying SNMP agent UDP port number:
switch# show snmp agent-port SNMP agent port : 161

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show snmp community
show snmp community
Description
Displays a list of all configured SNMPv1/v2c communities.
Usage
When a user creates a custom community before enabling an SNMP agent, AOS-CX automatically removes the default public community from the system.
Example
Displaying a list of all configured SNMPv1/v2c communities:

switch#show snmp community

SNMP-COMMUNITIES

-------------------------------------------------------------------

Community

Access-level ACL Name ACL Type View

-------------------------------------------------------------------

private

ro

my_acl

ipv4

view1

private

ro

my_acl

ipv6

none

private2

rw

new_Acl ipv6

view2

private3

rw

none

none

none

When the switch is configured to use SNMPv3 only, the output of the show snmp community command displays the message SNMP v1/v2c is disabled while snmpv3-only mode is configured:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2665

switch# show snmp community

----------------------------------------------------------------------------------

--------

Community

Access-level ACL Name

ACL Type

View

----------------------------------------------------------------------------------

--------

SNMP v1/v2c is disabled while snmpv3-only mode is configured

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.14

10.10

10.08 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification The output of this command now displays an error message when the switch is in SNMPv3-only mode. Output has been updated with SNMP view details. A View column is added to the command output. Added ACL Type column to the command output. --
Authority Administrators or local user group members with execution rights for this command.

show snmp system
show snmp system
Description
Displays SNMP description, location, and contact information.
Example
Displaying SNMP description, location, and contact information:
switch# show snmp system SNMP system information ---------------------------System description : Aggregation router System location : Main lab System contact : John Smith, Lab Admin

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

SNMP commands | 2666

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show snmp trap
show snmp trap
Description
Displays all configured SNMP traps/informs receivers.
Example
Displaying all configured SNMP trap and informs receivers:
switch# show snmp trap

HOST

PORT TYPE VER COMMUNITY/USER NAME VRF

NOTIFICATION TYPES

----------------------------------------------------------------------------------

-

10.10.10.10 162 trap v1 public

default bgp

10.10.10.10 162 inform v2c public

default bgp, ospf, fan,

mstp

10.10.10.10 162 inform v3 name

default

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.14 10.07 or earlier
Command Information

Modification Updated the example output. --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2667

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show snmp views
show snmp views
Description
Displays the list of all the configured SNMP views.
Usage
The following table contains the status and its description of the configured SNMP views:

Status pending_validation operational invalid failed

Description Default value that indicates SNMP view is yet to be validated. OID and mask validated. Invalid OID/mask. Validation failed for reasons other than OID/mask.

Examples
Displaying the list of all the configured SNMP views:

switch# show snmp views -----------------------------------------------------SNMP MIB Views -----------------------------------------------------View : new OID Tree: sysUpTime.0 Mask : ff Type : included Status : pending_validation
View : admin OID Tree: ifIndex.1 Mask : ff:a0 Type : included Status : operational
View : user OID Tree: sysb Mask : none Type : excluded Status : invalid
View : admin OID Tree: .1.3.6.1.2.1.1 Mask : none

SNMP commands | 2668

Type : excluded Status : operational

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.10

Modification Command introduced

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show snmp vrf
show snmp vrf
Description
Displays the VRF on which the SNMP agent service is running.
Example
Displaying SNMP services enabled on VRF:
switch#show snmp vrf SNMP enabled VRF ---------------------------mgmt default

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2669

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show snmpv3 context
show snmpv3 context
Description
Displays all configured SNMP contexts.
Examples
Displaying all configured SNMP contexts:

switch# show snmpv3 context

--------------------------------------------------------------------------

name

vrf

community

--------------------------------------------------------------------------

contextA

default

private

contextB

vrf_A

public

switch# show snmpv3 context

--------------------------------------------------------------------------

Name

vrf

Community

ype[Instance_id]

------------------------------------------------------------------

A

default

public

vrf

switch#

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show snmpv3 engine-id
show snmpv3 engine-id

SNMP commands | 2670

Description
Displays the configured SNMPv3 snmp engine-id. If the SNMPv3 engine-id is not configured, by default a unique engine-id is created by the switch using a combination of the enterprise OID value and the switch's mac address.
Example
Displaying the configured SNMPv3 engine-id:
switch# show snmpv3 engine-id SNMP engine-id : 80:00:B8:5C:08:00:09:1d:de:a5

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show snmpv3 security-level
show snmpv3 security-level
Description
Displays the configured SNMPv3 security level.
Examples
Displaying the configured SNMPv3 security level:
switch# show snmpv3 security-level SNMPv3 security-level : auth

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2671

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show snmpv3 users
show snmpv3 users
Description
Displays all configured SNMPv3 users. For more details on the user enabled status, see snmpv3 security-level.
Example
Displaying all configured SNMPv3 users:

switch# show snmpv3 users

------------------------------------------------------------------------

User

AuthMode PrivMode Status Context Access-level View

------------------------------------------------------------------------

name

md5

none

Enabled context2 ro

view1

context1

context3

name2

none

none

Disabled none

ro

view2

name3

none

none

Disabled none

ro

none

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.10
10.07 or earlier

Modification
Output has been updated with SNMP view details. A View column is added to the command output.
--

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager Operators or Administrators or local user group members with

SNMP commands | 2672

Platforms

Command context (#)

Authority
execution rights for this command. Operators can execute this command from the operator context (>) only.

snmp-server agent-port
snmp-server agent-port <PORT> no snmp-server agent-port [<PORT>]
Description
Sets the UDP port number that the SNMP master agent uses to communicate. UDP port 161 is the default port. The no form of this command sets the SNMP master agent port to the default value.

Parameter <PORT>

Description
Specifies the UDP port number that the SNMP master agent will use. Range: 1 to 65535. Default: 161.

Examples
Setting the SNMP master agent port to 2000:

switch(config)# snmp-server agent-port 2000

Resetting the SNMP master agent port to the default value:

switch(config-schedule)# no snmp-server agent-port 2000

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

snmp-server community
snmp-server community <STRING>

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2673

no snmp-server community <STRING>
Description
Adds an SNMPv1/SNMPv2c community string. A community string is like a password that controls read/write access to the SNMP agent. A network management program must supply this name when attempting to get SNMP information from the switch. A maximum of 10 community strings are supported. Once you create your own community string, the default community string (public) is deleted. The no form of this command removes the specified SNMPv1/SNMPv2c community string. When no community string exists, a default community string with the value public is automatically defined.

Parameter <STRING>

Description
Specifies the SNMPv1/SNMPv2c community string. Range: 1 to 32 printable ASCII characters, excluding space and question mark.

Subcommands
access-level {ro | rw} no access-level {ro | rw} This subcommand changes the access level of the SNMP community. The default access level is readonly (ro). The no form of this subcommand changes the access level of the community to default.

Parameter ro rw

Description Specifies Read-Only access with the SNMP community. Specifies Read-Write access with the SNMP community.

access-list {ip | ipv6} <ACL-NAME> no access-list {ip | ipv6} <ACL-NAME>
This subcommand associates an ACL with the SNMP community. If an ACL is not associated with the SNMP community, the default access is allowed for all the hosts.
The no form of this subcommand removes association of the ACL with the SNMP community.

Parameter ip ipv6 <ACL-NAME>

Description Specifies the IPv4 ACL type. Specifies the IPv6 ACL type. Specifies the ACL name. It supports a maximum of 64 characters.

Examples
Setting the SNMPv1/SNMPv2c community string to private:

switch(config)# snmp-server community private

Removing SNMPv1/SNMPv2c community string private:

SNMP commands | 2674

switch(config)# no snmp-server community private
Configuring the access level for the SMNP community to read-only:
switch(config-community)# access-level ro
Changing the access level of the SNMP community to default:
switch(config-community)# no access-level rw
Associating an IPv4 ACL named my_acl with the SMNP community:
switch(config-community)# access-list ip my_acl
Removing the associated IPv4 ACL named my_acl from the SNMP community:
switch(config-community)# no access-list ip my_acl
The deny rule is not supported for SNMP ACL.
Configuration supported for SNMP ACL:
access-list ip ipv4_acl 10 permit any 4.4.4.4 4.4.4.1 20 permit any 3.3.3.3 3.3.3.1
access-list ipv6 ipv6_acl 10 permit any 2001::2 2001::1 20 permit any 3001::2 3001::1
snmp-server vrf default snmp-server community my_comm_1
access-list ip ipv4_acl access-list ipv6 ipv6_acl
Configuration not supported for SNMP ACL:
access-list ip ipv4_acl 10 deny any 6.6.6.6 6.6.6.1
access-list ipv6 ipv6_acl 10 deny any 6001::6 6000::1
snmp-server vrf default snmp-server community my_comm_1
access-list ip ipv4_acl access-list ipv6 ipv6_acl
hitcounts for SNMP ACL will not be incremented. Example:show access-list hitcounts ip all will not show the hit count of SNMP ACL.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2675

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.14

10.07 or earlier

Command Information

Platforms All platforms

Command context
config config-community

Modification Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated. --
Authority Administrators or local user group members with execution rights for this command.

snmp-server community view
snmp-server community <STRING> [view <VIEW-NAME>] no snmp-server community <STRING> [view <VIEW-NAME>]
Description
Associates an SNMP MIB view with the SNMP community. The no form of this command removes the associated SNMP MIB view from the SNMP community.

Parameter <STRING>
<VIEW-NAME>

Description
Specifies the SNMPv1/SNMPv2c community string. Range: 1 to 32 printable ASCII characters, excluding space and question mark.
Specifies the view name for the SNMP MIB view. Accepts a maximum of 32 characters.

Examples
Configuring the SNMPv1/SNMPv2c community:

switch(config)# snmp-server community my_community switch(config-community)#

Adding SNMP MIB view to the SNMP community:

switch(config-community)# view name1

Removing SNMP MIB view from the SNMP community:

SNMP commands | 2676

switch(config-community)# no view name1

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms All platforms

Command context
config config-community

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

snmp-server historical-counters-monitor
snmp-server historical-counters-monitor no snmp-server historical-counters-monitor
Description
Enables the Remote Network Monitoring agent (rmond) to start collecting historical interface statistics. The no form of this command stops the historical interface statistics collection.
Example
Enabling the rmond agent to start historical interface statistics collection:
switch(config)# snmp-server historical-counters-monitor
Disabling the rmond agent to stop historical interface statistics collection:
switch(config)# no snmp-server historical-counters-monitor

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2677

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

snmp-server response-source
snmp-server response-source {interface <IF-NAME> | <IPv4-ADDRESS> | <IPv6-ADDRESS>} [vrf <VRF-NAME>] no snmp-server response-source {interface <IF-NAME | <IPv4-ADDRESS> | <IPv6-ADDRESS>} [vrf <VRF-NAME>]
Description
Configures the source interface or IP address for sending SNMP responses. Each SNMP can independently have its own unique response source IP address. The no form of this command removes the source interface name or IP address for sending SNMP responses.
n It is recommended to use the loopback interface or ip address of the loopback interface as the response source. If a device does not support a loopback interface, then configure SVI interface or SVI IP address as the response source.
n The active gateway IP address cannot be configured as the response source. n It is recommended to limit the maximum number of response source to five. n The interface used for the response source should be in the up state. If the interface is down, the default
source IP will be used. n The use of udp6 is mandatory for IPv6 SNMP operations. For example, you can use the following syntax:
snmpwalk -v2c -c public -m ALL udp6:[2100::2] .1.3.6.1.2.1.1.

Parameter interface <IF-NAME> <IPv4-ADDRESS> <IPv6-ADDRESS> vrf <VRF-NAME>

Description
Specifies the source interface name. The interface can be a physical interface, loopback interface, or VLAN interface.
Specifies the IPv4 address of the source interface for the SNMP response.
Specifies the IPv6 address of the source interface for the SNMP response.
Specifies the VRF name associated to the source interface for the SNMP response.

Examples
Configuring a response source for the interface 1/1/12:

switch(config)# snmp-server response-source interface 1/1/12 vrf red

Configuring a response source for interface loopback10:

SNMP commands | 2678

switch(config)# snmp-server response-source interface loopback10 vrf red Configuring a response source for the IPv4 address 10.0.0.1:
switch(config)# snmp-server response-source 10.0.0.1 vrf sample Configuring a response source for the IPv6 address 2001::1:
switch(config)# snmp-server response-source 2001::1 vrf default

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.13 10.10

Command Information

Platforms All platforms

Command context config

Modification Added support for IPv6 address. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

snmp-server snmpv3-only
snmp-server snmpv3-only no snmp-server snmpv3-only
Description
Accepts SNMPv3 messages only, SNMPv1 and SNMPv2c will be disabled. By default SNMPv1, SNMPv2c and SNMPv3 will all be enabled. The no form of this command restores the default setting and reenables SNMPv1 and SNMPv2c .
Examples
Configuring SNMPv3 messages only, and disabling SNMPv1 and SNMPv2c:
switch(config)# snmp-server snmpv3-only

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2679

Release 10.10

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

snmp-server host
snmp-server host <IPv4-ADDR | IPv6-ADDR> trap version <VERSION> [community <STRING>] [port <UDP-PORT>] [<VRF-NAME>] [notification-type <NOTIFICATION-TYPE>] no snmp-server host <IPv4-ADDR | IPv6-ADDR> trap version <VERSION> [community <STRING>] [port <UDP-PORT>] [<VRF-NAME>] [notification-type <NOTIFICATION-TYPE>]
snmp-server host <IPv4-ADDR | IPv6-ADDR> inform version v2c [community <STRING>] [port <UDP-PORT>] [<VRF-NAME>] [notification-type <NOTIFICATION-TYPE>] no snmp-server host <IPv4-ADDR | IPv6-ADDR> inform version v2c [community <STRING>] [port <UDP-PORT>] [<VRF-NAME>] [notification-type <NOTIFICATION-TYPE>]

snmp-server host <IPv4-ADDR | IPv6-ADDR> [trap version v3 | inform version v3] user <NAME> [port <UDP-PORT>] [<VRF-NAME>] [notification-type <NOTIFICATION-TYPE>] no snmp-server host <IPv4-ADDR | IPv6-ADDR> [trap version v3 | inform version v3] user <NAME> [port <UDP-PORT>] [<VRF-NAME>] [notification-type <NOTIFICATION-TYPE>]
Description
Configures a trap/informs receiver to which the SNMP agent can send SNMP v1/v2c/v3 traps or v2c informs. A maximum of 30 SNMP traps/informs receivers can be configured. The no form of this command removes the specified trap/inform receiver.

Parameter <IPv4-ADDR>
<IPv6-ADDR> trap version <VERSION> inform version v2c trap version v3 user <NAME> community <STRING>

Description
Specifies the IP address of a trap receiver in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. You can remove leading zeros. For example, the address 192.169.005.100 becomes 192.168.5.100.
Specifies the IP address of a trap receiver in IPv6 format (x:x::x:x).
Specifies the trap notification type for SNMPv1, v2c or v3. Available options are: v1, v2c or v3.
Specifies the inform notification type for SNMPv2c.
Specifies the trap notification type for SNMPv3.
Specifies the SNMPv3 user name to be used in the SNMP trap notifications.
Specifies the name of the community string to use when

SNMP commands | 2680

Parameter
<UDP-PORT> <VRF-NAME> <notification-type>

Description
sending trap notifications. Range: 1 - 32 printable ASCII characters, excluding space and question mark. Default: public.
Specifies the UDP port on which notifications are sent. Range: 1 - 65535. Default: 162.
Specifies the VRF on which the SNMP agent listens for incoming requests.
Specifies the type of notification to be sent to the trap receiver. If no type is specified, all notifications are sent. The supported notification types are: n aaa-server n alarm n bgp n card n config n entity n fan n interface n lldp n loop-protect n mac-notify n mstp n mvrp n ospf n ospfv3 n port-security n power n power-ethernet n rmon n rpvst n stp n temperature n vrrp n vsf n vsx

Examples

switch(config)# snmp-server host 10.10.10.10 trap version v1 switch(config)# no snmp-server host 10.10.10.10 trap version v1 switch(config)# snmp-server host a:b::c:d trap version v1 switch(config)# no snmp-server host a:b::c:d trap version v1 switch(config)# snmp-server host 10.10.10.10 trap version v2c community public switch(config)# no snmp-server host 10.10.10.10 trap version v2c community public switch(config)# snmp-server host a:b::c:d trap version v2c community public switch(config)# no snmp-server host a:b::c:d trap version v2c community public switch(config)# snmp-server host 10.10.10.10 trap version v2c community public port 5000 switch(config)# no snmp-server host 10.10.10.10 trap version v2c community public port 5000 switch(config)# snmp-server host 10.10.10.10 trap version v2c community public

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2681

port 5000 vrf default switch(config)# no snmp-server host 10.10.10.10 trap version v2c community public port 5000 vrf default switch(config)# snmp-server host a:b::c:d trap version v2c community public port 5000 switch(config)# no snmp-server host a:b::c:d trap version v2c community public port 5000 switch(config)# snmp-server host 10.10.10.10 inform version v2c community public switch(config)# no snmp-server host 10.10.10.10 inform version v2c community public switch(config)# snmp-server host a:b::c:d inform version v2c community public switch(config)# no snmp-server host a:b::c:d inform version v2c community public switch(config)# snmp-server host 10.10.10.10 inform version v2c community public port 5000 switch(config)# no snmp-server host 10.10.10.10 inform version v2c community public port 5000 switch(config)# snmp-server host 10.10.10.10 inform version v2c community public port 5000 vrf default switch(config)# no snmp-server host 10.10.10.10 inform version v2c community public port 5000 vrf default switch(config)# snmp-server host a:b::c:d inform version v2c community public port 5000 switch(config)# no snmp-server host a:b::c:d inform version v2c community public port 5000 switch(config)# snmp-server host 10.10.10.10 trap version v3 user Admin switch(config)# no snmp-server host 10.10.10.10 trap version v3 user Admin switch(config)# snmp-server host a:b::c:d trap version v3 user Admin switch(config)# no snmp-server host a:b::c:d trap version v3 user Admin switch(config)# snmp-server host 10.10.10.10 trap version v3 user Admin port 2000 switch(config)# no snmp-server host 10.10.10.10 trap version v3 user Admin port 2000 switch(config)# snmp-server host a:b::c:d trap version v3 user Admin port 2000 switch(config)# no snmp-server host a:b::c:d trap version v3 user Admin port 2000

SNMP trap notification type examples:

switch(config)# snmp-server host 10.10.10.10 trap version v2c community public

notification-type bgp fan interface power entity

switch(config)# no snmp-server host 10.10.10.10 trap version v2c community public

notification-type bgp

switch(config)# snmp-server host a:b::c:d inform version v3 user Admin

notification-type bgp fan interface power-ethernet

switch(config)# no snmp-server host a:b::c:d inform version v3 user Admin

notification-type bgp interface

switch(config)# snmp-server host a:b::c:d inform version v3 user Admin

notification-type ?

aaa-server

Sends AAA notifications.

alarm

Sends Alarm notifications.

bgp

Sends Border Gateway Protocol (BGP) state change notifications.

card

Sends Card notifications.

config

Sends Configuration change notifications.

entity

Sends Entity notifications.

fan

Sends Fan notifications.

interface

Sends Interface notifications.

lldp

Sends Link Layer Discovery Protocol (LLDP) notifications.

loop-protect Sends Loop Protect notifications.

mac-notify

Sends MAC Notify notifications.

mstp

Sends Multiple Spanning Tree Protocol (MSTP) notifications.

mvrp

Sends Multiple VLAN Registration Protocol (MVRP) notifications.

ospf

Sends Open Shortest Path First (OSPFv2) notifications.

SNMP commands | 2682

ospfv3 port-security power power-ethernet rmon rpvst snmp notifications. stp temperature vrrp vsf vsx

Sends Open Shortest Path First version 3 (OSPFv3) notifications. Sends Port Security notifications. Sends Power notifications. Sends Power over Ethernet (PoE) notifications. Sends Remote Network Monitoring (RMON) notifications. Sends Rapid Per VLAN Spanning Tree (RPVST) notifications. Sends Sends Simple Network Management Protocol (SNMP)
Sends Spanning Tree Protocol (STP) notifications. Sends Temperature notifications. Sends Virtual Router Redundancy Protocol (VRRP) notifications. Sends Virtual Switching Framework (VSF) notifications. Sends Virtual System Extension (VSX) notifications.

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

snmp-server system-contact
snmp-server system-contact <INFO> no snmp-server system-contact [<INFO>]
Description
Sets SNMP contact information. The no form of this command removes the SNMP contact information.

Parameter <INFO>

Description
Specifies SNMP contact information. Range: 1 to 128 printable ASCII characters, except for question mark (?).

Examples
Defines SNMP contact information to be John Smith, Lab Admin:

switch(config)# snmp-server system-contact John Smith, Lab Admin

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2683

Removes SNMP contact information: switch(config)# no snmp-server system-contact

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

snmp-server system-description
snmp-server system-description <DESCRIPTION> no snmp-server system-description
Description
Sets the SNMP system description. The no form of this command removes the SNMP system description.

Parameter <DESCRIPTION>

Description
Specifies the SNMP system description. Typical content to include would be the full name and version of the following: n Hardware type of the system n Software operating system n Networking software Range: 1 to 64 printable ASCII characters, except for the question mark (?).

Examples
Defines the SNMP system description to be mainSwitch:

switch(config)# snmp-server system-description mainSwitch

Removes the SNMP system description:

switch(config)# no snmp-server system-description mainSwitch

SNMP commands | 2684

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

snmp-server system-location
snmp-server system-location <INFO> no snmp-server system-location
Description
Sets the SNMP location information. The no form of this command removes the SNMP location information.

Parameter <INFO>

Description
Specifies the SNMP location information. Range: 1 to 128 printable ASCII characters, except for the question mark (?).

Examples
Defines the SNMP location information to be Main Lab:

switch(config)# snmp-server system-location Main Lab

Removes the SNMP location information:

switch(config)# no snmp-server system-location

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2685

Command Information

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

snmp-server trap
snmp-server trap {cpu-utilization | memory-utilization | rmon-events} no snmp-server trap {cpu-utilization | memory-utilization | rmon-events}
Description
Enables the SNMP traps. The SNMP traps are enabled by default. The no form of this command disables the SNMP traps.

Parameter cpu-utilization memory-utilization rmon-events

Description Enables the CPU utilization traps. Enables the memory utilization traps. Enables the RMON event traps.

Examples
Enabling the SNMP traps:

switch(config)# snmp-server trap cpu-utilization switch(config)# snmp-server trap memory-utilization switch(config)# snmp-server trap rmon-events

Disabling the SNMP traps:

switch(config)# no snmp-server trap cpu-utilization switch(config)# no snmp-server trap memory-utilization switch(config)# no snmp-server trap rmon-events

Displaying the SNMP trap configuration:

switch(config)# show running-config all | inc snmp snmp-server trap rmon-events snmp-server trap cpu-utilization snmp-server trap memory-utilization

Displaying CPU and Memory usage:

switch(config)# show system

Hostname

: XXXX

System Description : XX.10.07.0001CI

System Contact

:

SNMP commands | 2686

System Location :

Vendor

: Aruba

Product Name

: JLXXXX XXXX Base Chassis/3xFT/18xFans/Cbl Mgr/X462 Bundle

Chassis Serial Nbr : SG6ZOO9068

Base MAC Address : f40343-806400

AOS-CX Version : XX.10.07.0001CI

Time Zone

: UTC

Up Time

: 8 minutes

CPU Util (%)

:1

Memory Usage (%) : 10

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

snmp-server trap aaa-server-reachability-status
snmp-server trap aaa-server-reachability-status no snmp-server trap aaa-server-reachability-status
Description
Enables the SNMP trap for AAA server status. When enabled, traps are sent whenever AAA server (RADIUS, TACACS) status changes from reachable to unreachable and vice versa. The no form of this command disables sending SNMP trap for AAA server status.
Examples
Enabling the SNMP trap for AAA server status:
switch(config)# snmp-server trap aaa-server-reachability-status
Disabling the SNMP trap for AAA server status:
switch(config)# no snmp-server trap aaa-server-reachability-status

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2687

Command History

Release 10.09

Command Information

Platforms All platforms

Command context config

Modification Command introduced on 6200, 6300 and 6400
Authority Administrators or local user group members with execution rights for this command.

snmp-server trap configuration-changes
snmp-server trap configuration-changes no snmp-server trap configuration-changes
Description
Enables sending SNMP traps whenever the configuration changes. Configuration trap generation is disabled by default. The no form of this command disables sending SNMP traps for configuration changes.

Parameter configuration-changes

Description Specifies SNMP traps for configuration changes.

Examples
Enabling the SNMP traps for configuration changes:

switch(config)# snmp-server trap configuration-changes

Disabling the SNMP traps for configuration changes:

switch(config)# no snmp-server trap configuration-changes

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.10
Command Information

Modification Command introduced

SNMP commands | 2688

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

snmp-server trap mac-notify
snmp-server trap mac-notify no snmp-server trap mac-notify
Description
Enables the MAC notification traps within the SNMP module at a global level. When enabled, traps are sent for interfaces that are configured for MAC notification events. The no form of this command disables sending MAC notification traps at a global level. When disabled, existing mac-notify interface configuration is preserved but MAC notification events on configured interfaces will not cause SNMP traps to be transmitted.
Examples
Enabling the SNMP MAC notification feature in the system globally:
switch(config)# snmp-server trap mac-notify
Disabling the SNMP MAC notification feature in the system globally:
switch(config)# no snmp-server trap mac-notify

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms All platforms

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

snmp-server trap module
snmp-server trap module no snmp-server trap module
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2689

Enables SNMP trap generation for modules. Module trap generation is enabled by default. Generates the module event traps whenever a modular line or fabric card changes state, which includes inserted, removed, ready, and down, as well as when a modular card is unrecognized.
The no form of this command disables the SNMP trap generation for module events.

Parameter module

Description Specifies SNMP traps for module events.

Examples
Enabling the SNMP traps for modules:

switch(config)# snmp-server trap module

Disabling the SNMP traps for modules:

switch(config)# no snmp-server trap module

switch(config)# show running-config no snmp-server trap module

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms 6400

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

snmp-server trap port-security
snmp-server trap port-security no snmp-server trap port-security
Description
Enables SNMP port-security violation traps on the system. Port-security violation traps are enabled by default. The no form of this command disables the SNMP port-security violation traps on the system.

SNMP commands | 2690

Parameter port-security

Description Specifies SNMP traps for port-security.

Examples
Enabling the SNMP port-security violation traps on the system:

switch(config)# snmp-server trap port-security

Disabling the SNMP port-security violation traps on the system:

switch(config)# no snmp-server trap port-security

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

snmp-server trap snmp
snmp-server trap snmp {authentication | coldstart | warmstart} [vrf <VRF_NAME>] no snmp-server trap snmp {authentication | coldstart | warmstart} [vrf <VRF_NAME>]
Description
Enables SNMPv2 MIB traps. The SNMPv2 traps are disabled by default. The no form of this command disables the SNMPv2 MIB traps. SNMPv2 MIB supports the following traps:
n authentication: Authentication trap is sent when the SNMP server receives a protocol message that is not properly authenticated.
n coldstart: A coldstart trap is sent when the switch reboots. n warmstart: A warmstart trap is sent when there is a user intervention to enable or disable the SNMP
service on the switch.
SNMPv2 Authentication traps do not support source IP configuration.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2691

Parameter authentication coldstart warmstart <VRF_NAME>

Description Enables the authentication traps. Enables the coldstart traps. Enables the warmstart traps. Specifies the VRF name. Enables the SNMPv2 traps for a VRF.

Examples
Enabling all SNMPv2 traps: switch(config)# snmp-server trap snmp
Enabling only SNMPv2 authentication traps: switch(config)# snmp-server trap snmp authentication
Disabling all SNMP traps: switch(config)# no snmp-server trap snmp

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms All platforms

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

snmp-server trap-source interface vrf
snmp-server trap-source {interface <IF-NAME> | <IPv4-Address> | <IPv6-Address>} [vrf <VRF-NAME>] no snmp-server trap-source {interface <IF-NAME> | <IPv4-Address> | <IPv6-Address>} [vrf <VRF-NAME>]
Description
Configures SNMP trap source interface or IP address for a VRF.

SNMP commands | 2692

The no form of this command removes the SNMP trap-source configuration for a VRF.

Parameter <IF-NAME>
<IPv4-Address> <IPv6-Address> <VRF-NAME>

Description
Specifies the source interface name. Interface name can be physical interface, loopback interface, LAG interface, or VLAN interface.
Specifies the IPv4 address of source interface for the SNMP trap.
Specifies the IPv6 address of source interface for the SNMP trap.
Specifies the name of a VRF associated to the source interface for the SNMP trap.

Examples
Configuring SNMP trap source interface for a VRF.

switch(config)# snmp-server trap-source interface 1/1/12 vrf sample switch(config)# snmp-server trap-source interface loopback10 vrf sample switch(config)# snmp-server trap-source interface vlan23 vrf sample

Configuring SNMP trap source IP address for a VRF.

switch(config)# snmp-server trap-source 10.0.0.1 vrf red switch(config)# snmp-server trap-source 1001::1 vrf red

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

snmp-server trap vsx
snmp-server trap vsx no snmp-server trap vsx
Description
Enables sending the SNMP traps for VSX related events. VSX trap generation is disabled by default. The no form of this command disables sending the SNMP traps for VSX related events.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2693

The trap support is available for the following VSX events:
n ISL up and down n KA up and down n MCLAG up and down

Parameter vsx

Description Specifies SNMP traps for VSX events.

Examples
Enabling the VSX traps:

switch(config)# snmp-server trap vsx

switch(config)# show vsx configuration trap SNMP traps : Enabled
Disabling the VSX traps:
switch(config)# no snmp-server trap vsx

switch(config)# show vsx configuration trap SNMP traps : Disabled

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

snmp-server view
snmp-server view <VIEWNAME> <OID_TREE> [<MASK>] <included/excluded> no snmp-server view <VIEWNAME> <OID_TREE> [<MASK>] <included/excluded>
Description

SNMP commands | 2694

Configures an SNMP MIB view. The no form of this command removes the specified SNMP MIB view.

Parameter <VIEWNAME> <OID_TREE> <MASK> <included/excluded>

Description
Specifies the name of the SNMP MIB view. Supports up to a maximum of 32 characters.
Specifies the OID tree to be included or excluded in SNMP MIB view.
Specifies the OID mask value. The values must be in hexadecimal character separated with : (colon).
Specifies the OID tree that is included in or excluded from the SNMP MIB view.

Usage
You can configure a maximum of 50 SNMP MIB views. The following VTY message is displayed when the configuration exceeds the maximum SNMP MIB views:
switch(config)# snmp-server view name51 1.3.6.1.2.1.1 fe:00 included Configuration failed: Maximum allowed views are configured.

Examples
Configuring the SNMP MIB views:
switch(config)# snmp-server view name1 .1.3.6.1.2.1.2.2.1.1.1 FF:A0 included switch(config)# snmp-server view name2 IF-MIB::ifindex included switch(config)# snmp-server view name4 1.3.6.1.2.1.1 fe:00 included

Removing an SNMP MIB view: switch(config)# no snmp-server view name4 1.3.6.1.2.1.1 fe:00 included

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms All platforms

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2695

snmp-server vrf
snmp-server vrf <VRF-NAME> no snmp-server vrf <VRF-NAME>
Description
Configures a VRF on which the SNMP agent listens for incoming requests. By default, the SNMP agent does not listen on any VRF. 4100i, 6000, and 6100 only support default VRF. The SNMP agent can listen on multiple VRFs. The no form of this command stops the SNMP agent from listening for incoming requests on the specified VRF.

Parameter <VRF-NAME>

Description Specifies the name of a VRF.

Examples
Configuring the SNMP agent to listen on VRF default.

switch(config)# snmp-server vrf default

Configuring the SNMP agent to listen on VRF mgmt.

switch(config)# snmp-server vrf mgmt

Configuring the SNMP agent to listen on used-defined VRF myvrf.

switch(config)# snmp-server vrf myvrf

Stopping the SNMP agent from listening on VRF default.

switch(config)# no snmp-server vrf default

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

SNMP commands | 2696

snmpv3 context
snmpv3 context <NAME> vrf <VRF-NAME> [community <STRING>] no snmpv3 context <NAME> [vrf <VRF-NAME>] [community <STRING>]
Description
Creates an SNMPv3 context on the specified VRF. The no form of this command removes the specified SNMP context.

Parameter <NAME>
vrf <VRF-NAME> community <STRING>

Description
Specifies the name of the context. Range: 1 to 32 printable ASCII characters, excluding space and question mark (?).
Specifies the VRF associated with the context. Default: default.
Specifies the SNMP community string associated with the context. Range: 1 to 32 printable ASCII characters, excluding space and question mark. Default: public.

Examples
Creating an SNMPv3 context named newContext:

switch(config)# snmpv3 context newContext

Creating an SNMPv3 context named newContext on VRF myVrf and with community string private.

switch(config)# snmpv3 context newContext vrf myVrf community private

Removing the SNMPv3 context named newContext on VRF myVrf:

switch(config)# no snmpv3 context newContext vrf myVrf

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2697

snmpv3 engine-id
snmpv3 engine-id <ENGINE-ID> no snmpv3 engine-id <ENGINE-ID>
Description
Configures the SNMPv3 SNMP engine-id allowing an administrator to configure a unique SNMP engineid for the switch. This engine-id is used by the NMS management tool to identify and distinguish multiple switches on the same network. The no form of this command restores the default engine-id, created by the switch using a combination of the enterprise OID value and the switch's mac address.

Parameter <ENGINE-ID>

Description
SNMPv3 SNMP engine-id in colon separated hexadecimal notation.

Examples
Configuring the SNMPv3 engine-id:

switch(config)# switch(config)# snmpv3 engine-id
WORD SNMPv3 snmp engine-id in colon seperated hexadecimal notation switch(config)# snmpv3 engine-id 01:23:45:67:89:ab:cd:ef:01:23:45:67

Restoring the default SNMPv3 engine-id:

switch(config)# no snmpv3 engine-id

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

snmpv3 security-level
snmpv3 security-level {auth | auth-privacy} no snmpv3 security-level {auth | auth-privacy}

SNMP commands | 2698

Description
Configures the SNMPv3 security level. The security level determines which SMNPv3 users defined by the command snmpv3 user are able to connect. The no form of this command changes the security level as follows:
n no snmpv3 security-level auth: Sets the security level to auth-privacy. n no snmpv3 security-level auth-privacy: Sets the security level to no authentication or privacy,
allowing any SNMP user to connect.

Parameter auth
auth-privacy

Description
SNMPv3 users that support authentication, or authentication and privacy are allowed.
Only SNMPv3 users with both authentication and privacy are allowed. This is the highest level of SNMPv3 security. Default.

Examples
Setting the SNMPv3 security level to authentication and privacy:

switch(config)# snmpv3 security-level auth-privacy

Setting the SNMPv3 security level to authentication only:

switch(config)# snmpv3 security-level auth

Setting the SNMPv3 security level to no authentication and no privacy:

switch(config)# no snmpv3 security-level auth-privacy

Restoring the default SNMPv3 security level to authentication and privacy:

switch(config)# no snmpv3 security-level auth

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2699

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

snmpv3 user
snmpv3 user <NAME> [auth <AUTH-PROTO> auth-pass [{plaintext | ciphertext} <AUTH-PASS>]] [priv <PRIV-PROTO> priv-pass [{plaintext | ciphertext} <PRIV-PASS>]] [access-level ro|rw]
no snmpv3 user <NAME> [auth <AUTH-PROTO> auth-pass [{plaintext | ciphertext} <AUTH-PASS>]] [priv <PRIV-PROTO> priv-pass [{plaintext | ciphertext} <PRIV-PASS>]] [access-level ro|rw]
Description
Creates an SNMPv3 user and adds it to an SNMPv3 context. The SNMPv3 security level (set with command snmpv3 security-level) determines which users are allowed to authenticate. The no form of this command removes the specified SNMPv3 user.
When updating the authentication protocols and privacy protocols for the existing SNMPv3 users, you must also update the access level. Otherwise, the access level will be set to read-only.

Parameter <NAME> access-level
auth <AUTH-PROTO> auth-pass [{plaintext | ciphertext} <AUTH-PASS>]

Description
Specifies the SNMPv3 username. Range 1 to 32 printable ASCII characters, excluding space and question mark (?).
Configures the access level for the SNMPv3 user: n ro: Allow read-only access for the
SNMPv3 user n rw: Allow read-write access for the
SNMPv3 user
Sets the authentication protocol used to validate user logins. Supported protocols are md5, sha, sha224, sha256, sha384, and sha512.
Specifies the SNMPv3 user authentication password. Range for plaintext is 8 to 32 printable ASCII characters, excluding space and question mark (?). Range for ciphertext is 1 to 256 printable ASCII characters. Ciphertext is used when copying user configuration settings between switches.
NOTE: Authentication passwords that include special characters must be enclosed

SNMP commands | 2700

Parameter priv <PRIV-PROTO>

Description
in single quotation marks ('). For example, 'auth-pwd20246!@#'.
Sets the SNMPv3 privacy protocol (encryption method). Supported privacy protocols are aes, aes192, aes256, and des.

priv-pass [{plaintext | ciphertext} <PRIV-PASS>]

Specifies the SNMPv3 user privacy encryption password. Range for plaintext is 8 to 32 printable ASCII characters, excluding space and question mark (?). Range for ciphertext is 1 to 256 printable ASCII characters. Ciphertext is used when copying user configuration settings between switches.
NOTE: Authentication passwords that include special characters must be enclosed in single quotation marks ('). For example, 'priv-pwd20246!@#'.

When the authentication password is not provided on the command line, plaintext authentication password prompting occurs upon pressing Enter, followed by privacy encryption protocol prompting, and finally plaintext encryption password prompting. The entered password characters are masked with asterisks.
When the authentication type and password plus the privacy protocol (encryption method) are provided on the command line but the encryption password is not provided, plaintext encryption password prompting occurs upon pressing Enter. The entered password characters are masked with asterisks.
Examples
Defining SNMPv3 user Admin1 using sha authentication and des privacy encryption with provided plaintext passwords:
switch(config)# snmpv3 user Admin1 auth sha auth-pass plaintext F82#450h priv des priv-pass plaintext F82#4eva
Defining SNMPv3 user Admin2 using MD5 authentication and AES privacy encryption with provided authentication password and privacy encryption type but prompted encryption password:
switch(config)# snmpv3 user Admin2 auth md5 auth-pass plaintext F82#450h priv aes priv-pass
Enter the privacy encryption key: ******** Re-Enter the privacy encryption key: ********
Defining SNMPv3 user Admin2 using MD5 authentication and AES privacy encryption with plaintext password prompting and privacy encryption selection:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2701

switch(config)# snmpv3 user Admin2 auth md5 auth-pass Enter the authentication password: ******** Re-Enter the authentication password: ********
Configure the privacy protocol (y/n)? y Enter the privacy protocol (aes/des)? aes
Enter the privacy encryption key: ******** Re-Enter the privacy encryption key: ********
Removing SNMPv3 user Admin1:
switch(config)# no snmpv3 user Admin1
Creating an SNMP user on switch 1 and then creating the same user on switch 2 by copying from the switch 1 configuration: On switch 1, configure a user named Admin3, and then use the show running-config command to display switch configuration. Save a copy of the full snmpv3 user command (shown by show runningconfig). This saved command is used on switch 2.
switch1(config)# snmpv3 user Admin3 auth sha auth-pass plaintext F82#450h priv des priv-pass plaintext F82#4eva
switch1(config)# exit switch1# show running-config Current configuration: ! !Version AOS-CX xx.xx.xx.xxxxxx ! snmpv3 user Admin3 auth sha auth-pass ciphertext AQBaf2d...FJVcZ3o= priv des priv-pass ciphertext AQBaH2p...2jfTFwQ= ssh server vrf mgmt ! interface mgmt
no shutdown ip dhcp vlan 1
On switch 2, execute the snmpv3 user command that you saved from switch 1 (as shown by show running-config). This creates the user on switch 2 with the same configuration.
switch2(config)# snmpv3 user Admin3 auth sha auth-pass ciphertext AQBaf2d...FJVcZ3o=
priv des priv-pass ciphertext AQBaH2p...2jfTFwQ=
The following command sets a read-write access level for an SNMPv3 user with the user name user1.
switch(config)# snmpv3 user user1 auth md5 auth-pass plaintext abc1234 accesslevel rw
For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.
Command History
SNMP commands | 2702

Release 10.13

10.09 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Following authentication protocols are supported: sha224, sha256, sha384, and sha512. Following privacy protocols are supported: aes192 and aes256. The access-level parameter was introduced. --
Authority Administrators or local user group members with execution rights for this command.

snmpv3 user view
snmpv3 user <USER-NAME> view <VIEW-NAME> no snmpv3 user <USER-NAME> view <VIEW-NAME>
Description
Associates a user with an existing SNMP MIB view. The no form of this command removes the associated user from the specified SNMP MIB view.

Parameter <USER-NAME>
<VIEWNAME>

Description
Specifies the user name for the SNMP MIB view. Accepts a maximum of 32 characters.
Specifies the view name for the SNMP MIB view. Accepts a maximum of 32 characters.

Examples
Adding a user in the existing SNMP MIB view:

switch(config)# snmpv3 user nw-admin view my-nw-view

Removing the user from the SNMP MIB view:

switch(config)# no snmpv3 user nw-admin view my-nw-view

Attaching unconfigured or unknown SNMP view to an SNMPv3 user:

switch(config)# snmpv3 user nw-admin view myView View myView is not configured.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2703

For more information on features that use this command, refer to the SNMP/MIB Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms All platforms

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

SNMP commands | 2704

Chapter 144 Source-interface selection commands

Source-interface selection commands

ip source-interface
ip source-interface <PROTOCOL> {<IP-ADDR>|interface <IFNAME>} [vrf <VRF-NAME>] no ip source-interface <PROTOCOL> interface <IFNAME> [vrf <VRF-NAME>]
Description
Configures the IPv4 source-interface interface to use for the specified protocol. If a VRF is not given, the default VRF applies. The no form of this command removes the specified configuration.

Parameter <PROTOCOL>

Description
Specifies the protocol to configure. all
Selects the source for all protocols covered by this command. central
Selects Aruba Central. dhcp_relay
Selects DHCP relay. When you configure a dhcp_relay source interface, you must also enable DHCP relay Option 82 using the dhcp-relay option 82 sourceinterface command. dns
Selects DNS. http
Selects HTTP. ipfix
Selects ipfix. Configures source interface for IPFIX. ntp
Selects NTP. ptp
Selects PTP. radius
Selects RADIUS. sflow
Selects sFLow. sftp-scp
Selects SFTP and SCP. ssh-client
Selects SSH Client. syslog

AOS-CX 10.14 Command-Line Interface Guide

2705

Parameter
<IFNAME> <IP-ADDR> vrf <VRF-NAME>

Description
Selects the source for syslog packets. tacacs
Selects the source for TACACS packets. tftp
Selects TFTP. ubt
Selects UBT.
Specifies the VRF name.
Specifies the interface name.
Specifies the IPv4 address.
Specifies the VRF name.

Examples
Configuring IPv4 source-interface interface 1/1/1 to use for the TFTP protocol:

switch(config)# ip source-interface tftp interface 1/1/1

Configuring IPv4 source-interface interface 1/1/2 to use for the TFTP protocol on VRF green :

switch(config)# ip source-interface tftp interface 1/1/2 vrf green

Removing IPv4 source-interface 1/1/1configuration for the TFTP protocol:

switch(config)# no ip source-interface tftp interface 1/1/1

Removing source-interface interface 1/1/2 configuration for TFTP protocol on VRF green:

switch(config)# no ip source-interface tftp interface 1/1/2 vrf green

Configuring source-interface IPv4 10.1.1.1 to use for the TFTP protocol:

switch(config)# ip source-interface tftp 10.1.1.1

Configuring source-interface IPv4 10.1.1.2 to use for the TFTP protocol on VRF green :

switch(config)# ip source-interface tftp 10.1.1.2 vrf green

Removing source-interface IPv4 10.1.1.1 configuration for the TFTP protocol:

switch(config)# no ip source-interface tftp 10.1.1.1

Source-interface selection commands | 2706

Removing source-interface IPv4 10.1.1.2 configuration for TFTP protocol on VRF green: switch(config)# no ip source-interface tftp 10.1.1.2 vrf green
Configuring source-interface IPv4 10.1.1.1 to use for the DNS protocol: switch(config)# ip source-interface dns 10.1.1.1
Configuring source-interface IPv4 10.1.1.2 to use for the DNS protocl on VRF green : switch(config)# ip source-interface dns 10.1.1.2 vrf green
Removing source-interface IPv4 10.1.1.1configuration for the DNS protocol: switch(config)# no ip source-interface tftp 10.1.1.1
Removing source-interface IPv4 10.1.1.2 configuration for the DNS protocol on VRF green: switch(config)# no ip source-interface dns 10.1.1.2 vrf green

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.12.1000 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Added cental, sftp-scp, and ssh-client parameters. --
Authority Administrators or local user group members with execution rights for this command.

ipv6 source-interface
ipv6 source-interface <PROTOCOL> {<IPV6-ADDR>|interface <IFNAME>} [vrf <VRF-NAME>] no ipv6 source-interface <PROTOCOL> {<IPV6-ADDR>|interface <IFNAME>} [vrf <VRF-NAME>]
Description
Configures the IPv6 source-interface interface to use for the specified protocol. If a VRF is not given, the default VRF applies.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2707

The no form of this command removes all configurations.

Parameter <PROTOCOL>
<IPV6-ADDR> <IFNAME> vrf <VRF-NAME>

Description
Specifies the protocol to configure. all
Selects all protocols supported by this command. central
Selects Aruba Central. dhcp_relay
Selects DHCP relay. dns
Selects DNS packets http
Selects HTTP. ntp
Selects NTP. radius
Selects radius. sftp-scp
Selects SFTP and SCP. sflow
Selects sFLow. ssh-client
Selects SSH Client. syslog
Selects syslog. tacacs
Selects TACACS. tftp
SelectsTFTP. ipfix
Selects ipfix. Configures source interface for IPFIX.
Specifies the IPv6 address.
Specifies the interface name.
Specifies the VRF name.

Examples
Configuring IPv6 source-interface interface 1/1/1 to use for the TFTP protocol :

switch(config)# ipv6 source-interface tftp interface 1/1/1

Configuring IPv6 source-interface interface 1/1/2 to use for the TFTP protocol on VRF green :

switch(config)# ipv6 source-interface tftp interface 1/1/2 vrf green

Removing IPv6 source-interface interface 1/1/1 configuration for the TFTP protocol:

Source-interface selection commands | 2708

switch(config)# no ipv6 source-interface tftp interface 1/1/1 Removing IPv6 source-interface interface 1/1/2 configuration for the TFTP protocol on VRF green:
switch(config)# no ipv6 source-interface tftp interface 1/1/2 vrf green Configuring source-interface IPv6 1111:2222 to use for the TFTP protocol:
switch(config)# ipv6 source-interface tftp 1111:2222 Configuring source-interface IPv6 1111:3333 to use for TFTP protocol on VRF green :
switch(config)# ipv6 source-interface tftp 1111:3333 vrf green Removing source-interface IPv6 1111:2222 configuration for TFTP protocol:
switch(config)# no ipv6 source-interface tftp 1111:2222 Removing source-interface IPv6 1111:3333 configuration for TFTP protocol on VRF green:
switch(config)# no ipv6 source-interface tftp 1111:3333 vrf green

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13.0001 10.12.1000 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Added the dns protocol parameter. Added central, sftp-scp, dhcp_relay and ssh-client parameters. --
Authority Administrators or local user group members with execution rights for this command.

ipv6 source-interface dns
ipv6 source-interface {dns | all} {interface | X:X::X:X} [vrf <VRF-NAME>] [no] ipv6 source-interface {dns | all} {interface | X:X::X:X} [vrf <VRF-NAME>]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2709

Description
Configures the IPv6 source-interface or source IP for IPv6 DNS clients. The no form of this command removes all configurations.

Parameter <PROTOCOL>
<IPV6-ADDR> vrf <VRF-NAME>

Description
Specifies the protocol to configure. all
Selects all protocols supported by this command. central
Selects Aruba Central. dhcp_relay
Selects DHCP relay. dns
Selects DNS packet source. http
Selects HTTP. ntp
Selects NTP. radius
Selects radius. sftp-scp
Selects SFTP and SCP. sflow
Selects sFLow. ssh-client
Selects SSH Client. syslog
Selects syslog. tacacs
Selects TACACS. tftp
SelectsTFTP. ubt
SelectsUBT.
Specifies the IPv6 address.
Specifies the VRF name.

Examples
Configuring IPv6 source-interface dns :

switch(config)# ipv6 source-interface

all

All protocols

central

Aruba Central protocol

dhcp_relay DHCP_RELAY protocol

dns

DNS protocol

http

HTTP protocol

Source-interface selection commands | 2710

ntp radius sflow sftp-scp ssh-client syslog tacacs tftp

NTP protocol RADIUS protocol sFlow protocol SFTP and SCP protocols SSH Client protocol syslog protocol TACACS protocol TFTP protocol

Configuring IPv6 source -interface dns:

switch(config)# ipv6 source-interface dns X:X::X:X Specify an IPv6 address interface Interface information

Configuring IPv6 source-interface dns on 1: :1:

switch(config)# ipv6 source-interface dns 1::1 vrf VRF Configuration <cr>

Configuring IPv6 source-interface dns on 1: :1: vrf:

switch(config)# ipv6 source-interface dns 1::1 vrf VRF_NAME VRF name

Configuring IPv6 source-interface dns on 1: :1 vrf BLUE

switch(config)# ipv6 source-interface dns 1::1 vrf BLUE switch(config)# ipv6 source-interface dns interface vlan10 vrf VRF Configuration <cr>

Configuring IPv6 source-interface dns on vlan10 vrf BLUE:

switch(config)# ipv6 source-interface dns interface vlan10 vrf BLUE

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13
Command Information

Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2711

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

show ip source-interface
show ip source-interface <PROTOCOL> [vrf <VRF-NAME> | all-vrfs]
Description
Displays the source interface information for all VRFs or a specific VRF. If a VRF is not specified, the default is displayed.

Parameter <PROTOCOL>

Description
Specifies the protocol to show. all
Shows the source interface configuration for all other protocols. central
Shows the source interface configuration for Aruba Central. dhcp relay
Shows the source interface configuration for DHCP relay. dns
Shows the source interface configuration for DNS. ipfix
Selects ipfix. Configures source interface for IPFIX. http
Shows the source interface configuration for HTTP. ntp
Shows the source interface configuration for NTP. ptp
Shows the source interface configuration for PTP. radius
Shows the source interface configuration for radius. sflow
Shows the source interface configuration for sFLow. sftp-scp
Shows source interface configuration for SFTP and SCP. ssh-client
Shows source interface configuration for SSH Client. syslog
Shows the source interface configuration for syslog. tacacs
Shows the source interface configuration for TACACS. tftp
Shows the source interface configuration for TFTP.

Source-interface selection commands | 2712

Parameter
vrf <VRF-NAME> all-vrfs

Description ubt
Shows the source interface configuration for PTP. Specifies the VRF name. Shows the source interface configuration for all VRFs.

Examples
Displaying all source-interface protocol configurations for VRF red:

switch# show ip source-interface all vrf red

Source-interface Configuration Information

---------------------------------------------------------------

Protocol

Src-Interface

Src-IP

VRF

---------------------------------------------------------------

all

1/1/1

red

switch#

Displaying all source-interface protocol configurations for default VRF:

switch# show ip source-interface all

Source-interface Configuration Information

-------------------------------------------------------------------

Protocol

Src-Interface

Src-IP

VRF

-------------------------------------------------------------------

all

1.1.1.1

default

switch#

Displaying all source-interface protocol configurations for all VRFs:

switch# show ip source-interface all all-vrfs

Source-interface Configuration Information

-------------------------------------------------------------------

Protocol

Src-Interface

Src-IP

VRF

-------------------------------------------------------------------

all

2.2.2.2

all-vrfs

all

1.1.1.1

default

all

1/1/1/1

red

switch#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.12.1000 10.07 or earlier

Modification Added central, sftp-scp, and ssh-client parameters. --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2713

Command Information

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show ipv6 source-interface
show ipv6 source-interface <PROTOCOL> [detail] [vrf <VRF-NAME> | all-vrfs]
Description
Displays the IPV6 source interface information configured in the router for all VRFs or a specific VRF. If a VRF is not specified, the default is displayed.

Parameter <PROTOCOL>

Description
Specifies the protocol to show. all
Shows the source interface configuration for all other protocols. central
Shows the source interface configuration for Aruba Central. dhcp_relay
Shows the source interface configuration for DHCP realy. dns
Shows the source interface configuration for DNS. http
Shows the source interface configuration for HTTP. ntp
Shows the source interface configuration for NTP. radius
Shows the source interface configuration for radius. sflow
Shows the source interface configuration for sFLow. sftp-scp
Shows source interface configuration for SFTP and SCP. ssh-client
Shows source interface configuration for SSH Client. ipfix
Selects ipfix. Configures source interface for IPFIX. syslog
Shows the source interface configuration for syslog. tacacs
Shows the source interface configuration for TACACS. tftp
Shows the source interface configuration for TFTP.

Source-interface selection commands | 2714

Parameter vrf <VRF-NAME> all-vrfs

Description Specifies the VRF name. Shows the source interface configuration for all VRF.

Examples
Displaying all IPv6 source-interface protocol configurations for default VRF:

switch# show ipv6 source-interface all

Source-interface Configuration Information

------------------------------------------------------------------

Protocol

Src-Interface

Src-IP

VRF

------------------------------------------------------------------

all

1111::2222

default

switch#

Displaying all IPv6 source-interface protocol configuration for VRF red:

switch# show ipv6 source-interface all vrf red

Source-interface Configuration Information

---------------------------------------------------------------

Protocol

Src-Interface

Src-IP

VRF

---------------------------------------------------------------

all

1/1/1

2005::2

red

switch#

Displaying all IPv6 source-interface protocol configurations for all VRFs:

switch# show ipv6 source-interface all all-vrfs

Source-interface Configuration Information

-------------------------------------------------------------------

Protocol

Src-Interface

Src-IP

VRF

-------------------------------------------------------------------

all

2222::3333

all-vrfs

all

1111::2222

default

all

1/1/1

2::2

red

Displaying all IPv6 source-interface protocol confirgurations for dns all VRFs:

switch# show ipv6 source-interface dns all-vrfs

Source-interface Configuration Information

----------------------------------------------------------------------------------

--

Protocol

Src-Interface

Src-IP

VRF

----------------------------------------------------------------------------------

--

dns

1::3

blue

dns

1::4

default

dns

1::2

red

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2715

Command History
Release 10.13 10.12.1000 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification Added dns parameters. Added central,sftp-scp, and ssh-client parameters. --
Authority Administrators or local user group members with execution rights for this command.

show running-config
show running-config
Description
Displays the current running configuration.
Examples
Displaying the running configuration (only items of interest to source interface selection are shown in this example output command):
Aruba Central is the priority agent. If no command is specified for ip source-interface, Central will choose the command automatically if it is reachable on any of the known ports.

switch# show running-config vrf green ip source-interface tftp interface 1/1/2 vrf green ip source-interface radius interface 1/1/2 vrf green ip source-interface ntp interface 1/1/2 vrf green ip source-interface tacacs interface 1/1/2 vrf green ip source-interface dns interface 1/1/2 vrf green ip source-interface central interface 1/1/2 vrf green ip source-interface all interface 1/1/2 vrf green ipv6 source-interface tftp 2222::3333 vrf green ipv6 source-interface radius 2222::3333 vrf green ipv6 source-interface ntp 2222::3333 vrf green ipv6 source-interface tacacs 2222::3333 vrf green ipv6 source-interface central 2222::3333 vrf green ipv6 source-interface all 2222::3333 vrf green ip source-interface tftp 10.20.3.1 ip source-interface radius 10.20.3.1 ip source-interface ntp 10.20.3.1 ip source-interface tacacs 10.20.3.1 ip source-interface dns 10.20.3.1 ip source-interface central 10.20.3.1 ip source-interface all 10.20.3.1

Source-interface selection commands | 2716

interface 1/1/1 no shutdown ip address 10.20.3.1/24
interface 1/1/2 vrf attach green ip address 20.1.1.1/24 ipv6 address 2222::3333/64
interface 1/1/45 no shutdown ip address 100.1.0.1/24 ipv6 address 1111::2222/64
ip route 100.2.0.0/24 10.20.3.2 switch#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2717

Chapter 145

SSH client commands
ssh (client login)
ssh [<USERNAME>@]{<IPV4> | <HOSTNAME>} [vrf <VRF-NAME>] [port <PORT-NUMBER>]
Description
Establishes a client session with an SSH server which is typically another switch. username, vrf and port number are optional parameters. If a source ip address or source interface is configured for the ssh client protocol, the configuration values are used for establishing the client session with the SSH server.
The source interface can be configured using the IP source interface configuration commands described in the Fundamentals Guide.

Parameter <USERNAME>
<IPV4> <HOSTNAME> vrf <VRF-NAME> port <PORT-NUMBER>

Description
Specifies the username that the client uses to log in to an SSH server. When omitted, the username of the current session is used.
Specifies the SSH server to which the SSH client will connect as an IPv4 address.
Specifies the SSH server to which the SSH client will connect as a host name.
Specifies the VRF to be used for the SSH client session. When omitted, the default VRF named default is used.
Specifies the SSH server TCP port number. When omitted, the default TCP port 22 is used.

Examples
Establishing an SSH client session (using the management VRF) with an SSH server:

switch# ssh admin@10.0.11.180 vrf mgmt

Establishing an SSH client session (using the default VRF and a specific port) with an SSH server:

switch# ssh admin@10.0.11.175 port 223

Configuring a test user on switch 1 and then connecting to switch 1 from switch 2 using the SSH client on the mgmt VRF:

AOS-CX 10.14 Command-Line Interface Guide

2718

** Configuring a test user on switch 1 ** switch(config)# user-group test switch(config-usr-grp-test)# permit cli command ".*" switch(config)# exit switch(config)# user test-user group test password plaintext tst#9J
** On switch 2, connecting to switch 1 using the SSH client ** switch# ssh test-user@10.0.11.177 vrf mgmt

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

| 2719

Chapter 146 SSH client commands

SSH client commands
ssh (client login)
ssh [<USERNAME>@]{<IPV4> | <HOSTNAME>} [vrf <VRF-NAME>] [port <PORT-NUMBER>]
Description
Establishes a client session with an SSH server which is typically another switch. username, vrf and port number are optional parameters. If a source ip address or source interface is configured for the ssh client protocol, the configuration values are used for establishing the client session with the SSH server.
The source interface can be configured using the IP source interface configuration commands described in the Fundamentals Guide.

Parameter <USERNAME>
<IPV4> <HOSTNAME> vrf <VRF-NAME> port <PORT-NUMBER>

Description
Specifies the username that the client uses to log in to an SSH server. When omitted, the username of the current session is used.
Specifies the SSH server to which the SSH client will connect as an IPv4 address.
Specifies the SSH server to which the SSH client will connect as a host name.
Specifies the VRF to be used for the SSH client session. When omitted, the default VRF named default is used.
Specifies the SSH server TCP port number. When omitted, the default TCP port 22 is used.

Examples
Establishing an SSH client session (using the management VRF) with an SSH server:

switch# ssh admin@10.0.11.180 vrf mgmt

Establishing an SSH client session (using the default VRF and a specific port) with an SSH server:

switch# ssh admin@10.0.11.175 port 223

Configuring a test user on switch 1 and then connecting to switch 1 from switch 2 using the SSH client on the mgmt VRF:

AOS-CX 10.14 Command-Line Interface Guide

2720

** Configuring a test user on switch 1 ** switch(config)# user-group test switch(config-usr-grp-test)# permit cli command ".*" switch(config)# exit switch(config)# user test-user group test password plaintext tst#9J
** On switch 2, connecting to switch 1 using the SSH client ** switch# ssh test-user@10.0.11.177 vrf mgmt

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

SSH client commands | 2721

Chapter 147 SSH server commands

SSH server commands

show ssh host-key
show ssh host-key [ecdsa | ed25519 | rsa]
Description
Shows the public host keys for the SSH server. If the key type is not provided, all available host-keys are shown.

Parameter ecdsa ed25519 rsa

Description Selects the ECDSA host-key pair. Selects the ED25519 host-key pair. Selects the RSA host-key pair.

Examples
Showing the ECDSA public host-key:

switch# show ssh host-key ecdsa

Key Type : ECDSA

Curve : ecdsa-sha2-nistp256

ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAhtuv5rABBBGs ... O4mjVFGMVKZ87RWkyrxeQa2fAGZZEp1902K33/k3q17fA4EivRzC75YvjDu8=

Showing all public host keys:

switch# show ssh host-key

Key Type : ECDSA

Curve : ecdsa-sha2-nistp256

ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAhtuv5rABBBGs

...

O4mjVFGMVKZ87RWkyrxeQa2fAGZZEp1902K33/k3q17fA4EivRzC75YvjDu8=

Key Type : ED25519 ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGb6910Jwoe8Hkl9K5YhqijrWI3yovNbiJVq6tw4WjJr4

Key Type : RSA

Key Size : 2048

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdVCXlw43h4n1bwg9jI6DSBMngymCdPD0JUG42Sn9IS

...

nGSXtrNy6OmlFDJTAy+zz5Kd8d21ZLuhf07IHNgF3pff65Xc8qNJBv

For more information on features that use this command, refer to the Security Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide

2722

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show ssh server
show ssh server [vrf <VRF-NAME> | all-vrfs] [vsx-peer]
Description
Shows the SSH server configuration for the specified VRF. Administrators can show the server configuration of all VRFs by using the all-vrfs parameter. If no VRF name is provided in this command, the command shows the SSH server configuration on the default VRF.

Parameter vrf <VRF-NAME> all-vrfs vsx-peer

Description
Specifies the VRF name.
Selects all VRFs.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing the SSH server configuration on the default VRF:

switch# show ssh server

SSH server configuration on VRF default :

IP Version

: IPv4 and IPv6

TCP Port

: 22

Max Auth Attempts :

6

Allow-list

: disabled

SSH Version

: 2.0

Grace Timeout (sec) : 120

Ciphers: chacha20-poly1305@openssh.com, aes128-ctr, aes192-cbc, aes128-cbc, aes192-ctr, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes256-cbc
Host Key Algorithms: ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521,

SSH server commands | 2723

ssh-ed25519, rsa-sha2-256, rsa-sha2-512, ssh-rsa
Key Exchange Algorithms: curve25519-sha256, curve25519-sha256@libssh.org, ecdh-sha2-nistp256,ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512, diffie-hellman-group18-sha512,diffie-hellman-group14-sha256, diffie-hellman-group14-sha1
MACs: hmac-sha1-etm@openssh.com, umac-64@openssh.com, umac-128@openssh.com, hmac-sha2-256,hmac-sha2-512,hmac-sha1
Public Key Algorithms: rsa-sha2-256, rsa-sha2-512ssh-rsa, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, ssh-ed25519, x509v3-rsa2048-sha256, x509v3-ssh-rsa, x509v3-sign-rsa, x509v3-ecdsa-sha2-nistp256, x509v3-ecdsa-sha2-nistp384, x509v3-ecdsa-sha2-nistp521

Showing the SSH server configuration on the management VRF:

switch# show ssh server vrf mgmt

SSH server configuration on VRF mgmt :

IP Version TCP Port Max Auth Attempts

: IPv4 and IPv6 : 22 :6

SSH Version

: 2.0

Grace Timeout (sec) : 120

Ciphers: chacha20-poly1305@openssh.com, aes128-ctr, aes192-cbc, aes128-cbc, aes192-ctr, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes256-cbc

Host Key Algorithms: ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, ssh-ed25519, rsa-sha2-256, rsa-sha2-512, ssh-rsa

Key Exchange Algorithms: curve25519-sha256, curve25519-sha256@libssh.org, ecdh-sha2-nistp256,ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512, diffie-hellman-group18-sha512,diffie-hellman-group14-sha256, diffie-hellman-group14-sha1

MACs: hmac-sha1-etm@openssh.com, umac-64@openssh.com, umac-128@openssh.com, hmac-sha2-256,hmac-sha2-512,hmac-sha1

Public Key Algorithms: rsa-sha2-256, rsa-sha2-512ssh-rsa, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, ssh-ed25519, x509v3-rsa2048-sha256, x509v3-ssh-rsa, x509v3-sign-rsa, x509v3-ecdsa-sha2-nistp256, x509v3-ecdsa-sha2-nistp384,

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2724

Showing the SSH server configuration for all VRFs:

switch# show ssh server all-vrfs

SSH server configuration on VRF default :

IP Version TCP Port Max Auth Attempts

: IPv4 and IPv6 : 22 :6

SSH Version

: 2.0

Grace Timeout (sec) : 120

Ciphers: chacha20-poly1305@openssh.com, aes128-ctr, aes192-cbc, aes128-cbc, aes192-ctr, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes256-cbc

Host Key Algorithms: ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, ssh-ed25519, rsa-sha2-256, rsa-sha2-512, ssh-rsa

Key Exchange Algorithms: curve25519-sha256, curve25519-sha256@libssh.org, ecdh-sha2-nistp256,ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512, diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,

MACs: hmac-sha1-etm@openssh.com, umac-64@openssh.com, umac-128@openssh.com, hmac-sha2-256,hmac-sha2-512,hmac-sha1

Public Key Algorithms: rsa-sha2-256, rsa-sha2-512ssh-rsa, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, ssh-ed25519, x509v3-rsa2048-sha256, x509v3-ssh-rsa, x509v3-sign-rsa, x509v3-ecdsa-sha2-nistp256, x509v3-ecdsa-sha2-nistp384, x509v3-ecdsa-sha2-nistp521

SSH server configuration on VRF mgmt :

IP Version TCP Port Max Auth Attempts

: IPv4 and IPv6 : 22 :6

SSH Version

: 2.0

Grace Timeout (sec) : 120

Ciphers: chacha20-poly1305@openssh.com, aes128-ctr, aes192-cbc, aes128-cbc, aes192-ctr, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes256-cbc

Host Key Algorithms: ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, ssh-ed25519, rsa-sha2-256, rsa-sha2-512, ssh-rsa

Key Exchange Algorithms: curve25519-sha256, curve25519-sha256@libssh.org, ecdh-sha2-nistp256,ecdh-sha2-nistp384, ecdh-sha2-nistp521, diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512, diffie-hellman-group18-sha512,diffie-hellman-group14-sha256, diffie-hellman-group14-sha1

MACs: hmac-sha1-etm@openssh.com, umac-64@openssh.com, umac-128@openssh.com, hmac-sha2-256,hmac-sha2-512,hmac-sha1

SSH server commands | 2725

Public Key Algorithms: rsa-sha2-256, rsa-sha2-512ssh-rsa, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521, ssh-ed25519, x509v3-rsa2048-sha256, x509v3-ssh-rsa, x509v3-sign-rsa, x509v3-ecdsa-sha2-nistp256, x509v3-ecdsa-sha2-nistp384,

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ssh server sessions
show ssh server sessions [vrf <VRF-NAME> | all-vrfs] [vsx-peer]
Description
Shows the active SSH sessions on a specified VRF or on all VRFs. If no VRF is specified, the active sessions on the default VRF are shown.

Parameter vrf <VRF-NAME> all-vrfs vsx-peer

Description
Specifies the VRF name.
Selects all VRFs.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
If you provide the command with a VRF name, the command shows the active SSH session for the specified VRF. Any user can show sessions of all VRFs by using the all-vrfs parameter. The maximum number of sessions per VRF is five. The maximum SSH idle session timeout is 60 seconds.
Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2726

Showing the active SSH sessions on the default VRF:

switch# show ssh server sessions

SSH sessions on VRF default

IPv4 SSH Sessions

Server IP

: 10.1.1.1

Client IP

: 10.1.1.2

Client Port

: 58835

IPv6 SSH Sessions Server IP Client IP Client Port

: FF01:0:0:0:0:0:0:FB : FF01:0:0:0:0:0:0:FC : 58836

Showing the SSH server configuration for all VRFs:

switch# show ssh server sessions all-vrf

SSH sessions on VRF mgmt

IPv4 SSH Sessions

Server IP

: 10.1.1.1

Client IP

: 10.1.1.2

Client Port

: 58835

IPv6 SSH Sessions Server IP Client IP Client Port

: FF01:0:0:0:0:0:0:FB : FF01:0:0:0:0:0:0:FC : 58836

SSH sessions on VRF default

IPv4 SSH Sessions

Server IP

: 20.1.1.1

Client IP

: 20.1.1.2

Client Port

: 58837

IPv6 SSH Sessions Server IP Client IP Client Port

: FF01:0:0:0:0:0:0:FD : FF01:0:0:0:0:0:0:FE : 58838

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

SSH server commands | 2727

ssh ciphers
ssh ciphers <CIPHERS-LIST> no ssh ciphers
Description
Configures SSH to use a set of ciphers in the specified priority order. Ciphers in SSH are used for privacy of data being transported over the connection. The first cipher type entered in the CLI is considered a first priority. Each option is an algorithm that is used to encrypt the link and each name indicates the algorithm and cryptographic parameters that are used. Only ciphers that are entered by the user are configured. The no form of this command removes the configuration of ciphers and reverts SSH to use the default set of ciphers.

Parameter <CIPHERS-LIST>

Description
Valid ciphers: n aes128-cbc n aes192-cbc n aes256-cbc n aes128-ctr n aes192-ctr n aes256-ctr n aes128-gcm@openssh.com n aes256-gcm@openssh.com n chacha20-poly1305@openssh.com
Default set of ciphers in priority order (highest at top): n chacha20-1305@openssh.com n aes128-ctr n aes192-ctr n aes256-ctr n aes128-gcm@openssh.com n aes256-gcUm@openssh.com

Examples
Configuring SSH to use only specified ciphers in the priority order:

switch(config)# ssh ciphers chacha20-poly1305@openssh.com aes256-ctr aes256-cbc

Reverting SSH to use the default set of ciphers:

switch(config)# no ssh ciphers

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2728

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ssh host-key
ssh host-key {ecdsa [ecdsa-sha2-nistp256 | ecdsa-sha2-nistp384 | ecdsa-sha2-nistp521] | ed25519 | rsa [bits {2048 | 4096}] }
Description
Generates an SSH host-key pair.

Parameter ecdsa
ed25519 rsa

Description
Selects the ECDSA host-key pair type as ecdsa-sha2-nistp256 (the default), ecdsa-sha2-nistp384, or ecdsa-sha2-nistp521.
Selects the ED25519 host-key pair.
Selects the RSA host-key pair. Optionally, the key bit length is selected with either bits 2048 (the default) or bits 4096.

Usage
When an SSH server is enabled on a VRF for the first time, host-keys are generated. If the host-key of the given type exists, a warning message is displayed with a request to overwrite the previous host-key with the new key.
Examples
Overwriting an old ECDSA host-key with a new ecdsa-sha2-nistp384 host-key:

switch(config)# ssh host-key ecdsa ecdsa-sha2-nistp384 ecdsa host-key will be overwritten. Do you want to continue (y/n)?

Overwriting an old RSA host-key with a new RSA host-key with 2048 bits:

switch(config)# ssh host-key rsa bits 2048 rsa host-key will be overwritten. Do you want to continue (y/n)?

Overwriting an ECDSA host-key with an ED25519 host-key pair:

SSH server commands | 2729

switch(config)# ssh host-key ed25519 ed25519 host-key will be overwritten. Do you want to continue (y/n)?

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ssh host-key-algorithms
ssh host-key-algorithms <HOST-KEY-ALGORITHMS-LIST> no ssh host-key-algorithms
Description
Configures SSH to use a set of host key algorithms in the specified priority order. Host key algorithms specify which host key types are allowed to be used for the SSH connection. The first host key entered in the CLI is considered a first priority. Each option represents a type of key that can be used. Host keys are used to verify the host that you are connecting to. This configuration allows you to control which host key types are presented to incoming clients, or which host key types to receive first from hosts. Only the host key algorithms that are specified by the user are configured. The no form of this command removes the configuration of host key algorithms and reverts SSH to use the default set of algorithms.

Parameter <HOST-KEY-ALGORITHMS-LIST>

Description
Default set of public key algorithms in priority order (highest at top), comprised of all possible valid algorithms: n ecdsa-sha2-nistp256 n ecdsa-sha2-nistp384 n ecdsa-sha2-nistp521 n ssh-ed25519 n rsa-sha2-256 n rsa-sha2-512 n ssh-rsa

Examples
Configuring SSH to use only specified host key algorithms:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2730

switch(config)# ssh host-key-algorithms ssh-rsa ssh-ed25519 ecdsa-sha2-nistp521 Reverting SSH to use the default set of host key algorithms:
switch(config)# no host-key-algorithms

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ssh key-exchange-algorithms
ssh key-exchange-algorithms <KEY-EXCHANGE-ALGORITHMS-LIST> no ssh key-exchange-algorithms
Description
Configures SSH to use a set of key exchange algorithm types in the specified priority order. The first key exchange type entered in the CLI is considered a first priority. Key exchange algorithms are used to exchange a shared session key with a peer securely. Each option represents an algorithm that is used to distribute a shared key in a way that prevents outside interference, manipulation, or recovery. Only the key exchange algorithms that are specified by the user are configured. The no form of this command removes the configuration of key exchange algorithms and reverts SSH to use the default set of algorithms.

Parameter <KEY-EXCHANGE-ALGORITHMS-LIST>

Description
Valid key exchange algorithms: n curve25519-sha256 n curve25519-sha256@libssh.org n diffie-hellman-group-exchange-sha1 n diffie-hellman-group-exchange-sha256 n diffie-hellman-group14-sha1 n diffie-hellman-group14-sha256 n diffie-hellman-group16-sha512 n diffie-hellman-group18-sha512 n ecdh-sha2-nistp256

SSH server commands | 2731

Parameter

Description
n ecdh-sha2-nistp384 n ecdh-sha2-nistp521
Default set of key exchange algorithms in priority order (highest at top): n curve25519-sha256 n curve25519-sha256@libssh.org n ecdh-sha2-nistp256 n ecdh-sha2-nistp384 n ecdh-sha2-nistp521 n diffie-hellman-group-exchange-sha256 n diffie-hellman-group16-sha512 n diffie-hellman-group18-sha512 n diffie-hellman-group14-sha256 n diffie-hellman-group-exchange-sha1

Examples
Configuring SSH to use a set of specified key exchange algorithms:

switch(config)# ssh key-exchange-algorithms ecdh-sha2-nistp256 curve25519-sha256 diffie-hellman-group-exchange-sha256

Reverting SSH to use the default set of key-exchange-algorithms:

switch(config)# no key-exchange-algorithms

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ssh known-host remove
ssh known-host remove {all | {<IPv4-ADDRESS> | <HOSTNAME> | <IPv6-ADDRESS>} }
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2732

Clears the list of trusted SSH servers for your user account. When you download or upload a file to or from a server using SFTP, you establish a trusted SSH relationship with that server. Each user account maintains its own set of SSH server host-keys for every server to which the user previously connected.

Parameter all <IPv4-ADDRESS> <HOSTNAME>
<IPv6-ADDRESS>

Description Clears the trusted servers list. Specifies the IPv4 address of the remote device. Specifies the host name of the remote device. Range: up to 255 characters. Specifies the IPv6 address of the remote device.

Examples
Clearing the trusted server list:

switch(config)# ssh known-host remove all

Removing a specified server from the trusted server list:

switch(config)# ssh known-host remove 1.1.1.1

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ssh macs
ssh macs <MACS-LIST> no ssh macs
Description
Configures SSH to use a set of message authentication codes (MACs) in the specified priority order. The first MAC entered in the CLI is considered a first priority. MACs maintain the integrity of each message sent across an SSH connection. Each option represents an algorithm that can be used to provide integrity between peers. Only the MAC types that are specified by the user are configured.

SSH server commands | 2733

The no form of this command removes the configuration of MACs and reverts SSH to use the default set of MACs.

Parameter <MACS-LIST>

Description
Valid MACs: n hmac-sha1 n hmac-sha1-96 n hmac-sha1-etm@openssh.com n hmac-sha2-256 n hmac-sha2-512 n hmac-sha2-256-etm@openssh.com n hmac-sha2-512-etm@openssh.com
Default set of MACs in priority order (highest at top): n hmac-sha2-256-etm@openssh.com n hmac-sha2-512-etm@openssh.com n hmac-sha1-etm@openssh.com n hmac-sha2-256 n hmac-sha2-512 n hmac-sha1

Examples
Configuring SSH to use a set of specified MACs:

switch(config)# ssh macs hmac-sha2-256 hmac-sha2-512

Reverting SSH to use the default set of MACs:

switch(config)# no ssh macs

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ssh maximum-auth-attempts

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2734

ssh maximum-auth-attempts <ATTEMPTS> no maximum-auth-attempts
Description
Sets the SSH maximum number of authentication attempts. The no form of the command resets the maximum to its default of 6.

Parameter <ATTEMPTS>

Description
Specifies the maximum number of SSH authentication attempts. Range: 1 to 10. Default: 6.

Examples
Setting the maximum number of authentication attempts:

switch(config)# ssh maximum-auth-attempts 3

Resetting the maximum number of authentication attempts to its default of 6:

switch(config)# no maximum-auth-attempts

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ssh public-key-algorithms
ssh public-key-algorithms <PUBLIC-KEY-ALGORITHMS-LIST> no ssh public-key-algorithms
Description
Configures SSH to use a set of public key algorithms in the specified priority order. The first public key type entered in the CLI is considered a first priority. Public key algorithms specify which public key types can be used for public key authentication in SSH. Each option represents a public key type that the SSH server can accept or that the SSH client can present to a server. Only the public key algorithms that are chosen by the user are configured.

SSH server commands | 2735

The no form of this command removes the configuration of public key algorithms and reverts SSH to use the default set.

Parameter <PUBLIC-KEY-ALGORITHMS-LIST>

Description
Default set of public key algorithms in priority order (highest at top), comprised of all possible valid algorithms: n rsa-sha2-256 n rsa-sha2-512 n ssh-rsa n ecdsa-sha2-nistp256 n ecdsa-sha2-nistp384 n ecdsa-sha2-nistp521 n ssh-ed25519 n x509v3-rsa2048-sha256 n x509v3-ssh-rsa n x509v3-sign-rsa n x509v3-ecdsa-sha2-nistp256 n x509v3-ecdsa-sha2-nistp384 n x509v3-ecdsa-sha2-nistp521

Examples
Configuring SSH to use a set of specified public key algorithms:

switch(config)# ssh public-key-algorithms x509v3-ssh-rsa ssh-rsa rsa-sha2-256

Reverting SSH to use the default set of public key algorithms:

switch(config)# no ssh public-key-algorithms

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ssh server allow-list
ssh server allow-list ip <ipv4-addr>[mask]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2736

ipv6 <ipv6-addr>[mask] enable no
Description
Configure a list of addresses that will be the only hosts allowed to connect to the SSH servers running on all VRFs of the switch. By default, the allow-list is disabled and any host is allowed to connect given the correct authentication criteria. When the allow-list is enabled, only the hosts that fall under one of the entries may connect with the correct authentication criteria, all other hosts will be denied to attempt authentication.

Parameter ip <ipv4-addr>[mask]
ipv6 <iv6p-addr>[mask]
enable no ...

Description
An allowed host IP address and (optional) subnet in any of the following formats: n A.B.C.D: An allowed IPv4 address n A.B.C.D/M: An allowed IPv4 subnet with prefix length n A.B.C.D W.X.Y.Z: An allowed IPv4 address with network mask n A.B.C.D/W.X.Y.Z: An allowed IPv4 address with network mask
An allowed host IPv6 address and (optional) subnet in any of the following formats: n X:X::X:X: An allowed IPv6 address n X:X::X:X/M: An allowed IPv6 subnet
Enable the allow-list.
Negate a command or set its default.

Usage
The allow-list can contain up to 20 entries of IPv4 or IPv6 addresses, including entire subnets. The order in which the entries are added to the list does not matter. The configuration will only take effect once the allow-list is enabled by issuing the enable command in the the config-ssh-al (ssh server allow-list) context.
When the allow-list is enabled, SSH servers on all VRFs will restart and all active SSH sessions will be terminated. The enabled allow-list may be modified to remove existing entries or add new entries, and each of those modifications will trigger an SSH server restart for all VRFs and will terminate all active SSH sessions, which may include the current user if they are connected via SSH. If you disable the allowlist before making changes and enabling the allow-list again once the changes are made, any host will be allowed to connect during the modification period before the allow-list is re-enabled. When the allow-list is disabled, the SSH servers on all VRFs will restart and active SSH sessions will persist.

Every SSH allow-list ends with an implicit deny all rule. When you add entries to an allow list, take care to avoid blocking connectivity to the SSH server. If an SSH allow-list is enabled with no entries configured, the deny all functionality will block all addresses, and the SSH server will be unusable.

Examples
Configuring and enabling an SSH server allow list

SSH server commands | 2737

switch(config)# ssh server allow-list switch(config-ssh-al)# 1.1.1.1 switch(config-ssh-al)# enable Active SSH sessions will be terminated. Do you want to continue (y/n)?

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.12

Modification Command introduced

Command Information

Platforms All platforms

Command context config and config-ssh-al contexts

Authority
Administrators or local user group members with execution rights for this command.

ssh server port
ssh server port <PORT-NUMBER> no ssh server port [<PORT-NUMBER>]
Description
Configures SSH server to listen on a particular TCP port number. The default value is 22. This port will be used for all VRFs that have SSH server enabled.

Configuring the TCP port number restarts the SSH server and terminates all active SSH sessions. It may take a few seconds for the SSH sessions to reach the running state on some VRFs.
The no form of the command resets the TCP port number to the default, 22.

Parameter <PORT-NUMBER>

Description Specifies the TCP port number. Range: 1 to 65535. Default: 22.

Examples
Configuring TCP port number 19222: switch(config)# ssh server port 19222
Resetting the TCP port number to the default, 22:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2738

switch(config)# no ssh server port

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11.1000

Command Information

Platforms All platforms

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

ssh server vrf
ssh server vrf <VRF-NAME> no ssh server vrf <VRF-NAME>
Description
Enables the SSH server on the specified VRF. SSH is disabled by default and will not be operational till the admin password is set on the switch. Note that the admin password is considered set even if it is configured to be empty. The no form of the command disables the SSH server on the specified VRF. If no VRF is specified, by default the SSH server will be enabled on the default or mgmt VRF, depending on the switch model.

Parameter vrf <VRF-NAME>

Description Specifies the VRF name.

Examples
Enabling the SSH server on the management VRF:

switch(config)# ssh server vrf mgmt

Disabling the SSH server on the management VRF:

switch(config)# no ssh server vrf mgmt

For more information on features that use this command, refer to the Security Guide for your switch model.
Command History

SSH server commands | 2739

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2740

Chapter 148 Static routing commands

Static routing commands
ip route
ip route <DEST-IPV4-ADDR>/<NETMASK> {<NEXTHOP-ADDR> | <NEXTHOP-PORT-LAG-VLAN> | reject | nullroute}
no ip route <DEST-IPV4-ADDR>/<NETMASK> {<NEXTHOP-ADDR> | <NEXTHOP-PORT-LAG-VLAN> | reject |
nullroute}
Description
Adds an IPv4 static route on the default VRF. The no form of this command deletes a IPv4 static route.
You can configure a maximum of 32 next hops per route.

Parameter <DEST-IPV4-ADDR>/<NETMASK> <NEXTHOP-ADDR>
<NEXTHOP-PORT-LAG-VLAN> nullroute
reject

Description
Specifies the IPv4 route destination.
Specifies the next hop address for reaching the destination in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the next hop as an outgoing interface.
Specifies that packets matching the destination route are silently discarded and no ICMP error notification is sent to the sender.
Specifies that packets matching the destination route are discarded and an ICMP error notification is sent to the sender.

Examples
On the 6400 Switch Series, interface identification differs.

switch(config)# ip route 10.0.0.0/24 nullroute switch(config)# ip route 10.0.1.0/24 reject switch(config)# ip route 10.0.2.0/24 20.0.0.2 switch(config)# ip route 10.0.3.0/24 1/1/1 switch(config)# ip route 10.0.3.0/24 1/1/1.110

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide

2741

Release 10.10 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Inclusive language update. --
Authority Administrators or local user group members with execution rights for this command.

ip route bfd
ip route <DEST-IPV4-ADDR>/<NETMASK> [<NEXT-HOP-IP-ADDR> | <INTERFACE>] [bfd] no ip route <DEST-IPV4-ADDR>/<NETMASK> [<NEXT-HOP-IP-ADDR> | <INTERFACE>] [bfd]
Description
Enables or disables BFD on the specified static route. To disable BFD, issue the command without the bfd option.

Parameter <DEST-IPV4-ADDR> <NETMASK> <NEXT-HOP-IP-ADDR> <INTERFACE> bfd

Description
Specifies a route destination in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the next hop address for reaching the destination in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the next hop as an outgoing interface.
Enables BFD on the static route. Omit this parameter to disable BFD.

Examples
On the 6400 Switch Series, interface identification differs. Enabling BFD on a static route:

switch(config)# interface 1/1/1 switch(config-if)# ip address 20.1.1.2/24 switch(config-if)# no shutdown switch(config-if)# routing switch(config-if)# exit switch(config)# ip route 192.0.0.0/8 20.1.1.1 bfd

Disabling BFD on a static route:

Static routing commands | 2742

switch(config)# ip route 192.0.0.0/8 20.1.1.1

For more information on features that use this command, refer to the High Availability Guide or IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip route distance
ip route <DEST-IPV4-ADDR>/<NETMASK> [<NEXT-HOP-IP-ADDR>|<INTERFACE>] distance <VALUE> no ip route <DEST-IPV4-ADDR>/<NETMASK> [<NEXT-HOP-IP-ADDR>|<INTERFACE>] distance <VALUE>
Description
Configures the administrative distance for the IPv4 static route. The no form of this command deletes the static route.

Parameter <DEST-IPV4-ADDR>> <MASK> <NEXT-HOP-IP-ADDR> <INTERFACE> distance <VALUE>

Description
Specifies an IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 32.
Specifies the next hop IPv4 address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the next hop as an outgoing interface.
Specifies the administrative distance to associate with this static route. Default: 1. Range: 1-255.

Examples

switch(config)# ip route 10.0.2.0/24 20.0.0.2 distance 4 switch(config)# ip route 10.0.3.0/24 1/1/1 distance 6

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2743

switch(config)# no ip route 10.0.3.0/24 1/1/1 distance 6

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip route tag
ip route <DEST-IPV4-ADDR>/<NETMASK> {<NEXTHOP-ADDR> | <NEXTHOP-PORT-LAG-VLAN> | reject | nullroute} [tag] <1-4294967295>
no ip route <DEST-IPV4-ADDR>/<NETMASK> {<NEXTHOP-ADDR> | <NEXTHOP-PORT-LAG-VLAN> | reject |
nullroute} [tag] <1-4294967295>
Description
Configures tag for IPv4 static route. The no form of this command deletes tag for IPv4 static route.

Parameter <DEST-IPV4-ADDR>/<NETMASK> <NEXTHOP-ADDR>
<NEXTHOP-PORT-LAG-VLAN> reject
nullroute
tag

Description
Specifies the IPv4 route destination.
Specifies the next hop address for reaching the destination in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the next hop as an outgoing interface.
Specifies that packets matching the destination route are discarded and an ICMP error notification is sent to the sender.
Specifies that packets matching the destination route are silently discarded and no ICMP error notification is sent to the sender.
Specifies and assigns tag for the route.

Examples

switch(config)# ip route 10.1.1.1/32 20.1.1.2 tag 10

Static routing commands | 2744

switch(config)# ip route 10.1.1.5/32 1/1/1 tag 20
switch(config)# no ip route 10.1.1.1/32 20.1.1.2 tag 10 switch(config)# no route 10.1.1.5/32 1/1/1 tag 20

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.10 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Inclusive language update. --
Authority Administrators or local user group members with execution rights for this command.

ip route vrf
ip route <DEST-IPV4-ADDR>/<MASK> [<NEXT-HOP-IP-ADDR>|<INTERFACE>|reject|nullroute] vrf <VRF-NAME>
no ip route <DEST-IPV4-ADDR>/<MASK> [<NEXT-HOP-IP-ADDR>|<INTERFACE>|reject|nullroute] vrf <VRF-NAME>
Description
Adds the destination IPv4 static route on the specified VRF. If no <VRF-NAME> is specified the route is applied to the default VRF. The no form of this command removes the IPv4 static route from the VRF.

Parameter <DEST-IPV6-ADDR> <MASK> <NEXT-HOP-IP-ADDR> <INTERFACE> nullroute

Description
Specifies the route destination in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the next hop in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the next hop as an outgoing interface.
Silently discards packets to the destined route.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2745

Parameter reject
vrf <VRF-NAME>

Description
Discards packets to the destined route and returns an ICMP error to the sender.
Specifies a VRF name.

Examples

switch(config)# ip route 20.0.0.0/8 10.20.30.44 vrf myvrf switch(config)# ip route 20.1.2.0/24 1/1/30 vrf myvrf switch(config)# ip route 1.2.3.4/32 nullroute vrf myvrf switch(config)# ip route 1.2.3.4/32 reject vrf myvrf

switch(config)# no ip route 20.0.0.0/8 10.20.30.44 vrf myvrf

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.10 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Inclusive language update. --
Authority Administrators or local user group members with execution rights for this command.

ipv6 route
ipv6 route <DEST-IPV6-ADDR>/<NETMASK> {<NEXTHOP-ADDR> | <NEXTHOP-PORT-LAG-VLAN> | reject | nullroute} no ipv6 route <DEST-IPV6-ADDR>/<NETMASK> {<NEXTHOP-ADDR> | <NEXTHOP-PORT-LAG-VLAN> |
reject | nullroute}
Description
Adds an IPv6 static route. The no form of this command deletes an IPv6 static route on the default VRF.

Parameter <DEST-IPV6-ADDR>

Description
Specifies the route destination in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a

Static routing commands | 2746

Parameter
<NETMASK> <NEXTHOP-ADDR>
<NEXTHOP-PORT-LAG-VLAN> reject nullroute

Description
hexadecimal number from 0 to F.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the next hop in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the next hop as an outgoing interface.
Specifies that packets matching the destination route are discarded and an ICMP error notification is sent to the sender.
Specifies that packets matching the destination route are silently discarded and no ICMP error notification is sent to the sender.

Usage
On the 6200, 6300, 6400, 8100, and 8360 switch series, a limited number of IPv6 routes with prefixes from 65-127 can be programmed in the ASIC; this allows for hardware/line-rate forwarding for traffic that matches these routes. Any additional IPv6 routes are software forwarded. (Routing performance to destination addresses on these networks may be impacted.) Use the show capacities l3-resources command to see the maximum number of IPv6 routes with these prefix lengths that can be configured in the ASIC. These prefixes are recommended for transit network use only. Refer to show capacities in the ACLs and Classifiers Policy Guide to see the maximum number of IPv6 routes with prefixes 65-127 that can be configured on the ASIC. Refer to show capacities-status in the ACLs and Classifiers Policy Guide to see the maximum number and current consumption.
This limited hardware support for long prefix IPv6 routes applies whether the routes are configured statically or learned dynamically.

Examples
On the 6400 Switch Series, interface identification differs.
switch(config)# ipv6 route 120::/124 nullroute switch(config)# ipv6 route 121::/124 nullroute switch(config)# ipv6 route 122::/124 1/1/1 switch(config)# ipv6 route 122::/124 1/1/1.110

switch(config)# no ipv6 route 122::/124 1/1/1.110

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2747

Release 10.10 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Inclusive language update. --
Authority Administrators or local user group members with execution rights for this command.

ipv6 route distance
ipv6 route <DEST-IPV6-ADDR>/<MASK> [<NEXT-HOP-IP-ADDR>|<INTERFACE>] distance <VALUE> no ipv6 route <DEST-IPV6-ADDR>/<MASK> [<NEXT-HOP-IP-ADDR>|<INTERFACE>] distance <VALUE>
Description
Configures the administrative distance for the IPv6 static route The no form of this command deletes the static route.

Parameter <DEST-IPV6-ADDR>
<MASK> <NEXT-HOP-IP-ADDR>
<INTERFACE> distance <VALUE>

Description
Specifies the route destination address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the next hop in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the next hop as an outgoing interface.
Specifies the administrative distance to associate with this static route. Range: 1 to 255. Default: 1.

Examples
On the 6400 Switch Series, interface identification differs.

switch(config)# ipv6 route 122::/124 1/1/1 distance 5 switch(config)# ipv6 route 123::/124 120::1 distance 6

switch(config)# no ipv6 route 123::/124 120::1 distance 6

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Static routing commands | 2748

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ipv6 route tag
ipv6 route <DEST-IPV6-ADDR>/<NETMASK> {<NEXTHOP-ADDR> | <NEXTHOP-PORT-LAG-VLAN> | reject |
nullroute} [tag] <1-4294967295> no ipv6 route <DEST-IPV6-ADDR>/<NETMASK> {<NEXTHOP-ADDR> | <NEXTHOP-PORT-LAG-VLAN> |
reject | nullroute} [tag] <1-4294967295>
Description
Configures tag for IPv6 static route.

Parameter <DEST-IPV6-ADDR>
<NETMASK> <NEXTHOP-ADDR>
<NEXTHOP-PORT-LAG-VLAN> reject nullroute tag

Description
Specifies the route destination in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the next hop in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the next hop as an outgoing interface.
Specifies that packets matching the destination route are discarded and an ICMP error notification is sent to the sender.
Specifies that packets matching the destination route are silently discarded and no ICMP error notification is sent to the sender.
Specifies and assigns tag for the route.

Examples

switch(config)# ipv6 route 3001::1/128 1/1/1 tag 10 switch(config)# ipv6 route 3002::1/128 1000::2 tag 20

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2749

switch(config)# no ipv6 route 3001::1/128 1/1/1 tag 10 switch(config)# no ipv6 route 3002::1/128 1000::2 tag 20

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.10 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Inclusive language update. --
Authority Administrators or local user group members with execution rights for this command.

show ip rib
show ip rib <FILTER> [vrf <VRF-NAME>]
Description
Shows the IPv4 Routing Information Base (RIB) of VRF with name (<VRF-NAME>). If VRF name is not specified, default VRF routes are displayed.

Parameter <FILTER> vrf <VRF-NAME>

Description Selects filter, see Usage section. Specifies the VRF name.

Usage
There are sub-options available within this command:
n A.B.C.D: Shows longest prefix match. n A.B.C.D/M: Shows exact route match. n all-vrfs: Shows all VRF information. n bgp: Shows BGP routes only. n connected: Shows connected routes only. n connected: Shows connected routes only. n local: Shows local routes only. n ospf: Shows OSPF routes only. n rip: Shows RIP routes only. n static: Shows static routes only.

Static routing commands | 2750

n summary: Shows aggregate count of routes per routing protocol. n vrf: Specifies the VRF name. n selected: Shows routes selected for forwarding only. n non-selected: Shows routes not selected for forwarding only.
The output of the show ip rib commands are not available in information generated by the show tech files command. This information is now available in the file ipv4_rib_dump.gz, which can be generated using the command sudo ovs-appctl -t hpe-routing hpe-metaswitch/show_ip_rib ipv4 all-vrfs.
Examples
Showing IPv4 routes in RIB for 8325, 10000, 8360, and 9300 switch series:

switch# show ip rib Origin Codes: R ­ RIP, O ­ OSPFv2, B - BGP
C - connected, S - static, H - host-routes Type Codes: E ­ External BGP, I ­ Internal BGP, IA - OSPF inter area
E1 - OSPF external type 1, E2 - OSPF external type 2 * indicates selected for forwarding

VRF: default

Prefix

Nexthop

Interface VRF

Origin/ Distance/ Age

Type Metric

----------------------------------------------------------------------------------

--

*1.1.1.1/32

-

1/1/33

-

H

[1/0]

00h:00m:07s

*10.0.0.0/30 -

1/1/1

-

S

[20/0]

0d:10h:01m:41s

*10.0.1.0/30 -

1/1/1

-

B/I [200/0]

2d:20h:01m:42s

*10.1.64.0/18 -

loopback2 -

C

[0/0]

-

*10.2.64.0/18 10.0.0.3

lag1

-

O/E1 [110/25]

1d:05h:03m:43s

*10.2.64.0/18 20.10.0.1 vlan100

-

O/E1 [110/25]

0d:05h:03m:43s

*20.1.2.3/32 2.2.2.2

1/1/4

vrf_red B/E [20/0]

2d:10h:01m:45s

*30.1.3.0/24 -

reject

-

S

[1/0]

33d:10h:01m:43s

*50.10.13.0/24 -

reject

-

S

[1/0]

12d:10h:01m:44s

*61.1.1.2/32 4.4.4.4

1/1/5

-

B/I [200/0]

1d:11h:01m:45s

*62.1.1.3/32 5.5.5.5

1/1/6

-

B/I [200/0]

0d:12h:01m:45s

*193.0.0.2/32 50.0.0.2

1/1/2

-

S

[1/0]

0d:04h:01m:43s

193.0.0.2/32 56.0.0.3

1/1/3

-

O/E1 [110/25]

0d:04h:03m:43s

Total Route Count : 14

Showing IPv4 routes in RIB for all other switches:

switch# show ip rib Origin Codes: R ­ RIP, O ­ OSPFv2, B - BGP
C - connected, S - static, D - DHCP

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2751

Type Codes: E ­ External BGP, I ­ Internal BGP, IA - OSPF inter area E1 - OSPF external type 1, E2 - OSPF external type 2
* indicates selected for forwarding

VRF: default

Prefix

Nexthop

Interface VRF

Origin/ Distance/ Age

Type Metric

----------------------------------------------------------------------------------

--

*1.1.1.1/32

-

1/1/33

-

H

[1/0]

00h:00m:07s

*10.0.0.0/30 -

1/1/1

-

S

[20/0]

0d:10h:01m:41s

*10.0.1.0/30 -

1/1/1

-

B/I [200/0]

2d:20h:01m:42s

*10.1.64.0/18 -

loopback2 -

C

[0/0]

-

*10.2.64.0/18 10.0.0.3

lag1

-

O/E1 [110/25]

1d:05h:03m:43s

*10.2.64.0/18 20.10.0.1 vlan100

-

O/E1 [110/25]

0d:05h:03m:43s

*20.1.2.3/32 2.2.2.2

1/1/4

vrf_red B/E [20/0]

2d:10h:01m:45s

*30.1.3.0/24 -

reject

-

S

[1/0]

33d:10h:01m:43s

*50.10.13.0/24 -

reject

-

S

[1/0]

12d:10h:01m:44s

*61.1.1.2/32 4.4.4.4

1/1/5

-

B/I [200/0]

1d:11h:01m:45s

*62.1.1.3/32 5.5.5.5

1/1/6

-

B/I [200/0]

0d:12h:01m:45s

*193.0.0.2/32 50.0.0.2

1/1/2

-

S

[1/0]

0d:04h:01m:43s

193.0.0.2/32 56.0.0.3

1/1/3

-

O/E1 [110/25]

0d:04h:03m:43s

Total Route Count : 14

Showing IPv4 exact route match in RIB:

switch# show ip rib 10.0.0.0/30

VRF : default

Prefix Nexthop Origin Distance Age Selected

: 10.0.0.0/30 :: Connected :0 :: Yes

VRF(egress)

:-

Interface

: 1/1/1

Type

:-

Metric

:0

Tag

:0

Recursive Nexthop : No

Showing IPv4 RIB summary:

switch# show ip rib summary

IPv4 RIB Table Summary

VRF name : Protocol

default RIB Routes

Static routing commands | 2752

-------------- -------------

connected

1010

local

1011

static

4

ospfv2

509

bgp

9014

selected

10008

non-selected 1518

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show ipv6 rib
show ipv6 rib <FILTER> [vrf <VRF-NAME>]
Description
Shows the IPv6 Routing Information Base (RIB) of VRF with name (<VRF-NAME>). If VRF name is not specified, default VRF routes are displayed.

Parameter <FILTER> vrf <VRF-NAME>

Description Selects filter, see usage section. Shows routes in the VRF and specifies VRF name.

Usage
There are sub-options available within this command:
n X:X: :X:X: Shows longest prefix match. n X:X: :X:X/M: Shows exact route match. n all-vrfs: Shows all VRF information. n bgp: Shows BGP routes only. n connected: Shows connected routes only. n local: Shows local routes only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2753

n ospf: Shows OSPF routes only. n rip: Shows RIP routes only. n static: Shows static routes only. n summary: Shows aggregate count of routes per routing protocol. n vrf: Specifies the VRF name. n selected: Shows routes selected for forwarding only. n non-selected: Shows routes not selected for forwarding only.
Examples
Showing IPv6 routes in RIB for 8325, 10000, 8360, and 9300 switch series:

switch# show ipv6 rib Origin Codes: R ­ RIPng, O ­ OSPFv3, B - BGP
C - connected, S - static, H - host-routes Type Codes: E ­ External BGP, I ­ Internal BGP, IA - OSPF inter area
E1 - OSPF external type 1, E2 - OSPF external type 2 * indicates selected for forwarding

VRF: default

Prefix

Nexthop

Interface VRF Origin/ Distance/ Age

Type Metric

----------------------------------------------------------------------------------

--

*1::2/128

1::2

1/1/1

-

H

[1/0]

00h:00m:06s

*1000::/64

-

1/1/1

-

C

[0/0]

-

*1000::8/128

-

1/1/1

-

L

[0/0]

-

*1001:db8::/32

1000::10 1/1/1

-

B/I [200/0] 1d:20h:01m:42s

*2000::/64

fe80::3182 vlan100 -

S

[1/0]

2d:05h:03m:43s

2000::/64

fe80::1241 1/1/1

-

O/E1 [110/25] 0d:05h:03m:43s

*2000::2000:0:0:0/67 fe80::1111 lag1

Green B/E [20/0] 1d:10h:01m:45s

*3001::0/64

-

vlan100 -

C

[0/0]

-

*3001::1/128

-

vlan100 -

L

[0/0]

-

*6101::0/64

-

nullroute -

S

[1/0]

12d:10h:01m:43s

Total Route Count : 10

Showing IPv6 routes in RIB for the other switch series:

switch# show ipv6 rib Origin Codes: R ­ RIPng, O ­ OSPFv3, B - BGP
C - connected, S - static, D- DHCP Type Codes: E ­ External BGP, I ­ Internal BGP, IA - OSPF inter area
E1 - OSPF external type 1, E2 - OSPF external type 2 * indicates selected for forwarding

VRF: default

Prefix

Nexthop

Interface VRF Origin/ Distance/ Age

Type Metric

----------------------------------------------------------------------------------

--

*1000::/64

-

1/1/1

-

C

[0/0]

-

*1000::8/128

-

1/1/1

-

L

[0/0]

-

*1001:db8::/32

1000::10 1/1/1

-

B/I [200/0] 1d:20h:01m:42s

Static routing commands | 2754

*2000::/64

fe80::3182

2000::/64

fe80::1241

*2000::2000:0:0:0/67 fe80::1111

*3001::0/64

-

*3001::1/128

-

*6101::0/64

-

12d:10h:01m:43s

vlan100 1/1/1 lag1 vlan100 vlan100 nullroute

Green -

S O/E1 B/E C L S

[1/0] [110/25] [20/0] [0/0] [0/0] [1/0]

2d:05h:03m:43s 0d:05h:03m:43s 1d:10h:01m:45s -

Total Route Count : 10

Showing IPv6 exact route match in RIB:

switch# show ipv6 rib 2000::2000:0:0:0

VRF : default

Prefix Nexthop Origin Distance Age Selected

: 2000::2000:0:0:0/67 : fe80::1111 : BGP : 20 : 1d:10h:01m:45s : Yes

Showing IPv6 RIB summary:

switch# show ipv6 rib summary

IPv6 RIB Table Summary

VRF name : default

Protocol

RIB Routes

-------------- -------------

connected

1009

local

1010

static

3

ospfv3

508

bgp

1013

selected

10004

non-selected 1527

VRF(egress)

: Green

Interface

: lag1

Type

: External

Metric

:0

Tag

: 20

Recursive Nexthop : Yes

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.10 10.07 or earlier
Command Information

Modification Inclusive language update. --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2755

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

ipv6 route vrf
ipv6 route <DEST-IPV6-ADDR>/<PREFIX> [<NEXT-HOP-IP-ADDR>|<INTERFACE>|reject|nullroute] vrf <VRF-NAME> no ipv6 route <DEST-IPV6-ADDR>/<PREFIX> [<NEXT-HOP-IP-ADDR>|<INTERFACE>|reject|nullroute] vrf <VRF-NAME>
Description
Adds an IPv6 static route in the specified VRF. If no <VRF-NAME> is specified it is added to the default VRF. The no form of this command removes an IPv6 static route from the VRF.

Parameter <DEST-IPV6-ADDR>
<MASK> <NEXT-HOP-IP-ADDR>
<INTERFACE> nullroute reject vrf <VRF-NAME>

Description
Specifies an IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the next hop in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the next hop as an outgoing interface.
Specifies that packets matching the destination prefix are silently discarded and no ICMP error notification is sent to the sender.
Specifies that packets matching the destination prefix are discarded and an ICMP error notification is sent to the sender.
Specifies the name of a VRF. Default: default.

Examples

switch(config)# ipv6 route 120::/124 121::2 vrf test switch(config)# ipv6 route 121::/124 1/1/9 vrf test switch(config)# ipv6 route 122::/124 nullroute vrf test switch(config)# ipv6 route 123::/124 reject vrf test

switch(config)# no ipv6 route 120::/124 121::2 vrf test

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

Static routing commands | 2756

Release 10.10 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Inclusive language update. --
Authority Administrators or local user group members with execution rights for this command.

show ip route
show ip route [<A.B.C.D> | <A.B.C.D/M> | all-vrfs | bgp | connected | local | ospf | static | summary | vrf <VRF-NAME>] [vsx-peer]
Description
Displays IPv4 route tables.

Parameter <A.B.C.D> <A.B.C.D/M> all-vrfs bgp connected local ospf static summary
vrf <vrf-name>
vsx-peer

Description Display longest prefix match.
Display exact route match.
Display information for all VRFs.
Display bgp routes only.
Display connected routes only.
Display local routes only.
Display ospf routes only.
Display static routes only.
Display the aggregate count of routes per routing protocol.
Specify a VRF by VRF name (if no <VRF-NAME> is specified, the default VRF is implied.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing IPv4 route tables:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2757

switch# show ip route
Displaying ipv4 routes selected for forwarding
'[x/y]' denotes [distance/metric] 10.0.0.0/24, vrf default
via vlan2, [0/0], connected 10.0.0.1/32, vrf default
via vlan2, [0/0], local 10.100.11.0/24, vrf default
via vlan1, [0/0], connected 10.100.11.82/32, vrf default
via vlan1, [0/0], local 20.0.0.0/24, vrf default
via 10.0.0.2, [1/0], static 20.0.1.0/24, vrf default
via 10.0.0.2, [1/0], static 20.0.2.0/24, vrf default
via vlan1, [1/0], static 20.0.4.0/24, vrf default
nullroute, [1/0], static 20.0.5.0/24, vrf default
reject route, [1/0], static
Showing IPv4 route tables for the test VRF:
switch# show ip route vrf test
Displaying ipv4 routes selected for forwarding
'[x/y]' denotes [distance/metric]
30.0.0.0/24, 1 (nullroute) next-hops via 30.0.0.2, [0/0], connected
90.0.0.0/24, 1 unicast next-hops via 30.0.0.1, [1/0], static
90.0.1.0/24, 1 unicast next-hops via 1/1/2, [1/0], static
90.0.3.0/24, nullroute, 1, [1/0], static

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Static routing commands | 2758

show ipv6 route
show ipv6 route [<X.X.X.X> | <X.X.X.X/M> | all-vrfs | bgp | connected | local | ospf | static | summary | vrf <vrf-name>] [vsx-peer]
Description
Displays IPv6 route tables.

Parameter <X.X.X.X> <X.X.X.X/M> all-vrfs bgp connected local ospf static summary vrf <vrf-name>
vsx-peer

Description
Display exact route match.
Display exact route match.
Display information for all VRFs.
Display bgp routes only.
Display connected routes only.
Display local routes only.
Display ospf routes only.
Display static routes only.
Display the aggregate count of routes per routing protocol.
Specify a VRF by VRF name (if no <VRF-NAME> is specified, the default VRF is implied.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing IPv6 route tables:

switch# show ipv6 route
Displaying ipv6 routes selected for forwarding
'[x/y]' denotes [distance/metric]
1000::/64, vrf default via vlan2, [0/0], connected
1000::1/128, vrf default via vlan2, [0/0], local
2000::/64, vrf default via vlan2, [1/0], static
2001::/64, vrf default via 1000::2, [1/0], static
3000:2301::/64, vrf default nullroute, [1/0], static
4000:2301::/64, vrf default reject route, [1/0], static

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2759

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.10 10.07 or earlier

Modification Inclusive language update. --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Static routing commands | 2760

Chapter 149 Subinterface commands

Subinterface commands

encapsulation dot1q
encapsulation dot1q <VLAN-ID> no encapsulation dot1q <VLAN-ID>
Description
Configures 802.1Q encapsulation on a subinterface. The no form of this command removes 802.1Q encapsulation on a subinterface.

Parameter <VLAN-ID>

Description
Specifies encapsulation VLAN ID. Range 1 to 4094.
NOTE: The encapsulation VLAN ID should be unique within an L3 LAG subinterface. The same encapsulation VLAN ID can be configured among different parent interfaces, but the encapsulation VLAN ID should not be configured in the internal VLAN range. (Encapsulation VLAN IDs and static VLANs are entirely different and do not coincide.)

Usage
Associates an 802.1Q VLAN ID with a subinterface.
Examples
Configuring 802.1Q encapsulation on a subinterface:
switch(config)# interface 1/1/1.201 switch(config-subif)# encapsulation dot1q 10
Removing 802.1Q encapsulation on a subinterface:
switch(config-subif)# no encapsulation dot1q 10

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide

2761

Release 10.08

Command Information

Platforms
6300 6400

Command context config-subif

Modification Command introduced for the 6300, 6400switch series.
Authority Administrators or local user group members with execution rights for this command.

interface
interface <IFNAME>.<ID> no interface <IFNAME>.<ID>

interface lag <LAGNUM>.<ID> no interface lag <LAGNUM>.<ID>
Description
Creates a subinterface on an L3 interface and enters subinterface configuration mode. The subinterface name consists of the parent interface name (for example, 1/1/1) followed by a period and a unique ID number. The no form of these commands deletes a subinterface from an L3 interface.

Parameter <IFNAME> <ID> <LAGNUM>

Description Specifies L3 interface name. Specifies subinterface ID. Range 1 to 4094. Specifies L3 LAG interface number.

Usage
To create a LAG subinterface, the parent LAG must exist before creating the subinterface.
Examples
Creating a subinterface on L3 interface 1/1/1.201 and entering subinterface configuration mode:

switch(config)# interface 1/1/1.201 switch(config-subif)#

Deleting subinterface on L3 interface 1/1/1.201:

switch(config)# no interface 1/1/1.201

Creating a subinterface on an L3 LAG port and entering subinterface configuration mode:

Subinterface commands | 2762

switch(config)# interface lag 1 switch(config-if)# interface lag 1.201 switch(config-subif)#
Deleting subinterface on an L3 LAG port :
switch(config)# no interface lag 1.201

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced for the 6300, 6400 switch series.
Authority Administrators or local user group members with execution rights for this command.

show capacities subinterface
show capacities subinterface
Description
Displays maximum subinterface capacity.
Examples
Showing maximum subinterface capacity:
switch# show capacities subinterface
System Capacities: Filter Subinterface Capacities Name Value ---------------------------------------------------------------------------------Maximum number of LAG subinterfaces for the entire system 256 Maximum number of LAG members when the LAG has subinterfaces 4 Maximum number of normal subinterfaces for the entire system 1024 Maximum number of subinterface resources for the entire system (normal+(4*LAG) 1024

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2763

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.08

Modification Command introduced for the 6300, 6400 switch series.

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show interface
show interface <IFNAME>.<ID> show interface lag <LAGNUM>.<ID>
Description
Displays a subinterface configuration.
Parameter <IFNAME> <ID> <LAGNUM>

Description Specifies L3 interface name. Specifies subinterface ID. Specifies L3 LAG interface number.

Examples
Showing subinterface configuration:

switch# show interface 1/1/1.201

Interface 1/1/1.201 is down

Admin state is up

State information: Waiting for link

Description:

Hardware: Ethernet, MAC Address: 38:21:c7:5a:80:80

Encapsulation dot1Q ID: 10

Statistic

RX

TX

Total

---------------- -------------------- -------------------- --------------------

L3 Packets

0

0

0

L3 Bytes

0

0

0

Showing subinterface LAG configuration:

Subinterface commands | 2764

switch# show interface lag1.1

Interface lag1.1 is down

Admin state is up

Description:

Hardware: Ethernet, MAC Address: 38:21:c7:5a:80:80

Encapsulation dot1Q ID: 2

Statistic

RX

TX

Total

---------------- -------------------- -------------------- --------------------

L3 Packets

0

0

0

L3 Bytes

0

0

0

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.08

Modification Command introduced for the 6300, 6400 switch series.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2765

Chapter 150 Supportability copy commands

Supportability copy commands

copy checkpoint
copy checkpoint <CHECKPOINT-NAME> {<STORAGE-URL> | <REMOTE-URL>}
Description
Copies the checkpoint using TFTP, SFTP, SCP, or USB.

Parameter <CHECKPOINT-NAME> {<STORAGE-URL> | <REMOTE-URL>}
<STORAGE-URL>
<REMOTE-URL>

Description
Specifies the checkpoint name.
Select either the storage URL or the remote URL for the destination of the copied command output. Required.
Specifies the USB to copy command output. Syntax: {usb}:/<FILE>
Specifies the URL to copy the command output. Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>][;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> | <HOST>}[:<PORT>]/<FILE>

Examples
Copying checkpoint chpt to a remote URL:

switch# copy checkpoint chpt scp://root@10.0.1.1/config vrf mgmt

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier
Command Information

Modification Added SCP support. --

AOS-CX 10.14 Command-Line Interface Guide

2766

Platforms All platforms

Command context Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

copy command-output
copy command-output "<COMMAND>" {<STORAGE-URL> | <REMOTE-URL> [vrf <VRF-NAME>]}
Description
Copies the specified command output using TFTP, SFTP, SCP, or USB.

Parameter <COMMAND>
{<STORAGE-URL> | <REMOTE-URL> [vrf <VRF-NAME>]} <STORAGE-URL> <REMOTE-URL>
vrf <VRF-NAME>

Description
Specifies the command from which you want to obtain its output. Required. Users with auditor rights can specify these two commands only: show accounting log show events
Select either the storage URL or the remote URL for the destination of the copied command output. Required.
Specifies the USB to copy command output. Syntax: {usb}:/<FILE>
Specifies the URL to copy the command output. Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>][;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> | <HOST>}[:<PORT>]/<FILE>
Specifies the VRF name. The default VRF name is default. Optional.

Examples
Copying the output from the show events command to a remote URL:

switch# copy command-output "show events" tftp://10.100.0.12/file

Copying the output from the show tech command to a remote URL with a VRF named mgmt:

switch# copy command-output "show tech" scp://user@10.100.0.12/file vrf mgmt

Copying the output from the show tech command to a remote URL with a VRF named mgmt:

switch# copy command-output "show tech" tftp://10.100.0.12/file vrf mgmt

Copying the output from the show events command to a file named events on a USB drive:

Supportability copy commands | 2767

switch# copy command-output "show events" usb:/events

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification Added SCP support. --
Authority Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

copy core-dump [<MEMBER/SLOT>] daemon
copy core-dump [<MEMBER/SLOT>] daemon <DAEMON-NAME>[:<INSTANCE-ID>] <REMOTE-URL> [vrf <VRF-NAME>]
Description
Copies the core-dump from the specified daemon using TFTP, SFTP, SCP, or USB.

Parameter <MEMBER/SLOT> <DAEMON-NAME> [:<INSTANCE-ID>] <REMOTE_URL>
vrf <VRF-NAME>

Description
Specifies the slot ID on an 8400 or 6400 switch. Required. Syntax: Slot number for line (1/1-1/4, 1/7-1/10) MM(1/5 or 1/6)
Specifies the name of the daemon. Required.
Specifies the instance of the daemon core dump. Optional.
Specifies the remote destination URL. Required. The syntax of the URL is the following: Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>][;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> | <HOST>}[:<PORT>]/<FILE>
Specifies the VRF name. If no VRF name is provided, the VRF named default is used. Optional.

Examples
Copying the core dump from daemon ops-vland to a remote URL with a VRF named mgmt:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2768

switch# copy core-dump daemon ops-vland sftp://abc@10.0.14.211/vland_coredump.xz vrf mgmt
Copying the core dump from daemon ops-vland to a remote URL with a VRF named mgmt:
switch# copy core-dump daemon ops-vland scp://abc@10.0.14.211/vland_coredump.xz vrf mgmt
Copying the core dump from daemon ops-switchd to a USB drive:
switch# copy core-dump daemon ops-switchd usb:/switchd
Copying the core dump with slot ID 1/1 from daemon hpe-sysmond to a remote URL:
switch# copy core-dump 1/1 daemon hpe-sysmond sftp://abc@10.0.14.206/core.hpesysmond.xz vrf mgmt
Copying the core dump from the hpe-config process to a USB drive:
switch# copy core-dump daemon hpe-config usb:/config_core

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History

Release 10.08 10.07 or earlier

Command Information

Platforms 6400

Command context Manager (#)

Modification Added SCP support. --
Authority Administrators or local user group members with execution rights for this command.

copy core-dump [<MEMBER/SLOT>] kernel
copy core-dump [<MEMBER/SLOT>] kernel <REMOTE-URL> [vrf <VRF-NAME>]
Description
Copies a kernel core dump using TFTP, SFTP, or SCP.

Supportability copy commands | 2769

Parameter <MEMBER/SLOT> <REMOTE-URL>
vrf <VRF-NAME>

Description
Specifies the slot ID on an 8400 or 6400 switch. Required. Syntax: Slot number for line (1/1-1/4, 1/7-1/10) MM(1/5 or 1/6)
Specifies the URL to copy the command output. Required. Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>][;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> | <HOST>}[:<PORT>]/<FILE>
Specifies the VRF name. The default VRF name is default. Optional.

Examples
Copying the kernel core dump to the URL:

switch# copy core-dump kernel tftp://10.100.0.12/kernel_dump.tar.gz

Copying the kernel core dump to the URL with the VRF named mgmt:

switch# copy core-dump kernel tftp://10.100.0.12/kernel_dump.tar.gz vrf mgmt

Copying the kernel core dump from slot ID 1/1 to the URL with the VRF named mgmt:

switch# copy core-dump 1/1 kernel sftp://abc@10.0.14.206/kernel_dump.tar.gz vrf mgmt

Copying the kernel core dump from slot ID 1/1 to the URL with the VRF named mgmt:

switch# copy core-dump 1/1 kernel scp://abc@10.0.14.206/kernel_dump.tar.gz vrf mgmt

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Command Information

Platforms 6400

Command context Manager (#)

Modification Added SCP support. --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2770

copy core-dump [<MEMBER/SLOT>] kernel <STORAGE-URL>
copy core-dump [<MEMBER/SLOT>] kernel <STORAGE-URL>
Description
Copies the kernel core dump to a USB drive.

Parameter <MEMBER/SLOT>
<STORAGE-URL>

Description
Specifies the slot ID. Required. Syntax: Slot number for line (1/1-1/4, 1/7-1/10) MM(1/5 or 1/6)
Specifies the USB to copy command output. Required. Syntax: {usb]:/<FILE>

Examples
Copying the kernel core dump to a USB drive:

switch# copy core-dump kernel usb:/kernel.tar.gz

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

copy core-dump vsf member daemon
Applicable for 6300 switches only. copy core-dump vsf member <MEMBER-ID>
daemon [<DAEMON-NAME> | <DAEMON-NAME>:<INSTANCE-ID>] <REMOTE-URL> [vrf <VRF-NAME>] copy core-dump vsf member <MEMBER-ID>
daemon [<DAEMON-NAME> | <DAEMON-NAME>:<INSTANCE-ID>] <STORAGE-URL>
Description
Copies the core-dump from the specified daemon using TFTP, SFTP, SCP, or USB.

Supportability copy commands | 2771

Parameter vsf member <MEMBER-ID> <DAEMON-NAME> [:<INSTANCE-ID>] <REMOTE_URL>
vrf <VRF-NAME> <STORAGE-URL>

Description
Specifies the member-id of the VSF member. Required.
Specifies the name of the daemon. Required.
Specifies the instance of the daemon core dump. Optional.
Specifies the remote destination URL. Required. The syntax of the URL is the following: Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>][;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> | <HOST>}[:<PORT>]/<FILE>
Specifies the VRF name. If no VRF name is provided, the VRF named default is used. Optional.
Specifies the USB to copy command output. Required. Syntax: {usb}:/<FILE>

Examples
Copying the core dump from daemon hpe-sysmond to a remote URL with a VRF named mgmt:

switch# copy core-dump vsf member 1 daemon hpe-sysmond sftp://abc@10.0.14.206/sysmon.xz vrf mgmt

Copying the core dump from daemon hpe-sysmond to a remote URL with a VRF named mgmt:

switch# copy core-dump vsf member 2 daemon hpe-sysmond scp://user@10.0.14.206/sysmon.xz vrf mgmt

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Command Information

Platforms 6300

Command context Manager (#)

Modification Added SCP support. --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2772

copy core-dump vsf member kernel
Applicable for 6300 switches only. copy core-dump vsf member <MEMBER-ID> kernel <REMOTE-URL> [vrf <VRF-NAME>] copy core-dump vsf member <MEMBER-ID> kernel <STORAGE-URL>
Description
Copies the kernel core-dump using TFTP, SFTP, SCP, or USB.

Parameter <MEMBER-ID> <REMOTE_URL>
vrf <VRF-NAME> <STORAGE-URL>

Description
Specifies the member-id of the VSF member. Required.
Specifies the remote destination URL. Required. The syntax of the URL is the following: Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>][;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> | <HOST>}[:<PORT>]/<FILE>
Specifies the VRF name. If no VRF name is provided, the VRF named default is used. Optional.
Specifies the USB to copy command output. Required. Syntax: {usb}:/<FILE>

Examples
Copying the kernel core dump to the URL with a VRF named mgmt:

switch# copy core-dump vsf member 3 kernel sftp://abc@10.0.14.206/kernel.tar.gz vrf mgmt

Copying the kernel core dump to the URL with a VRF named mgmt:

switch# copy core-dump vsf member 3 kernel scp://abc@10.0.14.206/kernel.tar.gz vrf mgmt

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier
Command Information

Modification Added SCP support. --

Supportability copy commands | 2773

Platforms 6300

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

copy diag-dump feature <FEATURE>
copy diag-dump feature <FEATURE> {<REMOTE-URL> [vrf <VRF-NAME>] | <STORAGE-URL>}
Description
Copies the specified diagnostic information using TFTP, SFTP, SCP, or USB.

Parameter <FEATURE> {<REMOTE-URL> [vrf <VRF-NAME> |<STORAGE-URL>]}
<REMOTE-URL>
vrf <VRF-NAME> <STORAGE-URL>

Description
The name of a feature, for example aaa or vrrp. Required.
Select either the remote URL or the storage URL for the destination of the copied command output. Required.
Specifies the remote destination URL. Required. The syntax of the URL is the following: Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>]
[;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> | <HOST>}
[:<PORT>]/<FILE>
Specifies the VRF name. If no VRF name is provided, the VRF named default is used. Optional.
Specifies the USB to copy command output. Required. Syntax: {usb}:/<FILE>

Examples
Copying the output from the aaa feature to a remote URL with a specified VRF:

switch# copy diag-dump feature aaa tftp://10.100.0.12/diagdump.txt vrf mgmt

Copying the output from the aaa feature to a remote URL with a specified VRF:

switch# copy diag-dump feature aaa scp://user@10.100.0.12/diagdump.txt vrf mgmt

Copying the output from the vrrp feature to a USB drive:

switch# copy diag-dump feature vrrp usb:/diagdump.txt

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2774

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification Added SCP support. --
Authority Administrators or local user group members with execution rights for this command.

copy diag-dump local-file
copy diag-dump local-file {<REMOTE-URL> [vrf <VRF-NAME>] | <STORAGE-URL>}
Description
Copies the diagnostic information stored in a local file using TFTP, SFTP, SCP, or USB.

Parameter {<REMOTE-URL> [vrf <VRF-NAME>] |<STORAGE-URL>}
<REMOTE-URL>
vrf <VRF-NAME> <STORAGE-URL>

Description
Select either the storage URL or the remote URL for the destination of the copied command output. Required.
Specifies the URL to copy the command output. Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>]
[;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> | <HOST>}
[:<PORT>]/<FILE>
Specifies the VRF name. The default VRF name is default. Optional.
Specifies the USB to copy command output. Syntax: {usb}:/<FILE>

Usage
The copy diag-dump local-file command can be used only after the information is captured. Run the diag-dump <FEATURE-NAME> basic local-file command before you enter the copy diag-dump localfile command to capture the diagnostic information for the specified feature into the local file.
Examples

Supportability copy commands | 2775

Copying the output from the local file to a remote URL:
switch# diag-dump aaa basic local-file switch# copy diag-dump local-file tftp://10.100.0.12/diagdump.txt
Copying the output from the local file to a remote URL:
switch# diag-dump aaa basic local-file switch# copy diag-dump local-file scp://user@10.100.0.12/diagdump.txt
Copying the output from the local file to a USB drive:
switch# diag-dump aaa basic local-file switch# copy diag-dump local-file usb:/diagdump.txt

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification Added SCP support. --
Authority Administrators or local user group members with execution rights for this command.

copy diag-dump vsf member local-file
Applicable for 6300 switches only. copy diag-dump vsf member <MEMBER-ID> local-file {<REMOTE-URL> [vrf <VRF-NAME>] | <STORAGE-URL>}
Description
Copies the diagnostic information stored in a local file using TFTP, SFTP, SCP, or USB.

Parameter vsf member <MEMBER-ID>
{<REMOTE-URL> [vrf <VRF-NAME>] |<STORAGE-URL>}

Description
Specifies the member-id of the VSF member. Required.
Select either the storage URL or the remote

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2776

Parameter <REMOTE-URL>
vrf <VRF-NAME> <STORAGE-URL>

Description
URL for the destination of the copied command output. Required.
Specifies the URL to copy the command output. Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>]
[;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> | <HOST>}
[:<PORT>]/<FILE>
Specifies the VRF name. The default VRF name is default. Optional.
Specifies the USB to copy command output. Syntax: {usb}:/<FILE>

Usage
The copy diag-dump local-file command can be used only after the information is captured. Run the diag-dump <FEATURE-NAME> basic local-file command before you enter the copy diag-dump localfile command to capture the diagnostic information for the specified feature into the local file.
Examples
Copying the output from the local file to a remote URL:

switch# diag-dump aaa basic local-file switch# copy diag-dump vsf member 2 local-file scp://user@10.100.0.12/diagdump.txt

Copying the output from the local file to a remote URL:

switch# diag-dump aaa basic local-file switch# copy diag-dump vsf member 2 local-file tftp://10.100.0.12/diagdump.txt

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier
Command Information

Modification Added SCP support. --

Supportability copy commands | 2777

Platforms 6300

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

copy <IMAGE>
copy <IMAGE> {<STORAGE-URL> | <REMOTE-URL>} <FILE-NAME> [vrf <VRF-NAME>]
Description
Copies the image using TFTP, SFTP, SCP, or USB.

Parameter <IMAGE> {<STORAGE-URL> | <REMOTE-URL>}
<STORAGE-URL>
<REMOTE-URL>
<FILE-NAME> vrf <VRF-NAME>

Description
Specifies the image.
Select either the storage URL or the remote URL for the destination of the copied command output. Required.
Specifies the USB to copy command output. Syntax: {usb}:/<FILE>
Specifies the URL to copy the command output. Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>][;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> | <HOST>}[:<PORT>]/<FILE>
Specifies the file name.
Specifies the VRF name. The default VRF name is default. Optional.

Examples
Copying the image to a remote URL:

switch# copy scp://root@20.0.1.1/primary.swi primary vrf mgmt

Copying the secondary image to a remote URL:

switch# copy secondary scp://root@20.0.1.1/primary.swi vrf mgmt

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2778

Release 10.08 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification Added SCP support. --
Authority Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

copy running-config
copy running-config {<STORAGE-URL> | <REMOTE-URL>}/config <CONFIG-NAME> [vrf <VRF-NAME>]
Description
Copies the running configuration using TFTP, SFTP, SCP, or USB.

Parameter {<STORAGE-URL> | <REMOTE-URL>}
<STORAGE-URL> <REMOTE-URL>
config <CONFIG-NAME> vrf <VRF-NAME>

Description
Select either the storage URL or the remote URL for the destination of the copied command output. Required.
Specifies the USB to copy command output. Syntax: {usb}:/<FILE>
Specifies the URL to copy the command output. Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>]
[;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> | <HOST>}[:<PORT>]/<FILE>
Specifies the running configuration.
Specifies the VRF name. The default VRF name is default. Optional.

Examples
Copying the running configuration to a remote URL:

switch# copy running-config scp://root@10.0.1.1/config cli vrf mgmt

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.
Command History

Supportability copy commands | 2779

Release 10.08 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification Added SCP support. --
Authority Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

copy show-tech feature
copy show-tech feature <FEATURE> {<REMOTE-URL> [vrf <VRF-NAME>] | <STORAGE-URL>}
Description
Copies show tech output using TFTP, SFTP, SCP, and USB.

Parameter {<REMOTE-URL> [vrf <VRF-NAME> | <STORAGE-URL>]}
<REMOTE-URL>
vrf <VRF-NAME> <STORAGE-URL>

Description
Select either the remote URL or the storage URL for the destination of the copied command output. Required.
Specifies the URL to copy the command output. Required.
Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>]
[;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> |
<HOST>}[:<PORT>]/<FILE>
Specifies the VRF name. The default VRF name is default. Optional.
Specifies the USB to copy command output. Required. Syntax: {usb}:/<FILE>

Example
Copying show tech output of the aaa feature using SCP:

switch# copy show-tech feature aaa scp://user@10.0.0.12/file.txt vrf mgmt

Copying show tech output of the config feature using SFTP on the mgmt VRF:

switch# copy show-tech feature config sftp://root@10.0.0.1/tech.txt vrf mgmt

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2780

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification Added SCP support. --
Authority Administrators or local user group members with execution rights for this command.

copy show-tech local-file
copy show-tech local-file {<REMOTE-URL> [vrf <VRF-NAME>] | <STORAGE-URL>}
Description
Copies show tech output stored in a local file.

Parameter {<REMOTE-URL> [vrf <VRF-NAME>] | <STORAGE-URL> ]}
<REMOTE-URL>
vrf <VRF-NAME> <STORAGE-URL>

Description
Select either the remote URL or the storage URL for the destination of the copied command output. Required.
Specifies the URL to copy the command output. Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>]
[;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> |
<HOST>}[:<PORT>]/<FILE>
Specifies the VRF name. The default VRF name is default. Optional.
Specifies the USB to copy command output. Syntax: {usb}:/<FILE>

Usage
Before entering the copy show-tech local-file command, run the show tech command with the localfile parameter for the specified feature.
Examples

Supportability copy commands | 2781

Copying the output to a remote URL: switch# copy show-tech local-file tftp://10.100.0.12/file.txt
Copying the output to a remote URL: switch# copy show-tech local-file scp://user@10.100.0.12/file.txt
Copying the output to a remote URL with a VRF: switch# copy show-tech local-file tftp://10.100.0.12/file.txt vrf mgmt
Copying the output to a USB: switch# copy show-tech local-file usb:/file

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification Added SCP support. --
Authority Administrators or local user group members with execution rights for this command.

copy show-tech vsf member local-file
Applicable for 6300 switches only. copy show-tech vsf member <MEMBER-ID> local-file {<REMOTE-URL> [vrf <VRF-NAME>] | <STORAGE-URL>}
Description
Copies show tech output stored in a local file.

Parameter vsf member <MEMBER-ID>

Description Specifies the member-id of the VSF

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2782

Parameter {<REMOTE-URL> [vrf <VRF-NAME>] | <STORAGE-URL> ]}
<REMOTE-URL>
vrf <VRF-NAME> <STORAGE-URL>

Description
member. Required.
Select either the remote URL or the storage URL for the destination of the copied command output. Required.
Specifies the URL to copy the command output. Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>]
[;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> |
<HOST>}[:<PORT>]/<FILE>
Specifies the VRF name. The default VRF name is default. Optional.
Specifies the USB to copy command output. Syntax: {usb}:/<FILE>

Usage
Before entering the copy show-tech local-file command, run the show tech command with the local-file parameter for the specified feature.
Examples
Copying the output to a remote URL with a VRF:

switch# copy show-tech vsf member 2 local-file tftp://10.100.0.12/showtech.txt vrf mgmt

Copying the output to a USB:

switch# copy show-tech vsf member 2 local-file usb:/file

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier
Command Information

Modification Added SCP support. --

Supportability copy commands | 2783

Platforms 6300

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

copy startup-config
copy startup-config {<STORAGE-URL> | <REMOTE-URL>}/config <CONFIG-NAME> [vrf <VRF-NAME>]
Description
Copies the running configuration using TFTP, SFTP, SCP, or USB.

Parameter {<STORAGE-URL> | <REMOTE-URL>}
<STORAGE-URL>
<REMOTE-URL>
config <CONFIG-NAME> vrf <VRF-NAME>

Description
Select either the storage URL or the remote URL for the destination of the copied command output. Required.
Specifies the USB to copy command output. Syntax: {usb}:/<FILE>
Specifies the URL to copy the command output. Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>][;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> | <HOST>}[:<PORT>]/<FILE>
Specifies the startup configuration.
Specifies the VRF name. The default VRF name is default. Optional.

Examples
Copying the startup configuration to a remote URL:

switch# copy startup-config scp://root@10.0.1.1/config json vrf mgmt

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier
Command Information

Modification Added SCP support. --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2784

Platforms All platforms

Command context Manager (#)

Authority
Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

copy support-files
copy support-files <REMOTE-URL> [vrf <VRF-NAME>] <STORAGE-URL> all <REMOTE-URL> [vrf <VRF-NAME>] all <STORAGE-URL> feature <FEATURE-NAME> <STORAGE-URL> previous-boot <REMOTE-URL> [vrf <VRF-NAME>] previous-boot <STORAGE-URL>
For the 6400 switch only: module <SLOT-ID> <REMOTE-URL> [vrf <VRF-NAME>] module <SLOT-ID> <STORAGE-URL> standby <REMOTE-URL> [vrf <VRF-NAME>]
For the 6300 switch only: vsf member <MEMBER-ID> <REMOTE-URL> {vrf <VRF-NAME>} vsf member <MEMBER-ID> <STORAGE-URL>
Description
Copies a set of support files to a compressed file in tar.gz format using TFTP, SFTP, SCP, or USB or to a directory over SFTP or USB.
This command does not support TFTP transfer on 6300 switches.

Parameter <FEATURE-NAME> {<REMOTE-URL> [vrf <VRF-NAME>] | <STORAGE-URL> ]}
<REMOTE-URL>
vrf <VRF-NAME> <STORAGE-URL>

Description
The feature name, for example, aaa.
Select either the remote URL or the storage URL for the destination of the copied command output. Required.
Specifies the URL to copy the command output. Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>]
[;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> |
<HOST>}[:<PORT>]/<FILE>
Specifies the VRF name. The default VRF name is default. Optional.
Specifies the USB to copy command output. Syntax: {usb}:/<FILE>

Supportability copy commands | 2785

Parameter <MEMBER-ID>
<SLOT-ID>

Description
The member ID in the VSF stack. Range 110.
Specifies the slot ID on 6400 switches. Optional. Syntax: Slot number for line (1/1-1/4, 1/71/10) MM(1/5 or 1/6)

Usage
If feature name is not provided, the command collects generic system-specific support information. If a feature name is provided, the command collects feature-specific support information.
In order to collect data from standby and member in a VSF stack, the command will prompt for the local user password once.

In order to collect data from the standby 6400 swtich, the command will prompt for the local user password once.
Examples
Copying the support files to a remote URL: switch# copy support-files tftp://10.100.0.12/file.tar.gz
Copying the support files of the lldp feature to a remote URL with a specified VRF: switch# copy support-files feature lldp tftp://10.100.0.12/file.tar.gz vrf mgmt
Copying the support files from the previous boot to a remote URL with a specified VRF: switch# copy support-files previous-boot scp://user@10.0.14.206/file.tar.gz vrf mgmt
Copying the support files to a USB: switch# copy support-files usb:/file.tar.gz
Copying the files from a module to a remote URL with a specified VRF on an 8400 or 6400 switch: switch# copy support-files module 1/1 tftp://10.100.0.12/file.tar.gz vrf mgmt
Copying the files from a standby module to a remote URL with a specified VRF on an 8400 or 6400 switch:
switch# copy support-files standby sftp://root@10.0.14.216/file.tar.gz vrf mgmt

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2786

Copying all the support files to a remote URL: switch# copy support-files all sftp://root@10.0.14.216/file.tar.gz vrf mgmt
Copying the support files of the config feature to a USB: switch# copy support-files feature config usb:/file.tar.gz

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History

Release 10.08 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification Added SCP support. --
Authority Administrators or local user group members with execution rights for this command.

copy support-files local-file
copy support-files [feature <FEATURE-NAME> | previous-boot | all | module <SLOT-ID> | standby | vsf member <MEMBER-ID>] local-file {<REMOTE-URL> [vrf <VRF-NAME>] | <STORAGEURL>}
The module and standby are supported only on 6400 switch. The vsf member is supported only on 6300 switch.
Description
Stores a set of support files as a compressed file in the switch locally and copies the preserved support files to a directory using TFTP, SFTP, SCP, or USB.
You can store only one copy of the support file locally. When you store a new support file, it overwrites the existing support file.

Parameter <FEATURE-NAME>

Description Specifies the feature for the support files.

Supportability copy commands | 2787

Parameter <SLOT-ID>
<MEMBER-ID>
<REMOTE-URL> <STORAGE-URL> <VRF-NAME>

Description Specifies the module slot number identifier for the support files. Range: 1/1-1/4, 1/7-1/10
Specifies the VSF member identifier for the support files. Range: 110
Specifies the URL to copy the support files.
Specifies the USB to copy the support files.
Specifies the VRF name. The default VRF name is default.

Usage
If the copy of the support files to the destination fails, an alternate option is prompted to store the collected data in the local file. This helps us to retry the copy process using copy support-files local-file <REMOTE-URL/STORAGE-URL> without the need of regenerating the file.
Examples
Copying support file to the local file:

switch# copy support-files local-file switch# copy support-files feature lldp local-file switch# copy support-files previous-boot local-file switch# copy support-files all local-file The operation to copy all support files could take a while to complete. Do you want to continue (y/n)? switch# copy support-files module 1/1 local-file switch# copy support-files standby local-file switch# copy support-files vsf member 7 local-file

Copying local support file to a remote URL and storage URL:

switch# copy support-files local-file usb:/support_files_dir_path/ switch# copy support-files local-file scp://root@10.0.14.206//support_files_dir_ path/abc.tar.gz vrf mgmt

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2788

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

copy support-files vsf member
Applicable for 6300 switches only. copy support-files vsf member <MEMBER-ID> {<REMOTE-URL> [vrf <VRF-NAME>] | <STORAGE-URL>}
Description
Copies a set of support files using TFTP, SFTP, SCP, or USB.

Parameter <MEMBER-ID> {<REMOTE-URL> [vrf <VRF-NAME> | <STORAGE-URL>]}
<REMOTE-URL>
vrf <VRF-NAME> <STORAGE-URL>

Description
Specified the member-id of the VSF member. Required.
Select either the remote URL or the storage URL for the destination of the copied command output. Required.
Specifies the URL to copy the command output. Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>]
[;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> |
<HOST>}[:<PORT>]/<FILE>
Specifies the VRF name. The default VRF name is default. Optional.
Specifies the USB to copy command output. Syntax: {usb}:/<FILE>

Usage
If feature name is not provided, the command collects generic system-specific support information. If a feature name is provided, the command collects feature-specific support information.
Examples
Copying the support files to a USB:

switch# copy support-files vsf member 2 usb:/file.tar.gz

Copying all the support files to a remote URL with a specified VRF:

switch# copy support-files vsf member 2 scp://user@10.100.0.12/file.tar.gz/ vrf mgmt

Copying all the support files to a remote URL with a specified VRF:

Supportability copy commands | 2789

switch# copy support-files vsf member 2 sftp://user@10.100.0.12/support_files_dir_ path/ vrf mgmt

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Command Information

Platforms 6300

Command context Manager (#)

Modification Added SCP support. --
Authority Administrators or local user group members with execution rights for this command.

copy support-log
copy support-log <DAEMON-NAME> [<MEMBER/SLOT>] {<STORAGE-URL> | <REMOTE-URL> [vrf <VRFNAME>]}
Description
Copies the specified support log for a daemon TFTP, SFTP, SCP, or USB.

Parameter <MEMBER/SLOT>
<DAEMON-NAME> {<STORAGE-URL> | <REMOTE-URL> [vrf <VRF-NAME>]}
<STORAGE-URL> <REMOTE-URL>

Description
Specifies the slot ID on an 8400 or 6400 switch. Optional. Syntax: Slot number for line (1/1-1/4, 1/71/10) MM(1/5 or 1/6)
Specifies the name of the daemon. Required.
Selects either the storage URL or the remote URL for the destination of the copied command output. Required.
Specifies the USB to copy command output. Syntax: {usb}:/<FILE>
Specifies the URL to copy the command output. Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>]
[;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> |

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2790

Parameter vrf <VRF-NAME>

Description
<HOST>}[:<PORT>]/<FILE>
Specifies the VRF name. If no VRF name is provided, the VRF named default is used. Optional.

Usage
Fast log is a high performance, per-daemon binary logging infrastructure used to debug daemon level issues by precisely capturing the per daemon/module/functionalities debug traces in real time. Fast log, also referred to as support logs, helps users to understand the feature internals and its specific happenings. The fast logs from one daemon are not overwritten by other daemon logs because fast logs are captured as part of a daemon core dump. Fast logs are enabled by default.
Examples
Copying the support log from the daemon hpe-fand to a remote URL:

switch# copy support-log hpe-fand tftp://10.100.0.12/file

Copying the support log from the daemon fand to a remote URL with a VRF named mgmt:

switch# copy support-log fand scp://user@10.100.0.12/file vrf mgmt

Copying the support log from the daemon hpe-fand to a remote URL with a VRF named mgmt:

switch# copy support-log hpe-fand tftp://10.100.0.12/file vrf mgmt

Copying the support log from the daemon hpe-fand to a USB:

switch# copy support-log hpe-fand usb:/support-log

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier
Command Information

Modification Added SCP support. --

Supportability copy commands | 2791

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

copy support-log vsf member
Applicable for 6300 switches only. copy support-log vsf member <MEMBER-ID> <DAEMON-NAME> {<STORAGE-URL> | <REMOTE-URL> [vrf <VRF-NAME>]}
Description
Copies the specified support log for a daemon using TFTP, SFTP, SCP, or USB.

Parameter <MEMBER-ID> <DAEMON-NAME> {<STORAGE-URL> | <REMOTE-URL> [vrf <VRF-NAME>]}
<STORAGE-URL> <REMOTE-URL>
vrf <VRF-NAME>

Description
Specifies the member-id of the VSF member. Required.
Specifies the name of the daemon. Required.
Selects either the storage URL or the remote URL for the destination of the copied command output. Required.
Specifies the USB to copy command output. Syntax: {usb}:/<FILE>
Specifies the URL to copy the command output. Syntax: n {tftp://}{<IP> | <HOST>}[:<PORT>]
[;blocksize=<VAL>]/<FILE> n {sftp:// | scp:// <USER>@}{<IP> |
<HOST>}[:<PORT>]/<FILE>
Specifies the VRF name. If no VRF name is provided, the VRF named default is used. Optional.

Usage
Fast log is a high performance, per-daemon binary logging infrastructure used to debug daemon level issues by precisely capturing the per daemon/module/functionalities debug traces in real time. Fast log, also referred to as support logs, helps users to understand the feature internals and its specific happenings. The fast logs from one daemon are not overwritten by other daemon logs because fast logs are captured as part of a daemon core dump. Fast logs are enabled by default.
Examples
Copying the support log from the daemon hpe-fand to a remote URL with a VRF named mgmt:

switch# copy support-log vsf member 2 hpe-fand tftp://10.100.0.12/file vrf mgmt

Copying the support log from the daemon hpe-fand to a remote URL with a VRF named mgmt:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2792

switch# copy support-log vsf member 2 hpe-fand scp://user@10.100.0.12/file vrf mgmt
Copying the support log from the daemon hpe-fand to a USB:
switch# copy support-log vsf member 2 hpe-fand usb:/support-log

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Command Information

Platforms 6300

Command context Manager (#)

Modification Added SCP support. --
Authority Administrators or local user group members with execution rights for this command.

Supportability copy commands | 2793

Chapter 151 Switch system and hardware commands

Switch system and hardware commands

bluetooth disable
bluetooth disable no bluetooth disable
Description
Disables the Bluetooth feature on the switch. The Bluetooth feature includes both Bluetooth Classic and Bluetooth Low Energy (BLE). Bluetooth is enabled by default. The no form of this command enables the Bluetooth feature on the switch.
Example
Disabling Bluetooth on the switch. <XXXX> is the switch platform and <NNNNNNNNNN> is the device identifier.

switch(config)# bluetooth disable

switch# show bluetooth

Enabled

: No

Device name

: <XXXX>-<NNNNNNNNNN>

switch(config)# show running-config ... bluetooth disabled ...

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

bluetooth enable

AOS-CX 10.14 Command-Line Interface Guide

2794

bluetooth enable no bluetooth enable
Description
This command enables the Bluetooth feature on the switch. The Bluetooth feature includes both Bluetooth Classic and Bluetooth Low Energy (BLE). Default: Bluetooth is enabled by default. The no form of this command disables the Bluetooth feature on the switch.
Usage
The default configuration of the Bluetooth feature is enabled. The output of the show running-config command includes Bluetooth information only if the Bluetooth feature is disabled. The Bluetooth feature includes both Bluetooth Classic and Bluetooth Low Energy (BLE). The Bluetooth feature requires the USB feature to be enabled. If the USB feature has been disabled, you must enable the USB feature before you can enable the Bluetooth feature.
Examples
switch(config)# bluetooth enable

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

clear events
clear events
Description
Clears up event logs. Using the show events command will only display the logs generated after the clear events command.
Examples
Clearing all generated event logs:

Switch system and hardware commands | 2795

switch# show events --------------------------------------------------show event logs --------------------------------------------------2018-10-14:06:57:53.534384|hpe-sysmond|6301|LOG_INFO|MSTR|1|System resource utilization poll interval is changed to 27 2018-10-14:06:58:30.805504|lldpd|103|LOG_INFO|MSTR|1|Configured LLDP tx-timer to 36 2018-10-14:07:01:01.577564|hpe-sysmond|6301|LOG_INFO|MSTR|1|System resource utilization poll interval is changed to 49
switch# clear events
switch# show events --------------------------------------------------show event logs --------------------------------------------------2018-10-14:07:03:05.637544|hpe-sysmond|6301|LOG_INFO|MSTR|1|System resource utilization poll interval is changed to 34

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

clear ip errors
clear ip errors
Description
Clears all IP error statistics.
Example
Clearing and showing ip errors:

switch# clear ip errors

switch# show ip errors

----------------------------------

Drop reason

Packets

----------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2796

Malformed packets

0

IP address errors

0

...

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

console baud-rate
console baud-rate <SPEED> no console baud-rate <SPEED>
Description
Sets the console serial port speed. The no form of this command resets the console port speed to its default of 115200 bps.

Parameter <SPEED>

Description Selects the console port speed in bps, either 9600 or 115200.

Usage
The speed change occurs immediately for the active console session. The console will be inaccessible until the client terminal settings are updated to match the console port speed that you set. After the command is executed you will be prompted to log in again.
Examples
Setting the console port speed to 9600 bps:

switch(config)# console baud-rate 9600 This command will configure the baud rate immediately for the active serial console session. After the command is executed the user will be prompted to re-login. The serial console will be inaccessible until the terminal client settings are updated to match the baud rate of the switch. Continue (y/n)? y

Switch system and hardware commands | 2797

Resetting the console port to its default speed 115200 bps: switch(config)# no console baud-rate

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms All platforms

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

domain-name
domain-name <NAME> no domain-name [<NAME>]
Description
Specifies the domain name of the switch. The no form of this command sets the domain name to the default, which is no domain name.

Parameter <NAME>

Description
Specifies the domain name to be assigned to the switch. The first character of the name must be a letter or a number. Length: 1 to 32 characters.

Examples
Setting and showing the domain name:

switch# show domain-name
switch# config switch(config)# domain-name example.com switch(config)# show domain-name example.com switch(config)#

Setting the domain name to the default value:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2798

switch(config)# no domain-name switch(config)# show domain-name
switch(config)#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

hostname
hostname <HOSTNAME> no hostname [<HOSTNAME>]
Description
Sets the host name of the switch. The no form of this command sets the host name to the default value, which is switch.

Parameter <HOSTNAME>

Description
Specifies the host name. The first character of the host name must be a letter or a number. Length: 1 to 32 characters. Default: switch

Examples
Setting and showing the host name:

switch# show hostname switch switch# config switch(config)# hostname myswitch myswitch(config)# show hostname myswitch

Switch system and hardware commands | 2799

Setting the host name to the default value:
myswitch(config)# no hostname switch(config)#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

module admin-state
module <SLOT-ID> admin-state {diagnostic | down | up} no module <SLOT-ID> [admin-state [diagnostic | down | up]]
Description
Sets the administrative state of the specified line module. The no form of the command configures administrative state to the default up.

Parameter <SLOT-ID>
diagnostic down up

Description
Specifies the member and slot of the module. For example, to specify the module in member 1, slot 3, enter the following: 1/3
Selects the diagnostic administrative state. Network traffic does not pass through the module.
Selects the down administrative state. Network traffic does not pass through the module.
Selects the up administrative state. The line module is fully operational. The up state is the default administrative state.

Example
Setting the administrative state of the module in slot 1/3 to down:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2800

switch(config)# module 1/3 admin-state down

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

module product-number
module <SLOT-ID> product-number [<PRODUCT-NUM>] no module <SLOT-ID> [product-number [<PRODUCT-NUM>]]
Description
Changes the configuration of the switch to indicate that the specified member and slot number contains, or will contain, a line module. The no form of this command removes the line module and its interfaces from the configuration. If there is a line module installed in the slot, the line module is powered off and then powered on.

Parameter <SLOT-ID>
<PRODUCT-NUM>

Description
Specifies the member and slot in the form m/s, where m is the member number, and s is the slot number.
Specifies the product number of the line module. For example: JL363A If there is a line module installed in the slot when you execute this command, <PRODUCT-NUM> is optional. The switch reads the product number information from the module that is installed in the slot. If there is no line module installed in the slot when you execute this command, <PRODUCT-NUM> is required.

Usage
The default configuration associated with a line module slot is:
n There is no module product number or interface configuration information associated with the slot. The slot is available for the installation with any supported line module.
n The Admin State is Up (which is the default value for Admin State).

Switch system and hardware commands | 2801

To add a line module to the configuration, you must use the module command either before or after you install the physical module. If you execute the module command after you install a line module in an empty slot, you can omit the <PRODUCT-NUM> variable. The switch reads the product information from the installed module. If the module is not installed in the slot when you execute the module command, you must specify a value for the <PRODUCT-NUM> variable:
n The switch validates the product number of the module against the slot number you specify to ensure that the right type of module is configured for the specified slot.
For example, the switch returns an error if you specify the product number of a line module for a slot reserved for management modules. n You can configure the line module interfaces before the line module is installed.
When you install the physical line module in a preconfigured slot, the following actions occur:
n If a product number was specified in the command and it matches the product number of the installed module, the switch initializes the module.
n If a product number was specified in the command and the product number of the module does not match what was specified, the module device initialization fails.
The no form of the command removes the line module and its interfaces from the configuration and restores the line module slot to the default configuration. If there is a line module installed in the slot when you execute the no form of the command, the command also powers off and then powers on the module. Traffic passing through the line module is stopped. Management sessions connected through the line module are also affected. If the slot associated with the line module is in the default configuration, you can remove the module from the chassis without disrupting the operation of the switch.
Examples
Configuring slot 1/1 for future installation of a line module:
switch(config)# module 1/1 product-number jl363a
Configuring a line module that is already installed in slot 1/1:
switch(config)# module 1/1 product-number
Attempting to configure slot 1/1 for the future installation of a line module without specifying the product number (returned error shown):
switch(config)# module 1/1 product-number Line module '1/4' is not physically available. Please provide the product number to preconfigure the line module.
Removing a module from the configuration:
switch(config)# no module 1/1 This command will power cycle the specified line module and restore its default

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2802

configuration. Any traffic passing through the line module will be interrupted. Management sessions connected through the line module will be affected. It might take a few minutes to complete this operation.
Do you want to continue (y/n)? y switch(config)#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

mtrace
mtrace <IPV4-SRC-ADDR> <IPV4-GROUP-ADDR> [lhr <IPV4-LHR-ADDR>] [ttl <HOPS>] [vrf <VRF-NAME>]
Description
Traces the specified IPv4 source and group addresses.

Parameter IPV4-SRC-ADDR IPV4-GROUP-ADDR lhr <IPV4-LHR-ADDR> ttl <HOPS>
vrf <VRF-NAME>

Description
Specifies the source IPv4 address to trace.
Specifies the group IPv4 address to trace.
Specifies the last hop router address from which to start the trace.
Specifies the Time-To-Live duration in hops. Range: 1 to 255 hops. Default: 8 hops.
Specifies the name of the VRF. If a name is not specified the default VRF will be used.

Examples
Tracing with source, group, and LHR addresses and TTL:

Switch system and hardware commands | 2803

(switch)# mtrace 20.0.0.1 239.1.1.1 lhr 10.1.1.1 ttl 10
Type escape sequence to abort. Mtrace from 10.0.0.1 for Source 20.0.0.1 via Group 239.1.1.1 From destination(?) to source (?)... Querying ful reverse path... 0 10.0.0.1 -1 30.0.0.1 PIM 0 ms -2 40.0.0.1 PIM 2 ms -3 50.0.0.1 PIM 100 ms -4 60.0.0.1 PIM 156 ms -5 20.0.0.1 PIM 123 ms

Tracing with source and group addresses:
(switch)# mtrace 200.0.0.1 239.1.1.1
Type escape sequence to abort. Mtrace from self for Source 200.0.0.1 via Group 239.1.1.1 From destination(?) to source (?)... Querying ful reverse path... 0 10.0.0.1 -1 30.0.0.1 PIM 0 ms -2 40.0.0.1 PIM 2 ms -3 50.0.0.1 PIM 100 ms -4 60.0.0.1 PIM 156 ms -5 200.0.0.1 PIM 123 ms

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

power consumption-average-period
power consumption-average-period <PERIOD-IN-SECONDS>
Description
Configures a time period for average power consumption in seconds.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2804

Parameter <PERIOD-IN-SECONDS>

Description
Specifies the period in seconds for average power consumed. Range: 60-3600. Default: 600

Example
Configuring a time period of 60 seconds for average power consumption:

switch(config)# power consumption-average-period 60

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

show bluetooth
show bluetooth
Description
Shows general status information about the Bluetooth wireless management feature on the switch.
Usage
This command shows status information about the following:
n The USB Bluetooth adapter n Clients connected using Bluetooth n The switch Bluetooth feature.
The output of the show running-config command includes Bluetooth information only if the Bluetooth feature is disabled. The device name given to the switch includes the switch serial number to uniquely identify the switch while pairing with a mobile device. The management IP address is a private network address created for managing the switch through a Bluetooth connection.
Examples

Switch system and hardware commands | 2805

Example output when Bluetooth is enabled but no Bluetooth adapter is connected. <XXXX> is the switch platform and <NNNNNNNNNN> is the device identifier.

switch# show bluetooth

Enabled

: Yes

Device name

: <XXXX>-<NNNNNNNNNN>

Adapter State

: Absent

Example output when Bluetooth is enabled and there is a Bluetooth adapter connected:

switch# show bluetooth

Enabled

: Yes

Device name

: <XXXX>-

Adapter State

: Ready

Adapter IP address : 192.168.99.1

Adapter MAC address : 480fcf-af153a

Connected Clients

-----------------

Name

MAC Address

-------------- --------------

Mark's iPhone 089734-b12000

IP Address Connected Since ------------ -----------------------192.168.99.10 2018-07-09 08:47:22 PDT

Example output when Bluetooth is disabled:

switch# show bluetooth

Enabled

: No

Device name

: <XXXX>-<NNNNNNNNNN>

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show boot-history
show boot-history [all|{vsf member <1-10>}]
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2806

Shows boot history information. When no parameters are specified, shows the most recent information about the current boot operation, and the three previous boot operations for the switch. When the all parameter is specified, the output of this command shows the boot information for the active management module. For switches that support line modules (such as 6400 switch series) including the all parameter displays information for the active management module and all available line modules.
To view boot-history on a standby, the command must be sent on the conductor console.

Parameter all
vsf member <1-10>

Description
Optional. Shows boot information for the active management module. For switches that support line modules, including this parameter displays information for and all available line modules.
Optional. Display boot history for the specified VSF member

Usage
This command displays the boot-index, boot-ID, and up time in seconds for the current boot. If there is a previous boot, it displays boot-index, boot-ID, reboot time (based on the time zone configured in the system) and reboot reasons. Previous boot information is displayed in reverse chronological order. The output of this command includes the following information:

Parameter Index Boot ID Current Boot, up for <time>
<Timestamp>: boot reason

Description
The position of the boot in the history file. Range: 0 to 3.
A unique ID for the boot . A system-generated 128bit string.
For the current boot, the show boot-history command shows the number of seconds the module has been running on the current software.
For previous boot operations, the show boothistory command shows the time at which the operation occurred and the reason for the boot. The reason for the boot is one of the following values: n <DAEMON-NAME> crash: The daemon identified
by <DAEMON-NAME> caused the module to boot. n Kernel crash: The operating system software
associated with the module caused the module to boot. n Uncontrolled reboot: The reason for the reboot is not known. n Reboot requested through database: The reboot occurred because of a request made through the CLI or other API. For details, see , show boot-history

Switch system and hardware commands | 2807

Table 1: Description of reboots handled through the database

Boot History String

Description

Reboot requested by user

A user requested a switch reboot through the CLI or web UI.

Reset button pressed

The switch detected a short-press of the reset button

Backplane fault

A backplane fault occurred.

Configuration change

A configuration change resulted in a reboot.

Configuration version migration

A configuration version migration occurred which required a reboot.

Console error

The console failed to start.

Fabric fault

A fabric fault occurred.

All line modules faulted

A zero line card condition occurred.

Redundancy switchover requested

A user requested a redundancy switchover.

Redundant Management communication timeout

The standby management module has taken over from an unresponsive active management module.

Redundant Management election timeout

A failure to elect a standby management module in the allotted time.

Critical service fault (error)

A daemon critical to switch operation has stopped functioning. An extra error string may be present to describe the error in detail.

VSF autojoin renumber

Reset triggered by VSF autojoin.

VSF member renumbered

A user requested a renumber of a VSF member.

VSF switchover requested

A user requested a VSF switchover.

VSX software update

Reset triggered by a VSX software update.

Chassis critical temperature Chassis operating temperature exceeded.

Chassis low critical temperature

Chassis temperature below the minimum operating threshold.

Chassis insufficient fans

Insufficient fans to cool the chassis.

Chassis unsupported PSUs/fans

Unsupported or misconfigured PSUs or system fans.

Management module critical Management module operating temperature exceeded. temperature

ISSU SMM update

Standby management module reboot triggered by an In-Service Software Upgrade (ISSU).

ISSU switchover

Redundancy switchover triggered by an In-Service Software Upgrade.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2808

Boot History String ISSU aborted
Rollback timer expired

Description
Standby management module reset triggered by failure during an In-Service Software Upgrade.
Reset triggered by the ISSU rollback timer expiring.

Examples
Showing the boot history of the active management module:

switch# show boot-history Management module =================
Index : 2 Boot ID : c34a2c2499004a02bbeeff4992e1fdbd Current Boot, up for 1 days 13 hrs 13 mins 27 secs
Index : 1 Boot ID : bfba9bc486304e57904ac717a0ccbdcd 02 Sep 23 02:55:33 : CPU request reset with 0x20201, Version: FL.10.14.0000-1619ga9ec1805bd442~dirty 02 Sep 23 02:55:33 : Switch boot count is 2
Index : 0 Boot ID : a88a71b7ca9a4574af7e3b811ddfdc7e 02 Sep 23 02:49:26 : Reboot requested by user, Version: FL.10.14.0000-1619ga9ec1805bd442~dirty 02 Sep 23 02:50:02 : Switch boot count is 1
Index : 3 Boot ID : f00ba10c8c44457f83fee303d014a89a 25 Aug 23 10:27:42 : Power on reset with 0x1, Version: FL.10.14.0000-1465g9df95249d06b0~dirty 25 Aug 23 10:28:18 : Switch boot count is 3 25 Aug 23 10:29:02 : Primary overtemperature fault detected with 0x2 in PSU 1/1

(For 6400 Switch series) Showing the boot history of the active management module and all line modules:

switch# Management module =================
Index : 3 Boot ID : f1bf071bdd04492bbf8439c6e479d612 Current Boot, up for 22 hrs 12 mins 22 secs
Index : 2 Boot ID : edfa2d6598d24e989668306c4a56a06d 07 Aug 18 16:28:01 : Reboot requested through database
Index : 1 Boot ID : 0bda8d0361df4a7e8e3acdc1dba5caad 07 Aug 18 14:08:46 : Reboot requested through database
Index : 0 Boot ID : 23da2b0e26d048d7b3f4b6721b69c110

Switch system and hardware commands | 2809

07 Aug 18 13:00:46 : Reboot requested through database
Line module 1/1 ================= Index : 3 10 Aug 17 12:45:46 : dune_agent crashed ...
Management module =================
Index : 3 Boot ID : f1bf071bdd04492bbf8439c6e479d612 Current Boot, up for 22 hrs 12 mins 22 secs
Index : 2 Boot ID : edfa2d6598d24e989668306c4a56a06d 07 Aug 18 16:28:01 : Reboot requested through database
Index : 1 Boot ID : 0bda8d0361df4a7e8e3acdc1dba5caad 07 Aug 18 14:08:46 : Reboot requested through database
Index : 0 Boot ID : 23da2b0e26d048d7b3f4b6721b69c110 07 Aug 18 13:00:46 : Reboot requested through database
Line module 1/1 ================= Index : 3 10 Aug 17 12:45:46 : dune_agent crashed ...
In the event of a reset triggered by a power supply unit (PSU), or a PSU input fault, the output of this command also displays information about why the PSU initiated a reboot. The following example displays the boot history of a switch with a reboot initiated by a PSU.
switch# show boot-history
Management module ================= Index : 2 Boot ID : a61ad00d10864c748bc7893a5d4af2e4 15 Dec 23 19:02:02 : Power on reset with 0x1, Version: FL.10.13.1000AF
15 Dec 23 19:02:02 : Switch boot count is 0 15 Dec 23 19:02:17 : PSU 1/1: Fault detected
Index : 1 Boot ID : 30d831bbfdfa425baf50a629ee01b185 15 Dec 23 19:01:58 : Power on reset with 0x1, Version: FL.10.13.1000AF 15 Dec 23 19:01:58 : Switch boot count is 0
The following example displays the boot history for the VSF member 2.
switch# show boot-history vsf member 2
Member-2 =========

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2810

Index : 0 Boot ID : df99026c194a44f1944a3e7685fb4d90 Current Boot, up for 3 hrs 31 mins 39 secs
Index : 3 Boot ID : 7bf4104903fe4ad1ba4bce40e8099c76 10 Aug 17 10:02:24 : Reboot requested through database 10 Aug 17 10:02:13 : Switch boot count is 2

For more information on features that use this command, refer to the Fundamentals Guide or the Monitoring Guide for your switch model.

Command History
Release 10.13.1000

10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification The output of this command is enhanced to display additional information about the reason for the reboot, if available. --
Authority Administrators or local user group members with execution rights for this command.

show capacities
show capacities <FEATURE> [vsx-peer]
Description
Shows system capacities and their values for all features or a specific feature.

Parameter <FEATURE> vsx-peer

Description
Specifies a feature. For example, aaa or vrrp.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
Capacities are expressed in user-understandable terms. Thus they may not map to a specific hardware or software resource or component. They are not intended to define a feature exhaustively.
Examples
Showing all available capacities for BGP:

Switch system and hardware commands | 2811

switch# show capacities bgp

System Capacities: Filter BGP

Capacities Name

Value

----------------------------------------------------------------------------------

-

Maximum number of AS numbers in as-path attribute

32

...

Showing all available capacities for mirroring:

switch# show capacities mirroring

System Capacities: Filter Mirroring

Capacities Name

Value

----------------------------------------------------------------------------------

-

Maximum number of Mirror Sessions configurable in a system

4

Maximum number of enabled Mirror Sessions in a system

4

Showing all available capacities for MSTP:

switch# show capacities mstp

System Capacities: Filter MSTP

Capacities Name

Value

----------------------------------------------------------------------------------

-

Maximum number of mstp instances configurable in a system

64

Showing all available capacities for VLAN count:

switch# show capacities vlan-count

System Capacities: Filter VLAN Count

Capacities Name

Value

----------------------------------------------------------------------------------

-

Maximum number of VLANs supported in the system

4094

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2812

Command Information

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show capacities-status
show capacities-status <FEATURE> [vsx-peer]
Description
Shows system capacities status and their values for all features or a specific feature.

Parameter <FEATURE>
vsx-peer

Description
Specifies the feature, for example aaa or vrrp for which to display capacities, values, and status. Required.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing the system capacities status for all features:

switch# show capacities-status

System Capacities Status

Capacities Status Name

Value Maximum

------------------------------------------------------------------------------

Number of active gateway mac addresses in a system

0

16

Number of aspath-lists configured

0

64

Number of community-lists configured

0

64

...

Showing the system capacities status for BGP:

switch# show capacities-status bgp

System Capacities Status: Filter BGP

Capacities Status Name

Value Maximum

-------------------------------------------------------------------------------

Number of aspath-lists configured

0

64

Number of community-lists configured

0

64

Number of neighbors configured across all VRFs

0

50

Number of peer groups configured across all VRFs

0

25

Number of prefix-lists configured

0

64

Number of route-maps configured

0

64

Number of routes in BGP RIB

0 256000

Number of route reflector clients configured across all VRFs

0

16

Switch system and hardware commands | 2813

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show console
show console
Description
Shows the serial console port current speed.
Examples
Showing the console port current speed:
switch# show console Baud Rate: 9600

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.08

Modification Command introduced

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2814

show core-dump
show core-dump [all | <SLOT-ID>]
Description
Shows core dump information about the specified module. When no parameters are specified, shows only the core dumps generated in the current boot of the management module. When the all parameter is specified, shows all available core dumps.

Parameter all <SLOT-ID>

Description
Shows all available core dumps.
Shows the core dumps for the management module or line module in <SLOT-ID>. <SLOT-ID> specifies a physical location on the switch. Use the format member/slot/port (for example, 1/3/1) for line modules. Use the format member/slot for management modules. You must specify the slot ID for either the active management module, or the line module.

Usage
When no parameters are specified, the show core-dump command shows only the core dumps generated in the current boot of the management module. You can use this command to determine when any crashes are occurring in the current boot.
If no core dumps have occurred, the following message is displayed: No core dumps are present
To show core dump information for the standby management module, you must use the standby command to switch to the standby management module and then execute the show core-dump command.
In the output, the meaning of the information is the following: Daemon Name Identifies name of the daemon for which there is dump information. Instance ID Identifies the specific instance of the daemon shown in the Daemon Name column. Present Indicates the status of the core dump: Yes The core dump has completed and available for copying. In Progress Core dump generation is in progress. Do not attempt to copy this core dump. Timestamp Indicates the time the daemon crash occurred. The time is the local time using the time zone configured on the switch. Build ID Identifies additional information about the software image associated with the daemon.
Examples
Showing core dump information for the current boot of the active management module only:

Switch system and hardware commands | 2815

switch# show core-dump

==================================================================================

Daemon Name

| Instance ID | Present | Timestamp

| Build ID

==================================================================================

hpe-fand

1399

Yes

2017-08-04 19:05:34

1246d2a

hpe-sysmond

957

Yes

2017-08-04 19:05:29

1246d2a

==================================================================================

Total number of core dumps : 2

==================================================================================

==================================================================================

Daemon Name

| Instance ID | Present | Timestamp

| Build ID

==================================================================================

hpe-fand

1399

Yes

2017-08-04 19:05:34

1246d2a

hpe-sysmond

957

Yes

2017-08-04 19:05:29

1246d2a

==================================================================================

Total number of core dumps : 2

==================================================================================

Showing all core dumps:

switch# show core-dump all

=============================================================================

Management Module core-dumps

=============================================================================

Daemon Name

| Instance ID | Present | Timestamp

| Build ID

=============================================================================

hpe-sysmond

513

Yes

2017-07-31 13:58:05 e70f101

hpe-tempd

1048

Yes

2017-08-13 13:31:53 e70f101

hpe-tempd

1052

Yes

2017-08-13 13:41:44 e70f101

Line Module core-dumps

=============================================================================

Line Module : 1/1

=============================================================================

dune_agent_0

18958

Yes

2017-08-12 11:50:17 e70f101

dune_agent_0

18842

Yes

2017-08-12 11:50:09 e70f101

=============================================================================

Total number of core dumps : 5

=============================================================================

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2816

show deprecated commands
show deprecated-commands [<feature>]
Description
Shows the list of CLI commands that will be deprecated in a future release along with the new form of the same command which is recommended for use. Both the command options will be supported until a certain release, after which only the newer replacement command will be supported.

Parameter feature

Description
Optional. Specify feature name. The list of features for which you can view deprecated commands are: n bgp n dsnoop n ipfix n lldp n ndmd n ptp n qos n routing n snmp n tunnel n vlan n vrf n vrrp

Examples
Check the deprecated CLI commands for a specific feature:

switch# show deprecated-commands -------------------------------------------------------------------------------------------The following commands with ipv4 keyword will be replaced with ip --------------------------------------------------------------------------------------------
Deprecated: vrrp <1-255> address-family (ipv4 | ipv6) Replacement: vrrp <1-255> address-family (ip | ipv6)
Deprecated: show bgp ipv4 unicast Replacement: show bgp ip unicast ...
switch# show deprecated-commands vrrp -------------------------------------------------------------------------------------------The following commands with ipv4 keyword will be replaced with ip --------------------------------------------------------------------------------------------
Deprecated: vrrp <1-255> address-family (ipv4 | ipv6)

Switch system and hardware commands | 2817

Replacement: vrrp <1-255> address-family (ip | ipv6)
Deprecated: show vrrp (ipv4 | ipv6 | brief | detail)(<1-255>) Replacement: show vrrp (ip | ipv6 | brief | detail)(<1-255>) ...
switch# show deprecated-commands vsf Feature vsf has no deprecated commands.

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.14

Modification Command introduced.

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show domain-name
show domain-name [vsx-peer]
Description
Shows the current domain name.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
If there is no domain name configured, the CLI displays a blank line.
Example
Setting and showing the domain name:

switch# show domain-name switch# config

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2818

switch(config)# domain-name example.com switch(config)# show domain-name example.com switch(config)#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show environment fan
show environment fan [vsf | vsx-peer]
Description
Shows the status information for all fans and fan trays (if present) in the system.

Parameter vsf
vsx-peer

Description
Shows output from the VSF member-id on switches that support VSF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
For fan trays, Status is one of the following values:
n ready:The fan tray is operating normally. n fault:The fan tray is in a fault event. The status of the fan tray does not indicate the status of fans. n empty:The fan tray is not installed in the system.
For fans: Speed :Indicates the relative speed of the fan based on the nominal speed range of the fan. Values are:
Slow:The fan is running at less than 25% of its maximum speed. Normal:The fan is running at 25-49% of its maximum speed.

Switch system and hardware commands | 2819

Medium:The fan is running at 50-74% of its maximum speed. Fast:The fan is running at 75-99% of its maximum speed. Max:The fan is running at 100% of its maximum speed. N/A:The fan is not installed. Direction: The direction of airflow through the fan. Values are: front-to-back:Air flows from the front of the system to the back of the system. N/A:The fan is not installed. Status: Fan status. Values are: uninitialized:The fan has not completed initialization. ok: The fan is operating normally. fault: The fan is in a fault state. empty: The fan is not installed.
Examples
Showing output for systems with fan trays for 6300 switch series:

switch# show environment fanFan tray information

-------------------------------------------

-----------------------------------

Name Description Status Serial Number

Fans

-------------------------------------------

-----------------------------------

1/1 JL669A Aruba X751 FB Fan Tray ready

CN97KN9131 2

1/2 JL669A Aru

---------------------------------------------------------------------------

1/1/1

N/A

N/A

slow front-to-back ok

5371

1/1/2

N/A

N/A

slow front-to-back ok

5320

1/1/3

N/A

N/A

slow front-to-back ok

5328

1/1/4

N/A

N/A

slow front-to-back ok

5256

1/2/1

N/A

N/A

slow front-to-back ok

5371

1/2/2

N/A

N/A

slow front-to-back ok

5349

1/2/3

N/A

N/A

slow front-to-back ok

5292

1/2/4

N/A

N/A

slow front-to-back ok

5349

1/3/1

N/A

N/A

slow front-to-back ok

5313

1/3/2

N/A

N/A

slow front-to-back ok

5371

1/3/3

N/A

N/A

slow front-to-back ok

5379

1/3/4

N/A

N/A

slow front-to-back ok

5379

1/4/1

N/A

N/A

slow front-to-back ok

5313

1/4/2

N/A

N/A

slow front-to-back ok

5299

1/4/3

N/A

N/A

slow front-to-back ok

5285

1/4/4

N/A

N/A

slow front-to-back ok

5371

Showing output for a system without a fan tray:

switch# show environment fan

Fan information

---------------------------------------------------------------

Fan Serial Number Speed Direction

Status

RPM

---------------------------------------------------------------

1

SGXXXXXXXXXX slow front-to-back ok

6000

2

SGXXXXXXXXXX normal front-to-back ok

8000

3

SGXXXXXXXXXX medium front-to-back ok

11000

4

SGXXXXXXXXXX fast front-to-back ok

14000

5

SGXXXXXXXXXX max

front-to-back fault

16500

6

N/A

N/A

N/A

empty

...

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2820

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show environment led
show environment led <MEMBER-ID> [vsx-peer]
Description
Shows state and status information for all the configurable LEDs in the system.

Parameter <MEMBER-ID>
vsx-peer

Description
Shows output from the specified VSF member ID on switches that support VSF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing state and status for LED:

switch# show environment led

Mbr/Name

State

Status

-------------------------------

1/locator

off

ok

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

Switch system and hardware commands | 2821

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show environment power-consumption
show environment power-consumption <DETAIL> show environment power-consumption member <MEMBER-ID>
Description
Displays power consumption information.

Parameter <DETAIL> <MEMBER-ID>

Description
Displays detailed power consumption information.
For VSF supported platforms only. Displays the power consumption information for the specified VSF member. Range: 110.

Usage
Power consumed values are updated every minute. The total power consumed is the total power used in a chasis. The power consumed average is calculated from the total power consumed as a running average over a period of time. The average period has a default of 10 minutes. The period can be configured using power-consumption-average-period. For VSF supported platforms, this command displays the power consumed for all modules of the member in a given argument. The following information is provided for a summary of power consumption:
n line module: power used by line module n management module: power used by management module n fabric module: power used by fabric module n chassis module: power used by chassis module n fan module: power used by fan module n power total: total power consumption n average power: average for total power consumption that is calculated over a given period n average period: time to calculate power average
Example
Showing the power consumption for a switch with a single line card:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2822

switch# show environment power-consumption

Power Consumption Averaging Period: 60 seconds

Name

Description

Instantaneous Power (W)

Average Power (W)

----------------------------------------------------------------------------

1

8360-32YAC Switch

300.00

311.50

Showing the power consumption for a VSF stack:

switch# show environment power-consumption

Power Consumption Averaging Period: 60 seconds

Name

Description

Instantaneous Power (W) Average Power (W)

---------------------------------------------------------------------------------

1

6200M 24G 24G 4SPF+ SW

300.00

311.50

2

6200M 24G 24G 4SPF+ SW

280.00

275.50

Showing the power consumption for a switch with multiple line cards, in brief:

switch# show environment power-consumption

Power Consumption Averaging Period: 60 seconds

Name

Description

Instantaneous Power (W)

Average Power (W)

---------------------------------------------------------------------------

1

6410 v2 Chassis

1300.00

1311.50

Showing the power consumption for a switch with multiple line cards, in detail:

switch# show environment power-consumption detail

Power Consumption Averaging Period: 60 seconds

Name Module Type

Instantaneous Power (W)

Average Power (W)

-----------------------------------------------------------------------

1

chassis total

1000.00

1002.50

1/1

fabric

40.00

1/1

line

120.00

1/2

line

350.00

1/1

management

20.00

other

470.00

Showing the power consumption for 4 member stack, in detail:

switch# show environment power-consumption detail

Power Consumption Averaging Period: 60 seconds

Name Module Type

Instantaneous Power (W)

Average Power (W)

-----------------------------------------------------------------------

1

chassis total

300.00

302.50

2

chassis total

320.00

319.50

3

chassis total

280.00

282.50

4

chassis total

310.00

311.50

Switch system and hardware commands | 2823

Total power consumption 1210.00

Showing the power consumption for VSF member 2:

switch# show environment power-consumption member 2

Power Consumption Averaging Period: 60 seconds

Name Module Type

Instantaneous Power (W)

Average Power (W)

-------------------------------------------------------------------------

2

6200M 24G 4SFP+ SW

280.00

275.00

Showing the power consumption for VSF invalid member:

switch# show environment power-consumption member 5 Member 5 is not present

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.13

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show environment power-consumption
Not supported on the 6300 Switch Series. show environment power-consumption [vsx-peer]
Description
Shows the power being consumed by each management module, line card, and fabric card subsystem, and shows power consumption for the entire chassis.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2824

Usage
This command is only applicable to systems that support power consumption readings. The power consumption values are updated once every minute. The output of this command includes the following information:

Parameter Name Type Description Usage Module Total Power Usage Chassis Total Power Usage
Chassis Total Power Available Chassis Total Power Allocated Chassis Total Power Unallocated

Description
Shows the member number and slot number of the management module, line module, or fabric card module.
Shows the type of module installed at the location specified by Name.
Shows the product name and brief description of the module.
Shows the instantaneous power consumption of the module. Power consumption is shown in Watts.
Shows the total power consumption of all the modules listed. Power consumption is shown in Watts.
Shows the total instantaneous power consumed by the entire chassis, including modules and components that do not support individual power reporting. Power consumption is shown in Watts.
Shows the total amount of power, in Watts, that can be supplied to the chassis.
Shows total power, in Watts, that is allocated to powering the chassis and its installed modules.
Shows the total amount of power, in Watts, that has not been allocated to powering the chassis or its installed modules. This power can be used for additional hardware you install in the chassis.

Example
Showing the power consumption for an Aruba 6400 switch:

switch> show environment power-consumption

Power

Name Type

Description

Usage

------------------------------------------------------------------------------

1/1

management-module R0X31A 6400 Management Module

18 W

1/2

management-module

0W

1/3

line-card-module

0W

1/4

line-card-module R0X39A 6400 48p 1GbE CL4 PoE 4SFP56 Mod 54 W

1/5

line-card-module

0W

1/6

line-card-module R0X39A 6400 48p 1GbE CL4 PoE 4SFP56 Mod 56 W

1/7

line-card-module R0X39A 6400 48p 1GbE CL4 PoE 4SFP56 Mod 51 W

1/1

fabric-card-module R0X24A 6405 Chassis

71 W

Module Total Power Usage

250 W

Switch system and hardware commands | 2825

Chassis Total Power Usage Chassis Total Power Available

294 W 1800 W

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show environment power-supply
show environment power-supply [vsf | vsx-peer]
Description
Shows status information about all power supplies in the switch.

Parameter vsf vsx-peer

Description
Shows output from the VSF member-id on switches that support VSF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
The following information is provided for each power supply:

Parameter Mbr/PSU

Description Shows the member and slot number of the power supply.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2826

Parameter Product Number Serial Number
PSU Status

Description
Shows the product number of the power supply.
Shows the serial number of the power supply, which uniquely identifies the power supply.
The status of the power supply. Values are: n OK:Power supply is operating normally. n OK*: Power supply is operating normally, but it is the only power supply in the
chassis. One power supply is not sufficient to supply full power to the switch. When this value is shown, the output of the command also shows a message at the end of the displayed data. n Absent: No power supply is installed in the specified slot. n Input fault: The power supply has a fault condition on its input. n Output fault: The power supply has a fault condition on its output. n Warning: The power supply is not operating normally. n Wattage Maximum: Shows the maximum amount of wattage that the power supply can provide.

Example
Showing the output when only one power supply is installed in an Aruba 6400 switch chassis:

switch# show environment power-supply

Product Serial

PSU

Wattage

Mbr/PSU Number Number

Status

Maximum

--------------------------------------------------------------

1/1

R0X36A CN91KMM2H3

OK

3000

1/2

N/A

N/A

Absent

0

1/3

N/A

N/A

Absent

0

1/4

N/A

N/A

Absent

0

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

Switch system and hardware commands | 2827

show environment rear-display-module
show environment rear-display-module [vsx-peer]
Description
Shows information about the display module on the back of the switch.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing the rear display module information on the back of the switch:

switch> show environment rear-display-module
Rear display module is ready Description: 8400 Rear Display Mod Full Description: 8400 Rear Display Module Serial number: SG00000000 Part number: 5300_0272

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show environment temperature
show environment temperature [detail] [vsf | vsx-peer]
Description
Shows the temperature information from sensors in the switch that affect fan control.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2828

Parameter detail vsf
vsx-peer

Description
Shows detailed information from each temperature sensor.
Shows output from the VSF member-id on switches that support VSF
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
Temperatures are shown in Celsius. Valid values for status are the following: \

Parameter normal max low_critical critical fault emergency

Description Sensor is within nominal temperature range. Highest temperature from this sensor. Lowest threshold temperature for this sensor. Highest threshold temperature for this sensor. Fault event for this sensor. Over temperature event for Over temperature event for this sensor.

Examples
Showing current temperature information for a 6300 switch:

switch# show environment temperature

Temperature information

------------------------------------------------------------------------------

Current

Mbr/Slot-Sensor

Module Type

temperature Status

------------------------------------------------------------------------------

1/1-PHY-01-04

line-card-module

45.00 C normal

1/1-PHY-05-08

line-card-module

45.00 C normal

1/1-PHY-09-12

line-card-module

46.00 C normal

1/1-PHY-13-16

line-card-module

47.00 C normal

1/1-PHY-17-20

line-card-module

47.00 C normal

1/1-PHY-21-24

line-card-module

50.00 C normal

1/1-PHY-25-28

line-card-module

45.00 C normal

1/1-PHY-29-32

line-card-module

47.00 C normal

1/1-PHY-33-36

line-card-module

48.00 C normal

1/1-PHY-37-40

line-card-module

47.00 C normal

1/1-PHY-41-44

line-card-module

48.00 C normal

1/1-PHY-45-48

line-card-module

49.00 C normal

1/1-Switch-ASIC-Internal

line-card-module

56.25 C normal

1/1-CPU-Zone-0 1/1-CPU-Zone-1

management-module management-module

50.00 C 50.00 C

normal normal

Switch system and hardware commands | 2829

1/1-CPU-Zone-2 1/1-CPU-Zone-3 1/1-CPU-Zone-4 1/1-CPU-diode 1/1-DDR 1/1-Inlet-Air 1/1-MB-IBC 1/1-Switch-ASIC-diode

management-module management-module management-module management-module management-module management-module management-module management-module

50.00 C 51.00 C 51.00 C 53.12 C 45.25 C 24.88 C 45.62 C 58.06 C

normal normal normal normal normal normal normal normal

Showing detailed temperature information for a 6300 switch:

switch# show environment temperature detail

Detailed temperature information

----------------------------------------------------------------

Mbr/Slot-Sensor

: 1/1-PHY-01-04

Module Type

: line-card-module

Module Description : JL659A 6300M 48SR5 CL6 PoE 4SFP56 Swch

Status

: normal

Fan-state

: normal

Current temperature : 45.00 C

Minimum temperature : 41.00 C

Maximum temperature : 50.00 C

Mbr/Slot-Sensor Module Type Module Description Status Fan-state Current temperature Minimum temperature Maximum temperature

: 1/1-PHY-05-08 : line-card-module : JL659A 6300M 48SR5 CL6 PoE 4SFP56 Swch : normal : normal : 45.00 C : 41.00 C : 50.00 C

...

Detailed temperature information

----------------------------------------------------------------

Mbr/Slot-Sensor

: 1/1-PHY-01-04

Module Type

: line-card-module

Module Description : JL659A 6300M 48SR5 CL6 PoE 4SFP56 Swch

Status

: normal

Fan-state

: normal

Current temperature : 45.00 C

Minimum temperature : 41.00 C

Maximum temperature : 50.00 C

Mbr/Slot-Sensor Module Type Module Description Status Fan-state Current temperature Minimum temperature Maximum temperature

: 1/1-PHY-05-08 : line-card-module : JL659A 6300M 48SR5 CL6 PoE 4SFP56 Swch : normal : normal : 45.00 C : 41.00 C : 50.00 C

...

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2830

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show events
show events [ -e <EVENT-ID> | -s {emergency | alert | critical | error | warning | notice | info | debug} | -r | -a | -n <COUNT> | -i <MEMBER-SLOT> | -m {active | standby} | -c {lldp | ospf | ...} | -d {lldpd | bgpd | fand | ...}]
Description
Shows event logs generated by the switch modules since the last reboot.

Parameter -e <EVENT-ID> -s {emergency | alert | critical |
error | warning | notice | info | debug}
-r -a -n <COUNT>

Description
Shows the event logs for the specified event ID. Event ID range: 101 through 99999.
Shows the event logs for the specified severity. Select the severity from the following list: n emergency: Displays event logs with severity emergency
only. n alert: Displays event logs with severity alert and above. n critical: Displays event logs with severity critical and
above. n error: Displays event logs with severity error and above. n warning: Displays event logs with severity warning and
above. n notice: Displays event logs with severity notice and
above. n info: Displays event logs with severity info and above. n debug: Displays event logs with all severities.
Shows the most recent event logs first.
Shows all event logs, including those events from previous boots.
Displays the specified number of event logs.

Switch system and hardware commands | 2831

Parameter -i <MEMBER-SLOT> -i <MEMBER-SLOT> -m {active | standby}
-m {active | standby}
-c {lldp | ospf | ...} -d {lldpd | bgpd | fand | ...}

Description
On a 6400: Shows the event logs for the specified slot ID.
On a 6300: Shows the event logs for the specified VSF member ID.
On a 6400: Shows the event logs for the specified management card role. Selecting active displays the event log for the AMM management card role and standby displays event logs for the SMM management card role.
On a 6300: Shows the event logs for the specified role. Selecting active displays the event log for the VSF conductor role and standby displays event logs for the VSF standby role.
Shows the event logs for the specified event category. Enter show event -c for a full listing of supported categories with descriptions.
Shows the event logs for the specified process. Enter show event -d for a full listing of supported daemons with descriptions.

Examples
Showing event logs:

switch# show events --------------------------------------------------show event logs --------------------------------------------------2016-12-01:12:37:31.733551|lacpd|15007|INFO|AMM|1|LACP system ID set to
70:72:cf:51:50:7c 2016-12-01:12:37:31.734541|intfd|4001|INFO|AMM|1|Interface port_admin set to
up for bridge_normal interface 2016-12-01:12:37:32.583256|switchd|24002|ERR|AMM|1|Failed to create VLAN 1
in Hardware

Showing the most recent event logs first:

switch# show events -r --------------------------------------------------show event logs --------------------------------------------------2016-12-01:12:37:32.583256|switchd|24002|ERR|AMM|1|Failed to create VLAN 1
in Hardware 2016-12-01:12:37:31.734541|intfd|4001|INFO|AMM|1|Interface port_admin set to
up for bridge_normal interface 2016-12-01:12:37:31.733551|lacpd|15007|INFO|AMM|1|LACP system ID set to
70:72:cf:51:50:7c

Showing all event logs:

switch# show events -a ---------------------------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2832

show event logs --------------------------------------------------2016-12-01:12:37:31.733551|lacpd|15007|INFO|AMM|1|LACP system ID set to
70:72:cf:51:50:7c 2016-12-01:12:37:31.734541|intfd|4001|INFO|AMM|1|Interface port_admin set to
up for bridge_normal interface 2016-12-01:12:37:32.583256|switchd|24002|ERR|AMM|1|Failed to create VLAN 1
in Hardware
Showing event logs related to LACP:
switch# show events -c lacp --------------------------------------------------show event logs --------------------------------------------------2016-12-01:12:37:31.733551|lacpd|15007|INFO|AMM|1|LACP system ID set to
70:72:cf:51:50:7c
Showing event logs as per the specified management card role for a 6400 switch:
switch# show events -m active --------------------------------------------------show event logs --------------------------------------------------2016-12-01:12:37:31.733551|lacpd|15007|INFO|AMM|1|LACP system ID set to
70:72:cf:51:50:7c 2016-12-01:12:37:31.734541|intfd|4001|INFO|AMM|1|Interface port_admin set to
up for bridge_normal interface 2016-12-01:12:37:32.583256|switchd|24002|ERR|AMM|1|Failed to create VLAN 1
in Hardware
Showing event logs as per the specified member/slot ID:
switch# show events -i 1/1 --------------------------------------------------show event logs --------------------------------------------------2017-08-17:22:32:25.743991|hpe-sysmond|6301|LOG_INFO|LC|1/1|System resource
utilization poll interval is changed to 313 2017-08-17:22:33:01.692860|hpe-sysmond|6301|LOG_INFO|LC|1/1|System resource
utilization poll interval is changed to 23 2017-08-17:22:33:06.181436|hpe-sysmond|6301|LOG_INFO|LC|1/1|System resource
utilization poll interval is changed to 512 2017-08-17:22:33:06.181436|systemd-coredump|1201|LOG_CRIT|LC|1/1|hpe-sysmond
crashed due to signal:11
Showing event logs as per the specified process:
switch# show events -d lacpd --------------------------------------------------show event logs --------------------------------------------------2016-12-01:12:37:31.733551|lacpd|15007|INFO|AMM|1|LACP system ID set to
70:72:cf:51:50:7c
Displaying the specified number of event logs:
Switch system and hardware commands | 2833

switch# show events -n 5 --------------------------------------------------show event logs --------------------------------------------------2018-03-21:06:12:15.500603|arpmgrd|6101|LOG_INFO|AMM|-|ARPMGRD daemon has started 2018-03-21:06:12:17.734405|lldpd|109|LOG_INFO|AMM|-|Configured LLDP tx-delay to 2 2018-03-21:06:12:17.740517|lacpd|1307|LOG_INFO|AMM|-|LACP system ID set to
70:72:cf:d4:34:42 2018-03-21:06:12:17.743491|vrfmgrd|5401|LOG_INFO|AMM|-|Created a vrf entity
42cc3df7-1113-412f-b5cb-e8227b8c22f2 2018-03-21:06:12:17.904008|vrfmgrd|5401|LOG_INFO|AMM|-|Created a vrf entity
4409133e-2071-4ab8-adfe-f9662c06b889

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Auditors or Administrators or local user group members with execution rights for this command. Auditors can execute this command from the auditor context (auditor>) only.

show fabric
Not supported on the 6300 Switch Series. show fabric [<SLOT-ID>] [vsx-peer]
Description
Shows information about the installed fabrics.

Parameter <SLOT-ID>
vsx-peer

Description
Specifies the member and slot of the fabric to show. For example, to show the module in member 1, slot 2, enter the following: 1/2
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing all fabrics on Aruba 6400 switches that have two fabrics:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2834

switch# show fabric

Fabric Modules ==============

Product Name Number Description ---- ------- -------------------------------1/1 R0X25A 6410 Chassis 1/2 R0X25A 6410 Chassis

Serial

Number

Status

---------- ----------------

SG9ZKM9999 Ready

SG9ZKM9999 Ready

Showing all fabrics on Aruba 6400 switches that have one fabric:

switch# show fabric

Fabric Modules ==============

Product

Serial

Name Number Description

Number

Status

---- ------- -------------------------------------- ---------- ----------------

1/1 R0X24A 6405 Chassis

SG9ZKM9076 Ready

Showing a single fabric module on Aruba 6400 switches:

switch# show fabric 1/1
Fabric module 1/1 is ready Admin state: Up Description: 6405 Chassis Full Description: 6405 Chassis Serial number: SG00000000 Product number: R0X24A

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show hostname

Switch system and hardware commands | 2835

show hostname [vsx-peer]
Description
Shows the current host name.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Setting and showing the host name:

switch# show hostname switch switch# config switch(config)# hostname myswitch myswitch(config)# show hostname

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show images
show images [vsx-peer]
Description
Shows information about the software in the primary and secondary images.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2836

Example
Showing the primary and secondary images on a 6300 switch:

switch(config)# show images --------------------------------------------------------------------------AOS-CX Primary Image --------------------------------------------------------------------------Version : FL.xx.xx.xxxx Size : 722 MB Date : 2019-10-22 17:00:46 PDT SHA-256 : 4c84e49c0961fc56b5c7eab064750a333f1050212b7ce2fab587d13469d24cfa

--------------------------------------------------------------------------Primary Image
--------------------------------------------------------------------------Version : FL.xx.xx.xxxx Size : 722 MB Date : 2019-10-22 17:00:46 PDT SHA-256 : 4c84e49c0961fc56b5c7eab064750a333f1050212b7ce2fab587d13469d24cfa

--------------------------------------------------------------------------AOS-CX Secondary Image --------------------------------------------------------------------------Version : FL.xx.xx.xxxx Size : 722 MB Date : 2019-10-22 17:00:46 PDT SHA-256 : 4c84e49c0961fc56b5c7eab064750a333f1050212b7ce2fab587d13469d24cfa

Default Image : secondary

------------------------------------------------------

Management Module 1/1 (Active)

------------------------------------------------------

Active Image

: secondary

Service OS Version : FL.01.05.0001-internal

BIOS Version

: FL.01.0001

Showing the primary and secondary images on a 6400 switch:

switch(config)# show images --------------------------------------------------------------------------AOS-CX Primary Image --------------------------------------------------------------------------Version : FL.xx.xx.xxxxQ-2710-gd4ac39f30c9 Size : 766 MB Date : 2019-10-30 17:22:01 PDT SHA-256 : e560ca9141f425d19024d122573c5ff730df2a9a726488212263b45ea00382cf
--------------------------------------------------------------------------AOS-CX Secondary Image --------------------------------------------------------------------------Version : FL.xx.xx.xxxx Size : 722 MB Date : 2019-10-21 19:36:26 PDT SHA-256 : 657e28adc1b512217ce780e3523c37c94db3d3420231deac1ab9aaa8324dc6b9
Default Image : secondary
-----------------------------------------------------Management Module 1/1 (Active)

Switch system and hardware commands | 2837

------------------------------------------------------

Active Image

: secondary

Service OS Version : FL.01.05.0001-internal

BIOS Version

: FL.01.0001

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ip errors
show ip errors [vsx-peer]
Description
Shows IP error statistics for packets received by the switch since the switch was last booted.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
IP error info about received packets is collected from each active line card on the switch and is preserved during failover events. Error counts are cleared when the switch is rebooted.
Drop reasons are the following:
n Malformed packet The packet does not conform to TCP/IP protocol standards such as packet length or internet header length. A large number of malformed packets can indicate that there are hardware malfunctions such as loose cables, network card malfunctions, or that a DOS (denial of service) attack is occurring.
n IP address error The packet has an error in the destination or source IP address. Examples of IP address errors include the following:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2838

o The source IP address and destination IP address are the same. o There is no destination IP address. o The source IP address is a multicast IP address. o The forwarding header of an IPv6 address is empty. o There is no source IP address for an IPv6 packet. n Invalid TTLs The TTL (time to live) value of the packet reached zero. The packet was discarded because it traversed the maximum number of hops permitted by the TTL value. TTLs are used to prevent packets from being circulated on the network endlessly.
Example
Showing ip error statistics for packets received by the switch:

switch# show ip errors

----------------------------------

Drop reason

Packets

----------------------------------

Malformed packets

1

IP address errors

10

...

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show module
show module [<SLOT-ID>] [vsx-peer]
Description
Shows information about installed line modules and management modules.

Parameter <SLOT-ID>

Description Specifies the member and slot numbers in format

Switch system and hardware commands | 2839

Parameter vsx-peer

Description
member/slot. For example, to show the module in member 1, slot 3, enter 1/3.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
Identifies and shows status information about the line modules and management modules that are installed in the switch.
If you use the <SLOT-ID> parameter to specify a slot that does not have a line module installed, a message similar to the following example is displayed:
Module 1/4 is not physically present.
To show the configuration information--if any--associated with that line module slot, use the show running-configuration command.
Status is one of the following values: Active This module is the active management module. Standby
This module is the standby management module. Deinitializing The module is being deinitialized. Diagnostic The module is in a state used for troubleshooting. Down The module is physically present but is powered down. Empty
The module hardware is not installed in the chassis. Failed The module has experienced an error and failed. Failover
This module is a fabric module or a line module, and it is in the process of connecting to the new active management module during a management module failover event. Initializing The module is being initialized. Present The module hardware is installed in the chassis. Ready The module is available for use. Updating A firmware update is being applied to the module.
Examples
Showing all installed modules on a 6300 switch:

switch(config)# show module
Management Modules ==================

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2840

Product

Serial

Name Number Description

Number

Status

---- ------- -------------------------------------- ---------- ----------------

1/1 JL659A 6300M 48SR5 CL6 PoE 4SFP56 Swch

ID9ZKHN090 Active (local)

Line Modules ============

Product

Serial

Name Number Description

Number

Status

---- ------- -------------------------------------- ---------- ----------------

1/1 JL659A 6300M 48SR5 CL6 PoE 4SFP56 Swch

ID9ZKHN090 Ready

Management Modules ==================

Product

Serial

Name Number Description

Number

Status

---- ------- -------------------------------------- ---------- ----------------

1/1 JL659A 6300M 48SR5 CL6 PoE 4SFP56 Swch

ID9ZKHN090 Active (local)

Line Modules ============

Product

Serial

Name Number Description

Number

Status

---- ------- -------------------------------------- ---------- ----------------

1/1 JL659A 6300M 48SR5 CL6 PoE 4SFP56 Swch

ID9ZKHN090 Ready

Showing a line module on a 6400 switch:
switch# show module 1/3
Line module 1/3 is ready Admin state: Up Description: 6400 24p 10GT 4SFP56 Mod Full Description: 6400 24-port 10GBASE-T and 4-port SFP56 Module Serial number: SG9ZKMS045 Product number: R0X42A Power priority: 128

Showing a slot that does not contain a line module:
switch(config)# show module 1/3 Module 1/3 is not physically present

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

Switch system and hardware commands | 2841

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config
show running-config [<FEATURE>] [all] [vsx-peer]
Description
Shows the current nondefault configuration running on the switch. No user information is displayed.

Parameter <FEATURE>
all vsx-peer

Description
Specifies the name of a feature. For a list of feature names, enter the show running-config command, followed by a space, followed by a question mark (?). When the json parameter is used, the vsx-peer parameter is not applicable.
Shows all default values for the current running configuration.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing the current running configuration:

switch> show running-config Current configuration: ! !Version AOS-CX 10.0X.XXXX ! lldp enable linecard-module LC1 part-number JL363A vrf green ! ! ! ! ! ! aaa authentication login default local aaa authorization commands default none ! !

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2842

! ! vlan 1
no shutdown vlan 20
no shutdown vlan 30
no shutdown interface 1/1/1
no shutdown no routing vlan access 30 interface 1/1/32 no shutdown no routing vlan access 20 interface bridge_normal-1 no shutdown interface bridge_normal-2 no shutdown interface vlan20 no shutdown vrf attach green ip address 20.0.0.44/24 ip ospf 1 area 0.0.0.0 ip pim-sparse enable
interface vlan30 no shutdown vrf attach green ip address 30.0.0.44/24 ip ospf 1 area 0.0.0.0 ip pim-sparse enable
ip pim-sparse hello-interval 100
Showing the current running configuration in json format:
switch> show running-config json Running-configuration in JSON: {
"Monitoring_Policy_Script": { "system_resource_monitor_mm1.1.0": { "Monitoring_Policy_Instance": { "system_resource_monitor_mm1.1.0/system_resource_monitor_
mm1.1.0.default": { "name": "system_resource_monitor_mm1.1.0.default", "origin": "system", "parameters_values": { "long_term_high_threshold": "70", "long_term_normal_threshold": "60", "long_term_time_period": "480", "medium_term_high_threshold": "80", "medium_term_normal_threshold": "60", "medium_term_time_period": "120", "short_term_high_threshold": "90", "short_term_normal_threshold": "80", "short_term_time_period": "5" }
} },
Switch system and hardware commands | 2843

... ... ... ...
Show the current running configuration without default values:
switch(config)# show running-config Current configuration: ! !Version AOS-CX Virtual.10.04.0000-6523-gbb15c03~dirty led locator on ! ! ! ! ! ! ! ! ! vlan 1 switch(config)# show running-config all Current configuration: ! !Version AOS-CX Virtual.10.04.0000-6523-gbb15c03~dirty led locator on ! ! ! ! ! ! ! ! ! vlan 1 switch(config)#
Show the current running configuration with default values:
switch(config)# snmp-server vrf mgmt switch(config)# show running-config Current configuration: ! !Version AOS-CX Virtual.10.04.0000-6523-gbb15c03~dirty led locator on ! ! ! ! snmp-server vrf mgmt ! ! ! ! ! vlan 1 switch(config)#
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2844

switch(config)# switch(config)# show running-config all Current configuration: ! !Version AOS-CX Virtual.10.04.0000-6523-gbb15c03~dirty led locator on ! ! ! ! snmp-server vrf mgmt snmp-server agent-port 161 snmp-server community public ! ! ! ! ! vlan 1 switch(config)#

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show running-config current-context
show running-config current-context
Description
Shows the current non-default configuration running on the switch in the current command context.
Usage
You can enter this command from the following configuration contexts:
n Any child of the global configuration (config) context. If the child context has instances--such as interfaces--you can enter the command in the context of a specific instance. Support for this command is provided for one level below the config context. For example, entering this command for a child of a child of the config context not supported. If you enter the command on a child of the config context, the current configuration of that context and the children of that context are

Switch system and hardware commands | 2845

displayed. n The global configuration (config) context. If you enter this command in the global configuration
(config) context, it shows the running configuration of the entire switch. Use the show runningconfiguration command instead.
Examples
On the 6400 Switch Series, interface identification differs. Showing the running configuration for the current interface:
switch(config-if)# show running-config current-context interface 1/1/1 vsx-sync qos vlans
no shutdown description Example interface vlan access 1 exit
Showing the current running configuration for the management interface:
switch(config-if-mgmt)# show running-config current-context interface mgmt
no shutdown ip static 10.0.0.1/24 default-gateway 10.0.0.8 nameserver 10.0.0.1
Showing the running configuration for the external storage share named nasfiles:
switch(config-external-storage-nasfiles)# show running-config current-context external-storage nasfiles
address 192.168.0.1 vrf default username nasuser password ciphertext AQBapalKj+XMsZumHEwIc9OR6YcOw5Z6Bh9rV+9ZtKDKzvbaBAAAAB1CTrM= type scp directory /home/nas enable switch(config-external-storage-nasfiles)#
Showing the running configuration for a context that does not have instances:
switch(config-vsx)# show run current-context vsx
inter-switch-link 1/1/1 role secondary vsx-sync sflow time
For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2846

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context
config or a child of config. See Usage.

Modification --
Authority Administrators or local user group members with execution rights for this command.

show startup-config
show startup-config [json]
Description
Shows the contents of the startup configuration.
Switches in the factory-default configuration do not have a startup configuration to display.

Parameter json

Description Display output in JSON format.

Examples
Showing the startup-configuration in non-JSON format for a 6300 switch:

switch(config)# show startup-config Startup configuration: ! !Version AOS-CX FL.xx.xx.xxxx !export-password: default hostname BLDG01-F1 user admin group administrators password ciphertext
AQBapWl8I2ZunZ43NE/8KlbQ7zYC4gTT6uSFYi6n6wyY9PdBYgAAACONCR/3+AcNvzRBch0DoG7W9z84Lp JA+6C9SKfNwCqi5/ nUPk/ZOvN91/EQXvPNkHtBtQWyYZqfkebbEH78VWRHfWZjApv4II9qmQfxpA79wEvzshdzZmuAKrm user ateam group administrators password ciphertext
AQBapcPqMXoF+H10NKrqAedXLvlSRwf4wUEL22hXGD6ZBhicYgAAAGsbh70DKg1u+Ze1wxgmDXjkGO3bse YiR3LKQg66vrfrqR/ M3oLlliPdZDnq9XMMvCL+7jBbYhYes8+uDxuSTh8kdkd/qj3lo5FUuC5fENgCjU0YI1l7qtU+YEnsj ! ! ! ! radius-server host 10.10.10.15 ! radius dyn-authorization enable ssh server vrf default ssh server vrf mgmt

Switch system and hardware commands | 2847

! ! ! ! ! router ospf 1
router-id 1.63.63.1 area 0.0.0.0 vlan 1 vlan 66 name vlan66 vlan 67 name vlan67 vlan 999 name vlan999 vlan 4000 spanning-tree interface mgmt no shutdown ip static 10.6.9.15/24 default-gateway 10.6.9.1
Showing the startup-configuration in JSON format:
switch# show startup-config json Startup configuration: {
"AAA_Server_Group": { "local": { "group_name": "local" }, "none": { "group_name": "none" }
}, ...

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show system error-counter-monitor

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2848

show system error-counter-monitor {basic <PORT-NUM> | extended} [vsx-peer]
Description
Shows error counter statistics.

Parameter basic <PORT-NUM>
extended

Description
Specifies a physical port on the switch. Use the format member/slot/port (for example, 1/3/1).
Shows statistics for all interfaces.

Examples
Showing error counter statistics for interface 1/1/1:

switch# show system error-counter-monitor basic 1/1/1

Interface error counter statistics for 1/1/1

Error Counter

Value

-----------------------------------------

EtherStatsOversizePkts

983

EtherStatsUndersizePkts

1024

EtherStatsJabbers

10

Dot3StatsAlignmentErrors

462

Dot3StatsFCSErrors

321

Dot3StatsLateCollisions

2024

EtherStatsFragments

121

Dot3StatsExcessiveCollisions

1025

IfInBroadcastPkts

2001

Showing error counter statistics for all interfaces:

switch# show system error-counter-monitor extended

Interface error counter statistics for 1/1/1

Error Counter

Value

-----------------------------------------

EtherStatsOversizePkts

983

EtherStatsUndersizePkts

1024

EtherStatsJabbers

10

Dot3StatsAlignmentErrors

462

Dot3StatsFCSErrors

321

Dot3StatsLateCollisions

2024

EtherStatsFragments

121

Dot3StatsExcessiveCollisions

1025

IfInBroadcastPkts

2001

...

...

Interface error counter statistics for 1/8/32

Error Counter

Value

-----------------------------------------

EtherStatsOversizePkts

0

...

Switch system and hardware commands | 2849

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show system
show system [serviceos password-prompt] [vsx-peer]
Description
Shows general status information about the system.

Parameter serviceos password-prompt vsx-peer

Description
Shows the Service OS password prompt status.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
CPU utilization represents the average utilization across all the CPU cores. System Description, System Contact, and System Location can be set with the snmp-server command. When vsx-peer is specified, the Up Time value is not shown because it is not synchronized between VSX peers.
Examples
Showing system information:

switch# show system Hostname System Description System Contact System Location
Vendor Product Name

: switch : switch description : contact : location
: Aruba : Xxxxxx ...

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2850

Chassis Serial Nbr Base MAC Address AOS-CX Version

: XXXXXXXXXX : xxxxxx-xxxxxx : XX.99.99.9999

Time Zone

: UTC

Up Time

: 1 week, 5 hours, 28 minutes

CPU Util (%)

:5

CPU Util (% avg 1 min) : 11

CPU Util (% avg 5 min) : 10

Memory Usage (%)

: 35

Showing the Service OS password prompt status:
switch# show system serviceos password-prompt password-prompt: disabled

Showing system information for a VSX primary and secondary (peer) switch:

switch# show system Hostname System Description System Contact System Location

: vsx-primary : switch description : contact : location

Vendor Product Name Chassis Serial Nbr Base MAC Address

: Aruba : Xxxxxx ... : XXXXXXXXXX : xxxxxx-xxxxxx

Hostname System Description System Contact System Location

: vsx-primary : switch description : contact : location

Vendor Product Name Chassis Serial Nbr Base MAC Address AOS-CX Version

: Aruba : Xxxxxx ... : XXXXXXXXXX : xxxxxx-xxxxxx : XX.99.99.9999

Time Zone

: UTC

Up Time

: 1 week, 2 hours, 15 minutes

CPU Util (%)

: 15

CPU Util (% avg 1 min) : 12

CPU Util (% avg 5 min) : 8

Memory Usage (%)

: 37

switch# show system vsx-peer

Hostname

: vsx-secondary

System Description

: switch description

System Contact

: contact

System Location

: location

Vendor Product Name Chassis Serial Nbr

: Aruba : Xxxxxx ... : XXXXXXXXXX

Switch system and hardware commands | 2851

Base MAC Address AOS-CX Version

: xxxxxx-xxxxxx : XX.99.99.9999

Time Zone

: UTC

CPU Util (%)

:7

CPU Util (% avg 1 min) : 13

CPU Util (% avg 5 min) : 9

Memory Usage (%)

: 32

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.12
10.07 or earlier

Modification
Added CPU Util (% avg 1 min) and CPU Util (% avg 5 min).
--

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show system resource-utilization
Applies to the 6300 Switch Series: show system resource-utilization [all | daemon <DAEMON-NAME>] |
standby | member <MEMBER-NUM>] [vsx-peer] Applies to the 6400 Switch Series: show system resource-utilization [all | daemon <DAEMON-NAME>] |
standby | module <SLOT-ID>] [vsx-peer]
Description
Shows the system resource utilization data.

Parameter all daemon <DAEMON-NAME>
standby

Description
Shows the resource utilization data for the entire switch.
Shows only the resource utilization data for the process identified by <DAEMON-NAME>.
Shows only the resource utilization data for the standby management module.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2852

Parameter member <MEMBER-NUM> module <SLOT-ID> vsx-peer

Description
(Applies to the 6300 Switch Series.) Shows only the resource utilization data for the VSF member identified by <MEMBER-NUM>.
(Applies to the 6400 Switch Series.) Shows only the resource utilization data for the line module identified by <SLOT-ID>.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
For a list of daemons that log events, enter show events -d ? from a switch prompt in the manager (#) context.
Examples
Showing system resource utilization data:

switch# show system resource-utilization

System Resources:

Processes

: 144

CPU usage(%)

: 10

CPU usage(% average over 1 minute) : 11

CPU usage(% average over 5 minute) : 15

Memory usage(%)

: 22

Open FD's

: 1358

Storage 1: Endurance utilization = 10-20% (mmc-type-a), 0-10% (mmc-type-b),

Health = normal

Data written to various partitions since boot

Nos

: 5 MB

Log

: 1 MB

Coredump : 23 MB

Security : 2 MB

Selftest : 405 KB

Swap

: 14 MB

Storage partition usage(%)

Nos

:5

Log

: 60

Coredump : 23

Security : 2

Selftest : 1

Swap

:0

Process

CPU Usage(%) Memory Usage(%) Open FD's

--------------------------------------------------------------------------

hpe-sysmond

1

2

11

hpe-mgmdd

0

1

5

...

Attempting to show resource utilization data when system resource utilization polling is disabled:

Switch system and hardware commands | 2853

switch# show system resource-utilization System resource utilization data poll is currently disabled
Showing the resource utilization data for a particular process:

switch# show system resource-utilization daemon hpe-sysmond

Process

CPU Usage(%) Memory Usage(%) Open FD's

--------------------------------------------------------------------------

hpe-sysmond

1

2

11

(Applies to the 6300 Switch Series.) Showing resource utilization data for all VSF members:

aaa

(Applies to the 6300 Switch Series.) Showing resource utilization data for a particular VSF member:

switch# show system resource-utilization member 2 -------------------------------------------------------------------------Resource utilization data for vsf member 2 --------------------------------------------------------------------------

System Resources:

Processes

: 244

CPU usage(%)

: 10

CPU usage(% average over 1 minute) : 11

CPU usage(% average over 5 minute) : 15

Memory usage(%)

: 11

Open FD's

: 1854

Storage 1: Endurance utilization = 0-10% (mmc-type-a), 0-10% (mmc-type-b),

Health = normal

Data written to various partitions since boot

Nos

: 15 MB

Log

: 1 MB

Coredump : 23 MB

Security : 2 MB

Selftest : 0 KB

Swap

: 0 MB

Storage partition usage(%)

Nos

:5

Log

: 60

Coredump : 23

Security : 2

Selftest : 1

Swap

:0

Process

CPU Usage(%) Memory Usage(%) Open FD's

--------------------------------------------------------------------------

(sd-pam)

0

0

7

agetty

0

0

4

ata_sff

0

0

0

...

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2854

switch# show system resource-utilization all -------------------------------------------------------------------------Resource utilization data for vsf member 1 --------------------------------------------------------------------------

System Resources:

Processes

: 244

CPU usage(%)

: 10

CPU usage(% average over 1 minute) : 11

CPU usage(% average over 5 minute) : 15

Memory usage(%)

: 11

Open FD's

: 1854

Storage 1: Endurance utilization = 0-10% (mmc-type-a), 0-10% (mmc-type-b),

Health = normal

Data written to various partitions since boot

Nos

: 15 MB

Log

: 1 MB

Coredump : 23 MB

Security : 2 MB

Selftest : 405 KB

Swap

: 14 MB

Storage partition usage(%)

Nos

:5

Log

: 60

Coredump : 23

Security : 2

Selftest : 1

Swap

:0

Process

CPU Usage(%) Memory Usage(%) Open FD's

--------------------------------------------------------------------------

(sd-pam)

0

0

7

aaa

utilspamcfg

0

1

10

--------------------------------------------------------------------------

Resource utilization data for vsf member 2

--------------------------------------------------------------------------

System Resources:

Processes

: 244

CPU usage(%)

: 10

CPU usage(% average over 1 minute) : 11

CPU usage(% average over 5 minute) : 15

Memory usage(%)

: 11

Open FD's

: 1854

Storage 1: Endurance utilization = 0-10% (mmc-type-a), 0-10% (mmc-type-b),

Health = normal

Data written to various partitions since boot

Nos

: 15 MB

Log

: 1 MB

Coredump : 23 MB

Security : 2 MB

Selftest : 0 KB

Swap

: 0 MB

Storage partition usage(%)

Nos

:5

Log

: 60

Switch system and hardware commands | 2855

Coredump : 23

Security : 2

Selftest : 1

Swap

:0

Process

CPU Usage(%) Memory Usage(%) Open FD's

--------------------------------------------------------------------------

(sd-pam)

0

0

7

agetty

0

0

4

ata_sff

0

0

0

(Applies to the 6400 Switch Series.) Showing resource utilization data for the standby management module:

switch# show system resource-utilization standby

System Resources:

Processes

: 244

CPU usage(%)

: 10

CPU usage(% average over 1 minute) : 11

CPU usage(% average over 5 minute) : 15

Memory usage(%)

: 11

Open FD's

: 1854

Storage 1: Endurance utilization = 10-20% (mmc-type-a), 0-10% (mmc-type-b)

Health = normal

Data written to various partitions since boot

Nos

: 15 MB

Log

: 1 MB

Coredump : 23 MB

Security : 2 MB

Selftest : 405 KB

Swap

: 14 MB

Storage partition usage(%)

Nos

:5

Log

: 60

Coredump : 23

Security : 2

Selftest : 1

Swap

:0

Process

CPU Usage(%) Memory Usage(%) Open FD's

--------------------------------------------------------------------------

hpe-sysmond

1

2

11

hpe-mgmdd

0

1

5

...

(Applies to the 6400 Switch Series.) Showing resource utilization data for a line module:

switch# show system resource-utilization module 1/5

--------------------------------------------------------------------------

System Resource utilization for line card module: 1/5

--------------------------------------------------------------------------

CPU usage(%)

: 10

CPU usage(% average over 1 minute) : 11

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2856

CPU usage(% average over 5 minute) : 15

Memory usage(%)

: 11

Open FD's

: 754

(Applies to the 6400 Switch Series.) Showing resource utilization data for all modules:

switch# show system resource-utilization all -------------------------------------------------------------------------Resource utilization data for Management Module --------------------------------------------------------------------------

System Resources:

Processes

: 244

CPU usage(%)

: 10

CPU usage(% average over 1 minute) : 11

CPU usage(% average over 5 minute) : 15

Memory usage(%)

: 11

Open FD's

: 1854

Storage 1: Endurance utilization = 10-20% (mmc-type-a), 0-10% (mmc-type-b),

Health = normal

Data written to various partitions since boot

Nos

: 15 MB

Log

: 1 MB

Coredump : 23 MB

Security : 2 MB

Selftest : 405 KB

Swap

: 14 MB

Storage partition usage(%)

Nos

:5

Log

: 60

Coredump : 23

Security : 2

Selftest : 1

Swap

:0

Process

CPU Usage(%) Memory Usage(%) Open FD's

--------------------------------------------------------------------------

(sd-pam)

0

0

7

aaa

utilspamcfg

0

1

10

-------------------------------------------------------------------------Resource utilization data for Standby Management Module --------------------------------------------------------------------------

System Resources:

Processes

: 244

CPU usage(%)

: 10

CPU usage(% average over 1 minute) : 11

CPU usage(% average over 5 minute) : 15

Memory usage(%)

: 11

Open FD's

: 1854

Storage 1: Endurance utilization = 10-20% (mmc-type-a), 0-10% (mmc-type-b),

Health = normal

Data written to various partitions since boot

Nos

: 15 MB

Switch system and hardware commands | 2857

Log

: 1 MB

Coredump : 23 MB

Security : 2 MB

Selftest : 405 KB

Swap

: 0 KB

Storage partition usage(%)

Nos

:5

Log

: 60

Coredump : 23

Security : 2

Selftest : 1

Swap

:0

--------------------------------------------------------------------------

System Resource utilization for line card module: 1/7

--------------------------------------------------------------------------

CPU usage(%)

: 10

CPU usage(% average over 1 minute) : 11

CPU usage(% average over 5 minute) : 15

Memory usage(%)

: 11

Open FD's

: 854

--------------------------------------------------------------------------

System Resource utilization for line card module: 1/8

--------------------------------------------------------------------------

CPU usage(%)

: 10

CPU usage(% average over 1 minute) : 11

CPU usage(% average over 5 minute) : 15

Memory usage(%)

: 11

Open FD's

: 980

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.12

10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification The output of this command includes CPU usage(% average over 1 minute) and CPU usage(% average over 5 minute). --
Authority Administrators or local user group members with execution rights for this command.

show tech
show tech [basic | <FEATURE>] [local-file]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2858

Description
Shows detailed information about switch features by automatically running the show commands associated with the feature. If no parameters are specified, the show tech command shows information about all switch features. Technical support personnel use the output from this command for troubleshooting.

Parameter basic <FEATURE>
local-file

Description
Specifies showing a basic set of information.
Specifies the name of a feature. For a list of feature names, enter the show tech command, followed by a space, followed by a question mark (?).
Shows the output of the show tech command to a local text file.

Usage
To terminate the output of the show tech command, enter Ctrl+C. If the command was not terminated with Ctrl+C, at the end of the output, the show tech command shows the following:
n The time consumed to execute the command. n The list of failed show commands, if any.
To get a copy of the local text file content created with the show tech command that is used with the local-file parameter, use the copy show-tech local-file command.
Example
Showing the basic set of system information:

switch# show tech basic ============================================================= Show Tech executed on Wed Sep 6 16:50:37 2017 ============================================================= ============================================================= [Begin] Feature basic =============================================================
******************************* Command : show core-dump all ******************************* no core dumps are present
... ============================================================= [End] Feature basic =============================================================
============================================================= 1 show tech command failed ============================================================= Failed command:
1. show boot-history ============================================================= Show tech took 3.000000 seconds for execution

Switch system and hardware commands | 2859

Directing the output of the show tech basic command to the local text file:
switch# show tech basic local-file Show Tech output stored in local-file. Please use 'copy show-tech local-file' to copy-out this file.

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show usb
show usb [vsx-peer]
Description
Shows the USB port configuration and mount settings.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
If USB has not been enabled:

switch> show usb Enabled: No Mounted: No

If USB has been enabled, but no device has been mounted:

switch> show usb Enabled: Yes Mounted: No

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2860

If USB has been enabled and a device mounted:
switch> show usb Enabled: Yes Mounted: Yes

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show usb file-system
show usb file-system [<PATH>]
Description
Shows directory listings for a mounted USB device. When entered without the <PATH> parameter the top level directory tree is shown.

Parameter <PATH>

Description Specifies the file path to show. A leading "/" in the path is optional.

Usage
Adding a leading "/" as the first character of the <PATH> parameter is optional. Attempting to enter '..' as any part of the <PATH> will generate an invalid path argument error. Only fully-qualified path names are supported.
Examples
Showing the top level directory tree:

switch# show usb file-system /mnt/usb: 'System Volume Information' dir1'

Switch system and hardware commands | 2861

/mnt/usb/System Volume Information': IndexerVolumeGuid WPSettings.dat
/mnt/usb/dir1: dir2 test1
/mnt/usb/dir1/dir2: test2

Showing available path options from the top level:

switch# show usb file-system / total 64 drwxrwxrwx 2 32768 Jan 22 16:27 'System Volume Information' drwxrwxrwx 3 32768 Mar 5 15:26 dir1

Showing the contents of a specific folder:

switch# show usb file-system /dir1

total 32

drwxrwxrwx 2 32768 Mar 5 15:26 dir2

-rwxrwxrwx 1

0 Feb 5 18:08 test1

switch# show usb file-system dir1/dir2 total 0 -rwxrwxrwx 1 0 Feb 6 05:35 test2

Attempting to enter an invalid character in the path:

switch# show usb file-system dir1/../.. Invalid path argument

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show version

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2862

show version [vsx-peer]
Description
Shows version information about the network operating system software, service operating system software, and BIOS.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing version information for a 6300 switch:

6300# show version

-----------------------------------------------------------------------------

ArubaOS-CX

(c) Copyright 2017-2022 Hewlett Packard Enterprise Development LP

-----------------------------------------------------------------------------

Version

: FL.10.10.0001BJ

Build Date : 2022-05-25 10:22:06 UTC

Build ID

: ArubaOS-CX:FL.10.10.0001BJ:16d4d3ca52e9:202205908

Build SHA : 16d4d349695b50298f34b21a8c67637ae0

Hot Patches : hpe-routing_FL_10_10_0001BJ.patch

Active Image : primary

Service OS Version : FL.01.11.0001-internal

BIOS Version

: FL.01.0004

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

system resource-utilization poll-interval
system resource-utilization poll-interval <SECONDS>

Switch system and hardware commands | 2863

Description
Configures the polling interval for system resource information collection and recording such as CPU and memory usage.

Parameter <SECONDS>

Description Specifies the poll interval in seconds. Range: 10-3600. Default: 10.

Example
Configuring the system resource utilization poll interval:

switch(config)# system resource-utilization poll-interval 20

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

top cpu
top cpu
Description
Shows CPU utilization information.
Example
Showing top CPU information:

switch# top cpu

top - 09:42:55 up 3 min, 3 users, load average: 3.44, 3.78, 1.70

Tasks: 76 total, 2 running, 74 sleeping, 0 stopped, 0 zombie

%Cpu(s): 31.4 us, 32.7 sy, 0.5 ni, 34.4 id, 04. wa, 0.0 hi, 0.6 si, 0.0 st

KiB Mem : 4046496 total, 2487508 free, 897040 used, 661948 buff/cache

KiB Swap:

0 total,

0 free,

0 used, 2859196 avail Mem

PID USER ...

PRI NI VIRT RES SHR S %CPU %MEM

TIME+ COMMAND

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2864

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

top memory
top memory
Description
Shows memory utilization information.
Example
Showing top memory:

switch> top memory

top - 09:42:55 up 3 min, 3 users, load average: 3.44, 3.78, 1.70

Tasks: 76 total, 2 running, 74 sleeping, 0 stopped, 0 zombie

%Cpu(s): 31.4 us, 32.7 sy, 0.5 ni, 34.4 id, 04. wa, 0.0 hi, 0.6 si, 0.0 st

KiB Mem : 4046496 total, 2487508 free, 897040 used, 661948 buff/cache

KiB Swap:

0 total,

0 free,

0 used, 2859196 avail Mem

PID USER ...

PRI NI VIRT RES SHR S %CPU %MEM

TIME+ COMMAND

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

Switch system and hardware commands | 2865

Platforms All platforms

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

usb
usb no usb
Description
Enables the USB ports on the switch. This setting is persistent across switch reboots and management module failovers. Both active and standby management modules are affected by this setting. The no form of this command disables the USB ports.
Example
Enabling USB ports:
switch(config)# usb
Disabling USB ports when a USB drive is mounted:
switch(config)# no usb

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

usb mount | unmount
usb {mount | unmount}
Description
Enables or disables the inserted USB drive.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2866

Parameter mount unmount

Description Enables the inserted USB drive. Disables the inserted USB drive in preparation for removal.

Usage
If USB has been enabled in the configuration, the USB port on the active management module is available for mounting a USB drive. The USB port on the standby management module is not available. An inserted USB drive must be mounted each time the switch boots or fails over to a different management module. A USB drive must be unmounted before removal. The supported USB file systems are FAT16 and FAT32.
Examples
Mounting a USB drive in the USB port:

switch# usb mount

Unmounting a USB drive:

switch# usb unmount

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

Switch system and hardware commands | 2867

Chapter 152 System profile commands

System profile commands

profile
profile <PROFILE-NAME> no profile [<PROFILE-NAME>]
Description
Selects the system profile. System profiles set the overall capabilities and capacities of the switch based on the selected profile used at boot time. Switch profiles set capacities such as that of the hardware forwarding table. Use command show profiles available to show the details of each available profile.

When a switch is configured with a non-default profile, the switch requires a reboot for the profile to be applied. You are prompted for the reboot.
The no form of this command resets the specified profile to its defaults.

Profile names default v2-default v2-Aggregation-High-Bandwidth
v2-Core-High-Bandwidth
v2-Leaf-Extended-High-Bandwidth

Description
Selects the original default. v1 and v2 modules supported.
(The default.) Selects the v2 default. Only v2 modules are supported.
Selects aggregation high bandwidth. Only R0X44C (1G/10G/25G) and R0X45C (40G/100G) v2 modules are supported.
Selects core high bandwidth. Only R0X44C (1G/10G/25G) and R0X45C (40G/100G) v2 modules are supported.
Selects leaf extended high bandwidth. Only R0X44C (1G/10G/25G) and R0X45C (40G/100G) v2 modules are supported.

Examples
Selecting the v2-Aggregation-High-Bandwidth profile and then rebooting the system:

switch(config)# profile v2-Aggregation-High-Bandwidth switch(config)# exit switch# boot system switch(config)# The config will be cleared, and the switch will be
rebooted with the v2-Aggregation-High-Bandwidth profile Continue(y/n)...

Selecting the default profile and then rebooting the system:

AOS-CX 10.14 Command-Line Interface Guide

2868

switch(config)# profile default switch(config)# exit switch# boot system switch(config)# The config will be cleared, and the switch will be
rebooted with the Default profile Continue(y/n)...

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms 6400

Command context config

Modification Command introduced on the 6400.
Authority Administrators or local user group members with execution rights for this command.

show profiles available
show profiles available
Description
Shows all system profile names available and profile details.
Examples
Showing all available profiles:

switch# show profiles available

Available Profiles

-------------------

Default

v1 and v2 modules supported

32768 L2 entries, 49152 Host entries, 65536 Route entries

v2-Aggregation-

Only R0X44C(1G/10G/25G)& R0X45C(40G/100G)v2 modules

supported

High-Bandwidth

114688 L2 entries, 163840 Host entries, 65536 Route entries

enhanced feature set

v2-Core-High-Bandwidth Only R0X44C(1G/10G/25G)& R0X45C(40G/100G)v2 modules

supported

32768 L2 entries, 65536 Host entries, 630784 Route entries

enhanced feature set

v2-Default

Only v2 modules supported (Default)

32768 L2 entries, 49152 Host entries, 65536 Route entries

enhanced feature set

(Default)

System profile commands | 2869

v2-Leaf-Extendedsupported
High-Bandwidth

Only R0X44C(1G/10G/25G)& R0X45C(40G/100G)v2 modules
212992 L2 entries, 16384 Host entries, 65536 Route entries enhanced feature set

Note: Not all profiles are supported by all the modules, in order for the profile to
perform as expected, the profile must be supported by the module.

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms 6400

Command context Manager (#)

Modification Command introduced on the 6400.
Authority Administrators or local user group members with execution rights for this command.

show profile current
show profile current
Description
Shows the current system profile.
Examples
Showing the current profile:
switch# show profile current
Current profile ------------------v2-Aggregation-High-Bandwidth

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2870

Release 10.10

Command Information

Platforms 6400

Command context Manager (#)

Modification Command introduced on the 6400.
Authority Administrators or local user group members with execution rights for this command.

System profile commands | 2871

Chapter 153 Telnet commands

Telnet commands

show telnet server
show telnet server
Description
Shows the Telnet server configuration.
Examples
Showing the Telnet server configuration:

switch(config)# show telnet server TELNET Server Configuration:

IP Version TCP Port Enabled VRFs

: IPv4 : 23 : default, vrf1, vrf2,
red, green

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.08.1021

Command Information

Platforms All platforms

Command context config

Modification Command introduced on the 6200, 6300, 6400 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

show telnet server sessions
show telnet server sessions [vrf <VRF-NAME> | all-vrfs]
Description
Shows all active Telnet sessions for the specified VRF or all VRFs. If no VRF is provided, the Telnet sessions on the default VRF are shown.

AOS-CX 10.14 Command-Line Interface Guide

2872

Parameter vrf <VRF-NAME> all-vrfs

Description Specifies the Telnet sessions for a specific VRF. Specifies the Telnet sessions for all VRFs

Examples
Showing the Telnet session on the default VRF:

switch(config)# show telnet server sessions TELNET sessions on VRF default:

IPv4 TELNET Sessions:

Server IP

: 10.1.1.1

Client IP

: 10.1.1.2

Client Port

: 58835

Showing the Telnet sessions on all VRFs:

switch(config)# show telnet server sessions all-vrfs TELNET sessions on VRF mgmt:

IPv4 TELNET Sessions:

Server IP

: 10.1.1.1

Client IP

: 10.1.1.2

Client Port

: 58835

TELNET sessions on VRF default:

IPv4 TELNET Sessions:

Server IP

: 20.1.1.1

Client IP

: 20.1.1.2

Client Port

: 58837

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.08.1021

Command Information

Platforms All platforms

Command context config

Modification Command introduced on the 6200, 6300, 6400 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

telnet server

Telnet commands | 2873

telnet server vrf <VRF-NAME> no telnet server vrf <VRF-NAME>
Description
Enables the Telnet server on the desired VRF. Telnet server is disabled by default. The no form of this command disables the Telnet server.

Parameter vrf <VRF-NAME>

Description
Specifies the VRF on which the Telnet server will be enabled or disabled.

Examples
Configuring the Telnet server on the mgmt VRF:

switch(config)# telnet server vrf mgmt

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.08.1021

Command Information

Platforms All platforms

Command context config

Modification Command introduced on the 6200, 6300, 6400 Switch Series.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2874

Chapter 154 Terminal monitor commands

Terminal monitor commands

logging console {notify | severity | filter}
logging console{notify <event|debug|all> | severity <level> | filter keyword}
no logging console
Description
Enables the logging console feature in the console session. It display all debug log or event log or both debug and event log messages. Monitoring can be filtered with the severity options or with the help of keywords. Enabling terminal monitor without options displays both debug and event log with a severity error. This command is persistent across reboot. The no form of this command disables the terminal monitor configuration.

Parameter notify <event|debug|all>
severity <level> filter <keyword>

Description
Specifies the type of log notification. n Event: Displays the event log messages. (Default) n Debug: Displays the debug log messages. n All: Displays both event and debug log messages.
Specifies the severity level for the logs. The different severity levels are emergency, critical, error, warning, notice, information (default), alert, and debug (shows all severities).
Specifies the filter by applying keyword for the logs.

Authority
Administrators or local user group members with execution rights for this command.
Examples
Configuring console logging in the console session:

switch(config)# logging console Terminal-monitor is enabled successfully
switch(config)# logging console notify all Terminal-monitor is enabled successfully
switch(config)# logging console notify event severity info Terminal-monitor is enabled successfully
switch(config)# logging console filter lldp Terminal-monitor is enabled successfully

AOS-CX 10.14 Command-Line Interface Guide

2875

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms All platforms

Command context config

Modification Feature introduced.
Authority Administrators or local user group members with execution rights for this command.

show terminal-monitor
show terminal-monitor
Description
Shows whether the terminal monitoring is enabled or disabled.
This command will not show any information about console logging.

Examples
Displaying terminal monitor when enabled:

switch# show terminal-monitor

Terminal-monitor is enabled

-------------------------------------

Notify

| Severity | Filter

-------------------------------------

event

debug

lldp

-------------------------------------

Displaying terminal monitor when disabled:

switch# show terminal-monitor Terminal-monitor is disabled

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.
Command History

Terminal monitor commands | 2876

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

terminal-monitor {notify | severity | filter}
terminal-monitor {notify <event|debug|all> | severity <level> | filter <keyword>}
no terminal-monitor
Description
Enables and saves the terminal monitor feature in the switch configuration. It displays all debug log or event log or both debug and event log messages. Terminal monitoring can be filtered with the severity options or with the help of keywords. Enabling terminal monitor without options displays both debug and event log with a severity error. The no form of this command removes the terminal monitor feature from the switch configuration and the command will not persist.

Parameter notify <event|debug|all>
severity <level> filter <keyword>

Description
Specifies the type of log notification. n Event: Displays the event log messages. (Default) n Debug: Displays the debug log messages. n All: Displays both event and debug log messages.
Specifies the severity level for the logs. The different severity levels are emergency, critical, error, warning, notice, information (default), alert, and debug (shows all severities).
Specifies the filter by applying keyword for the logs.

Authority
Administrators or local user group members with execution rights for this command.
Examples
Enabling terminal monitor:

switch# terminal-monitor Terminal-monitor is enabled successfully
switch# terminal-monitor notify all Terminal-monitor is enabled successfully
switch# terminal-monitor notify event severity info

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2877

Terminal-monitor is enabled successfully
switch# terminal-monitor filter lldp Terminal-monitor is enabled successfully

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

Terminal monitor commands | 2878

Chapter 155 Traceroute commands

Traceroute commands

traceroute
traceroute {<IPV4-ADDR> | <HOSTNAME>} [ip-option loosesourceroute <IPV4-ADDR>] [dstport <NUMBER> | maxttl <NUMBER> | minttl <NUMBER> | probes <NUMBER> | timeout <TIME>] [vrf <VRF-NAME>] source {<IPV4-ADDR> | <IFNAME>}
Traceroute over VXLAN with ip-option loosesourceroute on L3VNI is not supported.

Description
Uses traceroute for the specified IPv4 address or hostname with or without optional parameters.

Parameter IPv4-address <IPV4-ADDR> hostname ip-option loosesourceroute <IPV4-ADDR>
dstport <NUMBER> maxttl <NUMBER>
minttl <NUMBER>
probes <NUMBER> timeout <TIME>
vrf <VRF-NAME> source {<IPV4-ADDR> | <IFNAME>}

Description
Specifies the IPv4 address.
Specifies the hostname of the device to traceroute.
Specifies the IP option.
Specifies the route for loose source record route. Enter one or more intermediate router IP addresses separated by ',' for loose source routing.
Specifies the destination port, <1-34000>. Default: 33434
Specifies the maximum number of hops to reach the destination, <1-255>. Default: 30
Specifies the Minimum number of hops to reach the destination, <1-255>. Default: 1
Specifies the number of probes, <1-5>. Default: 3
Specifies the traceroute timeout in seconds, <1-60>. Default: 3 seconds
Specifies the virtual routing and forwarding (VRF) to use .
Specifies the source IPv4 address or interface name.

Usage
Traceroute is a computer network diagnostic tool for displaying the route (path), and measuring transit delays of packets across an Internet Protocol (IP) network. It sends a sequence of User Datagram Protocol (UDP) packets addressed to a destination host. The time-to-live (TTL) value, also known as hop limit, is used in determining the intermediate routers being traversed towards the destination.
Examples

AOS-CX 10.14 Command-Line Interface Guide

2879

switch# traceroute 10.0.10.1 traceroute to 10.0.10.1 (10.0.10.1) , 1 hops min, 30 hops max, 3 sec. timeout, 3 probes
1 10.0.40.2 0.002ms 0.002ms 0.001ms 2 10.0.30.1 0.002ms 0.001ms 0.001ms 3 10.0.10.1 0.001ms 0.002ms 0.002ms
switch# traceroute localhost traceroute to localhost (127.0.0.1), 1 hops min, 30 hops max, 3 sec. timeout, 3 probes
1 127.0.0.1 0.018ms 0.006ms 0.003ms
switch# traceroute 10.0.10.1 maxttl 20 traceroute to 10.0.10.1 (10.0.10.1) , 1 hops min, 20 hops max, 3 sec. timeout, 3 probes
1 10.0.40.2 0.002ms 0.002ms 0.001ms 2 10.0.30.1 0.002ms 0.001ms 0.001ms 3 10.0.10.1 0.001ms 0.002ms 0.002ms
switch# traceroute 10.0.10.1 minttl 1 traceroute to 10.0.10.1 (10.0.10.1) , 1 hops min, 30 hops max, 3 sec. timeout, 3 probes
1 10.0.40.2 0.002ms 0.002ms 0.001ms 2 10.0.30.1 0.002ms 0.001ms 0.001ms 3 10.0.10.1 0.001ms 0.002ms 0.002ms
switch# traceroute 10.0.10.1 dstport 33434 traceroute to 10.0.10.1 (10.0.10.1) , 1 hops min, 30 hops max, 3 sec. timeout, 3 probes
1 10.0.40.2 0.002ms 0.002ms 0.001ms 2 10.0.30.1 0.002ms 0.001ms 0.001ms 3 10.0.10.1 0.001ms 0.002ms 0.002ms
switch# traceroute 10.0.10.1 probes 2 traceroute to 10.0.10.1 (10.0.10.1) , 1 hops min, 30 hops max, 3 sec. timeout, 2 probes
1 10.0.40.2 0.002ms 0.002ms 2 10.0.30.1 0.002ms 0.001ms 3 10.0.10.1 0.001ms 0.002ms
switch# traceroute 10.0.10.1 timeout 5 traceroute to 10.0.10.1 (10.0.10.1) , 1 hops min, 30 hops max, 5 sec. timeout, 3 probes
1 10.0.40.2 0.002ms 0.002ms 0.001ms 2 10.0.30.1 0.002ms 0.001ms 0.001ms 3 10.0.10.1 0.001ms 0.002ms 0.002ms
switch# traceroute localhost vrf red traceroute to localhost (127.0.0.1), 1 hops min, 30 hops max, 3 sec. timeout, 3 probes
1 127.0.0.1 0.003ms 0.002ms 0.001ms
switch# traceroute localhost mgmt traceroute to localhost (127.0.0.1), 1 hops min, 30 hops max, 3 sec. timeout, 3 probes
1 127.0.0.1 0.018ms 0.006ms 0.003ms
switch# traceroute 10.0.10.1 maxttl 20 timeout 5 minttl 1 probes 3 dstport 33434 traceroute to 10.0.10.1 (10.0.10.1) , 1 hops min, 20 hops max, 5 sec. timeout, 3 probes
1 10.0.40.2 0.002ms 0.002ms 0.001ms 2 10.0.30.1 0.002ms 0.001ms 0.001ms
Traceroute commands | 2880

3 10.0.10.1 0.001ms 0.002ms 0.002ms
switch# traceroute 10.0.10.1 ip-option loosesourceroute 10.0.40.2 traceroute to 10.0.10.1 (10.0.10.1) , 1 hops min, 30 hops max, 3 sec. timeout, 3 probes
1 10.0.40.2 0.002ms 0.002ms 0.001ms 2 10.0.30.1 0.002ms 0.001ms 0.001ms 3 10.0.10.1 0.001ms 0.002ms 0.002ms
switch# traceroute 10.0.10.1 ip-option loosesourceroute 10.0.40.2 maxttl 20 timeout 5 minttl 1 probes 3 dstport 33434 traceroute to 10.0.10.1 (10.0.10.1) , 1 hops min, 20 hops max, 5 sec. timeout, 3 probes
1 10.0.40.2 0.002ms 0.002ms 0.001ms 2 10.0.30.1 0.002ms 0.001ms 0.001ms 3 10.0.10.1 0.001ms 0.002ms 0.002ms
switch# traceroute 10.0.0.2 source 10.0.0.1 traceroute to 10.0.0.2 (10.0.0.2), 30 hops max
1 10.0.0.2 0.299ms 0.155ms 0.115ms
switch# traceroute 10.0.0.2 source 1/1/1 traceroute to 10.0.0.2 (10.0.0.2), 30 hops max
1 10.0.0.2 0.479ms 0.222ms 0.171ms

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08
10.07 or earlier

Modification
Added source IP address and source interface name parameters.
--

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

traceroute6
traceroute6 {<IPV6-ADDR> | <HOSTNAME>} [dstport <NUMBER> | maxttl <NUMBER> | probes <NUMBER> | timeout <TIME>] [vrf <VRF-NAME>] source {<IPV6-ADDR> | <IFNAME>}
Description
Uses traceroute for the specified IPv6 address or hostname with or without optional parameters.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2881

Parameter IPv6-address <IPV6-ADDR> hostname dstport <NUMBER> maxttl <NUMBER>
probes <NUMBER> timeout <TIME>
vrf <VRF-NAME>
source {<IPV6-ADDR> | <IFNAME>}

Description
Specifies the IPv6 address.
Specifies the hostname of the device to traceroute.
Specifies the destination port, <1-34000>. Default: 33434
Specifies the maximum number of hops to reach the destination, <1-255>. Default: 30
Specifies the number of probes, <1-5>. Default: 3
Specifies the traceroute timeout in seconds, <1-60>. Default: 3 seconds
Specifies the virtual routing and forwarding (VRF) to use, <VRFNAME>.
Specifies the source IPv6 address or interface name.

Usage
Traceroute is a computer network diagnostic tool for displaying the route (path), and measuring transit delays of packets across an Internet Protocol (IP) network. It sends a sequence of User Datagram Protocol (UDP) packets addressed to a destination host. The time-to-live (TTL) value, also known as hop limit, is used in determining the intermediate routers being traversed towards the destination.
Examples

switch# traceroute6 0:0::0:1 traceroute to 0:0::0:1 (::1) from ::1, 30 hops max, 3 sec. timeout, 3 probes, 24 byte packets
1 localhost (::1) 0.117 ms 0.032 ms 0.021 ms
switch# traceroute6 localhost traceroute to localhost (::1) from ::1, 30 hops max, 3 sec. timeout, 3 probes, 24 byte packets
1 localhost (::1) 0.089 ms 0.03 ms 0.014 ms
switch# traceroute6 0:0::0:1 maxttl 30 traceroute to 0:0::0:1 (::1) from ::1, 30 hops max, 3 sec. timeout, 3 probes, 24 byte packets
1 localhost (::1) 0.117 ms 0.032 ms 0.021 ms
switch# traceroute6 0:0::0:1 dsrport 33434 traceroute to 0:0::0:1 (::1) from ::1, 30 hops max, 3 sec. timeout, 3 probes, 24 byte packets
1 localhost (::1) 0.117 ms 0.032 ms 0.021 ms
switch# traceroute6 0:0::0:1 probes 2 traceroute to 0:0::0:1 (::1) from ::1, 30 hops max, 3 sec. timeout, 2 probes, 24 byte packets
1 localhost (::1) 0.117 ms 0.032 ms
switch# traceroute6 0:0::0:1 timeout 3 traceroute to 0:0::0:1 (::1) from ::1, 30 hops max, 3 sec. timeout, 3 probes, 24 byte packets
1 localhost (::1) 0.117 ms 0.032 ms 0.021 ms

Traceroute commands | 2882

switch# traceroute6 localhost vrf red traceroute to localhost (::1) from ::1, 30 hops max, 3 sec. timeout, 3 probes, 24 byte packets
1 localhost (::1) 0.077 ms 0.051 ms 0.054 ms
switch# traceroute6 localhost mgmt traceroute to localhost (::1) from ::1, 30 hops max, 3 sec. timeout, 3 probes, 24 byte packets
1 localhost (::1) 0.089 ms 0.03 ms 0.014 ms
switch# traceroute6 0:0::0:1 maxttl 30 timeout 3 probes 3 dstport 33434 traceroute to 0:0::0:1 (::1) from ::1, 30 hops max, 3 sec. timeout, 3 probes, 24 byte packets
1 localhost (::1) 0.117 ms 0.032 ms 0.021 ms
switch# traceroute6 2001::2 source 2001::1 traceroute to 2001::2 (2001::2) from 2001::1, 30 hops max, 3 sec. timeout, 3 probes, 24 byte packets 1 2001::2 (2001::2) 0.4331 ms 0.3186 ms 0.1874 ms
switch# traceroute6 2001::2 source 1/1/1 traceroute to 2001::2 (2001::2) from 2001::1, 30 hops max, 3 sec. timeout, 3 probes, 24 byte packets 1 2001::2 (2001::2) 0.6145 ms 0.4165 ms 0.1620 ms

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History
Release 10.08
10.07 or earlier

Modification
Added source IP address and source interface name parameters.
--

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2883

Chapter 156 Traffic insight commands

Traffic insight commands
collect egress-vlan
collect egress-vlan [no] collect egress-vlan
Description
Configures collect (non-key) fields for a flow record when in the config-flow-record context. The [no] form of this command removes a collect field from a flow record.
Only one collect field can be specified per line. A flow record can have multiple collect fields.

Parameter https
dns name tls-attributes egress-vlan

Description Specifies HTTP/HTTPS parameters as a non-key field in a flow record. Specifies DNS parameters as a non-key field in a flow record. Specifies the name of the application.
Specifies TLS Attributes as a non-key field in a flow record. Specifies egress VLAN ID as a non-key field in a flow record.

Examples
The following example adds egress-vlan collect field to flow-record-1 on the 6300 and 6400 switch series platforms:

switch(config)# flow record flow-record-1 switch(config-flow-record)# collect egress-vlan

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.14

Modification Command introduced.

Command Information
AOS-CX 10.14 Command-Line Interface Guide

2884

Platforms
6300 6400

Command context config config-flow-record

Authority
Administrators or local user group members with execution rights for this command.

collect forwarding-status
collect forwarding-status [no] collect forwarding-status
Description
Configures collect (non-key) fields for a flow record when in the config-flow-record context. The [no] form of this command removes a collect field from a flow record.
Only one collect field can be specified per line. A flow record can have multiple collect fields.

Parameter https
dns name tls-attributes forwarding-status

Description Specifies HTTP/HTTPS parameters as a non-key field in a flow record. Specifies DNS parameters as a non-key field in a flow record. Specifies the name of the application. Specifies TLS Attributes as a non-key field in a flow record. Specifies forwarding status as a non-key field in a flow record.

Examples
The following example adds forwarding-status collect field to flow-record-1 on the 6300 and 6400 switch series platforms:

switch(config)# flow record flow-record-1 switch(config-flow-record)# collect forwarding-status

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.14
Command Information

Modification Command introduced.

Traffic insight commands | 2885

Platforms
6300 6400

Command context config config-flow-record

Authority
Administrators or local user group members with execution rights for this command.

diag-dump traffic-insight basic
diag-dump traffic-insight basic
Description
Displays diagnostic information for Traffic Insight.
Examples

switch# diag-dump traffic-insight basic

=========================================================================

[Start] Feature traffic-insight Time : Tue Jul 25 05:30:07 2023

=========================================================================

-------------------------------------------------------------------------

[Start] Daemon traffic-insightd

-------------------------------------------------------------------------

Printing App cache:

TI CPDI Clients MACs learnt: 0

Printing flows for instance test

Printing flows for instance test

Printing DNS cache received:

CLIENT_IP: 20.18.234.89

MAC: 00:50:56:96:0e:3f

DNS_SERVER_IP LATENCY TOTAL_SAMPLES PORT

REQUEST_TIME

RESPONSE_

TIME

13.13.13.2

9450

7

12.12.12.2

8367

6

DNS on-boarding status: On-boarded MACs: 38:bd:7a:c8:42:00 00:50:56:96:0e:3f

------------------------------------------------------------------------[End] Daemon traffic-insightd ------------------------------------------------------------------------========================================================================= [End] Feature traffic-insight ========================================================================= Diagnostic-dump captured for feature traffic-insight

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11
Command Information

Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2886

Platforms
6300 6400

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show capacities traffic-insight
show capacities traffic-insight
Description
Displays the system capacities status and their values for Traffic Insight
Examples

Switch# show capacities traffic-insight

System Capacities: Filter TRAFFIC_INSIGHT

Capacities Name

Value

----------------------------------------------------------------------------------

-

Maximum number of Traffic-insight application flow cache entries

75000

Maximum number of Traffic-insight application flow table entries

2000

Maximum number of Traffic-insight instances

1

Maximum number of Traffic-insight monitors

5

Maximum number of Traffic-insight TopN monitor reports

100

Maximum number of Traffic-insight TopN monitor reports per monitor

20

Maximum number of Traffic-insight raw flow cache entries

8000

Maximum number of Traffic-insight raw flow table entries

5000

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

show debug buffer module trafficinsight
show debug buffer module trafficinsight
Description
Displays Traffic Insight debug logs stored in the debug buffer.
Examples

Traffic insight commands | 2887

Switch# show debug buffer module trafficinsight --------------------------------------------------------------------------------show debug buffer ---------------------------------------------------------------------------------2022-10-26:11:11:30.689510|traffic-insightd|LOG_ DEBUG|AMM|1/1|TRAFFICINSIGHT|TRAFFICINSIGHT_PACKET|Unsupported record id: 210 2022-10-26:11:11:30.689573|traffic-insightd|LOG_ DEBUG|AMM|1/1|TRAFFICINSIGHT|TRAFFICINSIGHT_PACKET|DMAC: 10:4f:58:88:08:00 2022-10-26:11:11:30.689639|traffic-insightd|LOG_ DEBUG|AMM|1/1|TRAFFICINSIGHT|TRAFFICINSIGHT_PACKET|Unsupported record id: 210 2022-10-26:11:11:30.689700|traffic-insightd|LOG_ DEBUG|AMM|1/1|TRAFFICINSIGHT|TRAFFICINSIGHT_PACKET|octetDeltaCount: 13751 2022-10-26:11:11:30.689761|traffic-insightd|LOG_ DEBUG|AMM|1/1|TRAFFICINSIGHT|TRAFFICINSIGHT_PACKET|packetDeltaCount: 36 2022-10-26:11:11:30.689823|traffic-insightd|LOG_ DEBUG|AMM|1/1|TRAFFICINSIGHT|TRAFFICINSIGHT_PACKET|source interface: 0 2022-10-26:11:11:30.689887|traffic-insightd|LOG_ DEBUG|AMM|1/1|TRAFFICINSIGHT|TRAFFICINSIGHT_PACKET|Unsupported record id: 252 2022-10-26:11:11:30.689949|traffic-insightd|LOG_ DEBUG|AMM|1/1|TRAFFICINSIGHT|TRAFFICINSIGHT_PACKET|App id: 3235 2022-10-26:11:11:30.690159|traffic-insightd|LOG_ DEBUG|AMM|1/1|TRAFFICINSIGHT|TRAFFICINSIGHT|ti_recv_messages_in_cpdi_layer: Received message with size 200 from DL 2022-10-26:11:11:30.690184|traffic-insightd|LOG_ DEBUG|AMM|1/1|TRAFFICINSIGHT|TRAFFICINSIGHT|ti_cpdi_layer_handle_events: Handling message in CPDI event 10 2022-10-26:11:11:30.690321|traffic-insightd|LOG_ DEBUG|AMM|1/1|TRAFFICINSIGHT|TRAFFICINSIGHT|ti_topn_add_record_to_monitor:New TOPN hash node created for SIP 3501::100, DIP 3701::100, VRF default,dst_port 80

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

show events traffic-insightd
show events -d traffic-insightd
Description
Displays event logs generated by the switch modules since the last reboot for Traffic Insight.
Examples
Showing event logs of Traffic Insight:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2888

Switch# show events -d traffic-insightd --------------------------------------------------Event logs from current boot --------------------------------------------------2022-10-26T07:55:17.369208+00:00 6410 traffic-insightd[2518]: Event|14005|LOG_ INFO|UMM|-|Traffic Insight instance t1 enabled 2022-10-26T07:55:17.369309+00:00 6410 traffic-insightd[2518]: Event|14001|LOG_ INFO|UMM|-|Instance t1 created 2022-10-26T08:09:53.077469+00:00 EdgeInt traffic-insightd[2518]: Event|14003|LOG_ INFO|UMM|-|dns-avergae-latency running-statistics cleared for the monitor top3 and instance t1 2022-10-26T08:24:52.998692+00:00 EdgeInt traffic-insightd[2518]: Event|14003|LOG_ INFO|UMM|-|dns-avergae-latency running-statistics cleared for the monitor top3 and instance t1

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.11

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

show running-config traffic-insight
show running-config traffic-insight
Description
Display configuration settings for all traffic insight instances.
Examples
switch# show running-config traffic-insight traffic-insight t1
enable source ipfix monitor mon1 type topN-flows group-by appid filter-by dstport 443 monitor mon2 type application-flows monitor mon3 type raw-flows monitor mon4 type dns-average-latency monitor mon5 type topN-flows entries 20 ...

Traffic insight commands | 2889

switch# show running-config traffic-insight traffic-insight config_TI_3 enable source ipfix monitor mon2 type dns-average-latency monitor mon3 type dns-onboarding-latency ...

For more information on features that use this command, refer to the Application Traffic Visibility Guide for your switch model.

Related Commands
Command traffic insight

Description Create and configure a traffic insight instance

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context Authority

Operator (>) or Manager (#)

Administrators or local user group members with execution rights for this command.

show tech traffic-insight
show tech traffic-insight
Description
Shows the Traffic Insight configuration settings.
Examples
The example shows the Traffic Insight configuration settings.
Switch# show tech traffic-insight ==================================================== Show Tech executed on Wed Oct 26 11:11:37 2022 ==================================================== ==================================================== [Begin] Feature traffic-insight ==================================================== ********************************* Command : show running-config traffic-insight

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2890

********************************* traffic-insight t1 enable source ipfix ! monitor top4 type topN-flows entries 20 group-by srcip monitor dns type dns-average-latency monitor top3 type topN-flows entries 18 running-statistics-timeout 900 group-by appid filter-by dstport 443 monitor app type application-flows ==================================================== [End] Feature traffic-insight ==================================================== ==================================================== Show Tech commands executed successfully ====================================================

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

show traffic-insight monitor-type
show traffic-insight <INSTANCE_NAME> monitor-type application-flows <MONITOR_NAME> {app-details | client-role | url-
details | permitted | denied | {tls-visibility [{client client-mac>}]| {tls-cert-visibility
[detail|expired]}}
dns-average-latency <MONITOR_NAME> topN-flows {<MONITOR_NAME> | all} [app-details] raw-flows <MONITOR_NAME>
Description
Display information for traffic insight monitored flows.

Parameter <INSTANCE_NAME>

Description Name of the traffic insight instance, string of maximum length up to 32 characters.

Traffic insight commands | 2891

Parameter

Description

monitor-type

Specifies traffic insight monitor type.

application flows

Monitors client application flows and provides application level rx/tx counters and application visibility. The frequency at which the Traffic Insight application flow table is updated with new flow statistics is 30 seconds if the flow count is more than 2k. Otherwise, it is updated every 12 minutes. A maximum of 2k flows can be updated in the table at a time. Any excess flows are updated in subsequent update.

raw-flows

Shows the last 5k flows that switch has received across all the ports where IPFIX is enabled in non-chronological order.

<MONITOR_NAME> Specify a monitor name to display information for that monitor, or enter all to display

| all

information for all monitors.

NOTE: The all parameter displays all topN-flows monitor instances information

app-details

Displays traffic insight monitor flows with application details. This option is supported only on monitors with one of the following configurations:
monitor <MONITOR_NAME> monitor-type topN-flows {filter-by <FILTER-TYPE>} monitor <MONITOR_NAME> monitor-type topN-flows group-by appid {filter-by <FILTER-TYPE>} monitor <MONITOR_NAME> monitor-type topN-flows group-by srcip_ appid {filter-by <FILTER-TYPE>}

client-role

Shows traffic insight monitor flows with client role details.

url-details

Shows traffic insight flows with app URL details.

permitted

Shows traffic insight flows permitted by ABP

denied

Shows traffic insight flows denied by ABP

tls-visibility Shows TLS attributes for traffic insight flows.

client <CLIENT_
MAC>

(Optional) Specifies the client MAC address in xx:xx:xx:xx:xx:xx format.

tls-certvisibility

Shows TLS certificate attributes for traffic insight flows.

detail

(Optional) Shows traffic insight flows with application TLS Certificate Visibility with additional details

expired

(Optional) Shows traffic insight flows with application TLS for expired .

To have application flows indicate denied flows appropriately, IPFIX monitor should contain forwarding status and egress VLAN collect configurations. In the 6300 and 6400 Switch Series policy_action will be set to permitted for all flows when collect forwardingstatus is not enabled.
Examples
The following example shows all monitoring flow data for topN-flows, for instance instance-1:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2892

switch# show traffic-insight instance-1 monitor-type topN-flows all

Name

: top-5-dst-ip

Entries : 5

group By : dst_ip

Filter By : None

Running Statistics Timeout: 2700

Dataset : Running Statistics

Rank

dst_ip

Bytes

-------------------------------------------

1

34.94.235.109

4168

2

61.113.171.176

3500

3

41.244.240.249

3120

4

40.159.33.244

3084

5

247.182.130.159

3084

Name : top-5-conversations Entries : 5 group By : dst_ip Filter By : None Running Statistics Timeout: 2700

Dataset: Running Statistics

Rank src_ip

dst_ip

ip_proto src_port dst_port Bytes

---------------------------------------------------------------------------

1

192.168.1.6 223.126.110.198 17

18251 38530

102

2

11.89.15.20 143.193.61.233 17

43482 5929

103

3

107.56.36.77 255.111.58.122 6

15820 59117

104

4

1000::1

2000::2

6

20065 53239

105

5

3000::3

5000::5

17

12124 50782

105

The following example shows top-5-dst-ip monitoring flow data for topN-flows, for instance instance1:

switch# show traffic-insight instance-1 monitor-type topN-flows top-5-dst-ip

Name

: top-5-dst-ip

Entries : 5

group By : dst_ip

Filter By : None

Running Statistics Timeout: 2700

Dataset: Running Statistics

Rank dst_ip

Bytes

---------------------------------------------------------------------------

1

34.94.235.109

4168

2

61.113.171.176

3500

3

41.244.240.249

3120

4

40.159.33.244

3084

5

247.182.130.159

3084

The following example shows all app-details monitoring flow data for topN-flows, for instance instance-1:

Traffic insight commands | 2893

switch# show traffic-insight instance-1 monitor-type topN-flows all app-details

Name

: top-5-conversations

Entries : 5

group By : none

Filter By : None

Running Statistics Timeout: 2700

Dataset: Running Statistics

Rank src_ip

dst_ip

app_id app_name app_category

Bytes

--------------------------------------------------------------------------------

1

192.168.1.6 223.126.110.198 54

google

Web

1052

2

11.89.15.20 143.193.61.233 29

dhcp

Networkservice 1043

3

107.56.36.77 255.111.58.122 32

dns

Networkservice 1034

4

1000::1

2000::2

244

facebook Social-networking 1025

5

3000::3

5000::5

240

youtube Streaming

1005

Name

: monitor2

Group By : ipproto

Entries : 5

Filter By : None

Running Statistics Timeout

: 2700

Application details cannot be displayed for flows grouped by ipproto.

Name

: monitor3

Group By : srcport

Entries : 5

Filter By : None

Running Statistics Timeout

: 2700

Application details cannot be displayed for flows grouped by srcport.

The following example shows dns-average-latency data for mntr2 monitoring, for instance instance-1:

switch# show traffic-insight instance-1 monitor-type dns-average-latency mntr2

Name

: mntr2

Type

: dns-average-latency

Start time for latency calculation

: 10/10/2022 04:47:26.869937 UTC

End time for latency calculation

: 10/10/2022 04:48:26.812820 UTC

client_mac

client_ip

dns_server_ip

dns_avergae_latency(msec)

-------------------------------------------------------------------------------

aa:aa:aa:aa:aa:aa 192.168.11.1 172.0.0.1

200

bb:bb:bb:bb:bb:bb 192.168.12.1 172.1.1.1

300

cc:cc:cc:cc:cc:cc 192.168.13.1 172.2.2.2

150

The following example shows all monitoring flow data permitted or denied for application-flows, for instance instance-1:

switch# sho traffic-insight t1 monitor-type application-flows mon2 app-details

Name

: mon2

Type

: application-flows

---------------------------------------------

client_mac

: 00:15:5d:11:6e:04

app_id

: 3618

app_name

: google-api

app_category : web

app_description : Google APIs

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2894

Rx(Bytes)

:0

Tx(Bytes)

: 22678

---------------------------------------------

client_mac

: 00:15:5d:11:6e:04

app_id

: 1122

app_name

: google-play

app_category : mobile-app-store

app_description : Google Play Store

Rx(Bytes)

:0

Tx(Bytes)

: 186

----------------------------------------------

client_mac

: 00:15:5d:11:6e:04

app_id

: 968

app_name

: amazon

app_category : web

app_description : Amazon Generic Services

Rx(Bytes)

:0

Tx(Bytes)

: 2335

-----------------------------------------------

client_mac

: 00:15:5d:11:6e:04

app_id

: 205

app_name

: tcp

app_category : network-service

app_description : Transmission Control Protocol

Rx(Bytes)

:0

switch # sho traffic-insight t1 monitor-type application-flows mon2 permitted

Name

: mon2

Type

: application-flows

------------------------------------------------

src_ip

: 10.10.31.147

dst_ip

: 142.250.113.95

role

: vm_traffic

app_name

: google-api

Rx(Bytes)

:0

Tx(Bytes)

: 22678

------------------------------------------------

src_ip

: 10.10.31.147

dst_ip

: 142.250.138.100

role

: vm_traffic

app_name

: google-play

Rx(Bytes)

:0

Tx(Bytes)

: 186

------------------------------------------------

src_ip

: 10.10.31.147

dst_ip

: 18.141.38.150

role

: vm_traffic

app_name

: amazon

Rx(Bytes)

:0

Tx(Bytes)

: 2335

switch# sho traffic-insight t1 monitor-type application-flows mon2 denied

Name

: mon2

Type

: application-flows

-------------------------------------------------

src_ip

: 10.10.31.147

dst_ip

: 13.249.21.67

role

: vm_traffic

app_name

: amazon

Tx(Bytes)

: 3968

--------------------------------------------------

Traffic insight commands | 2895

src_ip dst_ip role app_name Tx(Bytes)

: 10.10.31.147 : 35.71.139.29 : vm_traffic : whatsapp : 12318

The following example shows client-role details for application-flows, for instance instance-1:

switch# show traffic-insight instance-1 monitor-type application-flows mntr1

client-role

Name

: mon1

Type

: application-flows

----------------------------------------------------------------------------------

---------

client_mac

: aa:aa:aa:aa:aa:aa

role

: test_role1

app_name

: google

Rx(Bytes)

:0

Tx(Bytes)

: 448

----------------------------------------------------------------------------------

---------

client_mac

: bb:bb:bb:bb:bb:bb

role

: test_role2

app_name

: dhcp

Rx(Bytes)

: 300

Tx(Bytes)

: 500

----------------------------------------------------------------------------------

---------

client_mac

: cc:cc:cc:cc:cc:cc

role

: test_role1

app_name

: youtube

Rx(Bytes)

: 40000

Tx(Bytes)

: 3000

The following example shows url-details details for application-flows, for instance instance-1:

switch# show traffic-insight instance-1 monitor-type application-flows mon1 url-

details

Name

: mon1

Type

: application-flows

----------------------------------------------------------------------------------

--------------------------------------

client_mac

: 00:15:5d:10:da:02

app_id

: 1111

app_name

: windows-marketplace

app_url

: https://apps.microsoft.com/store/app

Rx(Bytes)

: 1822

Tx(Bytes)

: 448

----------------------------------------------------------------------------------

--------------------------------------

client_mac

: 00:15:5d:10:da:0a

app_id

: 1284

app_name

: akamai

app_url

: https://www.akamai.com/

Rx(Bytes)

: 1533

Tx(Bytes)

: 945

----------------------------------------------------------------------------------

--------------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2896

client_mac app_id app_name app_url Rx(Bytes) Tx(Bytes)

: 00:15:5d:10:da:02 : 54 : google : https://www.google.com/ : 27182 : 3489

The following example shows On-demand flows details for raw-flows, for instance instance-1:

switch# show traffic-insight instance-1 monitor-type raw-flows mntr1

Name

: mon1

Type

: raw-flows

-------------------------------------------------------------------------------

src_ip

: 192.168.11.6

dst_ip : 223.126.100.198

src_port : 10000

dst_port : 9000

protocol : UDP

app_name : windows-marketplace

action : permitted

rx(packets): 1

rx(bytes): 128

-------------------------------------------------------------------------------

src_ip

: 192.168.12.6

dst_ip : 223.126.111.198

src_port : 11000

dst_port : 5000

protocol : TCP

app_name : google

action : permitted

rx(packets): 10

rx(bytes): 5120

-------------------------------------------------------------------------------

src_ip

: 192.168.13.6

dst_ip : 223.126.111.198

src_port : 12000

dst_port : 8000

protocol : TCP

app_name : akamai

action : denied

rx(packets): 1

rx(bytes): 512

-------------------------------------------------------------------------------

The following examples show TLS attributes for traffic insight flows.

switch# show traffic-insight instance-1 monitor-type application-flows mon1 tls-

visibility

Name

: mon1

Type

: application-flows

client_mac

src_ip

dest_ip

app_name

tls_version

next_protocol

bytes(Rx+Tx)

----------------------------------------------------------------------------------

--

00:50:56:96:69:ed 10.101.88.28

10.78.90.46

amazon

TLSv1.2

HTTP/2

3816

00:50:56:96:69:ed 10.101.88.28

10.79.90.46

https

TLSv1.2

HTTP/1.1

2579195

00:50:56:96:69:ed 10.101.88.28

10.79.90.46

exelate

TLSv1.2

HTTP/2

6411

00:50:56:96:28:b1 10.100.129.213

16.93.50.254

dns

-

-

53573

00:50:56:96:28:b1 10.100.129.213

10.79.90.46

amazon-aws

TLSv1.2

HTTP/2

91055

...

----------------------------------------------------------------------------------

--

Total Traffic

: 19902324(bytes)

Encrypted Traffic : 19758443(bytes)

Percentage of Encrypted Traffic : 99.277064

```

Traffic insight commands | 2897

switch# show traffic-insight instance-1 monitor-type application-flows mon1 tls-

visibility client 00:50:56:96:28:b1

Name

: mon1

Type

: application-flows

Client_mac : 00:50:56:96:69:ed

src_ip

dest_ip

app_name

tls_version

next_protocol

bytes(Rx+Tx)

----------------------------------------------------------------------------------

--

10.101.88.28

10.79.90.46

adobe

TLSv1.2

HTTP/2

380

10.101.88.28

10.79.90.46

oracle

TLSv1.2

HTTP/2

585

10.101.88.28

10.79.90.46

amazon-adsystem

TLSv1.2

HTTP/2

1128

10.101.88.28

10.78.90.46

amazon

TLSv1.2

HTTP/2

7763

10.101.88.28

10.79.90.46

exelate

TLSv1.2

HTTP/2

668

...

----------------------------------------------------------------------------------

--

Total Traffic

: 27218(bytes)

Encrypted Traffic : 27218(bytes)

Percentage of Encrypted Traffic : 100.000000

The following examples show TLS certificate attributes for traffic insight flows.

6300# show traffic-insight instance-1 monitor-type application-flows mon1 tls-

cert-visibility

Name

: mon1

Type

: application-flows

client_mac

src_ip

dest_ip

app_name

cert_issuer

cert_issued_date

cert_expiry_date

(DD/MM/YY HH:MM:SS) (DD/MM/YY HH:MM:SS)

----------------------------------------------------------------------------------

--

00:50:56:96:69:ed 10.101.88.28

10.79.90.46

oracle

DigiCert TLS RSA SHA256 07/02/23 00:00:00 08/02/24 23:59:59

00:50:56:96:69:ed 10.101.88.28

10.78.90.46

amazon

Amazon RSA 2048 M01

27/01/23 00:00:00 27/01/24 23:59:59

00:50:56:96:69:ed 10.101.88.28

10.79.90.46

exelate

DigiCert TLS RSA SHA256 08/06/22 00:00:00 10/06/23 23:59:59

```

```

6300# show traffic-insight instance-1 monitor-type application-flows mon1 tls-

cert-visibility detail

Name

: mon1

Type

: application-flows

client_mac

src_ip

dest_ip

app_name

cert_issuer

cert_issued_date

cert_expiry_date

(DD/MM/YY HH:MM:SS) (DD/MM/YY HH:MM:SS)

JA3

JA3S

----------------------------------------------------------------------------------

---------

00:50:56:96:69:ed 10.101.88.28

10.79.90.46

oracle

DigiCert TLS RSA SHA256 07/02/23 00:00:00 08/02/24 23:59:59

28a2c9bd18a11de089ef85a160da29e4

42ec7b1db61428bf1cc6e01b9ef02b04

00:50:56:96:69:ed 10.101.88.28

10.78.90.46

amazon

Amazon RSA 2048 M01

27/01/23 00:00:00 27/01/24 23:59:59

28a2c9bd18a11de089ef85a160da29e4

8bbcb0bf0a942234f77bd504ffdd2013

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2898

00:50:56:96:69:ed 10.101.88.28

10.79.90.46

exelate

DigiCert TLS RSA SHA256 08/06/22 00:00:00 10/06/23 23:59:59

28a2c9bd18a11de089ef85a160da29e4

c4b2785a87896e19d37eee932070cb22

```

```

6300# show traffic-insight instance-1 monitor-type application-flows monitor1 tls-

cert-visibility expired

Name

: mon1

Type

: application-flows

client_mac

src_ip

dest_ip

app_name

cert_issuer

cert_issued_date

cert_expiry_date

(DD/MM/YY HH:MM:SS) (DD/MM/YY HH:MM:SS)

----------------------------------------------------------------------------------

---------

00:50:56:96:69:ed 10.101.88.28

10.79.90.46

exelate

DigiCert TLS RSA SHA256 08/06/22 00:00:00 10/06/23 23:59:59

28a2c9bd18a11de089ef85a160da29e4

c4b2785a87896e19d37eee932070cb22

Policy-action for the flows is only based on Port-Access Role and Application Based Policing configurations.

For more information on features that use this command, refer to the Security Guide for your switch model.

Related Commands
Command traffic insight

Command History
Release 10.13

10.12.1000 10.11

Command Information

Platforms
6300 6400 (v2 profile only)

Command context Manager (#)

Description Create and configure a traffic insight instance.
Modification The sub-parameters tls-cert-visibility, tls-cert-visibility permitted, denied, client-role, and url-details were introduced. The dns-onboarding-latency sub-parameter was introduced. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

traffic insight
traffic-insight <INSTANCE_NAME> [no] enable [no] source ipfix [no] monitor <NAME> type

Traffic insight commands | 2899

topN-flows [ entries <Entry-VALUE> | running-statistics-timeout <TIMEOUT-SECONDS> | group-by {<GROUP-TYPE>} | filter-by {<FILTER-TYPE>} ]
application-flows raw-flows dns-average-latency dns-onboarding-latency
Description
Traffic insight monitors data collected from flow exporters like the IP Flow Information Export (IPFIX) flow exporter. Traffic insight tracks multiple monitor requests simultaneously and provides monitor reports for each request.

Parameter <INSTANCE_NAME> [no] enable [no] source ipfix
monitor <INSTANCE_NAME> type
topN-flows
entries <Entry-VALUE> running-statistics-timeout <TIMEOUT-SECONDS> filter-by <FILTER-TYPE>

Description
Name of the traffic insight instance, string of maximum length up to 32 characters.
Enable or disable this traffic insight configuration
The traffic insight configuration uses this source protocol to collect traffic flows. The only available protocol is ipfix.
Enable flow monitoring on a traffic insight instance and configure rules for filtering and grouping traffic flows.
Specifies type of the monitor
Monitors IP traffic flowing through the switch and captures topN flows volume. The default number of top flows captured is 5.
Select the maximum number of entries in the monitor report. Range: 1 to 20. The default value is 5.
Sets running-statistics reset timeout value. Range: 360 to 86400. The default value is 600.
Include any of the following values to filter the data set. n src_ip_mask <IP_MASK>--Filter by
source IP netmask n dst_ip_mask <IP_MASK>--Filter by
destination IP netmask n src_ip <IP_ADDRESS>--Filter by
source IP address

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2900

Parameter
group-by <GROUP-TYPE>
application-flows
raw-flows src_ip dst_ip protocol

Description
n dst_ip <IP_ADDRESS>-- Filter by destination IP address
n src_port <PORT>--Filter by source port number
n dst_port <PORT>:--Filter by destination port number
n ip_proto <PROTOCOL>--Filter by IP protocol
Include any of the following values to create a monitor that groups matching traffic flows by that criteria. n srcip--Group by source IP address n dstip --Group by destination IP
address n srcport--Group by source port
number n dstport--Group by destination port
number n ipproto--Group by IP protocol n appid--Group by application ID n srcip_dstip--Group by Source IP
and Destination IP n srcip_dstport--Group by Source IP
and Destination Port n srcip_appid--Group by Source IP
and Application ID.
Monitors client application flows and provides application level rx/tx counters and application visibility. The frequency at which the Traffic Insight application flow table is updated with new flow statistics is 30 seconds if the flow count is more than 2k. Otherwise, it is updated every 12 minutes. A maximum of 2k flows can be updated in the table at a time. Any excess flows are updated in subsequent updates.
Provides uni-direction flow details for all apps or clients to CNX on-demand basis. It is used by CNX for troubleshooting work-flow.
Source IP address of the flow.
Destination IP address of the flow.
Type of protocol that is carried by IP.
Traffic insight commands | 2901

Parameter dest port app_details Bytes Packets Action
dns-average-latency
dns-onboarding-latency
no

Description
Destination L4 port of the IP traffic.
Application details like app_name, category, URL etc.
Number of bytes received.
Number of packets received.
Specifies if flow is allowed or blocked due to a policy.
Monitors DNS request and response flows and provides average dns-latency details per client. The Traffic Insight application flow table in the database is updated every 5 minutes with dns average latency information.
Monitors DNS request and response flows and provides DNS onboarding latency details per client.
Negate a command or set its defaults

Examples
The following example creates a traffic insight instance named TI_1:
switch(config)# traffic-insight TI_1

The following example deletes a traffic insight instance named TI_1:
switch(config)# no traffic-insight TI_1
The following example enables traffic insight instance for TI_1 instance:
switch(config)# traffic-insight TI_1 switch(config-ti)#enable
The following example disables traffic insight instance for TI_1 instance:
switch(config)# traffic-insight TI_1 switch(config-ti)#no enable
The following example sets the source protocol for TI_1 instance to collect flows information from IPFIX:
switch(config)# traffic-insight TI_1 switch(config-ti)# source ipfix

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2902

The following example removed the source protocol for TI_1 instance:
switch(config)# traffic-insight TI_1 switch(config-ti)# no source ipfix
The following examples create traffic insight monitor with filter and grouping rules for topN-flows for the mnti1 monitoring:
switch(config)# traffic-insight TI_1 switch(config-ti)# monitor mnti1 type topN-flows switch(config-ti)# monitor mnti1 type topN-flows running-statistics-timeout 1800 switch(config-ti)# monitor type topN-flows group-by src_ip switch(config-ti)# monitor type topN-flows filter-by src_ip_mask 192.0.0.0/8
The following example creates a traffic insight monitor with filter and grouping rules for topN-flows using the below parameter for the mnti1 monitoring: n 10 entries n Grouped by srcip (Source IP) n Filter by src_ip_mask (Source IP Mask)
switch(config-ti)# monitor mnti1 type topN-flows entries 10 group-by srcip filterby src_ip_mask 192.0.0.0/8
The following example removes flow monitoring:
switch(config)#traffic-insight TI_1 switch(config-ti)# no monitor mnti1 topN-flows
The following examples create a traffic insight monitor for application-flows for the mnti2 instance:
switch(config-ti)# monitor mnti2 type application-flows
The following examples create a traffic insight monitor for raw-flows for the mnti3 instance:
switch(config-ti)# monitor mnti3 type raw-flows
The following examples create a traffic insight monitor for dns-average-latency for the mnti3 instance:
switch(config-ti)# monitor mnti3 type dns-average-latency
The following examples create a traffic insight monitor for dns-onboarding-latency for the mnti3 instance:
switch(config-ti)# monitor mnti3 type dns-onboarding-latency
For more information on features that use this command, refer to the Security Guide for your switch model.
Traffic insight commands | 2903

Command History
Release 10.12.1000 10.13 10.11

Command Information

Platforms
6300 6400

Command context config

Modification The dns-onboarding-latency sub-parameter was introduced. The raw-flows sub-parameter introduced. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2904

Chapter 157 Two-factor authentication commands

Two-factor authentication commands

aaa authorization radius
aaa authorization radius {ssh | https-server} group <GROUP-LIST> no aaa authorization radius {ssh | https-server} group <GROUP-LIST>
Description
Enables RADIUS authorize-only for use with two-factor authentication. By default RADIUS authenticates and authorizes a client that is configured for AAA based access. This command causes the RADIUS server to instead be used only for authorization and not for authentication. Authorization requests are sent over TLS and therefore RADIUS authorize-only requires a RadSec RADIUS server.

If command authorization is also configured it is given priority over RADIUS authorize-only and therefore command authorization is done on the basis of command authorization configuration and not the user role and privilege level assigned by the RADIUS server.
The no form of this command disables RADIUS authorize-only, causing RADIUS to be again used for both authentication and authorization.

Parameter ssh https-server group <GROUP-LIST>

Description
Selects the SSH authorization list.
Selects the HTTPS server authorization list.
Specifies the list of remote RADIUS server group names. Each name can be specified one time. Predefined remote RADIUS group name radius is available. The remote RADIUS server groups are accessed in the order that the group names are listed in this command. Within each group, the servers are accessed in the order in which the servers were added to the group. Server groups are defined using command aaa group server and servers are added to a server group with the command server.

Examples
Enabling RADIUS authorize only for SSH with the default RADIUS group:

switch(config)# aaa authorization radius ssh group radius All commands will fail if none of the radsec servers in the group list are reachable. Continue (y/n)? y

Disabling RADIUS authorize only for SSH with the default RADIUS group, causing RADIUS to be again used for both authentication and authorization:

AOS-CX 10.14 Command-Line Interface Guide

2905

switch(config)# no aaa authorization radius ssh group radius
Enabling RADIUS authorize only for HTTPS server with the default RADIUS group:
switch(config)# aaa authorization radius https-server group radius All commands will fail if none of the radsec servers in the group list are reachable. Continue (y/n)? y
Disabling RADIUS authorize only for HTTPS server with the default RADIUS group, causing RADIUS to be again used for both authentication and authorization:
switch(config)# no aaa authorization radius https-server group radius

For more information on features that use this command, refer to the Security Guide for your switch model.

Release 10.11

Command Information

Platforms All platforms

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

https-server authentication certificate
https-server authentication certificate [authorization radius] [username {<CERT-FIELD>}]
Description
Enables certificate-based authentication where the HTTPS server uses an X.509 certificate for authentication and a RADIUS server for authorization. Enabling password authentication is the only way of disabling certificate authentication.

Parameter authorization radius
<CERT-FIELD>

Description
Specifies that after certificate authentication succeeds, instead of prompting for a password, the HTTPS server checks the RADIUS server only for authorization. A local user is not required. By default, the username found in the certificate field UserPrincipalName (UPN) is used for authorization on the RADIUS serer. When this parameter is omitted, authorization radius is still the assumed active setting.
Selects which certificate username field is to be used for authorization.

Two-factor authentication commands | 2906

Parameter

Description
n Specify user_pincipal_name to use the certificate UserPrincipalName (UPN) field. This is the default.
n Specify common_name to use the certificate CommonName (CN) field. When this parameter is omitted, user_pincipal_name is assumed.

Examples
Enabling HTTPS server authentication with authorization on a RADIUS server with the username in certificate field UserPrincipalName (UPN):

switch(config)# https-server authentication certificate authorization radius

Enabling HTTPS server authentication with authorization on a RADIUS server with the username in certificate field UserPrincipalName (UPN) (authorization radius is still implied even though not specified):

switch(config)# https-server authentication certificate

Enabling HTTPS server authentication with authorization on a RADIUS server with the username in certificate field CommonName (CN):

switch(config)# https-server authentication certificate authorization radius username common_name

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms All platforms

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

ssh certificate-as-authorized-key
ssh certificate-as-authorized-key no ssh certificate-as-authorized-key
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2907

Enables SSH enforcement that the username must be present in the certificate that is being used for authorization. This configuration alters how certificate-based authentication maps to a user account. When this is enabled, SSH will not require local user association with an authorized-key and instead enforces that the username used to log in is present within the certificate. The SSH server will check for the username in certificate fields Common Name or User Principle Name for a match. If a certificate is not used for authentication then this configuration has no effect on SSH authentication. The no form of this command disables the SSH enforcement of username in the certificate.
Examples
Enabling SSH enforcement of username in the certificate:
switch(config)# ssh certificate-as-authorized-key
Disabling SSH enforcement of username in the certificate:
switch(config)# no ssh certificate-as-authorized-key

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11

Command Information

Platforms All platforms

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

ssh two-factor-authentication
ssh two-factor-authentication [authorization radius] no ssh two-factor-authentication [authorization radius]
Description
Enables the selected SSH Two Factor authentication method. Two-factor authentication uses an X.509 certificate and possibly a password. First the X.509 certificate presented by the user is authenticated. Then, if successful, (when the authorization-radius parameter is not specified) the (locally-defined) user is prompted for a password. When the authorization radius parameter is specified, instead of prompting for a password, SSH checks only for authorization with the remote RADIUS server. A local user is not required. The no form of the command disables SSH two-factor authentication.

Two-factor authentication commands | 2908

Parameter authorization radius

Description
Specifies that after certificate authentication succeeds, SSH checks the RADIUS server only for authorization.

Examples
Enabling two-factor authentication for local user with password prompting:

switch(config)# ssh two-factor-authentication

Disabling two-factor authentication for local user with password prompting:

switch(config)# no ssh two-factor-authentication

Enabling two-factor authentication for remote-only RADIUS-defined users without password prompting:

switch(config)# ssh two-factor-authentication authorization radius

Disabling two-factor authentication for remote-only RADIUS-defined users without password prompting: :

switch(config)# no ssh two-factor-authentication authorization radius

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11 10.10

Command Information

Platforms All platforms

Command context config

Modification Added the authorization radius parameter Command introduced
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2909

Chapter 158 UDLD commands

UDLD commands
clear udld statistics
clear udld statistics [interface <INTERFACE-NAME>]
Description
Clears UDLD statistics for all interfaces or a specific interface.
Examples
On the 6400 Switch Series, interface identification differs. Clearing all UDLD statistics on all interfaces:
switch# clear udld statistics
Clearing all UDLD statistics on interface 1/1/1:
switch# clear udld statistics interface 1/1/1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show udld
show udld [interface <INTERFACE-NAME>] [vsx-peer]
Description
Displays UDLD information for all interfaces or for a specific interface.

AOS-CX 10.14 Command-Line Interface Guide

2910

Parameter interface <INTERFACE-NAME>
vsx-peer

Description
Specifies the name of a logical interface on the switch, which can be: n An Ethernet interface associated with a physical port. Use the
format member/slot/port (for example, 1/3/1). n UDLD runs only on physical interfaces. LAGs, tunnels, and the
like are not supported. However, UDLD can be configured individually on each port of a LAG or trunk group. Configuring UDLD on a trunk group primary port enables UDLD on that port only.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Displaying all UDLD information:

switch# show udld

Abbreviations: VTF - Verify-then-forward NOR - RFC 5171 normal

FTV - Forward-then-verify AGG - RFC 5171 aggresive

----------------------------------------------------------------------

Interface UDLD

UDLD

UDLD

UDLD Mode Interval

Config State

Substate

Link

----------------------------------------------------------------------

1/1/1

Disabled Inactive Undetermined Unblock FTV 8000

1/1/2

Enabled Active Bidirectional Unblock FTV 7000

1/1/3

Enabled Active Blocked

Block FTV 7000

1/1/4

Enabled Inactive Uninitialized Unblock NOR 7000

1/1/5

Enabled Active ErrDisabled Block AGG 7000

1/1/6

Disabled Active Detection

Unblock NOR 7000

---------------------------------------------------------------

Retries Tx

Rx

Rx

Rx

Transitions

Pkts

Pkts

Pkts disc. Pkts drop.

---------------------------------------------------------------

4

4

54

123

123

1

7

1234567 1548421 23214

1878981

3

4

3

77871 2157

81878

1

5

50

0

0

0

0

3

150

25

0

2

1

3

6

54

123

23

1

Displaying information for interface 1/1/1:

switch# show udld interface 1/1/1
Interface 1/1/1 Config: Enabled State: Active

UDLD commands | 2911

Substate: Bidirectional Link: Unblock Version: Aruba OS Mode: Forward then verify Interval: 7000 milliseconds Retries: 7 Tx: 1234567 packets Rx: 1548421 packets, 23214 discarded packets, 1878981 dropped packets Port transitions: 3

Displaying the UDLD enable interfaces information:

switch# show udld enabled

Abbreviations: VTF - Verify-then-forward NOR - RFC 5171 normal

FTV - Forward-then-verify AGG - RFC 5171 aggresive

----------------------------------------------------------------------------------

---------------------------------------------------

Interface UDLD

UDLD

UDLD

UDLD

Mode Interval Retries Tx

Rx

Rx

Rx

Transitions

Config State

Substate

Link

Pkts

Pkts

Pkts disc. Pkts drop.

----------------------------------------------------------------------------------

---------------------------------------------------

2

Enabled Active Bidirectional Unblock FTV 7000

7

1234567 1548421 23214

1878981

3

3

Enabled Active Blocked

Block FTV 7000

4

3

77871 2157

81878

1

4

Enabled Inactive Uninitialized Unblock NOR 7000

5

50

0

0

0

0

5

Enabled Active ErrDisabled Block AGG 7000

3

150

25

0

2

1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

udld

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2912

udld [disable] no udld [disable]
Description
Enables UDLD support on a physical interface. UDLD is disabled by default. UDLD is configured on a per-port basis and must be enabled at both ends of the link. UDLD runs only on physical interfaces. LAGs, tunnels, and the like are not supported. However, UDLD can be configured individually on each port of a LAG or trunk group. Configuring UDLD on a trunk group's primary port enables UDLD on that port only. The no form of this command disables UDLD support and resets all configuration values to their default settings.

Parameter disable

Description
Disables UDLD on the interface but retains all UDLD configuration settings.

Examples
On the 6400 Switch Series, interface identification differs. Enabling UDLD on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# udld

Disabling UDLD on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# no udld

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

udld interval
udld interval <TIME>

UDLD commands | 2913

no udld interval [<TIME>]
Description
Sets the packet transmission interval. The no form of this command sets the packet transmission interval to the default value of 7000 ms. The allowed values vary depending on the operation mode. The default interval is 7000 ms (7 seconds) for both ArubaOS-Switch and RFC5171 operation modes. Values must be specified as multiples of 10 ms (7000 ms is allowed but 7005 ms is not a valid setting).
Sessions under 100ms total detection time are susceptible to increasing processing load on the system. It is advisable to experiment with values that provide adequate detection times and system/protocol stability. Aruba recommends additional testing prior to configuring these sessions on a production environment.
However, these settings are recommended for specific deployments only, such as using UDLD for Ethernet Ring Protection Switching (ERPS) link-failure detection. The minimum detection time appropriate for your environment depends on the specific device family and configuration on which the protocol and system load is running. Aruba recommends additional testing for these configurations. During testing, monitor for unexpected false positive detections (i.e., UDLD records a failure when there was not any) on the interfaces running UDLD. Such false positive failures are an indication that the interval configuration requires tuning and that the system load might not allow such configuration.
When configuring detection times under 100ms for LAG interfaces, consider adding the interface first to the LAG and then enabling UDLD in the interface, to avoid false positive link failure detections. Adding an interface to a LAG causes momentary control plane traffic interruption for up to 100ms, which UDLD detects as a link failure if the detection time is following the control traffic interruption interval.

Parameter <TIME>

Description
Specifies the packet transmission interval. Range: 200 ms to 90000 ms (in increments of 10).

Examples
On the 6400 Switch Series, interface identification differs. Setting the packet transmission interval to 1000 ms on interface 1/1/1.

switch(config)# interface 1/1/1 switch(config-if)# udld interval 1000

Setting the packet transmission interval on interface 1/1/1 to the default value.

switch(config)# interface 1/1/1 switch(config-if)# no udld interval

Trying to set the packet interval to 1055 ms on interface 1 is rejected because the interval must be specified as a multiple of 10:

switch(config)# interface 1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2914

switch(config-if)# udld interval 1055 Invalid interval. The interval value must be between 20ms and 90000ms and should be specified as a multiple of 10, for example: 20, 100, 3000 or 90000.
Trying to set the packet interval to less than 7000 ms on interface 1 is rejected if using the RFC5171 mode.
switch(config)# interface 1 switch(config-if)# udld mode rfc5171 normal switch(config-if)# udld interval 1000 Invalid interval. The interval must be equal or greater than 7000ms.

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

udld mode
udld mode aruba-os {verify-then-forward | forward-then-verify} udld mode rfc5171 <RFC5171-MODE> no udld mode [[aruba-os [verify-then-forward | forward-then-verify]] | [rfc5171 [<RFC5171-MODE>]]]
Description
Sets the operating mode. The no form of this command sets the operating mode to the default value of aruba-os and forwardthen-verify.

Parameter
aruba-os {verify-then-forward | forward-then-verify}
verify-then-forward

Description
Selects the ArubaOS mode to use. Use this mode when interconnecting with HPE PVOS/Brocade/Foundry switches.
In this mode: n Interfaces start as unblocked.

UDLD commands | 2915

Parameter
forward-then-verify
rfc5171 <RFC5171-MODE> normal aggressive

Description
n Once an interface is determined to be bidirectional, it is blocked if the retry limit is reached without receiving any UDLD packets.
n Interfaces automatically unblock if a UDLD packet is received. n On failover, the UDLD state does not change if the (interval *
retries) time is around 6 seconds.
In this mode: n Interfaces start as unblocked. n Interfaces transition to the unblocked state when receiving
UDLD packets. n Once an interface is determined to be bidirectional, it is
blocked if the retry limit is reached without receiving any UDLD packets. n Interfaces automatically unblock if a UDLD packet is received.
Selects the RFC5171 mode to use. Use this mode when interconnecting with third-party switches.
In this mode: n Interfaces start as unblocked. n Interfaces do not block when the retry limit is reached without
receiving any UDLD packets (plus 8 extra packets sent to the peer). Instead, an event is generated. n Interfaces automatically unblock if a UDLD packet is received.
In this mode: n Interfaces start as unblocked. n Once an interface is determined to be bidirectional, an
interface will block when the retry limit is reached without receiving any UDLD packets (plus 8 extra packets sent to the peer). n Interfaces implement a limited/reduced errDisabled recovery mechanism. When the interface's state goes to errDisabled, a maximum of 3 attempts (5 minutes apart) are triggered to try and bring up the interface in case the remote endpoint is still sending UDLD packets. After these 3 retries, the interface will remain blocked even if UDLD packets are received. The only way to unblock the interface when this occurs is to disable (and optionally re-enable) UDLD on the interface. The retry limit is reset once the interface becomes unblocked.

Examples
On the 6400 Switch Series, interface identification differs. Setting the operating mode to aruba-os and forward-then-verify on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# udld mode aruba-os forward-then-verify

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2916

Setting the operating mode to rfc5171 and aggressive on interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# udld mode rfc5171 aggressive
Setting the operating mode on interface 1/1/1 to the default value:
switch(config)# interface 1/1/1 switch(config-if)# no udld mode

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

udld retries
udld retries <COUNT> no udld retries [<COUNT>]
Description
Sets the UDLD retry count. The no form of this command sets the retry count to the default of 4.

Parameter <COUNT>

Description Specifies the UDLD retry count. Range: 3 to 10. Default: 4.

Examples
On the 6400 Switch Series, interface identification differs. Setting the UDLD retry count to 5 on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# udld retries 5

Setting the UDLD retry count on interface 1/1/1 to the default value:

UDLD commands | 2917

switch(config)# interface 1/1/1 switch(config-if)# no udld retries

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2918

Chapter 159
UFD (Uplink Failure Detection) commands

UFD (Uplink Failure Detection) commands
debug ufd all
debug ufd all no debug ufd all
Description
Enables the UFD debug logs. The no form of this command disables the UFD debug logs.
Examples
Enabling UFD debug logs:
switch(config)# debug ufd all
Disabling UFD debug logs:
switch(config)# no debug ufd all

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History

Release 10.09

Command Information

Platforms All platforms

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

delay
delay {down | up} <DELAY> no delay {down | up} <DELAY>
Description
AOS-CX 10.14 Command-Line Interface Guide

2919

Within the selected UFD (Uplink Failure Detection) session context, specifies the amount of time (in seconds) to delay before bringing up or down the configured Links to Disable (LtD) after the corresponding Links to Monitor (LtM) come back up or go down.
For example, with delay down 10, when all LtM links go down and remain down after 10 seconds, UFD disables the interfaces/LAGs configured as Links-to-Disable (LtD). Similarly, with delay up 10, If any of the LtM links come back up and remain up after 10 seconds, then all the LtD links are brought back up.

In addition to any configured delay there is an additional delay of 3 to 5 seconds before bringing any Links-toDisable (LtD) down or back up. So with the default delay of 0 seconds, a delay of 3 to 5 seconds does occur.
The no form of this command restores the delay to its default of 0 seconds.

Parameter <DELAY>

Description
Species the delay in seconds. Range 0 to 180 seconds. Default: 0 seconds.

Examples
Setting the up and down delays to 10 seconds:

switch(config)# ufd enable switch(config)# ufd session-id 1 switch(config-ufd-1)# links-to-monitor 1/1/1,1/1/2 switch(config-ufd-1)# links-to-disable 1/1/11,1/1/12 switch(config-ufd-1)# delay down 10 switch(config-ufd-1)# delay up 10 switch(config-ufd-1)# exit switch(config)#

Resetting the up and down delays to their default of 0:

switch(config-ufd-1)# no delay down 10 switch(config-ufd-1)# no delay up 10

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms All platforms

Command context config-ufd-<ID>

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

UFD (Uplink Failure Detection) commands | 2920

links-to-disable
links-to-disable <IF/LAG-LIST> no links-to-disable <IF/LAG-LIST>
Description
Within the selected UFD (Uplink Failure Detection) session context, specifies the interfaces or LAGs to disable when the monitored uplink interfaces go down. For proper UFD operation, links-to-disable and links-to-monitor must both be configured. Use command links-to-monitor to specify a corresponding list of interfaces/LAGs to monitor. The no form of this command deletes the specified links to disable list within the selected UFD session context.
A LAG member interface cannot be added as a link to disable. A interface configured as a link to disable cannot be added as a LAG member interface.

Parameter <IF/LAG-LIST>

Description
List of L2 interfaces or LAGs. Separate interfaces/LAGs with commas (for individual interfaces/LAGs) or hyphens (for a consecutive range of interfaces/LAGs).

Examples
Configuring two links to be disabled:

switch(config)# ufd enable switch(config)# ufd session-id 1 switch(config-ufd-1)# links-to-monitor 1/1/1,1/1/2 switch(config-ufd-1)# links-to-disable 1/1/11,1/1/12 switch(config-ufd-1)# delay down 10 switch(config-ufd-1)# delay up 10 switch(config-ufd-1)# exit switch(config)#

Configuring a range of interfaces to disable:

switch(config)# ufd session-id 2 switch(config-ufd-2)# links-to-monitor lag18-lag20 switch(config-ufd-2)# links-to-disable 1/1/3-1/1/5 switch(config-ufd-2)# exit switch(config)#

Deleting the links to disable for two interfaces:

switch(config-ufd-1)# no links-to-disable 1/1/11,1/1/12

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2921

Release 10.09

Command Information

Platforms All platforms

Command context config-ufd-<ID>

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

links-to-monitor
links-to-monitor <IF/LAG-LIST> no links-to-monitor <IF/LAG-LIST>
Description
Within the selected UFD (Uplink Failure Detection) session context, specifies the uplink interfaces or LAGs to monitor for UFD. For proper UFD operation, links-to-monitor and links-to-disable must both be configured. Use command links-to-disable to specify a corresponding list of interfaces/LAGs to disable if the monitored uplinks go down. The no form of this command deletes the specified links to monitor list within the selected UFD session context.
A LAG member interface cannot be added as a link to monitor. A interface configured as a link to monitor cannot be added as a LAG member interface.

Parameter <IF/LAG-LIST>

Description
List of L2 interfaces or LAGs. Separate interfaces/LAGs with commas (for individual interfaces/LAGs) or hyphens (for a consecutive range of interfaces/LAGs).

Examples
Configuring two uplinks to monitor for UFD session 1:

switch(config)# ufd enable switch(config)# ufd session-id 1 switch(config-ufd-1)# links-to-monitor 1/1/1,1/1/2 switch(config-ufd-1)# links-to-disable 1/1/11,1/1/12 switch(config-ufd-1)# delay down 10 switch(config-ufd-1)# delay up 10 switch(config-ufd-1)# exit switch(config)#

Configuring a range of uplink LAGs to monitor for UFD session 2:

UFD (Uplink Failure Detection) commands | 2922

switch(config)# ufd session-id 2 switch(config-ufd-2)# links-to-monitor lag18-lag20 switch(config-ufd-2)# links-to-disable 1/1/3-1/1/5 switch(config-ufd-2)# exit switch(config)#
Deleting both links to monitor for UFD session 1:
switch(config-ufd-1)# no links-to-monitor 1/1/1,1/1/2

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms All platforms

Command context config-ufd-<ID>

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

show capacities ufd
show capacities ufd show capacities-status ufd
Description
Command show capacities ufd shows UFD session capacity. Command show capacities-status ufd shows UFD session capacity and the number of UFD sessions configured.
Example
Showing UFD session capacity:

switch# show capacities ufd

System Capacities: Filter UFD

Capacities Name

Value

----------------------------------------------------------------------------------

---

Maximum number of Uplink Failure Detection sessions configurable in a system 128

Showing UFD session capacity and the number of UFD sessions configured:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2923

switch(config)# show capacities-status ufd

System Capacities Status: Filter UFD

Capacities Status Name

Value

Maximum

----------------------------------------------------------------------------------

---

Number of Uplink Failure Detection sessions currently configured

1 128

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.09

Modification Command introduced.

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config ufd
show running-config ufd
Description
Shows the running configuration for UFD.
Example
Showing the UFD portion of running configuration information:
switch(config)# ufd enable switch(config)# ufd session-id 1 switch(config-ufd-1)# links-to-monitor 1/1/1,1/1/2 switch(config-ufd-1)# links-to-disable 1/1/11,1/1/12 switch(config-ufd-1)# delay down 10 switch(config-ufd-1)# delay up 10 switch(config-ufd-1)# exit switch(config)#
switch# show running-config ufd Current configuration: ufd enable
ufd session-id 1 delay up 10 delay down 10

UFD (Uplink Failure Detection) commands | 2924

links-to-monitor 1/1/1,1/1/2 links-to-disable 1/1/11,1/1/12

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.09

Modification Command introduced.

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show-tech ufd
show-tech ufd
Description
Executes the show ufd command followed by the show running-config ufd command.
Example
Running the show ufd command followed by the show running-config ufd command:

switch# show tech ufd ==================================================== Show Tech executed on Tue Nov 23 11:32:08 2021 ==================================================== ==================================================== [Begin] Feature ufd ====================================================

********************************* Command : show ufd ********************************* Global UFD Status : Enabled

UFD session-id UFD Links-to-Monitor status Up Delay Down Delay Links-to-Monitor Links-to-Disable Last Links-to-Monitor Down Time

: 10 : Up : 20 sec : 10 sec : None : None : None

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2925

UFD session-id UFD Links-to-Monitor status Up Delay Down Delay Links-to-Monitor Links-to-Disable Last Links-to-Monitor Down Time

: 20 : Up : 0 sec : 0 sec : None : None : None

********************************* Command : show running-config ufd ********************************* ufd enable ufd session-id 10
delay down 10 delay up 20 exit ufd session-id 20 exit ==================================================== [End] Feature ufd ====================================================

==================================================== Show Tech commands executed successfully ====================================================

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.09

Modification Command introduced.

Command Information

Platforms All platforms

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ufd
show ufd [session-id <ID>]
Description
Shows information on all UFD sessions or the specified UFD session.

Parameter <ID>

Description Specifies an existing UFD session ID. Range: 1 to 128.

UFD (Uplink Failure Detection) commands | 2926

Example
Showing information on all configured UFD sessions:

switch# show ufd Global UFD Status : Enabled

UFD session-id UFD Links-to-Monitor status Up Delay Down Delay Links-to-Monitor Links-to-Disable Last Links-to-Monitor Down Time

:1 : Up : 10 sec : 10 sec : 1/1/1,1/1/2 : 1/1/11,1/1/12 : 2021-11-03 15:22:05:37

UFD session-id UFD Links-to-Monitor status Up Delay Down Delay Links-to-Monitor Links-to-Disable Last Links-to-Monitor Down Time

:2 : Up : 5 sec : 5 sec : lag18-lag20 : 1/1/3-1/1/5 : 2021-11-01 12:14:42:56

Showing information on UFD session 2:

switch# show ufd session 2

UFD session-id UFD Links-to-Monitor status Up Delay Down Delay Links-to-Monitor Links-to-Disable Last Links-to-Monitor Down Time

:2 : Up : 5 sec : 5 sec : lag18-lag20 : 1/1/3-1/1/5 : 2021-11-01 12:14:42:56

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.09

Modification Command introduced.

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ufd enable
ufd enable

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2927

no ufd enable
Description
Enables UFD (Uplink Failure Detection). UFD is disabled by default. This command must be issued before the configuration that is set with related UFD commands takes effect. The no form of this command disables UFD.
Examples
Enabling UFD:
switch(config)# ufd enable switch(config)# ufd session-id 1 switch(config-ufd-1)# links-to-monitor 1/1/1,1/1/2 switch(config-ufd-1)# links-to-disable 1/1/11,1/1/12 switch(config-ufd-1)# delay down 10 switch(config-ufd-1)# delay up 10 switch(config-ufd-1)# exit switch(config)#
Disabling UFD:
switch(config)# no ufd enable

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History
Release 10.09

Command Information

Platforms All platforms

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

ufd session-id
ufd session-id <ID> no ufd session-id <ID>
Description
Creates the specified UFD (Uplink Failure Detection) session and then enters its context. If the specified session already exists, this command enters its context. The no form of this command deletes the specified session configuration.

UFD (Uplink Failure Detection) commands | 2928

Parameter <ID>

Description Specifies the UFD session ID. Range: 1 to 128.

Examples
Creating UFD session 1 and then entering its context:

switch(config)# ufd enable switch(config)# ufd session-id 1 switch(config-ufd-1)# links-to-monitor 1/1/1,1/1/2 switch(config-ufd-1)# links-to-disable 1/1/11,1/1/12 switch(config-ufd-1)# delay down 10 switch(config-ufd-1)# delay up 10 switch(config-ufd-1)# exit switch(config)#

Creating UFD session 2 and then entering its context:

switch(config)# ufd session-id 2 switch(config-ufd-2)# links-to-monitor lag18-lag20 switch(config-ufd-2)# links-to-disable 1/1/3-1/1/5 switch(config-ufd-2)# exit switch(config)#

Deleting UFD session 1:

switch(config)# no ufd session-id 1

For more information on features that use this command, refer to the Link Aggregation Guide for your switch model.

Command History

Release 10.09

Command Information

Platforms All platforms

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2929

Chapter 160 UDP commands

UDP commands

ip forward-protocol udp
ip forward-protocol udp <IPV4-ADDR> {<PORT-NUM> | <PROTOCOL>} no ip forward-protocol udp
Description
Defines the UDP server to which the interface forwards ingress UDP broadcast packets received on a specific UDP port. A maximum of 8 UDP broadcast servers can be configured per interface. The no form of this command removes traffic forwarding for the specified server and port/protocol.

Parameter <IPV4-ADDR>
<PORT-NUM> <PROTOCOL>

Description
Specifies the UDP server IP address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the UDP port number for which traffic is forwarded.
Specifies the protocol name for which traffic is forwarded. Supported protocols and their port numbers are: n dns (53): Domain Name Service n ntp (123): Network Time Protocol n netbios-ns (137): NetBIOS Name Service n netbios-dgm (138): NetBIOS Datagram Service n radius (1812): Remote Authentication Dial-In User Service n radius-old (1645): Remote Authentication Dial-In User Service n rip (520): Routing Information Protocol n snmp (161): Simple Network Management Protocol n snmp-trap (162): Simple Network Management Protocol n tftp (69): Trivial File Transfer Protocol n timep (37): Time Protocol

Examples
On the 6400 Switch Series, interface identification differs. Forwarding DNS traffic to server 192.168.1.10 on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# ip udp-bcast-forward protocol udp 192.168.1.10 dns

Forwarding DNS traffic (port 53) to server 192.168.1.10 on interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# ip udp-bcast-forward protocol udp 192.168.1.10 53

AOS-CX 10.14 Command-Line Interface Guide

2930

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip udp-bcast-forward
ip udp-bcast-forward no ip udp-bcast-forward
Description
Enables UDP broadcast forwarding. The no form of this command disables UDP broadcast forwarding.
Examples
Enabling UDP broadcast forwarding:
switch(config)# ip udp-bcast-forward

Disabling UDP broadcast forwarding: switch(config)# no ip udp-bcast-forward

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

show ip forward-protocol udp
show ip forward-protocol udp [<INTERFACE-NAME>] [vsx-peer]
Description

UDP commands | 2931

Shows the configured UDP forwarding settings for all interfaces or a specific interface.

Parameter <INTERFACE-NAME> [vsx-peer]

Description
Specifies the name of an interface. Format: member/slot/port.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Showing the configured UDP forwarding settings for all interfaces:

switch# show ip forward-protocol udp UDP Broadcast Forwarder : enabled
Interface: 1/1/1 IP Forward Address UDP Port ----------------------------2.2.2.2 1645 4.4.4.4 138 4.4.4.4 1812 1.1.1.1 53 8.1.1.1 123 8.1.1.1 137 Interface: 1/1/2 IP Forward Address UDP Port ----------------------------2.2.2.2 37 2.2.2.2 69 2.2.2.2 520 2.2.2.2 161 2.2.2.2 162

Showing the configured UDP forwarding settings for a specific interface:
switch# show ip forward-protocol udp interface 1/1/1 UDP Broadcast Forwarder : enabled
Interface: 1/1/1 IP Forward Address UDP Port ------------------------------2.2.2.2 1645 4.4.4.4 138 4.4.4.4 1812 1.1.1.1 53 8.1.1.1 123 8.1.1.1 137

Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2932

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

UDP commands | 2933

Chapter 161 User and group commands

User and group commands
password complexity
password complexity no password complexity
Description
Enters the password-complexity context (shown in the switch prompt as config-pwd-cplx) for the purpose of enabling and configuring password complexity. Password complexity enhances security by enforcing specific password complexity requirements. Password complexity is disabled by default and must be enabled by execution of the enable command. Enabling or changing password complexity settings effects password creation or password change after the password complexity feature is enabled or changed. All existing passwords will continue to function as currently configured. When existing passwords are changed they will have to comply with whatever password complexity settings are enabled at the time of the change. The no form of this command reverts all settings to their default values and disables password complexity enforcement.
To ensure that enhanced security is maintained, it is recommended that you do not set any values to less than their defaults.
Password complexity apples only to local authentication. For remote authentication, you may choose to set up an equivalent of password complexity according to whatever is supported on your particular TACACS+ or RADIUS server.
Subcommands
These subcommands are available within the password complexity context (shown in the switch prompt as config-pwd-cplx). enable
Enables password complexity enforcement. The enforcement only applies to passwords created after this enabling. Existing passwords are not checked against password complexity. disable Disables password complexity enforcement. [no] history-count <COUNT> Specifies the number of previous passwords checked to prevent excessive reuse. Not applicable when adding new users. The no form of this subcommand resets the value to its default. Default: 5. Range: 1 to 5.
Previous passwords checked includes passwords used prior to enabling the password complexity feature.
[no] minimum-length <LENGTH>

AOS-CX 10.14 Command-Line Interface Guide

2934

Specifies the minimum password length. The no form of this subcommand resets the value to its default. Default: 8. Range: 1 to 32. [no] position-changes <POSITIONS> Specifies the minimum number of characters that must change in the new password compared to the previous password. Not applicable if no previous password exists, including when adding new users. The no form of this subcommand resets the value to its default. Default: 8. Range: 1 to 32. The number of password position changes is based on the number of simple character insertions, deletions, or replacements. For example: Old password: abCD4$ New password: abCD$ Position changes=1 ("4" deleted) Old password: abCD4$ New password: abCDEF4$ Position changes=2 ("EF" inserted) Old password: abCD4$ New password: ebCD4Position changes=2 ("a" replaced with "e," "1" added) Old password: abCD4$ New password: abC$# Position changes=3 ("D4" deleted, "#" added) [no] lowercase-count <COUNT> Specifies the minimum lowercase character count for new passwords. The no form of this subcommand resets the value to its default. Default: 1. Range: 0 to 32. [no] uppercase-count <COUNT> Specifies the minimum uppercase character count for new passwords. The no form of this subcommand resets the value to its default. Default: 1. Range: 0 to 32. [no] numeric-count <COUNT> Specifies the minimum numeric digit count for new passwords. The no form of this subcommand resets the value to its default. Default: 1. Range: 0 to 32. [no] special-char-count <COUNT> Specifies the minimum special character count for new passwords. The no form of this subcommand resets the value to its default. Default: 1. Range: 0 to 32. [no] adjacent-char-type-count Specifies the maximum number of adjacent characters from a character set allowed in a password. The different character sets are:
- Numbers - Lowercase alphabets - Uppercase alphabets - Special characters The number of adjacent characters from the character set in the password has to be less than or equal to the configured value. When set to 0, adjacent character type length check requirement is disabled. The no form of this subcommand resets the value to its default. Default: 0. Range: 0-31. list List the subcommands available within the password complexity context. exit Exits the password complexity context. end Exits the password complexity context and then the config context.
Usage
n Password complexity is only for use with plaintext passwords. With password complexity enabled, existing ciphertext passwords will continue working until a password is changed. All new passwords must be entered in plaintext form and be compliant with your password complexity configuration.
n The effective minimum password length may be larger than the configured minimum-length value. The effective minimum password length is calculated as follows:
LARGEST-of:(minimum-length, position-changes,(SUM-of:lowercase-count+uppercasecount+numeric-count+special-char-count))
User and group commands | 2935

For example, with minimum-length=8, and position-changes=10 (and the sum of the other four count settings <=9), the effective minimum-length is 10 (because position-changes is largest). Similarity, with a minimum-length=12, position-changes=8, lowercase-count=8, uppercase-count=4, numericcount=1, special-char-count=1, the effective minimum-length is 14 (8+4+1+1=14) (because sum off the four counts is largest).
Examples
Configuring password complexity settings with an effective minimum length of 10 (because positionchanges is 10):
switch(config)# password complexity switch(config-pwd-cplx)# history-count 3 switch(config-pwd-cplx)# minimum-length 8 switch(config-pwd-cplx)# position-changes 10 switch(config-pwd-cplx)# lowercase-count 2 switch(config-pwd-cplx)# uppercase-count 2 switch(config-pwd-cplx)# numeric-count 2 switch(config-pwd-cplx)# special-char-count 2 switch(config-pwd-cplx)# adjacent-char-type-count 3 switch(config-pwd-cplx)# enable switch# exit
Configuring password complexity settings with an effective minimum length of 14 (because the sum of the four count items is 14):
switch(config)# password complexity switch(config-pwd-cplx)# history-count 4 switch(config-pwd-cplx)# minimum-length 12 switch(config-pwd-cplx)# position-changes 8 switch(config-pwd-cplx)# lowercase-count 8 switch(config-pwd-cplx)# uppercase-count 4 switch(config-pwd-cplx)# numeric-count 1 switch(config-pwd-cplx)# special-char-count 1 switch(config-pwd-cplx)# adjacent-char-type-count 3 switch(config-pwd-cplx)# enable switch# exit
Enabling password complexity (with default settings) and changing a user (admin1) password successfully but failing to change another user (admin2) password due to not meeting complexity requirements:
switch(config)# password complexity switch(config-pwd-cplx)# enable switch(config-pwd-cplx)# exit switch(config)# switch(config)# user admin1 password Changing password for user admin1 Enter old password:************ Enter new password:************ Confirm new password:************ switch(config)# switch(config)# user admin2 password Changing password for user admin2 Enter old password:************ Enter new password:************ Confirm new password:************

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2936

User password not changed.

The new password does not meet one or more of the following complexity

requirements:

Minimum length

:8

Position changes

:8

Numeric count

:1

Lowercase count

:1

Uppercase count

:1

Special character count : 1

Adjacent character type count: 3

With password complexity already enabled, attempting to change an existing user password but failing because the new password is identical to a recently used one (history-count).
switch(config)# user admin1 password Changing password for user admin1 Enter old password:************ Enter new password:************ Confirm new password:************ User password not changed. The new password is the same as a recently used password.

With password complexity already enabled, creating a new admin user (admin3) with a plaintext password that meets complexity requirements.

switch(config)# user admin3 group administrators password Adding user admin3 Enter password:************ Confirm password:************

With password complexity already enabled, attempting to create a new admin user (admin4) with a ciphertext password but failing because ciphertext passwords are not supported with password complexity enabled.
switch(config)# user admin4 group administrators password ciphertext AQBapPd...== Ciphertext passwords cannot be used when password complexity is enabled. switch(config)#

Command History
Release 10.11.1010 10.07 or earlier

Modification adjacent-char-type-count subcommand added. --

Command Information

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

User and group commands | 2937

user
user <USERNAME> group {administrators | operators | auditors | <USER-GROUP>} password [ciphertext <CIPHERTEXT-PASSWORD> | plaintext <PLAINTEXT-PASSWORD>]
no user <USERNAME>
Description
Creates a user and adds the user to one of the user groups. Users are given the privileges of their group. For the three built-in user groups (administrators, operators, auditors), the privileges are fixed. For user-defined local user groups, the privileges are defined by the CLI command authorization rules of the group. When entered without either optional ciphertext or plaintext parameters, the cleartext password is prompted for twice, with the characters entered masked with "*" symbols. The no form of this command removes a user account from the switch. The administrator cannot delete the user account from which they are logged in. The admin user cannot be deleted.

Parameter <USERNAME>
group administrators | operators | auditors <USER-GROUP> ciphertext <CIPHERTEXT-PASSWORD>

Description
Specifies the user name. Requirements: Must start with a lowercase or uppercase letter. Can contain numbers, lowercase, and uppercase letters. Can include only these three special characters: hyphens ( - ), dots ( . ), and underscores ( _ ). Can have a maximum of 32 characters. Cannot be empty. Cannot be: admin, root, or remote_user. Cannot be Linux reserved names such as: daemon, bin, sys, sync, proxy, www-data, backup, list, irc, gnats, nobody, systemd-bus-proxy, sshd, messagebus, rpc, systemd-journal-gateway, systemd-journal-remote, systemd-journalupload, systemd-timesync, systemd-coredump, systemd-resolve, rpcuser, vagrant, opsd, rdanet, _lldpd, rdaadmin, rdaweb, docker_container, tss.
NOTE: Usernames containing the same consecutive letters with varying capitalization, such as Admin, ADMIN, and aDmin, will each be treated as different customer-configured user accounts.
Selects the local user group to which the new user will be assigned.
Selects one of three built-in local user groups.
Specifies an existing user-defined local user group.
Specifies a ciphertext password. No password prompts are provided and the ciphertext password is validated before the configuration is applied for the user. The variable <CIPHERTEXT-PASSWORD> is Base64 and is typically copied from another switch using the show runningconfig command output and then pasted into this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2938

Parameter

Description

NOTE: The administrator cannot construct ciphertext passwords themselves. The ciphertext is only created by an AOS-CX switch. The ciphertext is created by setting a password for a user with the user command. The
ciphertext is available for copying from the show
running-config output and pasting into the configuration on any other AOS-CX switch. The target switch must have the same export password (default or otherwise) as the source switch.

plaintext <PLAINTEXT-PASSWORD>

Specifies the password without prompting. The password is visible as cleartext when entered but is encrypted thereafter. Command history does show the password as cleartext.

Usage
n Up to 63 local users can be added, for a total of 64 users including the default user admin. A user can belong to only one group.
n The switch ships with the admin user account and three built-in local user groups: administrators, operators, and auditors. The admin account belongs to the administrators group. The Service OS also includes the administrator user admin. The two admin users are entirely distinct.
n When a local user account is removed, the user loses all active login/SSH sessions. Any calls on the existing REST session with that local user account fail with a permissions issue as soon as the user is deleted. Soon afterwards, the existing REST sessions with the deleted local user account become invalidated. If a user is viewing the GUI while their account is deleted, the user is redirected to the login page within 60 seconds. The home directory associated with the user is also removed from the switch.
n Cleartext passwords (whether entered with prompting or entered directly) must:
o Contain only ASCII characters from hexadecimal 21 to hexadecimal 7E [\x21-\x7E] (decimal 33 to 126). Spaces are not allowed. When the password is entered directly without prompting, the "?" symbol (hexadecimal 3F [\x3F] (decimal 63)) is not permitted.
o Contain at most 32 characters.
o Contain at least the number of characters configured (optionally) for minimum-password-length.

Although empty passwords are supported, it is recommended that you use strong passwords for all production switches.

Only an administrator can change the password of a user assigned to the operators role. Although usernames with uppercase letters appear in the show-running configuration, users will not have login access if the username was configured and downgraded to a version without uppercase support.
Examples
Creating local user jamie in the administrators group with a prompted password:

User and group commands | 2939

switch(config)# user jamie group administrators password Adding user jamie Enter password:************ Confirm password:************
Creating user chris in the existing user-defined local user group admuser2 with a cleartext password, using direct entry without prompting:
switch(config)# user chris group admuser2 password plaintext passWORDxJ|989
Creating user alex in the operators group with a ciphertext password (the ciphertext shown is a placeholder that must be replaced with actual ciphertext):
switch(config)# user alex group operators password ciphertext NDcDI2...8igJfA=
Removing user jamie:
switch(config)# no user jamie User jamie's home directory and active sessions will be deleted. Do you want to continue [y/n]?y
=======
Using uppercase letters within username:
switch(config)# user TestUser1 group administrators password plaintext testuser1 switch(config)#
>>>>>>> f45d9651 (TECHPUB-300: added examples, divs, and notes for ticket 50186)
For more information on features that use this command, refer to the Multicast Guide for your switch model.

Command History
Release 10.13 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification Added support for use of uppercase letters within username. --
Authority Administrators or local user group members with execution rights for this command.

user-group
user-group <GROUP-NAME> no user-group <GROUP-NAME>

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2940

Description
If <GROUP-NAME> does not exist, this command creates a local user group and then enters its context. If <GROUP-NAME> exists, this command enters the context for the specified <GROUP-NAME>. Within the <GROUP-NAME> context, several subcommands are available for working with rules that specify what CLI commands are permitted or denied for all members of the local group.
In addition to the three built-in user groups administrators, operators, and auditors, up to 29 userdefined local user groups can be defined. All users can be members of only one of the up to 32 groups.
The no form of this command deletes the specified user group. All members of the deleted group lose all command authorization privilege.

Parameter <GROUP-NAME>

Description
Specify a user group name up to 32 characters long. A new group is created if the specified group does not exist and then the group context is entered. If the group name exists, its context is entered.

Do not causally delete user-defined local user groups without understanding the implications. Although userdefined local user groups can be deleted with the respective members losing all privileges, the three built-in groups administrators, operators, and auditors are always available and their privileges are unchangeable.
Subcommands
These subcommands are available within the user-defined local user group context (shown in the switch prompt as config-usr-grp-<GROUP-NAME>). [<SEQ-NUM>] {permit | deny} cli command "<REGEX>" no <SEQ-NUM>
Defines a CLI command privilege permit or deny rule. There is an implicit "deny .*" rule at the end of every user-defined group rule list. Members of a user-defined group without any permit rules have no CLI command privileges. The no form of this subcommand deletes the specified (by sequence number) rule from the group.
Rule evaluation proceeds from lowest to highest sequence number until the first successful match, resulting in either CLI command permission or denial. Rule evaluation ceases upon first match. Therefore, rules for related CLI commands must be defined in most restrictive to least restrictive order.
<SEQ-NUM> Specifies the CLI command rule sequence number. When omitted, a sequence number that is 10 greater the highest existing sequence number is auto-assigned. When no rules exist, the first autoassigned sequence number is 10.
{permit | deny} Sets the rule type as either permit or deny. Rule order is important. For example, these two related rules together authorize all show commands except for the show aaa commands.
switch(config-usr-grp-admuser2)#10 deny cli command "show aaa .*" switch(config-usr-grp-admuser2)#20 permit cli command "show .*"
To achieve the wanted effect in this example, the deny rule must precede the permit rule. These two rules together achieve the following:
User and group commands | 2941

n All show aaa commands match on rule 10, triggering command denial, and the immediate cessation of further rule evaluation. Matching on rule 20 is never attempted.
n All other show commands (excluding show aaa commands) match on rule 20 and are therefore permitted.
<REGEX>
Specifies the CLI command matching criteria of the rule. The criteria can be expressed as ".*" which matches all commands. Otherwise, the criteria is expressed as a POSIX-compliant regular expression (regex) string starting with an exact match command token (for example show) followed by a regex representing command arguments. The first word must be a string that contains only alphanumeric or hyphen characters.
For example, to allow all commands starting with the word interface, the regex must be "interface .*" or just "interface". Using "interface.*" (without the space) is not supported. For example, "show .*" matches every show command. Consult the Extended regular expression information available at: https://pubs.opengroup.org/onlinepubs/9699919799/basedefs/V1_chap09.html#tag_09_04.

Sample matching criteria

Sample matched CLI command or specifier

show .*

show accounting log

bgp .*

bgp router-id 1.1.1.1

interface .*

interface 1/1/1

vlan (3|4)

vlan 3

vlan [1-9]

vlan 5

vlan ([1-9]|1[0-9])

vlan 19

Matches All show commands All bgp commands All interface specifiers VLAN 3 or 4 A single VLAN in the range 1 to 9 A single VLAN in the range 1 to 19

[<SEQ-NUM>] comment <TEXT-STRING> no <SEQ-NUM> comment
Adds a comment to an existing rule. The no form of this subcommand removes an existing comment.

switch(config-usr-grp-admuser2)# 10 comment Deny all show aaa commands. switch(config-usr-grp-admuser2)# 20 comment Permit all other show commands. switch(config-usr-grp-admuser2)# switch(config-usr-grp-admuser2)# show running-config current-context user-group admuser2
10 comment Deny all show aaa commands. 10 deny cli command "show aaa .*" 20 comment Permit all other show commands. 20 permit cli command "show .*"

include <GROUP-NAME> [no] include <GROUP-NAME>
Include all rules from the specified user-defined <GROUP-NAME>. Only one group can be included in the definition of another group. The content of the included group is effectively placed at the top of the rules list in the current group. If the specified <GROUP-NAME> does not exist, it is created.
The no form of this subcommand removes the specified included group from the current group. The specified included group must exist and must be included in the current group or else an error message is shown.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2942

The name of the included group is shown at the top of the show user-group command for the group with the include.
In this example, group admuser1 is included in group admuser2. So the admuser1 rules are evaluated first and then the rules in the admuser2 group are only evaluated if no CLI command match occurs for the rules in group admuser1.

switch(config-usr-grp-admuser2)# include admuser1

switch(config-usr-grp-admuser2)# show user-group admuser2

User Group Summary

==================

Name

: admuser2

Type

: configuration

Included Group : admuser1

Number of Rules : 2

User Group Rules

================

SEQUENCE NUM ACTION

COMMAND

COMMENT

------------- ---------- ----------------------------- ---------------------------

-----

10

deny

show aaa .*

Deny all show aaa commands.

20

permit

show .*

Permit all other show

commands.

resequence [<STARTING-SEQ-NUM> <INCREMENT>]
Resequences the CLI command authorization rules. When entered without the optional parameters the rules are resequenced with a <STARTING-SEQ-NUM> of 10 and an <INCREMENT> of 10. <STARTING-SEQ-NUM>
Specifies the starting sequence number. <INCREMENT>
Specifies the sequence number increment. Resequencing the rules to start at 100 with an increment of 20:

switch(config-usr-grp-admuser2)# resequence 100 20 switch(config-usr-grp-admuser2)# show running-config current-context user-group admuser2
100 comment Deny all show aaa commands. 100 deny cli command "show aaa .*" 120 comment Permit all other show commands. 120 permit cli command "show .*"

Resequencing the rules to the default of starting at 10 with an increment of 10:

switch(config-usr-grp-admuser2)# resequence switch(config-usr-grp-admuser2)# show running-config current-context user-group admuser2
10 comment Deny all show aaa commands. 10 deny cli command "show aaa .*" 20 comment Permit all other show commands. 20 permit cli command "show .*"

show running-config current-context Shows all the commands used to configure the rules in the current group context.

User and group commands | 2943

switch(config-usr-grp-admuser2)# show running-config current-context user-group admuser2
10 comment Deny all show aaa commands. 10 deny cli command "show aaa .*" 20 comment Permit all other show commands. 20 permit cli command "show .*"
list List the subcommands available within the user-defined group context.
exit Exits the user-defined group context.
end Exits the user-defined group context and then the config context.
For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

user management-interface
user <USERNAME> management-interface <MGMT-INTERFACE> no user <USERNAME> management-interface <MGMT-INTERFACE>
Description
Enables a management interface for the specified local user. By default, all management interfaces are enabled for all local users. The no form of this command disables the selected management interface for the specified local user.

Parameter <USERNAME> <MGMT-INTERFACE>

Description
Specifies the name of an existing local user.
Selects one of the management interfaces: ssh, telnet, httpsserver, console. Note that https-server corresponds to the Web UI and REST.

Examples
Enabling the SSH management interface for local user admin1:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2944

switch(config)# user admin1 management-interface ssh Disabling the SSH management interface for local user admin1:
switch(config)# no user admin1 management-interface ssh Enabling the telnet management interface for local user admin1:
switch(config)# user admin1 management-interface telnet Disabling the telnet management interface for local user admin1:
switch(config)# no user admin1 management-interface telnet Enabling the https-server (Web UI) management interface for local user admin1:
switch(config)# user admin1 management-interface https-server Disabling the https-server (Web UI) management interface for local user admin1:
switch(config)# no user admin1 management-interface https-server Enabling the console management interface for local user admisn1:
switch(config)# user admin1 management-interface console Disabling the console management interface for local user admin1:
switch(config)# no user admin1 management-interface console

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.11

Command Information

Platforms All platforms

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

User and group commands | 2945

user password
user <USERNAME> password [ciphertext <CIPHERTEXT-PASSWORD> | plaintext <PLAINTEXTPASSWORD>]
Description
Changes a password for an account or enables the password for the admin account. When entered without either optional ciphertext or plaintext parameters, the cleartext password is prompted for twice, with the characters entered masked with "*" symbols.

Parameter <USERNAME>
ciphertext <CIPHERTEXT-PASSWORD>

Description
Specifies the corresponding user name for the password you want to change.
Specifies a ciphertext password. No password prompts are provided and the ciphertext password is validated before the configuration is applied for the user. The variable <CIPHERTEXTPASSWORD> is Base64 and is typically copied from another switch using the show running-config command output and then pasted into this command.
NOTE: The administrator cannot construct ciphertext passwords themselves. The ciphertext is only created by an AOS-CX switch. The ciphertext is created by setting a password for a user with the user command. The ciphertext is available for copying from the show running-config output and pasting into the configuration on any other AOS-CX switch. The target switch must have the same export password (default or otherwise) as the source switch.

plaintext <PLAINTEXT-PASSWORD>

Specifies the password without prompting. The password is visible as cleartext when entered but is encrypted thereafter. Command history does show the password as cleartext.

Usage
The admin account is available on the switch without a password by default. Cleartext passwords (whether entered with prompting or entered directly) must:
n Contain only ASCII characters from hexadecimal 21 to hexadecimal 7E [\x21-\x7E] (decimal 33 to 126). Spaces are not allowed. When the password is entered directly without prompting, the "?" symbol (hexadecimal 3F [\x3F] (decimal 63)) is not permitted.
n Contain at most 32 characters. n Contain at least the number of characters configured (optionally) for minimum-password-length.

Although empty passwords are supported, it is recommended that you use strong passwords for all production switches.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2946

Only an administrator can change the password of a user assigned to the operators role. Although usernames with uppercase letters appear in the show-running configuration, users will not have login access if the username was configured and downgraded to a version without uppercase support.
Examples
Enabling (or changing) a cleartext password for admin:
switch(config)# user admin password Changing password for user admin Enter password:************ Confirm password:************
Changing the cleartext password for user chris, using direct entry without prompting:
switch(config)# user chris password plaintext PASSwordZQ#@67
Changing the ciphertext password for user alex (the ciphertext shown is a placeholder that must be replaced with actual ciphertext):
switch(config)# user alex password ciphertext XqYJ36...W83D4Y=

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

service export-password
service export-password no service export-password
Description
Configures a nondefault export password. The export password is used to transform critical security parameters (such as password hashes) into ciphertext suitable for exporting and showing by

User and group commands | 2947

commands such as show running-config. This transformation enables safe switch configuration import and export. The no form of this command reverts the export password to its factory default.
All factory-default switches have identical default export passwords. For security, it is recommended that you set the same nondefault export password on every switch in a group that will exchange configuration information. Only switches with identical export passwords can exchange configuration information.
Usage
Prompts you twice for the new export password. The export password must: n Contain only ASCII characters from hexadecimal 21 to hexadecimal 7E [\x21-\x7E] (decimal 33 to 126).
Spaces are not allowed. n Contain at most 32 characters. n Not be blank.
Examples
Configuring a new export password:
switch(config)# service export-password Enter password:************ Confirm password:************
Reverting the export password to its factory default:
switch(config)# no service export-password

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show password-complexity
show password-complexity

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2948

Description
Shows user-configured or default password complexity checking criteria.
Examples
Showing the current password complexity checking criteria:

switch(config)# show password-complexity

Global password complexity checking criteria:

Password complexity

: Enabled

Previous passwords to check

:3

Minimum password length

: 12

Minimum position changes

: 10

Maximum adjacent characters count : 3

Password composition

Minimum lowercase characters : 3

Minimum uppercase characters : 1

Minimum special characters : 1

Minimum numeric characters : 3

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show user-group
show user-group [<GROUP-NAME>] [vsx-peer]
Description
Shows user group information for the built-in groups plus any user-defined local user groups. When entered without <GROUP-NAME>, summary information is shown for all groups.

Parameter <GROUP-NAME>
vsx-peer

Description
Narrows the show command output to that of the specified group, and for local user groups, adds the User Group Rules list.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

User and group commands | 2949

Examples
Show the list of all user groups, including built-in groups and local user groups.

switch# show user-group

GROUP NAME

GROUP TYPE

INCLUDED GROUP NUMBER OF RULES

-------------- -------------- ----------------- -------------------

administrators built-in

n/a

n/a

admuser1

configuration --

5

admuser2

configuration admuser1

2

auditors

built-in

n/a

n/a

operators

built-in

n/a

n/a

Show detailed information for local user group admuser2.

switch(config-usr-grp-admuser2)# show user-group admuser2

User Group Summary

==================

Name

: admuser2

Type

: configuration

Included Group : admuser1

Number of Rules : 2

User Group Rules

================

SEQUENCE NUM ACTION

COMMAND

COMMENT

------------- ---------- ----------------------------- ---------------------------

-----

10

deny

show aaa .*

Deny all show aaa commands.

20

permit

show .*

Permit all other show

commands.

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show user information
show user information
Description
Shows the following information for the logged-in user:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2950

n User name. n User authentication type: local, RADIUS, or TACACS+. n User group: administrators, operators, or <GROUP-NAME>. This field is not applicable for remote
authenticated users who are mapped to administrators or operators based on their privilege level. n User privilege level: For the built-in user groups and RADIUS or TACACS+, the role privilege level value
is shown. For user-defined user groups, N/A is shown. n User login session: ssh, telnet, https-server, or console.
Examples
Showing information for the admin user:

switch# show user information

Username

: admin

Authentication type : Local

User group

: administrators

User privilege level : 15

User login session : console

Showing information for a member of the user-defined local user group admuser2:

switch# show user information

Username

: admin2-b

Authentication type : Local

User group

: admuser2

User privilege level : N/A

User login session : telnet

Showing information for a member of operators:

switch# show user information

Username

: operator

Authentication type : Local

User group

: operators

User privilege level : 1

User login session : https-server

Showing information for remote RADIUS user rad_user1 mapped to local user group administrators:

switch# show user information

Username

: rad_user1

Authentication type : RADIUS

User group

: administrators

User privilege level : 15

User login session : telnet

Showing information for remote RADIUS user rad_user2 mapped to local user group operators:

switch# show user information

Username

: rad_user2

Authentication type : RADIUS

User group

: operators

User and group commands | 2951

User privilege level : 1 User login session : console

Showing information for remote TACACS+ tac_user1 logged in with priv-lvl 15 (mapped to user group administrators):

switch# show user information

Username

: tac_user1

Authentication type : TACACS+

User group

: administrators

User privilege level : 15

User login session : ssh

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11
10.07 or earlier

Modification
Command now includes User login session information in its output
--

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show user-list
show user-list [vsx-peer]
Description
Shows all configured users and their corresponding group names.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Show the user list from a switch with only the admin user defined.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2952

switch# show user-list

USER

GROUP

---------------------------------------------

admin

administrators

Show the user list after adding a user to the operators built-in group.

switch# show user-list

USER

GROUP

---------------------------------------------

admin

administrators

oper1

operators

Show the user list after adding a user to the auditors built-in group.

switch# show user-list

USER

GROUP

---------------------------------------------

admin

administrators

oper1

operators

audit1

auditors

Show the user list after adding a total of three users to two user-defined user groups.

switch# show user-list

USER

GROUP

---------------------------------------------

admin

administrators

oper1

operators

audit1

auditors

adm1a

admuser1

admin2-a

admuser2

admin2-b

admuser2

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

User and group commands | 2953

show user-list management-interface
show user-list management-interface [vsx-peer]
Description
Shows a list of local users and the enabled management interfaces for each user.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Disabling SSH and https-server for user admin1, disabling Telnet for admin2, then showing the configuration:

switch(config)# no user admin1 management-interface ssh

switch(config)# no user admin1 management-interface https-server

switch(config)# no user admin2 management-interface telnet

switch(config)# show user-list management-interface

USER

ENABLED MANAGEMENT INTERFACE(S)

------------------------------------------------------------

admin

ssh,telnet,https-server,console

admin1

telnet,console

admin2

ssh, https-server, console

Re-enabling https-server for user admin1, re-enabling Telnet for admin2, then showing the configuration:

switch(config)# user admin1 management-interface https-server

switch(config)# user admin2 management-interface telnet

switch(config)# show user-list management-interface

USER

ENABLED MANAGEMENT INTERFACE(S)

------------------------------------------------------------

admin

ssh,telnet,https-server,console

admin1

telnet,https-server,console

admin2

telnet,https-server,console

For more information on features that use this command, refer to the Security Guide for your switch model.

Command History
Release 10.11
Command Information

Modification Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2954

Platforms All platforms

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

User and group commands | 2955

Chapter 162 User-based tunneling commands

User-based tunneling commands

backup-controller ip
backup-controller ip <IP-ADDR> no backup-controller ip <IP-ADDR>
Description
Specifies the IP address of the backup controller for the UBT zone. The no form of this command deletes the IP address of the backup controller.

Parameter <IP-ADDR>

Description Specifies the IP address of the backup controller.

Examples
Specifying the backup controller ip address for zone1:

switch(config)# ubt zone zone1 switch(config-ubt-zone1)# backup-controller ip 10.116.51.11

Delete the configured backup controller IP address:

switch(config)# ubt zone zone1 switch(config-ubt-zone1)# no backup-controller ip 10.116.51.11

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ubt-<ZONE-NAME>

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide

2956

enable
enable no enable
Description
Enables the UBT zone. The no form of this command disables the UBT zone.
Examples
Enabling UBT for zone zone1:
switch(config)# ubt zone zone1 switch(config-ubt-zone1)# enable
Disabling UBT for zone1:
switch(config)# ubt zone zone1 switch(config-ubt-zone1)# no enable

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ubt-<ZONE-NAME>

Authority
Administrators or local user group members with execution rights for this command.

ip source-interface
ip source-interface {all | ubt} {interface <IFNAME> | <IPV4-ADDR>} [vrf <VRF-NAME>] no ip source-interface {all | ubt} {interface <IFNAME> | <IPV4-ADDR>} [vrf <VRF-NAME>]
Description
Sets a single source IP address for the UBT zone VRF. This ensures that all traffic sent by UBT zone/VRF has the same source IP address, regardless of how it egresses the switch. This command provides two ways to set the source IP addresses: either by specifying a static IP address, or by using the address assigned to a switch interface. If you define both options, then the static IP address takes precedence. The no form of this command deletes the single source IP address for UBT.

User-based tunneling commands | 2957

Parameter all interface <IFNAME>
<IPV4-ADDR>
vrf <VRF-NAME>

Description
When used no other parameters are required.
Specifies the name of the interface from which UBT obtains its source IP address. The interface must have a valid IP address assigned to it. If the interface has both a primary and secondary IP address, the primary IP address is used.
Specifies the source IP address to use for UBT. The IP address must be defined on the switch, and it must exist on the specified VRF, Default: default. Specify the address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the name of the VRF from which the UBT zone sets its source IP address.

Examples
On the 6400 Switch Series, interface identification differs. Setting interface 1/1/7 as the source address for UBT for VRF default:

switch(config)# ip source-interface ubt interface 1/1/7 vrf default

Deleting the configured source interface 1/1/7 as the source address for UBT for VRF default:

switch(config)# no ip source-interface ubt interface 1/1/7 vrf default

Specifying the static IP address 1.1.1.1 as the source address for UBT for VRF default:

switch(config)# ip source-interface ubt 1.1.1.1 vrf default

Deleting the configured ip address as the source address for UBT for VRF default:

switch(config)# no ip source-interface ubt 1.1.1.1 vrf default

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2958

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

papi-security-key
papi-security-key [{ciphertext <SEC-KEY> | plaintext <SEC-KEY>}] no papi-security-key
Description
Specifies the shared security key used to encrypt UBT PAPI messages exchanged between the switch and the controller cluster for the zone. The no form of this command deletes the shared security key .

Parameter ciphertext <SEC-KEY> plaintext <SEC-KEY>

Description
Specifies an encrypted security key.
Specifies a plaintext security key. Range: 10 to 64 characters.
NOTE: When the security key is not provided on the command line, plaintext security key prompting occurs upon pressing Enter. The entered security key characters are masked with asterisks..

Examples
Specifying the PAPI security key for UBT zone zone1 as plaintext:
switch(config)# ubt zone zone1 switch(config-ubt-zone1)# papi-security-key plaintext F82#450b
Specifying the PAPI security key for UBT zone2 with plaintext prompting:
switch(config)# ubt zone zone2 switch(config-ubt-zone2)# papi-security-key Enter the PAPI security key: ********** Re-Enter the PAPI security key: **********
Specifying the PAPI security key for UBT zone1 as ciphertext:
switch(config)# ubt zone zone1 switch(config-ubt-zone1)# papi-security-key ciphertext AQBapdAVz5...RmH3+4cpg=
Removing the PAPI security key for UBT zone1:
switch(config)# ubt zone zone1 switch(config-ubt-zone1)# no papi-security-key

User-based tunneling commands | 2959

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ubt-<ZONE-NAME>

Authority
Administrators or local user group members with execution rights for this command.

primary-controller ip
primary-controller ip <IP-ADDR> no primary-controller ip <IP-ADDR>
Description
Specifies the IP address of the primary controller IP address for the zone. The no form of this command deletes the IP address of the primary controller.

Parameter <IP-ADDR>

Description Specifies the IP address of the primary controller.

Examples
Specify the primary controller IP address for zone1:

switch(config)# ubt zone zone1 switch(config-ubt-zone1)# primary-controller ip 10.116.51.10

Delete the configured primary controller IP address:

switch(config)# ubt zone zone1 switch(config-ubt-zone1)# no primary-controller ip 10.116.51.10

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2960

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ubt-<ZONE-NAME>

Authority
Administrators or local user group members with execution rights for this command.

sac-heartbeat-interval
sac-heartbeat-interval <TIME> no sac-heartbeat-interval <TIME>
Description
Specifies the SAC heartbeat refresh time interval in seconds. The no form of this command sets the heartbeat interval to the default value.

Parameter <TIME>

Description
Specifies the SAC heartbeat refresh time interval in seconds. Range: 1 to 8. Default: 1.

Examples
Specifying a heartbeat refresh interval of 1 for UBT zone1:

switch(config)# ubt zone zone1 switch(config-ubt-zone1)# sac-heartbeat-interval 1

Deleting the configured heartbeat refresh interval:

switch(config)# ubt zone zone1 switch(config-ubt-zone1)# no sac-heartbeat-interval

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

User-based tunneling commands | 2961

Platforms
6300 6400

Command context config-ubt-<ZONE-NAME>

Authority
Administrators or local user group members with execution rights for this command.

show ip source-interface ubt
show ip source-interface ubt
Description
Displays source IP address configuration information for the UBT zone(s).
Examples
On the 6400 Switch Series, interface identification differs. Showing source IP address configuration information:

switch(config)# show ip source-interface ubt

Source-interface Configuration Information

---------------------------------------------------------------------

Protocol

Src-Interface

Src-IP

VRF

---------------------------------------------------------------------

ubt

vlan10

10.1.1.2

default

ubt

vlan20

20.1.1.2

blue

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show capacities ubt
show capacities ubt
Description
Shows the maximum number of UBT clients and zones that can be configured in the system.
Example

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2962

Showing maximum number of UBT clients and zones that can be configured:

switch# show capacities ubt

System Capacities: Filter UBT

Capacities Name

Value

--------------------------------------------------------------------------------

Maximum number of UBT clients in a system

1017

Maximum number of UBT zones per VRF

8

Maximum number of UBT zones

8

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.11.1000
10.07 or earlier

Modification
Example updated to show UBT multi-zone support on 6200 Switch Series.
--

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config ubt
show running-config ubt
Description
Shows the current running configuration of UBT.
Examples
Showing running configuration of ubt in vlan extend mode:
switch# show running-config ubt ubt-mode vlan-extend ubt zone zone1 vrf default
primary-controller ip 192.168.1.10 wol-enable vlan 10, 20-40, 50, 60 enable
Showing running configuration of ubt in local vlan mode:

User-based tunneling commands | 2963

switch# show running-config ubt ubt-client-vlan 3000 ubt zone zone1 vrf default
primary-controller ip 192.100.1.10 backup-controller ip 192.100.1.11 enable

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

show ubt
show ubt [brief] show ubt zone <ZONE-NAME> [brief]
Description
Shows global configuration information for UBT in addition to detailed or brief information for a specific UBT zone.

Parameter zone <ZONE-NAME> brief

Description Specifies the name of a zone. Length: 1 to 64 characters. Displays brief information.

Examples
Showing global UBT configuration information where local-VLAN mode has been configured:

switch# show ubt
Zone Name UBT Mode Primary Controller Backup Controller SAC HeartBeat Interval UAC KeepAlive Interval

: zone1 : local-vlan : 10.116.51.10 : 10.116.51.11 :1 : 60

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2964

VLAN Identifier

: 4094

VRF Name

: default

Wake-on-LAN Enabled-VLANS : -NA-

Admin State

: ENABLED

PAPI Security Key

: AQBapdxySvGPvdTl ... bL4FE=

Operational State

: Up

Zone Name

: zone2

UBT Mode

: local-vlan

Primary Controller

: 1.1.5.10

Backup Controller

: 1.1.5.11

SAC HeartBeat Interval : 1

UAC KeepAlive Interval : 60

VLAN Identifier

: 4094

VRF Name

: blue

Wake-on-Lan Enabled-VLANS : -NA-

Admin State

: ENABLED

PAPI Security Key

: TRQapdxySvGPvdTlkYn1 ... zP4FE=

Operational State

: Up

Showing global UBT configuration information where VLAN-extend mode has been configured:

switch# show ubt

Zone Name

: zone1

UBT Mode

: vlan-extend

Primary Controller

: 192.100.1.10

Backup Controller

: 192.100.1.11

SAC HeartBeat Interval : 1

UAC KeepAlive Interval : 60

VLAN Identifier

: ---/---

VRF Name

: default

Wake-on-LAN Enabled-VLANS : 2-90, 200, 300, 400, 500

Admin State

: ENABLED

PAPI Security Key

: DISABLED

Operational State

: up

Zone Name

: zone2

UBT Mode

: vlan-extend

Primary Controller

: 1.1.5.10

Backup Controller

: 1.1.5.11

SAC HeartBeat Interval : 1

UAC KeepAlive Interval : 60

VLAN Identifier

: ---/---

VRF Name

: blue

Wake-on-Lan Enabled-VLANS : ---/---

Admin State

: ENABLED

PAPI Security Key

: TRQapdxySvGPvdTlkYn1 ... zP4FE=

Operational State

: Up

Showing global UBT configuration information where multi-zone has been configured:

switch# show ubt
Zone Name UBT Mode Primary Controller Backup Controller SAC HeartBeat Interval

: zone1 : vlan-extend : 10.10.10.251 : ---/--:1

User-based tunneling commands | 2965

UAC KeepAlive Interval : 60

VLAN Identifier

: ---/---

VRF Name

: default

Wake-on-LAN Enabled-VLANS : ---/---

Admin State

: ENABLED

PAPI Security Key

: DISABLED

Operational State

: Up

Zone Name

: zone2

UBT Mode

: vlan-extend

Primary Controller

: 162.10.0.6

Backup Controller

: ---/---

SAC HeartBeat Interval : 1

UAC KeepAlive Interval : 60

VLAN Identifier

: ---/---

VRF Name

: default

Wake-on-LAN Enabled-VLANS : ---/---

Admin State

: ENABLED

PAPI Security Key

: DISABLED

Operational State

: Up

Zone Name

: zone3

UBT Mode

: vlan-extend

Primary Controller

: 20.20.20.11

Backup Controller

: ---/---

SAC HeartBeat Interval : 1

UAC KeepAlive Interval : 60

VLAN Identifier

: ---/---

VRF Name

: default

Wake-on-LAN Enabled-VLANS : ---/---

Admin State

: ENABLED

PAPI Security Key

: DISABLED

Operational State

: Up

Showing global UBT configuration information with operational state down failure reason:

switch# show ubt

Zone Name

: my-zone

UBT Mode

: local-vlan

Primary Controller

: 10.116.51.10

Backup Controller

: 10.116.51.11

SAC HeartBeat Interval : 1

UAC KeepAlive Interval : 60

VLAN Identifier

: 4094

VRF Name

: my-vrf

Wake-on-LAN Enabled-VLANS : -NA-

Admin State

: ENABLED

PAPI Security Key

:

AQBapdxySvGPvdTlkYn1/naKX4O3jKHrm28xLYfO6mLOK499BwAAAHdJp/bL4FE=

Operational State

: up

Zone Name UBT Mode Primary Controller Backup Controller SAC HeartBeat Interval UAC KeepAlive Interval VLAN Identifier VRF Name

: my-zone2 : local-vlan : 10.116.51.10 : 10.116.51.11 :1 : 60 : 4094 : my-vrf2

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2966

Wake-on-LAN Enabled-VLANS : -NA-

Admin State

: ENABLED

PAPI Security Key

:

AQBapdxySvGPvdTlkYn1/naKX4O3jKHrm28xLYfO6mLOK499BwAAAHdJp/bL4FE=

Operational State

: down

Failure Reason

: Controller is unreachable

Showing brief global UBT configuration information where local-VLAN mode has been configured:

switch(config)# show ubt brief

----------------------------------------------------------------------------------

--------------------

Zone Name UBT Mode

Primary Controller Address VRF Name

Status

Operational State

----------------------------------------------------------------------------------

--------------------

zone1

local-vlan

10.116.51.10

default

Enabled

up

zone2

local-vlan

20.116.51.20

vrf2

Enabled

down

zone3

local-vlan

30.116.51.30

vrf3

Enabled

up

Showing brief global UBT configuration information where VLAN-extend mode has been configured:

switch# show ubt brief

----------------------------------------------------------------------------------

--------------------

Zone Name UBT Mode

Primary Controller Address VRF Name

Status

Operational State

----------------------------------------------------------------------------------

--------------------

zone1

vlan-extend

10.116.51.10

default

Enabled

up

zone2

vlan-extend

20.116.51.20

vrf2

Enabled

down

zone3

vlan-extend

30.116.51.30

vrf3

Enabled

up

Showing brief configuration for UBT zone1 where local-VLAN mode has been configured:

switch# show ubt zone zone1 brief

--------------------------------------------------------------------------------

Zone Name UBT Mode

Primary Controller Address VRF Name

Status

--------------------------------------------------------------------------------

zone1

local-vlan

10.116.51.10

default

Enabled

Showing brief configuration for UBT zone1 where VLAN-extend mode has been configured:

switch# show ubt zone zone1 brief

--------------------------------------------------------------------------------

Zone Name UBT Mode

Primary Controller Address VRF Name

Status

--------------------------------------------------------------------------------

zone1

vlan-extend

10.116.51.10

default

Enabled

User-based tunneling commands | 2967

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10 10.09
10.07 or earlier

Modification
Wake-on-LAN enabled VLANs added.
n Failure Reason field added in the output of show ubt command.
n Operational State column added in the output of show ubt brief command.
--

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ubt information
show ubt information show ubt information zone <ZONE-NAME>
Description
Shows SAC and UAC information for UBT. Specifying a zone name displays UBT information for that zone.

Parameter ZONE-NAME

Description Specifies UBT zone name. Maximum characters: 64.

Examples
Showing SAC and UAC information for the tunneled node server:

switch(config)# show ubt information

===================================================================== Zone zone1: ===================================================================== SAC Information :

Active Standby

: 192.168.10.8 : -NA-

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2968

Controller is in Standalone mode

Wake-on-LAN VLAN boostrap information:

Active-SAC registered vlans :

Active-SAC failed vlans

: 200

Active-SAC failure reason

: Failed in controller

Standby-SAC registered vlans :

Standby-SAC failed vlans

:

Standby-SAC failure reason

:

===================================================================== Zone zone2: ===================================================================== SAC Information :

Active Standby

: 20.1.1.2 : 20.1.1.3

Node List Information :

Cluster Name

: cluster2

Cluster Alias Name :

Node List

:

----------------

20.1.1.2

20.1.1.3

20.1.1.4

Bucket Map Information :

Bucket Map Active : [0...255]

Bucket ID A-UAC

S-UAC

Connectivity

----------------------------------------------------------

0

20.1.1.2

20.1.1.3

L2

1

20.1.1.3

20.1.1.4

L2

2

20.1.1.4

20.1.1.2

L2

Wake-on-LAN VLAN boostrap information:

Active-SAC registered vlans : 10-20,30,40

Active-SAC failed vlans

:

Active-SAC failure reason

:

Standby-SAC registered vlans : 10-20,30,40

Standby-SAC failed vlans

:

Standby-SAC failure reason

:

Showing SAC and UAC information for zone1:

switch(config)# show ubt information zone zone1

===================================================================== Zone zone1: ===================================================================== SAC Information :

Active Standby

: 10.116.51.12 : 10.116.51.13

User-based tunneling commands | 2969

Node List Information :

Cluster Name

: my-cluster

Node List

:

----------------

10.1.1.1

10.1.1.2

10.1.1.3

Bucket Map Information :

Bucket Name

: my-bucket

Bucket Map Active : [0...255]

Bucket ID A-UAC

S-UAC

Connectivity

----------------------------------------------------------

0

10.1.1.1

10.1.1.2

L2

1

10.1.1.2

10.1.1.3

L2

2

10.1.1.3

10.1.1.1

L2

Wake-on-LAN VLAN boostrap information:

Active-SAC registered vlans : 100,300,400

Active-SAC failed vlans

: 200

Active-SAC failure reason

: Failed in controller

Standby-SAC registered vlans : 100,300,400

Standby-SAC failed vlans

:

Standby-SAC failure reason

:

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10 10.07 or earlier

Modification Wake-on-LAN enabled VLANs added. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ubt state
show ubt state show ubt state zone <ZONE-NAME>

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2970

show ubt state zone <ZONE-NAME> uac-ip <UAC-ADDR>
Description
Shows the global UBT state. Specifying a zone shows the UBT state of that zone. Specifying a UAC IP address shows the UBT state of that UAC.

Parameter zone <ZONE-NAME> uac-ip <UAC-ADDR>

Description
Specifies UBT zone name. Maximum characters: 64.
Specifies the IP address of the user anchor controller for which to view user information. Specify the address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.

Examples
On the 6400 Switch Series, interface identification differs. Showing the UBT state where local-VLAN mode has been configured:

switch# show ubt state

=====================================================================

Zone zone1:

=====================================================================

Local Conductor Server (LCS) State:

LCS Type

IP Address State

Role

---------------------------------------------------------------------

Primary

: 10.1.1.2

ready_for_bootstrap operational_primary

Secondary : 10.1.1.10

ready_for_bootstrap operational_secondary

Switch Anchor Controller (SAC) State:

IP Address

MAC Address

State

-----------------------------------------------------------------

Active

: 10.1.1.2

00:0b:86:b7:62:9f registered

Standby

: 10.1.1.3

00:0b:86:b7:64:0f registered

User Anchor Controller(UAC): 10.1.1.2

User

Port State

Bucket ID Gre Key VLAN

----------------------------------------------------------------------------------

00:00:00:00:00:01 1/1/1 registered

5

13

4094

User Anchor Controller(UAC): 10.1.1.3

User

Port State

Bucket ID Gre Key VLAN

----------------------------------------------------------------------------------

00:00:00:00:00:02 1/1/2 registered

4

14

4094

=====================================================================

Zone zone2:

=====================================================================

Local Conductor Server (LCS) State:

LCS Type

IP Address State

Role

---------------------------------------------------------------------

Primary

: 20.1.1.2

ready_for_bootstrap operational_primary

Secondary : 20.1.1.10

ready_for_bootstrap operational_secondary

Switch Anchor Controller (SAC) State:

IP Address

MAC Address

State

-----------------------------------------------------------------

Active

: 20.1.1.2

00:0b:86:b7:62:9f registered

Standby

: 20.1.1.3

00:0b:86:b7:64:0f registered

User Anchor Controller(UAC): 20.1.1.2

User-based tunneling commands | 2971

User

Port State

Bucket ID Gre Key VLAN

----------------------------------------------------------------------------------

00:00:00:00:00:03 1/1/1 registered

5

13

4094

User Anchor Controller(UAC): 20.1.1.3

User

Port State

Bucket ID Gre Key VLAN

----------------------------------------------------------------------------------

00:00:00:00:00:04 1/1/2 registered

4

14

4094

Showing the UBT state where VLAN-extend mode has been configured:

switch# show ubt state

=====================================================================

Zone zone1:

=====================================================================

Local Conductor Server (LCS) State:

LCS Type

IP Address State

Role

---------------------------------------------------------------------

Primary

: 10.1.1.2

ready_for_bootstrap operational_primary

Secondary : 10.1.1.10

ready_for_bootstrap operational_secondary

Switch Anchor Controller (SAC) State:

IP Address

MAC Address

State

-----------------------------------------------------------------

Active

: 10.1.1.2

00:0b:86:b7:62:9f registered

Standby

: 10.1.1.3

00:0b:86:b7:64:0f registered

User Anchor Controller(UAC): 10.1.1.2

User

Port State

Bucket ID Gre Key VLAN

----------------------------------------------------------------------------------

00:00:00:00:00:01 1/1/1 registered

5

13

10

User Anchor Controller(UAC): 10.1.1.3

User

Port State

Bucket ID Gre Key VLAN

----------------------------------------------------------------------------------

00:00:00:00:00:02 1/1/2 registered

4

14

20

=====================================================================

Zone zone2:

=====================================================================

Local Conductor Server (LCS) State:

LCS Type

IP Address State

Role

---------------------------------------------------------------------

Primary

: 20.1.1.2

ready_for_bootstrap operational_primary

Secondary : 20.1.1.10

ready_for_bootstrap operational_secondary

Switch Anchor Controller (SAC) State:

IP Address

MAC Address

State

-----------------------------------------------------------------

Active

: 20.1.1.2

00:0b:86:b7:62:9f registered

Standby

: 20.1.1.3

00:0b:86:b7:64:0f registered

User Anchor Controller(UAC): 20.1.1.2

User

Port State

Bucket ID Gre Key VLAN

----------------------------------------------------------------------------------

00:00:00:00:00:03 1/1/1 registered

5

13

30

User Anchor Controller(UAC): 20.1.1.3

User

Port State

Bucket ID Gre Key VLAN

----------------------------------------------------------------------------------

00:00:00:00:00:04 1/1/2 registered

4

14

40

Showing the UBT state of zone1:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2972

switch# show ubt state zone zone1

===================================================================== Zone zone1: ===================================================================== Local Conductor Server (LCS) State:

LCS Type

IP Address State

Role

---------------------------------------------------------------------

Primary

: 10.1.1.2

ready_for_bootstrap operational_primary

Secondary : 10.1.1.10

ready_for_bootstrap operational_secondary

Switch Anchor Controller (SAC) State:

IP Address

MAC Address

State

-----------------------------------------------------------------

Active

: 10.1.1.2

00:0b:86:b7:62:9f registered

Standby

: 10.1.1.3

00:0b:86:b7:64:0f registered

User Anchor Controller(UAC): 10.1.1.2

User

Port State

Bucket ID Gre Key VLAN

----------------------------------------------------------------------------------

00:00:00:00:00:01 1/1/1 registered

5

13

10

User Anchor Controller(UAC): 10.1.1.3

User

Port State

Bucket ID Gre Key VLAN

----------------------------------------------------------------------------------

00:00:00:00:00:02 1/1/2 registered

4

14

20

Showing the UBT state of a UAC with IP address 15.212.219.57 where local-VLAN mode has been configured:

switch# show ubt state zone zone1 uac-ip 15.212.219.57

User Anchor Controller(UAC): 15.212.219.57

User

Port State

Bucket ID Gre Key VLAN

----------------------------------------------------------------------------------

00:00:00:00:00:04 1/1/20 registered

4

14

4000

Showing the UBT state of a UAC with IP address 15.212.219.55 where VLAN-extend mode has been configured:

switch# show ubt state zone zone1 uac-ip 15.212.219.55

User Anchor Controller(UAC): 15.212.219.55

User

Port State

Bucket ID Gre Key VLAN

----------------------------------------------------------------------------------

00:00:00:00:00:07 1/1/10 registered

40

14

20

00:00:00:00:00:08 1/1/12 registered

28

14

30

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

User-based tunneling commands | 2973

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show ubt statistics
show ubt statistics show ubt statistics zone <ZONE-NAME> show ubt statistics zone <ZONE-NAME> uac-ip <UAC-ADDR>
Description
Displays statistics for UBT. Specifying a zone shows the UBT statistics for that zone. Specifying a UAC IP address shows the UBT statistics for that UAC.

Parameter zone <ZONE-NAME> uac-ip <UAC-ADDR>

Description
Specifies UBT zone name. Maximum characters: 64.
Specifies the IP address of the user anchor controller for which to view user information. Specify the address in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.

Examples
Showing UBT statistics where local-VLAN mode has been configured:

switch# show ubt statistics

UBT Statistics

=====================================================================

Zone zone1:

=====================================================================

Control Plane Statistics

Active : 10.1.1.1

Bootstrap Tx : 10

Bootstrap Rx

: 10

Nodelist Rx : 25

Nodelist Ack Rx : 6

Bucketmap Rx : 21

Bucketmap Ack Rx : 10

Failover Tx : 4

Failover Ack Rx : 3

Unbootstrap Tx : 7

Unbootstrap Ack Rx : 5

Heartbeat Tx : 5

Heartbeat Rx

:3

Standby : 10.1.1.2

Bootstrap Tx : 10

Bootstrap Rx

: 10

Nodelist Rx : 25

Nodelist Ack Rx : 6

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2974

Bucketmap Rx : 21

Bucketmap Ack Rx : 12

Failover Tx : 4

Failover Ack Rx : 3

Unbootstrap Tx : 5

Unbootstrap Ack Rx : 3

Heartbeat Tx : 7

Heartbeat Rx

:4

UAC : 10.1.1.1

Bootstrap Tx : 10

Bootstrap Ack Rx : 5

Unbootstrap Tx : 5

Unbootstrap Ack Rx : 5

Keepalive Tx : 2

Keepalive Ack Rx : 2

UAC : 10.1.1.2

Bootstrap Tx : 5

Bootstrap Ack Rx : 5

Unbootstrap Tx : 0

Unbootstrap Ack Rx : 0

Keepalive Tx : 0

Keepalive Ack Rx : 0

Data Plane Statistics

UAC

Packets Tx Packets Rx

---------------------------------

10.1.1.1 45678

23456

10.1.1.2 34567

23457

User Statistics

UAC

User Count

-----------------------

10.1.1.1 1

10.1.1.2 2

=====================================================================

Zone zone2:

=====================================================================

Control Plane Statistics

Active : 20.1.1.3

Bootstrap Tx : 10

Bootstrap Rx

: 10

Nodelist Rx : 25

Nodelist Ack Rx : 6

Bucketmap Rx : 21

Bucketmap Ack Rx : 10

Failover Tx : 4

Failover Ack Rx : 3

Unbootstrap Tx : 7

Unbootstrap Ack Rx : 5

Heartbeat Tx : 5

Heartbeat Rx

:3

Standby : 20.1.1.4

Bootstrap Tx : 10

Bootstrap Rx

: 10

Nodelist Rx : 25

Nodelist Ack Rx : 6

Bucketmap Rx : 21

Bucketmap Ack Rx : 12

Failover Tx : 4

Failover Ack Rx : 3

Unbootstrap Tx : 5

Unbootstrap Ack Rx : 3

Heartbeat Tx : 7

Heartbeat Rx

:4

UAC : 20.1.1.3

Bootstrap Tx : 10

Bootstrap Ack Rx : 5

Unbootstrap Tx : 5

Unbootstrap Ack Rx : 5

Keepalive Tx : 2

Keepalive Ack Rx : 2

UAC : 20.1.1.4

Bootstrap Tx : 5

Bootstrap Ack Rx : 5

Unbootstrap Tx : 0

Unbootstrap Ack Rx : 0

Keepalive Tx : 0

Keepalive Ack Rx : 0

Data Plane Statistics

UAC

Packets Tx Packets Rx

---------------------------------

20.1.1.3 45670

33456

20.1.1.4 34561

33457

User Statistics

UAC

User Count

-----------------------

20.1.1.3 1

User-based tunneling commands | 2975

20.1.1.4 2

Showing UBT statistics where VLAN-extend mode has been configured:

switch# show ubt statistics

UBT Statistics

=====================================================================

Zone zone1:

=====================================================================

Control Plane Statistics

Active : 10.1.1.3

Bootstrap Tx : 10

Bootstrap Rx

: 10

Nodelist Rx : 25

Nodelist Ack Rx : 6

Bucketmap Rx : 21

Bucketmap Ack Rx : 10

Failover Tx : 4

Failover Ack Rx : 3

Unbootstrap Tx : 7

Unbootstrap Ack Rx : 5

Heartbeat Tx : 5

Heartbeat Rx

:3

WoL Btstrp Tx : 1

WoL Btstrap Ack Rx : 1

Standby : 10.1.1.4

Bootstrap Tx : 10

Bootstrap Rx

: 10

Nodelist Rx : 25

Nodelist Ack Rx : 6

Bucketmap Rx : 21

Bucketmap Ack Rx : 12

Failover Tx : 4

Failover Ack Rx : 3

Unbootstrap Tx : 5

Unbootstrap Ack Rx : 3

Heartbeat Tx : 7

Heartbeat Rx

:4

WoL Btstrp Tx : 1

WoL Btstrap Ack Rx : 1

UAC : 10.1.1.3

Bootstrap Tx : 10

Bootstrap Ack Rx : 5

Unbootstrap Tx : 5

Unbootstrap Ack Rx : 5

Keepalive Tx : 2

Keepalive Ack Rx : 2

UAC : 10.1.1.4

Bootstrap Tx : 5

Bootstrap Ack Rx : 5

Unbootstrap Tx : 0

Unbootstrap Ack Rx : 0

Keepalive Tx : 0

Keepalive Ack Rx : 0

Data Plane Statistics

SAC tunnel Rx

: 444

Standby-SAC tunnel Rx

:0

UAC

Packets Tx Packets Rx

---------------------------------

10.1.1.3 45678

23456

10.1.1.4 34567

23457

User Statistics

UAC

User Count

-----------------------

10.1.1.3 1

10.1.1.4 2

=====================================================================

Zone zone2:

=====================================================================

Control Plane Statistics

Active : 20.1.1.3

Bootstrap Tx : 10

Bootstrap Rx

: 10

Nodelist Rx : 25

Nodelist Ack Rx : 6

Bucketmap Rx : 21

Bucketmap Ack Rx : 10

Failover Tx : 4

Failover Ack Rx : 3

Unbootstrap Tx : 7

Unbootstrap Ack Rx : 5

Heartbeat Tx : 5

Heartbeat Rx

:3

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2976

WoL Btstrp Tx : 1

WoL Btstrap Ack Rx : 1

Standby : 20.1.1.4

Bootstrap Tx : 10

Bootstrap Rx

: 10

Nodelist Rx : 25

Nodelist Ack Rx : 6

Bucketmap Rx : 21

Bucketmap Ack Rx : 12

Failover Tx : 4

Failover Ack Rx : 3

Unbootstrap Tx : 5

Unbootstrap Ack Rx : 3

Heartbeat Tx : 7

Heartbeat Rx

:4

WoL Btstrp Tx : 1

WoL Btstrap Ack Rx : 1

UAC : 20.1.1.3

Bootstrap Tx : 10

Bootstrap Ack Rx : 5

Unbootstrap Tx : 5

Unbootstrap Ack Rx : 5

Keepalive Tx : 2

Keepalive Ack Rx : 2

UAC : 20.1.1.4

Bootstrap Tx : 5

Bootstrap Ack Rx : 5

Unbootstrap Tx : 0

Unbootstrap Ack Rx : 0

Keepalive Tx : 0

Keepalive Ack Rx : 0

Data Plane Statistics

SAC tunnel Rx

: 222

Standby-SAC tunnel Rx

:0

UAC

Packets Tx Packets Rx

---------------------------------

20.1.1.3 45678

23456

20.1.1.4 34567

23457

User Statistics

UAC

User Count

-----------------------

20.1.1.3 1

20.1.1.4 2

Showing UBT statistics for zone1 where local-vlan mode has been configured:

switch# show ubt statistics zone zone1

UBT Statistics

Zone zone1: Control Plane Statistics

Active : 10.1.1.3 Bootstrap Tx : 10 Nodelist Rx : 25 Bucketmap Rx : 21 Failover Tx : 4 Unbootstrap Tx : 7 Heartbeat Tx : 5

Bootstrap Rx

: 10

Nodelist Ack Rx : 6

Bucketmap Ack Rx : 10

Failover Ack Rx : 3

Unbootstrap Ack Rx : 5

Heartbeat Rx

:3

Standby : 10.1.1.4 Bootstrap Tx : 10 Nodelist Rx : 25 Bucketmap Rx : 21 Failover Tx : 4 Unbootstrap Tx : 5 Heartbeat Tx : 7

Bootstrap Rx

: 10

Nodelist Ack Rx : 6

Bucketmap Ack Rx : 12

Failover Ack Rx : 3

Unbootstrap Ack Rx : 3

Heartbeat Rx

:4

UAC : 10.1.1.3 Bootstrap Tx : 10 Unbootstrap Tx : 5 Keepalive Tx : 2

Bootstrap Ack Rx : 5 Unbootstrap Ack Rx : 5 Keepalive Ack Rx : 2

User-based tunneling commands | 2977

UAC : 10.1.1.4 Bootstrap Tx : 5 Unbootstrap Tx : 0 Keepalive Tx : 0

Data Plane Statistics

UAC

Packets Tx Packets Rx

---------------------------------

10.1.1.3 45678

23456

10.1.1.4 34567

23457

User Statistics

UAC

User Count

-----------------------

10.1.1.3 1

10.1.1.4 2

Bootstrap Ack Rx : 5 Unbootstrap Ack Rx : 0 Keepalive Ack Rx : 0

Showing UBT statistics for zone1 where VLAN-extend mode has been configured:

switch# show ubt statistics zone zone1

UBT Statistics

Zone zone1: Control Plane Statistics

Active : 10.1.1.3 Bootstrap Tx : 10 Nodelist Rx : 25 Bucketmap Rx : 21 Failover Tx : 4 Unbootstrap Tx : 7 Heartbeat Tx : 5 WoL Btstrp Tx : 1

Bootstrap Rx

: 10

Nodelist Ack Rx : 6

Bucketmap Ack Rx : 10

Failover Ack Rx : 3

Unbootstrap Ack Rx : 5

Heartbeat Rx

:3

WoL Btstrap Ack Rx : 1

Standby : 10.1.1.4 Bootstrap Tx : 10 Nodelist Rx : 25 Bucketmap Rx : 21 Failover Tx : 4 Unbootstrap Tx : 5 Heartbeat Tx : 7 WoL Btstrp Tx : 1

Bootstrap Rx

: 10

Nodelist Ack Rx : 6

Bucketmap Ack Rx : 12

Failover Ack Rx : 3

Unbootstrap Ack Rx : 3

Heartbeat Rx

:4

WoL Btstrap Ack Rx : 1

UAC : 10.1.1.3 Bootstrap Tx : 10 Unbootstrap Tx : 5 Keepalive Tx : 2

Bootstrap Ack Rx : 5 Unbootstrap Ack Rx : 5 Keepalive Ack Rx : 2

UAC : 10.1.1.4 Bootstrap Tx : 5 Unbootstrap Tx : 0 Keepalive Tx : 0

Bootstrap Ack Rx : 5 Unbootstrap Ack Rx : 0 Keepalive Ack Rx : 0

Data Plane Statistics

SAC tunnel Rx Standby-SAC tunnel Rx

: 444 :0

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2978

UAC

Packets Tx Packets Rx

---------------------------------

10.1.1.3 45678

23456

10.1.1.4 34567

23457

User Statistics

UAC

User Count

-----------------------

10.1.1.3 1

10.1.1.4 2

Showing the UBT statistics of a UAC with IP address 101.101.101.11:

switch# show ubt statistics zone zone1 uac-ip 101.101.101.11 Data Plane Statistics

SAC tunnel Rx Standby-SAC tunnel Rx

: 6457 :0

UAC

Packets Tx

Packets Rx

------------------------------------------------

101.101.101.11 : 145379605

145450113

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ubt users
show ubt users [ all | count | down | mac <MAC-ADDR> | {port <IF-NAME> | <IF-RANGE>} | up] zone <ZONE-NAME>
Description
Displays user information for UBT.

User-based tunneling commands | 2979

Parameter all count down mac <MAC-ADDR> port <IF-NAME> | <IF-RANGE>
up zone <ZONE-NAME>

Description Display information for all users. Display the total number of users configured to tunnel traffic. Display the users that are not able to tunnel traffic. Display user information based on MAC address. Display user information for a specific interface or range of interfaces. For example, port 1/1/1 or port 1/1/1-1/1/10. Display user information that are active. Specifies UBT zone name. Maximum characters: 64.

Examples
On the 6400 Switch Series, interface identification differs. Showing information for all users:

switch# show ubt users all

=====================================================================

Displaying All UBT Users for Zone: zone1

=====================================================================

Downloaded user roles are preceded by *

Port Mac Address

Tunnel Status Secondary UserRole Failure Reason

--------------------------------------------------------------------------

1/25 00:00:00:11:12:03 activated

authenticated

---/---

=====================================================================

Displaying All UBT Users for Zone: zone2

=====================================================================

Downloaded user roles are preceded by *

Port Mac Address

Tunnel Status Secondary UserRole Failure Reason

--------------------------------------------------------------------------

2/25 00:00:00:13:12:03 activated

authenticated

---/---

Showing information for users of zone1:

switch# show ubt users all zone zone1

=====================================================================

Displaying All UBT Users for Zone: zone1

=====================================================================

Downloaded user roles are preceded by *

Port Mac Address

Tunnel Status Secondary UserRole Failure Reason

--------------------------------------------------------------------------

1/25 00:00:00:11:12:03 activated

authenticated

---/---

Displaying the number of users that are tunneling traffic:

switch# show ubt users count Total Number of Users using ubt Zone : zone2 is 1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2980

Total Number of Users using ubt Zone : zone1 is 2 =================================================== Total Number of Users in all the zones : 3 ===================================================

Showing users that are down:

switch# show ubt users down

=====================================================================

Displaying UBT Users of Zone: zone1 having Tunnel Status DOWN

=====================================================================

Downloaded user roles are preceded by *

Port Mac Address

Tunnel Status

Secondary UserRole Failure Reason

----------------------------------------------------------------------------------

1/25 00:00:00:11:12:03 activation_failed authenticated

User bootstrap has

failed

Showing information for users of zone1 that are down:

switch# show ubt users down zone zone1

=====================================================================

Displaying UBT Users of Zone: zone1 having Tunnel Status DOWN

=====================================================================

Downloaded user roles are preceded by *

Port Mac Address

Tunnel Status

Secondary UserRole Failure Reason

--------------------------------------------------------------------------

1/25 00:00:00:11:12:03 activation_failed authenticated

User bootstrap has

failed

Showing information for users on port 2/25:

switch# show ubt users port 2/25

=====================================================================

Displaying UBT Users of Zone: zone1

=====================================================================

Downloaded user roles are preceded by *

Port Mac Address

Tunnel Status Secondary UserRole Failure Reason

--------------------------------------------------------------------------

2/25 00:00:00:11:12:03 activated

authenticated

---/---

Showing information for users that are up:

switch# show ubt users up

=====================================================================

Displaying UBT Users of Zone: zone1 having Tunnel Status UP

=====================================================================

Downloaded user roles are preceded by *

Port Mac Address

Tunnel Status Secondary UserRole Failure Reason

--------------------------------------------------------------------------

1/25 00:00:00:11:12:03 activated

authenticated

---/---

User-based tunneling commands | 2981

Showing information for users of zone1 that are up:

switch# show ubt users up zone zone1

=====================================================================

Displaying UBT Users of Zone: zone1 having Tunnel Status UP

=====================================================================

Downloaded user roles are preceded by *

Port Mac Address

Tunnel Status Secondary UserRole Failure Reason

--------------------------------------------------------------------------

1/25 00:00:00:11:12:03 activated

authenticated

---/---

Showing information for the user with MAC address 00:00:00:11:12:03:

switch# show ubt users mac 00:00:00:11:12:03

Displaying UBT User of Zone: zone1 having MAC-Address: 00:00:00:11:12:03

Downloaded user roles are preceded by *

Port Mac Address

Tunnel Status Secondary UserRole Failure Reason

--------------------------------------------------------------------------

1/25 00:00:00:11:12:03 activated

authenticated

---/---

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

uac-keepalive-interval
uac-keepalive-interval <TIME> no uac-keepalive-interval <TIME>
Description
Specifies the UAC keep alive refresh time interval in seconds for the UBT zone. The no form of this command sets the keep alive interval to the default value.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2982

Parameter <TIME>

Description
Specifies the UAC keep-alive refresh time interval in seconds. Range: 1 to 60. Default: 60.

Examples
Specifying a keepalive interval of 60 seconds for UBT zone1:

switch(config)# ubt zone zone1 switch(config-ubt-zone1)# uac-keepalive-interval 60

Deleting the configured UAC keepalive interval:

switch(config)# ubt zone zone1 switch(config-ubt-zone1)# no uac-keepalive-interval 60

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-ubt-<ZONE-NAME>

Authority
Administrators or local user group members with execution rights for this command.

ubt
ubt zone <ZONE-NAME> vrf <VRF-NAME> no ubt zone <ZONE-NAME> vrf <VRF-NAME>
Description
Creates a User Based Tunnel (UBT) zone with a specified zone name and VRF name. A UBT name is used to configure all UBT properties advertised by the UBT feature. The no form of this command removes the specified UBT zone.
This configuration will disable flow tracking statistics collection.

User-based tunneling commands | 2983

Parameter <ZONE-NAME> <VRF-NAME>

Description Specifies a name for the UBT zone. Length: 1 to 64 characters. Specifies the VRF on which to establish the UBT tunnel.

Examples
Creating UBT zone called zone1 associated with a VRF called default:

switch(config)# ubt zone zone1 vrf default

Removing UBT zone zone1 on VRF default:

switch(config)# no ubt zone zone1 vrf default

Deleting all UBT configurations:

switch(config)# no ubt

Warning message is displayed when this configuration is enabled:

switch(config)# ubt zone my-zone vrf my-vrf Warning: This configuration will disable flow tracking statistics collection.

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Added information related to role based IPFIX. --
Authority Administrators or local user group members with execution rights for this command.

ubt-client-vlan
ubt-client-vlan <VLAN-ID> no ubt-client-vlan <VLAN-ID>
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2984

Specifies the UBT Client VLAN or local VLAN. This VLAN is used in local-VLAN mode only. If the UBT client VLAN is configured in VLAN-extend mode it is ignored, this is the reserved VLAN that all client traffic uses to get to the gateway. At the gateway, VLAN and policy will be assigned to the client traffic. No other feature should be enabled on the UBT client VLAN.
The no form of this command removes the VLAN to use for tunneled clients.

Parameter <VLAN-ID>

Description Specifies the VLAN ID to use for tunneled clients. Range: 1-4094.

Examples
Creating VLAN 4000:

switch(config)# vlan 4000 switch(config-vlan-4000)# no shutdown

Specifying UBT client VLAN 4000:

switch(config)# ubt-client-vlan 4000

Setting multi-zone:

switch(config)# ubt-client-vlan 4000 switch(config)# ubt zone zone8 vrf default switch(config-ubt-zone8)# primary-controller ip 20.20.20.13 switch(config-ubt-zone8)# enable switch(config)# ubt zone zone5 vrf default switch(config-ubt-zone5)# primary-controller ip 20.20.20.10 switch(config-ubt-zone5)# enable switch(config)# ubt zone zone3 vrf default switch(config-ubt-zone3)# primary-controller ip 10.10.10.248 switch(config-ubt-zone3)# enable switch(config)# ubt zone zone2 vrf default switch(config-ubt-zone2)# primary-controller ip 162.10.0.6 switch(config-ubt-zone2)# enable switch(config)# ubt zone zone7 vrf default switch(config-ubt-zone7)# primary-controller ip 20.20.20.12 switch(config-ubt-zone7)# enable switch(config)# ubt zone zone4 vrf default switch(config-ubt-zone4)# primary-controller ip 10.10.10.251 switch(config-ubt-zone4)# enable ip source-interface ubt interface loopback200

Removing configured UBT client VLAN 4000:

switch(config)# no ubt-client-vlan 4000

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.
Command History

User-based tunneling commands | 2985

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ubt mode vlan-extend
ubt-mode vlan-extend no ubt-mode [vlan-extend]
Description
Selects VLAN extended mode. When VLAN-extend mode is enabled clients are assigned to their UBT role-based VLAN in the hardware datapath. The no form of the command selects the default local-VLAN mode. In local-VLAN mode clients are assigned to a local switch VLAN and associated with their UBT role-based VLAN when client traffic reaches the controller. The default UBT mode is local-VLAN.
Examples
Setting the UBT mode to VLAN-extend:
switch(config)# ubt-mode vlan-extend
Setting multi-zone:
switch(config)# ubt-mode vlan-extend switch(config)# ubt zone zone8 vrf default switch(config-ubt-zone8)# primary-controller ip 20.20.20.13 switch(config-ubt-zone8)# enable switch(config)# ubt zone zone5 vrf default switch(config-ubt-zone5)# primary-controller ip 20.20.20.10 switch(config-ubt-zone5)# enable switch(config)# ubt zone zone3 vrf default switch(config-ubt-zone3)# primary-controller ip 10.10.10.248 switch(config-ubt-zone3)# enable switch(config)# ubt zone zone2 vrf default switch(config-ubt-zone2)# primary-controller ip 162.10.0.6 switch(config-ubt-zone2)# enable switch(config)# ubt zone zone7 vrf default switch(config-ubt-zone7)# primary-controller ip 20.20.20.12 switch(config-ubt-zone7)# enable switch(config)# ubt zone zone4 vrf default switch(config-ubt-zone4)# primary-controller ip 10.10.10.251 switch(config-ubt-zone4)# enable ip source-interface ubt interface loopback200
Setting the UBT mode back to the default of local-VLAN:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2986

switch(config)# no ubt-mode

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.09 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Added multi-zone support. --
Authority Administrators or local user group members with execution rights for this command.

wol-enable vlan
wol-enable vlan <VLANID> no wol-enable vlan <VLANID>
Description
Configures Wake-on-LAN VLANs in the ubt <zone-name> context. The maximum number of VLANs that can be configured per UBT zone is 100. VLANs must be pre-configured on the switch and controller. The no form of this command removes the specified configuration.
This command is applicable for UBT vlan-extend mode only.

The Wake-on-LAN VLAN / Silent client device support feature is supported only on Aruba Mobility Controller (AOS) v8.10 and above.

Wake-on-LAN enabled VLANs should not be configured on Layer-2 trunked uplink ports to avoid network loops.

Wake-on-LAN configuration should not be modified when active UBT users are present.

Parameter <VLANID>

Description Specifies the VLANs.

Examples

User-based tunneling commands | 2987

Configure wake-on-LAN VLANs in a UBT zone called my-zone associated with a VRF called red:
switch(config)# ubt zone my-zone vrf red switch(config-ubt-my-zone)# wol-enable vlan 10-20
Delete wake-on-LAN VLANs in a UBT zone called my-zone associated with a VRF called red:
switch(config)# ubt zone my-zone vrf red switch(config-ubt-my-zone)# no wol-enable vlan 10-20
Removing wake-on-LAN VLANs in a UBT zone called my-zone:
switch(config)# ubt zone my-zone switch(config-ubt-my-zone)# no wol-enable

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2988

Chapter 163 VLAN commands

VLAN commands

description
description <DESCRIPTION>
Description
Specifies a descriptive for a VLAN.

Parameter <DESCRIPTION>

Description Specifies a description for the VLAN.

Examples
Assigning a description to VLAN 20:

switch(config)# vlan 20 switch(config-vlan-20)# description primary

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

vlan name
name <VLAN-NAME>
Description
Associates a name with a VLAN.

AOS-CX 10.14 Command-Line Interface Guide

2989

Parameter <VLAN-NAME>

Description
Specifies a name for a VLAN. Length: 1 to 32 alphanumeric characters, including underscore (_) and hyphen (-).

Usage
n Each named VLAN must have a unique name; there cannot be duplicate names for VLANs. n By default, VLANs are created with the default name: VLAN <VLAN-ID>
Examples
Assigning the name backup to VLAN 20:

switch(config)# vlan 20 switch(config-vlan-20)# name backup

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

show capacities-status vlan-count
show capacities-status vlan-count
Description
Shows the number of VLANs present on the switch and the maximum number of VLANs allowed on the switch.
Example
Showing switch VLAN capacity status:

show capswitch# show capacities-status vlan-count

System Capacities: Filter VLAN count

Capacities Name

Value Maximum

-------------------------------------------------------------------------

Maximum number of VLANs currently configured

1

xxxx

VLAN commands | 2990

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show capacities svi-count
show capacities svi-count
Description
Shows the maximum number of SVIs supported by the switch.
Examples
Showing switch SVI capacity:

switch# show capacities svi-count

System Capacities: Filter SVI count

Capacities Name

Value

---------------------------------------------------------------------

Maximum number of SVIs supported in the system

128

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2991

show capacities vlan-count
show capacities vlan-count
Description
Shows the maximum number of VLANs allowed on the switch.
Example
Showing switch VLAN capacity:

show capswitch# show capacities vlan-count

System Capacities: Filter VLAN count

Capacities Name

Value

------------------------------------------------------------------------

Maximum number of VLANs supported in the system

4094

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show capacities-status vlan-translation
show capacities-status vlan-translation
Description
Shows the number of VLAN translation rules present on the switch and the maximum number of VLAN translation rules allowed on the switch. The maximum number of VLAN translation rules allowed are 4000.
Example
Showing switch VLAN translation rules capacity:

switch(config-vlan-100)# show capacities vlan-translation

System Capacities: Filter VLAN Translation

Capacities Name

Value

------------------------------------------------------------------------

Maximum number of VLAN Translation rules supported

4000

VLAN commands | 2992

switch(config-vlan-100)# switch(config-vlan-100)# switch(config-vlan-100)# switch(config-vlan-100)# switch(config-vlan-100)# show capacities-st vlan-translation

System Capacities Status: Filter VLAN Translation

Capacities Status Name

Value Maximum

--------------------------------------------------------------------------

Number of VLAN Translation rules currently configured

1 4000

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

show vlan
show vlan [<VLAN-ID>] [vsx-peer]
Description
Displays configuration information for all VLANs or a specific VLAN.

Parameter <VLAN-ID> vsx-peer

Description
Specifies a VLAN ID.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Displaying configuration information for VLAN 2:

switch# show vlan 2 ----------------------------------------------------------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2993

VLAN Name

Status Reason

Type

Interfaces

----------------------------------------------------------------------------------

2

UserVLAN1

up

ok

static 1/1/1,1/1/3,1/1/5

Displaying configuration information for all defined VLANs:

switch# show vlan

----------------------------------------------------------------------------------

VLAN Name

Status Reason

Type

Interfaces

----------------------------------------------------------------------------------

-

1

DEFAULT_VLAN_1

up

ok

static 1/1/3-1/1/4

2

UserVLAN1

up

ok

static 1/1/1,1/1/3,1/1/5

3

UserVLAN2

up

ok

static 1/1/2-1/1/3,1/1/5-1/1/6

5

UserVLAN3

up

ok

static 1/1/3

10 TestNetwork

up

ok

static 1/1/3,1/1/5

11 VLAN11

up

ok

static 1/1/3

12 VLAN12

up

ok

static 1/1/3,1/1/6,lag1-lag2

13 VLAN13

up

ok

static 1/1/3,1/1/6

14 VLAN14

up

ok

static 1/1/3,1/1/6

20 ManagementVLAN

down admin_down static 1/1/3,1/1/10

Displaying configuration information for auto-vlan:

switch# show vlan

----------------------------------------------------------------------------------

VLAN Name

Status Reason

Type

Interfaces

----------------------------------------------------------------------------------

--------------------------------

23 VLAN23

up

ok

port-access 1/1/1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vlan port
show vlan port <INTERFACE-ID> [vsx-peer]

VLAN commands | 2994

Description
Displays the VLANs configured for a specific layer 2 interface.

Parameter <INTERFACE-ID> vsx-peer

Description
Specifies an interface ID. Format: member/slot/port.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Displaying the VLANs configured on interface 1/1/1:

switch# show vlan port 1/1/1

-------------------------------------------------------------------------------

VLAN Name

Mode

Mapping

-------------------------------------------------------------------------------

2

UserVLAN1

access

port

3

UserVLAN2

access

arp,ipv4

5

UserVLAN5

access

ipv6

Displaying RADIUS server provided VLAN 2,3,5 as extended access VLANs (MBV):

switch# show vlan port 1/1/1

-------------------------------------------------------------------------------

VLAN Name

Mode

Mapping

-------------------------------------------------------------------------------

2

UserVLAN1

access

mbv, port

3

UserVLAN2

access

mbv

5

UserVLAN5

access

mbv

Overriden VLAN list: 2-3,5

Displaying RADIUS server provided VLAN 50 as access VLAN and mode as access:

switch# show vlan port 1/1/1

-------------------------------------------------------------------------------

VLAN Name

Mode

Mapping

-------------------------------------------------------------------------------

50 VLAN50

access

port-access

Overridden VLAN list: 2-3,5

Displaying RADIUS server provided VLAN 50 as access VLAN and mode as access, and 2,3 as extended access VLANs (MBV):

switch# show vlan port 1/1/1

-------------------------------------------------------------------------------

VLAN Name

Mode

Mapping

-------------------------------------------------------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2995

2

UserVLAN1

3

UserVLAN2

50 VLAN50

Overridden VLAN list: 2-3,5

access access access

mbv mbv port-access

Displaying RADIUS server provided mode as native-untagged, 11-14 as trunk VLANs, VLAN 11 as an access VLAN and VLAN 2, 3 as extended access VLANs (MBV):

switch# show vlan port 1/1/1

-------------------------------------------------------------------------------

VLAN Name

Mode

Mapping

-------------------------------------------------------------------------------

2

UserVLAN1

access

mbv

3

UserVLAN2

access

mbv

11 VLAN11

native-untagged port-access

12 VLAN12

trunk

port-access

13 VLAN13

trunk

port-access

14 VLAN14

trunk

port-access

Overridden VLAN list: 2-3,5

Displaying RADIUS server provided mode as native-tagged, 11-14 as trunk VLANs, VLAN 11 as an access VLAN and VLAN 2, 3 as extended access VLANs (MBV):

switch# show vlan port 1/1/1

-------------------------------------------------------------------------------

VLAN Name

Mode

Mapping

-------------------------------------------------------------------------------

2

UserVLAN1

native-untagged mbv, port

3

UserVLAN2

access

mbv

11 VLAN11

trunk

port-access

12 VLAN12

trunk

port-access

13 VLAN13

trunk

port-access

14 VLAN14

trunk

port-access

Overridden VLAN list: 3,5

Displaying RADIUS server provided mode as native-tagged, 3, 11-14 as trunk VLANs, VLAN 11 as an access VLAN and VLAN 2, 3 as extended access VLANs (MBV):

switch# show vlan port 1/1/1

-------------------------------------------------------------------------------

VLAN Name

Mode

Mapping

-------------------------------------------------------------------------------

2

UserVLAN1

native-untagged mbv, port

3

UserVLAN2

native-untagged port-access, mbv

11 VLAN11

trunk

port-access

12 VLAN12

trunk

port-access

13 VLAN13

trunk

port-access

14 VLAN14

trunk

port-access

Overridden VLAN list: 3,5

Displaying RADIUS server provided mode as native-tagged, 2, 11-14 as trunk VLANs, VLAN 11 as an access VLAN:

VLAN commands | 2996

switch# show vlan port 1/1/1

-------------------------------------------------------------------------------

VLAN Name

Mode

Mapping

-------------------------------------------------------------------------------

2

UserVLAN1

trunk

port-access

11 VLAN11

native-tagged port-access

12 VLAN12

trunk

port-access

13 VLAN13

trunk

port-access

14 VLAN14

trunk

port-access

Overridden VLAN list: 2-3,5

Displaying the VLANs configured on interface 1/1/3:

switch# show vlan port 1/1/3

-------------------------------------------------------------------------------

VLAN Name

Mode

Mapping

-------------------------------------------------------------------------------

1

DEFAULT_VLAN_1

native-untagged port

2

UserVLAN1

trunk

port

3

UserVLAN2

trunk

port

5

UserVLAN3

trunk

port

10 TestNetwork

trunk

port

11 VLAN11

trunk

port

12 VLAN12

trunk

port

13 VLAN13

trunk

port

14 VLAN14

trunk

port

20 ManagementVLAN

trunk

port

30 VLAN30

trunk

port

40 VLAN40

trunk

port

50 VLAN50

trunk

port

100 VLAN100

trunk

port

200 VLAN200

trunk

port

Displaying RADIUS server provided VLANs 2,11-14 as trunk VLANs, VLAN 2 as an access VLAN, and mode as native-untagged:

switch# show vlan port 1/1/3

-------------------------------------------------------------------------------

VLAN Name

Mode

Mapping

-------------------------------------------------------------------------------

2

UserVLAN1

native-untagged port-access

11 VLAN11

trunk

port-access

12 VLAN12

trunk

port-access

13 VLAN13

trunk

port-access

14 VLAN14

trunk

port-access

Overridden VLAN list: 1-3,5,10-14,20,30,40,50,100,200

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2997

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vlan summary
show vlan summary [vsx-peer]
Description
Displays a summary of the VLAN configuration on the switch.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Displaying a summary of the VLAN configuration on the switch:

switch# show vlan summary Number of existing VLANs: 11 Number of static VLANs: 11 Number of dynamic VLANs: 0 Number of port-access VLANs: 1

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

VLAN commands | 2998

Platforms All platforms

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vlan translation
show vlan translation [interface <INTERFACE-NAME>] [vsx-peer]
Description
Shows a summary of all VLAN translations rules defined on the switch, or the rules defined for a specific interface.

Parameter interface <INTERFACE-NAME>
vsx-peer

Description
Specifies the name of a layer 2 interface. Format: member/slot/port.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
On the 6400 Switch Series, interface identification differs. Displaying a summary of all VLAN translations rules defined on the switch:

switch# show vlan translation

-------------------------------------------

Interface VLAN-1

VLAN-2

-------------------------------------------

1/1/5

10

20

1/1/5

30

40

1/1/5

50

100

1/1/6

100

200

Total number of translation rules : 4

Displaying a summary of all VLAN translations rules defined on interface 1/1/5:

switch# show vlan translation interface 1/1/5

-------------------------------------------

Interface VLAN-1

VLAN-2

-------------------------------------------

1/1/5

10

20

1/1/5

30

40

1/1/5

50

100

Displaying VLAN translation information when VSX peer is configured:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

2999

switch(config-if)# show vlan translation vsx-peer

--------------------------

Interface VLAN-1 VLAN-2

--------------------------

1/3/1

10

20

Total number of translation rules : 1

Displaying VLAN translation information when VSX peer is not configured:

switch(config-if)# show vlan translation vsx-peer VSX is not configured

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vlan translation pending
show vlan translation pending
Description
Shows a list of pending VLAN translation rules.
Examples
Displaying a list of VLAN translations rules pending on the switch:

switch# show vlan translation pending

-------------------------------------------

Interface VLAN-1

VLAN-2

-------------------------------------------

1/1/5

10

20

1/1/5

30

40

1/1/5

50

100

1/1/6

100

200

Total number of VLAN translation rules that are pending: 4

VLAN commands | 3000

Displaying the output when there are no VLAN translation rules in the pending list:
switch# show vlan translation interface 1/1/5 No pending VLAN translation rules

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.08 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vlan voice
show vlan voice
Description
Displays the voice VLAN list showing the VLAN ID, name, operational state of the VLAN, and the interfaces associated with the VLAN.
Example
Displaying the voice VLANs list :

switch# show vlan voice

----------------------------------------------------------------------------------

------------

VLAN Name

Status

Type

Interfaces

----------------------------------------------------------------------------------

------------

10 TestNetwork

up

static

1/1/3,1/1/5

Displaying the information when voice VLANs are not configured:

switch# show vlan voice Voice VLAN not configured

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3001

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

shutdown
shutdown no shutdown
Description
Disables a VLAN. (By default, a VLAN is automatically enabled when it is created with the vlan command.) The no form of this command enables a VLAN.
Examples
Enabling VLAN 20:
switch(config)# vlan 20 switch(config-vlan-20)# no shutdown
Disabling VLAN 20:
switch(config)# vlan 20 switch(config-vlan-20)# shutdown

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

VLAN commands | 3002

Command Information

Platforms All platforms

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

system vlan-client-presence-detect
system vlan-client-presence-detect no system vlan-client-presence-detect
Description
Enables VNI mapped VLANs when detecting the presence of a client. When enabled, VNI mapped VLANs are up only if there are authenticated clients on the VLAN, or if the VLAN has statically configured ports and those ports are up. When not enabled, VNI mapped VLANs are always up. The no form of this command disables detection of clients on VNI mapped VLANs.
Examples
Enabling detection of clients:
switch(config)# system vlan-client-presence-detect
Disabling detection of clients:
switch(config)# no system vlan-client-presence-detect

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

trunk-dynamic-vlan-include
trunk-dynamic-vlan-include no trunk-dynamic-vlan-include

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3003

Description
Indicates if dynamically learned VLANs from MVRP and port-access should be included or excluded on ports configured with vlan trunk allowed all. By default, dynamic VLANs are not included in the trunk allowed list. This command is used at the system-level. The no form of this command disables the inclusion of dynamic VLANs in the VLANs table. This is the default.
Examples
Including the dynamic VLANs in the VLAN table:
switch(config)# trunk-dynamic-vlan-include
Disabling the inclusion of dynamic VLANs in the VLAN table (default):
switch(config)# no trunk-dynamic-vlan-include

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms All platforms

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

uufb
uufb no uufb
Description
Enables the Unknown Unicast Flood Block (UUFB) feature on a physical interface. When this feature is enabled on a physical interface, unknown unicast packets are blocked from egressing the physical interface. This feature is disabled by default.
UUFB can be enabled only on the physical interface.
UUFB cannot be enabled on:

VLAN commands | 3004

n Routed interface n LAGs n VSX inter-switch link n Interface used as an ISL
Examples
Enabling UUFB on an L2 access port:
switch(config)# interface 1/1/1 switch(config-if)# vlan access 1 switch(config-if)# uufb

Enable UUFB on an L2 trunk port:
switch(config)# interface 1/1/1 switch(config-if)# vlan trunk allowed all switch(config-if)# uufb

Disabling UUFB on an L2 access or trunk port: switch(config-if)# no uufb

Command History
Release 10.11

Modification Command introduced.

Command Information

Platforms
6300 6400

Command context config-if

Authority
Administrators or local user group members with execution rights for this command.

vlan
vlan <VLAN-LIST> no vlan <VLAN-LIST>
Description
Creates a VLAN and changes to the config-vlan-id context for the VLAN. By default, the VLAN is enabled. To disable a VLAN, use the shutdown command. If the specified VLAN exists, this command changes to the config-vlan-id context for the VLAN. If a range of VLANs is specified, the context does not change.
VLANs used for internal purposes using the command system internal vlan range cannot be used for any other (L2) purposes.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3005

The no form of this command removes a VLAN. VLAN 1 is the default VLAN and cannot be deleted.

Parameter <VLAN-LIST>

Description
Specifies a single ID, or a series of IDs separated by commas (2, 3, 4), dashes (2-4), or both (2-4,6). Range: 1 to 4094.

Examples
Creating VLAN 20:

switch(config)# vlan 20 switch(config-vlan-20)#

Removing VLAN 20:

switch(config)# no vlan 20

Creating VLANs 2 to 8 and 10:

switch(config)# vlan 2-8,10

Removing VLANs 2 to 8 and 10:

switch(config)# no vlan 2-8,10

Creating a VLAN which is already configured as an internal VLAN:

switch(config)# vlan 3001 Ignoring the operation on internal VLAN(s) 3001.

Deleting an unconfigured VLAN which is already configured as internal VLAN:

switch(config)# no vlan 300 Ignoring the operation for non-configured VLAN(s) 300.

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

VLAN commands | 3006

Platforms All platforms

Command context config

Authority
Administrators or local user group members with execution rights for this command.

vlan access
vlan access <VLAN-ID> no vlan access [<VLAN-ID>]
Description
Creates an access interface and assigns an VLAN ID to it. Only one VLAN ID can be assigned to each access interface. VLANs can only be assigned to non-routed (Layer 2) interfaces. All interfaces are non-routed (Layer 2) by default when created. Use routing and no routing commands to move ports between Layer 3 and Layer 2 interfaces. The no form of this command removes an access VLAN from the interface in the current context and sets it to the default VLAN ID of 1.
Command context

Parameter <VLAN-ID>

Description
Specifies a single ID, or a series of IDs separated by commas (2, 3, 4), dashes (2-4), or both (2-4,6). Range: 1 to 4094.

Examples
On the 6400 Switch Series, interface identification differs. Configuring interface 1/1/2 as an access interface with VLAN ID set to 20:

switch(config)# interface 1/1/2 switch(config-if)# vlan access 20

Removing VLAN ID 20 from interface 1/1/2:

switch(config)# interface 1/1/2 switch(config-if)# no vlan access 20

or:

switch(config)# interface 1/1/2 switch(config-if)# no vlan access

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3007

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

vlan protocol
vlan protocol <PROTOCOL_NAME> <VLAN-ID> no vlan protocol <PROTOCOL_NAME> <VLAN-ID>
Description
Adds protocol mapping to a VLAN on an interface. The no form of this command removes protocol mapping from the VLAN on an interface.

Parameter <VLAN-ID> <PROTOCOL_NAME>

Description
Specifies a VLAN ID. Range: 2 to 4094.
Specifies the protocol that the VLAN is bound to for a given interface. Options are: appletalk, arp, ip, ipv6, ipx, netbui, and sna.

Usage
n This command is only applicable to access ports. n Protocol VLAN should be different from access VLANs. n VLAN should be configured on the switch. n Routing must be disabled on the interface. n Interface must be a physical or LAG interface. n The same protocol-mapped VLAN is recommended for ARP and IPv4 protocols to avoid IPv4 traffic
loss.
Examples
Assigning a protocol mapping to a VLAN on an interface:

switch(config)# interface 1/1/2 switch(config-if)# vlan protocol ip 10

Assigning a protocol mapping to a VLAN on a LAG interface:

switch(config)# interface lag 2 switch(config-lag-if)# vlan protocol ipv6 10

VLAN commands | 3008

Removing a protocol mapping from a VLAN on an interface:
switch(config)# interface 1/1/2 switch(config-if)# no vlan protocol ipv6 10
Removing a protocol mapping from a VLAN on a LAG interface:
switch(config)# interface lag 2 switch(config-lag-if)# no vlan protocol ipv6 10

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.14

10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-lag-if

Modification Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated. --
Authority Administrators or local user group members with execution rights for this command.

vlan translate
vlan translate <VLAN-1> <VLAN-2> no vlan translate <VLAN-1> <VLAN-2>
Description
Defines a bidirectional VLAN translation rule that maps an original VLAN ID (VLAN-1) to a translated internal VLAN ID (VLAN-2) on a LAG or layer 2 interface. Applies to both incoming and outgoing traffic. On the Aruba 6300, 6400 Switch Series: Traffic for translated VLANs and native VLAN is allowed, and VLANs which are part of the VLAN trunk allowed list are blocked. The no form of this command removes an existing VLAN translation rule on the current interface.
VLAN translation and MVRP cannot be enabled on the same interface.
A port with a VLAN translation configuration allows traffic only for the translated VLAN and the native VLAN; if it is a member of more VLANS, it does not allow traffic for them.
A translated VLAN must be present on the switch before the rule is created; the original VLAN need not be present.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3009

Parameter <VLAN-1> <VLAN-2>

Description Specifies the number of an origin VLAN. Range: 1 - 4000. Specifies the number of a translated VLAN. Range: 1 - 4000.

Usage
n This configuration can be applied only on layer 2 trunk ports. n Routing must be disabled on the interface. n Interface must be a layer 2 physical or LAG interface. n This configuration is supported only on 24 ports. n Maximum unique VLAN translation rules supported on the Aruba 6300, 6400 Switch Series--4000 n For a given port, VLAN translation cannot be applied if there are any Private-VLAN (PVLAN)
configuration(s) on the switch (applies to Aruba 6300 and 6400 Switch Series). VLAN translation and PVLANs are mutually exclusive features.
Examples
Translates origin VLAN 200 to translated VLAN 20 on interface 1/1/2.

switch# config switch(config)# vlan 20 switch(config-vlan-20)# exit switch(config)# interface 1/1/2 switch(config-if)# no routing switch(config-if)# vlan trunk allowed 20 switch(config-if)# vlan translate 200 20

Translates origin VLANs 100 and 300 to translated VLANs 10 and 20 on interface 1/1/2.

switch# config switch(config)# vlan 10,30 switch(config-vlan-20)# exit switch(config)# interface 1/1/2 switch(config-if)# no routing switch(config-if)# vlan trunk allowed 10,30 switch(config-if)# vlan translate 100 10 switch(config-if)# vlan translate 300 30

Though VLAN translation is not supported on Native VLAN configurations, a translation rule will be created to ensure VLAN translation works when the native VLAN is updated. These rules appear in the output of the show running-config command, though they are not operational.

(config)# interface 1/1/4 switch (config-if)# vlan translate 10 2 Warning: Operation not allowed on native VLAN 1 switch(config-if)# show runing-config current-context interface 1/1/1 no shutdown no routing

VLAN commands | 3010

vlan trunk native 1 vlan trunk allowed all vlan translate 1 2 <<< non-functional translation rules

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

vlan trunk allowed
vlan trunk allowed [<VLAN-LIST> | all] no vlan trunk allowed [<VLAN-LIST>]
Description
Assigns a VLAN ID to an trunk interface. Multiple VLAN IDs can be assigned to a trunk interface. These VLAN IDs define which VLAN traffic is allowed across the trunk interface. VLANs can only be assigned to non-routed (Layer 2) interfaces. All interfaces are non-routed (Layer 2) by default when created. Use routing and no routing commands to move ports between Layer 3 and Layer 2 interfaces. The no form of this command removes one or more VLAN IDs from a trunk interface. When the last VLAN is removed from a trunk interface, the interface continues to operate in trunk mode, and will trunk all the VLANs currently defined on the switch, and any new VLANs defined in the future. To disable the trunk interface, use the command shutdown.

Parameter <VLAN-LIST>
all

Description
Specifies a single ID, or a series of IDs separated by commas (2, 3, 4), dashes (2-4), or both (2-4,6). Range: 1 to 4094.
Configures the trunk interface to allow all the VLANs currently configured on the switch and any new VLANs that are configured in the future.

Examples
On the 6400 Switch Series, interface identification differs. Assigning VLANs 2, 3, and 4 to trunk interface 1/1/2:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3011

switch(config)# interface 1/1/2 switch(config-if)# vlan trunk allowed 2,3,4
Assigning VLAN IDs 2 to 8 to trunk interface 1/1/2:
switch(config)# interface 1/1/2 switch(config-if)# vlan trunk allowed 2-8
Assigning VLAN IDs 2 to 8 and 10 to trunk interface 1/1/2:
switch(config)# interface 1/1/2 switch(config-if)# vlan trunk allowed 2-8,10
Removing VLAN IDs 2, 3, and 4 from trunk interface 1/1/2:
switch(config)# interface 1/1/2 switch(config-if)# no vlan trunk allowed 2,3,4
Removing all VLANs assigned to trunk interface 1/1/2:
switch(config)# interface 1/1/2 switch(config-if)# no vlan trunk allowed 2

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

vlan trunk native
vlan trunk native <VLAN-ID> no vlan trunk native [<VLAN-ID>]
Description

VLAN commands | 3012

Assigns a native VLAN ID to a trunk interface. By default, VLAN ID 1 is assigned as the native VLAN ID for all trunk interfaces. VLANs can only be assigned to a non-routed (layer 2) interface or LAG interface. Only one VLAN ID can be assigned as the native VLAN.
When a native VLAN is defined, the switch automatically executes the vlan trunk allowed all command to ensure that the default VLAN is allowed on the trunk. To only allow specific VLANs on the trunk, issue the vlan trunk allowed command specifying only specific VLANs.
The no form of this command removes a native VLAN from a trunk interface and assigns VLAN ID 1 as its native VLAN.

Parameter <VLAN-ID>

Description
Specifies a VLAN ID. Range: 1 to 4094.

Examples
On the 6400 Switch Series, interface identification differs. Assigning native VLAN ID 20 to trunk interface 1/1/2:

switch(config)# interface 1/1/2 switch(config-if)# vlan trunk native 20

Removing native VLAN 20 from trunk interface 1/1/2 and returning to the default VLAN 1 as the native VLAN.

switch(config)# interface 1/1/2 switch(config-if)# no vlan trunk native 20

or:

switch(config)# interface 1/1/2 switch(config-if)# no vlan trunk native

Assigning native VLAN ID 20 to trunk interface 1/1/2 and then removing it from the list of allowed VLANs. (Only allow VLAN 10 on the trunk.)

switch(config)# interface 1/1/2 switch(config-if)# vlan trunk native 20 switch(config-if)# vlan trunk allowed 10

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3013

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

vlan trunk native tag
vlan trunk native <VLAN-ID> tag no vlan trunk native <VLAN-ID> tag
Description
Enables tagging on a native VLAN. Only incoming packets that are tagged with the matching VLAN ID are accepted. Incoming packets that are untagged are dropped except for BPDUs. Egress packets are tagged. The no form of this command removes tagging on a native VLAN.

Parameter <VLAN-ID>

Description Specifies the number of a VLAN. Range: 1 to 4094.

Examples
On the 6400 Switch Series, interface identification differs. Enabling tagging on native VLAN 20 on trunk interface 1/1/2:

switch(config)# interface 1/1/2 switch(config-if)# vlan trunk native 20 switch(config-if)# vlan trunk native 20 tag

Removing tagging on native VLAN 20 assigned to trunk interface 1/1/2:

switch(config)# interface 1/1/2 switch(config-if)# no vlan trunk native 20 tag

Enabling tagging on native VLAN 20 assigned to LAG trunk interface 2:

switch(config)# interface lag 2 switch(config-lag-if)# vlan trunk native 20 switch(config-lag-if)# vlan trunk native 20 tag

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

VLAN commands | 3014

Command History

Release 10.07 or earlier

Command Information

Platforms All platforms

Command context config-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

voice
voice no voice
Description
Configures a VLAN as a voice VLAN. The no form of this command removes voice configuration from a VLAN.
Examples
Configuring VLAN 10 as a voice VLAN:
switch(config)# vlan 10 switch(config-vlan-10)# voice
Removing voice from VLAN 10:
switch(config-vlan-10)# no voice

For more information on features that use this command, refer to the Layer 2 Bridging Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3015

Chapter 164 VRF commands

VRF commands

ip route vrf
ip route <DEST-IPV4-ADDR>/<MASK> [<NEXT-HOP-IP-ADDR>|<INTERFACE>|reject|nullroute] vrf <VRF-NAME>
no ip route <DEST-IPV4-ADDR>/<MASK> [<NEXT-HOP-IP-ADDR>|<INTERFACE>|reject|nullroute] vrf <VRF-NAME>
Description
Adds the destination IPv4 static route on the specified VRF. If no <VRF-NAME> is specified the route is applied to the default VRF. The no form of this command removes the IPv4 static route from the VRF.

Parameter <DEST-IPV6-ADDR> <MASK> <NEXT-HOP-IP-ADDR> <INTERFACE> nullroute reject vrf <VRF-NAME>

Description
Specifies the route destination in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the next hop in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.
Specifies the next hop as an outgoing interface.
Silently discards packets to the destined route.
Discards packets to the destined route and returns an ICMP error to the sender.
Specifies a VRF name.

Examples

switch(config)# ip route 20.0.0.0/8 10.20.30.44 vrf myvrf switch(config)# ip route 20.1.2.0/24 1/1/30 vrf myvrf switch(config)# ip route 1.2.3.4/32 nullroute vrf myvrf switch(config)# ip route 1.2.3.4/32 reject vrf myvrf

switch(config)# no ip route 20.0.0.0/8 10.20.30.44 vrf myvrf

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
AOS-CX 10.14 Command-Line Interface Guide

3016

Release 10.10 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Inclusive language update. --
Authority Administrators or local user group members with execution rights for this command.

ipv6 route gc interval
ipv6 route-gc-interval <INTERVAL> no ipv6 route-gc-interval
Description
Sets the garbage collection interval timer to remove invalid or old route entries from kernel route cache. The no form of this command resets the garbage collection interval timer to default (30 seconds).

Parameter <INTERVAL>

Description Specifies time interval in seconds. Range: 30 to 600. Default: 30.

Examples
Setting garbage collection interval timer to 300:
switch(config)# ipv6 route-gc-interval 300

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms
6300 6400

Command context config

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

VRF commands | 3017

ipv6 route vrf
ipv6 route <DEST-IPV6-ADDR>/<PREFIX> [<NEXT-HOP-IP-ADDR>|<INTERFACE>|reject|nullroute] vrf <VRF-NAME> no ipv6 route <DEST-IPV6-ADDR>/<PREFIX> [<NEXT-HOP-IP-ADDR>|<INTERFACE>|reject|nullroute] vrf <VRF-NAME>
Description
Adds an IPv6 static route in the specified VRF. If no <VRF-NAME> is specified it is added to the default VRF. The no form of this command removes an IPv6 static route from the VRF.

Parameter <DEST-IPV6-ADDR>
<MASK> <NEXT-HOP-IP-ADDR>
<INTERFACE> nullroute reject vrf <VRF-NAME>

Description
Specifies an IP address in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the number of bits in the address mask in CIDR format (x), where x is a decimal number from 0 to 128.
Specifies the next hop in IPv6 format (xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx), where x is a hexadecimal number from 0 to F.
Specifies the next hop as an outgoing interface.
Specifies that packets matching the destination prefix are silently discarded and no ICMP error notification is sent to the sender.
Specifies that packets matching the destination prefix are discarded and an ICMP error notification is sent to the sender.
Specifies the name of a VRF. Default: default.

Examples

switch(config)# ipv6 route 120::/124 121::2 vrf test switch(config)# ipv6 route 121::/124 1/1/9 vrf test switch(config)# ipv6 route 122::/124 nullroute vrf test switch(config)# ipv6 route 123::/124 reject vrf test

switch(config)# no ipv6 route 120::/124 121::2 vrf test

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.10 10.07 or earlier

Modification Inclusive language update. --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3018

Command Information

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

show ip route
show ip route [<A.B.C.D> | <A.B.C.D/M> | all-vrfs | bgp | connected | local | ospf | static | summary | vrf <VRF-NAME>] [vsx-peer]
Description
Displays IPv4 route tables.

Parameter <A.B.C.D> <A.B.C.D/M> all-vrfs bgp connected local ospf static summary
vrf <vrf-name>
vsx-peer

Description Display longest prefix match.
Display exact route match.
Display information for all VRFs.
Display bgp routes only.
Display connected routes only.
Display local routes only.
Display ospf routes only.
Display static routes only.
Display the aggregate count of routes per routing protocol.
Specify a VRF by VRF name (if no <VRF-NAME> is specified, the default VRF is implied.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Showing IPv4 route tables:

switch# show ip route
Displaying ipv4 routes selected for forwarding
'[x/y]' denotes [distance/metric] 10.0.0.0/24, vrf default

VRF commands | 3019

via vlan2, [0/0], connected 10.0.0.1/32, vrf default
via vlan2, [0/0], local 10.100.11.0/24, vrf default
via vlan1, [0/0], connected 10.100.11.82/32, vrf default
via vlan1, [0/0], local 20.0.0.0/24, vrf default
via 10.0.0.2, [1/0], static 20.0.1.0/24, vrf default
via 10.0.0.2, [1/0], static 20.0.2.0/24, vrf default
via vlan1, [1/0], static 20.0.4.0/24, vrf default
nullroute, [1/0], static 20.0.5.0/24, vrf default
reject route, [1/0], static
Showing IPv4 route tables for the test VRF:
switch# show ip route vrf test
Displaying ipv4 routes selected for forwarding
'[x/y]' denotes [distance/metric]
30.0.0.0/24, 1 (nullroute) next-hops via 30.0.0.2, [0/0], connected
90.0.0.0/24, 1 unicast next-hops via 30.0.0.1, [1/0], static
90.0.1.0/24, 1 unicast next-hops via 1/1/2, [1/0], static
90.0.3.0/24, nullroute, 1, [1/0], static

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show ipv6 route
show ipv6 route [<X.X.X.X> | <X.X.X.X/M> | all-vrfs | bgp | connected | local | ospf | static | summary | vrf <vrf-name>] [vsx-peer]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3020

Description
Displays IPv6 route tables.

Parameter <X.X.X.X> <X.X.X.X/M> all-vrfs bgp connected local ospf static summary vrf <vrf-name>
vsx-peer

Description
Display exact route match.
Display exact route match.
Display information for all VRFs.
Display bgp routes only.
Display connected routes only.
Display local routes only.
Display ospf routes only.
Display static routes only.
Display the aggregate count of routes per routing protocol.
Specify a VRF by VRF name (if no <VRF-NAME> is specified, the default VRF is implied.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Showing IPv6 route tables:

switch# show ipv6 route
Displaying ipv6 routes selected for forwarding
'[x/y]' denotes [distance/metric]
1000::/64, vrf default via vlan2, [0/0], connected
1000::1/128, vrf default via vlan2, [0/0], local
2000::/64, vrf default via vlan2, [1/0], static
2001::/64, vrf default via 1000::2, [1/0], static
3000:2301::/64, vrf default nullroute, [1/0], static
4000:2301::/64, vrf default reject route, [1/0], static

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

VRF commands | 3021

Release 10.10 10.07 or earlier

Modification Inclusive language update. --

Command Information

Platforms
6300 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vrf
show vrf <VRF-NAME> show vrf
Description
Displays the status and attached interfaces for the specified VRF instance. The show vrf command shows this information for all the VRFs.

Parameter <VRF-NAME>

Description
Specifies the VRF name. Length: Up to 32 alphanumeric characters.

Examples
Showing VRF information for the test VRF:

switch# show vrf test

VRF Configuration:

------------------

VRF Name : test

Interfaces

Status

-----------------------------

1/1/29

up

1/1/30

up

Showing VRF information for all VRFs:

switch# show vrf

VRF Configuration:

------------------

VRF Name : default

Interfaces

Status

-----------------------------

VRF Name : red

Interfaces

Status

-----------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3022

1/1/32

up

VRF Name : test

Interfaces

Status

-----------------------------

1/1/29

up

1/1/30

up

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

vrf
vrf <VRF-NAME> no vrf <VRF-NAME>
Description
Creates a VRF instance named <VRF-NAME> and then enters its context. Use default for <VRF-NAME> to enter the default VRF configure context. Except for the default VRF, the no form of the command deletes the named VRF instance and any IP configuration for interfaces or SVI linked to default VRF. The default VRF cannot be deleted and a warning is given if attempted. To erase the Route-Distinguisher and Route-Targets, enter the default VRF context and delete them manually one by one.

Parameter <VRF-NAME>

Description
Specifies the VRF name. Range: Up to 32 alphanumeric characters. The mgmt VRF cannot be used.

Examples
Creating the VRF named cust_A and then entering its context:

switch(config)# vrf cust_A

Entering the default VRF context:

VRF commands | 3023

switch(config)# vrf default Deleting the VRF named test:
switch(config)# no vrf test

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.09 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Added default VRF information. --
Authority Administrators or local user group members with execution rights for this command.

vrf attach
vrf attach <VRF-NAME> no vrf attach <VRF-NAME>
Description
Attaches the interface to the VRF with the name <VRF-NAME>. The command can be entered in several different command contexts.
The no form of the command detaches the interface from the named VRF and will remove all configurations from the interface and attach the interface to the default VRF. A warning message is displayed that prompts you whether to proceed: All Layer 3 configurations associated with the VRF will be deleted. Continue (y/n)?

Parameter <VRF-NAME>
Examples

Description
Specifies the VRF name. Required. Length: Up to 32 alphanumeric characters.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3024

switch(config)# interface 1/1/29 switch(config-if)# vrf attach test
switch(config)# vlan 3 switch(config-vlan)# exit switch(config)# interface vlan 3 switch(config-if-vlan)# vrf attach test
switch(config)# vrf test switch(config)# interface lag 3 switch(config-lag-if)# no shutdown switch(config-lag-if)# vrf attach test
switch(config)# interface 1/1/29 switch(config-if)# no vrf attach test

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context
config-if config-if-vlan config-lag-if config-gre-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

VRF commands | 3025

Chapter 165 VRRP commands

VRRP commands

address
address <IP-ADDR> [ primary | secondary ] no address <IP-ADDR> [ primary | secondary ]
Description
Configures a primary or secondary IPv4 or IPv6 address for the VRRP group. To use secondary IP addresses in a VRRP group, you must first configure a primary IP address on the same group. A maximum of 16 IP addresses per IPv4 VRRP group and 8 IPv6 addresses per IPv6 VRRP group are supported.
Do not configure an IPv4 VRRP group using addresses from the /30, /31, and /32 subnets of the interface IP address.
16 Virtual IP addresses per IPv4 VR and 8 Virtual IP addresses per IPv6 VR are supported.
The total number of VIPs supported by a switch is: n 1024 VIPs for IPv4 VRs n 512 VIPs for IPv6 VRs

The no form of this command deletes a primary or secondary IPv4 or IPv6 address from the VRRP group.

Parameter <IP-ADDR> primary secondary

Description Configures the IPv4 or IPv6 address. Configures a primary address. Configures a secondary address.

Examples
switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ipv4 switch(config-if-vrrp)# address 10.0.0.1 primary

switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ipv6 switch(config-if-vrrp)# address fe80::1 primary

AOS-CX 10.14 Command-Line Interface Guide

3026

switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ipv4 switch(config-if-vrrp)# no address 10.0.0.1 primary
switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ipv6 switch(config-if-vrrp)# no address fe80::1 primary

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

authentication
authentication {text | md5} [{plaintext | ciphertext} <KEY>] no authentication
Description
This command enables authentication mode and the authentication key for VRRP groups on an interface. VRRP members or routers of the same VRRP group must use the same authentication mode and authentication key. The no form of this command disables authentication mode and the authentication key for VRRP groups on an interface. IPv4 VRRPv3 and IPv6 VRRPv3 do not support VRRP packet authentication. Authentication mode and key configuration take effect only in VRRPv2 (IPv4 only - RFC2338). In VRRPv3, authentication mode and authentication key settings do not take effect because VRRP Authentication was removed from RFC5798. VRRP provides the following authentication modes as described in RFC2338: Simple authentication The sender fills an authentication key into the VRRP packet and the receiver compares the received authentication key with its local authentication key. If the two authentication keys match, the received VRRP packet is legitimate. Otherwise, the received packet is illegitimate and is discarded.

VRRP commands | 3027

Authentication key text is sent in the clear and can be seen in a packet trace. This makes MD5 authentication more secure than text.
MD5 authentication The sender computes a digest for the packet that will be sent using the authentication key and MD5 algorithm, and saves the result in the VRRP packet. The receiver performs the same operation with the authentication key and MD5 algorithm, and compares the result with the content in the authentication header. If the results match, the received VRRP packet is legitimate. Otherwise, the received packet is illegitimate and is discarded.

Parameter text md5 plaintext ciphertext <KEY>

Description Configures the simple authentication type. Configures the MD5 (message-digest) authentication type. Specifies that the key is provided as plaintext. Specifies that the key is provided as ciphertext. Specifies the key in the chosen format.

When the key is not provided on the command line, plaintext key prompting occurs upon pressing Enter. The entered key characters are masked with asterisks.
Examples
Enabling VRRP authentication using MD5 with a provided plaintext key:
switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# version 2 switch(config-if-vrrp)# authentication md5 plaintext testvrrpkey
Enabling VRRP authentication using MD5 with a prompted plaintext key:
switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# version 2 switch(config-if-vrrp)# authentication md5 Enter the authentication key: ************* Re-Enter the authentication key: *************
Enabling VRRP authentication using MD5 with a provided ciphertext key:
switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# version 2 switch(config-if-vrrp)# authentication md5 ciphertext AQBapfciFZ/P...biBAAAAOjc0a8=

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3028

Disabling VRRP authentication:
switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# version 2 switch(config-if-vrrp)# no authentication

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if-vrrp

Modification --
Authority Administrators or local user group members with execution rights for this command.

bfd <IPV4-ADDR>
bfd <IPV4-ADDR> no bfd <IPV4-ADDR>
Description
Enables BFD under VRRP for the specified IP address. BFD is asynchronous and echo mode is supported. The no form of this command disables BFD under VRRP for the specified IP address.

Parameter <IPV4-ADDR>

Description
Specifies the address on which to enable BFD in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.

Examples
On the 6400 Switch Series, interface identification differs. Enabling BFD on the address 10.0.0.1 on VRRP 1:

switch(config)# interface 1/1/1 switch(config-if)# routing switch(config-if)# vrrp 1 address-family ipv4 switch(config-if-vrrp)# bfd 10.0.0.1

Disabling BFD on the address 10.0.0.1 on VRRP 1:

VRRP commands | 3029

switch(config)# interface 1/1/1 switch(config-if)# routing switch(config-if)# vrrp 1 address-family ipv4 switch(config-if-vrrp)# no bfd 10.0.0.1

For more information on features that use this command, refer to the High Availability Guide or IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-if-vrrp

Modification --
Authority Administrators or local user group members with execution rights for this command.

preempt
preempt no preempt
Description
Enables the preempt option. The default value is enabled. In default mode, a Standby router with a higher priority than another Standby that is operating as Active will take over the Active function. Applies to VRRP Standby routers only and is used to minimize network disruption caused by unnecessary preemption of the Active operation among Standby routers. The no form of this command disables the preempt option, thus preventing the higher-priority Standby from taking over the Active operation from a lower-priority Standby. This command does not prevent an owner router from resuming the Active function after recovering from being unavailable.
Examples
switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# preempt
switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# no preempt

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3030

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

preempt delay minimum
preempt delay minimum <DELAY-IN-SECONDS> no preempt delay minimum <DELAY-IN-SECONDS>
Description
Sets the time in seconds (1-3600) that the router will wait before taking control of the virtual IP and starting to route packets. The no form of this command sets the preempt delay for the VRRP group to the default preempt delay of 0 seconds. The VRRP Preempt Delay Timer (PDT) allows admin users to configure a period of time before the VR takes control of the virtual IP address. It does not transition to the Active state until the timer period expires. The timer value configured should be long enough to allow upper layer protocol to converge. The PDT is applied during initialization and down/up events of the router.

Parameter <DELAY-IN-SECONDS>

Description Selects the time in seconds (1-3600). Default is 0 seconds.

Examples

switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# preempt delay minimum 30
switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# no preempt delay

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

VRRP commands | 3031

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

priority
priority <1-254> no priority
Description
Sets the priority for the VRRP group. The no form of this command sets the priority for the VRRP group as default priority.
n The default value for non-Owner virtual routers is 100. n The default value for Owner virtual router is 255, which cannot be changed.
Examples
switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# priority 150
switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# no priority

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3032

router vrrp {enable | disable}
router vrrp {enable | disable} no router vrrp {enable | disable}
Description
Enables or disables VRRP protocol globally. You must globally enable the VRRP feature for VRRP virtual router. no router vrrp enable disables VRRP protocol globally but does not remove all VRRP configurations. no router vrrp disable enables VRRP protocol globally.
Example
Enabling VRRP protocol globally:
switch(config)# router vrrp enable
Disable VRRP protocol globally:
switch(config)# router vrrp disable
Disable VRRP protocol globally:
switch(config)# no router vrrp enable

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

no router vrrp
no router vrrp
Description
Removes VRRP configuration and VRRP global protocol. If auto-confirm is enabled or VRRP is not configured on any interface, this command will not ask for user confirmation.

VRRP commands | 3033

Examples
Removing VRRP configuration:
switch(config)# no router vrrp All VRRP configuration will be deleted. Do you want to continue (y/n)?

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

show track
show track [brief | <OBJECT-ID>]
Description
Shows all or specific track object information.

Parameter brief <OBJECT-ID>

Description Displays brief information about all or specific track objects Displays information about a specified track object (1-128)

Examples

switch# show track Track 1
interface 1/1/1 Interface is DOWN

switch# show track brief

Track Interface

State

1

1/1/1

2

None

3

1/1/2

Down Down Up

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3034

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show track brief
show track brief
Description
Shows brief information for all track objects.
Examples
Showing brief information for all track objects:

switch# show track brief

Track Interface

State

1

1/1/1

2

None

3

1/1/2

Down Down Up

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

VRRP commands | 3035

show vrrp
show vrrp [brief | detail | interface <INTERFACE-NAME> | interface <LAG-NAME> | interface <VLAN-NAME> | ip | ipv6 | statistics | statistics interface <INTERFACE-NAME> | statistics interface <LAG-NAME> | statistics interface <VLAN-NAME>] [vsx-peer]
Description
Shows all VRRP virtual routers information.

Parameter brief
detail interface <INTERFACE-NAME> interface <LAG-NAME> interface <VLAN-NAME> ip ipv6 statistics statistics interface <INTERFACE-NAME> statistics interface <LAG-NAME> statistics interface <VLAN-NAME> vsx-peer

Description
Displays brief output of all VRRP virtual routers Keywords used in displayed information:
Grp: VRRP virtual router group ID. A-F: Address Family. Pri: Priority. Time: Uptime of VRRP virtual router since it moved out of INIT state. Pre: Preempt mode (Y is enabled, N if not enabled).
Displays detailed output of all VRRP virtual routers
Displays VRRP information for a specific interface
Displays VRRP information for a specific LAG interface
Displays VRRP information for a specific VLAN interface
Displays the IPv4 address family
Displays IPv6 address family
Displays VRRP statistics information for all interfaces
Displays VRRP statistics information for a specific interface
Displays VRRP statistics information for a specific LAG interface
Displays VRRP statistics information for a specific VLAN interface
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

switch# show vrrp VRRP is enabled
Interface 1/1/1 - Group 1 - Address-Family IPv
State is ACTIVE State duration 56 mins 57.826 secs

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3036

Virtual IP address is 10.0.0.1 Virtual MAC address is 00:00:5e:00:01:01 Advertisement interval is 1000 msec Preemption enabled Priority is 100 Active Router is 10.0.0.2 (local), priority is 100 Active Advertisement interval is 1000 msec Active Down interval is unknown Tracked object ID is 1, and state Down
Interface 1/1/2 - Group 1 - Address-Family IPv4 State is INIT (Interface Down) State duration 45 mins 28.313 secs Virtual IP address is no address Virtual MAC address is 00:00:5e:00:01:01 Advertisement interval is 1000 msec Preemption enabled Priority is 100 Active Router is unknown, priority is unknown Active Advertisement interval is unknown Active Down interval is unknown
Interface 1/1/2 - Group 1 - Address-Family IPv6 State is INIT (Group Disabled) State duration 20 mins 19.794 secs Virtual IP address is no address Virtual secondary IP addresses: 2201:13::110:4 Virtual MAC address is 00:00:5e:00:02:01 Advertisement interval is 1000 msec Preemption enabled Priority is 100 Active Router is unknown, priority is unknown Active Advertisement interval is unknown Active Down interval is unknown

switch# show vrrp brief

VRRP is enabled

Interface 1/1/1 1/1/2 1/1/2

Grp A-F Pri 1 IPv4 100 1 IPv4 100 1 IPv6 100

Time Owner Pre State 0 N Y ACTIVE 0 N Y INIT 0 N Y INIT

Active addr/Group addr 10.0.0.2(local) 10.0.0.1 AF-UNDEFINED no address AF-UNDEFINED no address

switch# show vrrp detail VRRP is enabled
Interface 1/1/1 - VRRPv2 Statistics Invalid group ID packets received : 0 Invalid version packets received : 0 Invalid checksum packets received : 0
Interface 1/1/1 - VRRPv3 Statistics Invalid group ID packets received : 0 Invalid version packets received : 0 Invalid checksum packets received : 0
Interface 1/1/1 - Group 1 - Address-Family IPv4 State is ACTIVE

VRRP commands | 3037

State duration 1 mins 35.486 secs Virtual IP address is 10.0.0.1 Virtual MAC address is 00:00:5e:00:01:01 Advertisement interval is 1000 msec Version 3 Preemption enabled Priority is 100 Active Router is 10.0.0.2 (local), priority is 100 Active Advertisement interval is 1000 msec Active Down interval is unknown Tracked object ID is 1, and state Down VRRPv3 Advertisements: sent 3931 (errors 0) - rcvd 0 VRRPv2 Advertisements: sent 0 (errors 0) - rcvd 0 Group Discarded Packets: 3537
IP address Owner conflicts: 0 IP address configuration mismatch : 3537 Advert Interval errors : 0 Adverts received in Init state: 0 Invalid group other reason: 0 Group State transition: Init to active: 0 Init to standby: 2 (Last change Mon Jun 16 11:19:36.316 UTC) Standby to active: 2 (Last change Mon Jun 16 11:19:39.926 UTC) Active to standby: 0 Active to init: 1 (Last change Mon Jun 16 11:17:49.978 UTC) Standby to init: 0
Interface 1/1/2 - VRRPv2 Statistics Invalid group ID packets received : 0 Invalid version packets received : 0 Invalid checksum packets received : 0
Interface 1/1/2 - VRRPv3 Statistics Invalid group ID packets received : 0 Invalid version packets received : 0 Invalid checksum packets received : 0
Interface 1/1/2 - Group 1 - Address-Family IPv4 State is INIT (Interface Down) State duration 49 mins 23.507 secs Virtual IP address is no address Virtual MAC address is 00:00:5e:00:01:01 Advertisement interval is 1000 msec Version 3 Preemption enabled Priority is 100 Active Router is unknown, priority is unknown Active Advertisement interval is unknown Active Down interval is unknown VRRPv3 Advertisements: sent 0 (errors 0) - rcvd 0 VRRPv2 Advertisements: sent 0 (errors 0) - rcvd 0 Group Discarded Packets: 0 IP address Owner conflicts: 0 IP address configuration mismatch : 0 Advert Interval errors: 0 Adverts received in Init state: 0 Invalid group other reason: 0 Group State transition: Init to active: 0 Init to standby: 0 Standby to active: 0 Active to standby: 0
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3038

Active to init: 0 Standby to init: 0
Interface 1/1/2 - Group 1 - Address-Family IPv6 State is INIT (Interface Down) State duration 24 mins 14.988 secs Virtual IP address is no address Virtual secondary IP addresses: 2201:13::110:4 Virtual MAC address is 00:00:5e:00:02:01 Advertisement interval is 1000 msec Preemption enabled Priority is 100 Active Router is unknown, priority is unknown Active Advertisement interval is unknown Active Down interval is unknown VRRPv3 Advertisements: sent 0 (errors 0) - rcvd 0 VRRPv2 Advertisements: sent 0 (errors 0) - rcvd 0 Group Discarded Packets: 0 VRRPv2 incompatibility: 0 IP address Owner conflicts: 0 IP address configuration mismatch : 0 Advert Interval errors : 0 Adverts received in Init state: 0 Invalid group other reason: 0 Group State transition: Init to active: 0 Init to standby: 0 Standby to active: 0 Active to standby: 0 Active to init: 0 Standby to init: 0
switch# show vrrp interface 1/1/1 VRRP is enabled
Interface 1/1/1 - Group 1 - Address-Family IPv4 State is ACTIVE State duration 11 mins 21.617 secs Virtual IP address is 10.0.0.1 Virtual MAC address is 00:00:5e:00:01:01 Advertisement interval is 1000 msec Version 3 Preemption enabled Priority is 100 Active Router is 10.0.0.2 (local), priority is 100 Active Advertisement interval is 1000 msec Active Down interval is unknown
switch# show vrrp interface lag10 VRRP is enabled
Interface lag10 - Group 1 - Address-Family IPv4 State is ACTIVE State duration 11 mins 21.617 secs Virtual IP address is 10.0.0.1 Virtual MAC address is 00:00:5e:00:01:01 Advertisement interval is 1000 msec Version 3 Preemption enabled

VRRP commands | 3039

Priority is 100 Active Router is 10.0.0.2 (local), priority is 100 Active Advertisement interval is 1000 msec Active Down interval is unknown
switch# show vrrp interface vlan100 VRRP is enabled
Interface vlan100 - Group 1 - Address-Family IPv4 State is ACTIVE State duration 11 mins 21.617 secs Virtual IP address is 10.0.0.1 Virtual MAC address is 00:00:5e:00:01:01 Advertisement interval is 1000 msec Version 3 Preemption enabled Priority is 100 Active Router is 10.0.0.2 (local), priority is 100 Active Advertisement interval is 1000 msec Active Down interval is unknown
switch# show vrrp statistics
VRRP is enabled
Interface 1/1/1 - VRRPv2 Statistics Invalid group ID packets received : 0 Invalid version packets received : 0 Invalid checksum packets received : 0
Interface 1/1/1 - VRRPv3 Statistics Invalid group ID packets received : 0 Invalid version packets received : 0 Invalid checksum packets received : 0
VRRP Statistics for interface 1/1/1 - Group 1 - Address-Family IPv4 State is ACTIVE State duration 6 mins 55.006 secs VRRPv3 Advertisements: sent 4288 (errors 0) - rcvd 0 VRRPv2 Advertisements: sent 0 (errors 0) - rcvd 0 Group Discarded Packets: 3856 IP address Owner conflicts: 0 IP address configuration mismatch : 0 Advert Interval errors : 0 Adverts received in Init state: 0 Invalid group other reason: 0 Group State transition: Init to active: 0 Init to standby: 2 (Last change Mon Jun 16 11:19:36.316 UTC) Standby to active: 2 (Last change Mon Jun 16 11:19:39.926 UTC) Active to standby: 0 Active to init: 1 (Last change Mon Jun 16 11:17:49.978 UTC) Standby to init: 0
Interface 1/1/2 - VRRPv2 Statistics Invalid group ID packets received : 0 Invalid version packets received : 0 Invalid checksum packets received : 0
Interface 1/1/2 - VRRPv3 Statistics
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3040

Invalid group ID packets received : 0 Invalid version packets received : 0 Invalid checksum packets received : 0
VRRP Statistics for Interface 1/1/2 - Group 1 - Address-Family IPv4 State is INIT (No Primary Group Address) State duration 54 mins 43.027 secs VRRPv3 Advertisements: sent 0 (errors 0) - rcvd 0 VRRPv2 Advertisements: sent 0 (errors 0) - rcvd 0 Group Discarded Packets: 0 IP address Owner conflicts: 0 Invalid address count: 0 IP address configuration mismatch : 0 Advert Interval errors : 0 Adverts received in Init state: 0 Invalid group other reason: 0 Group State transition: Init to active: 0 Init to standby: 0 Standby to active: 0 Active to standby: 0 Active to init: 0 Standby to init: 0
VRRP Statistics for Interface 1/1/2 - Group 1 - Address-Family IPv6 State is INIT (Interface Down) State duration 29 mins 34.508 secs VRRPv3 Advertisements: sent 0 (errors 0) - rcvd 0 VRRPv2 Advertisements: sent 0 (errors 0) - rcvd 0 Group Discarded Packets: 0 IP address Owner conflicts: 0 IP address configuration mismatch : 0 Advert Interval errors: 0 Adverts received in Init state: 0 Invalid group other reason: 0 Group State transition: Init to active: 0 Init to standby: 0 Standby to active: 0 Active to standby: 0 Active to init: 0 Standby to init: 0
switch# show vrrp statistics interface 1/1/1
VRRP is enabled
Interface 1/1/1 - VRRPv2 Statistics Invalid group ID packets received : 0 Invalid version packets received : 0 Invalid checksum packets received : 0
Interface 1/1/1 - VRRPv3 Statistics Invalid group ID packets received : 0 Invalid version packets received : 0 Invalid checksum packets received : 0
VRRP Statistics for interface 1/1/1 - Group 1 - Address-Family IPv4 State is ACTIVE State duration 6 mins 55.006 secs VRRPv3 Advertisements: sent 4288 (errors 0) - rcvd 0
VRRP commands | 3041

VRRPv2 Advertisements: sent 0 (errors 0) - rcvd 0 Group Discarded Packets: 3856
IP address Owner conflicts: 0 IP address configuration mismatch : 0 Advert Interval errors : 0 Adverts received in Init state: 0 Invalid group other reason: 0 Group State transition: Init to active: 0 Init to standby: 2 (Last change Mon Jun 16 11:19:36.316 UTC) Standby to active: 2 (Last change Mon Jun 16 11:19:39.926 UTC) Active to standby: 0 Active to init: 1 (Last change Mon Jun 16 11:17:49.978 UTC) Standby to init: 0
switch# show vrrp statistics interface lag10
VRRP is enabled
Interface lag10 - VRRPv2 Statistics Invalid group ID packets received : 0 Invalid version packets received : 0 Invalid checksum packets received : 0
Interface lag10 - VRRPv3 Statistics Invalid group ID packets received : 0 Invalid version packets received : 0 Invalid checksum packets received : 0
VRRP Statistics for interface lag10 - Group 1 - Address-Family IPv4 State is ACTIVE State duration 6 mins 55.006 secs VRRPv3 Advertisements: sent 4288 (errors 0) - rcvd 0 VRRPv2 Advertisements: sent 0 (errors 0) - rcvd 0 Group Discarded Packets: 3856 IP address Owner conflicts: 0 IP address configuration mismatch : 0 Advert Interval errors : 0 Adverts received in Init state: 0 Invalid group other reason: 0 Group State transition: Init to active: 0 Init to standby: 2 (Last change Mon Jun 16 11:19:36.316 UTC) Standby to active: 2 (Last change Mon Jun 16 11:19:39.926 UTC) Active to standby: 0 Active to init: 1 (Last change Mon Jun 16 11:17:49.978 UTC) Standby to init: 0
switch# show vrrp statistics interface vlan100
VRRP is enabled
Interface vlan100 - VRRPv2 Statistics Invalid group ID packets received : 0 Invalid version packets received : 0 Invalid checksum packets received : 0
Interface vlan100 - VRRPv3 Statistics Invalid group ID packets received : 0 Invalid version packets received : 0
AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3042

Invalid checksum packets received : 0
VRRP Statistics for interface vlan100 - Group 1 - Address-Family IPv4 State is ACTIVE State duration 6 mins 55.006 secs VRRPv3 Advertisements: sent 4288 (errors 0) - rcvd 0 VRRPv2 Advertisements: sent 0 (errors 0) - rcvd 0 Group Discarded Packets: 3856 IP address Owner conflicts: 0 IP address configuration mismatch : 0 Advert Interval errors : 0 Adverts received in Init state: 0 Invalid group other reason: 0 Group State transition: Init to active: 0 Init to standby: 2 (Last change Mon Jun 16 11:19:36.316 UTC) Standby to active: 2 (Last change Mon Jun 16 11:19:39.926 UTC) Active to standby: 0 Active to init: 1 (Last change Mon Jun 16 11:17:49.978 UTC) Standby to init: 0

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14

10.08 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated. Updated command output for inclusive language --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

shutdown
shutdown no shutdown
Description
Enables standby VRRP groups on the interface to route the traffic sent to virtual router's MAC address. It is recommended to enable this mode on VLANs where mc-lags are configured. Disabled by default. The no form of this command disables standby VRRP groups on the interface to route the traffic sent to virtual router's MAC address.

VRRP commands | 3043

Only supported on SVI interfaces.
Examples
Enabling standby VRRP groups on interface VLAN 10 to route traffic sent to the router's MAC address:
switch(config)# interface vlan 10 switch(config-if-vlan)# vrrp dual-active-forwarding
Disabling the ability of standby VRRP groups on interface VLAN 10 to route traffic sent to the router's MAC address:
switch(config)# interface vlan 10 switch(config-if-vlan)# no vrrp dual-active-forwarding

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.12.1000

Command Information

Platforms 6400

Command context config

Modification Command introduced.

Authority
Administrators or local user group members with execution rights for this command.

timers advertise
timers advertise <ADVERTISE-IN-MILLISECONDS> no timers advertise
Description
Sets the advertisement interval in ms (100-40950). The default value is 1000. Advertisement interval can be configured in multiples of 1,000 ms. The no form of this command sets the advertisement interval in ms to the default value of 1000.
This release does not support sub-second timer for VRRPv3.
Examples
Setting the advertisement interval in ms to 2000:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3044

switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# timers advertise 2000
Setting the advertisement interval in ms to the default value of 1000:
switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# no timers advertise

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

track (VRRP group)
track <OBJECT-ID> no track <OBJECT-ID>
Description
Sets the track object ID (1-128) for the group. The track object is first configured globally for the interface and then attached to the VRRP virtual router.
The track object must not track the same interface for which a VRRP group is configured.
The no form of this command removes the track object ID from the group.
Examples
Setting the track object ID for the group:
switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# track 1
Removing the track object ID from the group:

VRRP commands | 3045

switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# no track 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

track (VRRP virtual router)
track <OBJECT-ID> no track <OBJECT-ID>
Description
Configures a track object that can be associated with an interface. A change in interface state will then affect the priority of a VRRP group. By default, no interface is associated to a track object, so state is down. The no form of this command deletes a tracked object for an interface. If it is not associated with a VRRP virtual router, a track object cannot be deleted.
Track cannot be configured by using port with no routing. When all tracked interfaces go down on a virtual router, priority is automatically set to zero instead of its configured value. Owner virtual routers always use a default priority of 255.

Parameter <OBJECT-ID>
Examples
Configuring a tracked object: switch(config)# track 1
Deleting a tracked object:

Description Specify the track object ID value. Range: 1 to 128.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3046

switch(config)# no track 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

track by
track by <OBJECT-ID> no track by <OBJECT-ID>
Description
Specifies an interface to be tracked when changes in the state of the interface affect the priority of a VRRP group. Once track is associated with an interface, the track state reflects the interface forwarding state. The no form of this command removes an interface from tracking, affecting VRRP states of any interfaces associated with VRRP groups.
The VLAN interface 1 is always tracked.

Parameter <OBJECT-ID>

Description Specifies the track object ID value. Range: 1 to 128.

Example
Specifying an interface to be tracked:

switch (config)# interface 1/1/1 switch (config-if)# track by 1

For more information on features that use this command, refer to the IP Routing Guide for your switch model.
Command History

VRRP commands | 3047

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

version
version <VERSION-NUMBER>
Description
Sets the protocol version for the VRRP group. Version change is allowed only for the IPv4 address-family. The default value is 2, which supports IPv4 with minimum 1 second advertisement interval. Value 3 supports IPv4 and IPv6 with minimum 1 second advertisement interval.

Parameter <VERSION-NUMBER>

Description
Specifies the VRRP protocol version. Possible values: 2 or 3. The default value is 2, which supports IPv4 with a minimum 1 second advertisement interval.

Example
Setting the protocol version for the VRRP group to 3:

switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)# version 3

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3048

vrrp
vrrp <VRID> address-family {ip | ipv6} no vrrp <VRID> address-family {ip | ipv6}
Description
Creates a VRRP group and establishes VRRP group configuration context.
n A maximum of 16 VRRP groups, including both IPv4 and IPv6, are supported on an interface. n A maximum of 256 VRRP groups is supported on a router. The groups can be IPv4 or IPv6 on a first
come first serve basis.
The no form of this command deletes a VRRP group.

Parameter <VRID> address-family [IP| IPv6]

Description Selects the VRRP router ID value. Range: 1 to 255. Specifies which address family to use, IP or IPv6.

Examples

switch(config)# interface 1/1/1 switch(config-if)# vrrp 1 address-family ip switch(config-if-vrrp)#
switch(config-if-vrrp)# no vrrp 1 address-family ip

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History
Release 10.14

10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification Replaced the ipv4 parameter with the ip parameter. The ipv4 parameter is deprecated. --
Authority Administrators or local user group members with execution rights for this command.

vrrp dual-active-forwarding
vrrp dual-active-forwarding no vrrp dual-active-forwarding
Description

VRRP commands | 3049

Allows standby VRRP groups on an interface to route traffic sent to a virtual router's MAC address. It is recommended to enable VRRP dual active forwarding on VLANs configured on MCLAG interfaces. Disabled by default. The no form of this command prevents standby VRRP groups on the interface to route traffic sent to the virtual router's MAC address.
VRRP dual active forwarding is only supported on SVI interfaces.
VRRP dual active forwarding and VRRP owner mode are mutually exclusive.
To verify the configuration of vrrp dual-active-forwarding use the show vrrp command.
Examples
Enabling VRRP dual active forwarding on interface VLAN 10:
switch(config)# interface vlan 10 switch(config-if-vlan)# vrrp dual-active-forwarding
Disabling VRRP dual active forwarding on interface VLAN 10:
switch(config)# interface vlan 10 switch(config-if-vlan)# no vrrp dual-active-forwarding

For more information on features that use this command, refer to the IP Routing Guide for your switch model.

Command History

Release 10.12.1000

Command Information

Platforms 6400

Command context config-if-vlan

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3050

Chapter 166 VSF commands

VSF commands
description
description no description
Description
Adds a description for one or more VSF link interfaces. The no form of this command removes the interface description.
Examples
Adding a description for VSF link interface 1/1/25:
switch(config)# interface 1/1/25 switch(config-if-vsf)# description mem 1 intf 1/1/25
Removing the description from interface 1/1/25
switch(config)# int 1/1/25 switch(config-if-vsf)# no description

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

Command History
Release 10.10

Command Information

Platforms 6300

Command context config-if-vsf

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

interface
interface <IFRANGE>

AOS-CX 10.14 Command-Line Interface Guide

3051

Description
Enters configuration context for one or more VSF link interfaces.
VSF link interfaces cannot be included in a range with other interfaces.

Parameter <IFRANGE>

Description Poet identifier range. Required.

Examples
Entering configuration context:

switch(config)# interface 1/1/1

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6300

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

issu rollback-timer
issu rollback-timer [wait-time <TIME>]
Description
Enables the ISSU rollback timer on the system. The rollback timer automatically rolls the system back to the configuration and OS image used before starting the ISSU, unless the upgrade is confirmed with issu update-software confirm. Changing the rollback-timer will not affect an active timer and will apply on the next ISSU. To cancel the active timer, confirm the previous ISSU with issu updatesoftware confirm. Disabled by default. The no form of this command disables the rollback timer on the system.

Parameter <TIME>

Description Specifies how many minutes the system will wait for confirmation

VSF commands | 3052

Parameter

Description
that the last ISSU is accepted before triggering a system reboot and roll back to the previous configuration and OS version. This change will not affect an active timer and will apply on the next ISSU. Range: 30-1440.

Examples
Enabling the ISSU rollback timer:

switch(config)# issu rollback-timer

Disabling the ISSU rollback timer:

switch(config)# no issu rollback-timer

Disabling the ISSU rollback timer on the system while a previous ISSU's timer is active:

switch(config)# no issu rollback-timer The ISSU rollback timer is active. This change will apply on the next ISSU operation To cancel the active timer, confirm the previous ISSU with 'issu update-software confirm'

Setting the ISSU rollback timer wait time to 80 minutes:

switch# issu rollback-timer wait-time 80

Setting the ISSU rollback timer wait time to 81 minutes while a previous ISSU's timer is active:

switch# issu rollback-timer wait-time 81 The ISSU rollback timer is active. This change will apply on the next ISSU operation

Resetting the ISSU rollback timer wait time to default:

switch(config)# no issu rollback-timer wait-time

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.11

Modification Command introduced

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3053

Command Information

Platforms
6300, except for S3L75A, S3L76A and S3L77A

Command context config

Authority
Administrators or local user group members with execution rights for this command.

issu update-software
issu update-software [validate|confirm]
Description
Initiates ISSU to the alternate boot location. The newer operating system image must be downloaded to the alternate boot location prior to running this command. Additionally, the current running operating system version must match the version that is stored in the current boot location or ISSU will not be allowed.

This operation is disruptive and will result in the management interface being disconnected during the process.

Starting an ISSU will cause the running configuration to be saved in case an error is encountered that requires a reboot to recover the switch. In addition, a special configuration checkpoint will be stored to disk and is used to roll back to the pre-ISSU firmware. During the ISSU process all management methods (CLI, REST, WebUI) will be blocked from making configuration changes to the switch. The configuration block is active from the time ISSU starts until the time ISSU switchover is complete. fter the ISSU switchover is completed, switch configuration can resume.

Parameter validate

Description
Runs all pre-ISSU validations without executing the actual upgrade. The validation runs in the background, however its results will be displayed in real time for approximately the next three minutes . If the validation is not finished within that time frame or if the display is aborted with Control+C or Control+Z, the results can be queried using the show issu validation command.

confirm

Confirms the software update and cancels the configured rollback timer. If the rollback timer is configured then this command has to be executed after an ISSU before the timer expires. Else, the pre-ISSU checkpoint is copied to the startup configuration and the system is rebooted to the image used before ISSU. Note: To perform an intentional system rollback before the timer expires, a manual downgrade must be executed through the following steps:
1. Copy the pre-ISSU checkpoint to the startup configuration
using the copy checkpoint pre-issu-startup-config
startup-config command.

VSF commands | 3054

Parameter

Description
2. Boot to the previous image using the boot system command.

Usage
Note the following points before running this command:
n The newer operating system image must be downloaded to the alternate boot location prior to running this command.
n The current running operating system version must match the version that is stored in the current boot location or ISSU will not be allowed.
n This operation is disruptive and will result in the management interface being disconnected during the process.
n The running configuration will be stored in case an error is encountered that requires a reboot to recover the switch.
n During the ISSU process all management methods (CLI, REST, WebUI) are blocked from making configuration changes to the switch. The configuration changes are not allowed from the time ISSU starts until ISSU switchover is complete. fter the ISSU switchover is completed, switch configuration can resume.
n In case of ISSU, conductor gets transitioned to standby role without reboot. n The stack topology must be a ring before initiating ISSU. ISSU is not supported in chain topologies
and the process is aborted if the ISSU is initiated. n During the ISSU process, the show core-dump all, show tech all, and copy support-files
commands all may fail to run or display correct output.
Examples
Initiating an ISSU:
switch# issu update-software
This command will perform an in-service software upgrade
using pre-staged secondary operating system image
FL.10.13.1000M
This will save the current running configuration
WARNING:
The rollback timer is enabled and configured to 30 minutes.
After the upgrade is done, execute "issu update-software confirm"
to confirm the new image works as expected. If the command is not
entered, the system will be rebooted to the previous version.

Continue (y/n)? y

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3055

Starting in-service software upgrade. Use "show issu" to monitor status and progress. Use "show events -c issu" to view event notifications.

Initiating an ISSU, but stopping it without confirming the upgrade:
switch(config)# issu update-software
This command will perform an in-service software upgrade using pre-staged secondary operating system image FL.10.13.1000M This will save the current running configuration
WARNING:
The rollback timer is enabled and configured to 30 minutes. After the upgrade is done, execute "issu update-software confirm" to confirm the new image works as expected. If the command is not entered, the system will be rebooted to the previous version.

Continue (y/n)? n In-service software upgrade aborted. No changes were made.

Confirming the ISSU configuration when the rollback timer has been configured and started: switch# issu update-software confirm The ISSU has been confirmed and the rollback timer has been cancelled.

Confirming the ISSU configuration when the rollback timer has not started:

switch# issu update-software confirm No rollback timer has been started, no action was done.

Executing an ISSU "dry run" where all pre-ISSU validations are run without executing the actual upgrade:

switch# issu update-software validate

ISSU Validation

======================= Condition

Status

-----------------------------------------------------------

Current Image Valid

---

Target Image Valid

---

Target Version Compatible ---

Management Modules Ready ---

Line Modules Ready

---

Features Ready

---

In Progress[/]

VSF commands | 3056

Executing an ISSU "dry run" where all pre-ISSU validations are run and the user aborts the ISSU validation on screen display without user confirmation:

switch# issu update-software validate

ISSU Validation

======================= Condition

Status

-----------------------------------------------------------

Current Image Valid

Pass

Target Image Valid

Pass

Target Version Compatible Failed

Management Modules Ready ---

Line Modules Ready

---

Features Ready

---

In Progress[\] To view the validation progress and results, execute "show issu validation"

Executing an ISSU "dry run" where all pre-ISSU validations are run without executing the actual upgrade and the validation progress has finished successfully:

switch# issu update-software validate

ISSU Validation

======================= Condition

Status

-----------------------------------------------------------

Current Image Valid

Pass

Target Image Valid

Pass

Target Version Compatible Pass

Management Modules Ready Pass

Line Modules Ready

Pass

Features Ready

Pass

ISSU Validation has completed

Executing an ISSU validation while a previous ISSU is unconfirmed, i.e. the rollback timer is still running:

switch# issu update-software validate The previous ISSU has not been confirmed. Please confirm it with 'issu update-software confirm' before starting a new ISSU or running a validation.

Executing an ISSU "dry run" when the validations are taking more than three minutes to complete, then checking the result of the validation afterwards:

switch# issu update-software validate ISSU validation is taking longer than expected. Check the final result with 'show issu validation'
switch# show issu validation

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3057

ISSU Validation =======================

Condition

Status

-----------------------------------------------------------

Current Image Valid Target Image Valid Target Version Compatible Management Modules Ready Line Modules Ready Features Ready

Pass Pass Pass Pass Pass Pass

Following example shows ISSU performed with chain topology:

switch# issu update-software Stack topology is not a ring. ISSU upgrade aborted.

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.11 10.10

Command Information

Platforms
6300, except for S3L75A, S3L76A and S3L77A

Command context config

Modification Validate and confirm parameters added. Command introduced.
Authority Administrators or local user group members with execution rights for this command.

link
link <LINK-ID> [<IFRANGE>][description <DESCRIPTION>] no link <LINK-ID> [<IFRANGE>][description <DESCRIPTION>]
Description
Creates or modifies a VSF link. The user can specify the physical interfaces that make up the VSF link. Once an interface is part of a VSF link, all existing configuration on the interface is removed and the interface will operate as a VSF interface. At least one interface must be specified for the creation of a VSF link. VSF interfaces carry VSF traffic and can only be connected to other VSF interfaces. Before removing an individual interface from the VSF link using the no vsf link <x> <interface> command, ensure that the interface is administratively shutdown at both local and peer ends.

VSF commands | 3058

Interface(s) configured with MACsec cannot be added as VSF links. You have to remove the MACsec configuration before adding an interface to a VSF link.
The no form of the command can be used to remove interfaces from a link or remove the link completely.
When configuration is removed from a link, it may cause the stack to split.

Parameter <LINK-ID> <IFRANGE> <DESCRIPTION>

Description The VSF link number. Range: 1 to 2.
The interface identifier range. Adds a description for the link. Range: 1 to 64 printable ASCII characters.

Examples
Creating a VSF link called link 1 with an interface range of 1/1/51 and a description, and a VSF link called link 2 with an interface range of 1/1/52:

switch(vsf-member-1)# link 1 1/1/51 switch(vsf-member-1)# link 1 description link 1 connected to member 2 switch(vsf-member-1)# link 2 1/1/52

Removing VSF link 1 and link 2 completely:

switch(vsf-member-1)# no link 1 switch(vsf-member-1)# no link 2

Removing an assigned interface 1/1/51 from VSF link 1:

switch(vsf-member-1)# no link 1 1/1/51

Attempting to add an interface configured with MACsec to a VSF link:

switch(vsf-member-1)# link 1 1/1/51 VSF link cannot be configured on an interface with MACsec policy enabled.

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3059

Release 10.10 10.07 or earlier

Command Information

Platforms 6300

Command context vsf-member-<ID>

Modification Added the description parameter. --
Authority Administrators or local user group members with execution rights for this command.

member
member <MEMBER-ID>
Description
Connects to the specified member in a VSF environment.

Parameter <MEMBER-ID>

Description
VSF member ID. n Range for 6300 devices: 1-10.

Examples
VSF stack is formed with two members:

switch# member 2 admin@172.17.17.2's password:
Last login: 2019-09-30 11:42:17 from the console User "admin" has logged in 1 time in the past 30 days member-2#

Member to self:

switch# member 1 Already on member id 1

VSF stack is not formed and member not available:

switch# member 2 No stack role for member id 2

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

VSF commands | 3060

Command History

Release 10.07 or earlier

Command Information

Platforms 6300

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

type
type <TYPE> no type <TYPE>
Description
Configures the part number of the VSF member being provisioned. After provisioning, the interfaces of the member are available for configuration. When the member eventually joins the stack, it will boot up with the configuration made on the preprovisioned interfaces. To provision a member, the member number and the part number of the member must be specified. The no form of this command removes the configuration for the part number of the VSF member provisioned.

Parameter <TYPE>

Description The part number of the member being provisioned. Required.

Examples
Configuring the part number of a VSF member:

switch(vsf-member-2)# type The part number of the member being provisioned
switch(vsf-member-2)# type ? jl658a 6300M 24SFP+ /4SFP56 Switch jl659a 6300M 48SR PoE CLS 6 /4SFP56 Switch jl660a 6300M 24SR PoE CLS 6 /4SFP56 Switch jl661a 6300M 48G PoE CLS 4 /4SFP56 Switch jl662a 6300M 24G PoE CLS 4 /4SFP56 Switch jl663a 6300M 48G /4SFP56 Switch jl664a 6300M 24G /4SFP56 Switch jl665a 6300F 48G PoE CLS 4 /4SFP56 Switch jl666a 6300F 24G PoE CLS 4 /4SFP56 Switch jl667a 6300F 48G /4SFP56 Switch jl668a 6300F 24G /4SFP56 Switch jl762a 6300M 48G 4SFP56 Pwr2Prt Switch
switch(vsf-member-2)# type jl662a

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3061

switch(vsf-member-2)# show running-config Current configuration: ! !Version AOS-CX ! ! ! ! ssh maximum-auth-attempts 6 ! ! ! ! ! vlan 1 vsf member 1
type jl661a exit vsf member 2
type jl662a exit

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6300

Command context vsf-member-<ID>

Modification --
Authority Administrators or local user group members with execution rights for this command.

shutdown
shutdown no shutdown
Description
Shuts down one or more VSF link interfaces. The no form of this command turns on one or more VSF link interfaces.
Examples
Shutting down a VSF link interface:

VSF commands | 3062

switch(config)# interface 1/1/1-1/1/2 switch(config-if-vsf-<1/1/1-1/1/2>)# shutdown

Shutdown configuration for VSF interfaces is not persistent across reboots.

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms 6300

Command context config-if-vsf

Modification --
Authority Administrators or local user group members with execution rights for this command.

show issu
show issu [brief|history|validation]
Description
Shows information about the current state of ISSU. If no ISSU is currently in progress, the command displays the progress details of the last ISSU. The command with the brief parameter displays a short summary of the ISSU state and indicates if the system is ready to accept an ISSU command and whether or not an ISSU is in progress. If the brief parameter is not included, then more details about an in progress ISSU or the last ISSU are displayed.

Parameter brief history validation

Description Shows a short summary of the ISSU state. Shows details of ISSU software update history. Shows information about the current state of an ISSU validation.

Examples
Showing detailed ISSU status with an ISSU in progress for the first time:

switch# show issu ISSU Summary ============

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3063

ISSU Status

: In Progress

Current Version : FL.10.13.0005K

Upgrade Image : secondary

Last ISSU Result: --

Rollback timer : Not started

Upgrade Version : FL.10.13.1000M

Start Date

: 2023-11-08 07:01:47

ISSU Progress

=============

Upgrade Operation

Status

Start Date

------------------------------------------------------------------------

Initiate ISSU

Complete

2023-11-08 07:01:47

Validate System Readiness

In Progress

2023-11-08 07:01:47

Upgrade Standby and Member Modules Pending

--

Upgrade Line Module Services

Pending

--

Prepare for Switchover

Pending

--

Finalize Upgrade

Pending

--

ISSU Complete

Pending

--

Showing detailed status for VSF ISSU:

switch# show issu

ISSU Summary

============

ISSU Status

: In Progress

Current Version : FL.10.11.0001

Upgrade Image : secondary

Last ISSU Result: --

Rollback timer : Not started

Upgrade Version : FL.10.11.1000BD

Start Date

: 2023-02-02 14:22:31

ISSU Progress

=============

Upgrade Operation

Status

Start Date

------------------------------------------------------------------------

Initiate ISSU

Complete

2023-02-02 14:22:31

Validate System Readiness

Complete

2023-02-02 14:22:31

Upgrade Standby and Member Modules In Progress

2023-02-02 14:22:54

Upgrade Line Module Services

Pending

--

Prepare for Switchover

Pending

--

Finalize Upgrade

Pending

--

ISSU Complete

Pending

--

Showing detailed ISSU status with ISSU in progress after successfully completing a previous ISSU:

switch# show issu

ISSU Summary

===========

ISSU Status

: In progress

Current Version : FL.10.10.0001

Upgrade Version : FL.10.10.0002

Upgrade Image : secondary

Start Date

: 2021-10-15 08:37:49

Last ISSU Result: Completed (Without errors)

ISSU Progress

=============

Upgrade Operation

Status

Start Date

------------------------------------------------------------------------

Initiate ISSU

Complete

2021-10-13 23:05:41

Validate System Readiness

Complete

2021-10-13 23:05:41

Upgrade Standby Management Module Complete

2021-10-13 23:05:41

Upgrade Line Modules

In Progress

2021-10-13 23:07:07

VSF commands | 3064

Prepare for Switchover Finalize Upgrade ISSU Complete

Pending

--

Pending

--

Pending

--

Showing detailed ISSU status with ISSU in progress after aborting the previous ISSU:

switch# show issu

ISSU Summary

===========

ISSU Status

: In progress

Current Version : FL.10.10.0001

Upgrade Version : FL.10.10.0002

Upgrade Image : secondary

Start Date

: 2021-10-15 08:37:49

Last ISSU Result: Aborted (One or more line modules are not ready to start ISSU)

ISSU Progress

=============

Upgrade Operation

Status

Start Date

------------------------------------------------------------------------

Initiate ISSU

Complete

2021-10-13 23:05:41

Validate System Readiness

Complete

2021-10-13 23:05:41

Upgrade Standby Management Module Complete

2021-10-13 23:05:41

Upgrade Line Modules

In Progress

2021-10-13 23:07:07

Prepare for Switchover

Pending

--

Finalize Upgrade

Pending

--

ISSU Complete

Pending

--

Showing detailed ISSU status with no ISSU in progress and no previous ISSU performed:

switch# show issu

ISSU Summary

===========

ISSU Status

: Ready

Current Version : FL.10.10.0001

Upgrade Image : --

Last ISSU Result: -- (--)

Upgrade Version : --

Start Date

: --

ISSU Progress

=============

Upgrade Operation

Status

Start Date

------------------------------------------------------------------------

Initiate ISSU

--

--

Validate System Readiness

--

--

Upgrade Standby Management Module --

--

Upgrade Line Modules

--

--

Prepare for Switchover

--

--

Perform Switchover

--

--

Finalize Upgrade

--

--

ISSU Complete

--

--

Showing detailed ISSU status after completion and before system is ready to start a new ISSU:

switch# show issu

ISSU Summary

===========

ISSU Status

: Not ready

Current Version : FL.10.10.0001

Upgrade Image : --

Upgrade Version : --

Start Date

: --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3065

Last ISSU Result: Completed (Without errors)

ISSU Progress

=============

Upgrade Operation

Status

Start Date

------------------------------------------------------------------------

Initiate ISSU

Complete

2021-10-13 23:05:41

Validate System Readiness

Complete

2021-10-13 23:05:41

Upgrade Standby Management Module Complete

2021-10-13 23:05:41

Upgrade Line Modules

Complete

2021-10-13 23:07:07

Prepare for Switchover

Complete

2021-10-13 23:07:50

Finalize Upgrade

Complete

2021-10-13 23:07:53

ISSU Complete

Complete

2021-10-13 23:08:10

Showing detailed ISSU status after an error occurred and the process is aborted:

switch# show issu

ISSU Summary

============

ISSU Status

: Aborted

Current Version : FL.10.10.0001

Upgrade Version : FL.10.10.0002

Upgrade Image : secondary

Start Date

: 2021-12-09 19:17:15

Last ISSU Result: Aborted (System failed to prepare for ISSU)

ISSU Progress

=============

Upgrade Operation

Status

Start Date

------------------------------------------------------------------------

Initiate ISSU

Complete

2021-12-09 19:17:15

Validate System Readiness

Complete

2021-12-09 19:17:15

Upgrade Standby Management Module Complete

2021-12-09 19:17:15

Upgrade Line Modules

Error

2021-12-09 19:19:22

Prepare for Switchover

Aborted

--

Finalize Upgrade

Aborted

--

ISSU Complete

Aborted

--

Showing summary of ISSU status with no ISSU in progress where system is ready to start a new ISSU and with no previous ISSU performed:

switch# show issu brief

ISSU Summary

===========

ISSU Status

: Ready

Current Version : FL.10.10.0001

Upgrade Image : --

Last ISSU Result: -- (--)

Upgrade Version : --

Start Date

: --

Showing summary of ISSU status with no ISSU in progress where system is ready to start a new ISSU and after successfully completing a previous ISSU:

switch# show issu brief

ISSU Summary

===========

ISSU Status

: Ready

Current Version : FL.10.10.0001

Upgrade Version : --

Upgrade Image : --

Start Date

: --

Last ISSU Result: Completed (Without errors)

VSF commands | 3066

Showing a summary of ISSU status with no ISSU in progress where system is ready to start a new ISSU amd after aborting the previous ISSU:

switch# show issu brief

ISSU Summary

===========

ISSU Status

: Ready

Current Version : FL.10.10.0001

Upgrade Version : --

Upgrade Image : --

Start Date

: --

Last ISSU Result: Aborted (One or more line modules are not ready to start ISSU)

Showing a summary of ISSU status with ISSU in progress:

switch# show issu brief

ISSU Summary

===========

ISSU Status

: In progress

Current Version : FL.10.10.0001

Upgrade Version : FL.10.10.0002

Upgrade Image : secondary

Start Date

: 2021-10-15 08:37:49

Last ISSU Result: Completed (Without errors)

Showing a summary of ISSU status with no ISSU in progress where the system is not ready to start a new ISSU:

switch# show issu brief

ISSU Summary

===========

ISSU Status

: Not ready

Current Version : FL.10.10.0001

Upgrade Version : FL.10.10.0002

Upgrade Image : secondary

Start Date

: 2021-10-15 08:37:49

Last ISSU Result: Completed (Without errors)

Showing summary of ISSU status after an error occurred and the process is aborted:

switch# show issu brief

ISSU Summary

============

ISSU Status

: Aborted

Current Version : FL.10.10.0001

Upgrade Version : FL.10.10.0002

Upgrade Image : secondary

Start Date

: 2021-12-09 19:17:15

Last ISSU Result: Aborted (System failed to prepare for ISSU)

Showing ISSU validation status per condition/validation:

switch# show issu validation

ISSU Validation

======================= Condition

Status

-----------------------------------------------------------

Current Image Valid

---

Target Image Valid

---

Target Version Compatible ---

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3067

Management Modules Ready ---

Line Modules Ready

---

Features Ready

---

Showing ISSU history:

switch# show issu history

Upgrade: 1

From Version : FL.10.11.0001

To Version : FL.10.11.1000

Start Time : 2022-09-14 15:37:33

End Time

: 2022-09-14 15:40:45

Status

: Completed

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.11.1000 10.11 10.10

Modification History parameter introduced. Support for 6300 Switch Series added. Command introduced

Command Information

Platforms
6300, except for S3L75A, S3L76A and S3L77A

Command context Authority

Manager (#)

Administrators or local user group members with execution rights for this command.

show vsf
show vsf
Description
Displays the information about the configuration and status of a VSF stack and its members.
Example
Showing the information about the configuration and status of a VSF stack and its members (without S0E91A or S0X44A SKU member): (Applies only to 6300 Switch Series)
switch# show vsf

VSF commands | 3068

Force Autojoin

: Disabled

Autojoin Eligibility Status: Not Eligible

MAC Address

: 38:21:c7:5c:62:40

Egress Shape Rate

: None

Secondary

:2

Topology

: Ring

Status

: No Split

Split Detection Method

: None

Mbr Mac Address

type

Status

ID

--- ------------------- -------------- ---------------

1 38:21:c7:5c:62:40 JL668A

Conductor

2 18:7a:3b:1b:68:c0 R8S90A

Standby

3 38:21:c7:5c:57:c0 JL668A

Member

4 18:7a:3b:1b:66:40 R8S89A

Member Booting

Showing the information about the configuration and status of a VSF stack and its stack members (with S0E91A or S0X44A SKU member):
(Applies only to 6300 Switch Series)

switch# show vsf

Force Autojoin

: Disabled

Autojoin Eligibility Status: Not Eligible

MAC Address

: 08:97:34:b0:0e:00

Egress Shape Rate

: 10000000 kbps

Secondary

:2

Topology

: Chain

Status

: No Split

Split Detection Method

: None

Mbr MAC Address

Type

Status

ID

--- ------------------- -------------- -----------------

1 08:97:34:b0:0e:00 JL666A

Conductor

2 08:97:34:b1:43:00 JL665A

Standby

3 08:97:34:b7:cc:00 SOE91A

Member

4

JL662A

Not Present

Showing the information about the configuration and status of a VSF stack and its stack members with egress shape rate is populated with Not Applied indicating that port shaping failed to apply on one or more active VSF interfaces:
(Applies only to 6300 Switch Series)

switch# show vsf

Force Autojoin

: Disabled

Autojoin Eligibility Status: Not Eligible

MAC Address

: 08:97:34:b0:0e:00

Egress Shape Rate

: Not Applied

Secondary

:2

Topology

: Chain

Status

: No Split

Split Detection Method

: None

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3069

Mbr MAC Address

Type

Status

ID

--- ------------------- -------------- -----------------

1 08:97:34:b0:0e:00 JL666A

Conductor

2 08:97:34:b1:43:00 JL665A

Standby

3 08:97:34:b7:cc:00 SOE91A

Member

The Egress Shape Rate displays the operational speed of the stack when the VSF egress port shaping is applied. An error message is displayed if port shaping fails to apply to the interface. The purpose of the VSF port shaping feature is to ensure that all VSF interface operate at a lowest common port speed across the stack. This feature is supported only in the 6300 switch series.

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

Command History
Release 10.13.1000

10.07 or earlier

Command Information

Platforms 6300

Command context Manager (#)

Modification Command updated to display Egress Shape Rate. Applicable only for 6300 Switch Series. --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsf detail
show vsf detail
Description
Displays detailed information related to the current state of the VSF stack and the stack members.
Example

switch# show vsf detail
VSF Stack MAC Address
Secondary Topology Status Uptime Split Detection Method

: ec:eb:b8:d0:80:40 :2 : Chain : No Split : 0d 0h 23m : None

VSF commands | 3070

Software Version

: SL.10.02.0000-7755

Force Autojoin

: Disabled

Autojoin Eligibility Status : Not Eligible

Autojoin Ineligibility Reason: Configuration changes detected

Name

: Aruba-VSF-6300F

Contact

:

Location

:

Member ID MAC Address Type Model Status ROM Version Serial Number Uptime CPU Utilization Memory Utilization VSF link 1 VSF link 2

:1 : ec:eb:b8:d0:80:40 : JL666A : Aruba 6300F 24G PoE CLS 4 /4SFP56 Switch : Conductor : SL.10.02.0000-7755 : CN7ZK90012 : 0d 0h 23m : 0% : 20% : Up, connected to peer member 2, link 1 : Down

Member ID MAC Address Type Model Status ROM Version Serial Number Uptime CPU Utilization Memory Utilization VSF link 1 VSF link 2

:2 : eb:ec:d8:e0:50:60 : JL666A : Aruba 6300F 24G PoE CLS 4 /4SFP56 Switch : Standby : SL.10.02.0000-7755 : CN7ZK90012 : 0d 0h 23m : 0% : 15% : Up, connected to peer member 1, link 1 : Down

Member ID MAC Address Type Model Status ROM Version Serial Number Uptime CPU Utilization Memory Utilization VSF link 1 VSF link 2

:3 : : JL666A : Aruba 6300F 24G PoE CLS 4 /4SFP56 Switch : Not Present : : : : : : :

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3071

Platforms 6300

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsf link
show vsf link
Description
Displays the VSF link state for each member.
Example

switch# show vsf link

VSF Member 1

Link

Peer Peer

Link State

Member Link Interfaces

---- ---------- ------- ------ ---------------------------

1 up

2

1

1/1/50

2 up

10

2

1/1/49

VSF Member 2

Link

Peer Peer

Link State

Member Link Interfaces

---- ---------- ------- ------ ---------------------------

1 up

1

1

2/1/49

2 up

3

1

2/1/50

VSF Member 3

Link

Peer Peer

Link State

Member Link Interfaces

---- ---------- ------- ------ ---------------------------

1 up

2

2

3/1/25

2 up

4

1

3/1/26

VSF Member 4

Link

Peer Peer

Link State

Member Link Interfaces

---- ---------- ------- ------ ---------------------------

1 up

3

2

4/1/25

2 up

5

1

4/1/26

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.
Command History

VSF commands | 3072

Release 10.07 or earlier

Command Information

Platforms 6300

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsf link detail
show vsf link detail
Description
Shows detailed information of the interfaces configured on links of all stack members.
Example

switch# show vsf link detail

VSF Member: 1 Link 1 Description: link 1 connected to member 2

Port Type --------1/1/27

State -------up

Status Code ----------S

Peer Interface -------------2/1/27

Peer System MAC -----------------38:21:c7:5c:e4:c0

Peer Product -------------JL668A

1/1/28 error

M

1/1/27

38:21:c7:5c:d7:40 JL668A

VSF Member: 2 Link 1 Description: link 1 connected to member 1

Port Type --------2/1/27

State -------up

Status Code Peer Interface Peer System MAC

----------- -------------- ------------------

S

1/1/27

38:21:c7:5c:99:80

Peer Product -------------JL668A

2/1/28 error

T

VSF Member: 2 Link 2 Description: link 2 connected to member 3

Port Type --------2/1/25

State -------up

Status Code Peer Interface Peer System MAC

----------- -------------- ------------------

S

3/1/26

38:21:c7:5c:f0:00

Peer Product -------------JL668A

2/1/26 down

D

VSF Member: 3 Link 1 Description: link 1 in loop

Port Type

State

Status Code Peer Interface Peer System MAC

Peer Product

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3073

------- -------- ----------- -------------- ------------------ --------------

---

3/1/27 error

L

3/1/28

38:21:c7:5c:f0:00 JL668A

3/1/28 error

L

3/1/27

38:21:c7:5c:f0:00 JL668A

VSF Member: 3 Link 2

Port Type --------3/1/25

State -------down

Status Code ----------D

Peer Interface --------------

Peer System MAC ------------------

Peer Product --------------

3/1/26 up

S

2/1/25

38:21:c7:5c:e4:c0 JL668A

Flag abbreviation:

S - Success

D - Interface physically down

T - Peer timed out

L - Loop detected on the interface

AP - Peer autojoin in

progress

P - Peer with incompatible product type

ANE - Peer is not autojoin

eligible

SV - Peer with incompatible software version AF - Peer autojoin validations

failed

M - Peer with inconsistent system MAC address

ILC - Peer with inconsistent VSF link configuration

AMS - Peer autojoin failed as it has MACsec configuration

AMI - Peer with multiple VSF interfaces attempting to autojoin

ACM - Peer attempting to autojoin on non-provisioned interface

AND - Peer with non-default VSF interface attempting to autojoin

AID - Peer autojoin failed as it is connected in incorrect direction

AFN - Peer autojoin failed as there is no free member number available

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6300

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsf link error-detail
show vsf link error-detail
Description

VSF commands | 3074

Shows detailed error information of the interfaces configured on links of all stack members. Also, the corrective action is also recommended to recover from the error.
Example
Showing error information of the interfaces about the loop detection:

switch(config)# show vsf link error-detail

VSF Member: 2 Link 1

Port Status Code

: 2/1/27 : L - `Loop detected on the interface`

Error Description and

: There is a loop detected between interfaces 2/1/27 2/1/28 of member 2 indicating wrong cabling.

Suggested Corrective Action : VSF interfaces 2/1/27 and 2/1/28 are connected back to
back - please fix the cabling.

VSF Member: 2 Link 1

Port Status code

: 2/1/28 : L - `Loop detected on the interface`

Error Description and

: There is a loop detected between interfaces 2/1/28 2/1/27 of member 2 indicating wrong cabling.

Suggested Corrective Action : VSF interfaces 2/1/28 and 2/1/27 are connected back to
back - please fix the cabling.

VSF Member: 10 Link 1

Port Status Code

: 10/1/26 : AFN - `Peer autojoin failed as there is no free
member number available`

Error Description the

: Maximum stack size has been reached or there are no free provisioned member entries available matching
peer switch with product type JL667A.

Suggested Corrective Action : Remove a member using "no vsf member x" CLI and then physically disconnect and reconnect the new switch with product type JL667A for adding it into the
stack.

Showing error information when peer member is connected to VSF link via its MACsec-configured interface for autojoin:

switch(config)# show vsf link error-detail VSF Member: 2 Link 2

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3075

Port Status Code

: 2/1/26 : AMS - `Peer autojoin failed as it has MACsec
configuration`

Error Description

: Autojoin failed as interface 2/1/26 is connected to peer with MAC 38:21:c7:5c:d4:00 on interface 1/1/27 which has MACsec configuration.

Suggested Corrective Action : MACsec configuration should be removed from the peer with MAC 38:21:c7:5c:d4:00 on interface 1/1/27.

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6300

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsf link error-detail member
show vsf link error-detail member <MEMBER-ID>
Description
Shows error information and the suggestive action to resolve the error of the interfaces configured on links of a particular stack member.

Parameter <MEMBER-ID>

Description
VSF member identifier. Required. n Range for 6300 devices: 1-10.

Example
Showing error information and the suggestive action for member 1:

switch# show vsf link error-detail member 1

VSF Member: 1 Link 1

Port

: 1/1/52

VSF commands | 3076

Status Code

: M - `Peer with inconsistent system MAC address`

Error Description terminate

: All interfaces within a single VSF link must
into the same peer switch. Interface 1/1/52 of member 1 link 1 is connected to a wrong peer with MAC 38:21:c7:5c:26:40.

Suggested Corrective Action : Multiple VSF neighbors detected on this VSF link 1. Interface 1/1/52 is connected to device MAC 38:21:c7:5c:26:40. Please make sure the VSF
interfaces of link 1 terminate on the same peer device.

Showing error information and the suggestive action for member 4:

switch# show vsf link error-detail member 4

VSF Member: 4 Link 1

Port Status Code attempting

: 4/1/27 : AND - `Peer with non-default VSF interface
to autojoin`

Error Description port
interface.

: Switch with MAC 38:21:c7:5c:a0:c0 is connected on 1/1/27 which is a non default autojoin VSF

Suggested Corrective Action : Auto-join failed on device with MAC 38:21:c7:5c:a0:c0.
Please connect this device via interfaces 25 or 26 those are the auto-join capable interfaces on this device.

Showing error information when the peer member is connected to member 2's VSF link via its MACsecconfigured interface for autojoin:

switch(config)# show vsf link error-detail member 2

VSF Member: 2 Link 2

Port Status Code

: 2/1/26 : AMS - `Peer autojoin failed as it has MACsec
configuration`

Error Description

: Autojoin failed as interface 2/1/26 is connected to peer with MAC 38:21:c7:5c:d4:00 on interface 1/1/27 which has MACsec configuration.

Suggested Corrective Action : MACsec configuration should be removed from the peer with MAC 38:21:c7:5c:d4:00 on interface 1/1/27

VSF Member: 2 Link 2
Port Status Code

: 2/1/26 : AMS - `Peer autojoin failed as it has MACsec

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3077

configuration`

Error Description

: Autojoin failed as interface 2/1/26 is connected to peer with MAC 38:21:c7:5c:d4:00 on interface 1/1/27 which has MACsec configuration.

Suggested Corrective Action : MACsec configuration should be removed from the peer with MAC 38:21:c7:5c:d4:00 on interface 1/1/27

Showing output when there is no error-detail for a particular member:

switch# show vsf link error-detail member 2 No Error found in member 2

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6300

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsf member
show vsf member <MEMBER-ID>
Description
Displays information about the specified VSF member.

Parameter <MEMBER-ID>

Description
VSF member identifier. Required. n Range for 6300 devices: 1-10.

Example

switch# show vsf member 1

Member ID

:1

VSF commands | 3078

MAC Address

: ec:eb:b8:d0:80:40

Type

: JL557A

Model

: Aruba JL557A 2930F-48G-740W-PoE+-4SFP Switch

Status

: Conductor

ROM Version

: SL.10.02.0000-7755

Serial Number

: CN7ZK90012

Uptime

: 0d 0h 18m

CPU Utilization : 0%

Memory Utilization : 15%

VSF link 1

: Down

VSF link 2

: Down

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6300

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsf topology
show vsf topology
Description
Displays information about VSF stack member connections.
Example

switch# show vsf topology

Stby

Conductor

+---+ +---+ +---+

| 3 |1==2| 2 |1==1| 1 |

+---+ +---+ +---+

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3079

Release 10.07 or earlier

Command Information

Platforms 6300

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

vsf force-auto-join
vsf force-auto-join
Description
Forces the switch with non-factory default configuration to join a stack. The switch should not have any existing VSF configurations for force auto-join to work. If VSF configurations are made after force autojoin is enabled, the switch will no longer be eligible for auto-join.
Examples
Forcing a switch with non-factory default configuration to join a stack:
switch(config)# vsf force-auto-join

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6300

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsf start-auto-stacking
vsf start-auto-stacking
Description

VSF commands | 3080

Configures the secondary member and VSF links automatically. To use this command, the switch must be in the factory default configuration.
This command is applicable only on the primary switch. The primary switch must be in factory default condition and must not have any VSF configuration.
Examples
Configuring a VSF secondary member and VSF link on conductor:
switch(config)# vsf start-auto-stacking This will configure links and secondary on conductor Do you want to continue (y/n)? y
Running the configuration on non-factory default switch:
switch(config)# vsf start-auto-stacking The switch is having non-factory default running configuration. Command is not applicable
Running the configuration on non-primary switch:
switch(config)# vsf start-auto-stacking The command is applicable only on Primary switch

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms 6300

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsf split-detect
vsf split-detect <MGMT-INTERFACE> no vsf split-detect <MGMT-INTERFACE>
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3081

Configures the VSF split detection method that specifies the mechanism used for stack fragment discovery when there is a stack split.
Once the stack fragments are discovered, the fragment having the primary member always wins. All non-VSF interfaces on the losing stack fragment will be brought down to minimize network disruption due to duplicate MAC/IP.
The no form of this command removes the VSF split detection configuration.

Parameter <MGMT-INTERFACE>

Description
Configures mgmt-interface as the split detection method. Connect the management interfaces of the primary and secondary members to the same L2 network. Optionally, the management interfaces of primary and secondary can be directly connected to each other.

Examples
Configuring mgmt-interface as the split detection method:

switch(config)# vsf split-detect mgmt

Removing split detection from the stack:

switch(config)# no vsf split-detect

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6300

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsf secondary-member
vsf secondary-member <MEMBER-ID> no vsf secondary-member <MEMBER-ID>
Description
Configures a secondary member from the available members. The secondary member will normally operate as the Standby member of the stack.

VSF commands | 3082

The no form of this command removes the configuration of the secondary member. Member 1 cannot be configured as the secondary member.

Parameter <MEMBER-ID>

Description
Secondary member number. Required. n Range for 6300 devices: 2-10.

Examples
Configuring and un-configuring a secondary member:

switch(config)# vsf secondary-member 3 This will save the configuration and reboot the specified switch. Do you want to continue (y/n)? y
switch(config)# no vsf secondary-member The secondary member will go for a reboot. Do you want to continue (y/n)? y

Configuring a secondary member when secondary member is already configured:

switch(config)# vsf secondary-member 3 This will save the configuration and reboot the specified switch. Do you want to continue (y/n)? y
switch (config)# vsf secondary-member 4 A secondary member is already configured. Existing secondary member will be unconfigured and rebooted to join the stack as a member. The specified switch is then rebooted and will join the stack as the new standby. Do you want to continue (y/n)? y

Configuring a secondary member when one or more members are booting:

switch(config)# vsf secondary-member 3 One or more members are currently booting. Allowing this configuration may cause stack to split leading to traffic disruption. Do you want to continue (y/n)? y This will save the configuration and reboot the specified switch. Do you want to continue (y/n)? y
switch(config)#no vsf secondary-member One or more members are currently booting. Allowing this configuration may cause stack to split leading to traffic disruption. Do you want to continue (y/n)? y The secondary member will go for a reboot. Do you want to continue (y/n)? y

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3083

Release 10.07 or earlier

Command Information

Platforms 6300

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsf renumber-to
vsf renumber-to <MEMBER-ID>
Description
Renumbers VSF member 1 to a value from 2 through 10 (for 6300 devices) and 2 through 8 (for the 6200F device). Changing the member number causes the switch to reboot with the new member number. Only member 1 can be renumbered.
VSF links must be configured before renumbering a switch. Renumbering will be disallowed if no links are configured or there are provisioned/physically present members.

Parameter <MEMBER-ID>

Description
Member number to which the member will be renumbered. Required. n Range for 6300 devices: 2-10.

Examples
Renumbering primary VSF member from 1 to 2:

switch(config)# vsf renumber-to 2 Member 1 cannot be renumbered until all other members are removed.
switch(config)# vsf renumber-to 2 Member 1 cannot be renumbered until a VSF link is configured.
switch(config)# vsf renumber-to 2 This will save the VSF configuration and reboot the switch. Do you want to continue (y/n)? y

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.
Command History

VSF commands | 3084

Release 10.07 or earlier

Command Information

Platforms 6300

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsf member
vsf member <MEMBER-ID> no vsf member <MEMBER-ID>
Description
Creates VSF member context in the switch for the specified member. The no form of this command removes the specified member from the stack. All configuration associated with the member, as well as the subsystems and interfaces of the member will also be removed. If the member is physically present in the stack at the time it is removed, it will reboot with the default configuration and lose its identity as a member of the stack from which it was removed.
When a physically present member is removed, it may cause the stack to split.

Parameter <MEMBER-ID>

Description
VSF member identifier. n Range for 6300 devices: 1 to 10.

Examples
Configuring a VSF member:

switch(config)# vsf member 2 switch(vsf-member-2)#

Removing a non-conductor member from the stack:

switch(config)# no vsf member 2 The specified switch will be unconfigured and rebooted Do you want to continue (y/n)? y

Removing the running conductor should be done with caution as it can make the stack unusable if there is no standby.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3085

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6300

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsf member reboot
vsf member <MEMBER-ID> reboot
Description
Reboots the specified VSF member. Upon reboot, if the conductor is reachable, the member will rejoin the stack.

Parameter <MEMBER-ID>

Description
Member number to be rebooted. Required. n Range for 6300 devices: 1-10.

Examples
Rebooting the primary switch of the stack:

switch# vsf member 1 reboot Rebooting the conductor switch of the stack without a standby will make the stack unusable. Do you want to continue (y/n)? y
switch# vsf member 1 reboot The conductor switch will reboot and the standby will become the conductor. Do you want to continue (y/n)? y
switch# vsf member 2 reboot This will reboot the specified switch. Do you want to continue (y/n)? y

For more information on features that use this command, refer to the Virtual Switching Framework (VSF) Guide for your switch model.
Command History

VSF commands | 3086

Release 10.07 or earlier

Command Information

Platforms 6300

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3087

Chapter 167 VSX commands

VSX commands
VSX commands do not apply to the 6300 series switches.
active-gateway
active-gateway ip [<IP-ADDRESS>] [mac <MAC-ADDRESS> [extended-mac]] ipv6 [<IPv6-ADDRESS>] [[mac <MAC-ADDRESS> [extended-mac]] no ...
Description
Configures a virtual IP and virtual MAC for an interface VLAN. The extended-mac option stores MAC addresses in a supplemental table which allows configuring more than 16 virtual MAC addresses. The no form of this command removes the active gateway for active-active routing.
This configuration will disable flow tracking statistics collection.

Parameter ip
<IP-ADDRESS> <MAC-ADDR>
extended-mac ipv6
<IP-ADDRESS> <MAC-ADDR>
extended-mac l3-src-mac
no

Description Specifies the configuration of an IPv4 address. Specifies the IPv4 address. Syntax: A.B.C.. Specifies the Virtual MAC address. Syntax: xx:xx:xx:xx:xx:xx Stores the MAC address in the extended MAC table. Specifies the configuration of an IPv6 address. Specifies the IPv6 address. Syntax: A:B::C:D Specifies the Virtual MAC address. Syntax: xx:xx:xx:xx:xx:xx Stores the MAC address in the extended MAC table. Configures the virtual gateway MAC address as the source MAC for routed packets. Negates any configured parameter.

Usage
Before configuring active gateway, confirm that an IP address is on the SVI that is in the same subnet as the active gateway IP you are trying to configure. If an active gateway IP does not have an SVI IP with the same subnet, the CLI allows the configuration, but the active gateway IP will not be programmed in the kernel, resulting the active gateway to be unreachable.

AOS-CX 10.14 Command-Line Interface Guide

3088

It is highly recommended that you use an IPv6 link-local address as a gateway (VIP) on the active gateway IPv6 configuration. If VRRP or active forwarding is configured on an SVI, active gateway cannot be configured. Active gateway with overlapping networks is not allowed. Maximum of 16 unique virtual MACs are supported in a system. The maximum number of supported active gateways per switch is 4,000. Since a maximum of 31 secondary IPv4 addresses can be configured on an SVI, 32 IPv4 active gateways (along with the primary IPv4 address) can be configured per SVI with IP multinetting support. This support is also the same for IPv6 addresses. The extended-mac option allows you to increase the maximum number of MAC addresses supported in the system. The following are some important points to be considered for using this option:
n The extended-mac feature has some limitations over regular active gateway MACs. Therefore, it is recommended to use the regular active-gateway MACs first.
n Maximum of 500 unique instances, containing the specified active gateway IP and MAC address as a pair can be configured.
n Configuration of extended-mac can only be done on VLAN interfaces. n Extended MAC addresses cannot be one of the 16 MAC addresses in the regular active-gateway
table. n The mac-address matches will only match on the outer destination address of an overlay network
packet, making this feature useable only in underlay environments or overlay environments where the L3 gateways using the extended-mac feature are distributed across all VTEPs. n The extended-mac feature is mutually exclusive with the mac-lockout feature: o If the mac-lockout entries are configured, the extended-mac configuration will fail . o If the extended-mac entries are configured, the mac-lockout configuration will fail. o When both mac-lockout and extended-mac options are configured through REST API, the mac-
lockout configuration will take precedence and become the active feature. A log message will be displayed, explaining the conflict. o If the mac-lockout feature is configured through REST API when the extended-mac feature is active, then the extended-mac feature will be deactivated.
If the active gateway is configured with the same IP as an SVI IP, then IPv6 DAD cannot be configured and the SVI IP cannot be changed. The recommended order for configuring an active gateway with the same IPv6 address same as an SVI on both VSX Peers is:
1. IPv6 active gateway configuration 2. SVI IPv6 address configuration
If the configuration is applied in a different order, it may result in a DAD status of DUPLICATE. To remove the DUPLICATE status of the SVI IP address, perform a shutdown and no shutdown on the interface.
Do not use peer system MAC address as an active-gateway VMAC. If same MAC address is used, the VSX synchronization will try to sync the configuration on secondary switch and cause traffic disruptions.
Examples
VSX commands | 3089

Configuring active-gateway, when the IP address is different from the SVI IP address on both VSX peers (valid for IPv4 and IPv6): Switch 1:
switch1(config-if-vlan)# ip address 192.168.1.250/24 switch1(config-if-vlan)# active-gateway ip 192.168.1.253 mac 00:00:00:00:00:01 switch1(config-if-vlan)# active-gateway ipv6 fe80::01 mac 00:00:00:01:00:01
Switch 2:
switch2(config-if-vlan)# ip address 192.168.1.251/24 switch2(config-if-vlan)# active-gateway ip 192.168.1.253 mac 00:00:00:00:00:01 switch2(config-if-vlan)# active-gateway ipv6 fe80::01 mac 00:00:00:01:00:01
Configuring active-gateway when the IP address is the same as the SVI IP address on both VSX peers (valid for IPv4 and IPv6): Switch 1:
switch1(config-if-vlan)# ip address 192.168.1.250/24 switch1(config-if-vlan)# active-gateway ip 192.168.1.250 mac 00:00:00:00:00:01 switch1(config-if-vlan)# active-gateway ipv6 fe80::100 mac 00:00:00:00:00:01 switch1(config-if-vlan)# ipv6 address link-local fe80::100/64
Switch 2:
switch2(config-if-vlan)# ip address 192.168.1.250/24 switch2(config-if-vlan)# active-gateway ip 192.168.1.250 mac 00:00:00:00:00:01 switch2(config-if-vlan)# active-gateway ipv6 fe80::100 mac 00:00:00:00:00:01 switch2(config-if-vlan)# ipv6 address link-local fe80::100/64
Configuring only the active gateway address:
switch(config-if-vlan)# ip address 192.168.1.250/24 switch(config-if-vlan)# active-gateway ip 192.168.1.250
Configuring only the active gateway IP MAC address:
switch2(config-if-vlan)# ip address 192.168.1.250/24 switch2(config-if-vlan)# active-gateway ip mac 00:00:00:01:00:01
Configuring the active gateway with the extended MAC usage (IPv4 and IPv6):
switch(config-if-vlan)# active-gateway ip mac 00:00:00:00:00:01 extended-mac Warning: This configuration will disable flow tracking statistics collection. switch(config-if-vlan)# active-gateway ipv6 mac 00:00:00:00:00:02 extended-mac Warning: This configuration will disable flow tracking statistics collection. switch(config-if-vlan)# active-gateway ip 10.0.0.2 mac 00:00:00:00:00:01 extendedmac switch(config-if-vlan)# active-gateway ipv6 fe80::100 mac 00:00:00:00:00:01

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3090

extended-macc
Removing the active gateway for active-active routing (IPv6 and IPv4):
switch(config-if-vlan)# no active-gateway ip switch(config-if-vlan)# no active-gateway ipv6
Removing the active gateway for active-active routing for an IP address:
switch(config-if-vlan)# no active-gateway ip 192.168.1.250
Removing the active gateway for active-active routing for virtual MAC addresses:
switch(config-if-vlan)# no active-gateway ip mac
When configuring the virtual active gateway for IPv6 on an SVI, it is recommended to use the same global IPv6 and active gateway IPv6 address. Similarly, if you want to use the IPv6 link-local address for the virtual active gateway then the same address should be configured for both the SVI and the active gateway. Global IPv6 address:
switch(config-if-vlan)# ipv6 address 1001::1/64 switch(config-if-vlan)# active-gateway ipv6 1001::1 switch(config-if-vlan)# active-gateway ipv6 mac 00:00:00:00:aa:01
IPv6-Link-Local address:
switch(config-if-vlan)# ipv6 address link-local fe80::1/64 switch(config-if-vlan)# active-gateway ipv6 fe80::1 switch(config-if-vlan)# active-gateway ipv6 mac 00:00:00:00:aa:01
Configuring l3-src-mac, when only a IPv4 virtual MAC is configured, a IPv4 virtual MAC is used as a source MAC for IPv4 routed packets.
switch(config-if-vlan)# ip address 192.168.1.250/24 switch(config-if-vlan)# active-gateway ip 192.168.1.253 mac 00:00:00:00:00:01 switch(config-if-vlan)# active-gateway l3-src-mac
Configuring l3-src-mac, when only a IPv6 virtual MAC is configured, a IPv6 virtual MAC is used as a source MAC for IPv6 routed packets.
switch(config-if-vlan)# ip address 192.168.1.250/24 switch(config-if-vlan)# active-gateway ipv6 fe80::01 mac 00:00:00:01:00:01 switch(config-if-vlan)# active-gateway l3-src-mac
VSX commands | 3091

Configuring l3-src-mac, when both IPv4 and IPv6 virtual MACs are configured, IPv4 virtual MAC is used as source MAC for IPv4 and IPv6 routed packets. It is recommended to use the same virtual MAC when both ipv4 and ipv6 vitrual MACs are configured.
switch(config-if-vlan)# ip address 192.168.1.250/24 switch(config-if-vlan)# active-gateway ip 192.168.1.253 mac 00:00:00:00:00:01 switch(config-if-vlan)# active-gateway ipv6 fe80::01 mac 00:00:00:00:00:01 switch(config-if-vlan)# active-gateway l3-src-mac

When ipv4 and ipv6 virtual MACs are same, 8325 and 10000 switches support 512 SVIs. When ipv4 and ipv6 virtual MACs are different, 8325 and 10000 switches support 341 SVIs.

Configuration table for supported SVIs
Configuration When the l3-src-mac IPv4 is configured on SVI along with the active-gateway
When the l3-src-mac IPv4 and IPv6 are configured on SVI along with the active-gateway
When the VSX active-forwarding, VRRP and virtual-mac features are configured

Platforms 8320 8325 and 10000 8360 and 6400 8100 8320 8325 and 10000 8360 and 6400 8100 8320, 8325,8360, 8100, 6400, and 10000

Supported SVIs Up to 190 Up to 380 Up to 384 Up to 256 Up to 165 Up to 330 Up to 384 Up to 256 Goes down

Configuring l3-src-mac, when no virtual MACs are configured, the System MAC is used as source MAC for routed packets. Such configuration can generate a CLI warning as shown.

switch(config-if-vlan)# ip address 192.168.1.250/24 switch(config-if-vlan)# active-gateway l3-src-mac Warning: Active Gateway VMAC is not configured

With VSX-Sync configured, "active-gateway l3-src-mac" configuration synces to the peer device. Following configuration from vsx-primary device can get synced to vsx-secondary device.
VSX-Primary-Switch:

vsx-pri-switch(config-if-vlan)# ip address 192.168.1.250/24 vsx-pri-switch(config-if-vlan)# active-gateway ip 192.168.1.253 mac 00:00:00:00:00:01 vsx-pri-switch(config-if-vlan)# active-gateway ipv6 fe80::01 mac 00:00:00:01:00:01 vsx-pri-switch(config-if-vlan)# active-gateway l3-src-mac

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3092

For VSX-peer devices, without VSX-Sync configured, it is expected that virtual MACs and l3-src-mac configurations are identical on both devices for a given interface VLAN. If configurations don't match, each device may end up using different source MAC for routed traffic for this inteface and connectivity from connected devices to this VSX-peer devices may get affected. VSX-Primary-Switch:
vsx-pri-switch(config-if-vlan)# ip address 192.168.1.250/24 vsx-pri-switch(config-if-vlan)# active-gateway ip 192.168.1.253 mac 00:00:00:00:00:01 vsx-pri-switch(config-if-vlan)# active-gateway ipv6 fe80::01 mac 00:00:00:01:00:01 vsx-pri-switch(config-if-vlan)# active-gateway l3-src-mac

VSX-Secondary-Switch:
vsx-sec-switch(config-if-vlan)# ip address 192.168.1.250/24 vsx-sec-switch(config-if-vlan)# vsx-sec-switch(config-if-vlan)# active-gateway ip 192.168.1.253 mac 00:00:00:00:00:01 vsx-sec-switch(config-if-vlan)# active-gateway ipv6 fe80::01 mac 00:00:00:01:00:01 vsx-sec-switch(config-if-vlan)# active-gateway l3-src-mac

Configuring l2-vlan-mac-mode flood on a VLAN interface, l3-src-mac cannot be configured. Such configuration can generate an error as shown and command will not take affect.
switch(config)# system l2-vlan-mac-mode flood switch(config-if-vlan)# ip address 192.168.1.250/24 switch(config-if-vlan)# active-gateway l3-src-mac active-gateway l3-src-mac cannot be configured when l2-vlan-mac-mode flood is configured.

Configuration table for supported SVIs

Configuration When flood mode is configured
When the active-gateway IPv4 is configured on SVI along with the flood mode
When the active-gateway IPv4 and IPv6 are configured on SVI along with the flood mode
When the VSX active-forwarding, VRRP and virtual-mac features are configured

Platforms 8320 8325 and 10000 8320 8325 and 10000 8320 8325 and 10000 8320, 8325 and 10000

Supported SVIs Less than 512 Less than 1024 Up to 190 Up to 380 Up to 165 Up to 330 Goes down

When l3-src-mac option is unconfigured, System MAC uses as source MAC for routed traffic. switch(config-if-vlan)# no active-gateway l3-src-mac

VSX commands | 3093

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.14 10.12.1000
10.12

Command Information

Platforms
6300 6400

Command context config-if-vlan

Modification Added information related to role based IPFIX. Added the extended-mac feature support for 6400v2, 8100, and 8360v2 switches. The l3-src-mac parameter supported for 6400, 8100, and 8360 switches.
Authority Administrators or local user group members with execution rights for this command.

config-sync disable
config-sync disable no config-sync disable
Description
Pauses VSX synchronization. The no form of this command restarts VSX synchronization.
Examples
Pauses VSX configuration synchronization:
switch(config)# vsx switch(config-vsx)# config-sync disable
Enables the VSX configuration synchronization:
switch(config)# vsx switch(config-vsx)# no config-sync disable

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3094

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

inter-switch-link {<PORT-NUM> | lag <LAG-ID>}
inter-switch-link {<PORT-NUM> | lag <LAG-ID>} no inter-switch-link [lag <LAG-ID>]
Description
Configures a physical port or a LAG as an interswitch link port. Only one port or LAG can be configured to act as an ISL. Once a port is configured as an ISL, it becomes a part of all VLANs in a system. The no form of this command clears the configuration of the interswitch link port from a physical port or a LAG.

Parameter <PORT-NUM>
<LAG-ID>

Description
Specifies a physical port on the switch. Use the format member/slot/port (for example, 1/3/1). Sets the port to act as ISL
Specifies the LAG ID. Run the show capacities command for the maximum number of VSX LAGs supported for your particular type of switch.

Examples
Configuring port 1/1/1 as an interswitch link port:

switch(config-vsx)# inter-switch-link 1/1/1

Configuring LAG 100 as an interswitch link port:

switch(config-vsx)# inter-switch-link lag 100

Clears the interswitch link port:

switch(config-vsx)# no inter-switch-link

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

VSX commands | 3095

Command History
Release 10.08 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification Added optional lag parameter to the no form of the command. --
Authority Administrators or local user group members with execution rights for this command.

inter-switch-link dead-interval
inter-switch-link dead-interval <DEAD-INTERVAL> no inter-switch-link dead-interval
Description
Sets the dead interval for the interswitch link protocol. The dead interval is the amount of time to wait for hellos from a peer before declaring the peer to be dead. The default dead interval time is 20 seconds. The no form of this command resets the interswitch link dead interval to the default of 20 seconds.

Parameter <DEAD-INTERVAL>

Description
Specifies the dead interval in seconds. Required. Range: 2 to 20 seconds.

Examples
Setting the dead interval for the interswitch link protocol to 10 seconds:

switch(config)# vsx switch(config-vsx)# inter-switch-link dead-interval 10

Setting the dead interval for the interswitch link protocol to the default:

switch(config)# vsx switch(config-vsx)# no vsx inter-switch-link dead-interval

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3096

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

inter-switch-link hello-interval
inter-switch-link hello-interval <HELLO-INTERVAL> no inter-switch-link hello-interval
Description
Configures the interswitch link hello-interval. The hello interval determines the frequency of a hello packet exchange to confirm the control plane of the peer is alive. The default hello-interval is 1 second. The no form of this command sets the interswitch link hello-interval to the default of 1 second.

Parameter <HELLO-INTERVAL>

Description Specifies hello interval in seconds. Range: 1 to 5 seconds.

Examples
Configuring the interswitch link hello-interval to 3 seconds:

switch(config)# vsx switch(config-vsx)# inter-switch-link hello-interval 3

Resetting the interswitch link hello-interval to the default of 1 second:

switch(config)# vsx switch(config-vsx)# no inter-switch-link hello-interval

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

VSX commands | 3097

Platforms 6400

Command context config-vsx

Authority
Administrators or local user group members with execution rights for this command.

inter-switch-link hold-time
inter-switch-link hold-time <HOLD-INTERVAL> no inter-switch-link hold-time
Description
Sets the holdtime for the interswitch link protocol. A port is treated as down only when it stays down for the configured holdtime interval. The default holdtime is 0 seconds. The no form of this command sets the interswitch link protocol holdtime to the default of 0 seconds.

Parameter <HOLD-INTERVAL>

Description
Specifies the hold interval in seconds. Required. Range: 0 to 3 seconds.

Examples
Setting the holdtime for interswitch link protocol to 2 seconds:

switch(config)# vsx switch(config-vsx)# inter-switch-link hold-time 2

Setting the interswitch link protocol holdtime to the default of 0 seconds:

switch(config)# vsx switch(config-vsx)# no inter-switch-link hold-time

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3098

inter-switch-link peer-detect-interval
inter-switch-link peer-detect-interval <PEER-DETECT-INTERVAL> no inter-switch-link peer-detect-interval
Description
Sets the amount of time in seconds that the VSX switch waits for the ISL interface to link up after a reboot. If the ISL link does not come up within this time window, the VSX switch declares itself as split from its peer. The default peer detect interval is 300 seconds. The no form of this command sets the interswitch link protocol peer detect interval to the default of 300 seconds.

Parameter <PEER-DETECT-INTERVAL>

Description
Specifies the peer detect interval in seconds. Required. Range: 60 to 1800 seconds.

Usage
After a VSX switch reboots, the switch waits 5 minutes by default to receive a hello packet before it declares itself to be out-of-sync. The inter-switch-link peer-detect-interval <PEER-DETECTINTERVAL> command lets you change how long the switch waits to receive the hello packet before the switch declares itself to be out-of-sync.
Examples
Setting the peer detect interval to 180 seconds:

switch(config)# vsx switch(config-vsx)# inter-switch-link peer-detect-interval 180

Restoring the peer detect interval to the default (300 seconds):

switch(config)# vsx switch(config-vsx)# no inter-switch-link peer-detect-interval

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

VSX commands | 3099

Platforms 6400

Command context config-vsx

Authority
Administrators or local user group members with execution rights for this command.

interface lag multi-chassis
interface lag <LAG-ID> multi-chassis [static] no interface lag <LAG-ID>
Description
Configures a given LAG as a dynamic multichassis LAG (VSX LAG), which supports a maximum of four member links per switch segment. A VSX LAG across a downstream switch can have at most a total of 16 member links. The no form of this command removes a VSX LAG.

Parameter <LAG-ID>
static

Description
Specifies the LAG ID. Run the show capacities vsx command for the maximum number of VSX LAGs supported for your particular type of switch; however, the maximum VSX LAG value considers that one port is used for the ISL, which is not a VSX LAG. Required.
Specifies the multichassis LAG as static. Optional.

Usage
A VSX LAG across a VSX pair can have at most a total of 16 interfaces.

n When creating a VSX LAG, select an equal number of member links in each segment for load balancing, such as four member links (one segment) and four member links (another segment). Do not create a VSX LAG with four member links in one switch and two member links on another segment. A switch can have a maximum of four member links.
n Make sure that the VSX LAG interface on both the VSX primary and secondary switches has a member port configured and enabled.
n Make sure that you also have a non-VSX port that is available for the ISL. n It is recommended to use hashing algorithm value as l3-src-dst (default) or l2-src-dst on the VSX LAG.

You cannot change the mode of a multichassis LAG without removing the multichassis LAG first. To change a pre-existing VSX LAG to a static VSX LAG, first remove the VSX LAG with the no interface lag <LAG-ID> command. Then, enter the interface lag <LAG-ID> multi-chassis static command.
Examples
Configuring LAG 100 as a VSX LAG:
switch(config)# interface lag 100 multi-chassis
Removing LAG 100 as a VSX LAG:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3100

switch(config)# no interface lag 100 Specifying LAG 100 as a static VSX LAG:
switch(config)# interface lag 100 multi-chassis static

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

ip icmp redirect
ip icmp redirect no ip icmp redirect
Description
Enables the sending of ICMPv4 and ICMPv6 redirect messages to the source host. Enabled by default. The no form of this command disables ICMPv4 and ICMPv6 redirect messages to the source host.
Examples
Enabling ICMP redirect messages:
switch(config)# ip icmp redirect
Disabling ICMP redirect messages:
switch(config)# no ip icmp redirect

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.
Command History

VSX commands | 3101

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

keepalive dead-interval
keepalive dead-interval <DEAD-INTERVAL> no keepalive dead-interval
Description
Sets the dead-interval for keepalive protocol. The dead interval is the amount of time to wait for hellos from a peer before declaring the peer to be dead. The default dead-interval is 3 seconds. The no form of this command sets the interswitch link dead-interval to the default of 3 seconds.

Parameter dead-interval <DEAD-INTERVAL>

Description Specifies the dead-interval in seconds. Range: 2 to 20 seconds

Examples
Setting the dead-interval for keepalive protocol to 10 seconds:

switch(config)# vsx switch(config-vsx)# keepalive dead-interval 10

Setting the dead-interval for keepalive protocol to the default:

switch(config)# vsx switch(config-vsx)# no keepalive dead-interval

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3102

Platforms 6400

Command context config-vsx

Authority
Administrators or local user group members with execution rights for this command.

keepalive hello-interval
keepalive hello-interval <HELLO-INTERVAL> no keepalive hello-interval
Description
Sets the hello-interval for keepalive protocol. The hello interval determines the frequency of a hello packet exchange to confirm the peer is alive. The default hello-interval is 1 second. The no form of this command sets the hello-interval for keepalive protocol to the default of 1 second.

Parameter hello-interval <HELLO-INTERVAL>

Description Specifies the hello-interval in seconds. Range: 1 to 5 seconds

Examples
Setting the hello-interval for keepalive protocol to 3 seconds:

switch(config)# vsx switch(config-vsx)# keepalive hello-interval 3

Resetting the hello-interval for keepalive protocol to the default:

switch(config)# vsx switch(config-vsx)# no keepalive hello-interval

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

VSX commands | 3103

keepalive peer
keepalive peer <PEER-IP-ADDR> source <SOURCE-IP-ADDR> [vrf <VRF-NAME>] no keepalive [peer <PEER-IP-ADDR> source <SOURCE-IP-ADDR> [vrf <VRF-NAME>]]
Description
Sets the source and peer IP addresses for keepalive packets in a specified VRF. If a VRF is not specified, it sets to the default VRF. Both IPv4 and IPv6 are supported. Source and peer IP addresses for keepalive packets can also be configured on the management VRF. The no form of this command removes the source and peer IP addresses and VRF for the keepalive protocol. VSX continues to work.

Parameter peer <PEER-IP-ADDR> source <IP-ADDR>
vrf <VRF-NAME>

Description
Specifies the peer IPv4 or IPv6 address. Syntax: A.B.C.D
Specifies the source IPv4 or IPv6 address. The source IP address is the IP address assigned to the keepalive interface on the switch. For example, if you are entering this command on the primary switch, the source IP address would be the IP address assigned to the keepalive interface on the primary switch. Syntax: A.B.C.D
Specifies the VRF name. If you are entering this command on the primary switch, the peer IP address is the IP address assigned to the keepalive interface for the secondary switch. If you are entering this command on the secondary switch, the peer IP address is the IP address assigned to the keepalive interface for the primary switch. Syntax: String

Usage
To configure the keepalive feature, enter this command once on the primary switch and once on the secondary switch. The keepalive feature is recommended for redundancy. If the ISL link goes down, the keepalive connection keeps the traffic moving so that the peer and secondary switches can continue to communicate. The keepalive connection is established over a routed network, and it does not have to be a dedicated peer-to-peer link unlike ISL.
Examples
Setting the source and peer IP addresses for keepalive in the default VRF:

switch(config)# vsx switch(config-vsx)# keepalive peer 192.168.1.1 source 192.168.1.5

Setting the source and peer IPv6 addresses for keepalive in the default VRF:

switch(config)# vsx switch(config-vsx)# keepalive peer 2002:2 source 2002::3

Setting the source and peer IP addresses for keepalive in the vrf1:

switch(config)# vsx switch(config-vsx)# keepalive peer 10.0.0.1 source 10.0.0.2 vrf vrf1

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3104

Setting the source and peer IP addresses for keepalive in the managament VRF:
switch(config)# vsx switch(config-vsx)# keepalive peer 10.0.0.1 source 10.0.0.2 vrf mgmt
Removing the source and peer IP addresses and VRF for the keepalive protocol:
switch(config)# vsx switch(config-vsx)# no keepalive

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.08 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification Added optional parameters to the no form of the command. --
Authority Administrators or local user group members with execution rights for this command.

keepalive udp-port
keepalive udp-port <PORT-NUM> no keepalive udp-port
Description
Sets the UDP port for the keepalive protocol. The no form of this command sets the UDP port for keepalive protocol to the default of 7678.

Parameter udp-port <PORT-NUM>

Description Specifies UDP port number. Range: 1024-65535

Examples
Setting the UDP port for keepalive protocol to 2000:

switch(config)# vsx switch(config-vsx)# keepalive udp-port 2000

Setting the UDP port for keepalive protocol to the default of 7678:

VSX commands | 3105

switch(config)# vsx switch(config-vsx)# no keepalive udp-port

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

lacp fallback
lacp fallback no lacp fallback
Description
Sets LACP fallback on a VSX LAG port. When no LACP partner is detected, the VSX LAG port makes members of the VSX LAG function as nonbonded interfaces. To create a VSX LAG, use the interface lag multi-chassis command. The no form of this command sets the VSX LAG to a block state when no LACP partner is detected.
Usage
LACP fallback is supported only when there is a single link from the downstream or peer device to each VSX node.
Even though this command appears to be accepted on a standard/non-VSX LAG, the fallback feature works only on a VSX LAG (multichassis LAG) interface.

Examples
Enabling LACP fallback:
switch(config)# interface lag 1 switch(config-lag-if)# lacp fallback
Disables LACP fallback:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3106

switch(config)# interface lag 1 switch(config-lag-if)# no lacp fallback

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-lag-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

linkup-delay-timer
linkup-delay-timer <DELAY-TIMER> no linkup-delay-timer [<DELAY-TIMER>]
Description
Configures the VSX link-up delay timer. The VSX delay timer feature lets you configure the delay timer, which delays bringing downstream VSX links up, following a VSX device reboot or an ISL flap. The no form of this command restores the VSX link-up delay timer to a default of 180 seconds.

Parameter <DELAY-TIMER>

Description
Specifies the VSX LAG bring-up delay in seconds. Range: 0 to 600 seconds

Usage
The recommended delay timer setting is determined by the number of MAC addresses, ARPv4, and routes. The link-up delay timer might need to be set to a higher value for larger networks, depending on the ARP and routing table size.
Examples
Setting the VSX link-up delay timer to 35 seconds:

switch(config)# vsx switch(config-vsx)# linkup-delay-timer 35

Setting the VSX link-up delay timer to the default:

VSX commands | 3107

switch(config)# vsx switch(config-vsx)# no linkup-delay-timer

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.08

10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification Added optional <DELAY-TIMER> parameter to the no form of the command. --
Authority Administrators or local user group members with execution rights for this command.

linkup-delay-timer exclude lag-list
linkup-delay-timer exclude lag-list <LAG-LIST> no linkup-delay-timer exclude lag-list <LAG-LIST>
Description
Configures the VSX link-up delay timer exclude list. It excludes the bringing up of specified downstream VSX LAGs, following a device reboot or an ISL flap. The no form of this command unconfigures the VSX link-up delay timer exclude list.

Parameter <LAG-LIST>

Description
Specifies a range or a set of LAG interfaces to exclude. For example: 1 or 1-10 or 1,2,3 or 1,2-10. Range: 1-128 characters.

Examples
Specifying LAGs to exclude LAG 100:

switch(config)# vsx switch(config-vsx)# linkup-delay-timer exclude lag-list 100

Unconfiguring the VSX link-up delay timer exclude list for LAG 100:

switch(config)# vsx switch(config-vsx)# no linkup-delay-timer exclude lag-list 100

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3108

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

neighbor <IP-ADDRESS> vsx-sync-exclude
neighbor <IP-ADDRESS> vsx-sync-exclude
Description
Excludes VSX sync for the BGP neighbor.
Examples
Excluding VSX sync for the BGP neighbor:
switch(config-bgp)# neighbor 1.1.1.1 vsx-sync-exclude

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-bgp

Modification --
Authority Administrators or local user group members with execution rights for this command.

role {primary | secondary}
role {primary | secondary}

VSX commands | 3109

no role
Description
Configures the VSX device role. The no form of this command removes the device role of the switch in VSX and causes the interswitch link to be out-of-sync.

Parameter {primary | secondary}

Description Selects the VSX role to either primary or secondary for the device.

Usage
VSX has no default role defined for the device. The device role assigns the device as the primary or secondary for VSX synchronization. For ISL to be in-sync, one device in VSX must be configured as the primary and the other device must be configured as the secondary.
Examples
Setting the VSX role to primary:

switch(config)# vsx switch(config-vsx)# role primary

Removing the device role:

switch(config)# vsx switch(config-vsx)# no role

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

show active-gateway
show active-gateway [vsx-peer]
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3110

Displays the gateway information configured on SVIs, such as:
n Number of active-gateway interface VLANs n Number of IPv4 active-gateway interface VLANs n Number of IPv6 active-gateway interface VLANs n Per virtual MAC address
o IPv4 reference count and its interface VLANs o IPv6 reference count and its interface VLANs

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

primary# show active-gateway

Number of active-gateway interface VLANs

Number of IPv4 active-gateway interface VLANs

Number of IPv6 active-gateway interface VLANs

VMAC 00:00:00:01:01:16 :

IPv4 ref count

: 32

IPv4 interface VLANs : vlan192-223

IPv6 ref count

:0

IPv6 interface VLANs : none

VMAC 00:00:00:01:01:11 :

IPv4 ref count

: 32

IPv4 interface VLANs : vlan32-63

IPv6 ref count

:0

IPv6 interface VLANs : none

VMAC 00:00:00:01:01:17 :

IPv4 ref count

: 32

IPv4 interface VLANs : vlan224-255

IPv6 ref count

:0

IPv6 interface VLANs : none

VMAC 00:00:00:01:01:18 :

IPv4 ref count

:6

IPv4 interface VLANs : vlan256-259,300-301

IPv6 ref count

:0

IPv6 interface VLANs : none

VMAC 00:00:00:01:01:13 :

IPv4 ref count

: 32

IPv4 interface VLANs : vlan96-127

IPv6 ref count

:0

IPv6 interface VLANs : none

VMAC 00:00:00:01:01:12 :

IPv4 ref count

: 32

IPv4 interface VLANs : vlan64-95

IPv6 ref count

:0

IPv6 interface VLANs : none

VMAC 00:00:00:01:01:20 :

IPv4 ref count

:1

IPv4 interface VLANs : vlan4040

IPv6 ref count

:0

IPv6 interface VLANs : none

VMAC 00:00:00:01:01:14 :

: 265 : 264 :1

VSX commands | 3111

IPv4 ref count IPv4 interface VLANs IPv6 ref count IPv6 interface VLANs VMAC 00:00:00:01:01:10 : IPv4 ref count IPv4 interface VLANs IPv6 ref count IPv6 interface VLANs VMAC 00:00:00:01:01:15 : IPv4 ref count IPv4 interface VLANs IPv6 ref count IPv6 interface VLANs VMAC 00:00:00:03:00:12 : IPv4 ref count IPv4 interface VLANs IPv6 ref count IPv6 interface VLANs VMAC 00:00:00:01:01:19 : IPv4 ref count IPv4 interface VLANs IPv6 ref count IPv6 interface VLANs

: 32 : vlan128-159 :0 : none
: 31 : vlan1-31 :0 : none
: 32 : vlan160-191 :0 : none
:1 : vlan2000 :1 : vlan4000
:1 : vlan4000 :0 : none

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show active-gateway <IFNAME>
show active-gateway <IFNAME> [vsx-peer]
Description
Displays the gateway information per SVI, such as:
n Active-Gateway IPV4 and its MAC address n Active-Gateway IPV6 and its MAC address

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3112

Parameter <IFNAME> vsx-peer

Description
Specifies the VSX interface name.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

switch# show active-gateway vlan2000 Active-gateway IPv4 MAC address Active-gateway IPv4 address
173.6.1.10 173.7.1.10 Active-gateway IPv6 MAC address Active-gateway IPv6 address
173::2 173::3

: 00:00:00:01:01:18 : 00:00:00:03:00:12

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show interface <VLAN-NAME>
show interface <VLAN-NAME> [vsx-peer]
Description
Displays a virtual IPv4/IPv6 and MAC configured for active-active routing.

Parameter <VLAN-NAME> vsx-peer

Description Specifies the VLAN name. Syntax: string Shows the output from the VSX peer switch. If the switches do not

VSX commands | 3113

Parameter

Description
have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

switch# show interface vlan100

Interface vlan100 is up Admin state is up Hardware: Ethernet, MAC Address: 48:0f:cf:af:c1:9e IPv4 address 192.168.1.1/24 IPv4 address 192.168.2.1/24 secondary active-gateway ip mac 00:00:00:00:00:01 active-gateway ip 192.168.1.1 active-gateway ip 192.168.2.2 active-gateway ipv6 mac 00:00:00:00:00:01 active-gateway ipv6 fe80::1

Statistics

RX

TX

Total

------------- -------------------- -------------------- --------------------

L3 Packets

8

2

10

L3 Bytes

812

80

892

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show lacp aggregates
show lacp aggregates [<LAG-NAME>] [vsx-peer]
Description
Displays a specified LAG or all configured LAGs along with VSX LAGs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3114

Parameter <LAG-NAME> vsx-peer

Description
Specifies the LAG name. Optional. Syntax: string
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Displaying all configured LAGs along with VSX LAGs:

switch# show lacp aggregates

Aggregate name Interfaces Peer interfaces Heartbeat rate Hash Aggregate mode

: lag100 (multi-chassis) : 1/1/44 : 1/1/44 : Slow : l3-src-dst : Active

Displaying a specified LAG:

switch# show lacp aggregates lag100

Aggregate name Interfaces Peer interfaces Heartbeat rate Hash Aggregate mode

: lag100 (multi-chassis) : 1/1/44 : 1/1/44 : Slow : l3-src-dst : Active

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show lacp interfaces
show lacp interfaces [<IFNAME>] [vsx-peer]

VSX commands | 3115

Description
Displays an LACP configuration of the physical interfaces, including VSXs. If an interface name is passed as argument, it only displays an LACP configuration of a specified interface.

Parameter <IFNAME> vsx-peer

Description
Optional: Specifies an interface name.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
This example displays an LACP configuration of the physical interfaces. One of the interfaces has the lacp-block forwarding state. If a VSX switch has loop protect enabled on an interface and a loop occurs, VSX blocks the interface to stop the loop. The forwarding state of the blocked interface is set to lacpblock.

switch# show lacp interfaces

State abbreviations :

A - Active

P - Passive

F - Aggregable I - Individual

S - Short-timeout L - Long-timeout N - InSync

O - OutofSync

C - Collecting D - Distributing

X - State m/c expired

E - Default neighbor state

Actor details of all interfaces:

----------------------------------------------------------------------------------

--

Intf Aggr Port Port State System-id

System Aggr Forwarding

name id

Pri

Pri

Key State

----------------------------------------------------------------------------------

--

1/1/1 lag10 17

1

ALFOE 70:72:cf:37:a3:5c 20

10 lacp-block

1/1/2 lag128 69

1

ALFNCD 70:72:cf:37:a3:5c 20

128 up

1/1/3 lag128 14

1

ALFNCD 70:72:cf:37:a3:5c 20

128 up

1/1/4 lag128

down

1/1/5 lag20

up

Partner details of all interfaces:

------------------------------------------------------------------------------

Intf Aggr Partner Port

State

System-id

System Aggr

name Port-id Pri

Priority Key

------------------------------------------------------------------------------

1/1/1 lag10 0

65534 PLFOEX 00:00:00:00:00:00 65534 0

1/1/2 lag128 69

1

PLFNCD 70:72:cf:8c:60:a7 65534 128

1/1/3 lag128 14

1

PLFNCD 70:72:cf:8c:60:a7 65534 128

1/1/4 lag128

1/1/5 lag20

Displaying static LAG:

switch# show lacp interfaces

State abbreviations :

A - Active

P - Passive

F - Aggregable I - Individual

S - Short-timeout L - Long-timeout N - InSync

O - OutofSync

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3116

C - Collecting D - Distributing

X - State m/c expired

E - Default neighbor state

Actor details of all interfaces:

------------------------------------------------------------------------------

Intf Aggr Port Port State System-id

System Aggr Forwarding

Name Id

Pri

Pri

Key State

------------------------------------------------------------------------------

1/1/1 lag10

up

1/1/2 lag10

up

Partner details of all interfaces:

------------------------------------------------------------------------------

Intf Aggr Port Port State System-id

System Aggr

Name Id

Pri

Pri

Key

------------------------------------------------------------------------------

1/1/1 lag10

1/1/2 lag10

Displaying an LACP configuration of the 1/1/1 interface:

switch# show lacp interfaces 1/1/1

State abbreviations :

A - Active

P - Passive

F - Aggregable I - Individual

S - Short-timeout L - Long-timeout N - InSync

O - OutofSync

C - Collecting D - Distributing

X - State m/c expired

E - Default neighbor state

Aggregate-name : lag1

-------------------------------------------------

Actor

Partner

-------------------------------------------------

Port-id

| 28

| 31

Port-priority

|1

|1

Key

|1

|1

State

| ALFNCD

| ALFNCD

System-id

| 98:f2:b3:68:40:a0 | 98:f2:b3:68:60:a6

System-priority | 65534

| 65534

Displaying an LACP configuration after loop-protect is enabled on the primary VSX switch:

switch# show lacp interfaces

State abbreviations :

A - Active

P - Passive

F - Aggregable I - Individual

S - Short-timeout L - Long-timeout N - InSync

O - OutofSync

C - Collecting D - Distributing

X - State m/c expired

E - Default neighbor state

Actor details of all interfaces:

------------------------------------------------------------------------------

Intf Aggr

Port Port State System-ID

System Aggr Forwarding

Name

Id Pri

Pri Key State

------------------------------------------------------------------------------

1/4/14 lag1(mc) 206 1

ALFNCD f8:60:f0:06:49:00 65534 1 up

1/5/15 lag2(mc)

down

VSX commands | 3117

Partner details of all interfaces:

------------------------------------------------------------------------------

Intf Aggr

Port Port State System-ID

System Aggr

Name

Id Pri

Pri Key

------------------------------------------------------------------------------

1/4/14 lag1(mc) 130 1

ALFNCD f8:60:f0:06:87:00 65534 1

1/5/15 lag2(mc)

Displaying an LACP configuration after loop-protect is enabled on the secondary VSX switch:

switch# show lacp interfaces

State abbreviations :

A - Active

P - Passive

F - Aggregable I - Individual

S - Short-timeout L - Long-timeout N - InSync

O - OutofSync

C - Collecting D - Distributing

X - State m/c expired

E - Default neighbor state

Actor details of all interfaces:

------------------------------------------------------------------------------

Intf Aggr

Port Port State System-ID

System Aggr Forwarding

Name

Id Pri

Pri Key State

------------------------------------------------------------------------------

1/3/2 lag1(mc) 1130 1

ALFNCD f8:60:f0:06:49:00 65534 1 up

1/9/3 lag2(mc)

down

Partner details of all interfaces:

------------------------------------------------------------------------------

Intf Aggr

Port Port State System-ID

System Aggr

Name

Id Pri

Pri Key

------------------------------------------------------------------------------

1/3/2 lag1(mc) 131 1

ALFNCD f8:60:f0:06:87:00 65534 1

1/9/3 lag2(mc)

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show lacp interfaces multi-chassis

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3118

show lacp interfaces multi-chassis [<IFNAME>] [vsx-peer]
Description
Shows all configured VSX remote interface details. The interface that has the ALFNCD status has been synced with the partner and is ready for flow distribution.

Parameter <IFNAME> vsx-peer

Description
Specifies the VSX interface name. Optional.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples

switch# show lacp interfaces multi-chassis

State abbreviations :

A - Active

P - Passive

F - Aggregable I - Individual

S - Short-timeout L - Long-timeout N - InSync

O - OutofSync

C - Collecting D - Distributing

X - State m/c expired

E - Default neighbor state

Actor details of all interfaces:

------------------------------------------------------------------------------

Intf Aggregate Port Port

State System-ID

System Aggr

name

id

Priority

Priority Key

------------------------------------------------------------------------------

1/1/2 lag100(mc) 2

1

ALFNCD 08:00:09:13:06:7c 65534 100

Partner details of all interfaces:

------------------------------------------------------------------------------

Intf Aggregate Partner Port

State System-ID

System Aggr

name

Port-id Priority

Priority Key

------------------------------------------------------------------------------

1/1/2 lag100(mc) 2

1

ALFNCD 08:00:09:05:24:f6 65534 10

Remote Actor details of all interfaces:

------------------------------------------------------------------------------

Intf Aggregate Port Port

State System-ID

System Aggr

name

id

Priority

Priority Key

------------------------------------------------------------------------------

1/1/2 lag100(mc) 1002 1

ALFNCD 08:00:09:13:06:7c 65534 100

Remote Partner details of all interfaces:

------------------------------------------------------------------------------

Intf Aggregate Partner Port

State System-ID

System Aggr

name

Port-id Priority

Priority Key

------------------------------------------------------------------------------

1/1/2 lag100(mc) 3

1

ALFNCD 08:00:09:05:24:f6 65534 10

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

VSX commands | 3119

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config interface
show running-config interface
Description
Displays all configured interface commands, including VSX commands.
Example
switch# show running-config interface interface lag 100 multi-chassis
no shutdown no routing lacp mode active interface 1/1/1 no shutdown no routing interface 1/1/2 no shutdown lag 100 interface 1/1/3 no shutdown ip address 192.168.1.2/24 interface vlan100 no shutdown ip address 192.168.1.1/24 active-gateway ip 192.168.1.253 mac 00:00:00:00:00:01 active-gateway ipv6 fe80::01 mac 00:00:00:01:00:01

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3120

Platforms 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config vsx
show running-config vsx
Description
Displays the configured VSX commands.
Example
switch# show running-config vsx vsx
system-mac 10:00:00:00:00:01 inter-switch-link hello-interval 2 inter-switch-link dead-interval 3 inter-switch-link hold-time 3 inter-switch-link peer-detect-interval 300 role primary keepalive udp-port 1500 keepalive hello-interval 2 keepalive dead-interval 4 keepalive peer 192.168.1.1 source 192.168.1.2 inter-switch-link 1/1/43 interface lag 100 multi-chassis no shutdown no routing vlan access 1 lacp mode active interface 1/1/44 no shutdown lag 100 interface vlan2 ip address 10.0.0.2/24 vsx-sync active-gateways active-gateway ip mac 00:aa:bb:dd:ee:ff active-gateway ip 10.0.0.1 ipv6 address 2000:0:0:1::1/64 ipv6 address 3000:0:0:1::1/64 active-gateway ipv6 mac 00:aa:aa:aa:aa:ab active-gateway ipv6 2000:0:0:1::3 active-gateway ipv6 3000:0:0:1::3 interface vlan3 ipv6 address link-local fe80::100/64 active-gateway ip mac 00:aa:bb:dd:ee:ff active-gateway ip 10.0.0.1 active-gateway ipv6 mac 00:aa:aa:aa:aa:ab active-gateway ipv6 fe80::100 interface vlan4 active-gateway ip mac 00:aa:bb:dd:ee:ff active-gateway ip 10.0.0.1 interface vlan5 vsx active-forwarding

VSX commands | 3121

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.09.0010
10.07 or earlier

Modification
Command will now display results for configurations where the active gateway and SVI share the same IPv6 address.
--

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config vsx-sync
show running-config vsx-sync
Description
Displays the lines of running-configuration that VSX configuration synchronization is enabled on. The command also provides a rolled-up view of configuration expected to be synced. This command can be run from the primary or secondary peer.
Example
Displaying the running configuration on which VSX synchronization is enabled:
switch# show running-config vsx-sync Current vsx-sync configuration: vlan 3
vsx-sync access-list ip test1
vsx-sync ! policy test2 vsx-sync !

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3122

Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show running-config vsx-sync peer-diff
show running-config vsx-sync peer-diff
Description
Displays the difference between the configuration of features enabled for VSX synchronization on the primary and secondary switches.
Usage
Use this command for diagnosing errors. This command provides visibility into which configuration lines did not synchronize from the primary peer to the secondary peer. This command can be run from the primary or secondary peer. The output is displayed in the GNU diff unified format.
Example
Displaying the running configuration on which VSX synchronization is enabled:
switch# show running-config vsx-sync peer-diff --- /tmp/running-config-vsx.83e 2018-05-01 17:03:38.083281976 +0000 +++ /tmp/peer-running-config-vsx.83e 2018-05-01 17:03:38.077281976 +0000 @@ -1,4 +0,0 @@ -access-list ip sync - vsx-sync -! - 10 permit any any any

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

VSX commands | 3123

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show system l2-vlan-mac-mode
show system l2-vlan-mac-mode
Description
This command displays the L2 VLAN MAC Mode configuration and status.

Parameter

Description

Examples
Following example shows L2 VLAN MAC Mode configuration.

switch# show system l2-vlan-mac-mode Configured L2 VLAN MAC mode: flood Operational L2 VLAN MAC mode: flood

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release

Modification

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsx active-forwarding
show vsx active-forwarding [interface <INTERFACE-VLAN>] [vsx-peer]
Description
Shows all the VSX active-forwarding configured interface VLANs or the VSX active-forwarding peer information for a particular interface VLAN.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3124

Parameter interface <INTERFACE-VLAN> vsx-peer

Description
Specifies the interface VLAN name. Syntax: string
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Displaying a list of VSX active-forwarding enabled interfaces:

switch# show vsx active-forwarding List of VSX active-forwarding enabled interfaces: vlan30 vlan32 vlan33

Displaying the VSX active-forwarding peer information for vlan30:

switch# show vsx active-forwarding interface vlan30 Interface vlan30 has VSX active-forwarding enabled. Interface vlan30 Peer Data: Peer MAC: 94:f1:28:21:22:00 Peer IPv6 Addresses:
fe80::96f1:28ff:fe21:2200

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsx brief
show vsx brief [vsx-peer]
Description
Displays the brief VSX status.

VSX commands | 3125

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Usage
The show vsx brief command displays the ISLP device protocol states under the "Device State" heading.

Table 1: ISLP device protocol states

Device state

Definition

PeerEstablished

The VSX switch is in a steady state. VSX LAGs are up.

Sync-Primary ISL connectivity to the peer VSX switch is restored, and the VSX switch is syncing states to the peer VSX switch. VSX LAGs are up.

SyncSecondary

ISL connectivity to the peer VSX switch is restored, and the VSX switch is learning states from the peer VSX switch. VSX LAGs are down.

SyncSecondaryLinkup-Delay

The VSX switch has learned its states from the peer VSX switch, and the VSX switch is monitoring for hardware to be programmed. VSX LAGs are down.

Split-SystemPrimary

The VSX switch has lost ISL connectivity to the peer VSX switch. The VSX switch is operating as the primary VSX switch. VSX LAGs are up.

Split-SystemSecondary

The VSX switch has lost ISL connectivity to the peer VSX switch. The VSX switch is operating as the secondary VSX switch. VSX LAGs are down.

Waiting-ForPeer

The VSX switch is waiting for connectivity to the peer VSX switch.

Example
Displaying the brief VSX status for the switch you are logged into:

vsx-primary# show vsx brief

ISL State

: In-Sync

Device State

: Peer-Established

Keepalive State

: Keepalive-Established

Device Role

: primary

Number of Multi-chassis LAG interfaces : 2

Displaying the brief VSX status for the peer (secondary) switch while entering the command on the primary switch:

vsx-primary# show vsx brief vsx-peer ISL State Device State Keepalive State

: In-Sync : Peer-Established : Keepalive-Established

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3126

Device Role

: secondary

Number of Multi-chassis LAG interfaces : 2

Displaying the brief VSX status for the peer (primary) switch while entering the command on the secondary switch:

vsx-secondary# show vsx brief vsx-peer

ISL State

: In-Sync

Device State

: Peer-Established

Keepalive State

: Keepalive-Established

Device Role

: primary

Number of Multi-chassis LAG interfaces : 2

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsx config-consistency
show vsx config-consistency [vsx-peer]
Description
Displays the VSX global configuration consistency between two VSX switches.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
The following example shows a comparison between the two VSX switches.

VSX commands | 3127

switch# show vsx config-consistency Configurations -----------------software version ISL hello interval ISL dead interval ISL hold interval ISL peer detect interval Keepalive hello interval Keepalive dead interval Keepalive UDP port System MAC 10:00:00:00:00:01

VSX VLAN List ------------Local ISL VLANs : 1,100 Peer ISL VLANs : 1,10

VSX Active Forwarding

---------------------

Interface VLANs

: 2, 5-9

Peer Interface VLANs : 2, 5-10

STP Configurations -----------------STP Enabled STP Mode auto MST Config Name 10:00:00:00:00:01 MST Config Revision MST Config Digest MST hello time(in seconds) MST maximum age(in seconds) MST maximum hops MST number of instances

RPVST VLAN List: ---------------Local: 2,5-9 Peer : 2,5-9

```

Local -----0.1.0 1 5 0 300 1 3 7678 10:00:00:00:00:01
Local -----True rpvst-auto
10:00:00:00:00:01
0 2 20 20 -

Peer -----0.1.0 1 5 0 300 1 3 7678
Peer -----True rpvst-
0 2 20 20 -

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3128

Platforms 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsx config-consistency lacp
show vsx config-consistency lacp [<LAG-NAME>] [vsx-peer]
Description
Displays VSX LACP configuration consistency between two VSX switches.

Parameter <LAG-NAME> vsx-peer

Description
Specifies the LAG name. Optional. Syntax: string
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

switch# show vsx config-consistency lacp

Configurations

Local

------------------

------

Name

lag100

Loop protect enabled

false

Hash scheme

l2-src-dst-hash

Qos cos override

0

Qos dscp override

0

Qos trust

VSX VLAN list 1 Peer VSX VLAN list 1,10

STP link-type STP port-type STP bpdu-filter STP bpdu-guard STP loop-guard STP root-guard STP tcn-guard

point-to-point admin-network Disabled Disabled Disabled Disabled Disabled

Peer -----lag100 true l2-src-dst-hash 0 0
point-to-point admin-network Disabled Disabled Disabled Disabled Disabled

Configurations -----------------Name Loop protect enabled Hash scheme Qos cos override Qos dscp override Qos trust VSX VLAN list

Local -----lag111 false l2-src-dst-hash 0 0

Peer -----lag111 false l2-src-dst-hash 0 0

VSX commands | 3129

1 Peer VSX VLAN list 1

STP link-type

point-to-point

STP port-type

admin-network

STP bpdu-filter

Disabled

STP bpdu-guard

Disabled

STP loop-guard

Disabled

STP root-guard

Disabled

STP tcn-guard

Disabled

------------------------------------------------------

point-to-point admin-network Disabled Disabled Disabled Disabled Disabled

switch (config-if-vlan)# show traffic-insight test monitor-type dns-average-

latency mon2

error-statistics

Name

: mntr2

Type

: dns-average-latency

Start time for error monitoring : 10/10/2022 04:12:13.923691 UTC

End time for error monitoring

: 10/10/2022 04:17:13.964505 UTC

client_mac

dns_server_ip

number_of_

dns_name dns_server_ dns_

format_

dns_failures

_errors

failures

errors

----------------------------------------------------------------------------------

------

aa:aa:aa:aa:aa:aa 172.0.0.1

200

50

100

50

bb:bb:bb:bb:bb:bb 172.1.1.1

50

10

20

20

cc:cc:cc:cc:cc:cc 172.2.2.2

150

75

25

50

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsx configuration
show vsx configuration {inter-switch-link | keepalive} [vsx-peer]

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3130

Description
Displays the ISL configuration or keepalive protocol configuration in VSX.

Parameter {inter-switch-link | keepalive} inter-switch-link keepalive vsx-peer

Description
Selects inter-switch-link or keepalive.
Displays the ISL configuration in VSX.
Displays the keepalive protocol configuration in VSX.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Displaying the ISL configuration in VSX:

switch# show vsx configuration inter-switch-link

Inter Switch Link : 1/1/43

Hello Interval

: 1 Seconds

Dead Interval

: 20 Seconds

Hold Time

: 0 Seconds

Peer detect interval : 300 Seconds

System MAC

: 10:00:00:00:00:01

Device Role

: primary

Multichassis LAGs : lag100

Displaying the keepalive protocol configuration in VSX:

switch# show vsx configuration keepalive

Keepalive Interface

: 1/1/1

Keepalive VRF

: test1

Source IP Address

: 192.168.1.1

Peer IP Address

: 192.168.1.2

UDP Port

: 7678

Hello Interval

: 1 Seconds

Dead Interval

: 3 Seconds

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

VSX commands | 3131

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsx configuration split-recovery
show vsx configuration split-recovery [vsx-peer]
Description
Displays the state of the split recovery mode.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

switch# show vsx configuration split-recovery Split Recovery Mode : Enabled

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsx ip data-path
show vsx ip data-path [<IP-ADDR> | <IP-ADDR>/<MASK>] [vrf <VRF-NAME>] [vsx-peer]
Description
Displays the datapath of the IPv4 route present on local and VSX peer devices.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3132

Parameter <IP-ADDR> | <IP-ADDR>/<MASK>]
<IP-ADDR>
<IP-ADDR>/<MASK>
vrf <VRF-NAME> vsx-peer

Description
Selects one of the following: <IP-ADDR> or <IP-ADDR>/<MASK>
Specifies the datapath for an IPv4 address based on the parameters provided.
Specifies the datapath for an IPv4 address and its specified subnet. Optional. Syntax: A.B.C.D/M
Shows the IPv4 datapath for a specified VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example
Displaying the datapath on a VSX switch for 192.0.2.0:

switch# show vsx ip data-path 192.0.2.0
IPv4 Data Path Information For 192.0.2.0
Local Device -----------Route : 192.0.2.0/32
Egress L3 Interface : 1/1/2 Next Hop MAC Address : 08:00:09:ea:d7:d1 Egress Port : 1/1/2
Egress L3 Interface : 1/1/3 Nexthop Hop MAC Address : 08:00:09:8e:59:1d Egress Port : 1/1/3
Peer Device -----------Route : 192.0.2.0/32
Egress L3 Interface : loopback1

Displaying the datapath on a VSX switch for 198.51.100.0/32:

switch# show vsx ip data-path 198.51.100.0/32
IPv4 Data Path Information For 198.51.100.0/32
Local Device -----------Route : 198.51.100.0/32
Egress L3 Interface : 1/1/4

Displaying the datapaths on a VSX switch for 198.51.100.1:

switch# show vsx ip data-path 198.51.100.1 IPv4 Data Path Information For 198.51.100.1

VSX commands | 3133

Local Device -----------Route : 198.51.100.1/32
Egress L3 Interface : 1/1/4
Peer Device -----------Route : 198.51.100.0/24
Egress L3 Interface : 1/1/2 Next Hop MAC Address : 08:00:09:db:21:e8 Egress Port : 1/1/2

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

show vsx ip route
show vsx ip route [<IP-ADDR> | <IP-ADDR>/<MASK> | unique] [vrf <VRF-NAME> | all-vrfs] [vsx-peer]
Description
Displays a specified LAG or all configured LAGs along with VSX LAGs.

Parameter <IP-ADDR> | <IP-ADDR>/<MASK> | unique] <IP-ADDR> <IP-ADDR>/<MASK> unique

Description
Selects one of the following: <IP-ADDR>, <IPADDR>/<MASK> , or unique
Specifies the route information for an IPv4 address based on the parameters provided.
Specifies the route information for an IPv4 address and its specified subnet. Optional. Syntax: A.B.C.D/M
Specifies routes that are present only on the primary switch or only on the secondary switch. The routes that are present on both the primary and secondary switch

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3134

Parameter
vrf <VRF-NAME> | all-vrfs <VRF-NAME> all-vrf vsx-peer

Description
are excluded. Optional. Syntax string.
Selects the VRF name or all VRFs.
Shows the IPv4 route information for a specified VRF.
Shows the IPv4 route information for all VRFs.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Displaying IPv4 routes on a VSX switch:

switch# show vsx ip route
IPv4 Forwarding Routes
'[x/y]' denotes [distance/metric]
192.0.2.0/32, vrf default via 192.0.2.1, [1/0], static on vsx1 via 192.0.2.2, [1/0], static on vsx2

Displaying IPv4 routes on a VSX switch:

switch# show vsx ip route
IPv4 Forwarding Routes
'[x/y]' denotes [distance/metric]
192.0.2.3/24, vrf default via 1/1/3, [0/0], connected on vsx1 via 192.0.2.2, [110/2], ospf on vsx2
192.0.2.4/32, vrf default via 1/1/3, [0/0], local on vsx1
192.0.2.5/24, vrf default via 1/1/4, [0/0], connected on vsx1 via 192.0.2.2, [110/3], ospf on vsx2
192.0.2.6/32, vrf default via 1/1/4, [0/0], local on vsx1
192.0.2.7/32, vrf default via 192.0.2.8, [110/1], ospf on vsx1 via 192.0.2.1, [110/1], ospf on vsx1 via loopback1, [0/0], local on vsx2

Displaying IPv4 unique routes on a VSX switch:

switch# show vsx ip route unique

VSX commands | 3135

IPv4 Forwarding Routes

'[x/y]' denotes [distance/metric]

192.0.2.0/32, vrf default via 192.0.2.2, [1/0],
192.0.2.9/32, vrf default via 192.0.2.1, [1/0],

static on vsx2 static on vsx1

Displaying IPv4 routes on a VSX switch for 192.0.2.10:

switch# show vsx ip route 192.0.2.10
IPv4 Forwarding Routes
'[x/y]' denotes [distance/metric]
192.0.2.10/32, vrf default via 192.0.2.1, [1/0], static on vsx1 via 192.0.2.2, [1/0], static on vsx2

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsx ipv6 data-path
show vsx ipv6 data-path [<IPv6-ADDR> | <IPv6-ADDR>/<MASK>] [vrf <VRF-NAME>] [vsx-peer]
Description
Displays the datapath of the IPv6 route on local and peer VSX devices.

Parameter <IPV6-ADDR> | <IPV6-ADDR>/<MASK>]

Description
Selects one of the following: <IPV6-ADDR> or <IPV6ADDR>/<MASK>

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3136

Parameter <IPV6-ADDR>
<IPV6-ADDR>/<MASK>
vrf <VRF-NAME> vsx-peer

Description
Specifies the datapath for an IPv6 address based on the parameters provided.
Specifies the datapath for an IPv6 address and its specified subnet. Optional. Syntax: A.B.C.D/M
Shows the IPv6 datapath for a specified VRF.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Displaying an IPv6 datapath on a VSX switch:

switch# show vsx ipv6 data-path 1000::
IPv6 Data Path Information For 1000::
Local Device -----------Route : 1000::/64
Egress L3 Interface : 1/1/2
Peer Device -----------Route : 1000::/64
Egress L3 Interface : 1/1/2

Displaying an IPv6 datapath on a VSX switch:

switch# show vsx ipv6 data-path 2000:: IPv6 Data Path Information For 2000::
Local Device -----------Route : 2000::/64
Egress L3 Interface : 1/1/2 Next Hop MAC Address : 08:00:09:0e:0c:1b Egress Port : 1/1/2

Displaying IPv6 datapath for 3000::/64 on a VSX switch:

switch# show vsx ipv6 data-path 3000::/64 IPv6 Data Path Information For 3000::/64
Local Device -----------Route : 3000::/64
Egress L3 Interface : 1/1/2 Next Hop MAC Address : 08:00:09:0e:0c:1b Egress Port : 1/1/2 IPv6 Data Path Information For 3000::/64

VSX commands | 3137

Local Device -----------Route : 3000::/64
Egress L3 Interface : 1/1/2 Next Hop MAC Address : 08:00:09:0e:0c:1b Egress Port : 1/1/2

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsx ipv6 route
show vsx ipv6 route [<IPv6-ADDR> | <IPv6-ADDR>/<MASK> | unique] [vrf <VRF-NAME> | all-vrfs] [vsx-peer]
Description
Displays a specified LAG or all configured LAGs along with VSX LAGs.

Parameter <IPV6-ADDR> | <IPV6-ADDR>/<MASK> | unique]
<IPV6-ADDR> <IPV6-ADDR>/<MASK> unique
vrf <VRF-NAME> | all-vrfs

Description
Selects one of the following: <IPV6-ADDR>, <IPV6ADDR>/<MASK> , or unique
Specifies the route information for an IPv4 address based on the parameters provided.
Specifies the route information for an IPv4 address and its specified subnet. Optional. Syntax: A.B.C.D/M
Specifies routes that are present only on the primary switch or only on the secondary switch. The routes that are present on both the primary and secondary switch are excluded. Optional. Syntax string.
Selects the VRF name or all VRFs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3138

Parameter <VRF-NAME>
all-vrf vsx-peer

Description
Shows the IPv4 route information for a specified VRF.
Shows the IPv4 route information for all VRFs.
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Displaying IPv6 routes on a VSX switch:

switch# show vsx ipv6 route
IPv6 Forwarding Routes
'[x/y]' denotes [distance/metric]
1000::/64, vrf default via 1/1/2, [0/0], connected on vsx1 via 1/1/2, [0/0], connected on vsx2
1000::1/128, vrf default via 1/1/2, [0/0], local on vsx1

Displaying IPv6 unique routes on a VSX switch:

switch# show vsx ipv6 route unique IPv6 Forwarding Routes
'[x/y]' denotes [distance/metric]
1000::1/128, vrf default via 1/1/2, [0/0], local on vsx1
1000::2/128, vrf default via 1/1/2, [0/0], local on vsx2
3000::/64, vrf default via 1000::2, [1/0], static on vsx1

Displaying IPv6 routes on a VSX switch for 2000::/64:

switch# show vsx ipv6 route 2000::/64 IPv6 Forwarding Routes
'[x/y]' denotes [distance/metric]
2000::/64, vrf default via 1000::2, [1/0], static on vsx1 via 1000::1, [1/0], static on vsx2

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

VSX commands | 3139

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsx status
show vsx status [inter-switch-link | keepalive | linkup-delay] [vsx-peer]
Description
Displays global VSX status or a specified status determined by the selected parameter.

Parameter [inter-switch-link | keepalive | linkup-delay]
inter-switch-link keepalive linkup-delay
vsx-peer

Description
Selects one of the following: inter-switchlink, keepalive, or linkup-delay
Specifies the display of the ISL status in VSX.
Specifies the display of the VSX keepalive protocol status.
Specifies the display of the VSX link-up delay information, such as the: n Configured link-up delay timer. n Delay timer status. n Initial sync status. n LAGs on which the delay timer is running. n Status of the LAGs excluded from the link-
up delay timer. n Interfaces that are shut down during VSX
split. n Interfaces that are shut down during VSX
split
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Examples
Displaying the global VSX status:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3140

switch# show vsx status VSX Operational State ---------------------
ISL channel ISL mgmt channel Config Sync Status NAE HTTPS Server

: In-Sync : operational : in-sync : peer_reachable : peer_reachable

Attribute -----------ISL link ISL version System MAC Platform Software Version Device Role

Local -------1/1/43 2 48:0f:cf:af:70:84 8320 10.0x.xxxx primary

Peer -------1/1/43 2 48:0f:cf:af:c2:84 8320 10.0x.xxxx secondary

Displaying the ISL status in VSX:

switch# show vsx status inter-switch-link

State

: In-Sync

Link Status

: up

Mgmt state

: operational

Inter-switch link Statistics

----------------------------

Hello Packets Tx

: 4572

Hello Packets Rx

: 4573

Data Packets Tx

: 80634

Data Packets Rx

: 80637

Mgmt Packets Tx

: 25946

Mgmt Packets Rx

: 25167

Mgmt Packet Drops

:0

Displaying the VSX keepalive protocol status:

switch# show vsx status keepalive

Keepalive State

: Keepalive-Established

Last Established

: Thu Jun 8 09:03:01 2018

Last Failed

: Thu Jun 8 09:04:02 2018

Peer System Id

: 58:1f:cf:af:a0:84

Peer Device Role

: primary

Keepalive Counters

Keepalive Packets Tx

: 322

Keepalive Packets Rx

: 121

Keepalive Timeouts

:0

Keepalive Packets Dropped : 14

Displaying the VSX link-up delay status while ARP/MAC VSX synchronization is in progress:

switch# show vsx status linkup-delay
Configured linkup delay-timer Initial sync status

: 180 seconds : In-progress

VSX commands | 3141

Delay timer status

: Waiting-to-start

Linkup Delay time left

:

Interfaces that will be brought up after delay timer expires : lag20,lag30-lag31

Interfaces enabled for shutdown-on-split that will be brought

up after the delay timer expires

:

Interfaces that are excluded from delay timer

: lag2

Displaying the VSX link-up delay status with ARP/MAC VSX synchronization completed with the delay timer running:

switch# show vsx status linkup-delay

Configured linkup delay-timer

: 180 seconds

Initial sync status

: Completed

Delay timer status

: Running

Linkup Delay time left

: 1 minutes 22

seconds

Interfaces that will be brought up after delay timer expires : lag20,lag30-lag31

Interfaces enabled for shutdown-on-split that will be brought

up after the delay timer expires

:

Interfaces that are excluded from delay timer

: lag2

Displaying the VSX link-up delay status with ARP/MAC VSX synchronization completed and the delay timer expired:

Displaying the global VSX status for the peer switch:

vsx-primary# show vsx status vsx-peer

VSX Operational State

---------------------

ISL channel

: In-Sync

ISL mgmt channel

: operational

Config Sync Status

: in-sync

NAE

: peer_reachable

HTTPS Server

: peer_reachable

Attribute -----------ISL link ISL version System MAC Platform Software Version Device Role

Local -------lag1 2 e0:07:1b:cb:72:e4 8320 10.0x.xxxx secondary

Peer -------lag1 2 98:f2:b3:68:79:2e 8320 10.0x.xxxx primary

Displaying the status for an out-of-sync status for VSX.

switch# show vsx status linkup-delay
Configured linkup delay-timer Initial sync status Delay timer status Linkup Delay time left

: 20 seconds : : :

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3142

Interfaces that will be brought up after delay timer expires :

Interfaces enabled for shutdown-on-split that will be brought

up after the delay timer expires

:

Interfaces that are excluded from delay timer

:

Displaying the status VSX link-up delay status when interfaces enabled for shutdown-on-split.

switch# show vsx status linkup-delay

Configured linkup delay-timer

: 180 seconds

Initial sync status

: In-progress

Delay timer status

: Waiting-to-start

Linkup Delay time left

:

Interfaces that will be brought up after delay timer expires : lag8,lag256

Interfaces enabled for shutdown-on-split that will be brought

up after the delay timer expires

: 1/1/27,1/1/37,

vlan2-vlan57

Interfaces that are excluded from delay timer

:

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsx status config-sync
show vsx status config-sync [vsx-peer]
Description
Displays VSX configuration synchronization status for peers. This command can be run from the primary or secondary peer to view the configuration synchronization state.

Parameter vsx-peer

Description
Shows the output from the VSX peer switch. If the switches do not have the VSX configuration or the ISL is down, the output from the VSX peer switch is not displayed. This parameter is available on switches that support VSX.

Example

VSX commands | 3143

switch# show vsx status config-sync

Admin State

: Enabled

Operational State

: Operational

Error State

: None

Recommended remediation : N/A

Current Time

: Wed Jul 18 23:41:07 2018

Last Sync Time

: Wed Jul 18 23:38:26 2018

The Admin State parameter can be configured individually on each of the switches on the VSX pair. Hence difference in values does not imply a failure.

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsx status peering
show vsx status peering
Description
Displays synchronization peering status and hardware peering status for modules such as MAC, neighbor, spanning-tree, and route. This command can be used to view the status of VSX peering, following a VSX device reboot or an ISL flap. Following are the possible values for VSX peering status:
n Complete--VSX peering process is successfully completed. n In-progress--VSX peering is being processed. n Not-started--VSX peering process is yet to be started.
Examples
Displaying the VSX peering status :
switch# show vsx status peering ----------------------------------------------------------------

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3144

Module

Sync-Status

Hardware-Status

----------------------------------------------------------------

MAC

In-progress

Not-started

Neighbor

Complete

In-progress

Route

Complete

Complete

Spanning-tree

In-progress

Not-started

EVPN

In-progress

Not-started

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context

Authority

Operator (>) or Manager (#)

Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show vsx status shutdown-on-split
show vsx status shutdown-on-split
Description
Displays the status of the interfaces that are shut down during a VSX split.
You can also use show interface command to view the status of the interface. For example, assume that you have shut down the non-vsx interface 1/1/2 during the VSX split. When you enter show interface command on the secondary switch, the output from the command indicates that the interface was blocked by VSX feature.

Examples
Displaying the status of interfaces that are shut down during the VSX split:

switch(config)# show vsx status shutdown-on-split List of non-vsx interfaces enabled for split shutdown and its status.

Interfaces 1/1/1 lag100 vlan2

Status Disabled Disabled Disabled

VSX commands | 3145

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

split recovery
split-recovery no split-recovery
Description
Enables split recovery mode. Split recovery mode is enabled by default. The no form of this command disables split-recovery mode.
Usage
Split recovery mode prevents traffic loss when the ISL goes out-of-sync and keepalive subsequently fails. When the ISL goes out-of-sync and keepalive is established, the secondary VSX LAGs are brought down. If keepalive then also fails, this situation causes a split condition. In this case, if split recovery mode is enabled, the secondary switch restores its VSX LAGs so they are up. When split recovery mode is disabled during a split condition, the secondary switch keeps it VSX LAGs down.
Examples
Enabling split recovery mode:
switch(config-vsx)# split-recovery
Disabling split recovery mode:
switch(config-vsx)# no split-recovery

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3146

Command History

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

system l2-vlan-mac-mode
system l2-vlan-mac-mode {drop|flood} no system l2-vlan-mac-mode {drop|flood}
Description
This command configures the forwarding action for packets received on an l2 VLAN port when switch system MAC address as the destination MAC address. The no form of this command configures the switch to the default setting of dropping packets.

Parameter drop flood

Description Forwarding action of the packets is to drop. (default) Forwarding action of the packets is to flood.

When flood mode is configured, 8320 and 8325 or 10000 switches support less than 512 and 1024 SVIs respectively. When the active-gateway is configured on SVI along with the flood mode, it supports up to 10 SVIs.
Examples
The following example for flood the packets: switch(config)# system l2-vlan-mac-mode flood
The following example for drop the packets: switch(config)# system l2-vlan-mac-mode drop
The Following example for packets default setting: switch(config)# no system l2-vlan-mac-mode
The Following example for default setting of system l2-vlan-mac-mode drop command:

VSX commands | 3147

switch(config)# no system l2-vlan-mac-mode drop

The Following example for default setting of system l2-vlan-mac-mode flood command: switch(config)# no system l2-vlan-mac-mode flood

Configuring l3-src-mac on a VLAN interface, l2-vlan-mac-mode flood cannot be configured. Such configuration can generate an error as shown and command will not take affect.

switch(config-if-vlan)# active-gateway l3-src-mac switch(config)# system l2-vlan-mac-mode flood l2-vlan-mac-mode flood cannot be configured when active-gateway l3-src-mac is configured.

Configuration table for supported SVIs

Configuration When flood mode is configured
When the active-gateway IPv4 is configured on SVI along with the flood mode
When the active-gateway IPv4 and IPv6 are configured on SVI along with the flood mode
When the VSX active-forwarding, VRRP and virtual-mac features are configured

Platforms 8320 8325 and 10000 8320 8325 and 10000 8320 8325 and 10000 8320, 8325 and 10000

Supported SVIs Less than 512 Less than 1024 Up to 190 Up to 380 Up to 165 Up to 330 Goes down

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release

Modification

Command Information

Platforms 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

system-mac

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3148

system-mac <MAC-ADDR> no system-mac [<MAC-ADDR>]
Description
Sets the MAC address as the VSX system MAC address to be used by control plane protocols, such as STP and LACP. A pair of VSX switches must have the same VSX system MAC. The no form of this command unconfigures the VSX system MAC address to be used by control plane protocols.

Parameter <MAC-ADDR>

Description
Specifies the MAC address in a colon separated format, such as XX:XX:XX:XX:XX:XX, for control plane protocols.

Usage
The system-mac <MAC-ADDR> command is highly recommended for preventing traffic disruptions when the primary VSX switch restores after the secondary VSX switch, such as during:
n A primary switch hardware replacement. n A power outage with the primary switch restore after the secondary switch restore.
When the primary switch is restored after the secondary switch, a traffic disruption might occur when the ISL starts to sync. This situation occurs because the MAC system address changes from the secondary switch to the primary switch for the LACP. To avoid the traffic disruption, set the common system MAC address by entering the system-mac <MAC-ADDR> command. This command creates a common system MAC address between the two VSX switches. This common system MAC address prevents a traffic disruption when the secondary switch comes up before the primary switch. If the common system MAC access is enabled, the secondary switch uses the common system MAC address instead of its own system MAC address, which prevents a traffic loss. The system MAC address also maintains the same MSTP bridge ID across VSX switches, which act as a single switch.
Examples
Setting a MAC address as the VSX system MAC address to be used by control plane protocols:

switch(config-vsx)# system-mac 02:01:00:00:01:00

Unconfiguring a VSX system MAC address to be used by control plane protocols:

switch(config-vsx)# no system-mac 02:01:00:00:01:00

Null system MAC address such as 00:00:00:00:00:00 is not allowed.
For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.
Command History

VSX commands | 3149

Release 10.08 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification Updated no form of the command. --
Authority Administrators or local user group members with execution rights for this command.

vsx
vsx no vsx
Description
Creates the VSX context on the switch. The no form of this command disables the VSX context on the switch and removes all related configuration settings.
Examples
Creating the VSX context on the switch:
switch(config)# vsx switch(config-vsx)#
Removing the VSX context and all VSX configuration settings from the switch:
switch(config-vsx)# no vsx VSX configuration will be deleted. Do you want to continue (y/n)? y switch(config)#

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3150

Platforms 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

vsx active-forwarding
vsx active-forwarding no vsx active-forwarding
Description
Configures VSX active-forwarding on an interface VLAN. The no form of this command unconfigures VSX active-forwarding on a VLAN interface.
Usage
Active forwarding cannot be configured when ICMP redirect is enabled. The ICMP redirect setting is global not per SVI. Enter the no ip icmp redirect command for disabling ICMP redirect at the switch (config)# prompt. If a system has active forwarding enabled, an active gateway can have a maximum of 14 "unique" MAC addresses per system, including IPv4 and IPv6 addresses. If a system has active forwarding disabled, an active gateway can have a maximum of 16 "unique" MAC addresses per system, including IPv4 and IPv6 addresses.
Examples
Successfully enabling VSX active-forwarding:
switch# interface vlan 3 switch(config-if-vlan)# vsx active-forwarding switch(config-vsx)#
Unconfiguring VSX active-forwarding:
switch# interface vlan 3 switch(config-if-vlan)# no vsx active-forwarding switch(config-vsx)#

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

VSX commands | 3151

Platforms 6400

Command context config-if-vlan

Authority
Administrators or local user group members with execution rights for this command.

vsx shutdown-on-split
vsx shutdown-on-split no vsx shutdown-on-split
Description
Shuts down the configured non-VSX interfaces on the VSX secondary along with VSX interfaces during a VSX split. The no form of this command resumes the non-VSX interfaces that are shut down during the VSX split.
This command has no effect on the VSX primary during a split. However, when applied on the VSX primary, the command will bring down the non-VSX interfaces until linkup delay timer expires during the VSX primary reboot.
Examples
Shutting down the non-VSX interface 1/1/1during the VSX split:
switch(config)# interface 1/1/1 switch(config-if)# vsx shutdown-on-split switch(config)# interface lag 1 witch(config-lag-if)# vsx shutdown-on-split
Shutting down the non-VSX interface LAG 5 during the VSX split:
switch(config)# interface lag 5 switch(config-lag-if)# vsx shutdown-on-split
Shutting down the non-VSX SVI during the VSX split:
switch(config)# interface vlan 2 switch(config-if-vlan)# vsx shutdown-on-split
Resuming the non-VSX interface that are shutdown during the VSX split:
switch(config-if)# no vsx shutdown-on-split

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3152

Release 10.07 or earlier

Command Information

Platforms 6400

Command context
config-if config-lag-if config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync
vsx-sync no vsx-sync
Description
Enables VSX synchronization for the entire context for the following features from the primary VSX node to the secondary peer switch:
n Access list context n Classifier context n Object group context n Policy-based routing profile context n Policy context n QoS queue profile context n QoS schedule profile context n VLAN context
The no form of this command disables VSX synchronization for the entire context for a feature, but it does not remove the feature configurations from the secondary peer. Any subsequent configuration changes made under the specific configuration context are not synchronized to the secondary peer switch.
Usage
Make sure that you are in the correct context for the feature that you are trying to enable VSX synchronization:

Feature context for enabling VSX synchronization
Access list context for an ACL type, such as IPv4, IPv6, or MAC.
Class context for a class type, such as IPv4, IPv6, or MAC.
Object group context for IPv4

Command for accessing correct context for the vsx-sync command* access-list <ACL-TYPE> <ACL-NAME>
class <CLASS-TYPE> <CLASS-NAME>
object-group ip address <OBJECT-GROUPNAME>

VSX commands | 3153

Feature context for enabling VSX synchronization Object group context for IPv6
Object group context for ports Policy-based routing profile context Policy context QoS queue profile context QoS schedule profile context
VLAN context

Command for accessing correct context for the vsx-sync command*
object-group ipv6 address <OBJECT-GROUPNAME>
object-group port <OBJECT-GROUP-NAME>
pbr <ACTION-LIST-NAME>
policy <POLICY-NAME>
qos queue-profile <QUEUE-PROFILE-NAME>
qos schedule-profile <SCHEDULE-PROFILENAME>
vlan <ID>

*The commands listed in this column are entered at the switch(config)# prompt, as shown in the following examples.
Examples
Enabling VSX synchronization for this IPv4 access list context to the secondary peer:

switch(config)# access-list ip ITBoston switch(config-acl-ip)# vsx-sync

Enabling VSX synchronization for this IPv6 access list context to the secondary peer:

switch(config)# access-list ipv6 ITRoseville switch(config-acl-ipv6)# vsx-sync

Enabling VSX synchronization for this MAC access list context to the secondary peer:

switch(config)# access-list mac ITBangalore switch(config-acl-ipv6)# vsx-sync

Enabling VSX synchronization for this IPv4 class context to the secondary peer:

switch(config)# class ip ITengineering switch(config-class-ip)# vsx-sync

Enabling VSX synchronization for this object group context for IPv4:

switch(config)# object-group ip address group1 switch(config-addrgroup-ip)# 1.1.1.1 switch(config-addrgroup-ip)# vsx-sync

Enabling VSX synchronization for this QoS queue profile context to the secondary peer:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3154

switch(config)# qos queue-profile test_queue_profile switch(config-queue)# vsx-sync Enabling VSX synchronization for this QoS schedule profile context to the secondary peer: switch(config)# qos schedule-profile test_queue_profile1 switch(config-schedule)# vsx-sync Enabling VSX synchronization for this PBR profile context to the secondary peer: switch(config)# pbr engineering switch(config-pbr-action-list-engineering)# vsx-sync Enabling VSX synchronization for this policy context to the secondary peer: switch(config)# policy ITPaloAlto switch(config-policy)# vsx-sync Enabling VSX synchronization for this VLAN context to the secondary peer: switch(config)# vlan 1 switch(config-vlan-1)# vsx-sync Disabling VSX synchronization for this IPv4 class context to the secondary peer: switch(config)# class ip ITengineering switch(config-class-ip)# no vsx-sync Disabling VSX synchronization for this object group context for IPv4: switch(config)# object-group ip address group1 switch(config-addrgroup-ip)# no vsx-sync Disabling VSX synchronization for this QoS queue profile context to the secondary peer: switch(config)# qos queue-profile test_queue_profile switch(config-queue)# no vsx-sync Disabling VSX synchronization for this QoS schedule profile context to the secondary peer: switch(config)# qos schedule-profile test_queue_profile1 switch(config-schedule)# no vsx-sync Disabling VSX synchronization for this PBR profile context to the secondary peer:
VSX commands | 3155

switch(config)# pbr engineering switch(config-pbr-action-list-engineering)# no vsx-sync
Disabling VSX synchronization for this policy context to the secondary peer:
switch(config)# policy ITPaloAlto switch(config-policy)# no vsx-sync
Disabling VSX synchronization for this MAC access list context to the secondary peer:
switch(config)# access-list mac ITBangalore switch(config-acl-ipv6)# no vsx-sync
Disabling VSX synchronization for this VLAN context to the secondary peer:
switch(config)# vlan 1 switch(config-vlan-1)# no vsx-sync

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms 6400

Command context
config-acl-<ACL-TYPE> config-addrgroup-ip config-addrgroup-ipv6 config-class-<CLASS-TYPE> config-policy config-portgroup config-pbr-action-list-<ACTION-LIST-NAME> config-queue config-schedule-<NAME> config-vlan-<VLAN-ID>

Authority
Administrators or local user group members with execution rights for this command.

vsx-sync (config-if, config-lag-if contexts)
vsx-sync {[access-lists] [qos] [rate-limits] [vlans] [policies] [irdp] [portfilter] [private-vlan port-type] [dhcp-snooping]} no vsx-sync {[access-lists] [qos] [rate-limits] [vlans] [policies] [irdp] [portfilter] [private-vlan port-type] [dhcp-snooping]}
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3156

Enables VSX synchronization for the following for a logical interface or a LAG instance:
n Access lists n IRDP configurations n QoS n Rate limits n Port filter configurations n VLAN associations n PVLAN port type configurations n DHCP snooping
This command enables VSX synchronization for individual associations and to the combination of associations to the interface context. To synchronize the associations, you must configure the same interface on the peer switch.

When enabling VSX synchronization under a physical interface, under a VLAN interface, or a VSX LAG, create on the secondary switch the physical interface, VLAN interface, or VSX LAG with the same name and routing setting as on the primary switch. For example, if the primary switch has a physical interface of 1/1/1, you must create another physical interface of 1/1/1 on the secondary switch. Also, if the primary VSX switch has routing enabled, the secondary switch must have routing enabled. Once the name and routing information is the same, VSX synchronization synchronizes the additional configuration information from the primary VSX switch to the secondary VSX switch.
The no form of this command disables VSX synchronization, but it does not remove the feature configurations from the secondary peer.

Parameter {[access-lists] [qos] [rate-limits] [vlans] [policies]
[irdp] [portfilter] [private-vlan port-type] [dhcp-snooping]} access-lists
qos
rate-limits
vlans
policies

Description
Specifies one or more of the features for which to enable VSX synchronization.
Specifies the access lists that are associated under the interface enabled for VSX syncing.
Specifies the QoS associated under the interface enabled for VSX syncing.
Specifies the rate limits that are associated under the interface enabled for VSX syncing.
Specifies the VLANs that are associated under the interface enabled for VSX syncing.
Specifies the classifier

VSX commands | 3157

Parameter irdp portfilter private-vlan port-type dhcp-snooping

Description
policies that are associated under the interface enabled for VSX syncing.
Specifies the Internet Router Discovery Protocol (IRDP) configurations that are associated under the interface enabled for VSX syncing.
Specifies the port filter configurations that are associated under the interface enabled for VSX syncing.
Specifies the PVLAN port type configurations that are associated under the interface enabled for VSX syncing.
Specifies the DHCP snooping configuration parameters that are associated under the interface enabled for VSX syncing.

Example
Enabling VSX synchronization for VLANs associated with logical interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# vsx-sync vlans

Enabling VSX synchronization for access lists associated with logical interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# vsx-sync access-lists

Enabling VSX synchronization for access lists and policies that are associated with logical interface 1/1/1:

switch(config)# interface 1/1/1 switch(config-if)# vsx-sync access-lists policies

Enabling VSX synchronization for VLANs and QoS that are associated under logical interface 1/1/5:

switch(config)# interface 1/1/5 switch(config-if)# vsx-sync vlans qos

Enabling VSX synchronization for rate limits that are associated under logical interface 1/1/5:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3158

switch(config)# interface 1/1/5 switch(config-if)# vsx-sync rate-limits
Enabling VSX synchronization for rate limits, VLANs, QoS, access lists, policies associated with logical interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# vsx-sync rate-limits vlans qos access-lists policies
Enabling VSX synchronization for VLAN 1 under interface LAG 1:
switch(config)# interface lag 1 switch(config-lag-if)# vsx-sync vlans switch(config-lag-if)# vlan trunk native 1
Enabling VSX synchronization for an access list under interface LAG 2:
switch(config)# interface lag 2 switch(config-lag-if)# vsx-sync access-lists switch(config-lag-if)# apply access-list ip test1 in
Enabling VSX synchronization for a QoS under interface LAG 3:
switch(config)# interface lag 3 switch(config-lag-if)# vsx-sync qos switch(config-lag-if)# apply qos schedule-profile test
Enabling VSX synchronization for a rate limit under interface LAG 4:
switch(config)# interface lag 4 switch(config-lag-if)# vsx-sync rate-limits switch(config-lag-if)# rate-limit broadcast 23 kbps
Enabling VSX synchronization for a policy named test under interface LAG 5:
switch(config)# interface lag 5 switch(config-lag-if)# vsx-sync policies switch(config-lag-if)# apply policy test in
Enabling VSX synchronization for a policy named test1, a rate limit of 23 kbps, a QoS named test, VLAN 1, and an access list named test1 under interface LAG 6:
switch(config)# interface lag 6 switch(config-lag-if)# vsx-sync policies rate-limits qos vlans access-lists switch(config-lag-if)# apply policy test1 in switch(config-lag-if)# rate-limit broadcast 23 kbps switch(config-lag-if)# apply qos schedule-profile test switch(config-lag-if)# vlan trunk native 1 switch(config-lag-if)# apply access-list ip test 1 in
VSX commands | 3159

Enabling VSX synchronization for a port filter:
switch(config)# interface 1/1/1 switch(config-if)# vsx-sync portfilter
switch(config)# interface lag 1 switch(config-lag-if)# vsx-sync portfilter
Enabling VSX synchronization for a PVLAN port type configuration under interface LAG 3:
switch(config)# interface lag 3 switch(config-lag-if)# vsx-sync private-vlan-port-type
Enabling VSX synchronization for DHCP snooping configuration under interface LAG 9:
switch(config)# interface lag 9 multi-chassis switch(config-lag-if)# vsx-sync dhcp-snooping
Disabling VSX synchronization for DHCP snooping configuration under interface LAG 9:
switch(config)# interface lag 9 multi-chassis switch(config-lag-if)# no vsx-sync dhcp-snooping
Disabling VSX synchronization for access lists and policies under logical interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# no vsx-sync access-lists policies
Disabling VSX synchronization for access lists and policies under interface LAG 2:
switch(config)# interface lag 2 switch(config-if)# no vsx-sync access-lists policies
Enabling VSX synchronization of IRDP configurations under logical interface 1/1/1. The first five lines in the example configure IRDP and the last line enables VSX synchronization for IRDP configurations associated under interface 1/1/1:
switch(config)# interface 1/1/1 switch(config-if)# ip irdp switch(config-if)# ip irdp minadvertinterval 550 switch(config-if)# ip irdp maxadvertinterval 850 switch(config-if)# ip irdp holdtime 900 switch(config-if)# vsx-sync irdp
Disabling VSX synchronization for a PVLAN port type configuration under interface LAG 8:
switch(config)# interface lag 8 switch(config-lag-if)# no vsx-sync private-vlan-port-typeno vsx-sync private-vlan-

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3160

port-type

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.09

10.07 or earlier

Command Information

Platforms 6400

Command context
config-if config-lag-if

Modification Added private-vlan-port-type parameter. Updated examples. --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync (config-vlan-if context)
vsx-sync {[active-gateways] [policies]} no vsx-sync {[active-gateways] [policies]}
Description
Enables VSX sync of active gateways or policies associated under an interface. To synchronize the associations, you must configure the same interface vlan on the peer switch. The no form of this command removes VSX synchronization for active gateways or policies associated under an interface, but it does not remove the feature configurations from the secondary peer switch.

Parameter {[active-gateways] [policies]}
access-gateways policies

Description
Specifies one or more of the features for which to enable VSX synchronization.
Specifies that active gateways associated with an interface are enabled for VSX syncing.
Specifies that policies associated with an interface are enabled for VSX syncing.

Usage
Configure an SVI on the secondary switch; however, you do not need to run the vsx-sync activegateways command on the secondary VSX switch.

VSX commands | 3161

Do not use peer system MAC address as an active-gateway VMAC. If same MAC address is used, the VSX synchronization will try to sync the configuration on secondary switch and cause traffic disruptions.
Examples
Enabling VSX synchronization for an active gateway associated with VLAN 1:
switch(config)# interface vlan 1 switch(config-if-vlan)# vsx-sync active-gateways
Enabling VSX synchronization for policies associated with VLAN 1:
switch(config)# interface vlan 1 switch(config-if-vlan)# vsx-sync policies
Enabling VSX synchronization for active gateways and policies associated with VLAN 1:
switch(config)# interface vlan 1 switch(config-if-vlan)# active-gateway ip 10.10.10.10 mac 23:24:25:26:27:28 switch(config-if-vlan)# active-gateway ipv6 fd12:3456:789a:1::1 mac fd12:3456:789a:1::1 23:24:25:26:27:28 switch(config-if-vlan)# vsx-sync active-gateways policies
Disabling VSX synchronization for active gateways associated with VLAN 1:
switch(config)# interface vlan 1 switch(config-if-vlan)# no vsx-sync active-gateways

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-if-vlan

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync aaa
vsx-sync aaa no vsx-sync aaa

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3162

Description
Enables VSX synchronization of all AAA configurations, including user, RADIUS server, and TACACS+ server, on the primary VSX node to the secondary peer switch. The no form of this command removes VSX synchronization of global AAA configurations, but it does not remove the existing global AAA feature configurations from the secondary peer switch.
Examples
Enabling VSX sync for the AAA configurations to the secondary peer:
switch(config)# vsx switch(config-vsx)# vsx-sync aaa
Disabling VSX sync for the AAA configurations to the secondary peer:
switch(config)# vsx switch(config-vsx)# no vsx-sync aaa

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync acl-log-timer
vsx-sync acl-log-timer no vsx-sync acl-log-timer
Description
Enables VSX synchronization of access list log timer configurations on the primary VSX node to the secondary peer. The no form of this command removes VSX synchronization of access list log timer configurations to the secondary peer. However, it does not remove the previously synced configurations from the secondary peer switch.
Examples
Enabling VSX sync for the access list log timer configurations:

VSX commands | 3163

switch(config)# access-list log timer 30 switch(config)# vsx switch(config-vsx)# vsx-sync acl-log-timer
Disabling VSX sync for the access list log timer configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync acl-log-timer

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync acl-secure-update
vsx-sync acl-secure-update no vsx-sync acl-secure-update
Description
If this setting is enabled and the primary VSX node has configurations with the access list secure-update feature enabled, this configuration can synchronize to the secondary peer. This setting is disabled by default. The no form of the command disables the syncing of access list secure-update configurations to the secondary peer, but that does not remove any existing access list secure-update feature configurations from the secondary peer.
Examples
Enabling VSX sync for configurations with the access list secure-update feature:
switch(config)# vsx switch(config-vsx)# vsx-sync acl-secure-update

Disabling VSX sync for configurations with the access list secure-update feature:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3164

switch(config)# vsx switch(config-vsx)# no vsx-sync acl-secure-update

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Related Commands
Command access-list secure-update

Command History
Release 10.13

Command Information

Platforms 6400

Command context config-vsx

Description This command determines if access lists are updated using the secure-update feature. Secure-update is enabled by default. Refer to the ACLs and Classifiers Policy Guide for details.
Modification Command Introduced
Authority Administrators or local user group members with execution rights for this command.

vsx-sync arp-security
vsx-sync arp-security no vsx-sync arp-security
Description
Enables VSX synchronization of the ARP security configurations on the primary VSX switch to the secondary peer switch. After you enter vsx-sync arp-security, you must enter vsx-sync mclaginterfaces for enabling VSX synchronization for the ARP security feature. The no form of this command removes VSX synchronization of ARP security configurations on VLAN mode and LAG interface mode to the secondary peer switch. However, it does not remove the existing ARP security configurations from the secondary peer switch.
Examples
Enabling of VSX synchronization for ARP security feature configurations to a secondary peer:
primary_sw(config)# vsx primary_sw(config-vsx)# vsx-sync arp-security primary_sw(config-vsx)# vsx-sync mclag-interfaces

VSX commands | 3165

Disabling the VSX synchronization for ARP security feature configurations to a secondary peer:
primary_sw(config)# vsx primary_sw(config-vsx)# no vsx-sync arp-security switch(config-vsx)# no vsx-sync mclag-interfaces

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync bfd-global
vsx-sync bfd-global no vsx-sync bfd-global
Description
Enables syncing of global BFD configurations, such as echo-src-ip-address, detect-multiplier, mintransmit-interval, and min-receive-interval, on the primary VSX node to the secondary peer.
This command enables VSX synchronization only at the top level and not at the context level.
The no form of this command disables the syncing of global BFD configurations to the secondary peer, but it does not remove the existing global BFD feature configurations from it.
Examples
Enabling VSX synchronization for various global BFD configurations:
switch(config)# bfd detect-multiplier 1 switch(config)# bfd min-transmit-interval 1000 switch(config)# bfd min-receive-interval 1000 switch(config)# bfd echo-src-ip-address 2.2.2.2 switch(config)# bfd min-echo-receive-interval 1000 switch(config)# vsx switch(config-vsx)# vsx-sync bfd-global
Disabling VSX synchronization for global BFD configurations:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3166

switch(config)# vsx switch(config-vsx)# no vsx-sync bfd-global

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync bgp
vsx-sync bgp no vsx-sync bgp
Description
Enables syncing of BGP configurations on the primary VSX switch to the secondary peer switch. The no form of this command disables syncing BGP, as path lists, community lists, prefix lists, and route map configurations to the secondary peer, but it does not remove the previously synced configurations from the secondary peer switch.
Usage
The following BGP configurations are synchronized: as path lists, community lists, prefix lists, and route map configurations. To maintain the uniqueness of a switch in the autonomous system, the BGP router ID, BGP cluster ID, and BGP neighbor update-source are not synchronized. This exclusion is required for BGP functionality to work seamlessly even with VSX topology. Several settings are also not synced. The neighbor <IP address> shutdown setting is not synced because syncing that setting would cause both the primary and secondary VSX nodes towards the core to go down. In route map configurations, the following settings are also not synced from the primary VSX switch to the secondary VSX switch, because the next-hop is always set differently for the primary and secondary VSX peers:
n set ip nexthop <IP-ADDR> n set ipv6 nexthop global <IP-ADDR>
If the next-hop must be same for both primary and secondary VSX peers, configure the same value on the individual switches.
Examples

VSX commands | 3167

Enabling VSX sync for the BGP configurations:
switch(config)# ip aspath-list list1 seq 10 permit 10 switch(config)# ip community-list expanded com1 seq 10 permit 10 switch(config)# ip extcommunity-list standard ext1 seq 10 permit rt 10:4 switch(config)# ip prefix-list pref1 seq 10 permit any switch(config)# route-map rm1 permit switch(config-route-map-rm1-10)# match ip next-hop 1.1.1.1 switch(config)# router bgp 100 switch(config-bgp)# bgp router-id 1.1.1.1 switch(config-bgp)# neighbor 12.1.1.1 remote-as 1 switch(config-bgp)# address-family ipv4 unicast switch(config-bgp-ipv4-uc)# neighbor 12.1.1.1 activate switch(config)# vsx switch(config-vsx)# vsx-sync bgp
Disabling VSX sync for the BGP configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync bgp

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync copp-policy
vsx-sync copp-policy no vsx-sync copp-policy
Description
Enables VSX synchronization of CoPP policy configurations on the primary VSX node to the secondary peer switch. The no form of this command removes VSX synchronization of global CoPP configurations, but it does not remove the existing global CoPP configurations from the secondary peer switch.
Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3168

The first three lines in the following example show the setting of several policy configurations. The last two lines of the example show the enabling of VSX synchronization for CoPP policy configurations.
switch(config)# copp-policy mypolicy switch(config-copp)# class arp-broadcast drop switch(config-copp)# no class arp-unicast switch(config)# vsx switch(config-vsx)# vsx-sync copp-policy
Disabling VSX synchronization for global CoPP configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync copp-policy

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync dhcp-relay
vsx-sync dhcp-relay no vsx-sync dhcp-relay
Description
Enables VSX synchronization of DHCPv4 and DHCPv6 relay configurations on the primary VSX node to the secondary peer. The no form of the command disables the VSX synchronization of DHCPv4 and DHCPv6 relay configurations to the secondary peer; however, it does not remove the existing DHCPv4 and DHCPv6 relay configurations from the secondary VSX peer.
Examples
This example enables VSX synchronization for DHCPv4 relay configurations. The first six lines in the example show DHCPv4 relay configurations. The last two lines show how to enable VSX synchronization for the DHCP relay configurations:

VSX commands | 3169

switch(config)# interface 1/1/1 switch(config-if)# ip helper-address 192.168.10.1 switch(config-if)# ip helper-address 192.168.20.1 switch(config)# interface 1/1/2 switch(config-if)# ip helper-address 192.168.30.1 switch(config)# dhcp-relay option 82 switch(config)# vsx switch(config-vsx)# vsx-sync dhcp-relay
This example enables VSX synchronization for DHCPv6 relay configurations. The first seven lines in the example show DHCPv6 relay configurations. The last two lines show how to enable VSX synchronization for the DHCP relay configurations:
switch(config)# dhcpv6-relay switch(config)# interface 1/1/1 switch(config-if)# ipv6 helper-address unicast 2001:db8:0:1:: switch(config-if)# ipv6 helper-address multicast FF01::1:1000 egress 1/1/2 switch(config)# interface 1/1/2 switch(config-if)# ipv6 helper-address unicast 2001:db8:0:2:: switch(config)# dhcpv6-relay option 79 switch(config)# vsx switch(config-vsx)# vsx-sync dhcp-relay
Disabling VSX synchronization for DHCP relay configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync dhcp-relay

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync dhcp-server
vsx-sync dhcp-server no vsx-sync dhcp-server
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3170

Enables VSX synchronization of all DHCPv4 server configurations, including external storage configurations, on the primary VSX node to the secondary peer. Only the primary VSX node answers DHCP service requests, and leases can only be exported from the primary VSX node. The no form of the command disables VSX synchronization of DHCPv4 server configurations to the secondary peer; however, it does not remove the existing DHCPv4 server feature configurations from the secondary peer.
Examples
The first six lines in the following example show the setting of a DHCPv4 server configuration. The last line of the example shows the enabling of VSX synchronization for global DHCPv4 server configurations.
switch(config)# dhcp-server external-storage dhcp-dbs file dhcpv4_lease_file delay 600 switch(config)# dhcp-server vrf default switch(config-dhcp-server)# pool test switch(config-dhcp-server-pool)# range 10.0.0.20 10.0.0.30 switch(config-dhcp-server-pool)# default-router 10.0.0.1 10.0.0.10 switch(config-dhcp-server-pool)# static-bind ip 10.0.0.1 mac 24:be:05:24:75:73 switch(config)# vsx switch(config-vsx)# vsx-sync dhcp-server
Disabling VSX synchronization for global DHCPv4 server configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync dhcp-server

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync dhcp-snooping
vsx-sync dhcp-snooping no vsx-sync dhcp-snooping
Description
Enables VSX synchronization of DHCP snooping configurations on the primary node to the secondary peer switch.

VSX commands | 3171

To synchronize DHCP snooping configurations associated with a particular VLAN and interface, configure the same VLAN and interface on the peer device. The no form of this command disables syncing DHCP snooping configurations to the secondary peer, but it does not remove the previously synced configurations from the secondary peer.
Examples
Enabling VSX sync for the DHCP snooping configurations to the secondary peer:
switch(config)# vsx switch(config-vsx)# vsx-sync dhcp-snooping
Disabling VSX sync for the DHCP snooping configurations to the secondary peer:
switch(config)# vsx switch(config-vsx)# no vsx-sync dhcp-snooping
In the DHCP snooping guard policy context Enabling VSX-sync for the DHCPv6 snooping guard policy pol:
switch(config)# dhcpv6-snooping guard-policy po1 switch(config-dhcpv6-guard-policy)# vsx-sync
Disabling VSX-sync for the DHCPv6 snooping guard policy pol:
switch(config)# dhcpv6-snooping guard-policy po1 switch(config-dhcpv6-guard-policy)# no vsx-sync

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.10

Modification Command introduced.

Command Information

Platforms 6400

Command context
config-vsx config-dhcpv6-guard-policy

Authority
Administrators or local user group members with execution rights for this command.

vsx-sync dhcpv6-server
vsx-sync dhcpv6-server no vsx-sync dhcpv6-server

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3172

Description
Enables VSX synchronization of all DHCPv6 server configurations, including external storage configurations, on the primary VSX node to the secondary peer. The no form of the command disables VSX synchronization of DHCPv6 server configurations to the secondary peer; however, it does not remove the existing DHCPv6 server feature configurations from the secondary peer.
Examples
The first six lines in the following example show the setting of a DHCPv6 server configuration. The last two lines of the example show the enabling of VSX synchronization for global DHCPv6 server configurations.
switch(config)# dhcpv6-server external-storage dhcpv6-dbs file dhcpv6_lease_file delay 600 switch(config)# dhcpv6-server vrf default switch(config-dhcp-server)# pool test switch(config-dhcpv6-server-pool)# range 2001::1 2001::10 prefix-len 64 switch(config-dhcpv6-server-pool)# option 22 ipv6 2001::12 switch(config-dhcpv6-server-pool)# static-bind ipv6 2001::11 client-id 1:0:a0:24:ab:fb:9c switch(config)# vsx switch(config-vsx)# vsx-sync dhcpv6-server
Disabling VSX synchronization for global DHCPv6 server configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync dhcpv6-server

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync dns
vsx-sync dns no vsx-sync dns
Description

VSX commands | 3173

Enables VSX synchronization of the global DNS configurations on the primary VSX node to the secondary peer switch. The no form of this command removes VSX synchronization for global DNS configurations, but it does not remove the feature configurations from the secondary peer switch.
Examples
The first line in the following example shows the setting of a DNS configuration. The last two lines of the example show the enabling of VSX synchronization for global DNS configurations.
switch(config)# ip dns domain-name domain.com switch(config)# vsx switch(config-vsx)# vsx-sync dns
Disabling VSX synchronization for global DNS configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync dns

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync evpn
vsx-sync evpn no vsx-sync evpn
Description
Enables syncing of all EVPN context-related configurations on primary VSX node to the secondary peer switch. The no form of this command disables syncing EVPN configurations to the secondary peer, but it does not remove the previously synced configurations from the secondary peer switch.
As a prerequisite, VLAN vsx-sync must be enabled separately for the VLAN configurations inside EVPN context to get synced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3174

Examples
Enabling VSX sync for the EVPN configurations:
switch(config)# vlan 2 switch(config-vlan-2)# vsx-sync switch(config)# evpn switch(config-evpn)# vlan 2 switch(config-evpn-vlan-2)# rd 5:5 switch(config-evpn-vlan-2)# route-target export 1:1 switch(config-evpn-vlan-2)# route-target import 1:1 switch(config)# vsx switch(config-vsx)# vsx-sync evpn
Disabling VSX sync for the EVPN configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync evpn

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync icmp-tcp
vsx-sync icmp-tcp no vsx-sync icmp-tcp
Description
Enables VSX synchronization of IP ICMP configurations, including ip icmp unreachable, ip icmp redirect, and ip icmp throttle configurations, on primary VSX node to the secondary peer. The no form of the command disables the VSX synchronization of IP ICMP configurations to the secondary peer. However, it does not remove the existing IP ICMP configurations from the secondary VSX peer.
Examples
Enabling VSX synchronization for IP ICMP configurations:

VSX commands | 3175

switch(config)# vsx switch(config-vsx)# vsx-sync icmp-tcp
Disabling VSX synchronization for IP ICMP configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync icmp-tcp

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync keychain
vsx-sync keychain no vsx-sync keychain
Description
Enables synchronizing of key chain configurations on primary VSX node to the secondary peer. There is no configuration synchronization from secondary to primary peer. If any additional modification or configuration is made on the primary for the key chain set of features, the features will be auto-synchronized. The no form of the command disables synchronizing key chain configurations to the secondary peer. But it does not remove the previously synchronized configurations from the secondary peer.
Examples
Enabling synchronizing of key chain configurations on primary VSX node to the secondary peer:
switch(config)# keychain ospf_keys switch(config-keychain)# key 1 switch(config-keychain-key)# send-lifetime start-time 10:10:10 10/25/2019 end-time 10:10:10 11/25/2019 switch(config-keychain-key)# accept-lifetime duration infinite switch(config)# vsx switch(config-vsx)# vsx-sync keychain

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3176

Disabling synchronizing key chain configurations to the secondary peer:
switch(config)# vsx switch(config-vsx)# no vsx-sync keychain

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync lldp
vsx-sync lldp no vsx-sync lldp
Description
Enables VSX synchronization of the LLDP configurations on the primary VSX node to the secondary peer. The no form of this command disable VSX synchronization of LLDP configurations to the secondary peer, but it does not remove the existing LLDP feature configurations from the secondary peer switch.
Examples
The first line in the following example shows the setting of an LLDP configuration. The last two lines of the example show the enabling of VSX synchronization for LLDP configurations.
switch(config)# lldp reinit 6 switch(config)# vsx switch(config-vsx)# vsx-sync lldp
Disabling VSX synchronization of LLDP configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync lldp

VSX commands | 3177

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync loop-protect-global
vsx-sync loop-protect-global no vsx-sync loop-protect-global
Description
Enables the VSX synchronization of global loop protect configurations, such as transmit-interval and reenable-timer, on the primary VSX node to the secondary peer switch. To enable VSX synchronization at the context level for this feature, enter the vsx-sync mclag-interfaces command at the context level. The no form of this command removes VSX synchronization of global loop protect configurations, but it does not remove the existing global loop protect feature configurations from the secondary peer switch.
Examples
The first two lines in the following example show the setting of global loop protect configurations. The last two lines of the example show the enabling of VSX synchronization for global loop protect configurations.
switch(config)# loop-protect transmit-interval 10 switch(config)# loop-protect re-enable-timer 300 switch(config)# vsx switch(config-vsx)# vsx-sync loop-protect-global
Disabling VSX synchronization of global loop protect configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync loop-protect-global

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.
Command History

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3178

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync mac-lockout
Applies only to the Aruba 6400 Switch Series.
vsx-sync mac-lockout no vsx-sync mac-lockout
Description
Enables VSX synchronization of the MAC Lockout configurations on the primary VSX node to the secondary peer. The no form of this command disables syncing MAC Lockout configurations to the secondary peer. However, it does not remove the existing MAC Lockout feature configurations from the secondary peer.
Examples
Enabling VSX synchronization for MAC Lockout configurations:
switch(config)# mac-lockout 10:10:10:10:10:10 switch(config)# vsx switch(config-vsx)# vsx-sync mac-lockout
Disabling VSX synchronization for MAC Lockout configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync mac-lockout

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

VSX commands | 3179

Platforms 6400

Command context config-vsx

Authority
Administrators or local user group members with execution rights for this command.

vsx-sync mclag-interfaces
vsx-sync mclag-interfaces no vsx-sync mclag-interfaces
Description
Enables the VSX synchronization of VSX LAG interface associations and attributes on the primary VSX switch to the secondary peer switch. The Usage section in this topic provides a listing of specific associations and attributes that are synchronized to the secondary switch. The no form of this command removes VSX synchronization of global VSX LAG and attributes, but it does not remove the existing VSX LAG feature configurations from the secondary peer switch.
Usage
The VSX LAG interface associations and attributes that support VSX synchronization are for example: Interface associations:
n Access lists n Policies n QoS n Port access n Port filters n Rate limits n VLANs
Supported attributes:
n LAG description n LACP n Loop protect n QoS trust n sFlow n STP
This configuration overrides the existing VSX synchronization associations created under the VSX LAG interface context. Also with this configuration, the system blocks further configuration of VSX synchronization associations under the VSX LAG context.
Examples
The first four lines in the following example show the creation and configuration of a VSX LAG. The last two lines of the example show the enabling of VSX synchronization for VSX LAG interface associations and attributes.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3180

switch(config)# interface lag 1 multi-chassis switch(config-lag-if)# access-list ip MY_IP_ACL in switch(config-lag-if)# rate-limit broadcast 50 kbps switch(config-lag-if)# qos trust cos switch(config-lag-if)# exit switch(config)# vsx switch(config-vsx)# vsx-sync mclag-interfaces
Disabling the VSX synchronization of VSX LAG interface associations and attributes:
switch(config)# vsx switch(config-vsx)# no vsx-sync mclag-interfaces

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync nd-snooping
vsx-sync nd-snooping no vsx-sync nd-snooping
Description
Enables VSX synchronization of ND snooping configurations on the primary VSX node to the secondary peer switch. To synchronize ND snooping configurations associated with a particular VLAN and interface, configure the same VLAN and interface on the peer device. When RA guard policy is enabled, this command also synchronizes RA guard policy related configurations. The no form of this command disables syncing ND snooping configurations to the secondary peer, but it does not remove the previously synced configurations from the secondary peer.
Examples
Enabling VSX sync for the ND snooping configurations to the secondary peer:

VSX commands | 3181

switch(config)# interface 1/1/3 switch(config-if)# no routing switch(config-if)# nd-snooping trust switch(config)# vlan 2 switch(config-vlan-2)# nd-snooping switch(config-vlan-2)# nd-snooping ra-drop switch(config-vlan-2)# nd-snooping prefix-list 2001::2/64 switch(config)# vsx switch(config-vsx)# vsx-sync nd-snooping
Disabling VSX sync for the ND snooping configurations to the secondary peer:
switch(config)# vsx switch(config-vsx)# no vsx-sync nd-snooping

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync neighbor
vsx-sync neighbor no vsx-sync neighbor
Description
Enables VSX synchronization of IPv4 and IPv6 static neighbors configuration on primary VSX node to the secondary peer. There is no configuration sync from secondary to primary peer. If any new modification or additional configuration is made on the primary node for IPv4 and IPv6 static neighbors configuration, they will be auto-synced. The no form of this command VSX synchronization of IPv4 and IPv6 static neighbors configurations to the secondary peer, but it does not remove the previously synced configurations from the secondary peer switch.
Examples
Enabling VSX sync for the IPv4 and IPv6 static neighbors configurations:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3182

DUT-1 (config-vsx)# show run in vlan127 interface vlan127
ip address 137.1.1.1/16 ipv6 address 7f00::1/64 arp ipv4 137.1.1.35 mac 00:12:01:00:00:1a arp ipv4 137.1.1.70 mac 00:12:01:00:00:3d exit DUT-1(config-vsx) switch(config)# vsx switch(config-vsx)# vsx-sync neighbor
Disabling VSX sync for the IPv4 and IPv6 static neighbors configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync neighbor

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync ospf
vsx-sync ospf no vsx-sync ospf
Description
Enables syncing of OSPF (including OSPFv2 and OPSFv3), route map, and key chain configurations on the primary VSX switch. There is no configuration sync from secondary to primary peer. To synchronize OSPF configurations at the port level context, configure the same port on the peer device. The no form of this command disables syncing of OSPF, route map, and key chain configurations to the secondary peer. But it does not remove the previously synced configurations from the secondary peer switch.
The OSPF router ID is not synchronized. This exclusion is needed because the router ID uniquely identifies the router. The two OSPF routers with the same router ID do not form an adjacency between them.

VSX commands | 3183

Examples
Enabling VSX sync for the OSPF configurations to the secondary peer:
switch(config)# router ospf 1 switch(config-ospf-1)# area 0 switch(config-ospf-1)# area 1 nssa switch(config-ospf-1)# area 2 stub switch(config-ospf-1)# redistribute connected route-map map1 switch(config)# router ospfv3 1 switch(config-ospfv3-1)# max-metric router-lsa on-startup switch(config-ospfv3-1)# bfd all-interfaces switch(config-if)# ip ospf 1 area 0 switch(config-if)# ip ospf hello-interval 33 switch(config-if)# ipv6 ospfv3 1 area 0 switch(config-if)# ipv6 ospfv3 dead-interval 55 switch(config)# vsx switch(config-vsx)# vsx-sync ospf
Disabling VSX sync for the OSPF configurations to the secondary peer:
switch(config)# vsx switch(config-vsx)# no vsx-sync ospf

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync policy-global
vsx-sync policy-global no vsx-sync policy-global
Description
Enables VSX synchronization of global classifier policy configurations on the primary VSX node to the secondary peer switch. The no form of this command disables VSX synchronization of global policy configurations to the secondary peer, but it does not remove the previously synced configurations from the secondary peer switch.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3184

Examples
Enabling VSX sync for the global policy configurations to the secondary peer:
switch(config)# apply policy testPolicy in switch(config)# vsx switch(config-vsx)# vsx-sync policy-global
Disabling VSX sync for the global policy configurations to the secondary peer:
switch(config)# vsx switch(config-vsx)# no vsx-sync policy-global

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync port-access
vsx-sync port-access no vsx-sync port-access
Description
Enables VSX synchronization of port-access configurations such as MAC groups, LLDP groups, CDP groups, Port-Access roles, and Device-Profile to the secondary peer. The no form of this command disables VSX synchronization of port-access configurations to the secondary peer, but it does not remove the previously synced configurations from the secondary peer switch.
Usage
The port-access configurations that support VSX synchronization are:
n port-access cdp-group n port-access device-profile n port-access lldp-group n mac-group

VSX commands | 3185

n port-access role with the following attributes o auth-mode o gbp o mtu o poe-allocate-by o poe-priority o private-vlan o stp-admin-edge-port o trust-mode o vlan
Examples
Enabling VSX sync for port-access configuration:
switch(config)# port-access lldp-group l1 switch(config-lldp-group)# match sysname 6405 switch(config-lldp-group)# exit switch(config)# vsx-sync mclag-interfaces switch(config)# port-access role r1 switch(config-pa-role)# private-vlan port-type secondary switch(config-pa-role)# exit switch(config)# port-access device-profile dp1 switch(config-device-profile)# enable switch(config-device-profile)# associate role r1 switch(config-device-profile)# associate lldp-group l1
Disabling VSX sync for port-access configuration:
switch(config)# vsx switch(config-vsx)# no vsx-sync port-access

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.14

Command Information

Platforms 6400

Command context config-vsx

Modification Added VSX synchronization options for port-access configurations.
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3186

vsx-sync private-vlan-global
vsx-sync private-vlan-global no vsx-sync private-vlan-global
Description
Enable sync for private VLAN global configuration on the primary VSX node to the secondary peer. Private VLAN global configuration syncing is supported on the switch by configuring the feature name under vsx configuration context. There are no parameters in this command. The no form of this command disables Private VLAN global configuration syncing to the secondary peer.
Examples
switch(config)# vsx switch(config-vsx)# vsx-sync private-vlan-globalx
switch(config)# vsx switch(config-vsx)# no vsx-sync private-vlan-global

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.14

Command Information

Platforms
6300 6400

Command context config-vsx

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

vsx-sync qos-global
vsx-sync qos-global no vsx-sync qos-global
Description
Enables the VSX synchronization of global QoS configurations, such as CoS map, DSCP map, and trust policy, on the primary VSX node to the secondary peer switch. To enable VSX synchronization at the context level for this feature, enter the vsx-sync qos command at the context level. The no form of this command removes VSX synchronization of global QoS configurations, but it does not remove the existing global QoS feature configurations from the secondary peer switch.
Examples

VSX commands | 3187

The first five lines in the following example show the setting of global QoS configurations. The last two lines of the example show the enabling of VSX synchronization for global QoS configurations.
switch(config)# qos cos-map 1 local-priority 0 switch(config)# qos cos-map 0 local-priority 1 switch(config)# qos cos-map 2 local-priority 2 switch(config)# qos dscp-map 2 local-priority 3 switch(config)# qos trust dscp switch(config)# vsx switch(config-vsx)# vsx-sync qos-global
Disabling VSX synchronization of global QoS configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync qos-global

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync route-map
vsx-sync route-map no vsx-sync route-map
Description
Enables syncing of all As Path lists, community lists, prefix lists, and route map configurations on primary VSX node to the secondary peer switch. There is no configuration sync from the secondary to primary peer. The no form of this command disables syncing of As Path lists, community lists, prefix lists, and route map configurations to the secondary peer, but it does not remove the previously synced configurations from the secondary peer switch.
When vsx-sync for BGP or OSPF is configured, route map configurations are synchronized from primary VSX node to the secondary peer due to the dependency in configurations.
Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3188

Enabling VSX sync for the route map configurations:
switch(config)# ip aspath-list list1 seq 10 permit 10 switch(config)# ip community-list expanded com1 seq 10 permit 10 switch(config)# ip extcommunity-list standard ext1 seq 10 permit rt 10:4 switch(config)# ip prefix-list pref1 seq 10 permit any switch(config)# route-map rm1 permit switch(config-route-map-rm1-10)# match ip next-hop 1.1.1.1 switch(config)# vsx switch(config-vsx)# vsx-sync route-map
Disabling VSX sync for the route map configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync route-map

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync sflow
vsx-sync sflow no vsx-sync sflow
Description
Enables VSX synchronization of the sFlow configurations on the primary VSX node to the secondary peer. The no form of this command removes VSX synchronization of global sFlow configurations, but it does not remove the existing global sFlow feature configurations from the secondary peer switch.
Usage
To maintain compliance with sFlow collector functionality for non-VSX topology, the vsx-sync sflow command on primary VSX peer is expected to sync all sFlow configurations, except for the agent-ip configuration. This exclusion is required for sFlow collector functionality to work seamlessly even with VSX topology.
Examples

VSX commands | 3189

The first line in the following example shows the setting of an sFlow configuration. The last two lines of the example show the enabling of VSX synchronization for sFlow configurations.
switch(config)# sflow agent-ip 10.0.0.100 switch(config)# vsx switch(config-vsx)# vsx-sync sflow
Disabling VSX synchronization of global sFlow configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync sflow

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync sflow-global
vsx-sync sflow-global no vsx-sync sflow-global
Description
Enables VSX synchronization of the sFlow global configurations on the primary VSX node to the secondary peer. The no form of this command disables VSX synchronization of global sFlow configurations, but it does not remove the existing sFlow feature configurations from the secondary peer switch.
Usage
To maintain compliance with sFlow collector functionality for non-VSX topology, the vsx-sync sflow command on primary VSX peer is expected to sync all sFlow configurations, except for the agent-ip configuration. This exclusion is required for sFlow collector functionality to work seamlessly even with VSX topology. VSX syncs only the global sFLow configurations and not the sFlow configurations under physical or LAG interfaces.
Examples

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3190

The first line in the following example shows the setting of an sFlow configuration. The last two lines of the example show the enabling of VSX synchronization for sFlow configurations.
switch(config)# sflow collector 1.1.1.1 switch(config)# vsx switch(config-vsx)# vsx-sync sflow-global
Disabling VSX synchronization of global sFlow configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync sflow-global

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync snmp
vsx-sync snmp no vsx-sync snmp
Description
Enables VSX synchronization of SNMP configurations on the primary VSX node to the secondary peer. The no form of this command removes VSX synchronization of global SNMP configurations, but it does not remove the existing global SNMP feature configurations from the secondary peer switch.
Examples
Enabling VSX synchronization for SNMP configuration:
switch(config)# vsx switch(config-vsx)# vsx-sync snmp
Disabling VSX synchronization for SNMP configuration:

VSX commands | 3191

switch(config)# vsx switch(config-vsx)# no vsx-sync snmp

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync ssh
vsx-sync ssh no vsx-sync ssh
Description
Enables VSX synchronization of SSH server configurations on the primary VSX node to the secondary peer switch. The no form of this command removes VSX synchronization of global SSH configurations, but it does not remove the existing global SSH feature configurations from the secondary peer switch.
Examples
The first line in the following example shows the setting of an SSH server configuration. The last two lines of the example show the enabling of VSX synchronization for SSH server configurations.
switch(config)# ssh certified-algorithms-only switch(config)# vsx switch(config-vsx)# vsx-sync ssh
Disabling VSX synchronization for global SSH server configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync ssh

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3192

Command History

Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync static-routes
vsx-sync static-routes no vsx-sync static-routes
Description
Enables VSX synchronization of static route configurations on the primary VSX node to the secondary peer switch. The no form of this command removes VSX synchronization of global static route configurations, but it does not remove the existing global static route feature configurations from the secondary peer switch.
Examples
Enabling VSX synchronization for static routes:
switch(config)# vsx switch(config-vsx)# vsx-sync static-routes
Disabling VSX synchronization for static routes:
switch(config)# vsx switch(config-vsx)# no vsx-sync static-routes

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

VSX commands | 3193

Platforms 6400

Command context config-vsx

Authority
Administrators or local user group members with execution rights for this command.

vsx-sync stp-global
vsx-sync stp-global no vsx-sync stp-global
Description
Enables the VSX synchronization of global STP configurations on the primary VSX node to the secondary peer switch. Use the vsx-sync mclag-interfaces command to sync context level spanning trees. To enable VSX synchronization at the context level for this feature, enter the vsx-sync mclag-interfaces command at the context level. The no form of this command removes VSX synchronization of global STP configurations, but it does not remove the existing global STP feature configurations from the secondary peer switch.
Examples
The first two lines in the following example show the setting of global STP configurations. The last two lines of the example show the enabling of VSX synchronization for global STP configurations.
switch(config)# spanning-tree config-name abc switch(config)# spanning-tree config-revision 1 switch(config)# vsx switch(config-vsx)# vsx-sync stp-global
Disabling VSX synchronization of global STP configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync stp-global

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3194

vsx-sync telnet
vsx-sync telnet no vsx-sync telnet
Description
Enables VSX synchronization of Telnet server configurations from the primary VSX node to the secondary peer. To synchronize Telnet configurations associated with a particular VRF, you need to configure the same VRF on the peer device. The no form of the command disables VSX synchronization of Telnet server configurations to the secondary peer, however, it does not remove the existing Telnet server configurations from the secondary peer.
Examples
Enabling VSX synchronization of Telnet servers:
switch(config)# telnet server vrf main switch(config)# vsx switch(config-vsx)# vsx-sync telnet

Disabling VSX synchronization of Telnet servers:

switch(config)# vsx switch(config-vsx)# no vsx-sync telnet

Command History
Release 10.08.1000

Modification Command introduced on the 6400 Switch Series.

Command Information

Platforms 6400

Command context config-vsx

Authority
Administrators or local user group members with execution rights for this command.

vsx-sync time
vsx-sync time no vsx-sync time
Description
Enables VSX synchronization of time-related configurations, including NTP and time zone configurations, on the primary VSX node on the secondary peer switch.

VSX commands | 3195

The no form of this command removes VSX synchronization of global time-related configurations, but it does not remove the existing global time-related feature configurations from the secondary peer switch.
Examples
The first two lines in the following example show the setting of time-related configurations. The last two lines of the example show the enabling of VSX synchronization for time-related configurations.
switch(config)# ntp authentication switch(config)# clock timezone utc switch(config)# vsx switch(config-vsx)# vsx-sync time
Disabling VSX synchronization for time-related configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync time

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync udp-forwarder
vsx-sync udp-forwarder no vsx-sync udp-forwarder
Description
Enables VSX synchronization of UDP forwarder configurations on the primary VSX node to the secondary peer. The no form of the command disables the VSX synchronization of UDP forwarder configurations to the secondary peer; however, it does not remove the existing udp-forwarder configurations from the secondary VSX peer.
Examples
Enabling VSX synchronization for UDP forwarder configurations:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3196

switch(config)# vsx switch(config-vsx)# vsx-sync udp-forwarder
Disabling VSX synchronization for UDP forwarder configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync udp-forwarder

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync vrrp
vsx-sync vrrp no vsx-sync vrrp
Description
Enables VSX synchronization of all VRRP configurations on the primary VSX node to the secondary peer switch. There is no configuration sync from secondary to primary peer. To synchronize VRRP configurations at the port level context, the same port must be configured on the peer device with IP address. The no form of this command disables syncing VRRP configurations to the secondary peer, but it does not remove the previously synced configurations from the secondary peer.
BFD IP is the IP address of VRRP peer device. Hence it cannot be synced. In the owner scenario, in case the priority is synced, both VSX primary and secondary devices will have 255 as their priority. If the primary device goes down and comes up again, the secondary device will still act as the Active in spite of the primary device being the owner. Hence priority cannot be synced.
Examples
Enabling VSX sync for the VRRP configurations to the secondary peer:

VSX commands | 3197

switch(config)# router vrrp enable switch(config-if)# vrrp 1 address-family ipv4 switch(config-if-vrrp)# address 1.1.1.100 primary switch(config-if-vrrp)# timers advertise 1000 switch(config-if-vrrp)# no shutdown switch(config-if)# vrr 1 address-family ipv6 switch(config)# vsx switch(config-vsx)# vsx-sync vrrp
Disabling VSX sync for the VRRP configurations to the secondary peer:
switch(config)#

switch(config-vsx)# no vsx-sync vrrp

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx-sync vsx-global
vsx-sync vsx-global no vsx-sync vsx-global
Description
Enables VSX synchronization of global VSX configurations on the primary VSX node to the secondary peer. The no form of the command disables VSX synchronization of global VSX configurations to the secondary peer; however, it does not remove the existing VSX feature configurations from the secondary peer.
Usage
The following commands are synced from primary VSX node to secondary VSX node:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3198

n inter-switch-link dead-interval <DEAD-INTERVAL> n inter-switch-link hello-interval <HELLO-INTERVAL> n inter-switch-link hold-time <HOLD-INTERVAL> n inter-switch-link peer-detect-interval <PEER-DETECT-INTERVAL> n keepalive dead-interval <DEAD-INTERVAL> n keepalive hello-interval <HELLO-INTERVAL> n keepalive udp-port <PORT-NUM> n linkup-delay-timer <DELAY-TIMER> n split-recovery n system-mac <MAC-ADDR>
Examples
The first three lines in the following example show the setting of global VSX configurations. The last line in the example shows the enabling of VSX synchronization for global VSX configurations.
switch(config)# vsx switch(config-vsx)# inter-switch-link dead-interval 15 switch(config-vsx)# inter-switch-link hello-interval 2 switch(config-vsx)# inter-switch-link hold-time 1 switch(config-vsx)# vsx-sync vsx-global
Disabling VSX synchronization for global VSX configurations:
switch(config)# vsx switch(config-vsx)# no vsx-sync vsx-global

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context config-vsx

Modification --
Authority Administrators or local user group members with execution rights for this command.

vsx update-software
vsx update-software <REMOTE-URL> [vrf <VRF-NAME>]
Description

VSX commands | 3199

This command lets you update the software.

Parameter <REMOTE-URL>
vrf <VRF-NAME>

Description
Specifies the TFTP URL for downloading the software. Syntax: tftp://{<IP-ADDRESS>|<HOSTNAME>}[:<PORT>] [;blocksize=<VAL>]/<FILE-NAME>
Specifies the VRF name for downloading the software. Optional

Usage
This command gives you the option to save the running configuration on the primary and secondary VSX switches. After the command saves the running configuration, it downloads new software from the TFTP server and verifies the download. After a successful verification, the command installs the software to the alternative image of both the VSX primary and secondary switches. The command displays the status of the VSX primary and secondary switches during the upgrade. The command also refreshes the progress bar as the image update progresses. Do not interrupt the VSX primary CLI session until the software updates completes; however, software update process can be stopped. If you stop the upgrade when the secondary switch has already installed the image in its flash memory or the secondary switch has started the reboot the process, it comes up with the new software. The primary switch continues to have with older software. You can stop the software update process by pressing ctrl+c.
Example
Updating the software using TFTP:

switch# vsx update-software tftp://192.168.1.1/XL.10.0x.xxxx vrf mgmt Do you want to save the current configuration (y/n)? y The running configuration was saved to the startup configuration.

This command will download new software to the %s image of both the VSX primary

and

secondary systems, then reboot them in sequence. The VSX secondary will reboot

first, followed by the primary.

Continue (y/n)? y

VSX Primary Software Update Status

: <VSX primary software update status>

VSX Secondary Software Update Status : <VSX secondary software update status>

VSX ISL Status

: <VSX ISL status>

Progress

[..........................................................................]

Secondary VSX system updated completely. Rebooting primary.

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3200

Platforms 6400

Command context Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

vsx update-software boot-bank
vsx update-software boot-bank {primary | secondary}
Description
Upgrades the VSX pairs using the specified bank on both the devices. This command compares whether the image versions are same in both the primary and secondary switches and reboots them in sequence, the VSX secondary switch followed by VSX primary switch.
Before executing this command, download the software image and install in the required boot banks.

Parameter boot-bank {primary | secondary}

Description
Specifies the boot bank where the image is pre-staged .
Selects either primary or secondary VSX switch for the software upgrade.

Usage
This command gives you the option to save the running configuration on the primary and secondary VSX switches. After the command saves the running configuration, it downloads new software from the TFTP server and verifies the download. After a successful verification, the command installs the software to the alternative image of both the VSX primary and secondary switches. The command displays the status of the VSX primary and secondary switches during the upgrade. The command also refreshes the progress bar as the image update progresses. Do not interrupt the VSX primary CLI session until the software updates completes; however, software update process can be stopped. If you stop the upgrade when the secondary switch has already installed the image in its flash memory or the secondary switch has started the reboot the process, it comes up with the new software. The primary switch continues to have with older software. You can stop the software update process by pressing ctrl+c.
Example
Selecting primary bank for upgrade:

switch# vsx update-software boot-bank primary Do you want to save the current configuration (y/n)? y The running configuration was saved to the startup configuration.

This command will upgrade both VSX primary and secondary systems, using pre-staged

image 'X' installed in secondary bank on both devices, then reboot

them in sequence. The VSX secondary will reboot first, followed by primary.

Continue (y/n)? y

VSX Primary Software Update Status

: Reboot started

VSX Secondary Software Update Status : Image updated successfully

VSX ISL Status

: Up

VSX commands | 3201

Progress [......................................................................] Secondary VSX system updated completely. Rebooting primary.

Selecting secondary bank for upgrade:

switch# vsx update-software boot-bank secondary Do you want to save the current configuration (y/n)? y The running configuration was saved to the startup configuration.

This command will upgrade both VSX primary and secondary systems, using pre-staged

image 'X' installed in secondary bank on both devices, then reboot

them in sequence. The VSX secondary will reboot first, followed by primary.

Continue (y/n)? y

VSX Primary Software Update Status

: Reboot started

VSX Secondary Software Update Status : Image updated successfully

VSX ISL Status

: Up

Progress [.......................................................................]

Secondary VSX system updated completely. Rebooting primary.

For more information on features that use this command, refer to the Virtual Switching Extension (VSX) Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms 6400

Command context Manager (#)

Modification --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3202

Chapter 168 VXLAN commands

VXLAN commands

interface vxlan
interface vxlan 1 [mode ipv4|ipv6] no interface vxlan 1 [mode ipv4|ipv6]
Description
Creates VXLAN interface 1 and changes to the config-vxlan-if context. A maximum of one VXLAN interface is supported. By default, the VXLAN is disabled. To enable the VXLAN, use the command no shutdown. The no form of this command removes VXLAN interface 1. This deletes the VXLAN tunnel, and all VNIs and VLAN-to-VNI mappings associated with it.

Parameter 1 mode ipv4|ipv6

Description
Only one VXLAN interface is supported.
(Optional) Specify if the interface tunnel uses IPv4 or IPv6 addressing. If this parameter is not included, the interface default is IPv6.

Examples
Creating VXLAN interface 1:

switch(config)# interface vxlan 1 switch(config-vxlan-if)#

Deleting VXLAN interface 1:

switch(config)# no interface vxlan 1

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.11.1000 10.07 or earlier
Command Information
AOS-CX 10.14 Command-Line Interface Guide

Modification Added IPv6 support for 6300, 6400, 8100, and 8360 Switch Series. --
3203

Platforms
6300 6400

Command context config

Authority
Administrators or local user group members with execution rights for this command.

inter-vxlan-bridging mode
inter-vxlan-bridging mode {deny | static-evpn | static-all} no inter-vxlan-bridging mode {static-evpn | static-all}
Description
Changes the inter-VXLAN bridging mode on tunnels where VXLAN bridging across tunnels is disabled by default. Default mode is deny. The no form of this command sets the inter-VXLAN bridging mode to the default mode of deny.

Parameter deny static-evpn
static-all

Description
Specifies disabling inter-VXLAN bridging across tunnels.
Specifies enabling inter-VXLAN bridging between static and dynamic tunnels.
Specifies enabling inter-VXLAN bridging between static and all tunnels.

Usage
n By default, inter VXLAN bridging is disabled. Therefore, packets arriving over an L2VNI over a VXLAN tunnel are not forwarded on the same L2VNI over another VXLAN tunnel. VXLAN bridging across tunnels is disabled by default.
n To enable VXLAN bridging between static and dynamic tunnels, set the mode to static-evpn. n To enable VXLAN bridging between static and all other static and dynamic tunnels, set the mode to
static-all. Since dynamic tunnels for single fabric are always full mesh, VXLAN bridging between dynamic tunnels remains blocked.

Configuration of static tunnels is not recommended on VTEPs where split horizon is disabled between the EVPN tunnels, either by using the ibgp-ebgp command or by using the route map- based broadcast-group configuration.

Examples
Enabling VXLAN bridging between static and dynamic tunnels: switch(config-vxlan-if)# inter-vxlan-bridging-mode static-evpn
Disabling VXLAN bridging between static and dynamic tunnels: switch(config-vxlan-if)# no inter-vxlan-bridging-mode static-evpn

VXLAN commands | 3204

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.08

Command Information

Platforms
6300 6400

Command context config-vxlan-if

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

mcast-group flood
mcast-group flood ip <IP-ADDR> no mcast-group flood ip <IP-ADDR>
Description
Overrides the automatic assignment of the multicast group IP for the VNI flood replication in underlay multicast replication mode. This command is only usable if underlay-multicast replication mode is configured. The no form of this command removes the mcast-group flood configuration.

Parameter ip <IP-ADDR>

Description
Specifies the multicast group address in IPv4 format (x.x.x.x) where x is a decimal number from 0 to 255.

Examples
Configuring mcast-group flood for IPv4 multicast address 239.1.14.10:

switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 1000 switch(config-vni-1000)# mcast-group flood ip 239.1.14.10

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.14
Command Information

Modification Command introduced.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3205

Platforms
6300 6400

Command context config-vni-<VNI-NUMBER>

Authority
Administrators or local user group members with execution rights for this command.

replication-mode
replication-mode {ingress | underlay-multicast [pim-bidir] [flood-group-range <IPV4-ADDR>/MASK>]} no replication-mode {ingress | underlay-multicast [pim-bidir] [flood-group-range <IPV4-ADDR>/MASK>]}
Description
Configures the global replication mode for overlay flood traffic within a VXLAN domain. In ingress mode the source VXLAN tunnel endpoint replicates flood or BUM (broadcast, unknown unicast, multicast) traffic for every destination remote tunnel endpoint. This is the default mode when a VXLAN interface is created. The source tunnel endpoint forwards the packet over each point to point unicast VXLAN tunnel. When underlay-multicast replication mode is configured, then overlay flood traffic replication occurs in the multicast underlay network. The source VXLAN tunnel endpoint forwards the packet to a multipoint VXLAN tunnel. For the multicast tree to be built dynamically, each flood domain must be mapped to a multicast group IP address. That address is used by the PIM control protocol to build and join the multicast tree in the underlay network. The replication mode command has auto mapping option called flood-group-range. When a multicast group IP address range is specified the software maps the L2 VNIs to the group IP addresses. A static group IP configuration is allowed at the VNI level and if configured will override the automatic assignment of multicast group IP addresses to the VNI. The group IP range in the interface vxlan context and the group IP in the VNI context should be consistently configured across all the tunnel endpoint devices in the VXLAN domain. Static VXLAN tunnels are not supported in underlay-multicast mode. The following features are not supported when operating in the underlay multicast replication mode:
1. Multi-fabric 2. Static VXLAN 3. GPO 4. EVPN multi-homing (overlay ECMP) 5. VLAN-aware bundling 6. IP-directed broadcast over VXLAN tunnels (IPDB) 7. Network load balancing over VXLAN tunnels (NLB) 8. IPv6 VXLAN mode 9. Fast roaming
The no form of this command removes the replication mode configuration.

VXLAN commands | 3206

Parameter ingress
underlay-multicast
pim-bidir
flood-group-range <IPV4-ADDR> <MASK>

Description
Selects ingress as the replication mode. Overlay flood traffic is replicated in the ingress node using point to point VXLAN tunnel. Default.
Selects underlay multicast as the replication mode. Flood or BUM traffic is replicated in the underlay multicast network via multipoint VXLAN tunnel.
Selects pim-bidir. Default multicast routing protocol in replication-mode underlay-multicast configuration when the VxLAN interface is operating in IPv4.
Specifies the multicast group address range.
Specifies the multicast group IP address range in IPv4 format (x.x.x.x) where x is a decimal number from 0 to 255.
Specifies the subnet mask for the group range in CIDR notation as a decimal number from 1-32.

Examples
Configuring underlay multicast replication mode:

switch(config-vxlan-if)# replication-mode underlay-multicast pim-bidir floodgroup-range 239.1.0.0/24

Configuring ingress replication mode:

switch(config-vxlan-if)# replication-mode ingress

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.14

Command Information

Platforms
6300 6400

Command context config-vxlan-if

Modification Command introduced.
Authority Administrators or local user group members with execution rights for this command.

routing
vni <VNI-NUMBER> no vni <VNI-NUMBER>

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3207

Description
Enables a layer 3 VNI for EVPN VXLAN distributed L3 gateways with symmetric IRB. The VNI is automatically assigned the default VRF. To assign another VRF, use the command vrf. Used with EVPNbased VXLANs. If a user tries to enable routing on a VNI already associated to a VLAN, an appropriate warning is displayed. The no form of this command disables symmetric routing on a VNI.
If you enable this configuration, collection of flow tracking statistics is disabled.s

Examples
Enabling L3 VNI 1000 for EVPN VXLAN distributed L3 gateways with symmetric IRB using VRF vrf-1:
switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 1000 switch(config-vni-1000)# routing switch(config-vni-1000)# vrf vrf-1
Disabling L3 VNI 1000 for EVPN VXLAN distributed L3 gateways with symmetric IRB:
switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 1000 switch(config-vni-1000)# no routing

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.14 10.07 or earlier

Modification Added information related to role based IPFIX. --

Command Information

Platforms
6300 6400

Command context config-vni-<VNI-NUMBER>

Authority
Administrators or local user group members with execution rights for this command.

show interface vxlan
show interface vxlan <IFNAME>
Description
Shows detailed VXLAN interface information.

VXLAN commands | 3208

Parameter <IFNAME>

Description Specifies the VXLAN interface to show.

Example
On the 6400 Switch Series, interface identification differs. Showing settings for VXLAN interface 1.

switch# show interface vxlan1 Interface vxlan1 is up Admin state is up Description:VXLAN1 Underlay VRF: default Destination UDP port: 4789 VTEP source IPv4 address: 1.1.1.1

VNI

Routing

---------- --------

10

disabled

10

disabled

10

disabled

20

disabled

20

disabled

30

disabled

40

disabled

50

disabled

4000

enabled

4001

enabled

VLAN ---10 10 10 20 20 -40 ----

VRF ---------------default default

VTEP Peers

Origin

----------------- --------

2.2.2.2

static

3.3.3.3

static

4.4.4.4

static

5.5.5.5

evpn

6.6.6.6

evpn

--

static

--

static

7.7.7.7

static

22.1.1.2

evpn

23.1.1.3

evpn

Aggregate Statistics --------------------
Decap: 104222 input packets 236 broadcast packets 0 drop packets
Encap: 108527 output packets 6 BUM packets 0 drop packets

15841744 bytes 26942 bytes
11068728 bytes 422 bytes

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3209

Platforms
6300 6400

Command context Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show interface vxlan multipoint-tunnel
show interface vxlan multipoint-tunnel [forwarding-status|floodstatus|brief|statistics|<IP-ADDR>|brief|group-mapping]
Description
Shows detailed VXLAN interface information.

Parameter forwarding-status flood-status statistics <IP-ADDR> brief group-mapping

Description Shows multipoint tunnel encap and decap forwarding status. Shows multipoint tunnel flood status. Shows multipoint tunnel encap and decap statistics. Specifies a multipoint tunnel. Shows brief information about multipoint tunnels. Shows the underlay-mapped multicast group

Example
On the 6400 Switch Series, interface identification differs. Showing information for all multipoint tunnels:

switch# show interface vxlan multipoint-tunnel

Destination

: 239.1.0.1

Source

: 1.1.1.1

Origin

: pim-bidir

VRF

: default

Type

: flood

Encap Status

: Up

Decap Status

: Up

Underlay Information

========

L3 Interface L2 Interface

------------ ------------

VLAN10

1/1/53

Destination Source Origin VRF Type Encap Status Decap Status Underlay Information

: 239.1.0.2 : 1.1.1.1 : pim-bidir : default : flood : Up : Up

VXLAN commands | 3210

======== L3 Interface -----------VLAN10

L2 Interface -----------1/1/53

Showing brief information about multipoint tunnels:

switch# show interface vxlan multipoint-tunnel brief

Type Source

Destination

Origin

VNI

------ ---------- ----------------- ------------ -------

flood 1.1.1.1

239.1.0.1

pim-bidir 1

VLAN VRF

----- ----

1

Default

Showing multipoint tunnel encap and decap forwarding status:

switch# show interface vxlan multipoint-tunnel forwarding-status

Type

Source

Destination Status(Encap) Status(Decap)

---------------- ----------- ------------ ------------- -------------

flood

1.1.1.1

239.1.0.1 up

up

Showing multipoint tunnel flood status:

switch# show interface vxlan multipoint-tunnel flood-status

Source

Destination Status VNI

VLAN

------------ --------- ------- --------- -----

1.1.1.1

239.1.0.1 enabled 1

1

1.1.1.1

239.1.0.10 disabled 10

10

1.1.1.1

239.1.0.100 faulty 100

100

Showing multipoint tunnel encap and decap statistics:

switch# show interface vxlan multipoint-tunnel statistics

Type

Destination Tx Packets(Encap) Tx Bytes(Encap) Rx Packets(Decap) Rx Bytes(Decap)

--------- ----------- ----------------- --------------- ---------------- ---------

flood

239.1.0.1 224

21950

223

21836

Showing information for multipoint tunnel with a destination IP of 239.1.0.1:

switch# show interface vxlan multipoint-tunnel 239.1.0.1

Destination

: 239.1.0.1

Source

: 1.1.1.1

Origin

: pim-bidir

VRF

: default

Type

: flood

Encap Status

: Up

Decap Status

: Up

Underlay Information

========

L3 Interface L2 Interface

------------ ------------

VLAN10

1/1/53

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3211

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show interface vxlan vni
show interface vxlan vni <VNI-NUMBER> vteps
Description
Shows detailed VNI information for VXLAN interface 1.

Parameter <VNI-NUMBER>

Description Specifies the number for a VNI. Range: 1 to 16777214.

Usage
Status can be one of the following:
n operational: Virtual network ID is fully programmed on the switch hardware. n configuration_error: Virtual network ID programming in the switch hardware failed due to
misconfiguration. n no_hw_resources: Virtual network ID programming failed in the switch hardware due to insufficient
resources. n activating: Initial state of virtual network ID when it is configured.
When a tunnel endpoint is a directly connected via nexthop, then nexthop reachability appears empty (-).
Example
Showing VNI information:

switch# show interface vxlan vni

VNI

: 1000

VLAN : 10

Routing : disabled

VRF : --

VNI-Status : operational

VNI

: 2000

Routing : enabled

VNI-Status : activating

```

VLAN : 20 VRF : default

VXLAN commands | 3212

```

switch# show interface vxlan vni 1000

VNI

: 1000

VLAN : 10

Routing : disabled

VRF : --

VNI-Status : operational

switch# show interface vxlan vni vteps

VNI

: 1000

VLAN : 10

Routing : disabled

VRF : --

VNI-Status : operational

VTEPS

=====

ORIGIN

SOURCE

DESTINATION VRF

--------- --------- ----------- -------

static

11.0.0.1 11.0.0.2

default

VTEP-STATUS -----------operational

VNI

: 2000

Routing : enabled

VNI-Status : operational

VTEPS

=====

ORIGIN

SOURCE

--------- ---------

evpn

11.0.0.1

VLAN : 20 VRF : default

DESTINATION VRF

----------- -------

14.0.0.2

default

VTEP-STATUS -----------activating

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

show interface vxlan vteps
show interface vxlan vteps [detail | <IPV4-ADDR>]
Description
Shows information about the VTEPs on VXLAN interface 1.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3213

Parameter detail <IPV4-ADDR>

Description
Show detailed information.
Specifies the IP address of a VTEP peer in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.

Usage
Status can be one of the following:
n operational: Tunnel endpoint is fully programmed on the switch hardware. n configuration_error: Tunnel endpoint programming in the switch hardware failed due to
misconfiguration. n no_hw_resources: Tunnel endpoint programming failed in the switch hardware due to insufficient
resources. n activating: Initial state of tunnel endpoint when it is configured.
When a tunnel endpoint is a directly connected via nexthop, then nexthop reachability appears empty (-).
Example
On the 6400 Switch Series, interface identification differs. Showing information for VTEPs on a VXLAN interface with IPv4 source and destination IP addresses.

switch# show interface vxlan vteps

Source

Destination Origin Status

VNI Routing

----------- ------------- -------- ---------------- ------ --------

-

11.0.0.1 11.0.0.2

static operational

1000 disabled

11.0.0.1 12.0.0.2

static activating

2000 disabled

11.0.0.1 22.1.1.1

evpn

operational

4000 enabled

11.0.0.1 23.1.1.1

evpn

activating

4001 enabled

VLAN ----
10 20 ---

VRF -------
--red blue

Showing information the VTEPs on a VXLAN interface with IPv6 source and destination IP addresses.

switch# show interface vxlan vteps

Source

Destination

VRF

---------------- ---------------

-----

1920:1680:1:1::1 1920:1680:1:1::5

vrf1

1920:1680:1:1::1 1920:1680:1:1::5

vrf2

1920:1680:1:1::1 1920:1680:1:1::5

--

1920:1680:1:1::1 1920:1680:1:1::5

--

1920:1680:1:1::1 1920:1680:1:1::5

--

1920:1680:1:1::1 1920:1680:1:1::5

--

1920:1680:1:1::1 1920:1680:1:1::2

vrf1

Origin Status ----- ---------evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational

VNI

Routing VLAN

--------- --------- ----- -

11

enabled --

12

enabled --

1001001 disabled 1001

1001002 disabled 1002

1002001 disabled 2001

1002002 disabled 2002

11

enabled --

VXLAN commands | 3214

1920:1680:1:1::1 vrf2 1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 vrf1 1920:1680:1:1::1 vrf2 1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 vrf1 1920:1680:1:1::1 vrf2 1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 -Source VRF -------------------1920:1680:1:1::1 vrf1 1920:1680:1:1::1 vrf2 1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 vrf1 1920:1680:1:1::1 vrf2 1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 --

1920:1680:1:1::2 1920:1680:1:1::2 1920:1680:1:1::2 1920:1680:1:1::2 1920:1680:1:1::2 1920:1680:1:1::3 1920:1680:1:1::3 1920:1680:1:1::3 1920:1680:1:1::3 1920:1680:1:1::3 1920:1680:1:1::3 1920:1680:1:1::4 1920:1680:1:1::4 1920:1680:1:1::4 1920:1680:1:1::4 1920:1680:1:1::4 1920:1680:1:1::4 Destination
--------------1920:1680:1:1::5 1920:1680:1:1::5 1920:1680:1:1::5 1920:1680:1:1::5 1920:1680:1:1::5 1920:1680:1:1::5 1920:1680:1:1::2 1920:1680:1:1::2 1920:1680:1:1::2 1920:1680:1:1::2 1920:1680:1:1::2 1920:1680:1:1::2

evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational Origin Status ----- ---------evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational evpn operational

12

enabled --

1001001 disabled 1001

1001002 disabled 1002

1002001 disabled 2001

1002002 disabled 2002

11

enabled --

12

enabled --

1001001 disabled 1001

1001002 disabled 1002

1002001 disabled 2001

1002002 disabled 2002

11

enabled --

12

enabled --

1001001 disabled 1001

1001002 disabled 1002

1002001 disabled 2001

1002002 disabled 2002

VNI

Routing VLAN

--------- --------- ----- -

11

enabled --

12

enabled --

1001001 disabled 1001

1001002 disabled 1002

1002001 disabled 2001

1002002 disabled 2002

11

enabled --

12

enabled --

1001001 disabled 1001

1001002 disabled 1002

1002001 disabled 2001

1002002 disabled 2002

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3215

1920:1680:1:1::1 vrf1 1920:1680:1:1::1 vrf2 1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 vrf1 1920:1680:1:1::1 vrf2 1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 -1920:1680:1:1::1 --

1920:1680:1:1::3 1920:1680:1:1::3 1920:1680:1:1::3 1920:1680:1:1::3 1920:1680:1:1::3 1920:1680:1:1::3 1920:1680:1:1::4 1920:1680:1:1::4 1920:1680:1:1::4 1920:1680:1:1::4 1920:1680:1:1::4 1920:1680:1:1::4

evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn

operational operational operational operational operational operational operational operational operational operational operational operational

11 12 1001001 1001002 1002001 1002002 11 12 1001001 1001002 1002001 1002002

enabled -enabled -disabled 1001 disabled 1002 disabled 2001 disabled 2002 enabled -enabled -disabled 1001 disabled 1002 disabled 2001 disabled 2002

Showing detailed information for VTEPs on a VXLAN interface with IPv4 source and destination addresses.

switch# show interface vxlan vteps detail

Destination

: 22.22.22.1

Source

: 21.21.21.1

Origin

: static

VRF

: default

Status

: operational

Nexthops

========

IP-ADDRESS INTERFACE NEXTHOP-MAC

---------- --------- ------------------

--

1/1/2

11:11:11:11:33:11

switch# show interface vxlan vteps 33.33.33.1

Destination

: 33.33.33.1

Source

: 21.21.21.1

Origin

: evpn

VRF

: default

Status

: operational

Nexthops

========

IP-ADDRESS INTERFACE NEXTHOP-MAC

---------- --------- ------------------

2.2.3.1

1/1/1

11:11:11:11:44:11

2.2.2.1

lag1

11:11:11:11:22:11

2.2.1.1

vlan21

11:11:11:11:11:11IP

Showing detailed information for VTEPs on a VXLAN interface with IPv6 source and destination addresses.

VXLAN commands | 3216

switch# show interface vxlan 1

Interface vxlan1 is up Admin state is up Description: Underlay VRF: default Destination UDP port: 4789 VTEP source IPv4 address: VTEP source IPv6 address: 1920:1680:1:1::1 Inter vxlan bridging mode: deny

VNI

Routing VLAN VRF VTEP Peers Origin

---------- ------------ ------ ------------ --------------------------------------

--- --------

11

enabled -- vrf1 1920:1680:1:1::5 evpn

11

enabled -- vrf1 1920:1680:1:1::2 evpn

11

enabled -- vrf1 1920:1680:1:1::3 evpn

11

enabled -- vrf1 1920:1680:1:1::4 evpn

12

enabled -- vrf2 1920:1680:1:1::5 evpn

12

enabled -- vrf2 1920:1680:1:1::2 evpn

12

enabled -- vrf2 1920:1680:1:1::3 evpn

12

enabled -- vrf2 1920:1680:1:1::4 evpn

1001001 disabled 1001 -- 1920:1680:1:1::5 evpn

1001001 disabled 1001 -- 1920:1680:1:1::2 evpn

1001001 disabled 1001 -- 1920:1680:1:1::3 evpn

1001001 disabled 1001 -- 1920:1680:1:1::4 evpn

1001002 disabled 1002 -- 1920:1680:1:1::5 evpn

1001002 disabled 1002 -- 1920:1680:1:1::2 evpn

1001002 disabled 1002 -- 1920:1680:1:1::3 evpn

1001002 disabled 1002 -- 1920:1680:1:1::4 evpn

1002001 disabled 2001 -- 1920:1680:1:1::5 evpn

1002001 disabled 2001 -- 1920:1680:1:1::2 evpn

1002001 disabled 2001 -- 1920:1680:1:1::3 evpn

1002001 disabled 2001 -- 1920:1680:1:1::4 evpn

1002002 disabled 2002 -- 1920:1680:1:1::5 evpn

1002002 disabled 2002 -- 1920:1680:1:1::2 evpn

1002002 disabled 2002 -- 1920:1680:1:1::3 evpn

1002002 disabled 2002 -- 1920:1680:1:1::4 evpn

Aggregate Statistics --------------------
Decap: 35032601994 input packets
Encap: 68424228547 output packets
switch# show interface vxlan 1

24261116182550 bytes 47087902492031 bytes

Interface vxlan1 is up Admin state is up Description: Underlay VRF: default Destination UDP port: 4789 VTEP source IPv4 address: VTEP source IPv6 address: 1920:1680:1:1::1 Inter vxlan bridging mode: deny

VNI

Routing VLAN VRF VTEP Peers Origin

---------- ------------ ------ ------------ --------------------------------------

--- --------

11

enabled -- vrf1 1920:1680:1:1::5 evpn

11

enabled -- vrf1 1920:1680:1:1::2 evpn

11

enabled -- vrf1 1920:1680:1:1::3 evpn

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3217

11 12 12 12 12 1001001 1001001 1001001 1001001 1001002 1001002 1001002 1001002 1002001 1002001 1002001 1002001 1002002 1002002 1002002 1002002

enabled enabled enabled enabled enabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled

-----1001 1001 1001 1001 1002 1002 1002 1002 2001 2001 2001 2001 2002 2002 2002 2002

vrf1 vrf2 vrf2 vrf2 vrf2
-----------------

1920:1680:1:1::4 1920:1680:1:1::5 1920:1680:1:1::2 1920:1680:1:1::3 1920:1680:1:1::4 1920:1680:1:1::5 1920:1680:1:1::2 1920:1680:1:1::3 1920:1680:1:1::4 1920:1680:1:1::5 1920:1680:1:1::2 1920:1680:1:1::3 1920:1680:1:1::4 1920:1680:1:1::5 1920:1680:1:1::2 1920:1680:1:1::3 1920:1680:1:1::4 1920:1680:1:1::5 1920:1680:1:1::2 1920:1680:1:1::3 1920:1680:1:1::4

evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn evpn

Aggregate Statistics --------------------
Decap: 35032601994 input packets
Encap: 68424228547 output packets

24261116182550 bytes 47087902492031 bytes

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context Manager (#)

Modification --
Authority Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

shutdown
shutdown no shutdown
Description
Disables the VXLAN interface and deletes all VXLAN tunnels, segments, and members on the interface. The no form of this command starts the VXLAN interface and creates all VXLAN tunnels and segments. If members are configured, they are added to the VXLAN segment.

VXLAN commands | 3218

Examples
Disabling VXLAN interface 1:
switch(config)# interface vxlan 1 mode ipv4 switch(config-vxlan-if)# shutdown
Enabling VXLAN interface 1:
switch(config)# interface vxlan 1 mode ipv4 switch(config-vxlan-if)# no shutdown

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-vxlan-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

source ip
source ip <IPV4-ADDR>
Description
Configures the source IPv4 address for a VXLAN interface. All VXLAN encapsulated packets use this source IP address in the outer IP header. If you change an existing source IP address, all tunnels with the old source IP address are deleted, and new tunnels are created with the new source IP address. The no form of this command deletes the source IP address for the VXLAN interface and deletes all VXLAN tunnels using this source IP address.

Parameter <IPV4-ADDR>

Description
Specifies the IP address to assign to the VXLAN interface in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255. This must be an address assigned to an existing switch interface, either a loopback interface or a layer 3 interface.

Examples
On the 6400 Switch Series, interface identification differs.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3219

Configuring the loopback IP address as the source IPv4 address:
switch(config)# interface loopback 1 switch(config-loopback-if)# ip address 1.1.1.1/24 switch(config)# interface vxlan 1 switch(config-vxlan-if)# source ip 1.1.1.1
Configuring a layer 3 interface IP address as the source IPv4 address:
switch(config)# interface 1/1/2 switch(config-if)# no shutdown switch(config-if)# routing (6300/6400 only) switch(config-if)# ip address 11.10.10.1/24 switch(config)# interface vxlan 1 switch(config-vxlan-if)# source ip 10.10.10.1
Deleting the source IP address for VXLAN interface 1:
switch(config)# interface vxlan 1 switch(config-vxlan-if)# no source ip 10.10.10.1

Whenever the VxLAN source IP address or virtual MAC address is changed via the command-line interface or REST API, all the EVPN routes need to be re-advertised with new IPaddresses or MAC address. Thefore, the clear bgp command is issued internally for all EVPN neighbors to ensure all EVPN routes get re-advertised.

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History

Release 10.11.1000 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-vxlan-if

Modification The <IPV6-ADDR> parameter is introduced. --
Authority Administrators or local user group members with execution rights for this command.

source ipv6
source ipv6 {<IPV6-ADDR>}
Description
Configures the source IPv6 address for a VXLAN interface. All VXLAN encapsulated packets use this source IP address in the outer IP header.

VXLAN commands | 3220

If you change an existing source IP address, all tunnels with the old source IP address are deleted, and new tunnels are created with the new source IP address.
The no form of this command deletes the source IP address for the VXLAN interface and deletes all VXLAN tunnels using this source IP address.

Parameter <IPV6-ADDR>

Description
Specifies the IP address to assign to the VXLAN interface in IPv6 format (X:X::X:X). This must be an address assigned to an existing switch interface, either a loopback interface or a layer 3 interface.

Examples
On the 6400 Switch Series, interface identification differs. Configuring the loopback IP address as the source IPv6 address:

switch(config)# interface loopback 1 switch(config-loopback-if)# ipv6 address 1::1/128 switch(config)# interface vxlan 1 switch(config-vxlan-if)# source ipv6 1::11

Deleting the source IP address for VXLAN interface 1:

switch(config)# interface vxlan 1 switch(config-vxlan-if)# no source ipv6 1::11

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History

Release 10.11.1000

Command Information

Platforms
6300 6400

Command context config-vxlan-if

Modification Command introduced
Authority Administrators or local user group members with execution rights for this command.

system vlan-client-presence-detect
system vlan-client-presence-detect no system vlan-client-presence-detect
Description

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3221

Enables VNI mapped VLANs when detecting the presence of a client. When enabled, VNI mapped VLANs are up only if there are authenticated clients on the VLAN, or if the VLAN has statically configured ports and those ports are up. When not enabled, VNI mapped VLANs are always up. The no form of this command disables detection of clients on VNI mapped VLANs.
Examples
Enabling detection of clients:
switch(config)# system vlan-client-presence-detect
Disabling detection of clients:
switch(config)# no system vlan-client-presence-detect

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config

Modification --
Authority Administrators or local user group members with execution rights for this command.

vlan
vlan <VLAN-ID> no vlan <VLAN-ID>
Description
Associates an existing VLAN with a VNI. Only one VLAN can be associated with a VNI and the VNI must have symmetric routing disabled. To change the VLAN associated with a VNI, execute the command vlan with a different VLAN ID. The no form of this command removes the specified VLAN from a VNI. Traffic on the specified VLAN is no longer bridged on the VXLAN interface.

Parameter <VLAN-ID>

Description Specifies the number of an existing VLAN. Range: 2 to 4040.

Examples
Assigning VLAN 10 to VNI 1000:

VXLAN commands | 3222

switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 1000 switch(config-vni-1000)# vlan 10
Deleting VLAN 10 from VNI 1000:
switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 1000 witch(config-vni-1000)# no vlan 10

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-vni-<VNI-NUMBER>

Authority
Administrators or local user group members with execution rights for this command.

vni
vni <VNI-NUMBER> no vni <VNI-NUMBER>
Description
Creates a VNI (Virtual Network Identifier) for the VXLAN interface and changes to the config-vni-<VNINUMBER> context. The VNI identifies a VXLAN segment, which acts as a logical network. The VNI can be associated with either a VLAN or VRF.
n When the VNI is associated with a VLAN, the VNI supports asymmetric routing. n Enable support for asymmetric routing by executing the routing command. By default, the VNI is
associated with the default VRF. To use another VRF, execute the vrf command.
The no form of this command deletes the specified VNI from the VXLAN interface. All VXLAN tunnels, VXLAN segments, and members associated with the VNI are deleted.

Parameter <VNI-NUMBER>

Description Specifies the number for a VNI. Range: 1 to 16777214.

Examples
Creating VNI 1000:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3223

switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 1000 switch(config-vni-1000)#
Deleting VNI 1000:
switch(config)# interface vxlan 1 switch(config-vxlan-if)# no vni 1000

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History

Release 10.07 or earlier

Command Information

Platforms
6300 6400

Command context config-vxlan-if

Modification --
Authority Administrators or local user group members with execution rights for this command.

vrf
vrf <VRF-NAME> no vrf <VRF-NAME>
Description
Changes the VRF associated with an L3 VNI after symmetric routing is activated using the routing command. The default VRF should not be configured as an EVPN-enabled VRF. If user tries to configure VRF on a VNI that is already associated with a VLAN, an appropriate error is displayed If a user tries to remove or reconfigure the VRF attached to a VNI while a policy is applied, an appropriate error is displayed. The no form of this command sets the VRF associated with an L3 VNI to the default VRF.
Examples
Enabling L3 VNI 1000 using VRF vrf-1:
switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 1000 switch(config-vni-1000)# routing switch(config-vni-1000)# vrf vrf-1
Setting the VRF on L3 VNI 1000 to the default VRF:

VXLAN commands | 3224

switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 1000 switch(config-vni-1000)# routing switch(config-vni-1000)# no vrf vrf-1

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-vni-<VNI-NUMBER>

Authority
Administrators or local user group members with execution rights for this command.

vtep-peer
vtep-peer <IPV4-ADDR> no vtep-peer <IPV4-ADDR>
Description
Adds a VTEP peer to a VNI. The VMI must not have routing enabled. The VTEP peer IP address must be reachable for a VXLAN tunnel to be established. The no form of this command removes a VTEP peer from a VNI, which deletes the VXLAN tunnel to the peer.

Parameter <IPV4-ADDR>

Description
Specifies the IP address of a VTEP peer in IPv4 format (x.x.x.x), where x is a decimal number from 0 to 255.

Examples
Adding VTEP peer 10.10.10.1 to VNI 1000:

switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 1000 switch(config-vni-1000)# vlan 10 switch(config-vni-1000)# vtep-peer 10.10.10.1

Deleting VTEP peer 10.10.10.1 from VNI 1000:

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3225

switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 1000 switch(config-vni-1000)# no vtep-peer 10.10.10.1

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms
6300 6400

Command context config-vni-<VNI-NUMBER>

Authority
Administrators or local user group members with execution rights for this command.

vtep-peer-ipv6
vtep-peer-ipv6 <IPV6-ADDR> no vtep-peer-ipv6 <IPV6-ADDR>
Description
Adds an IPv6 VTEP peer to a VNI. The VMI must not have routing enabled. The VTEP peer IP address must be reachable for a VXLAN tunnel to be established. The no form of this command removes a VTEP peer from a VNI, which deletes the VXLAN tunnel to the peer.

Parameter <IPV6-ADDR>

Description Specifies the IP address of a VTEP peer in IPv6 format (X:X::X:X).

Examples
Adding VTEP peer12::1 to VNI 1000:

switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 1000 switch(config-vni-1000)# vlan 10 switch(config-vni-1000)# vtep-peer-ipv6 12::1

Deleting VTEP peer 12::1 from VNI 1000:

switch(config)# interface vxlan 1 switch(config-vxlan-if)# vni 1000 switch(config-vni-1000)# no vtep-peer-ipv6 12::1

VXLAN commands | 3226

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.11.1000

Modification Command introduced

Command Information

Platforms
6300 6400

Command context config-vni-<VNI-NUMBER>

Authority
Administrators or local user group members with execution rights for this command.

vxlan-counters aggregate
vxlan-counters aggregate no vxlan-counters aggregate
Description
Attaches VXLAN counters to a VXLAN interface. The counters aggregate statistics for packets sent through the interface. Display statistics with the command show interface vxlan. Statistics are only displayed once a valid configuration is made on the interface.
Example
Enabling counters for VXLAN interface 1.
switch(config)# interface vxlan 1 switch(config-vxlan-if)# vxlan-counters aggregate
Disabling counters for VXLAN interface 1.
switch(config)# interface vxlan 1 switch(config-vxlan-if)# no vxlan-counters aggregate

For more information on features that use this command, refer to the VXLAN Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3227

Platforms
6300 6400

Command context config-vxlan-if

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

VXLAN commands | 3228

Chapter 169 Zeroization commands

Zeroization commands
erase all zeroize
erase [all] zeroize
Description
Restores the switch to its factory default configuration. You will be prompted before the procedure starts. Once complete, the switch will restart from the primary image with factory default settings.
Usage
The erase all command is always available in the CLI. On running the erase all command, the switch is restored to a factory default settings, but retains the enhanced secure mode settings. The erase all zeroize command is not available in the CLI when enhanced secure mode is enabled. This command restore the switch to a factory default settings. On running the erase all zeroize command in enhanced secure mode, displays a notification stating that the command is unavailable in enhanced secure mode.
Back up all data before running this command as all configuration settings will be lost.
Example
Restoring the switch to factory default configuration, except for the enhance secure mode settings:
switch# erase all This command will erase all data and reset the switch to factory defaults, with the exception of the secure mode setting. This process will take several minutes to an hour to complete and the switch will be unavailable during that time. Continue (y/n)? ServiceOS Information: Version: GT.01.01.0007 Build Date: 2017-12-07 11:48:44 PST Build ID: ServiceOS:GT.01.01.0007:42c7d15cf7e5:201712071148 SHA: 42c7d15cf7e5af5bf1c7d8764ff673471084c2a4 ################ Preparing for zeroization ################# ################ Storage zeroization ####################### ################ WARNING: DO NOT POWER OFF UNTIL ########## ################ ZEROIZATION IS COMPLETE ########## ################ This should take several minutes ########## ################ to one hour to complete ########## ################ Restoring files ###########################
Restoring the switch to factory default configuration only when enhance secure mode settings is disabled.

AOS-CX 10.14 Command-Line Interface Guide

3229

switch# erase all zeroize This will securely erase all customer data and reset the switch to factory defaults. This will initiate a reboot and render the switch unavailable until the zeroization is complete. This should take several minutes to one hour to complete. Continue (y/n)? y The system is going down for zeroization.
...
################ Preparing for zeroization #################

################ Storage zeroization #######################

################ WARNING: DO NOT POWER OFF UNTIL ##########

################

ZEROIZATION IS COMPLETE ##########

################ This should take several minutes ##########

################ to one hour to complete

##########

################ Restoring files ###########################
...
We'd like to keep you up to date about: * Software feature updates * New product announcements * Special events
Please register your products now at: https://networkingsupport.hpe.com

Zeroization commands | 3230

When you log in after zeroization, you get a prompt to create a password for the administrator account. You can set the password as blank (to set the password as blank, hit enter at the prompt) or type 1 to 32 printable ASCII characters, excluding spaces and question marks (?). For more information on password requirements, see Password requirements in the Security Guide.

switch login: admin Password:
Please configure the 'admin' user account password. Enter new password: ***** Confirm new password: *****

For more information on features that use this command, refer to the Diagnostics and Supportability Guide for your switch model.

Command History

Release 10.11.1010 10.07 or earlier

Command Information

Platforms All platforms

Command context Manager (#)

Modification Introduced erase all CLI command --
Authority Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3231

Chapter 170 ZTP commands

ZTP commands
show ztp information
show ztp information
Description
Shows information about Zero Touch Provisioning (ZTP) operations performed on the switch.
Usage
When a switch configured to use ZTP is booted from a factory default configuration, the switch contacts a DHCP server, which offers options for obtaining files used to provision the switch:
n The IP address of the TFTP server n The name of the image file n The name of the configuration file n The Aruba Central FDQN or IPv4 address n The HTTP proxy FDQN or IPv4 address
The show ztp information command shows the options offered by the DHCP server and the status of the ZTP operation. The status of the ZTP operation is one of the following: Success The ZTP operation succeeded. One of the following is true:
n Both the running configuration and the startup configuration were updated. n The IP address of the TFTP server was received, but the offer did not include a configuration file or a
firmware image file. n Any combination of vendor encapsulated DHCP options are received as configured, along with the
firmware image and switch configuration file. n Only vendor encapsulated DHCP options are configured and are received accordingly.
Failed - Custom startup configuration detected The switch was booted from a configuration that is not the factory default configuration. For example, the administrator password has been set. Failed - Timed out while waiting to receive ZTP options Either the switch received the DHCP IPv4 address but no ZTP options were received within 1 minute or ZTP force-provision is triggered and no ZTP options are received within 3 minutes. Failed - Detected change in running configuration The running configuration was modified by a user while the ZTP operation was in progress. Failed - TFTP server unreachable

AOS-CX 10.14 Command-Line Interface Guide

3232

The TFTP server is not reachable at the specified IP address. Failed - TFTP server information unavailable The image file name or config file name is provided without the TFTP server location to fetch the files from and ZTP enters failed state. Failed - Invalid configuration file received Either the file transfer of the configuration file failed, or the configuration file is invalid (an error occurred while attempting to apply the configuration). Failed - Invalid image file received Either the file transfer of the firmware image file failed, or the firmware image file is invalid (an error occurred while verifying the image).
In the case of reconnection, connect with a main or alternative location to the COP instance as a user. The current connection is shown in the Central location field. Scenario 1: If the location the device is currently connected on is updated, the system reconnects in order to connect with the new location. Scenario 2: If the location in which the device is not currently connected on is updated, the DUT does not go through the reconnection process.

Examples
Showing switch image download in progress after receiving ZTP options:

switch# show ztp information

TFTP Server

: 10.0.0.2

Image File

: TL_10_02_0001.swi

Configuration File

: config_file

ZTP Status

: In-progress - Image download and verification

Aruba Central Location

: secure.arubanetworks.com

Alternative Aruba Central Location: NA

Aruba Central Shared Token

: aruba123

Force-Provision

: Disabled

HTTP Proxy Location

: http.proxy.arubanetworks.com

Showing switch image download failure after receiving ZTP options:

switch# show ztp information

TFTP Server

: 10.0.0.2

Image File

: TL_10_02_0001.swi

Configuration File

: config_file

ZTP Status

: Failed - Unable to download image

Aruba Central Location

: secure.arubanetworks.com

Alternative Aruba Central Location: NA

Aruba Central Shared Token

: aruba123

Force-Provision

: Disabled

HTTP Proxy Location

: http.proxy.arubanetworks.com

Showing switch configuration download in progress after receiving ZTP options:

switch# show ztp information TFTP Server Image File Configuration File

: 10.0.0.2 : TL_10_02_0001.swi : config_file

ZTP commands | 3233

ZTP Status

: In-progress - Configuration download

Aruba Central Location

: secure.arubanetworks.com

Alternative Aruba Central Location : NA

Aruba Central Shared Token

: aruba123

Force-Provision

: Disabled

HTTP Proxy Location

: http.proxy.arubanetworks.com

Showing switch configuration download failure after receiving ZTP options:

switch# show ztp information

TFTP Server

: 10.0.0.2

Image File

: TL_10_02_0001.swi

Configuration File

: config_file

ZTP Status

: Failed - Unable to download configuration

Aruba Central Location

: secure.arubanetworks.com

Alternative Aruba Central Location : NA

Aruba Central Shared Token

: aruba123

Force-Provision

: Disabled

HTTP Proxy Location

: http.proxy.arubanetworks.com

Showing switch failure to update start-up configuration after downloading configuration received from ZTP options:

switch# show ztp information

TFTP Server

: 10.0.0.2

Image File

: TL_10_02_0001.swi

Configuration File

: config_file

ZTP Status

: Failed - Could not copy to start-up configuration

Aruba Central Location

: secure.arubanetworks.com

Alternative Aruba Central Location: NA

Aruba Central Shared Token

: aruba123

Force-Provision

: Disabled

HTTP Proxy Location

: http.proxy.arubanetworks.com

In the following example, the ZTP operation succeeded, and both an image file and a configuration file were provided.

VSF-10-Mbr# show ztp information

TFTP Server

: 10.1.84.160

Image File

: FL_10_06_0001CK.swi

Configuration File

: 102720-new-setup-config-updated.txt

Status

: Success

Aruba Central Location

: NA

Alternative Aruba Central Location : NA

Aruba Central Shared Token

: aruba123

Force-Provision

: Disabled

HTTP Proxy Location

: NA

VSF-10-Mbr#

In the following example, the ZTP option succeeded. A configuration file was not provided, but an image file was provided.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3234

VSF-10-Mbr# show ztp information

TFTP Server

: 10.1.84.160

Image File

: TL_10_02_0001.swi

Configuration File

: NA

Status

: Success

Aruba Central Location

: NA

Alternative Aruba Central Location: NA

Aruba Central Shared Token

: aruba123

Force-Provision

: Disabled

HTTP Proxy Location

: NA

VSF-10-Mbr#

In the following example, the ZTP operation failed because the TFTP server was unreachable.

VSF-10-Mbr# show ztp information

TFTP Server

: 10.1.84.160

Image File

: TL_10_02_0001.swi

Configuration File

: 102720-new-setup-config-updated.txt

Status

: Failed - TFTP server unreachable

Aruba Central Location

: NA

Alternative Aruba Central Location: NA

Aruba Central Shared Token

: NA

Force-Provision

: Disabled

HTTP Proxy Location

: NA

VSF-10-Mbr#

In the following example, the ZTP operation was stopped because the switch did not receive any options from the DHCP server for ZTP within 1 minute of receiving the IP address from the server.

VSF-10-Mbr## show ztp information

TFTP Server

: NA

Image File

: NA

Configuration File

: NA

Status

: Failed - Timed out while waiting to receive ZTP

options

Aruba Central Location

: NA

Alternative Aruba Central Location: NA

Aruba Central Shared Token

: NA

Force-Provision

: Disabled

HTTP Proxy Location

: NA

VSF-10-Mbr#

In the following example, the ZTP operation was stopped because the switch was booted from a configuration that was not the factory default configuration.

switch# show ztp information

TFTP Server

: 10.0.0.2

Image File

: TL_10_02_0001.swi

Configuration File

: ztp.cfg

Status

: Failed - Custom startup configuration detected

Aruba Central Location

: NA

Alternative Aruba Central Location: NA

Aruba Central Shared Token

: NA

Force-Provision

: Disabled

HTTP Proxy Location

: NA

ZTP commands | 3235

In the following example, the switch received the image file and the TFTP-sever and config file from the DHCP server for ZTP was successful:

switch# show ztp information

TFTP Server

: 10.0.0.2

Image File

: TL_10_02_0001.swi

Configuration File

: ztp.cfg

ZTP Status

: Success

Aruba Central Location

: NA

Alternative Aruba Central Location: NA

Aruba Central Shared Token

: NA

Force-Provision

: Disabled

HTTP Proxy Location

: NA

In the following example, the switch received the image file and the TFTP-sever and config file from the DHCP server entered the failed state as teh TFTP server was not reachable:

switch# show ztp information

TFTP Server

: 10.0.0.2

Image File

: TL_10_02_0001.swi

Configuration File

: ztp.cfg

ZTP Status

: Failed - TFTP server unreachable

Aruba Central Location

: NA

Alternative Aruba Central Location: NA

Aruba Central Shared Token

: NA

Force-Provision

: Disabled

HTTP Proxy Location

: NA

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History

Release 10.07 or earlier

Modification --

Command Information

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Operators or Administrators or local user group members with execution rights for this command. Operators can execute this command from the operator context (>) only.

ztp force provision
ztp force-provision no ztp force-provision
Description
Starts on-demand ZTP.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3236

Usage
DHCP options received are processed independent of he current state of configuration on the switch. Previous ZTP TFTP Server, Image File, Configuration File, Aruba Central Location, and HTTP Proxy location options are cleared and the switch sends a DHCP request.
Examples
In the following example, force-provision is enabled.

switch# configure terminal switch(config)# ztp force-provision

In the following example, force-provision status is checked while enabled.

switch# show ztp information TFTP Server Image File Configuration File Status Aruba Central Location Aruba Central Shared Token Force-Provision HTTP Proxy Location

: 10.0.0.2 : TL_10_02_0001.swi : ztp.cfg : Success : NA : NA : Enabled : NA

In the following example, force-provision is disabled.

switch# configure terminal switch(config)# no ztp force-provision

In the following example, force-provision status is checked while disabled.

switch# show ztp information TFTP Server Image File Configuration File Status Aruba Central Location Aruba Central Shared Token Force-Provision HTTP Proxy Location

: 10.0.0.2 : TL_10_02_0001.swi : ztp.cfg : Success : NA : NA : Disabled : NA

For more information on features that use this command, refer to the Fundamentals Guide for your switch model.

Command History
Release 10.07 or earlier
Command Information

Modification --

ZTP commands | 3237

Platforms All platforms

Command context
Operator (>) or Manager (#)

Authority
Administrators or local user group members with execution rights for this command.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3238

Chapter 171 Support and Other Resources

Support and Other Resources

Accessing HPE Aruba Networking Support

HPE Aruba Networking Support Services AOS-CX Switch Software Documentation Portal HPE Aruba Networking Support Portal North America telephone
International telephone

https://www.arubanetworks.com/support-services/
https://www.arubanetworks.com/techdocs/AOS-CX/help_ portal/Content/home.htm
https://networkingsupport.hpe.com/home
1-800-943-4526 (US & Canada Toll-Free Number) +1-408-754-1200 (Primary - Toll Number) +1-650-385-6582 (Backup - Toll Number - Use only when all other numbers are not working)
https://www.arubanetworks.com/support-services/contactsupport/

Be sure to collect the following information before contacting Support:
n Technical support registration number (if applicable) n Product name, model or version, and serial number n Operating system name and version n Firmware version n Error messages n Product-specific reports and logs n Add-on products or components n Third-party products or components
Other useful sites
Other websites that can be used to find information:

Airheads social forums and Knowledge Base

https://community.arubanetworks.com/

HPE Aruba Networking Hardware Documentation and Translations Portal

https://www.arubanetworks.com/techdocs/hardware/DocumentationPortal/Content/home. htm

AOS-CX 10.14 Command-Line Interface Guide

3239

HPE Aruba Networking software
Software licensing and Feature Packs
End-of-Life information
HPE Aruba Networking Developer Hub

https://networkingsupport.hpe.com/downloads https://lms.arubanetworks.com/ https://www.arubanetworks.com/support-services/end-of-life/ https://developer.arubanetworks.com/

Accessing Updates
You can access updates from the HPE Aruba Networking Support Portal at https://networkingsupport.hpe.com. Some software products provide a mechanism for accessing software updates through the product interface. Review your product documentation to identify the recommended software update method. To subscribe to eNewsletters and alerts: https://networkingsupport.hpe./notifications/subscriptions (requires an active HPE Aruba Networking Support Portal account to manage subscriptions). Security notices are viewable without an HPE Aruba Networking Support Portal account.
Warranty Information
To view warranty information for your product, go to https://www.arubanetworks.com/supportservices/product-warranties/.
Regulatory Information
To view the regulatory information for your product, view the Safety and Compliance Information for Server, Storage, Power, Networking, and Rack Products, available at https://www.hpe.com/support/SafetyCompliance-EnterpriseProducts
Additional regulatory information
HPE Aruba Networking is committed to providing our customers with information about the chemical substances in our products as needed to comply with legal requirements, environmental data (company programs, product recycling, energy efficiency), and safety information and compliance data, (RoHS and WEEE). For more information, see https://www.arubanetworks.com/company/about-us/environmentalcitizenship/.
Documentation Feedback
HPE Aruba Networking is committed to providing documentation that meets your needs. To help us improve the documentation, send any errors, suggestions, or comments to Documentation Feedback (docsfeedback-switching@hpe.com). When submitting your feedback, include the document title, part number, edition, and publication date located on the front cover of the document. For online help

Support and Other Resources | 3240

content, include the product name, product version, help edition, and publication date located on the legal notices page.

AOS-CX 10.14 Command-Line Interface Guide | (6300, 6400 Switch Series)

3241


madbuild