1676
FTOS Command Line Reference Guide FTOS Version 8.3.2.0 July 9, 2010

FTOS Command Line Reference Guide...Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 15 This book provides information on the FTOS Command Line Interface

  • Upload
    others

  • View
    75

  • Download
    0

Embed Size (px)

Citation preview

  • FTOS Command Line Reference Guide

    FTOS Version 8.3.2.0 July 9, 2010

  • 2

    Copyright 2010 Force10 Networks

    All rights reserved. Printed in the USA. January 2010.

    Force10 Networks® reserves the right to change, modify, revise this publication without notice.

    Trademarks

    Force10 Networks® and E-Series® are registered trademarks of Force10 Networks, Inc. Force10, the Force10 logo, E1200, E600, E600i, E300, EtherScale, TeraScale, FTOS, C-Series, and S-Series are trademarks of Force10 Networks, Inc. All other brand and product names are registered trademarks or trademarks of their respective holders.

    Statement of Conditions

    In the interest of improving internal design, operational function, and/or reliability, Force10 Networks reserves the right to make changes to products described in this document without notice. Force10 Networks does not assume any liability that may occur due to the use or application of the product(s) described herein.

    =

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 3

    Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

    PrefaceAbout this Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

    Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Information Symbols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Related Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

    Chapter 1CLI Basics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

    Accessing the Command Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Multiple Configuration Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20Navigating the Command Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20Obtaining Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21Using the Keyword No . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23Filtering show Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    Displaying All Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24Filtering Command Output Multiple Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

    Command Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25EXEC Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25EXEC Privilege Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25CONFIGURATION Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25INTERFACE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25LINE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26TRACE-LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26MAC ACCESS LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26IP ACCESS LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27ROUTE-MAP Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27PREFIX-LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27AS-PATH ACL Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28IP COMMUNITY LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28REDIRECT-LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    Contents

  • 4

    SPANNING TREE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28Per-VLAN SPANNING TREE Plus Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29RAPID SPANNING TREE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29MULTIPLE SPANNING TREE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29PROTOCOL GVRP Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29ROUTER OSPF Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30ROUTER RIP Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30ROUTER ISIS Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30ROUTER BGP Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

    Determining the Chassis Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

    Chapter 2File Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Basic File Management Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Upgrading the C-Series FPGA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

    Chapter 3BOOT_USER Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

    Chapter 4Control and Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

    Chapter 5802.1ag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173

    Chapter 6Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185

    Chapter 7Access Control Lists (ACL). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195Commands Common to all ACL Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195Common IP ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198Standard IP ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201Extended IP ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 5

    Common MAC Access List Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242Standard MAC ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245Extended MAC ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250IP Prefix List Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255Route Map Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262AS-Path Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281IP Community List Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284

    Chapter 8ACL VLAN Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289

    Chapter 9Bidirectional Forwarding Detection (BFD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297

    Chapter 10Border Gateway Protocol IPv4(BGPv4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .311BGPv4 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312MBGP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393BGP Extended Communities (RFC 4360) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419

    Chapter 11Content Addressable Memory (CAM) for ExaScale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431

    Chapter 12Content Addressable Memory (CAM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439CAM Profile Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440CAM IPv4flow Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453CAM Layer 2 ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456

    Chapter 13Configuration Rollback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459

  • 6

    Chapter 14Dynamic Host Configuration Protocol (DHCP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469Commands to Configure the System to be a DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469Commands to Configure Secure DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481

    Chapter 15Equal Cost Multi-Path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489

    Chapter 16Far-End Failure Detection (FEFD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495

    Chapter 17Force10 Resilient Ring Protocol (FRRP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501

    Chapter 18Force10 Service Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .511Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .511

    Chapter 19GARP VLAN Registration (GVRP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544

    Chapter 20High Availability (HA). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553

    Chapter 21Internet Group Management Protocol (IGMP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563IGMP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 7

    IGMP Snooping Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575Important Points to Remember for IGMP Snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575Important Points to Remember for IGMP Querier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575

    Chapter 22Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581Basic Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581Port Channel Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640Time Domain Reflectometer (TDR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 650

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 650UDP Broadcast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652

    Chapter 23IPv4 Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655

    Chapter 24 IPv6 Access Control Lists (IPv6 ACLs). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .711Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .711

    IPv6 ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712IPv6 Route Map Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736

    Chapter 25IPv6 Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743

    Chapter 26IPv6 Border Gateway Protocol (IPv6 BGP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757IPv6 BGP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757IPv6 MBGP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 816

    Chapter 27Intermediate System to Intermediate System (IS-IS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 843

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 843Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 843

  • 8

    Chapter 28Link Aggregation Control Protocol (LACP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 891

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 891Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 891

    Chapter 29Layer 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 899

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 899MAC Addressing Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 899Virtual LAN (VLAN) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919

    Chapter 30Link Layer Detection Protocol (LLDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 929

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 929Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 929LLDP-MED Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 938

    Chapter 31Multicast Listener Discovery (MLD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 947

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 947MLD Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 947MLD Snooping Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 954

    Chapter 32Multicast Source Discovery Protocol (MSDP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 959

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 959Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 959

    Chapter 33Multiple Spanning Tree Protocol (MSTP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971

    Chapter 34Multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 985

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 985IPv4 Multicast Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 985IPv6 Multicast Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 994

    Chapter 35Neighbor Discovery Protocol (NDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1001

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1001Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1001

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 9

    Chapter 36Open Shortest Path First (OSPFv2 and OSPFv3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1009

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1009OSPFv2 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1010OSPFv3 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1071

    Chapter 37Policy-based Routing (PBR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1083

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1083Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1083

    Chapter 38PIM-Dense Mode (PIM-DM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1091

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1091IPv4 PIM-Dense Mode Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1091

    Chapter 39PIM-Sparse Mode (PIM-SM). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1093

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1093IPv4 PIM-Sparse Mode Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1093IPv6 PIM-Sparse Mode Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1108

    Chapter 40PIM-Source Specific Mode (PIM-SSM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1121

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1121IPv4 PIM Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1121IPv4 PIM-Source Specific Mode COmmands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1121IPv6 PIM Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1123IPv6 PIM-Source Specific Mode Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1123

    Chapter 41Power over Ethernet (PoE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1125

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1125Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1125

    Chapter 42Port Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1133

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1133Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1133

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1133

  • 10

    Chapter 43Private VLAN (PVLAN). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1139

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1139Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1139

    Private VLAN Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1139

    Chapter 44Per-VLAN Spanning Tree plus (PVST+) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1149

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1149Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1149

    Chapter 45Quality of Service (QoS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1161

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1161Global Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1161Per-Port QoS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1162Policy-Based QoS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1171

    Important Points to Remember—multicast-bandwidth option . . . . . . . . . . . . . . . . . . . . . . . . . .1185Queue-Level Debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1209

    Chapter 46Router Information Protocol (RIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1221

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1221Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1221

    Chapter 47Remote Monitoring (RMON) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1241

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1241Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1241

    Chapter 48Rapid Spanning Tree Protocol (RSTP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1253

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1253Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1253

    Chapter 49Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1265

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1265Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1265AAA Accounting Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1265Authorization and Privilege Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1269Authentication and Password Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1272RADIUS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1284

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 11

    TACACS+ Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1289Port Authentication (802.1X) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1292

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1293SSH Server and SCP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1301Trace List Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1314Secure DHCP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1324

    Chapter 50Service Provider Bridging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1331

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1331Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1331

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1331

    Chapter 51sFlow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1337

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1337Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1337

    Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1338

    Chapter 52SNMP and Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1349

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1349SNMP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1349

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1350Syslog Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1367

    Chapter 53SONET. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1381

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1381Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1381

    Chapter 54S-Series Stacking Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1401

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1401Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1401

    Chapter 55Storm Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1411

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1411Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1411

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1411

  • 12

    Chapter 56Spanning Tree Protocol (STP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1421

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1421Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1421

    Chapter 57Time and Network Time Protocol (NTP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1431

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1431Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1431

    Chapter 58VLAN Stacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1447

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1447Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1447

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1447

    Chapter 59Virtual Routing and Forwarding (VRF). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1457

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1457Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1457

    Chapter 60Virtual Router Redundancy Protocol (VRRP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1465

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1465IPv4 VRRP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1465IPv6 VRRP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1476

    Chapter 61C-Series Diagnostics and Debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1481

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1481Inter-process Communication Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1481RPM Management Port Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1487Data Path Debugging Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1489Interface Troubleshooting Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1492Advanced ASIC Debugging Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1496ACL and System-Flow Debug Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1500Interface Management Debug Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1503Layer 2 Debug Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1505Trace Logging Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1506Offline Diagnostic Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1512PoE Hardware Status Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1514Buffer Tuning Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1515

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 13

    Chapter 62E-Series ExaScale Debugging and Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1523

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1523Diagnostics and Monitoring Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1523

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1524Offline Diagnostic Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1542Hardware Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1545

    Chapter 63E-Series Debugging and Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1569

    Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1569Diagnostics and Monitoring Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1569

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1570Offline Diagnostic Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1591Hardware Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1593

    Chapter 64S-Series Debugging and Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1613

    Diagnostics and Monitoring Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1613Offline Diagnostic Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1614

    Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1614Buffer Tuning Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1616Hardware Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1621

    Appendix AICMP Message Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1633

    Appendix BSNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1635

    Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1639

    Command Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1659

  • 14

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 15

    This book provides information on the FTOS Command Line Interface (CLI). It includes some information on the protocols and features found in FTOS and on the Force10 systems supported by FTOS (C-Series c, E-Series e, and S-Series s).

    This chapter includes:

    • Objectives• Audience• Conventions• Related Documents

    ObjectivesThis document is intended as a reference guide for the FTOS command line interface (CLI) commands, with detailed syntax statements, along with usage information and sample output.

    For details on when to use the commands, refer to the FTOS Configuration Guide. That guide contains an Apppendix with a list of the RFCs and MIBs (management information base files) supported.

    AudienceThis document is intended for system administrators who are responsible for configuring or maintaining networks. This guide assumes you are knowledgeable in Layer 2 and Layer 3 networking technologies.

    ConventionsThis document uses the following conventions to describe command syntax:

    Preface About this Guide

    Convention Description

    keyword Keywords are in bold and should be entered in the CLI as listed.

    parameter Parameters are in italics and require a number or word to be entered in the CLI.

    {X} Keywords and parameters within braces must be entered in the CLI.

  • 16 About this Guide

    Information SymbolsTable 1 describes symbols contained in this guide.

    Related DocumentsFor more information about the system, refer to the following documents:

    • FTOS Configuration Guide • Installation and maintenance guides for your system• Release Notes for your system and FTOS version

    [X] Keywords and parameters within brackets are optional.

    x | y Keywords and parameters separated by bar require you to choose one.

    x||y Keywords and parameters separated by a double bar enables you to choose any or all of them.

    Table 1 Information Symbols

    Symbol Brief Description

    DangerThis symbol signals information about hardware handling that could result in injury.

    Caution This symbol signals information about situations that could result in equipment damage or loss of data.

    Warning This symbol signals information about situations that could reduce your component or system performance.

    NoteThis symbol signals important operational information.

    c C-Series This symbol indicates that the selected feature is supported on the C-Series.

    e E-Series This symbol indicates that the selected feature is supported on the E-Series TeraScale AND E-Series ExaScale.

    et E-SeriesTeraScale

    This symbol indicates that the selected feature is supported on the E-Series TeraScale platform only.

    ex E-SeriesExaScale

    This symbol indicates that the selected feature is supported on the E-Series ExaScale platform only.

    s S-Series This symbol indicates that the selected feature is supported on the S-Series.

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 17

  • 18 About this Guide

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 19

    This chapter describes the command structure and command modes. FTOS commands are in a text-based interface that allows you to use launch commands, change the command modes, and configure interfaces and protocols.

    This chapter covers the following topics:

    • Accessing the Command Line• Multiple Configuration Users• Navigating the Command Line Interface• Obtaining Help• Using the Keyword No• Filtering show Commands• Command Modes

    Accessing the Command LineWhen the system boots successfully, you are positioned on the command line in the EXEC mode and not prompted to log in. You can access the commands through a serial console port or a Telnet session. When you Telnet into the switch, you are prompted to enter a login name and password.

    Figure 1 is an example of a successful Telnet login session.

    Figure 1 Login Example

    Once you log into the switch, the prompt provides you with current command-level information (refer to Table 2).

    Chapter 1 CLI Basics

    telnet 172.31.1.53Trying 172.31.1.53...Connected to 172.31.1.53.Escape character is '^]'.Login: usernamePassword: Force10>

  • 20 CLI Basics

    Multiple Configuration UsersWhen a user enters the CONFIGURATION mode and another user(s) is already in that configuration mode, FTOS generates an alert warning message similar to the following:

    Figure 2 Configuration Mode User Alert

    When another user enters the CONFIGURATION mode, FTOS sends a message similar to the following, where the user in this case is “admin” on vty2:

    % Warning: User "admin" on line vty2 "172.16.1.210" is in configuration

    Navigating the Command Line InterfaceThe Command Line Interface (CLI) prompt displayed by FTOS is comprised of:

    • “hostname”— the initial part of the prompt, “Force10” by default. You can change it with the hostname command, as described in hostname.

    • The second part of the prompt, reflecting the current CLI mode, as shown in Table 2.

    The CLI prompt changes as you move up and down the levels of the command structure. Table 2 lists the prompts and their corresponding command levels, called modes. Starting with the CONFIGURATION mode, the command prompt adds modifiers to further identify the mode. The command modes are explained in Command Modes.

    Force10#conf% Warning: The following users are currently configuring the system: User "" on line console0 User "admin" on line vty0 ( 123.12.1.123 ) User "admin" on line vty1 ( 123.12.1.123 ) User "Irene" on line vty3 ( 123.12.1.321 )Force10(conf)#Force10#

    Note: Some of the following modes are not available on C-Series or S-Series.

    Table 2 Command Prompt and Corresponding Command Mode

    Prompt CLI Command Mode

    Force10> EXEC

    Force10# EXEC privilege

    Force10(conf)# CONFIGURATION

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 21

    Obtaining HelpAs soon as you are in a command mode there are several ways to access help.

    • To obtain a list of keywords at any command mode, do the following: — Enter a ? at the prompt or after a keyword. There must always be a space before the

    ?.• To obtain a list of keywords with a brief functional description, do the following:

    — Enter help at the prompt.

    Force10(conf-if)#Force10(conf-if-gi-0/0)#Force10(conf-if-te-0/0)#Force10(conf-if-lo-0)#Force10(conf-if-nu-0)#Force10(conf-if-po-0)#Force10(conf-if-vl-0)#Force10(conf-if-so-0/0)#Force10(conf-if-ma-0/0)#Force10(conf-if-range)#

    INTERFACE

    Force10(config-ext-nacl)#Force10(config-std-nacl)#

    IP ACCESS LIST

    Force10(config-line-aux)#Force10(config-line-console)#Force10(config-line-vty)#

    LINE

    Force10(config-ext-macl)#Force10(config-std-macl)#

    MAC ACCESS LIST

    Force10(config-mon-sess)# MONITOR SESSION

    Force10(config-span)# STP

    Force10(config-mstp)# MULTIPLE SPANNING TREE

    Force10(config-pvst)# Per-VLAN SPANNING TREE Plus

    Force10(config-rstp)# RAPID SPANNING TREE

    Force10(config-gvrp)# PROTOCOL GVRP

    Force10(config-route-map)# ROUTE-MAP

    Force10(conf-nprefixl)# PREFIX-LIST

    Force10(conf-router_rip)# ROUTER RIP

    Force10(conf-redirect-list)# REDIRECT

    Force10(conf-router_bgp)# ROUTER BGP

    Force10(conf-router_ospf)# ROUTER OSPF

    Force10(conf-router_isis)# ROUTER ISIS

    Force10(conf-trace-acl)# TRACE-LIST

    Table 2 Command Prompt and Corresponding Command Mode

    Prompt CLI Command Mode

  • 22 CLI Basics

    • To obtain a list of available options, do the following:— Type a keyword followed by a space and a ?

    • Type a partial keyword followed by a ? — A display of keywords beginning with the partial keyword is listed.

    Figure 3 illustrates the results of entering ip ? at the prompt.

    Figure 3 Partial Keyword Example

    When entering commands, you can take advantage of the following timesaving features:

    • The commands are not case sensitive.• You can enter partial (truncated) command keywords. For example, you can enter int

    gig int interface for the interface gigabitethernet interface command.• Use the TAB key to complete keywords in commands. • Use the up arrow key to display the last enabled command.• Use either the Backspace key or the Delete key to erase the previous character.

    Force10(conf)#ip ?access-list Named access-list as-path BGP autonomous system path filter community-list Add a community list entry domain-list Domain name to complete unqualified host namedomain-lookup Enable IP Domain Name System hostname translationdomain-name Define the default domain name fib FIB configuration commands ftp FTP configuration commands host Add an entry to the ip hostname table max-frag-count Max. fragmented packets allowed in IP re-assemblymulticast-routing Enable IP multicast forwarding name-server Specify addess of name server to use pim Protocol Independent Multicast prefix-list Build a prefix list radius Interface configuration for RADIUS redirect-list Named redirect-list route Establish static routes scp SCP configuration commands source-route Process packets with source routing header optionsssh SSH configuration commands tacacs Interface configuration for TACACS+ telnet Specify telnet options tftp TFTP configuration commands trace-group Named trace-list trace-list Named trace-list Force10(conf)#ip

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 23

    Use the left and right arrow keys to navigate left or right in the FTOS command line. Table 3 defines the key combinations valid at the FTOS command line.

    Using the Keyword NoTo disable, delete, or return to default values, use the no form of the commands. For most commands, if you type the keyword no in front of the command, you will disable that command or delete it from the running configuration. In this document, the no form of the command is discussed in the Command Syntax portion of the command description.

    Filtering show CommandsYou can filter the display output of a show command to find specific information, to display certain information only, or to begin the command output at the first instance of a regular expression or phrase.

    Table 3 Short-cut Keys and their Actions

    Key Combination Action

    CNTL-A Moves the cursor to the beginning of the command line.

    CNTL-B Moves the cursor back one character.

    CNTL-D Deletes character at cursor.

    CNTL-E Moves the cursor to the end of the line.

    CNTL-F Moves the cursor forward one character.

    CNTL-I Completes a keyword.

    CNTL-K Deletes all characters from the cursor to the end of the command line.

    CNTL-L Re-enters the previous command.

    CNTL-N Return to more recent commands in the history buffer after recalling commands with Ctrl-P or the up arrow key

    CNTL-P Recalls commands, beginning with the last command

    CNTL-R Re-enters the previous command.

    CNTL-U Deletes the line.

    CNTL-W Deletes the previous word.

    CNTL-X Deletes the line.

    CNTL-Z Ends continuous scrolling of command outputs.

    Esc B Moves the cursor back one word.

    Esc F Moves the cursor forward one word.

    Esc D Deletes all characters from the cursor to the end of the word.

  • 24 CLI Basics

    When you execute a show command, followed by a pipe ( | ) and one of the parameters listed below and a regular expression, the resulting output either excludes or includes those parameters, as defined by the parameter:

    • display — display additional configuration information• except— display only text that does not match the pattern (or regular expression)• find — search for the first occurrence of a pattern • grep — display text that matches a pattern• no-more — do not paginate the display output • save - copy output to a file for future use

    The grep command option has an ignore-case sub-option that makes the search case-insensitive. For example, the commands:

    • show run | grep Ethernet would return a search result with instances containing a capitalized “Ethernet,” such as interface GigabitEthernet 0/0.

    • show run | grep ethernet would not return the search result, above, because it only searches for instances containing a non-capitalized “ethernet.”

    Executing the command show run | grep Ethernet ignore-case would return instances containing both “Ethernet” and “ethernet.”

    Displaying All OutputTo display the output all at once (not one screen at a time), use the no-more after the pipe. This is similar to the terminal length screen-length command except that the no-more option affects the output of just the specified command.For example:

    Force10#show running-config|no-more

    Filtering Command Output Multiple TimesYou can filter a single command output multiple times. Place the save option as the last filter. For example:

    Force10# command | grep regular-expression | except regular-expression | grep other-regular-expression | find regular-expression | no-more | save

    Note: FTOS accepts a space before or after the pipe, no space before or after the pipe, or any combination. For example:Force10#command | grep gigabit |except regular-expression | find regular-expression

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 25

    Command ModesTo navigate to various CLI modes, you need to use specific commands to launch each mode. Navigation to these modes is discussed in the following sections.

    EXEC Mode When you initially log in to the switch, by default, you are logged into the EXEC mode. This mode allows you to view settings and to enter the EXEC Privilege mode to configure the device. While you are in the EXEC mode, the > prompt is displayed following the “hostname” prompt, as described above. which is “Force10” by default. You can change it with the hostname command. See the command hostname. Each mode prompt is preceded by the hostname.

    EXEC Privilege Mode The enable command accesses the EXEC Privilege mode. If an administrator has configured an “Enable” password, you will be prompted to enter it here.

    The EXEC Privilege mode allows you to access all commands accessible in EXEC mode, plus other commands, such as to clear ARP entries and IP addresses. In addition, you can access the CONFIGURATION mode to configure interfaces, routes, and protocols on the switch. While you are logged in to the EXEC Privilege mode, the # prompt is displayed.

    CONFIGURATION ModeIn the EXEC privilege mode, use the configure command to enter the CONFIGURATION mode and configure routing protocols and access interfaces.

    To enter the CONFIGURATION mode:

    1. Verify that you are logged in to the EXEC Privilege mode.2. Enter the configure command. The prompt changes to include (conf).

    From this mode, you can enter INTERFACE by using the interface command.

    INTERFACE ModeUse the INTERFACE mode to configure interfaces or IP services on those interfaces. An interface can be physical (for example, a Gigabit Ethernet port) or virtual (for example, the Null interface).

    To enter INTERFACE mode:

    1. Verify that you are logged into the CONFIGURATION mode.

    Note: Some of the following modes are not available on C-Series or S-Series.

  • 26 CLI Basics

    2. Enter the interface command followed by an interface type and interface number that is available on the switch.

    3. The prompt changes to include the designated interface and slot/port number, as outlined in Table 4.

    LINE ModeUse the LINE mode to configure console or virtual terminal parameters.

    To enter LINE mode:

    1. Verify that you are logged in to the CONFIGURATION mode.2. Enter the line command. You must include the keywords console or vty and their line

    number available on the switch.The prompt changes to include (config-line-console) or (config-line-vty).

    You can exit this mode by using the exit command.

    TRACE-LIST ModeWhen in the CONFIGURATION mode, use the trace-list command to enter the TRACE-LIST mode and configure a Trace list.

    1. Verify that you are logged in to the CONFIGURATION mode.2. Enter the ip trace-list command. You must include the name of the Trace list. The

    prompt change to include (conf-trace-acl).

    You can exit this mode by using the exit command.

    MAC ACCESS LIST ModeWhile in the CONFIGURATION mode, use the mac access-list standard or mac access-list extended command to enter the MAC ACCESS LIST mode and configure either standard or extended access control lists (ACL).

    Table 4 Interface prompts

    Prompt Interface Type

    Force10(conf-if)# INTERFACE mode

    Force10(conf-if-gi-0/0)# Gigabit Ethernet interface followed by slot/port information

    Force10(conf-if-te-0/0)# Ten Gigabit Ethernet interface followed by slot/port information

    Force10(conf-if-lo-0)# Loopback interface number.

    Force10(conf-if-nu-0)# Null Interface followed by zero

    Force10(conf-if-po-0)# Port-channel interface number

    Force10(conf-if-vl-0)# VLAN Interface followed by VLAN number (range 1 to 4094)

    Force10(conf-if-so-0/0)# SONET interface followed by slot/port information.

    Force10(conf-if-ma-0/0)# Management Ethernet interface followed by slot/port information

    Force10(conf-if-range)# Designated interface range (used for bulk configuration; see interface range).

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 27

    To enter MAC ACCESS LIST mode:

    1. Verify that you are logged in to the CONFIGURATION mode.2. Use the mac access-list standard or mac access-list extended command. You

    must include a name for the ACL.The prompt changes to include (conf-std-macl) or (conf-ext-macl).

    You can return to the CONFIGURATION mode by entering the exit command.

    IP ACCESS LIST ModeWhile in the CONFIGURATION mode, use the ip access-list standard or ip access-list extended command to enter the IP ACCESS LIST mode and configure either standard or extended access control lists (ACL).

    To enter IP ACCESS LIST mode:

    1. Verify that you are logged in to the CONFIGURATION mode.2. Use the ip access-list standard or ip access-list extended command. You must

    include a name for the ACL.The prompt changes to include (conf-std-nacl) or (conf-ext-nacl).

    You can return to the CONFIGURATION mode by entering the exit command.

    ROUTE-MAP ModeWhile in the CONFIGURATION mode, use the route-map command to enter the ROUTE-MAP mode and configure a route map.

    To enter ROUTE-MAP mode:

    1. Verify that you are logged in to the CONFIGURATION mode.2. Use the route-map map-name [permit | deny] [sequence-number] command. The

    prompt changes to include (route-map).

    You can return to the CONFIGURATION mode by entering the exit command.

    PREFIX-LIST ModeWhile in the CONFIGURATION mode, use the ip prefix-list command to enter the PREFIX-LIST mode and configure a prefix list.

    To enter PREFIX-LIST mode:

    1. Verify that you are logged in to the CONFIGURATION mode.2. Enter the ip prefix-list command. You must include a name for the prefix list.The

    prompt changes to include (conf-nprefixl).

    You can return to the CONFIGURATION mode by entering the exit command.

  • 28 CLI Basics

    AS-PATH ACL ModeUse the AS-PATH ACL mode to configure an AS-PATH Access Control List (ACL) on the E-Series. See Chapter 7, Access Control Lists (ACL).

    To enter AS-PATH ACL mode:

    1. Verify that you are logged in to the CONFIGURATION mode.2. Enter the ip as-path access-list command. You must include a name for the AS-PATH

    ACL.The prompt changes to include (config-as-path).

    You can return to the CONFIGURATION mode by entering the exit command.

    IP COMMUNITY LIST ModeUse the IP COMMUNITY LIST mode to configure an IP Community ACL on the E-Series. See Chapter 7, Access Control Lists (ACL).

    To enter IP COMMUNITY LIST mode:

    1. Verify that you are logged in to the CONFIGURATION mode.2. Enter the ip community-list command. You must include a name for the Community

    list.The prompt changes to include (config-community-list).

    You can return to the CONFIGURATION mode by entering the exit command.

    REDIRECT-LIST ModeUse the REDIRECT-LIST mode to configure a Redirect list on the E-Series, as described in Chapter 37, Policy-based Routing (PBR).

    To enter REDIRECT-LIST mode:

    1. Verify that you are logged in to the CONFIGURATION mode.2. Use the ip redirect-list command. You must include a name for the Redirect-list.The

    prompt changes to include (conf-redirect-list).

    You can return to the CONFIGURATION mode by entering the exit command.

    SPANNING TREE ModeUse the STP mode to enable and configure the Spanning Tree protocol, as described in Chapter 56, Spanning Tree Protocol (STP).

    To enter STP mode:

    1. Verify that you are logged into the CONFIGURATION mode.2. Enter the protocol spanning-tree stp-id command.

    You can return to the CONFIGURATION mode by entering the exit command.

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 29

    Per-VLAN SPANNING TREE Plus ModeUse PVST+ mode to enable and configure the Per-VLAN Spanning Tree (PVST+) protocol, as described in Chapter 44, Per-VLAN Spanning Tree plus (PVST+).

    To enter PVST+ mode:

    1. Verify that you are logged into the CONFIGURATION mode.2. Enter the protocol spanning-tree pvst command.

    You can return to the CONFIGURATION mode by entering the exit command.

    RAPID SPANNING TREE ModeUse PVST+ mode to enable and configure the RSTP protocol, as described in Chapter 48, Rapid Spanning Tree Protocol (RSTP).

    To enter RSTP mode:

    1. Verify that you are logged into the CONFIGURATION mode.2. Enter the protocol spanning-tree rstp command.

    You can return to the CONFIGURATION mode by entering the exit command.

    MULTIPLE SPANNING TREE ModeUse MULTIPLE SPANNING TREE mode to enable and configure the Multiple Spanning Tree protocol, as described in Chapter 33, Multiple Spanning Tree Protocol (MSTP).

    To enter MULTIPLE SPANNING TREE mode:

    1. Verify that you are logged into the CONFIGURATION mode.2. Enter the protocol spanning-tree mstp command.

    You can return to the CONFIGURATION mode by entering the exit command.

    PROTOCOL GVRP ModeUse the PROTOCOL GVRP mode to enable and configure GARP VLAN Registration Protocol (GVRP), as described in Chapter 19, GARP VLAN Registration (GVRP).

    To enter PROTOCOL GVRP mode:

    1. Verify that you are logged into the CONFIGURATION mode.2. Enter the protocol gvrp command syntax.

    You can return to the CONFIGURATION mode by entering the exit command.

    Note: The protocol is PVST+, but the plus sign is dropped at the CLI prompt

  • 30 CLI Basics

    ROUTER OSPF ModeUse the ROUTER OSPF mode to configure OSPF, as described in Chapter 36, Open Shortest Path First (OSPFv2 and OSPFv3).

    To enter ROUTER OSPF mode:

    1. Verify that you are logged into the CONFIGURATION mode.2. Use the router ospf {process-id} command.The prompt changes to include

    (conf-router_ospf-id).

    You can switch to the INTERFACE mode by using the interface command or you can switch to the ROUTER RIP mode by using the router rip command.

    ROUTER RIP ModeUse the ROUTER RIP mode to configure RIP on the C-Series or E-Series, as described in Chapter 46, Router Information Protocol (RIP).

    To enter ROUTER RIP mode:

    1. Verify that you are logged into the CONFIGURATION mode.2. Enter the router rip command.The prompt changes to include (conf-router_rip).

    You can switch to the INTERFACE mode by using the interface command or you can switch to the ROUTER OSPF mode by using the router ospf command.

    ROUTER ISIS ModeUse the ROUTER ISIS mode to configure ISIS on the E-Series, as described in Intermediate System to Intermediate System (IS-IS).

    To enter ROUTER ISIS mode:

    1. Verify that you are logged into the CONFIGURATION mode.2. Enter the router isis [tag] command.The prompt changes to include (conf-router_isis).

    You can switch to the INTERFACE mode by using the interface command or you can switch to the ROUTER RIP mode by using the router rip command.

    ROUTER BGP ModeUse the ROUTER BGP mode to configure BGP on the C-Series or E-Series , as described in Chapter 10, Border Gateway Protocol IPv4(BGPv4).

    To enter ROUTER BGP mode:

    1. Verify that you are logged into the CONFIGURATION mode.2. Enter the router bgp as-number command.The prompt changes to include

    (conf-router_bgp).

    You can return to the CONFIGURATION mode by entering the exit command.

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 31

    Determining the Chassis ModeThe chassis mode in FTOS determines which hardware is being supported in an E-Series chassis. The chassis mode is programmed into an EEPROM on the backplane of the chassis and the change takes place only after the chassis is rebooted. Configuring the appropriate chassis mode enables the system to use all the ports on the card and recognize all software features.

  • 32 CLI Basics

  • Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 33

    Overview

    This chapter contains commands needed to manage the configuration files and includes other file management commands found in FTOS. This chapter contains these sections:

    • Basic File Management Commands• Upgrading the C-Series FPGA

    Basic File Management CommandsThe commands included in this chapter are:

    • boot config• boot host• boot network• boot system• boot system gateway• cd• change bootflash-image• copy• copy (Streamline Upgrade)• copy running-config startup-config• delete• dir• download alt-boot-image• download alt-full-image• download alt-system-image• format (C-Series and E-Series)• format flash (S-Series)• logging coredump• logging coredump server• pwd• rename• boot system• show bootvar

    Chapter 2 File Management

  • 34 File Management

    boot config

    • show file• show file-systems• show linecard• show os-version• show running-config• show startup-config• show version• upgrade (E-Series version)• upgrade (C-Series version)• upgrade (S-Series management unit) on page 62• upgrade fpga-image

    boot configce Set the location and name of the configuration file that is loaded at system start-up (or reload)

    instead of the default startup-configuration.

    Syntax boot config {remote-first | rpm0 file-url | rpm1 file-url}

    Parameters

    Defaults Not configured.

    Command Modes CONFIGURATION

    CommandHistory

    UsageInformation

    To display these changes in the show bootvar command output, you must save the running configuration to the startup configuration (copy running-config startup-config or write).

    Force10 Networks strongly recommends using local files for configuration (RPM0 or RPM1 flash or slot0).

    When you specify a file as the boot config file, it is listed in the boot variables (bootvar)as LOCAL CONFIG FILE. If you do not specify a boot config file, then the startup-configuration is used, although the bootvar shows LOCAL CONFIG FILE = variable does not exist. When you specify a boot config file, the switch reloads with that config file, rather than the startup-config. Note that if you specify a local config file which is not present in the specified location, then the startup-configuration is loaded.

    remote-first Enter the keywords remote-first to attempt to load the boot configuration files from a remote location.

    rpm0 Enter the keywords rpm0 first to specify the local boot configuration file for RPM 0.

    rpm1 Enter the keywords rpm1 first to specify the local boot configuration file for RPM 1.

    file-url Enter the location information:• For a file on the internal Flash, enter flash:// followed by the filename.• For a file on the external Flash, enter slot0:// followed by the filename.

    Version 7.5.1.0 Introduced on C-Series

    E-Series original Command

  • boot host

    Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 35

    The write memory command always saves the running-configuration to the file labeled startup-configuration. When using a LOCAL CONFIG FILE other than the startup-config, use the copy command to save any running-configuration changes to that local file.

    Output for show bootvar with no boot configuration configured

    Output for show bootvar with boot configuration configured

    RelatedCommands

    boot hostc e Set the location of the configuration file from a remote host.

    Syntax boot host {primary | secondary} remote-url

    Parameters

    Defaults Not configured.

    Force10#show bootvarPRIMARY IMAGE FILE = flash://FTOS-EF-8.2.1.0.binSECONDARY IMAGE FILE = flash://FTOS-EF-7.6.1.0.binDEFAULT IMAGE FILE = flash://FTOS-EF-7.5.1.0.binLOCAL CONFIG FILE = variable does not existPRIMARY HOST CONFIG FILE = variable does not existSECONDARY HOST CONFIG FILE = variable does not existPRIMARY NETWORK CONFIG FILE = variable does not existSECONDARY NETWORK CONFIG FILE = variable does not existCURRENT IMAGE FILE = flash://FTOS-EF-8.2.1.0.binCURRENT CONFIG FILE 1 = flash://startup-configCURRENT CONFIG FILE 2 = variable does not existCONFIG LOAD PREFERENCE = local firstBOOT INTERFACE GATEWAY IP ADDRESS = variable does not exist

    Force10#show bootvarPRIMARY IMAGE FILE = flash://FTOS-EF-8.2.1.0.binSECONDARY IMAGE FILE = flash://FTOS-EF-7.6.1.0.binDEFAULT IMAGE FILE = flash://FTOS-EF-7.5.1.0.binLOCAL CONFIG FILE = variable does not existPRIMARY HOST CONFIG FILE = variable does not existSECONDARY HOST CONFIG FILE = variable does not existPRIMARY NETWORK CONFIG FILE = variable does not existSECONDARY NETWORK CONFIG FILE = variable does not existCURRENT IMAGE FILE = flash://FTOS-EF-8.2.1.0.binCURRENT CONFIG FILE 1 = flash://CustomerA.cfgCURRENT CONFIG FILE 2 = variable does not existCONFIG LOAD PREFERENCE = local firstBOOT INTERFACE GATEWAY IP ADDRESS = variable does not exist

    show bootvar Display the variable settings for the E-Series boot parameters.

    primary Enter the keywords primary to attempt to load the primary host configuration files.

    secondary Enter the keywords secondary to attempt to load the secondary host configuration files.

    remote-url Enter the following location keywords and information:• For a file on an FTP server, enter ftp://user:password@hostip/

    filepath• For a file on a TFTP server, enter tftp://hostip/filepath

  • 36 File Management

    boot network

    Command Modes CONFIGURATION

    CommandHistory

    UsageInformation

    To display these changes in the show bootvar command output, you must save the running configuration to the startup configuration (using the copy command).

    RelatedCommands

    boot networkc e Set the location of the configuration file in a remote network.

    Syntax boot network {primary | secondary} remote-url

    Parameters

    Defaults None

    Command Modes CONFIGURATION

    CommandHistory

    UsageInformation

    To display these changes in the show bootvar command output, you must save the running configuration to the startup configuration (using the copy command).

    RelatedCommands

    Version 7.5.1.0 Introduced on C-Series

    E-Series original Command

    show bootvar Display the variable settings for the E-Series boot parameters.

    primary Enter the keywords primary to attempt to load the primary network configuration files.

    secondary Enter the keywords secondary to attempt to load the secondary network configuration files.

    remote-url Enter the following location keywords and information:• For a file on an FTP server, enter ftp://user:password@hostip/filepath• For a file on a TFTP server, enter tftp://hostip/filepath

    Version 7.5.1.0 Introduced on C-Series

    E-Series original Command

    show bootvar Display the variable settings for the E-Series boot parameters.

  • boot system

    Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 37

    boot systemc e Tell the system where to access the FTOS image used to boot the system.

    Syntax boot system {rpm0 | rpm1} (default | primary | secondary} file-url

    Parameters

    Defaults Not configured.

    Command Modes CONFIGURATION

    CommandHistory

    UsageInformation

    To display these changes in the show bootvar command output, you must save the running configuration to the startup configuration (using the copy command) and reload system.

    RelatedCommands

    boot system gatewayc e Specify the IP address of the default next-hop gateway for the management subnet.

    Syntax boot system gateway ip-address

    Parameters

    Command Modes CONFIGURATION

    rpm0 Enter the keyword rpm0 to configure boot parameters for RPM0.

    rpm1 Enter the keyword rpm1 to configure boot parameters for RPM1.

    default After entering rpm0 or rpm1, enter the keyword default to specify the parameters to be used if those specified by primary or secondary fail. The default location should always be the internal flash device (flash:), so that you can be sure that a verified image is available there.

    primary After entering rpm0 or rpm1, enter the keyword primary to configure the boot parameters used in the first attempt to boot FTOS.

    secondary After entering rpm0 or rpm1, enter the keyword secondary to configure boot parameters used if the primary operating system boot selection is not available.

    file-url To boot from a file:• on the internal Flash, enter flash:// followed by the filename.• on an FTP server, enter ftp://user:password@hostip/filepath• on the external Flash, enter slot0:// followed by the filename.• on a TFTP server, enter tftp://hostip/filepath

    Version 7.5.1.0 Introduced on C-Series

    E-Series original Command

    change bootflash-image Change the primary, secondary, or default boot image configuration.

    boot system gateway Specify the IP address of the default next-hop gateway for the management subnet.

    ip-address Enter an IP address in dotted decimal format.

  • 38 File Management

    cd

    UsageInformation

    Saving the address to the startup configuration file preserves the address in NVRAM in case the startup configuration file is deleted.

    CommandHistory

    RelatedCommands

    cd c e s Change to a different working directory.

    Syntax cd directory

    Parameters

    Command Modes EXEC Privilege

    CommandHistory

    change bootflash-imagec e Change boot flash image from which to boot.

    Syntax change bootflash-image {cp | linecard linecard-slot | rp}

    Parameters

    Defaults Not configured.

    Command Modes EXEC Privilege

    Version 7.5.1.0 Introduced on C-Series

    E-Series original Command

    change bootflash-image Change the primary, secondary, or default boot image configuration.

    directory (OPTONAL) Enter one of the following:• flash: (internal Flash) or any sub-directory• slot0: (external Flash) or any sub-directory (C-Series and E-Series only)

    Version 7.6.1.0 Introduced on S-Series

    Version 7.5.1.0 Introduced on C-Series

    E-Series original Command

    cp Enter the keyword cp to change the bootflash image on the Control Processor on the RPM.

    linecard linecard-slot Enter the keyword linecard followed by the slot number to change the bootflash image on a specific line card.C-Series Range: 0-7 E-Series Range: 0 to 13 on the E1200; 0 on 6 on the E600, and 0 to 5 on the E300.

    rp Enter the keyword rp to change the bootflash image on the RPM Route Processor.

  • copy

    Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 39

    CommandHistory

    UsageInformation

    A system message appears stating that the bootflash image has been changed. You must reload the system before the system can switch to the new bootflash image.

    copyc e s Copy one file to another location.

    Syntax copy source-file-url destination-file-url

    Parameters

    Command Modes EXEC Privilege

    CommandHistory

    UsageInformation

    FTOS supports a maximum of 100 files, at the root directory level, on both the internal and external Flash.

    The usbflash and rpm0usbflash commands are supported on E-Series ExaScale platform only. Refer to the FTOS Release Notes for a list of approved USB vendors.

    When copying a file to a remote location (for example, using Secure Copy (SCP)), enter only the keywords and FTOS prompts you for the rest of the information.

    Version 7.5.1.0 Introduced on C-Series

    E-Series original Command

    file-url Enter the following location keywords and information:• To copy a file from the internal FLASH, enter flash:// followed by the filename.• To copy a file on an FTP server, enter ftp://user:password@hostip/filepath• To copy a file from the internal FLASH on RPM0, enter rpm0flash://filepath• To copy a file from the external FLASH on RPM0, enter rpm0slot0://filepath• To copy a file from the internal FLASH on RPM1, enter rpm1flash://filepath• To copy a file from the external FLASH on RPM1, enter rpm1slot0://filepath• To copy the running configuration, enter the keyword running-config.• To copy the startup configuration, enter the keyword startup-config.• To copy using Secure Copy (SCP), enter the keyword scp: (If scp: is entered in

    the source position, then enter the target URL; If scp: is entered in the target position, first enter the source URL; see below for examples.)

    • To copy a file on the external FLASH, enter slot0:// followed by the filename.• To copy a file on a TFTP server, enter tftp://hostip/filepath

    ExaScale only• To copy a file from a USB drive on RPM0, enter rpm0usbflash://filepath• To copya file from an external USB drive, enter usbflash://filepath

    Version 8.2.1.0 Added usbflash and rpm0usbflash commands on E-Series ExaScale

    Version 7.6.1.0 Introduced on S-Series and added SSH port number to SCP prompt sequence on all systems.

    Version 7.5.1.0 Introduced on C-Series

    E-Series original Command

  • 40 File Management

    copy (Streamline Upgrade)

    For example, when using SCP, you can enter copy running-config scp: The running-config is the source, and the target is specified in the ensuing prompts. FTOS prompts you to enter any required information, as needed for the named destination—remote destination, destination filename, user ID and password, etc.

    When you use the copy running-config startup-config command to copy the running configuration (the startup configuration file amended by any configuration changes made since the system was started) to the startup configuration file, FTOS creates a backup file on the internal flash of the startup configuration.

    FTOS supports copying the running-configuration to a TFTP server or to an FTP server:

    copy running-config tftp:

    copy running-config ftp:

    Command Example: copy running-config scp:

    In this example — copy scp: flash: — specifying SCP in the first position indicates that the target is to be specified in the ensuing prompts. Entering flash: in the second position means that the target is the internal Flash. In this example the source is on a secure server running SSH, so the user is prompted for the UDP port of the SSH server on the remote host.

    Using scp to copy from an SSH Server

    RelatedCommands

    copy (Streamline Upgrade)c e Copy a system image to a local file and update the boot profile.

    Syntax copy source-url target-url [boot-image [synchronize-rpm [external]]]

    Parameters

    Force10#copy running-config scp:/Address or name of remote host []: 10.10.10.1Destination file name [startup-config]? old_runningUser name to login remote host? sburgessPassword to login remote host? dilling

    Force10#copy scp: flash:Address or name of remote host []: 10.11.199.134Port number of the server [22]: 99Source file name []: test.cfgUser name to login remote host: adminPassword to login remote host: Destination file name [test.cfg]: test1.cfg

    cd Change working directory.

    source-url Enter the source file in url format. The source file is a valid Force10 release image. Image validation is automatic.

    target-url Enter the local target file in url format.

  • copy running-config startup-config

    Command Line Reference for FTOS version 8.3.2.0 Publication Date: July 9, 2010 41

    Defaults No default behavior

    Command Modes CONFIGURATION

    CommandHistory

    UsageInformation

    In this streamline copy command, the source image is copied to the primary RPM and then, if specified, to the standby RPM. After the copy is com