Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Part No. 316862-B Rev 00 March 2004 4655 Great America Parkway Santa Clara, CA 95054 Command Line Interface Reference for the Passport 1600 Series Layer 3 Switch, Version 1.1 *316862-B Rev 00* 2 Copyright © 2004 Nortel Networks All rights reserved. March 2004. The information in this document is subject to change without notice. The statements, configurations, technical data, and recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty. Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks Inc. The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of that license. The software license agreement is included in this document. Trademarks Nortel Networks, the Nortel Networks logo, the Globemark, Unified Networks, and PASSPORT are trademarks of Nortel Networks. Adobe and Acrobat Reader are trademarks of Adobe Systems Incorporated. Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation. IPX is a trademark of Novell, Inc. SSH is a trademark of SSH Communication Security TACACS+ is a trademark of Cisco Systems SecureCRT is a trademark of VanDyke Software, Inc. SecureNetterm is a trademark of InterSoft International, Inc. AbsoluteTelnet is a trademark of Celestial Software PenguiNet is a trademark of Silicon Circus Ltd. F-Secure is a trademark of F-Secure Corporation The asterisk after a name denotes a trademarked item. Restricted rights legend Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013. Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer software, the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth in the Commercial Computer Software-Restricted Rights clause at FAR 52.227-19. Statement of conditions In the interest of improving internal design, operational function, and/or reliability, Nortel Networks Inc. reserves the right to make changes to the products described in this document without notice. Nortel Networks Inc. does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein. Portions of the code in this software product may be Copyright © 1988, Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms of such portions are permitted, provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that such portions of the software were 316862-B Rev 00 3 developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from such portions of the software without specific prior written permission. SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED “AS IS” AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. In addition, the program and information contained herein are licensed only pursuant to a license agreement that contains restrictions on use and disclosure (that may incorporate by reference certain limitations and notices imposed by third parties). Nortel Networks Inc. software license agreement This Software License Agreement (“License Agreement”) is between you, the end-user (“Customer”) and Nortel Networks Corporation and its subsidiaries and affiliates (“Nortel Networks”). PLEASE READ THE FOLLOWING CAREFULLY. YOU MUST ACCEPT THESE LICENSE TERMS IN ORDER TO DOWNLOAD AND/OR USE THE SOFTWARE. USE OF THE SOFTWARE CONSTITUTES YOUR ACCEPTANCE OF THIS LICENSE AGREEMENT. If you do not accept these terms and conditions, return the Software, unused and in the original shipping container, within 30 days of purchase to obtain a credit for the full purchase price. “Software” is owned or licensed by Nortel Networks, its parent or one of its subsidiaries or affiliates, and is copyrighted and licensed, not sold. Software consists of machine-readable instructions, its components, data, audio-visual content (such as images, text, recordings or pictures) and related licensed materials including all whole or partial copies. Nortel Networks grants you a license to use the Software only in the country where you acquired the Software. You obtain no rights other than those granted to you under this License Agreement. You are responsible for the selection of the Software and for the installation of, use of, and results obtained from the Software. 1. Licensed Use of Software. Nortel Networks grants Customer a nonexclusive license to use a copy of the Software on only one machine at any one time or to the extent of the activation or authorized usage level, whichever is applicable. To the extent Software is furnished for use with designated hardware or Customer furnished equipment (“CFE”), Customer is granted a nonexclusive license to use Software only on such hardware or CFE, as applicable. Software contains trade secrets and Customer agrees to treat Software as confidential information using the same care and discretion Customer uses with its own similar information that it does not wish to disclose, publish or disseminate. Customer will ensure that anyone who uses the Software does so only in compliance with the terms of this Agreement. Customer shall not a) use, copy, modify, transfer or distribute the Software except as expressly authorized; b) reverse assemble, reverse compile, reverse engineer or otherwise translate the Software; c) create derivative works or modifications unless expressly authorized; or d) sublicense, rent or lease the Software. Licensors of intellectual property to Nortel Networks are beneficiaries of this provision. Upon termination or breach of the license by Customer or in the event designated hardware or CFE is no longer in use, Customer will promptly return the Software to Nortel Networks or certify its destruction. Nortel Networks may audit by remote polling or other reasonable means to determine Customer’s Software activation or usage levels. If suppliers of third party software included in Software require Nortel Networks to include additional or different terms, Customer agrees to abide by such terms provided by Nortel Networks with respect to such third party software. 2. Warranty. Except as may be otherwise expressly agreed to in writing between Nortel Networks and Customer, Software is provided “AS IS” without any warranties (conditions) of any kind. NORTEL NETWORKS DISCLAIMS ALL WARRANTIES (CONDITIONS) FOR THE SOFTWARE, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OF NON-INFRINGEMENT. Nortel Networks is not obligated to provide support of any kind for the Software. Some jurisdictions do not allow exclusion of implied warranties, and, in such event, the above exclusions may not apply. 3. Limitation of Remedies. IN NO EVENT SHALL NORTEL NETWORKS OR ITS AGENTS OR SUPPLIERS BE LIABLE FOR ANY OF THE FOLLOWING: a) DAMAGES BASED ON ANY THIRD PARTY CLAIM; b) LOSS OF, OR DAMAGE TO, CUSTOMER’S RECORDS, FILES OR DATA; OR c) DIRECT, INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES (INCLUDING LOST PROFITS OR SAVINGS), Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.0 4 WHETHER IN CONTRACT, TORT OR OTHERWISE (INCLUDING NEGLIGENCE) ARISING OUT OF YOUR USE OF THE SOFTWARE, EVEN IF NORTEL NETWORKS, ITS AGENTS OR SUPPLIERS HAVE BEEN ADVISED OF THEIR POSSIBILITY. The forgoing limitations of remedies also apply to any developer and/or supplier of the Software. Such developer and/or supplier is an intended beneficiary of this Section. Some jurisdictions do not allow these limitations or exclusions and, in such event, they may not apply. 4. General a. If Customer is the United States Government, the following paragraph shall apply: All Nortel Networks Software available under this License Agreement is commercial computer software and commercial computer software documentation and, in the event Software is licensed for or on behalf of the United States Government, the respective rights to the software and software documentation are governed by Nortel Networks standard commercial license in accordance with U.S. Federal Regulations at 48 C.F.R. Sections 12.212 (for non-DoD entities) and 48 C.F.R. 227.7202 (for DoD entities). b. Customer may terminate the license at any time. Nortel Networks may terminate the license if Customer fails to comply with the terms and conditions of this license. In either event, upon termination, Customer must either return the Software to Nortel Networks or certify its destruction. c. Customer is responsible for payment of any taxes, including personal property taxes, resulting from Customer’s use of the Software. Customer agrees to comply with all applicable laws including all applicable export and import laws and regulations. d. Neither party may bring an action, regardless of form, more than two years after the cause of the action arose. e. The terms and conditions of this License Agreement form the complete and exclusive agreement between Customer and Nortel Networks. f. This License Agreement is governed by the laws of the country in which Customer acquires the Software. If the Software is acquired in the United States, then this License Agreement is governed by the laws of the state of New York. 316862-B Rev 00 5 Contents Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Text conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Hard-copy technical manuals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 How to get help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Setting up the switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Connecting a terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Setting the switch's IP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Logging on to the system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Entering CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Editing commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Displaying multiple pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Understanding top-level commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Managing switch operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Roadmap of basic switch CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Creating an admin or user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Configuring an existing user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Showing an existing user account configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Deleting an existing user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Configuring the command history list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Displaying the command history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Displaying all commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Showing current switch management sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Showing the current status of the switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 6 Contents Showing the current status of the switch serial port . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Configuring the switch’s serial port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Enabling CLI paging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Disabling CLI paging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Enabling Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Disabling Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Enabling the Web-based manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Disabling the Web-based manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Saving the current switch configuration to NV-RAM . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Managing files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Downloading switch firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Downloading a configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Uploading a configuration file to a TFTP server . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Uploading a log file to a TFTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Rebooting the switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Resetting the switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Logging in to the switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Logging out of the switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Configuring ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Roadmap of port configuration CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Configuring ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Displaying the current port configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Configuring the management port — 1612G and 1624G . . . . . . . . . . . . . . . . . . . . . . 78 Displaying the current management port configuration . . . . . . . . . . . . . . . . . . . . . 79 Configuring Spanning Tree. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Roadmap of Spanning Tree CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Configuring STP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Enabling STP on the switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Disabling STP on the switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Displaying STP status on the switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Displaying STP port group status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Roadmap of security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 316862-B Rev 00 Contents 7 Syslog commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 SSH commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 TACACS+ commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Password Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Password format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 System Log Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Receiving system log messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Creating a Syslog host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Configuring a Syslog host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Configuring the maximum number of Syslog hosts . . . . . . . . . . . . . . . . . . . . . . . 112 Deleting a Syslog host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Enabling a Syslog host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Disabling a Syslog host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Displaying the current Syslog configuration on the Switch . . . . . . . . . . . . . . . . . 116 Enabling and disabling logging on the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Uploading the Switch’s log and configuration to a TFTP server . . . . . . . . . . . . . . . . 118 Configuring Password aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Displaying the Password aging time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Configuring the Switch’s Secure Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Displaying the Switch’s current secure mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 Secure Shell (SSH) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 SSH version 2 (SSH-2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Supported SSH clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 Using the CLI to configure SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 Configuring Secure Shell (SSH) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Creating a User account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Configuring the SSH authorization mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Displaying the Switch’s current SSH authorization mode . . . . . . . . . . . . . . . . . . 133 Updating an SSH user account’s authorization mode . . . . . . . . . . . . . . . . . . . . . 133 Configuring the SSH encryption algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Displaying the Current SSH encryption algorithm . . . . . . . . . . . . . . . . . . . . . . . . 137 Displaying the Switch’s current SSH Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Configuring the SSH Server on the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Displaying the current SSH Server configuration . . . . . . . . . . . . . . . . . . . . . . . . 141 Enabling and disabling the SSH Server on the Switch . . . . . . . . . . . . . . . . . . . . 142 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 8 Contents Configuring the SSH Server to regenerate its hostkey . . . . . . . . . . . . . . . . . . . . 142 TACACS+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Creating an entry to the Switch’s TACACS+ Server table . . . . . . . . . . . . . . . . . . 144 Configuring a TACACS+ Server entry on the Switch . . . . . . . . . . . . . . . . . . . . . 145 Displaying the Switch’s TACACS+ Server table . . . . . . . . . . . . . . . . . . . . . . . . . 146 Deleting an entry from the Switch’s TACACS+ Server table . . . . . . . . . . . . . . . . 147 Enabling admin-level privileges for a user-level account . . . . . . . . . . . . . . . . . . . 148 Assigning a password to the “local enable” method . . . . . . . . . . . . . . . . . . . . . . 149 Configuring the login authentication settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 Configuring the authentication settings on the Switch . . . . . . . . . . . . . . . . . . . . . 150 Configuring the authentication settings on the Switch used to promote users from user-level privileges to admin-level privileges . . . . . . . . . . . . . . . . . . . . . . . . . 152 Enabling authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 Disabling authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Displaying the Switch’s current authentication settings . . . . . . . . . . . . . . . . . . . . 156 Configuring VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Configuring Layer 2 operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 Roadmap of VLAN CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 Creating a VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 Deleting a VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Adding ports to a VLAN configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Deleting ports from a VLAN configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Displaying a VLAN configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Configuring Layer 3 operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Roadmap of IP interface CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 Creating an IP interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 Configuring an IP interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 Deleting an IP interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Configuring the System IP interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Enabling an IP interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Disabling an IP interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Displaying the current IP interface configuration . . . . . . . . . . . . . . . . . . . . . . . . . 172 Using the forwarding database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Roadmap of forwarding database CLI commands . . . . . . . . . . . . . . . . . . . . . . . 175 Creating a unicast forwarding database entry . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 316862-B Rev 00 Contents 9 Configuring a unicast forwarding database entry . . . . . . . . . . . . . . . . . . . . . . . . 176 Creating a multicast forwarding database entry . . . . . . . . . . . . . . . . . . . . . . . . . 177 Configuring the multicast forwarding database . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Deleting an entry from the forwarding database . . . . . . . . . . . . . . . . . . . . . . . . . 179 Clearing the forwarding database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 Displaying the multicast forwarding database . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Displaying the unicast forwarding database . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Configuring link aggregation groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 Roadmap of CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Creating a link aggregation group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Deleting a link aggregation group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Configuring a link aggregation group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Displaying the link aggregation configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Configuring QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Roadmap of CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 Establishing a QoS scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 QoS templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 Security mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 QoS mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 L4 switch mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 Command overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 Configuring the flow classifier template operating mode . . . . . . . . . . . . . . . . . . . . . . 196 Configuring flow classifier template mode parameters . . . . . . . . . . . . . . . . . . . . . . . 198 Displaying the flow classifier template mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 Attaching a flow classifier template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Creating an IP filter for a flow classification template . . . . . . . . . . . . . . . . . . . . . . . . . 202 Deleting an IP filter from a flow classification template . . . . . . . . . . . . . . . . . . . . . . . 204 Creating a destination IP address filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Deleting a destination IP address filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Displaying the destination IP address filter table . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Creating a QoS rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Deleting a QoS rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 Creating a Layer 4 switch rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Deleting a Layer 4 switch rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 10 Contents Creating a forwarding database filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 Deleting a forwarding database filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 Displaying a forwarding database filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Enabling the IP fragment filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Disabling the IP fragment filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 Displaying the status of the IP fragment filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 Configuring scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 Creating a MAC priority entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 Deleting a MAC priority entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 Displaying MAC priority entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Configuring traffic filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 Configuring destination IP filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 Roadmap of destination IP address filter CLI commands . . . . . . . . . . . . . . . . . . 230 Creating a destination IP address filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Deleting a destination IP address filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Displaying the destination IP address filter table . . . . . . . . . . . . . . . . . . . . . . . . . 233 Configuring MAC address filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 Roadmap of MAC address filter CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . 234 Creating a MAC address filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Deleting a MAC address filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Displaying MAC address filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Configuring an ARP request rate limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Roadmap of ARP request rate limit CLI commands . . . . . . . . . . . . . . . . . . . . . . 238 Configuring the ARP request rate limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Enabling the ARP request rate limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Disabling the ARP request rate limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 Displaying the ARP request rate limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 Configuring broadcast control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 Roadmap of broadcast control CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . 243 Configuring traffic control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 Displaying traffic control settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Configuring ARP, RIP, and OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Configuring ARP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Roadmap of ARP CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 316862-B Rev 00 Contents 11 Creating an ARP entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Deleting an ARP entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 Configuring the ARP aging time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 Displaying the current ARP entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 Clearing the ARP table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 Configuring an ARP request rate limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Roadmap of ARP request rate limit CLI commands . . . . . . . . . . . . . . . . . . . . . . 253 Configuring the ARP request rate limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 Enabling the ARP request rate limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Disabling the ARP request rate limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Displaying the ARP request rate limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Configuring RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 Roadmap of RIP CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Configuring RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 Enabling RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Disabling RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 Displaying the current RIP configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 Configuring OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Roadmap of OSPF CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 Enabling OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 Disabling OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Configuring the OSPF router ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Displaying the current OSPF configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 Creating an OSPF area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 Deleting an OSPF area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 Configuring an OSPF area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 Displaying the current OSPF area configuration . . . . . . . . . . . . . . . . . . . . . . . . . 272 Creating an OSPF host route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 Configuring an OSPF host route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Displaying the currently configured OSPF host routes . . . . . . . . . . . . . . . . . . . . 275 Deleting an OSPF host route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 Creating an OSPF area aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 Deleting an OSPF area aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Configuring an OSPF area aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 Displaying the currently configured OSPF area aggregations . . . . . . . . . . . . . . . 280 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 12 Contents Displaying the current OSPF LSDB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281 Displaying the current OSPF neighbor table . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 Displaying the current OSPF virtual neighbor table . . . . . . . . . . . . . . . . . . . . . . . 283 Configuring an OSPF IP interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 Displaying currently configured OSPF IP interfaces . . . . . . . . . . . . . . . . . . . . . . 285 Creating an OSPF virtual link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 Configuring an OSPF virtual link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Deleting an OSPF virtual link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 Displaying the currently configured OSPF virtual links . . . . . . . . . . . . . . . . . . . . 290 Configuring OSPF packet authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291 Roadmap of MD5 CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 Creating an entry to the MD5 key table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 Deleting an MD5 key table entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Configuring an MD5 key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Displaying the current MD5 key table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 Configuring IP routes and route redistribution. . . . . . . . . . . . . . . . . . . . . 297 Using the route table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 Roadmap of route table CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 Creating an IP route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 Creating a default IP route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Creating an IP route using a network address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Deleting an IP route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 Displaying the IP routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 Configuring IP routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 Configuring default IP routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 Configuring IP routes with max static routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Using route redistribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306 Roadmap of route redistribution CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 Creating a route redistribution from RIP to OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 Creating a route redistribution from OSPF to RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . 309 Deleting a route redistribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311 Configuring a route redistribution between RIP and OSPF . . . . . . . . . . . . . . . . . . . . 312 Configuring a route redistribution between OSPF and RIP . . . . . . . . . . . . . . . . . . . . 314 Displaying the route redistribution settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315 316862-B Rev 00 Contents 13 Configuring VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317 Roadmap of VRRP features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 Creating a VRRP IP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319 Configuring a VRRP IP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 Displaying a VRRP IP interface configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 Deleting a VRRP IP interface configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 Enabling a VRRP IP interface configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 Disabling a VRRP IP interface configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 Configuring BootP and DNS relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 Configuring BootP relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 Roadmap of BootP relay commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 Configuring BootP relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 Adding a BootP relay address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 Deleting a BootP relay address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 Enabling BootP relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Disabling BootP relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Displaying the current BootP relay configuration . . . . . . . . . . . . . . . . . . . . . . . . . 337 Configuring DNS relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338 Roadmap of DNS relay CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 Configuring DNS relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 Enabling DNS relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 Disabling DNS relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 Enabling the DNS relay cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 Disabling the DNS relay cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 Enabling the DNS static table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Disabling the DNS static table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Displaying the current DNS relay configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 344 Configuring SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 Roadmap of SNMP CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 Configuring SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348 Creating an SNMP community string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348 Deleting an SNMP community string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 14 Contents Creating a trusted host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 Deleting a trusted host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 Configuring an SNMP community string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 Configuring the SNMP system name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353 Configuring the SNMP location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353 Configuring the SNMP system contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354 Displaying the current SNMP configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355 Displaying the currently configured trusted hosts . . . . . . . . . . . . . . . . . . . . . . . . 357 Managing SNMP traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358 Creating an SNMP trap receiver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358 Deleting an SNMP trap receiver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359 Enabling the transmission of SNMP traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 Disabling the transmission of SNMP traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 Enabling the authentication of SNMP traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 Disabling the authentication of SNMP traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) . . . . . . . 363 Configuring IGMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 Roadmap of IGMP commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364 Configuring IGMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Displaying IGMP settings for all IP interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 Displaying the IGMP group settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368 Configuring IGMP snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368 Configuring IGMP snooping querier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 Configuring router ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 Enabling IGMP snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 Disabling IGMP snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 Displaying the current IGMP snooping configuration . . . . . . . . . . . . . . . . . . . . . 374 Displaying IGMP snooping groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377 Displaying IGMP snooping forwarding table . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379 Displaying the list of router ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380 Configuring DVMRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 Configuring DVMRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Enabling DVMRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Disabling DVMRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385 316862-B Rev 00 Contents 15 Displaying the current DVMRP routing table . . . . . . . . . . . . . . . . . . . . . . . . . 386 Displaying the current DVMRP neighbor router table . . . . . . . . . . . . . . . . . . 387 Displaying the current DVMRP nexthop router table . . . . . . . . . . . . . . . . . . 388 Displaying the current DVMRP configuration . . . . . . . . . . . . . . . . . . . . . . . . 389 Displaying the Switch’s IP multicast cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389 Roadmap of IP multicast cache commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390 Displaying the Switch’s IP multicast cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390 Displaying the switch’s IP multicast table . . . . . . . . . . . . . . . . . . . . . . . . . . . 392 Monitoring the network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393 Roadmap of network monitoring commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 Displaying port traffic statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395 Displaying port error statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 Displaying port utilization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 Clearing the switch counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401 Clearing the switch log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 Displaying the switch log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 Configuring port mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 Configuring a mirror port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404 Deleting a mirror port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404 Enabling a mirror port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405 Disabling a mirror port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406 Displaying the current mirror settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406 Enabling and disabling RMON . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 Checking network links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408 Determining the network route using traceroute . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409 CLI configuration examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411 Resetting the switch to its factory defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412 Configuring the default VLAN for management access . . . . . . . . . . . . . . . . . . . . . . . 412 Configuration example — configuring the default VLAN . . . . . . . . . . . . . . . . . . . 413 Viewing the VLAN and IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414 Downloading firmware and uploading configuration files . . . . . . . . . . . . . . . . . . . . . . 415 Creating new port-based VLANS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416 Configuration example — creating port-based VLANs . . . . . . . . . . . . . . . . . . . . 416 Viewing VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 16 Contents Viewing the forwarding database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417 Disabling Spanning Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419 Configuration example — disabling Spanning Tree . . . . . . . . . . . . . . . . . . . . . . 419 Viewing Spanning Tree status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419 Configuring link aggregation groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420 Configuration example — configuring link aggregation groups . . . . . . . . . . . . . . 421 Enabling OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421 Configuration example — enabling OSPF globally . . . . . . . . . . . . . . . . . . . . . . . 422 Viewing OSPF status and routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424 Viewing OSPF neighbor status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 Viewing OSPF LSDB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 Viewing the Passport 1600 Series switch route table . . . . . . . . . . . . . . . . . . . . . 426 Configuring OSPF MD5 authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427 Configuration example — creating an MD5 key . . . . . . . . . . . . . . . . . . . . . . . . . 428 Configuring an OSPF stub area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428 Configuration example — configuring a stub area . . . . . . . . . . . . . . . . . . . . . . . 429 Configuring OSPF route distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430 Configuration example — configuring OSPF route distribution . . . . . . . . . . . . . . 431 Configuring RIP base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433 Configuration example — configuring RIP base . . . . . . . . . . . . . . . . . . . . . . . . . 433 Selecting Tx and Rx RIP v2 mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435 Configuration example — configuring RIP TX and RX mode to v2 . . . . . . . . . . . 436 Configuring broadcast and multicast storm control . . . . . . . . . . . . . . . . . . . . . . . . . . 436 Configuration example — enabling thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . 436 Displaying thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437 Configuring egress queue weight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437 Configuration example — configuring port scheduling . . . . . . . . . . . . . . . . . . . . 438 Configuring QoS and IP filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438 Step 1: Configuring the template mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439 Step 2: Configuring the flow classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439 Configuring the L4_switch flow classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . 439 Configuring the QoS flow classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441 Step 3: Configuring the template rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442 Configuration example — using the L4_switch template . . . . . . . . . . . . . . . 442 Configuration example — using the QoS template . . . . . . . . . . . . . . . . . . . . 442 316862-B Rev 00 Contents 17 Step 4: Binding the template rule to a VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443 Configuration example — adding the template to a VLAN . . . . . . . . . . . . . . 443 Setting QoS priority for destination TCP flows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443 Configuration example — setting QoS Priority for destination TCP flows . . . . . . 444 Dropping TCP flows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445 Configuration example — dropping TCP flows . . . . . . . . . . . . . . . . . . . . . . . . . . 445 Viewing the template rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446 Filtering MAC addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446 Configuration example — filtering MAC addresses . . . . . . . . . . . . . . . . . . . . . . . 447 Viewing the fdb filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447 Configuring forward-to-next-hop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448 Configuration example — forward-next-hop . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448 Filtering IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449 Configuration example — filtering IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . 450 Viewing the IP filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450 Dropping fragmented IP packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 18 Contents 316862-B Rev 00 19 Tables Table 1 Access level and default login value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Table 2 Line editing keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Table 3 Multiple page display keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Table 4 Default severity levels and system log severity levels . . . . . . . . . . . . . . . 97 Table 5 Info log messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Table 6 Warning log messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Table 7 Critical log messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Table 8 Error log messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Table 9 Third party SSH client software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 Table 10 QoS command overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 Table 11 Unicast/multicast ratios for dynamic and static iproute and arp values . 305 Table 12 Allowed values for the OSPF routing metrics . . . . . . . . . . . . . . . . . . . . . 308 Table 13 Allowed values for the routing metrics . . . . . . . . . . . . . . . . . . . . . . . . . . 310 Table 14 config dvmrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 Table 15 enable dvmrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Table 16 disable dvmrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385 Table 17 show dvmrp routing_table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 Table 18 show dvmrp neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 Table 19 show dvmrp next hop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388 Table 20 show dvmrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389 Table 21 IP multicasting cache commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390 Table 22 show ipmc cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390 Table 23 show ipmc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392 Table 24 show packet port definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 20 Tables 316862-B Rev 00 21 Figures Figure 1 Login screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Figure 2 Using the question mark (?) command . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Figure 3 Next possible completions message . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Figure 4 Top-level show command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Figure 5 create account command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Figure 6 config account command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Figure 7 show account command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Figure 8 delete account command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Figure 9 config command_history command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Figure 10 show command_history command output . . . . . . . . . . . . . . . . . . . . . . . . 54 Figure 11 ? command output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Figure 12 dir command output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Figure 13 show session command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Figure 14 show switch command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Figure 15 show session command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Figure 16 config serial port command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Figure 17 enable clipaging command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Figure 18 disable clipaging command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Figure 19 enable telnet command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Figure 20 disable telnet command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Figure 21 enable web command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Figure 22 disable telnet command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Figure 23 save command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Figure 24 download configuration command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Figure 25 upload configuration command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Figure 26 upload log command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Figure 27 reboot command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Figure 28 reset config command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Figure 29 login command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 22 Figures Figure 30 logout command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Figure 31 config ports command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Figure 32 show ports command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Figure 33 config mgmt_port command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Figure 34 show mgmt_port command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Figure 35 config stp command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Figure 36 enable stp command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Figure 37 disable stp command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Figure 38 show stp (enabled) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Figure 39 show stp (disabled) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Figure 40 show stp_ports command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Figure 41 create syslog host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Figure 42 config syslog host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Figure 43 config syslog max_hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Figure 44 delete syslog host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Figure 45 enable syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Figure 46 disable syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Figure 47 show syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Figure 48 config log_state Johnson disabled . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Figure 49 upload configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Figure 50 config password_aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Figure 51 show password_aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Figure 52 config secure_mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Figure 53 show secure_mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 Figure 54 create account command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Figure 55 config ssh authmode command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Figure 56 show ssh authmode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Figure 57 config ssh user command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Figure 58 config ssh algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Figure 59 show ssh algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Figure 60 show ssh user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Figure 61 config ssh server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Figure 62 show ssh server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Figure 63 enable ssh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 Figure 64 config ssh regenerate hostkey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 316862-B Rev 00 Figures 23 Figure 65 create tacacs+_server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 Figure 66 config tacacs+_server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Figure 67 show tacacs+_server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Figure 68 delete tacacs+_server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Figure 69 enable admin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Figure 70 config admin local_password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Figure 71 config admin login_authen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 Figure 72 config authentication login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 Figure 73 config authentication admin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 Figure 74 enable authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Figure 75 disable authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Figure 76 show authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 Figure 77 create vlan command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Figure 78 delete vlan command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Figure 79 config vlan add command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Figure 80 config vlan delete command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Figure 81 show vlan command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Figure 82 create ipif command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 Figure 83 config ipif command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Figure 84 delete ipif command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Figure 85 config ipif System ipaddress command . . . . . . . . . . . . . . . . . . . . . . . . . 171 Figure 86 enable ipif command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Figure 87 disable ipif command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Figure 88 show ipif System command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 Figure 89 create fdb command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Figure 90 config fdb command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Figure 91 create multicast_fdb command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Figure 92 config multicast_fdb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Figure 93 delete fdb command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 Figure 94 clear fdb all command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Figure 95 show multicast_fdb command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Figure 96 show fdb command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Figure 97 create link_aggregation command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Figure 98 delete link_aggregation command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Figure 99 config link_aggregation command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 24 Figures Figure 100 show link_aggregation command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 Figure 101 config flow classifier template_<value 1-2> mode command . . . . . . . . . 197 Figure 102 config flow classifier template_id <value 1-2> mode_parameters . . . . . 200 Figure 103 show flow_classifier command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Figure 104 config flow_classifier vlan <vlan_name> command . . . . . . . . . . . . . . . . 202 Figure 105 create sec_rule command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Figure 106 delete sec_rule command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Figure 107 create dst_ipfilter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Figure 108 delete dst_ipfilter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Figure 109 show dst_ipfilter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Figure 110 create qos_rule command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 Figure 111 delete qos_rule command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Figure 112 create l4_switch_rule command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Figure 113 delete l4_switch_rule command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 Figure 114 create fdbfilter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 Figure 115 delete fdbfilter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Figure 116 show fdbfilter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Figure 117 enable ip_fragment_filter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 Figure 118 disable ip_fragment_filter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 Figure 119 show ip_fragment_filter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 Figure 120 config scheduling command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 Figure 121 create mac_priority command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 Figure 122 delete mac_priority command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Figure 123 show mac_priority command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Figure 124 create dst_ipfilter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Figure 125 delete ipfilter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Figure 126 show dst_ipfilter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Figure 127 create fdbfilter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Figure 128 delete fdbfilter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Figure 129 show fdbfilter command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Figure 130 config arp_req_rate_limit command . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Figure 131 enable arp_req_rate_limit command . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 Figure 132 disable arp_req_rate_limit command . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 Figure 133 show arpentry command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 Figure 134 config traffic control command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 316862-B Rev 00 Figures 25 Figure 135 show traffic control command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 Figure 136 create arpentry command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 Figure 137 delete arpentry command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 Figure 138 config arp_aging time command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 Figure 139 show arpentry command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 Figure 140 clear arptable command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Figure 141 config arp_req_rate_limit command . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Figure 142 enable arp_req_rate_limit command . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Figure 143 disable arp_req_rate_limit command . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Figure 144 show arpentry command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 Figure 145 config rip command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Figure 146 enable rip command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 Figure 147 disable rip command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 Figure 148 show rip command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Figure 149 enable ospf command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Figure 150 disable ospf command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Figure 151 config ospf router_id command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 Figure 152 show ospf command - partial display . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 Figure 153 create ospf area command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 Figure 154 delete ospf area command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 Figure 155 config ospf area command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Figure 156 show ospf area command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 Figure 157 create ospf host_route command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Figure 158 config ospf host_route command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Figure 159 show ospf host_route command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 Figure 160 delete ospf host_route command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 Figure 161 create ospf aggregation command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Figure 162 delete ospf aggregation command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Figure 163 configure ospf aggregation command . . . . . . . . . . . . . . . . . . . . . . . . . . 280 Figure 164 show ospf aggregation command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281 Figure 165 show ospf lsdb command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 Figure 166 show ospf neighbor command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 Figure 167 show ospf virtual_neighbor command . . . . . . . . . . . . . . . . . . . . . . . . . . 283 Figure 168 config ospf ipif command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 Figure 169 show ospf all command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 26 Figures Figure 170 create ospf virtual_link command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Figure 171 config ospf virtual_link command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 Figure 172 delete ospf virtual_link command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 Figure 173 show ospf virtual_link command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291 Figure 174 create md5 key command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 Figure 175 delete md5 key command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Figure 176 config md5 command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 Figure 177 show md5 command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Figure 178 create iproute command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Figure 179 delete iproute command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 Figure 180 show iproute command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 Figure 181 config iproute command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 Figure 182 config iproute default command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Figure 183 config iproute max_static_route command . . . . . . . . . . . . . . . . . . . . . . . 306 Figure 184 create route redistribute dst ospf src rip command . . . . . . . . . . . . . . . . . 309 Figure 185 create route redistribute dst rip src ospf command . . . . . . . . . . . . . . . . . 311 Figure 186 delete route redistribute command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 Figure 187 config route redistribute dst ospf src rip command . . . . . . . . . . . . . . . . . 313 Figure 188 config route redistribute dst rip src ospf command . . . . . . . . . . . . . . . . . 315 Figure 189 show route redistribute command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316 Figure 190 create vrrp ipif . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322 Figure 191 config vrrp ipif . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325 Figure 192 show vrrp ipif . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 Figure 193 delete vrrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 Figure 194 enable vrrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 Figure 195 disable vrrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 Figure 196 config bootp_relay command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 Figure 197 config bootp_relay add command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 Figure 198 config bootp_relay delete command . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 Figure 199 enable bootp_relay command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Figure 200 disable bootp_relay command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Figure 201 show bootp_relay command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 Figure 202 config dnsr command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340 Figure 203 enable dnsr command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 Figure 204 disable dnsr command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 316862-B Rev 00 Figures 27 Figure 205 disable dnsr command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 Figure 206 disable dnsr cache command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 Figure 207 enable dnsr static command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Figure 208 disable dnsr static command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Figure 209 show dnsr static command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344 Figure 210 create snmp community command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349 Figure 211 delete snmp community command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 Figure 212 create trusted_host command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 Figure 213 delete trusted_host command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 Figure 214 config snmp community command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352 Figure 215 config snmp system_name command . . . . . . . . . . . . . . . . . . . . . . . . . . 353 Figure 216 config snmp system_location command . . . . . . . . . . . . . . . . . . . . . . . . . 354 Figure 217 config snmp system_contact command . . . . . . . . . . . . . . . . . . . . . . . . . 355 Figure 218 show snmp command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356 Figure 219 show trusted_host command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357 Figure 220 create snmp trap_receiver command . . . . . . . . . . . . . . . . . . . . . . . . . . . 359 Figure 221 delete snmp trap_receiver command . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 Figure 222 enable snmp command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 Figure 223 disable snmp command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 Figure 224 enable snmp authenticate traps command . . . . . . . . . . . . . . . . . . . . . . . 361 Figure 225 disable snmp authenticate traps command . . . . . . . . . . . . . . . . . . . . . . 362 Figure 226 config igmp command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366 Figure 227 show igmp command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 Figure 228 show igmp group command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368 Figure 229 config igmp_snooping all command . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 Figure 230 config igmp_snooping querier command . . . . . . . . . . . . . . . . . . . . . . . . 371 Figure 231 config router_ports command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 Figure 232 enable igmp_snooping command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 Figure 233 disable igmp_snooping command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374 Figure 234 show igmp_snooping command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376 Figure 235 show igmp_snooping group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378 Figure 236 show igmp_snooping forwarding command . . . . . . . . . . . . . . . . . . . . . . 379 Figure 237 show router_ports command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380 Figure 238 config dvmrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Figure 239 enable dvmrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 28 Figures Figure 240 disable dvmrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385 Figure 241 show dvmrp routing_table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 Figure 242 show dvmrp neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 Figure 243 show dvmrp nexthop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388 Figure 244 show dvmrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389 Figure 245 show ipmc cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391 Figure 246 show ipmc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392 Figure 247 show packet ports command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396 Figure 248 show error ports command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 Figure 249 show utilization command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 Figure 250 clear counters ports command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401 Figure 251 clear log command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 Figure 252 show log command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 Figure 253 config mirror port add command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404 Figure 254 config mirror port delete command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405 Figure 255 enable mirror command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406 Figure 256 disable mirror command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406 Figure 257 show mirror command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 Figure 258 enable rmon command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 Figure 259 disable rmon command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408 Figure 260 ping command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409 Figure 261 traceroute command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410 Figure 262 Configuration example — configuring the default VLAN for access . . . . 413 Figure 263 Configuration example -— creating a new port-based VLAN . . . . . . . . . 416 Figure 264 Configuration example — creating MLT group with ports 27 and 28 . . . 420 Figure 265 Configuration example — enabling OSPF in the default area 0 . . . . . . . 422 Figure 266 Configuration example — MD5 authentication . . . . . . . . . . . . . . . . . . . . 428 Figure 267 Configuration example — OSPF stub area . . . . . . . . . . . . . . . . . . . . . . 429 Figure 268 Configuration example — OSPF route distribution . . . . . . . . . . . . . . . . . 431 Figure 269 Configuration example — RIP base . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433 Figure 270 Configuration example — egress queue weight . . . . . . . . . . . . . . . . . . . 438 Figure 271 Configuration example — setting QoS priority . . . . . . . . . . . . . . . . . . . . 444 Figure 272 Configuration example — dropping TCP flows . . . . . . . . . . . . . . . . . . . . 445 Figure 273 Configuration example — filtering MAC addresses . . . . . . . . . . . . . . . . 447 Figure 274 Configuration example — forward-to-next-hop . . . . . . . . . . . . . . . . . . . . 448 316862-B Rev 00 Figures 29 Figure 275 Configuration example — filtering IP addresses . . . . . . . . . . . . . . . . . . . 450 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 30 Figures 316862-B Rev 00 31 Preface The Passport 1600 is a fixed-port hardware-based Layer 3 routing switch that supports three models: • • • Passport 1612G 12 small form factor (SFP) GBICs, which provides small to medium aggregation Passport 1624G 24 SFP GBICs, which provides small to medium aggregation Passport 1648T 48 10/100, plus 4 SFP GBICs, which provides small edge concentration The Passport 1600 Series Layer 3 routing switch can reside in the wiring closet (1648T) and in the data center or network core (1612G and 1624G). The Passport 1648T provides Layer 3 functionality in the wiring closet with 48 10/100 ports and 4 GBIC ports. The Passport 1612G and 1624G provide 12 and 24 gigabit Ethernet ports for wiring closet aggregation as well as high-speed connections for servers and power users. These types of aggregation devices typically reside in the network core or data center but can be placed anywhere. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 32 Preface This guide provides a reference for all of the commands contained in the Command Line Interface (CLI). You use these commands to configure and manage a Nortel Networks* Passport 1600 Series Layer 3 routing switch (also referred to in this guide as the “Passport 1600 Series switch” or the “switch”) via the serial port or Telnet interfaces. For commands that use the <network_address> variable, enter an IP address and subnet mask. For commands that use the <ip_address> variable, enter an IP address. Before you begin This guide is intended for network administrators with the following background: • • • • 316862-B Rev 00 Basic knowledge of networks, Ethernet bridging, and IP routing Familiarity with networking concepts and terminology Experience with windowing systems or GUIs Basic knowledge of network topologies Preface 33 Text conventions This guide uses the following text conventions angle brackets (< >) Indicates a single alphanumeric or numeric value that you must enter for the command to successfully execute. Example: create ipif <ipif_name> <vlan_name> ipaddress <network_address> {state [enable/disable]} In this example, you must supply an IP interface name in the <ipif_name> space, a VLAN name in the <vlan_name> space, and then network address in the <network_address> space. Do not type the angle brackets. slash (/) Separates sub-commands, parameters, or values in a set. These sub-commands, etc., may be required and mutually exclusive (enclosed in square brackets), or optional (enclosed in braces). Example: show snmp [community/trap receiver/detail] In this example, you must enter either community, trap receiver, or detail to specify which type of SNMP users the switch displays. italic text Indicates new terms, book titles, and variables in command syntax descriptions. Where a variable is two or more words, the words are connected by an underscore. Example: If the command syntax is create ipif <ipif>, <vlan_name> vlan_name is a variable that you substitute a name for. plain Courier text Indicates command syntax and system output, for example, prompts and system messages. Example: show snmp Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 34 Preface square brackets [ ] Indicates sub-commands, parameters, and values which are not optional, and are mutually exclusive. You must enter one of the sub-commands enclosed by angle brackets for the command to successfully execute on the switch. Example: create account [admin/user] In this example, you must enter either admin or user to specify the privilege level of the account you are creating. Do not type the square brackets. braces ({ }) Indicates sub-commands, parameters, and values that are optional, and not mutually exclusive. You can enter one or more of the sub-commands enclosed by braces. If entered, some sub-commands may require a parameter or value. In such cases, the required parameter or value set corresponding to the sub-command is enclosed by square brackets. Example: config igmp [<ipif_name>/all] {version <value>/query_interval <sec>/ max_response_time <sec>/ robustness_variable <value>/ last_member_query_interval <value>/state [enabled/disabled]} In this example, you must choose one of the items enclosed in the first set of angle brackets, either <ipif_name> or all. The next set of values, enclosed by braces, are optional. Some of the optional sub-commands have a corresponding value that you must enter along with the parameter. For example, version requires you enter the value <value> to specify the IGMP version number that the switch uses. Thus, if you choose the optional sub-command version, you must enter the version number in the <value> field for the command to successfully execute. Some optional sub-commands require you enter a choice of parameters. For example, state requires the entry of either enabled or disabled. If you choose the optional sub-command state, you must enter either enabled or disabled for the command to successfully execute. Do not type the braces. 316862-B Rev 00 Preface 35 Hard-copy technical manuals You can print selected technical manuals and release notes free, directly from the Internet. Go to the www.nortelnetworks.com/documentation URL. Find the product for which you need documentation. Then locate the specific category and model or version for your hardware or software product. Use Adobe* Acrobat Reader* to open the manuals and release notes, search for the sections you need, and print them on most standard printers. Go to Adobe Systems at the www.adobe.com URL to download a free copy of the Adobe Acrobat Reader. Note: The list of related publications for this manual can be found in the release notes that came with your software. How to get help If you purchased a service contract for your Nortel Networks product from a distributor or authorized reseller, contact the technical support staff for that distributor or reseller for assistance. If you purchased a Nortel Networks service program, contact Nortel Networks Technical Support. To obtain contact information online, go to the www.nortelnetworks.com/cgi-bin/comments/comments.cgi URL, then click on Technical Support. From the Technical Support page, you can open a Customer Service Request online or find the telephone number for the nearest Technical Solutions Center. If you are not connected to the Internet, you can call 1-800-4NORTEL (1-800-466-7835) to learn the telephone number for the nearest Technical Solutions Center. An Express Routing Code (ERC) is available for many Nortel Networks products and services. When you use an ERC, your call is routed to a technical support person who specializes in supporting that product or service. To locate an ERC for your product or service, go to the http://www.nortelnetworks.com/help/contact/ erc/index.html URL. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 36 Preface 316862-B Rev 00 37 Chapter 1 Setting up the switch The Passport 1600 Series Layer 3 switch supports a Command Line Interface (CLI) that allows you to configure and manage the switch. You access the CLI through a direct serial-port connection to the switch or through a Telnet session. You can open a Telnet session from Device Manager by clicking on the Telnet button on the toolbar or choosing Device > Telnet from the menu bar. For more information about Device Manager, see Installing and Using Device Manager. You can use any terminal or personal computer (PC) with a terminal emulator as the CLI console station. This chapter describes how to connect a terminal to the switch, set the IP address for the switch, reboot the switch, and log on to the switch software. It also explains how to enter and edit CLI commands. Specifically, this chapter includes the following topics: Topic Page Connecting a terminal 37 Setting the switch's IP address 39 Logging on to the system 41 Entering CLI commands 42 Connecting a terminal The serial console interface is an RS-232 port that enables a connection to a PC or terminal for monitoring and configuring the switch. The port is implemented as a DB-9 connector that can operate as either data terminal equipment (DTE) or data communication equipment (DCE). The default communication protocol settings for the Console port are: Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 38 Chapter 1 Setting up the switch • • • • 9600 baud rate 8 data bits 1 stop bit No parity To use the Console port, you need the following equipment: • • A VT100-compatible terminal, or a portable computer with a serial port and terminal-emulation software. A UL-listed straight-through RS-232 cable with a female DB-9 connector for the Console port on the switch. The other end of the cable must have a connector appropriate to the serial port on your computer or terminal. (Most computers or terminals use a male DB-25 connector.) Any cable connected to the Console port must be shielded to comply with emissions regulations and requirements. To connect a computer or terminal to the Console port: 1 Set the terminal protocol as follows: • • • • 9600 baud 8 data bits 1 stop bit No parity 2 Connect the RS-232 cable to the Console port. 3 Connect the other end of the cable to the terminal or computer serial port. 4 Turn on the terminal. The Login screen appears. 316862-B Rev 00 Chapter 1 Setting up the switch 39 Figure 1 Login screen 5 At the Login prompt, enter the login ID (rwa) and press Enter. 6 At the password prompt, enter the password (rwa) and press Enter. 7 Set the switch’s IP address (see “Setting the switch's IP address,” next). Setting the switch's IP address Each switch must be assigned its own IP Address, which is used for communication with an SNMP network manager or other TCP/IP application (for example, BOOTP or TFTP). The switch's default IP address is 10.90.90.90. You can change the default switch IP address to meet the specification of your networking address scheme. The switch is also assigned a unique MAC address by the factory. This MAC address cannot be changed. You can view the MAC address, using the show switch command. You can automatically set the switch IP address using BOOTP or DHCP protocols, in which case you must know the actual address assigned to the switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 40 Chapter 1 Setting up the switch The switch has Layer 3 functionality, so its ports can be sectioned into IP interfaces - where each section has its own range of IP addresses (specified by a network address and subnet mask). By default, an IP interface named System is configured on the switch and contains all of the ports on the switch. Initially, you can use the System interface to assign a range of IP addresses to the switch. Later, when you configure VLANs and IP interfaces on the switch, the ports you assign to these VLANs and IP interfaces will be removed from the System interface. To set the switch’s IP address using the CLI: 1 Enter one of the following commands at the system prompt: config ipif System ipaddress xxx.xxx.xxx.xxx/ yyy.yyy.yyy.yyy where: xxx.xxx.xxx.xxx represents the IP address to be assigned to the IP interface named System and yyy.yyy.yyy.yyy represents the corresponding subnet mask. or config ipif System ipaddress xxx.xxx.xxx.xxx/z where: xxx.xxx.xxx.xxx represents the IP address to be assigned to the IP interface named System and z represents the corresponding number of subnets in CIDR notation. 2 Save the switch configuration by entering the following command: save 316862-B Rev 00 Chapter 1 Setting up the switch 41 Configuration example The following example shows how to assign IP address 10.42.73.74 with a subnet mask of 255.0.0.0 to the switch and saving the switch parameters. The Success message indicates that you can now configure and manage the switch via TELNET and the CLI using the IP address 10.42.73.74 to connect to the switch. PP1612:4# config ipif System ipaddress 10.42.73.74/255.0.0.0 Command: config ipif System ipaddress 10.42.73.74/8 Success PP1612:4# reboot Logging on to the system When the switch completes its reboot sequence, the login prompt appears (see Figure 1). The default value for login and password for the console and Telnet sessions is shown in Table 1. Table 1 Access level and default login value Default Default login password Access level Description Read/write/all Allows all the rights of Read-Write access rwa and the ability to change security settings, including the CLI and Web-based management user names and passwords and the SNMP community strings. rwa Configuration example The following example shows how to log on to the switch using read/write/all access: Login: rwa Password: *** :4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 42 Chapter 1 Setting up the switch Entering CLI commands You enter CLI commands at the PP16xxx:4# prompt, where xxx represents the 12G-, the 16G-, or the 48T-port switch. There are a number of helpful commands in the CLI. For example, to display a list of all of the top-level commands, use the following command: dir Entering a question mark (?) will display each command followed by the various sub-commands, input values, and parameters that are associated with each command. The dir command has the same function as the ? command. However, it displays less detail. Figure 2 shows the results of entering the ? command: 316862-B Rev 00 Chapter 1 Setting up the switch 43 Figure 2 Using the question mark (?) command .. ? {<specified_command>} clear clear arptable clear counters {ports <portlist>} clear fdb [vlan <vlan_name 32> | port <port> | all] clear log clear post_hist config 802.1p default_priority [ <portlist> | all ] priority [2 | 4 | 6 | 7] config account <username> config arp_aging time <value 0-65535> config bootp_relay { hops <value 1-16> | time <sec 0-65535>} config bootp_relay add ipif <ipif_name 12> <ipaddr> config bootp_relay delete ipif <ipif_name 12> <ipaddr> config command_history <value 1-40> config dnsr [[primary|secondary] nameserver <ipaddr>|[add|delete] static <domain_name 32> <ipaddr>] config dvmrp [ipif <ipif_name 12>| all ] {metric <value 1-31>| probe <sec 1-65535>| neighbor_timeout <sec 1-65535>|state [enabled|disabled]} config fdb aging_time <sec 10-630> config flow_classifier template_1 mode [security | qos | l4_switch] template_2 mode [security | qos | l4_switch] CTRL+C ESC q Quit SPACE n Next Page ENTER Next Entry a All When you enter a command without its required parameters, the CLI will prompt you with a Next possible completions: message (Figure 3). Figure 3 Next possible completions message PP1612G:4#config account Command: config account Next possible completions: <username> PP1612G:4# In Figure 3, you entered the command config account without the required parameter <username>, so the CLI returned the Next possible completions: <username> message. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 44 Chapter 1 Setting up the switch You can reenter the previous command (config account) at the command prompt by pressing the up arrow. Then, you can enter the appropriate user name and reenter the config account command. The up arrow and other helpful console keys are described in the sections that follow. Editing commands The console interface assigns certain functions to the editing keys on the management keyboard. These keys and their functions are described in Table 2. Table 2 Line editing keys Key Description Delete The delete key deletes the character under the cursor. The remaining characters to the right of the cursor are then shifted one space to the left. Backspace The backspace key deletes the character immediately to the left of the cursor. The remaining characters to the right of the cursor are then shifted one space to the left. Insert You can toggle the insert key on or off. When on, characters are entered at the cursor, while the existing characters are shifted to the left. When off, characters are entered at the cursor, overwriting the existing characters. Left Arrow The left arrow moves the cursor one space to the left. Right Arrow The right arrow moves the cursor one space to the right. Up Arrow The up arrow re-enters the previous command line entry. This can be useful if you make a mistake in entering the parameters or values required by a given command. Tab The tab key displays the next possible command parameter entry, in a round-robin fashion, once the first level of a command has been entered. If the Tab key is pressed before any part of a command string has been entered, the first level of possible command entries will be displayed — starting with the “?” command, and proceeding through all of the possible commands until the last command in the list (the “upload” command) is displayed. Pressing the Tab key after the “upload” command is displayed will go through the list again with, starting with the “?” command. 316862-B Rev 00 Chapter 1 Setting up the switch 45 Displaying multiple pages The console interface assigns functions to various keys on the management stations keyboard to control the display of tables that require more than one page. These keys are described in Table 3. Table 3 Multiple page display keys Key Description space Displays the next page. Ctrl + c Stops the display of multiple pages. Ctrl + u Deletes a command in the CLI without executing it. Esc Stops the display of multiple pages. n Displays the next page. p Displays the previous page. q Stops the display of multiple pages (quit). r Refreshes the current page. a Displays the remaining pages without pausing between pages (all). Enter Displays the next line or table entry. Understanding top-level commands If you reenter a command that is unrecognized by the CLI, the top-level commands are displayed under the Available commands: prompt. Top-level CLI commands consist of commands like show or config. These commands require one or more parameters to narrow the scope of the top-level command. This is equivalent to show what? or config what?, where the what? is the next sub-command or parameter. For example, if you enter the show command with no additional parameters, the CLI displays all of the possible next parameters (Figure 4). Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 46 Chapter 1 Setting up the switch Figure 4 Top-level show command P1612G:4# show Command: show Next possible completions: 802.1p account arpentry bootp_relay command_history dnsr dst_ipfilter dvmrp error fdb fdbfilter flow_classifier igmp igmp_snooping ip_fragment_filter ipif ipmc iproute link_aggregation log mac_priority md5 mgmt_port mirror multicast_fdb ospf packet ports post_hist rip route router_ports rtc scheduling serial_port session snmp stp switch tdp template_rule traffic trusted_host utilization vlan vlan_interface vlan_ports PP1612G:4# In Figure 4, all of the possible next parameters for the show command are displayed. At the next command prompt, you use the up arrow to re-enter the show command, followed by the account parameter. The CLI then displays the user accounts configured on the switch. 316862-B Rev 00 47 Chapter 2 Managing switch operations This chapter describes the basic switch configuration commands, such as the commands for creating and configuring user accounts, displaying the switch information (including the firmware version), configuring the RS-232 console serial port, and enabling Telnet for out-of-band switch management. Specifically, this chapter includes the following topics: Topic Page Roadmap of basic switch CLI commands 48 Creating an admin or user account 49 Configuring an existing user account 51 Showing an existing user account configuration 51 Deleting an existing user account 52 Configuring the command history list 53 Displaying the command history 53 Displaying all commands 54 Showing the current status of the switch serial port 57 Configuring the switch’s serial port 59 Enabling CLI paging 60 Disabling CLI paging 61 Enabling Telnet 62 Disabling Telnet 63 Enabling the Web-based manager 63 Managing files 66 Rebooting the switch 71 Resetting the switch 72 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 48 Chapter 2 Managing switch operations Topic Page Logging in to the switch 73 Logging out of the switch 73 Roadmap of basic switch CLI commands The following roadmap lists all of the basic switch commands and their parameters. Use this list as a quick reference or click on any entry for more information: Command Parameter create account admin <username 15> user <username 15> config account <username 15> show account delete account <username 15> config command_history <value 1-40> show command_history ? dir show session show switch show serial_port config serial_port baud_rate [9600|19200|38400|115200] auto_logout [never|2-minutes|5_minutes|10_minut es|15_minutes] enable clipaging disable clipaging enable telnet <tcp_port_number 1-65535> disable telnet enable web 316862-B Rev 00 <tcp_port_number 1-65535> Chapter 2 Managing switch operations Command 49 Parameter disable web save download firmware <ipaddr> <path_filename 64> download configuration <ipaddr> <path_filename 64> increment upload configuration <ipaddr> <path_filename 64> <append_account> upload log <ipaddr> <path_filename 64> <append_account> reboot reset config system login logout Creating an admin or user account To create an admin or user account, including a username and password, use the create account command. Note that this command also allows you to select the privileges this account will have. In general, user-level accounts can display the switch’s current configuration, but cannot make any changes. Admin-level accounts have full access to all configuration commands. To create a new account, use the following command: create account Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 50 Chapter 2 Managing switch operations This command includes the following options: create account followed by: admin <username 15> Creates an administrator-level user account. This user can execute all of the commands in the CLI without restriction. • username identifies the user. It is a alphanumeric string, from 1 to 15 characters. user <username 15> Creates a user-level user account. This user is limited to displaying switch configuration and accumulated switch statistics. • username identifies the user. It is a alphanumeric string, from 1 to 15 characters. Figure 5 shows you how to create a new administrator-level user account with the username Test. Figure 5 create account command PP1612G:4#create account admin Test Command: create account admin Test Enter a case-sensitive new password:**** Enter the new password again for confirmation:**** Success. PP1612G:4# 316862-B Rev 00 Chapter 2 Managing switch operations 51 Configuring an existing user account To configure an existing user account (change the account’s password) after you have created it, use the following command: config account <username 15 > where: username 15 is the name assigned to the account. It is an alphanumeric string, from 1 to 15 characters. Figure 6 shows you how to change the password for the user account named Test. Figure 6 config account command PP1612G:4#config account Test Command: config account Test Enter an old password:**** Enter a case-sensitive new password:**** Enter the new password again for confirmation:**** Success. PP1612G:4# Showing an existing user account configuration To display the configuration of an existing user account, use the following command: show account Figure 7 shows an example of the console screen when you display the user accounts configured on the switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 52 Chapter 2 Managing switch operations Figure 7 show account command PP1612G:4#show account Command: show account Current Accounts: Username --------------System Test Access Level -----------user Admin PP1612G:4# Deleting an existing user account To delete an existing user account, use the following command: delete account <username 15 > where: username 15 is the name assigned to the account. It is an alphanumeric string, from 1 to 15 characters. Figure 8 shows an example of the console screen when you delete the existing user account Test configured on the switch. Figure 8 delete account command PP1612G:4#delete account Test Command: delete account Test Success. PP1612G:4# 316862-B Rev 00 Chapter 2 Managing switch operations 53 Configuring the command history list The 1600 Series switches retain the list of commands that you enter during the current session. You can configure the command history list to retain up to 40 commands by using the following command: config command_history < value 1-40> where: value 1-40 represents the number of commands that the switch will retain in it’s command history list. The valid range is 1 to 40 commands. Figure 9 shows the command history being configured to retain the last 20 commands: Figure 9 config command_history command PP1612G:4# config command_history 20 Command: config command_history 20 Success PP1612G:4# Displaying the command history To display the commands that you entered previously, use the following command: show command_history The number of commands displayed depends on the value you entered using the config command_history command. Figure 10 shows sample output for the show command_history command. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 54 Chapter 2 Managing switch operations Figure 10 show command_history command output PP1612G:4# show command_history Command: show command_history ? ? delete account test delete account show account test config account show account config account test config account create account admin create account user test create account user user create account create user account PP1612G:4# Displaying all commands To display the entire list of commands available in the 1600 Series CLI, including all parameters and arguments, use the following command: ? Figure 11 shows sample output for the ? command. 316862-B Rev 00 Chapter 2 Managing switch operations 55 Figure 11 ? command output PP1612G:4# ? Command: ? .. ? {<specified_command>} clear clear arptable clear counters {ports <portlist>} clear fdb [vlan <vlan_name 32> | port <port> | all] clear log clear post_hist config 802.1p default_priority [ <portlist> | all ] priority [2 | 4 | 6 | 7] config account <username> config arp_aging time <value 0-65535> config bootp_relay { hops <value 1-16> | time <sec 0-65535>} config bootp_relay add ipif <ipif_name 12> <ipaddr> config bootp_relay delete ipif <ipif_name 12> <ipaddr> config command_history <value 1-40> config dnsr [[primary|secondary] nameserver <ipaddr>|[add|delete] static <domain _name 32> <ipaddr>] config dvmrp [ipif <ipif_name 12>| all ] {metric <value 1-31>| probe <sec 1-6553 5>| neighbor_timeout <sec 1-65535>|state [enabled|disabled]} config fdb aging_time <sec 10-630> config flow_classifier template_1 mode [security | qos | l4_switch] template_2 m ode [security | qos | l4_switch] ode [security | qos | l4_switch] config flow_classifier template_id <value 1-2> mode_parameters [qos_flavor [802. 1p | dscp | dst_ip | dst_tcp_port | dst_udp_port] | l4_session {tcp_session fiel ds {dip | sip | tos | dst_port | src_port | tcp_flags} | udp_session fields {dip | sip | tos | dst_port | src_port} | other_session fields {dip | sip | tos | l4 _protocol | icmp_msg | igmp_type}}] PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 56 Chapter 2 Managing switch operations To display the complete command list, use the following command: dir Figure 12 shows sample output from the dir command. Figure 12 dir command output PP1612G:4# dir Command: dir .. ? clear clear arptable clear counters clear fdb clear log clear post_hist config 802.1p default_priority config account config arp_aging time config bootp_relay config bootp_relay add ipif config bootp_relay delete ipif config command_history config dnsr config dvmrp config fdb aging_time config flow_classifier template_1 mode config flow_classifier template_id config flow_classifier vlan config igmp config igmp_snooping config igmp_snooping querier config ip_forwarding ... 316862-B Rev 00 Chapter 2 Managing switch operations 57 Showing current switch management sessions To display all of the current connections to the switch’s management agent, use the following command: show session Figure 13 shows the console screen when you display the current switch management sessions. Figure 13 show session command PP1612G:4#show session ID Live Time From --- ------------ -----0 0:17:16.2 Serial Port Level ----4 Name ----Anonymous PP1612G:4# Showing the current status of the switch To display the current status of the switch, use the following command: show switch The information that displays includes the IP address and subnet mask, the name of the VLAN on which the switch’s IP address resides, and the boot PROM and firmware version. Figure 14 shows a sample console screen when you display the current switch status. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 58 Chapter 2 Managing switch operations Figure 14 show switch command Showing the current status of the switch serial port To display the current status of the switch, use the following command: show serial_port 316862-B Rev 00 Chapter 2 Managing switch operations 59 Figure 15 shows a sample console screen when you display the current serial port configuration. Figure 15 show session command PP1648T:4# show serial_port Command: show serial_port Baud Rate Data Bits Parity Bits Stop Bits Auto-Logout PP1648T:4# : : : : : 9600 8 None 1 10 mins Configuring the switch’s serial port The switch’s serial port has the following default configuration: • • • • • Baud Rate: 9600 Data Bits: 8 Parity Bits: None Stop Bits: 1 Auto-Logout: 10 minutes To change the settings of the switch’s serial port, use the following command: config serial_port Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 60 Chapter 2 Managing switch operations This command includes the following options: config serial port followed by: baud_rate [9600|19200|38400|115200] The serial bit-rate that used to communicate with the switch’s serial port. The length of time a console session is inactive auto_logout [never|2-minutes|5_minutes before the console session is closed by the switch. |10_minutes|15_minutes] Note: This command also applies to Telnet sessions. For security reasons, do not set this command to never. Figure 16 shows a sample console screen when you display the current serial port configuration. Figure 16 config serial port command PP1612G:4#config serial_port baud_rate 9600 Command: config serial_port baud_rate 9600 Success. PP1612G:4# Enabling CLI paging To enable paging for the CLI, use the following command: enable clipaging By using this command you can pause the console screen at the end of each page instead of scrolling through more than one screen of information. Figure 17 shows a sample console screen when you enable CLI paging. 316862-B Rev 00 Chapter 2 Managing switch operations 61 Figure 17 enable clipaging command PP1612G:4#enable clipaging Command: enable clipaging Success. PP1612G:4# Disabling CLI paging To disable paging for the CLI, use the following command: disable clipaging By using this command, you can disable pausing the console screen at the end of each page instead of scrolling through more than one screen of information. Figure 18 shows a sample console screen when you disable CLI paging. Figure 18 disable clipaging command PP1612G:4#disable clipaging Command: disable clipaging Success. PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 62 Chapter 2 Managing switch operations Enabling Telnet To enable Telnet connections between a remote management station and the switch, using the default TCP port number 23, use the following command: enable telnet You can use all of the commands described in this manual to configure the 1600 switch over an Ethernet link using the Telnet protocol. The procedures, syntax of the commands, and input of values are identical when using either the serial port or the Telnet protocol to configure and manage the switch. This command contains the following parameters: enable telnet followed by: <tcp_port_number 1-65535> The TCP port number that a remote management station uses to establish a Telnet connection. The default TCP port number for Telnet is 23. Figure 19 shows a sample console screen when you enable Telnet, using TCP port number 23. Figure 19 enable telnet command PP1612G:4#enable telnet 23 Command: enable telnet 23 Success. PP1612G:4# 316862-B Rev 00 Chapter 2 Managing switch operations 63 Disabling Telnet To disable Telnet as a communication protocol between a remote management station and the switch, use the following command: disable telnet Figure 20 shows a sample console screen when you disable Telnet. Figure 20 disable telnet command PP1612G:4#disable telnet Command: disable telnet Success. PP1612G:4# Enabling the Web-based manager To enable Web-based connections between a remote management station and the switch, using the default TCP port number 80, use the following command: enable web You can use all of the commands described in this manual to configure the 1600 switch over an Ethernet link using a web browser and the web-based management agent built into the switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 64 Chapter 2 Managing switch operations This command contains the following parameters: enable web followed by: <tcp_port_number 1-65535> The TCP port number that a remote management station uses to establish a connection between a web browser and the web-based management agent built into the switch. The default TCP port number for the web-based manager is 80. Figure 19 shows a sample console screen when you enable Telnet, using TCP port number 23. Figure 21 enable web command PP1612G:4#enable web 80 Command: enable web 80 Success. PP1612G:4# Disabling the Web-based manager To disable connections between a remote management station’s web browser and the web-based management agent buitl into the switch, use the following command: disable web Figure 20 shows a sample console screen when you disable the web-based manager. 316862-B Rev 00 Chapter 2 Managing switch operations 65 Figure 22 disable telnet command PP1612G:4#disable web Command: disable web Success. PP1612G:4# Saving the current switch configuration to NV-RAM To save the current switch configuration to the switch’s non-volatile RAM, use the following command: save Figure 23 shows a sample console screen when you save the current switch configuration to NV-RAM. Figure 23 save command PP1612G:4#save Command: save Saving all settings to NV-RAM........ Done. done. PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 66 Chapter 2 Managing switch operations Managing files Trivial File Transfer Protocol (TFTP) services allow you to upgrade the switch’s firmware to be upgraded by transferring a new firmware file from a TFTP server to the switch. A configuration file can also be loaded into the switch from a TFTP server, switch settings can be saved to the TFTP server, and a history log can be uploaded from the switch to the TFTP server. This section describes the download/upload commands in the Command Line Interface (CLI) along with the appropriate parameters. Topic Page Downloading switch firmware 67 Downloading a configuration file 67 Uploading a configuration file to a TFTP server 69 Uploading a log file to a TFTP server 70 316862-B Rev 00 Chapter 2 Managing switch operations 67 Downloading switch firmware To download a switch firmware, use the following command: download firmware <ipaddr > <path_filename 64> where: ipaddr is the IP address of the remote TFTP server. path_filename 64 is the DOS path and filename of the firmware file on the remote TFTP server. The path filename can be up to 64 characters. Note: If you download the switch firmware via the PP1612G/24G out-of-band management port, the TFTP server must be on the same IP subnet as the switch. The TFTP server must be running TFTP server software to perform the file transfer. TFTP server software is a part of many network management software packages, or you can obtain it as a separate program. For example, to download and install a new switch firmware file from a remote TFTP server, IP address 10.20.20.128, on the server’s hard drive at C:\firmware.had, enter the following command: download firmware 10.20.20.128 C:\firmware.had Downloading a configuration file To download a configuration file, use the following command: download configuration < ipaddr> <path_filename 64> where: ipaddr is the IP address of the remote TFTP server. path_filename 64 is the DOS path and filename of the firmware file on the remote TFTP server. The path filename can be up to 64 characters. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 68 Chapter 2 Managing switch operations This command includes the following option: download configuration <ipaddr> <path_filename 64> followed by: increment Allows a configuration file to be downloaded that will only make changes explicitly stated in the file. All other configuration settings on the switch will remain unchanged. Note: If you download the switch firmware via the PP1612G/24G out-of-band management port, the TFTP server must be on the same IP subnet as the switch. The TFTP server must be running TFTP server software to perform the file transfer. TFTP server software is a part of many network management software packages, or you can obtain it as a separate program. Figure 24 shows how to download a configuration file named c:\cfg\setting.txt from the TFTP server at IP address 10.48.74.121: Figure 24 download configuration command PP1612G:4# download configuration 10.48.74.121 c:\cfg\setting.txt Command: download configuration 10.48.74.121 c:\cfg\setting.txt Connecting to server................... Done. Download configuration............. Done. PP1612G:4# 316862-B Rev 00 Chapter 2 Managing switch operations 69 Uploading a configuration file to a TFTP server To upload the current switch configuration settings to a remote TFTP server, enter the following command: upload configuration <ipaddr> <path_filename 64> <append_account> where: ipaddr is the IP address of the remote TFTP server. path_filename 64 is the DOS path and filename of a file on the remote TFTP server that will receive the configuration file from the switch. The path filename can be up to 64 characters. append_account instructs the switch to upload user account information, including passwords, to the TFTP server. The passwords in the uploaded configuration file will be encrypted using a key that is unique to the Passport 1600 series switches. Only a Passport 1600 series switch has the key necessary to decrypt passwords that are uploaded using the append_account command, and the encrypted passwords will only be decrypted when a configuration file is downloaded to the switch. Note: If you download the switch firmware via the PP1612G/24G out-of-band management port, the TFTP server must be on the same IP subnet as the switch. The TFTP server must be running TFTP server software to perform the file transfer. TFTP server software is a part of many network management software packages, or you can obtain it as a separate program. Figure 25 shows how to upload a switch configuration file named c:\cfg\cfg.txt to a remote TFTP server at IP address 10.48.74.121. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 70 Chapter 2 Managing switch operations Figure 25 upload configuration command PP1612G:4# upload configuration 10.48.74.121 c:\cfg\cfg.txt Command: upload configuration 10.48.74.121 c:\cfg\cfg.txt Connecting to server................... Done. Upload configuration...................Done. PP1612G:4# Uploading a log file to a TFTP server To upload a log file to a remote TFTP server, use the following command: upload log <ipaddr> <path_filename 64 > <append_account> where: ipaddr is the IP address of the remote TFTP server, and path_filename 64 is the DOS path and filename of a file on the remote TFTP server that will receive the log file from the switch. Note: If you download the switch firmware via the PP1612G/24G out-of-band management port, the TFTP server must be on the same IP subnet as the switch. The TFTP server must be running TFTP server software to perform the file transfer. TFTP server software is a part of many network management software packages, or you can obtain it as a separate program. Figure 26 shows how to upload a log file named c:\cfg\log.txt to a remote TFTP server at IP address 10.48.74.121. 316862-B Rev 00 Chapter 2 Managing switch operations 71 Figure 26 upload log command PP1612G:4# upload log 10.48.74.121 c:\cfg\log.txt Command: upload log 10.48.74.121 c:\cfg\log.txt Connecting to server................... Done. Upload log .............................Done. PP1612G:4# Rebooting the switch To reboot the switch, use the following command: reboot Figure 27 shows a sample console screen when you reboot the switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 72 Chapter 2 Managing switch operations Figure 27 reboot command PP1612G:4#reboot Command: reboot If you do not save the settings, all changes made will be lost. Are you sure you want to proceed with the system reboot (y/n)? Please wait, the switch is rebooting... Boot Procedure 0.00.001 Power On Self Test ………………………100% MAC Address H/W Version : 00-05-5D-11-F9-20 : 2B1 Please wait, loading Runtime image ….100% Resetting the switch To reset the switch’s configuration to the factory defaults (except the system IP address, log history and TDP), use the following command: reset This command contains the following parameters: reset followed by: config Resets the agent to default settings, except history log and TDP. system Resets the agent to default settings, except the history log. Then, the switch will do a factory reset, save, and reboot. Figure 28 shows a sample console screen when you reset the switch configuration. 316862-B Rev 00 Chapter 2 Managing switch operations 73 Figure 28 reset config command PP1612G:4#reset config Command: reset config Warning! Switch will be reset to factory defaults Are you sure you want to proceed with a reset (y/n)? Success. Logging in to the switch To log in to the switch, use the following command: login Figure 29 shows a sample console screen when you initiate the login procedure on the switch. Figure 29 login command PP1612G:4#login Command: login UserName: Logging out of the switch To log out of the switch, use the following command: logout Figure 30 shows a sample console screen when you log out of the switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 74 Chapter 2 Managing switch operations Figure 30 logout command PP1612G:4#logout 316862-B Rev 00 75 Chapter 3 Configuring ports This chapter describes the CLI commands that you can use to set the speed, flow control, MAC address learning, and the state (enabled or disabled) for a port or range of ports on the switch. It includes the following topics: Topic Page Roadmap of port configuration CLI commands 75 Configuring ports 76 Roadmap of port configuration CLI commands The following roadmap lists some of the port configuration commands and their parameters. Use this list as a quick reference or click on any command or parameter entry for more information on configuring ports. Command Parameter config ports <portlist> all speed [auto|10_half|10_full|100_half|1 00_full|1000_full] flow_control [enabled|disabled] learning [enabled|disabled] state [enabled|disabled] show ports <portlist> config mgmt_port speed [auto|10_half|10_full|100_half|1 00_full|1000_full] Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 76 Chapter 3 Configuring ports Command Parameter flow_control [enabled|disabled] learning [enabled|disabled] state [enabled|disabled] Configuring ports To configure the ports on the switch, use the following command: config ports <portlist> where: portlist allows you to specify the ports that you want to configure. You must first enter the lowest port number in a group, and then the highest port number in a group, separated by a dash. For example, to enter a port group that includes switch ports 1, 2, and 3, you entered 1-3. To enter ports that are not contained within a group, enter the port numbers, separated by a comma. For example, port group 1-3 and port 26 are entered as 1-3, 26. This command includes the following options: config ports <portlist> followed by: all Applies the command to all ports on the switch. Sets the speed, in Mbps, and the duplex speed [auto|10_half|10_full|100_half state, full or half, the port will use to make a link. |100_full|1000_full] Note: Setting a port speed duplex operation that is not supported on a port will result in a failed operation. For example, setting a Passport 1648 10/ 100BaseT to 1000 full or half will result in a failed operation. flow_control [enabled|disabled] 316862-B Rev 01 Enables or disables flow control for the range of ports specified above. Chapter 3 Configuring ports 77 config ports <portlist> followed by: learning [enabled|disabled] Enables or disables MAC address learning for the range of ports specified above. state [enabled|disabled] Enables or disables forwarding of frames for the range of ports specified above. Figure 31 shows how to set ports 1, 2, and 3 to 10 Mbps, with full duplex, and MAC address learning, and frame forwarding enabled on the switch. Figure 31 config ports command PP1648T:4# config ports 1-3 speed 10_full learning enabled state enabled Command: config ports 1-3 speed 10_full learning enabled state enabled Success. PP1648T:4# Displaying the current port configuration To display the current management port configuration, use the following command: show ports This command contains no additional options: show ports followed by: <portlist> Specifies a list of ports to display. Figure 32 shows the current configuration of the management port. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 78 Chapter 3 Configuring ports Figure 32 show ports command PP1612G:4#show ports Port ----1 2 3 4 5 6 7 Port Settings State Speed/Duplex/FlowCtrl ------------------------Enabled Auto/Disabled Enabled Auto/Disabled Enabled Auto/Disabled Enabled Auto/Disabled Enabled Auto/Disabled Enabled Auto/Disabled Enabled Auto/Disabled Connection Speed/Duplex/FlowCtrl --------------------Link Down Link Down Link Down Link Down Link Down Link Down Link Down Address Learning -------Enabled Enabled Enabled Enabled Enabled Enabled Enabled Configuring the management port — 1612G and 1624G This section applies only to the Passport 1612G and 1624G switches — which have a dedicated copper Ethernet management port, in addition to the fiber optic ports, for the convenience of the network administrator. Other switches in the Passport 1600 series do not have a dedicated copper management port. To configure the copper management port on the 1612G and 1624G switches, use the following command: config mgmt_port speed auto 316862-B Rev 01 Chapter 3 Configuring ports 79 This command includes the following options: config mgmt_port followed by: Sets the speed, in Mbps, and the duplex speed [auto|10_half|10_full|100_half state, full or half, the port will use to make a link. |100_full|1000_full] Note: Setting a port speed duplex operation that is not supported on a port will result in a failed operation. For example, setting a Passport 1648 10/ 100BaseT to 1000 full or half will result in a failed operation. flow_control [enabled|disabled] Enables or disables flow control for the range of ports specified above. state [enabled|disabled] Enables or disables forwarding of frames for the range of ports specified above. Figure 31 shows how to configure the dedicated managemet port to 100 Mbps, with full duplex, and MAC address learning, and frame forwarding enabled on the switch. Figure 33 config mgmt_port command PP1612G:4# config mgmt_port speed 100_full state enabled Command: config mgmt_port speed 100_full state enabled Success. PP1612G:4# Displaying the current management port configuration To display the current management port configuration, use the following command: show mgmt_port This command contains no additional options: Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 80 Chapter 3 Configuring ports Figure 33 shows the current configuration of the management port. Figure 34 show mgmt_port command PP1612G:4#show mgmt_port Port Settings State Speed/Duplex/FlowCtrl ------------------------Enabled Auto/Disabled 316862-B Rev 01 Connection Speed/Duplex/FlowCtrl --------------------Link Down 81 Chapter 4 Configuring Spanning Tree The IEEE 802.1D Spanning Tree Protocol (STP) allows links between switches that form loops within the network to be blocked. When it detects multiple links between switches, it establishes a primary link. Duplicate links are then blocked and become standby links. STP also allows you to use these duplicate links in the event of a failure of the primary link. The reactivation of the blocked links is done automatically- without requiring operator intervention. STP operates on two levels: • • Switch level, where the settings are globally implemented Port level where the settings are implemented on a per user-defined STP group basis This chapter describes the commands you use to configure, enable and disable STP, and show STP ports. Specifically, it includes the following topics: Topic Page Roadmap of Spanning Tree CLI commands 82 Configuring STP 82 Enabling STP on the switch 84 Disabling STP on the switch 84 Displaying STP status on the switch 85 Displaying STP port group status 87 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 82 Chapter 4 Configuring Spanning Tree Roadmap of Spanning Tree CLI commands The following roadmap lists all of the STP commands and their parameters. Use this list as a quick reference or click on any entry for more information: Command Parameter config stp ports <portlist> maxage <value> hellotime <value> forwarddelay <value> priority <value> fbpdu [enable|disable] enable stp disable stp show stp show stp ports <portlist> Configuring STP To configure STP on the switch, use the following command: config stp 316862-B Rev 00 Chapter 4 Configuring Spanning Tree 83 This command uses the following options: config stp followed by: ports <portlist> Specifies a range of ports for which you wish to configure STP. You specify ports by entering the lowest port number in a group, and then the highest port number, separated by a dash. For example, you enter a port group including the switch ports 1, 2, and 3 as 1-3. You specify ports that are not contained within a group by entering their port number, separated by a comma. Thus, you enter the port group 1-3 and port 26 as 1-3, 26. maxage <value> This is the maximum amount of time, in seconds, that the switch will wait to receive a BPDU packet before re-configuring STP. The default is 20 seconds. hellotime <value> This is the time interval, in seconds, between transmissions of STP configuration messages by the root device. The default is 2 seconds. forwarddelay <value> This is the maximum amount of time, in seconds, that the root device will wait before transitional STP states. The default is 15 seconds. priority <value> This is a numerical value between 0 and 65535 that is used by STP to determine the root device, root port, and designated port. The devise with the highest priority becomes the root device, and so on. The lower the numerical value of the STP priority for a given device or port, the higher the priority for that device or port. The default is 32768. fbpdu [enable|disable] This enables or disables the forwarding of STP BPDU (Bridge Protocol Data Unit) packets from other network devices when STP is disabled on the switch. The default is enabled. Figure 35 shows you how to configure STP on the switch, using a max age time of 18 seconds, and a hello time of 4 seconds. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 84 Chapter 4 Configuring Spanning Tree Figure 35 config stp command PP1648T:4# config stp maxage 18 hellotime 4 Command: config stp maxage 18 hellotime 4 Success. PP1648T:4# Enabling STP on the switch To globally enable STP on the switch, use the following command: enable stp This command contains no parameters. Figure 36 shows you how to globally enable STP on the switch. Figure 36 enable stp command PP1648T:4#enable stp Command: enable stp Success. PP1648T:4# Disabling STP on the switch To globally disable STP on the switch, use the following command: disable stp 316862-B Rev 00 Chapter 4 Configuring Spanning Tree 85 This command contains no parameters: Figure 37 shows you how to globally disable STP on the switch. Figure 37 disable stp command PP1648T:4# disable stp Command: disable stp Success. PP1648T:4# Displaying STP status on the switch To globally display STP status on the switch, use the following command: show stp Figure 38 shows you an example of an STP switch status display when STP is enabled. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 86 Chapter 4 Configuring Spanning Tree Figure 38 show stp (enabled) PP1648T:4# show stp Command: show stp STP Status Max Age Hello Time Forward Delay Priority Forwarding BPDU : : : : : : Enabled 18 4 15 32768 Enabled Designated Root Bridge Root Priority Cost to Root Root Port Last Topology Change Topology Changes Count : : : : : : 00-00-00-12-00-00 32768 19 33 13sec 0 PP1648T:4# Figure 39 shows you an example of an STP switch status display when STP is disabled. Figure 39 show stp (disabled) PP1648T:4# show stp Command: show stp STP Status Max Age Hello Time Forward Delay Priority Forwarding BPDU PP1648T:4# 316862-B Rev 00 : : : : : : Disabled 18 4 15 32768 Enabled Chapter 4 Configuring Spanning Tree 87 Displaying STP port group status To display the status of an STP port group, use the following command: show stp ports This command uses the following options: show stp ports followed by: Specifies a range of ports you want to use to display STP status. You specify ports by entering the lowest port number in a group, and then the highest, separated by a dash. For example, you enter a port group including the switch ports 1, 2, and 3 as 1-3. You enter ports that are not contained within a group by entering their port number, separated by a comma. Thus, you enter the port group 1-3 and port 26 as 1-3, 26. <portlist> Figure 40 shows you how to display the status of an STP port group, consisting of ports 1 through 9. Figure 40 show stp_ports command PP1648T:4# show stp ports 1-9 Command: show stp ports 1-9 Port ---1 2 3 4 5 6 7 8 9 Connection ------------------100M/Full/None Link Down Link Down Link Down Link Down Link Down Link Down Link Down Link Down State -------Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Cost ---*19 *19 *19 *19 *19 *19 *19 *19 *19 Priority -------128 128 128 128 128 128 128 128 128 Status STP Name ---------- -------Forwarding s0 Disabled s0 Disabled s0 Disabled s0 Disabled s0 Disabled s0 Disabled s0 Disabled s0 Disabled s0 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 88 Chapter 4 Configuring Spanning Tree 316862-B Rev 00 89 Chapter 5 Security features This chapter describes the CLI commands that you can use to set the security features of the Switch. It includes the following topics: Topic Page Roadmap of security features 89 Password Protection 95 System Log Messages 96 Configuring Password aging 119 Configuring the Switch’s Secure Mode 122 Secure Shell (SSH) 125 Configuring Secure Shell (SSH) 129 TACACS+ 143 Roadmap of security features The following roadmap lists the security configuration commands and their parameters. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 90 Chapter 5 Security features Syslog commands Command Parameter enable syslog disable syslog show syslog config syslog max_hosts <int 1-10> create syslog host <slog_id> severity informational warning error fatal all facility local0 local1 local2 local3 local4 local5 local6 local7 udp_port <int 514-530> ipaddress <ipaddr> state enabled|disabled 316862-B Rev 00 Chapter 5 Security features Command Parameter config syslog host <slog_id> severity informational warning error fatal all facility local0 local1 local2 local3 local4 local5 local6 local7 udp_port <int 514-530> ipaddress <ipaddr> state enabled|disabled delete syslog host <slog_id> all 91 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 92 Chapter 5 Security features SSH commands Command Parameter config ssh algorithm 3DES AES128 AES192 AES256 arcfour blowfish cast128 twofish128 twofish192 twofish256 MD5 SHA1 RSA DSA enabled|disabled show ssh algorithm show ssh authmode password publickey hostbased enabled|disabled show ssh authmode show ssh user show ssh user 316862-B Rev 00 <username> authmode publickey password hostbased hostname <domain_name 31> hostname_ip <domain_name 31> <ipaddr> Chapter 5 Security features Command Parameter config ssh server maxsession <int 1-3> timeout <sec 1-120> authfail <init 2-20> rekey 10min 30min 60min never port <tcp_port_number 1-65535> 93 enable | disable ssh show ssh server config ssh regenerate hostkey Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 94 Chapter 5 Security features TACACS+ commands Command Parameter enable authentication disable authentication config authentication login console telnet ssh web all tacacs+ local none config authentication admin console ssh telnet all tacacs+ local none config login_authen response_timeout <sec 1-255> show authentication create tacacs+_server <ip_address> tcp_port <int 1-65535> key <string 254> timeout <sec 1-255> config tacacs+_server <ip_address> tcp_port <int 1-65535> key <string 254> timeout <sec 1-255> delete tacacs+_server <ip_address> show tacacs+_server enable admin config admin local_password 316862-B Rev 00 <password 8-15> Chapter 5 Security features 95 Password Protection The password security features allow you to restrict access to the switch. Network managers have restricted access to the control path; users have restricted access to the data path. The network administrator has the ability to login to a Passport 1600 Series switch and configure passwords through the CLI. The Passport 1600 Series switch supports multi-level access with the use of different logins and passwords. A local database stores the information about user name, password and privilege level. All Web and CLI logins check the user name and password with the information in the database. Password format The following is a list of rules or guidelines to use when creating or modifying passwords. • • • • • • You may use only alphanumeric characters, special characters are not allowed in passwords. The length of passwords must be eight characters or more. Administrator and User level access with different login and passwords are supported. Logins are rejected after three invalid attempts. If the Switch is operating in secure mode, a password history for each user account is maintained. The last 5 passwords for a given user account are kept in this history, and the Switch will prevent the Administrator from re-assigning any of these 5, previously assigned, passwords to the user’s account. If a user tries to login and fails due to an error in entering a user name or password three consecutive times, the switch will deny the telnet session. The telnet session of the source IP address will be denied for three minutes. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 96 Chapter 5 Security features System Log Messages On any UNIX*-based management platform, you can use the syslog messaging feature of the Passport 1600 Series switch to manage event messages. The Passport syslog software communicates with a server software component named syslogd on your management workstation. The UNIX daemon syslogd is a software component that receives and locally logs, displays, prints and/or forwards messages that originate from sources internal and external to the workstation. For example, syslogd on a UNIX workstation concurrently handles messages received from applications running on the workstation, as well as messages received from a Passport 1600 Series switch running in a network accessible to the workstation. Receiving system log messages You can use the system log messaging feature of the Passport 1600 Series switch to manage switch event messages on any UNIX-based management platform. The Passport 1600 Series switch syslog software supports this functionality by communicating with a counter part software component named syslog on your management workstation. The UNIX daemon syslogd is a software component that receives and locally logs, displays, prints, and/or forwards messages that originate from sources internal and external to the workstation. For example, syslogd on a workstation concurrently handles messages received from applications running on the workstation, as well as messages received from a Passport switch running in a network accessible to the workstation. At a remote management workstation, the system log messaging feature does the following: • • • • 316862-B Rev 00 Receives system log messages from the Passport switch. Examines the severity code in each message. Uses the severity code to determine appropriate system handling for each message. Based on the severity code in each message, dispatches each message to any or all of the following destinations • Workstation display • Local log file • One or more remote hosts Chapter 5 Security features 97 Internally the Passport 1600 Series switch has four severity levels for log messages: • • • • Info Warning Critical Error Table 4 shows the default mapping of internal severity levels to syslog severity levels. Table 4 Default severity levels and system log severity levels UNIX system error codes System log severity level Internal Passport severity level 0 Emergency - 1 Alert - 2 Critical Critical 3 Error Error 4 Warning Warning 5 Notice - 6 Info Info 7 Debug - Table 5 shows the mapping of Info log messages. Table 5 Info log messages Log Message Log ID System up 200 Port <port> autonegotiation successful 306 Port <port> link up <speed> <duplex_mode> 300 Port <port> link down 301 Port <port> enabled (Username: <user> from <UI>) 302 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 98 Chapter 5 Security features Table 5 Info log messages Port <port> disabled (Username: <user> from <UI>) 303 Port<port> configuration modified (Username: <user> from <UI>) 307 Successful login through Console (Username: <user> from <UI>) 401 Successful login through Web <remote IP> (Username: <user>) 407 Successful login through Telnet <remote IP> (Username: <user>) 413 Successful login through SSH <remote IP> (Username: <user>) 419 Successful authentication through SSH <remote IP> (Username: <user>) 1703 Logout through Console (Username: <user>) 404 Logout through Telnet <remote IP> (Username: <user>) 416 Logout through SSH <remote IP> (Username: <user>) 422 Console session time out (Username: <user>) 405 TELNET session time out <remote 417 IP> (Username: <user>) SSH session time out <remote IP> 423 (Username: <user>) Configuration saved to flash (Username: <user> from <UI>) 201 Firmware upgraded successfully (Username: <user> from <UI>) 202 Configuration successfully downloaded (Username: <user> from <UI>) 204 Configuration successfully 206 uploaded (Username: <user> from <UI>) Log message successfully 208 uploaded (Username: <user> from <UI>) 316862-B Rev 00 Chapter 5 Security features 99 Table 5 Info log messages Topology changed 600 New root selected <MAC> 601 Spanning Tree Protocol is enabled 602 (Username: <user> from <UI>) Spanning Tree Protocol is disabled (Username: <user> from <UI>) 603 Spanning Tree configuration modified (Username: <user> from <UI>) 604 Spanning Tree port configuration modified (Username: <user> from <UI>) 605 VLAN <ID> created successfully (Username: <user> from <UI>) 700 VLAN <ID> modified successfully (Username: <user> from <UI>) 701 VLAN <ID> deleted successfully (Username: <user> from <UI>) 702 Management Port link up <speed> 304 <duplex_mode> Management Port link down 305 Primary Power ON 212 Primary Power OFF 213 Redundant Power ON 214 Redundant Power OFF 215 RIP is enabled (Username: <user> 800 from <UI>) RIP is disabled (Username: <user> from <UI>) 801 RIP configuration modified (Username: <user> from <UI>) 802 OSPF is enabled (Username: <user> from <UI>) 900 OSPF is disabled (Username: <user> from <UI>) 901 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 100 Chapter 5 Security features Table 5 Info log messages OSPF Interface state change: rtid: 902 <router_id>, ipa: <If_IP>, lesIf: <less_if>, <old_state> -> <new_state> 903 OSPF Virtual Interface state change: rtid: <router_id>, vir-area: <area_id>, vir-neibor: <neibor>, <old_state> -> <new_state> OSPF Nbr state change: rtid: <router_id>, nbr-ipa: <If_IP>, nbr-lessIndex: <less_index>, nbr-rtid: <rtrid>, <old_stat> -> <new_state> 904 OSPF Virtual Nbr state change: rtid: <router_id>, vir-nbr-area: <area_id>, vir-nbr-rtid>, <old_state> -> <new_state> 905 OSPF MD5 authentication modified (Username: <user> from <UI>) 906 OSPF configuration modified (Username: <user> from <UI>) 907 Template <ID> modified (Username: <user> from <UI>) 1300 VLAN <ID> attached to Template (Username: <user> from <UI>) 1301 VLAN <ID> detached from 1302 Template (Username: <user> from <UI>) User <user> account created (Username: <user> from <UI>) 1500 User <user> password modified (Username: <user> from <UI>) 1501 User <user> account deleted (Username: <user> from <UI>) 1502 SYSLOG enabled (Username: <user> from <UI>) 1400 SYSLOG configuration modified (Username: <user> from <UI>) 1401 SYSLOG disabled (Username: <user> from <UI>) 1402 316862-B Rev 00 Chapter 5 Security features 101 Table 5 Info log messages TELNET server enabled (Username: <user> from <UI>) 424 TELNET configuration modified (Username: <user> from <UI>) 425 TELNET server disabled (Username: <user> from <UI>) 426 SSH server enabled (Username: <user> from <UI>) 1700 SSH configuration modified (Username: <user> from <UI>) 1701 SSH server disabled (Username: <user> from <UI>) 1702 SNMP configuration modified (Username: <user> from <UI>) 501 Login successfully through Console authenticated by TACACS+ server <IP> (Username: <user>) 400 406 Login successfully through WEB from <remote IP> authenticated by TACACS+ server <IP> (Username: <user>) 412 Login successfully through TELNET from <remote IP> authenticated by TACACS+ server <IP> (Username: <user>) 418 Login successfully through SSH from <remote IP> authenticated by TACACS+ server <IP> (Username: <user>) Authentication enabled by user (Username: <user> from <UI>) 1200 Authentication disabled by user (Username: <user> from <UI>) 1201 Log table cleared (Username: <user> from <UI>) 216 IGMP SNOOPING enabled (Username: <user> from <UI>) 1000 IGMP SNOOPING disabled (Username: <user> from <UI>) 1001 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 102 Chapter 5 Security features Table 5 Info log messages IGMP SNOOPING configuration modified (Username: <user> from <UI>) 1002 IGMP configuration modified (Username: <user> from <UI>) 1100 create <action - related command> (Username: <user> from <UI>) 1900 config <action - related command> 1900 (Username: <user> from <UI>) delete <action - related command> 1900 (Username: <user> from <UI>) show <action - related command> 1900 (Username: <user> from <UI>) clear <action - related command> (Username: <user> from <UI>) 1900 Table 6 shows the mapping of Warning log messages. Table 6 Warning log messages Log Message Log ID Console login fail (Username: <user>) 403 Web login fail <remote IP> (Username: <user> from <UI>) 409 TELNET login fail <remote IP> (Username: <user> from <UI>) 415 SSH login fail <remote IP> (Username: <user> from <UI>) 421 Failure to authenticate user through SSH <remote IP> (Username: <user> from <UI>) 1704 SNMP request received from <remote IP> with invalid community string (Username: <user> from <UI>) 500 Firmware upgrade failed (Username: <user> from <UI>) 203 316862-B Rev 00 Chapter 5 Security features 103 Table 6 Warning log messages Configuration download failed (Username: <user> from <UI>) 205 Configuration upload failed (Username: <user> from <UI>) 207 Log message upload failed (Username: <user> from <UI>) 209 402 Login fail through Console authenticated by TACACS+ server <IP> (Username: <user>) Login fail through WEB from <remote IP> authenticated by TACACS+ server <IP> (Username: <user>) 408 Login fail through TELNET from <remote IP> authenticated by TACACS+ server <IP> (Username: <user>) 414 Login fail through SSH from <remote IP> authenticated by TACACS+ server <IP> (Username: <user>) 420 TACACS+server <remote IP> connection fail 1202 TACACS+ server <IP> response is wrong 1206 TACACS+ doesn’t support this functionality 1207 Table 7 shows the mapping of Critical log messages. Table 7 Critical log messages Log Message Log ID Error in PSS, phy link is up, but PSS link is down 102 CPU hang 100 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 104 Chapter 5 Security features Table 8 shows the mapping of Error log messages. Table 8 Error log messages Log Message Log ID TACACS+ module allocated memory fail 1203 TACACS+ socket API occurs some errors 1205 TACACS+ internal fatal error 1208 The following sections detail the CLI commands used to configure Syslog on the Switch. Creating a Syslog host To create a new Syslog host on the Switch, use the following command: create syslog host 316862-B Rev 00 Chapter 5 Security features 105 This command includes the following options: create syslog host followed by: <slog_id> This an index number that will be used to identify the Syslog host, if more than one Syslog host is created on the Switch. severity Severity level indicator. Enter the parameter (in italics, below) after the severity parameter in the command line to instruct the switch to send the type of messages to the remote host. informational - specifies that informational messages will be sent to the remote host. As described in the table above. warning - Specifies that warning messages will be sent to the remote host. As described in the table above. error - specifies that error messages will be sent to the remote host. As described in the table above. fatal - specifies that fatal messages will be sent to the remote host. The Switch maps the Critical and Emergency messages, as described in the table above, to this severity level. all - specifies that all of the above categories of messages will be sent to the remote host. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 106 Chapter 5 Security features create syslog host followed by: facility Some of the operating system daemons and processes have been assigned Facility values. Processes and daemons that have not been explicitly assigned a Facility may use any of the"local use" facilities or they may use the "user-level" Facility. Those Facilities that have been designated are shown in the following: Bold font indicates the facility values the Switch supports now. Numerical Facility Code 0 kernel messages 1 user-level messages 2 mail system 3 system daemons 4 security|authorization messages 5 messages generated internally by syslog 6 line printer subsystem 7 network news subsystem 8 UUCP subsystem 9 clock daemon 10 security|authorization messages 11 FTP daemon 12 NTP subsystem 13 log audit 14 log alert 15 clock daemon 16 local use 0 (local0) 17 local use 1 (local1) 18 local use 2 (local2) 19 local use 3 (local3) 20 local use 4 (local4) 21 local use 5 (local5) 22 local use 6 (local6) 23 local use 7 (local7) 316862-B Rev 00 Chapter 5 Security features 107 create syslog host followed by: local0 - Specifies that local use 0 messages will be sent to the remote host. This corresponds to number 16 from the list above. local1 - Specifies that local use 1 messages will be sent to the remote host. This corresponds to number 17 from the list above. local2 - Specifies that local use 2 messages will be sent to the remote host. This corresponds to number 18 from the list above. local3 - Specifies that local use 3 messages will be sent to the remote host. This corresponds to number 19 from the list above. local4 - Specifies that local use 4 messages will be sent to the remote host. This corresponds to number 20 from the list above. local5 - Specifies that local use 5 messages will be sent to the remote host. This corresponds to number 21 from the list above. local6 - Specifies that local use 6 messages will be sent to the remote host. This corresponds to number 22 from the list above. local7 - Specifies that local use 7 messages will be sent to the remote host. This corresponds to number 23 from the list above. udp_port <value 514-530> Specifies the UDP port number that the syslog protocol will use to send messages to the remote host.ipaddress. ipaddress <ipaddr> Specifies the IP address of the remote host where syslog messages will be sent.state state [enabled|disabled] - Allows the sending of syslog messages to the remote host, specified above, to be enabled and disabled. Figure 41 shows the creation of a Syslog host on the Switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 108 Chapter 5 Security features Figure 41 create syslog host :4#create syslog host 1 severity all facility local0 Command: create syslog host 1 severity all facility local0 Success. :4# Configuring a Syslog host To configure a previously created Syslog host on the Switch, use the following command: config syslog host 316862-B Rev 00 Chapter 5 Security features 109 This command includes the following options: config syslog host followed by: <slog_id> This an index number that will be used to identify the Syslog host, if more than one Syslog host is created on the Switch. severity Severity level indicator. Enter the parameter (in italics, below) after the severity parameter in the command line to instruct the switch to send the type of messages to the remote host. informational - specifies that informational messages will be sent to the remote host. As described in the table above. warning - Specifies that warning messages will be sent to the remote host. As described in the table above. error - specifies that error messages will be sent to the remote host. As described in the table above. fatal - specifies that fatal messages will be sent to the remote host. The Switch maps the Critical and Emergency messages, as described in the table above, to this severity level. all - specifies that all of the above categories of messages will be sent to the remote host. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 110 Chapter 5 Security features config syslog host followed by: facility Some of the operating system daemons and processes have been assigned Facility values. Processes and daemons that have not been explicitly assigned a Facility may use any of the"local use" facilities or they may use the "user-level" Facility. Those Facilities that have been designated are shown in the following: Bold font indicates the facility values the Switch supports now. Numerical Facility Code 0 kernel messages 1 user-level messages 2 mail system 3 system daemons 4 security|authorization messages 5 messages generated internally by syslog 6 line printer subsystem 7 network news subsystem 8 UUCP subsystem 9 clock daemon 10 security|authorization messages 11 FTP daemon 12 NTP subsystem 13 log audit 14 log alert 15 clock daemon 16 local use 0 (local0) 17 local use 1 (local1) 18 local use 2 (local2) 19 local use 3 (local3) 20 local use 4 (local4) 21 local use 5 (local5) 22 local use 6 (local6) 23 local use 7 (local7) 316862-B Rev 00 Chapter 5 Security features 111 config syslog host followed by: local0 - Specifies that local use 0 messages will be sent to the remote host. This corresponds to number 16 from the list above. local1 - Specifies that local use 1 messages will be sent to the remote host. This corresponds to number 17 from the list above. local2 - Specifies that local use 2 messages will be sent to the remote host. This corresponds to number 18 from the list above. local3 - Specifies that local use 3 messages will be sent to the remote host. This corresponds to number 19 from the list above. local4 - Specifies that local use 4 messages will be sent to the remote host. This corresponds to number 20 from the list above. local5 - Specifies that local use 5 messages will be sent to the remote host. This corresponds to number 21 from the list above. local6 - Specifies that local use 6 messages will be sent to the remote host. This corresponds to number 22 from the list above. local7 - Specifies that local use 7 messages will be sent to the remote host. This corresponds to number 23 from the list above. udp_port <value 514-530> Specifies the UDP port number that the syslog protocol will use to send messages to the remote host.ipaddress. ipaddress <ipaddr> Specifies the IP address of the remote host where syslog messages will be sent.state state [enabled|disabled] - Allows the sending of syslog messages to the remote host, specified above, to be enabled and disabled. Figure 42 shows the configuration of a Syslog host on the Switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 112 Chapter 5 Security features Figure 42 config syslog host :4#config syslog host 1 severity all facility local0 Command: config syslog host 1 severity all facility local0 Success. :4# Configuring the maximum number of Syslog hosts To configure the maximum number of Syslog hosts that can be created on the Switch, use the following command: config syslog max_hosts This command includes the following options: config syslog max_hosts followed by: <int 1-10> This is the maximum number of Syslog hosts that can be created on the Switch. Entering ‘0’ instructs the Switch to prevent any Syslog hosts from being created. If there are any previously created Syslog hosts on the Switch, and you enter the command config syslog max_hosts 0, then all existing syslog hosts will be deleted from the Switch when the command executes sucessfully. Figure 43 shows the setting of 10 Syslog hosts as the maximum on the Switch. 316862-B Rev 00 Chapter 5 Security features 113 Figure 43 config syslog max_hosts :4#config syslog max_hosts 10 Command: config syslog max_hosts 10 Success. :4# Deleting a Syslog host To delete a previously created Syslog host on the Switch, use the following command: delete syslog host This command includes the following options: delete syslog host followed by: <slog_id> This an index number that will be used to identify the Syslog host, if more than one Syslog host is created on the Switch. There can be up to four Syslog hosts. all Specifies that all Syslog hosts created on the Switch will be deleted. Figure 44 shows the deletion of all Syslog hosts on the Switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 114 Chapter 5 Security features Figure 44 delete syslog host :4#delete syslog host all Command: delete syslog host all Success. :4# Enabling a Syslog host To enable a previously created Syslog host on the Switch, use the following command: enable syslog This command includes no additional options: enable syslog There are no options Figure 45 shows the enabling of a Syslog host on the Switch. Figure 45 enable syslog :4#enable syslog Command: enable syslog Success. :4# 316862-B Rev 00 Chapter 5 Security features 115 Disabling a Syslog host To disable a previously created Syslog host on the Switch, use the following command: disable syslog This command includes no additional options: disable syslog There are no options Figure 46 shows the enabling of a Syslog host on the Switch. Figure 46 disable syslog :4#disable syslog Command: disable syslog Success. :4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 116 Chapter 5 Security features Displaying the current Syslog configuration on the Switch To display the current Syslog configuration on the Switch, use the following command: show syslog This command includes the following options: show syslog followed by: <slog_id> This an index number that will be used to identify the Syslog host, if more than one Syslog host is created on the Switch. There can be up to four Syslog hosts. Figure 47 shows the displaying of the current Syslog host configuration on the Switch. Figure 47 show syslog :4#show syslog host Command: show syslog Syslog Index -----1 :4# 316862-B Rev 00 Global State: Enabled Host IP Address Severity --------------- -------10.1.2.1 Info Facility -------local2 UDP port -------520 Status -----Enabled Chapter 5 Security features 117 Enabling and disabling logging on the Switch The Switch can log all CLI commands that a given user enters in both a local log and through Syslog. The config log_state command allows you to turn the logging of CLI command entry on or off for a particular user account. If you disable the logging of CLI commands for a particular user account, both the local log and the Syslog will be disabled for that user. When CLI logging is enabled, it takes effect immediately. The default log state is enabled. To disable the logging of all CLI commands issued by the user Johnson, use the following command: config log_state Johnson disabled This command includes the following options: config log_state followed by: <username> This is the username assigned to the user account for which you want to enable or disable the logging of all CLI commands issued in both the local log and Syslog. enabled | disabled Instructs the Switch to enable or disable the logging of all CLI commands for the user account specified by the <username> entered above. Figure 48 shows the disabling of CLI command logging for the user account Johnson. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 118 Chapter 5 Security features Figure 48 config log_state Johnson disabled :4#config log_state Johnson disabled Command: config log_state Johnson disabled Success. :4# Uploading the Switch’s log and configuration to a TFTP server The Switch can log all CLI commands that a given user enters. The upload [configuration | log] command allows you send a copy of the log (or the current Switch configuration) to a TFTP server on your network. In firmware release 1.0.1.1 or higher, you have the option of including user account information (user names, password, and admin/user-level status) in the configuration file that is uploaded to the TFTP server. The append_account parameter is used to add user account information to the configuration file. The Switch will automatically encrypt the passwords (using SSH-A1 with a non-user changable key stored in the switch,) if the append_account parameter is specified. The only way to decrypt these passwords is to subsequently download this configuration file from the TFTP server to the Switch. So, the passwords assigned to the user accounts can not be read from the text file the Switch uploads to the TFTP server. To upload the Switch’s current configuration, including user account information, use the following command: upload configuration 10.42.73.5 c:\cfg\config.txt append_account 316862-B Rev 00 Chapter 5 Security features 119 This command includes the following options: upload followed by: configuration | log Instructs the Switch to upload either its current configuration or its current log file. <ipaddr> This is the IP address of a TFTP server that will receive the configuration or log file. <path_filename> Specifies the location on the TFTP server where the configuration of log file will be uploaded to. This is in the form: c:\. append_account Instructs the Switch to include user account information in the configuration file. Figure 49 shows the uploading of a configuration. Figure 49 upload configuration :4#upload configuration 10.42.73.5 c:\cfg\config.txt append_account Command: upload configuration 10.42.73.5 c:\cfg\config.txt append_account Connecting to server ........................... Done. Upload Configuration ........................... Done. :4# Configuring Password aging The Passport 1600 Series Switches (firmware release 1.0.1.1 and higher) allow you configure the maximum amount of time a password assigned to a user account is allowed to be in use. The default is 90 days. The Switch will give a warning message when the user logs in at the point where 75, 80, 85, 90, and 95% of the maximum password age time has expired. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 120 Chapter 5 Security features To configure the maximum length of time a password assigned to a user account may be in use, use the following command: config password_aging This command includes the following options: config password_aging followed by: <day 1-999> This is the maximum amount of time, in days, that a password assigned to a user account can be in use (valid). The default is 90 days. The user will be notified at login when 75 to 95% of this time has expired, in 5% increments. Entering ‘999’ instructs the Switch to disable password aging. If you enter the command config password_aging 999, password aging will be disabled on the Switch and no warning messages will be displayed. Figure 50 shows the setting of the maximum amount of time a password assigned to a user account can be in use to be 10 days. Figure 50 config password_aging :4#config password_aging day 10 Command: config password_aging day 10 Success. :4# 316862-B Rev 00 Chapter 5 Security features 121 Displaying the Password aging time The Passport 1600 Series Switches (firmware release 1.0.1.1 and higher) allow you configure the maximum amount of time a password assigned to a user account is allowed to be in use. The default is 90 days. The Switch will give a warning message when the user logs in at the point where 75, 80, 85, 90, and 95% of the maximum password age time has expired. To display the currently configured maximum length of time a password assigned to a user account may be in use, use the following command: show password_aging This command includes no additional options: show password_aging There are no options Figure 51 shows the display of the currently configured maximum amount of time a password assigned to a user account can be in use. Figure 51 show password_aging :4#show password_aging Command: show password_aging Password Aging Time :10 day (s) :4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 122 Chapter 5 Security features Configuring the Switch’s Secure Mode The Passport 1600 Series Switches (firmware release 1.0.1.1 and higher) allow you to specify a secure mode for the Switch as either normal or high. In the normal mode, the TELNET and SNMP remote management applications are enabled, while the SSH and WEB remote management applications are disabled. In the high mode, the SSH, TELNET, WEB and SNMP remote management and configuration applications are all disabled. Initially, when the Switch’s secure mode is set to high, only the RS-232 Console port can be used to manage and configure the Switch. You can manually enable any of the remote management applications however, using the CLI and the RS-232 Console port. Note: The config secure mode [normal | high] command can only be entered from the Console application and cannot be entered from a remote management application, such as TELNET, SSH, or the Web-based configuration manager. Note: After resetting the Passport 1600 Series switch, if the high secure mode was previously configured, the switch remains in high secure mode. To return to normal secure mode, you must manually disable the high secure mode. You can only perform this operation from the CLI. To configure the Switch to close the SSH, TELNET, WEB, and SNMP remote management and configuration applications, use the following command: config secure_mode high 316862-B Rev 00 Chapter 5 Security features 123 This command includes the following options: config secure_mode followed by: normal This specifies that security configuration for the TELNET and SNMP remote management and configuration applications will be enabled, and that these applications can be used to manage and configure the Switch. The SSH and WEB remote management applications will be disabled. You can manually enable the SSH and WEB remote management applications at any time after issuing this command. high This specifies that the SSH, TELNET, WEB, and SNMP remote management and configuration applications will be disabled. When the Switch’s secure mode is set to high, only the RS-232 Console port can be used to manage and configure the Switch. You can manually enable the SSH, TELNET, WEB and SNMP at any time after issuing this command. Figure 52 shows the Switch’s secure mode being set to high. In this mode, only the RS-232 Console port can be used to manage and configure the Switch. Figure 52 config secure_mode :4#config secure_mode high Command: config secure_mode high Success. :4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 124 Chapter 5 Security features Displaying the Switch’s current secure mode The Passport 1600 Series Switches (firmware release 1.0.1.1 and higher) allow you configure a secure mode for the Switch as either normal or high. In the normal mode, the security configuration is in effect, as entered. In the high mode, the SSH, TELNET, WEB and SNMP remote management and configuration applications are closed to all users. When the Switch’s secure mode is set to high, only the RS-232 Console port can be used to manage and configure the Switch. To display the Switch’s current secure mode configuration, use the following command: show secure_mode This command includes no additional options: show secure_mode There are no options Figure 53 shows the display of the Switch’s currently configured secure mode. Figure 53 show secure_mode :4#show secure_mode Command: show secure_mode Secure Mode : High :4# 316862-B Rev 00 Chapter 5 Security features 125 Secure Shell (SSH) Secure Shell (SSH) is a client/server protocol that specifies the way to conduct secure communications over a network. Secure CoPy is a secure file transfer protocol. When using other methods of remote access, such as Telnet or FTP, the traffic generated by these utilities is not encrypted. Anyone that can see the network traffic can see all data, including passwords and user names. SSH can replace Telnet and other remote logon utilities. SSH supports a variety of the many different public/private key encryption schemes available. Using the public key of the host server, the client and server negotiate to generate a session key known only to the client and the server. This one-time key is then used to encrypt all traffic between the client and the server. Even if network security is compromised, traffic cannot be played back or decrypted, and the connection cannot be hijacked. The secure channel of communication provided by SSH does not provide protection against break-in attempts or denial-of-service (DoS) attacks. Note: the Passport 1600 Series Switches support only SSH version 2. The Switch does not support SSH version 1. The SSHversion 2 protocol supported by the Switch supports the following security features: • Authentication. This determines, in a reliable way, the identity of the SSH client. During the login process the SSH client is queried for a digital proof of identity. Supported authentications or RSA (SSH-1) DSA (SSH-2) and passwords (both SSH-1 and SSH-2). • Encryption. The SSH server uses encryption algorithms to scramble data and render it unintelligible except to the receiver. Supported encryption algorithms are: 3DES, AES-128-cbc, AES-192-cbc, AES-256-cbc, ArcFour, Blowfish-cbc, Cast128-cbc, Twofish128-cbc, Twofish192-cbc, and Twofish256-cbc. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 126 Chapter 5 Security features • Integrity. This guarantees that the data is transmitted from the sender to the receiver without any alteration. If any third party captures and modifies the traffic, the SSH server will detect this alteration. Hmac-MD% and Hmac-sha-1 are supported. The implementation of the SSH server in the Passport 1600 Series switch enables the SSH client to make a secure connection to a Passport 1600 Series switch and will work with commercially available SSH clients. You must use the CLI to initially configure SSH. You can use Device Manager (DM) to change the SSH configuration parameters. However, Nortel Networks recommends using the CLI. Nortel Networks also recommends using the console port to configure the SSH parameters. SSH version 2 (SSH-2) The SSH protocol, version 2 (SSH-2) is a complete rewrite of the SSH-1 protocol. While SSH-1 contains multiple functions in a single protocol, in SSH-2 the function are divided among three layers: • SSH Transport Layer (SSH-TRANS) The SSH transport layer manages the server authentication and provides the initial connection between the client and the server. Once established, the transport layer provides a secure, full-duplex connection between the client and server. • SSH Authentication Protocol (SSH-AUTH) The SSH authentication protocol runs on top of the SSH transport layer and authenticates the client-side user to the server. SSH-AUTH defines three authentication methods; public key, host-based, and password. SSH-AUTH provides a single authenticated tunnel for the SSH connection protocol. • SSH Connection Protocol (SSH-CONN) The SSH connection protocol runs on top of the SSH transport layer and user authentication protocols. SSH-CONN provides interactive login sessions, remote execution of commands, forwarded TCP/IP connections, and forwarded X11 connections. These higher services are multiplexed into the single encrypted tunnel provided by the SSH transport layer. 316862-B Rev 00 Chapter 5 Security features 127 The modular approach of the SSH-2 improves on the security, performance, and portability over the SSH-1 protocol. Note: The SSH-1 and SSH-2 protocols are not compatible. The SSH implementation in the Passport 1600 Series switch supports only SSH version 2. Supported SSH clients The Passport 1600 Series switch software release 1.0.1.1 supports the following third party SSH clients. The table below describes the third party SSH client software that has been tested but not included with this release. Table 9 Third party SSH client software SSH Client Secure Shell (SSH) SecureCRT Openssh • • • • Supports SSH-2 client only. Authentication: RSA, DSA, Password. Provides a keygen tool. It creates both RSA and DSA keys in SSH v2 format. OpenSSH Unix Solaris2.5/2.6 • • • • Supports SSH-2 clients. Authentication: RSA, DSA, Password. Provides a keygen tool. It creates both RSA and DSA keys in SSH v2 format. Secure Netterm Windows 2000 • • • • Supports SSH-2 clients. Authentication: RSA, DSA, Password. Provides a keygen tool. It creates both RSA and DSA keys in SSH v2 format. PuTTY Windows 2000 • • • • Supports SSH-2 clients. Authentication: RSA, DSA, Password. Provides a keygen tool. It creates both RSA and DSA keys in SSH v2 format. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 128 Chapter 5 Security features Table 9 Third party SSH client software Absolute Windows 2000 • • • • Supports SSH-2 clients. Authentication: RSA, DSA, Password. Provides a keygen tool. It creates both RSA and DSA keys in SSH v2 format. Secure Shell Client Windows 2000 • • • • Supports SSH-1 and SSH-2 clients. Authentication: RSA, DSA, Password Provides a keygen tool. It creates both RSA and DSA keys in SSH v1 format. ZOC pro Windows 2000 • • • • Supports SSH-2 clients. Authentication: RSA, DSA, Password. Provides a keygen tool. It creates both RSA and DSA keys in SSH v2 format. PenguiNet Windows 2000 • • • • Supports SSH-2 clients. Authentication: RSA, DSA, Password. Provides a keygen tool. It creates both RSA and DSA keys in SSH v2 format. F-secure Windows 2000 • • • • Supports SSH-2 clients. Authentication: RSA, DSA, Password. Provides a keygen tool. It creates both RSA and DSA keys in SSH v2 format. Using the CLI to configure SSH You can use Device Manager (DM) to change the SSH configuration parameters. However, Nortel Networks recommends using the Command Line Interface (CLI) to configure the SSH. Note: Only the Server SSH has been implemented in the 1.1 release. There is NO SSH client on the Passport 1600 Series switch. A remote application must be used to establish the communication with the switch. 316862-B Rev 00 Chapter 5 Security features 129 Configuring Secure Shell (SSH) The Passport 1600 Series switches (firmware release 1.0.1.1, or later) support the SSH version 2 SERVER implementation. Note: SSH version 1, because of its inherent security holes is not supported. Because the Passport 1600 Series switches implement only the server part of the protocol, you must use a third-party application to connect to the switch. Please see Table 9 for a list of approved SSH v2 clients. The steps required to use the SSH protocol for secure communication between a remote PC (the SSH Client) and the Switch (the SSH Server), are as follows: • • • • • Create a user account with admin-level access using the create account admin <username> <password> command. In the example presented below, the username SSHtest is used. This is identical to creating any other admin-lever User account on the Switch, including specifying a password. This password is used to login to the Switch, once secure communication has been established using the SSH version 2 protocol. Configure the user account to use a specified authorization method to identify users that are allowed to establish SSH connections with the Switch using the config ssh user authmode command. There are some choices as to the method SSH will use to authorize the user. The two methods, password and publickey are used in the example presented below. Configure the encryption algrothim that SSH will use to encrypt and decrypt messages sent between the SSH Client and the SSH Server. Again, there are some choices to make, but 3DES is used in the example presented below. Finally, enable SSH on the Switch using the enable ssh command. After following the above steps, you can configure an SSH Client on the remote PC and manage the Switch using secure, in-band communication. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 130 Chapter 5 Security features Creating a User account To create an admin or user account, including a username and password, use the create account command. Note that this command also allows you to select the privileges this account will have. In general, user-level accounts can display the switch’s current configuration, but cannot make any changes. Admin-level accounts have full access to all configuration commands. To create a new User account for use with the SSH protocol, use the following command: create account admin SSHtest The Switch will respond with: Enter a case-sensitive new password: ******* Enter the new password again for confirmation: ******** The password must be at least 8 and not more than 15 characters. This password will be used to logon to the switch. This command includes the following options: create account followed by: admin <username 15> Creates an administrator-level user account. This user can execute all of the commands in the CLI without restriction. • username identifies the user. It is a alphanumeric string, from 1 to 15 characters. user <username 15> Creates a user-level user account. This user is limited to displaying switch configuration and accumulated switch statistics. • username identifies the user. It is a alphanumeric string, from 1 to 15 characters. Figure 54 shows you how to create a new administrator-level user account with the username SSHtest. 316862-B Rev 00 Chapter 5 Security features 131 Figure 54 create account command :4#create account admin SSHtest Command: create account admin SSHtest Enter a case-sensitive new password:******** Enter the new password again for confirmation:******** Success. :4# Configuring the SSH authorization mode Before the SSH Server on the Switch can establish a secure communications channel with an SSH Client, you must specify the type of authorization that the SSH Server can accept to verify the SSH Client as an authorized user. The password parameter instructs the SSH Server to use the password assigned to the User account. The public key parameter instructs the SSH Server to use the public key encryption/decrypting method using a combination of a private key and public key stored on the remote PC (the SSH Client). The hostbased parameter allows you to specify a remote host on the network by either name or IP address that will be allowed to establish an SSH connection with the Switch. To configure the SSH authorization mode, use the following command: config ssh authmode password enabled Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 132 Chapter 5 Security features This command includes the following options: config ssh authmode followed by: password Specifies the use of a password to establish user authorization for an SSH session. This password is the same as the password assigned to the User account. public key Specifies the use of public key encryption and decryption of a message exchange between the SSH Client and the Switch’s SSH Server to authorize the User. hostbased This specifies the name or IP address of a specific host (a remote PC) that will be authorized to establish an SSH connection to the Switch. The host’s name is specified by entering hostname followed by the host’s name in the <string> field of the create ssh user command, shown above. enabled Enables the User authorization mode specified above. disabled Disables the User authorization mode specified above. Figure 55 shows how to configure the user account SSHtest to use the password assigned to this account to authorize an SSH session with the Switch. Figure 55 config ssh authmode command :4# config ssh authmode password enabled Command: config ssh authmode password enabled Success. :4# 316862-B Rev 00 Chapter 5 Security features 133 Displaying the Switch’s current SSH authorization mode To display the Switch’s current SSH authorization mode, use the following command: show ssh authmode This command includes no additional options: show ssh authmode There are no options Figure 56 shows the Switch’s current SSH authorization mode. Figure 56 show ssh authmode :4# show ssh authmode Command: show ssh authmode The SSH User Authentication Support -----------------------------------Password : Enabled Public Key : Enabled Hostbased : Enabled Updating an SSH user account’s authorization mode Once you have created a user account, and configured the SSH authorization mode for that account, you can update the information using the config ssh user command. To update the configuration of an SSH user account, use the following command: config ssh user SSHtest authmode password Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 134 Chapter 5 Security features where: SSHtest is the username of a previously created User account. This command includes the following options: config ssh user <username> authmode followed by: hostbased hostname <string 31> hostname_IP <string 31> <ipaddr> This specifies the name or IP address of a specific host (a remote PC) that will be authorized to establish an SSH connection to the Switch. The host’s name is specified by entering hostname followed by the host’s name in the <string> field. The host’s IP address is specified by entering hostname_IP followed by the host’s name in the <string> field, followed by the host’s IP address in the <ipaddr> field. password Specifies the use of a password to establish user authorization for an SSH session. This password is the same as the password assigned to the User account. public key Specifies the use of public key encryption and decryption of a message exchange between the SSH Client and the Switch’s SSH Server to authorize the User. none Specifies that there will be on user authorization. Figure 57 shows how to configure the user account SSHtest to use the password assigned to this account to authorize an SSH session with the Switch. 316862-B Rev 00 Chapter 5 Security features 135 Figure 57 config ssh user command :4# config ssh user SSHtest authmode password Command: config ssh user SSHtest authmode password Success. :4# Configuring the SSH encryption algorithm To configure the SSH algorithm to use 3DES: config ssh algorithm 3DES enabled where: 3DES is the encryption algrothim that the Secure Shell (SSH) will use to encrypt and decrypt messages between the SSH Server and the SSH Client. This command includes the following options: config ssh algorithm followed by: 3DES Enter this parameter, followed by enabled or disabled, to use the 3DES encryption algorithm with the Secure Shell (SSH.) AES128 Enter this parameter, followed by enabled or disabled, to use the AES128 encryption algorithm with the Secure Shell (SSH.) AES192 Enter this parameter, followed by enabled or disabled, to use the AES192 encryption algorithm with the Secure Shell (SSH.) AES256 Enter this parameter, followed by enabled or disabled, to use the AES256 encryption algorithm with the Secure Shell (SSH.) Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 136 Chapter 5 Security features config ssh algorithm followed by: arcfour Enter this parameter, followed by enabled or disabled, to use the Arcfour encryption algorithm with the Secure Shell (SSH.) blowfish Enter this parameter, followed by enabled or disabled, to use the Blowfish encryption algorithm with the Secure Shell (SSH.) cast128 Enter this parameter, followed by enabled or disabled, to use the Cast128 encryption algorithm with the Secure Shell (SSH.) twofish128 Enter this parameter, followed by enabled or disabled, to use the Twofish128 encryption algorithm with the Secure Shell (SSH.) twofish192 Enter this parameter, followed by enabled or disabled, to use the Twofish192 encryption algorithm with the Secure Shell (SSH.) twofish256 Enter this parameter, followed by enabled or disabled, to use the Twofish256 encryption algorithm with the Secure Shell (SSH.) MD5 Enter this parameter, followed by enabled or disabled, to use the HMAC-MD5 data integrity algorithm with the Secure Shell (SSH.) SHA1 Enter this parameter, followed by enabled or disabled, to use the HMAC-SHA1 data integrity algorithm with the Secure Shell (SSH.) RSA Enter this parameter, followed by enabled or disabled, to use the RSA public key algorithm with the Secure Shell (SSH.) DSA Enter this parameter, followed by enabled or disabled, to use the DSA public key algorithm with the Secure Shell (SSH.) enabled|disabled Enter enabled or disabled after any one of the algorithms above to activate that algorithm for use with SSH. 316862-B Rev 00 Chapter 5 Security features 137 Figure 58 shows the SSH Server on the Switch configured to use the 3DES encryption algorithm. Figure 58 config ssh algorithm :4# config ssh algorithm 3DES enabled Command: config ssh algorithm 3DES enabled Success. :4# Displaying the Current SSH encryption algorithm To display the current SSH algorithm in use on the Switch, use the following command: show ssh algorithm This command includes the following options: show ssh algorithm There are no options Figure 59 shows the current SSH algorithm configuration of the Switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 138 Chapter 5 Security features Figure 59 show ssh algorithm :4# show ssh algorithm Command: show ssh algorithm Encryption Algorithm ------------------------3DES : Enable AES128 : Enable AES192 : Enable AES256 : Enable Arcfour : Enable Blowfish : Enable Cast128 : Enable Twofish128: Enable Twofish192: Enable Twofish256: Enable Data Integrity Algorithm -----------------------MD5 : Enable SHA1 : Enable Public Key Algorithm -------------------RSA : Enable DSA : Enable :4# Displaying the Switch’s current SSH Users To display the Switch’s current SSH users, use the following command: show ssh user This command includes no additional options: show ssh user There are no options 316862-B Rev 00 Chapter 5 Security features 139 Figure 60 shows the Switch’s current SSH users. Figure 60 show ssh user :4# show ssh user Command: show ssh user Current Accounts: -------------------------Username Authentication SSHtest Password SSHtest2 Publickey SSHtest3 Hostbased Debbie 10.42.73.5 SSHtest4 None Configuring the SSH Server on the Switch To configure the SSH algorithm to use 3DES: config ssh server where: 3DES is the encryption algrothim that the Secure Shell (SSH) will use to encrypt and decrypt messages between the SSH Server and the SSH Client. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 140 Chapter 5 Security features This command includes the following options: config ssh server followed by: maxsession <int 1-3> This parameter allows you to specify the maximum number of SSH sessions that the SSH Server on the Switch will allow at any one time. You can specify between a minimum of one and a maximum of three simultaneous SSH sessions. The default is 3. timeout <sec 1-120> You can specify the maximum amount of time that will be allowed for an SSH session to be established. If this time is exceeded before the SSH session has begun, the SSH Server will discontinue the connection. You can specify a minimum of one and a maximum of 120 seconds. The default is 120 seconds. authfail <int 2-20> You can specify the maximum number of times the SSH Server will allow a remote host to attempt to become authorized. If this number of attempts is exceeded, the SSH Server will discontinue the connection. You can specify a minimum of two and a maximum of twenty authorization attempts. The default is 2. rekey <10min 30min 60min never> You can specify the length of time that an SSH session can last before generating a new set of encryption/decryption keys. You can specify 10min, 30min, 60min, and never. The default is 2. port <tcp_port_number 1-65535> This parameter allows you to specify which TCP port the SSH Server will listen on for requests from remote hosts to establish an SSH connection with the Switch. The default is TCP port number 22. Figure 61 shows the SSH Server on the Switch configured to allow a maximum of 2 sessions, a timeout of 20 seconds, a maximum of 2 failed authorization attempts, a rekey time of never, and the use of TCP port number 22. 316862-B Rev 00 Chapter 5 Security features 141 Figure 61 config ssh server :4# config ssh server maxsession 2 timeout 20 authfail 2 rekey never port 22 Command: config ssh server maxsession 2 timeout 20 authfail 2 rekey never port 22 Success. :4# Displaying the current SSH Server configuration To display the current SSH Server configuration: show ssh server This command includes no additional options: show ssh server There are no options. Figure 62 shows the current configuration of the SSH Server on the Switch. Figure 62 show ssh server :4# show ssh server Command: show ssh server SSH Server Status : Enabled SSH Max Session : 2 Connection timeout : 20 (sec) Rekey timeout : never Listened Port Number : 22 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 142 Chapter 5 Security features Enabling and disabling the SSH Server on the Switch To enable the SSH Server on the Switch: enable ssh This command has no options: enable | disable ssh there are no options. Figure 63 shows the SSH Server on the Switch being enabled. Figure 63 enable ssh :4# enable ssh Command: enable ssh Success. :4# Configuring the SSH Server to regenerate its hostkey To force the SSH Server to regenerate its hostkey, use the following command: config ssh regenerate hostkey This command includes no additional options: config ssh regenerate hostkey Figure 64 shows the current configuration of the SSH Server on the Switch. 316862-B Rev 00 Chapter 5 Security features 143 Figure 64 config ssh regenerate hostkey :4# config ssh regenerate hostkey Command: config ssh regenerate hostkey Success. :4# TACACS+ TACACS+ is a security protocol that provides access control for devices via one or more centralized servers. All WEB, TELNET and CLI user logins check the user name and password with a database of Network Access Security (NAS) servers through the TACACS+ protocol if the authentication method being used is TACACS+. This is useful in checking authentication when thousands of users using thousands of devices are distributed around the network. The system provides two stages of authentication for the user, the first is the “login” stage and the second is the “enable” stage. Each stage can choose up to three authentication methods, the are TACACS+, local/enable and none. In addition, two privilege levels are provided, the user level and the admin level. When the user passes the first level, the “user” level is assigned. The “admin” level will be assigned if the user passes the second stage. The following four authentication methods are supported: TACACS+: Verifies both the username/password pair and enables the password using the TACACS+ server. When username/password verification is passed, the user level is assigned. After that, use the “enable admin” command to promote privilege mode to the admin user. Four TACACA+ servers are supported. Local: Authenticate the username/password pair with a local database. If authentication passes and the privilege level associated with the username/ password pair is “admin level,” the user will receive admin level privilege. If authentication passes and the username/password pair is “user level,” the user will receive user-level privileges. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 144 Chapter 5 Security features Enable: only the password is checked. This option is used only to promote the privilege level to the “admin” level. None: no authentication is specified. The following privilege modes are supported: user level: read only is permitted. admin level: read/write is permitted. Creating an entry to the Switch’s TACACS+ Server table To create an entry to the Switch’s TACACS+ Server table, use the following command: create tacacs+_server <ip_address> where: <ip_address> is the IP address of a TACACS+ Server on the network. This command includes the following options: create tacacs+_server followed by: <ipaddr> This is the IP address of a TACACS+ Server on the network. tcp_port <int 1-65535> This is the TCP port number in use by the TACACS+ Server specified above. The default is TCP port is port number 49. key [<key_string 1-254> | none] This is the key used for TACACS+ authentication. If no string is specified (the value is null) then no encryption will be applied. If none is specified, then no encryption key will be used. The default is none. timeout <sec 1-255> This parameter specifies the time, in seconds, that the Switch will wait for a reply from the TACACS+ Server. The default is 5 seconds. 316862-B Rev 00 Chapter 5 Security features 145 Figure 65 shows the creation of a TACACS+ Server entry on the Switch, using the key “top secret.” Figure 65 create tacacs+_server :4# create tacacs+_server 10.42.73.5 key top secret Command: create tacacs_server 10.42.73.5 key top secret Success. :4# Configuring a TACACS+ Server entry on the Switch To configure an entry to the Switch’s TACACS+ Server table (change a previously created entry), use the following command: config tacacs+_server <ip_address> where: <ip_address> is the IP address of a TACACS+ Server on the network. Note: Nortel Networks strongly recommends that you configure in the TACACS+ server all interfaces participating in any remote session (telnet, SSH, etc.). This command includes the following options: config tacacs+_server followed by: <ipaddr> This is the IP address of a TACACS+ Server on the network. tcp_port <int 1-65535> This is the TCP port number in use by the TACACS+ Server specified above. The default is TCP port is port number 49. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 146 Chapter 5 Security features config tacacs+_server followed by: key [<key_string 1-254> | none] This is the key used for TACACS+ authentication. If no string is specified (the value is null) then no encryption will be applied. If none is specified, then no encryption key will be used. The default is none. timeout <sec 1-255> This parameter specifies the time, in seconds, that the Switch will wait for a reply from the TACACS+ Server. The default is 5 seconds. Figure 66 shows the configuring of a TACACS+ Server entry on the Switch, using the key “not so secret.” Figure 66 config tacacs+_server :4# config tacacs+_server 10.42.73.5 key not so secret Command: config tacacs+_server 10.42.73.5 key not so secret Success. :4# Displaying the Switch’s TACACS+ Server table To display the entries in the Switch’s TACACS+ Server table, use the following command: show tacacs+_server This command includes no additional options: show tacacs+_server 316862-B Rev 00 Chapter 5 Security features 147 Figure 67 shows the current contents of the Switch’s TACACS+ Server table. Figure 67 show tacacs+_server :4# show tacacs+_server Command: show tacacs+_server IP Address Port timeout key ------------------------------------------------------10.1.1.222 17777 10 not so secret :4# Deleting an entry from the Switch’s TACACS+ Server table To delete an entry from the Switch’s TACACS+ Server table, use the following command: delete tacacs+_server 10.1.1.222 This command includes the following options: delete tacacs+_server <ip_address> This is the IP address of the TACACS+ Server you want to delete from the Switch’s TACACS+ Server table. Figure 68 shows the deletion of the TACACS+ Server, with an IP address of 10.1.1.222, from the Switch’s TACACS+ Server table. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 148 Chapter 5 Security features Figure 68 delete tacacs+_server :4# delete tacacs+_server 10.1.1.222 Command: delete tacacs+_server 10.1.1.222 Success. :4# Enabling admin-level privileges for a user-level account To promote a user with user-level privileges to admin-level privileges, use the following command: enable admin When this command is entered, the current user authentication method in use on the Switch will be used to authenticate the user. This command includes the following options: enable admin There are no options Figure 69 shows the currently logged on user raising the account’s privilege level from user-level to admin-level. Figure 69 enable admin :4# enable admin Command: enable admin Password: ******** Success. :4# 316862-B Rev 00 Chapter 5 Security features 149 Assigning a password to the “local enable” method To assign a password to authenticate users that want to change their user-level privileges to admin-level privileges, using the “local enable” method, use the following command: config admin local_password When this command is entered, the current user authentication method in use on the Switch will be used to authenticate the user. This command includes the following options: config admin local_password followed by: <password 8-15> This is the password that will be used to authenticate users that want to change their user-level privileges to admin-level privileges, using the “local enable” method. Figure 70 shows the assigning of a password that will be used to authenticate users that want to change their user-level privileges to admin-level privileges, using the “local enable” method. Figure 70 config admin local_password :4# config admin local_password Command: config admin local_password Enter the case-sensitive password: ******** Enter the password again for confirmation ******** Success. :4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 150 Chapter 5 Security features Configuring the login authentication settings To configure the maximum amount of time the Switch will wait for a user to input their password, use the following command: config login_authen response_timeout <sec 1-255> This command includes the following options: config login_authen followed by: response_timeout <sec 1-255> This is the maximum amount of time the Switch will wait for a user to input their password. If this time is exceeded, the Switch will discontinue the connection. The default is 30 seconds. Figure 71 shows the maximum number of authentication attempts being set to 8. Figure 71 config admin login_authen :4# config login_authen response_timeout 30 Command: config login_authen response_timeout 30 Success. :4# Configuring the authentication settings on the Switch This command is used to configure how the Switch will authenticate users when they login to the various applications that are used to configure the Switch. When authentication is enabled on the Switch, the authentication settings specified in this command will take effect. The Switch’s default is to use local authentication, such as asking for a user name and password when logging on the Console. 316862-B Rev 00 Chapter 5 Security features 151 When the TACACS+ or the none authentication method is specified, users are assigned only user-level privileges when the first log on to a Switch management application (such as the Console). If this user wants to promote their privilege level to admin-level, they must enter the enable admin command, described below. When the local authentication method is specified, a user’s privilege level depends upon the privilege level assigned when the user account was created. So, there are four applications that can be used to configure and manage the Switch; the Console, TELNET, SSH, and the Web-based configuration manager. You can assign one of three user-authentication methods to any of these applications. The three user-authentication methods are, TACACS+, local, and none. TACACS+ instructs the Switch for forward the user name and password to a TACACS+ Server for authentication. The local method relies upon the Switch itself to verify the user name and password against the user accounts stored in its memory. The none method performs no user authentication. If the TACACS+ user authentication method is specified, and all of the TACACS+ Servers have timed out, or do not exist, the Switch then will use the second method entered with this command. In the example below, the none user authentication method will be used. To configure the authentication settings on the Switch, use the following command: config authentication login This command includes the following options: config authentication login followed by: console Specifies the Console application will be authenticated. telnet Specifies the TELNET application will be authenticated. ssh Specifies the Secure Shell (SSH) application will be authenticated. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 152 Chapter 5 Security features config authentication login followed by: web Specifies the Web-based configuration manager application will be authenticated. all Specifies the Console, TELNET, SSH, and Web applications will be authenticated. tacacs+ Specifies that a TACACS+ Server will provide authentication. local Specifies that the Switch will provide authentication. none Specifies that no authentication will be used. Figure 72 shows the Switch being configured to use the TACACS+ user authentication method for the TELNET application. Figure 72 config authentication login :4# config authentication login telnet tacacs+ none Command: config authentication login telnet tacacs+ none Success. :4# Configuring the authentication settings on the Switch used to promote users from user-level privileges to admin-level privileges This command is used to configure how the Switch will authenticate users when they want to promote their privileges from user-level to admin-level, when they are logged on to the various applications that are used to configure the Switch. When authentication is enabled on the Switch, the authentication settings specified in this command will take effect. 316862-B Rev 00 Chapter 5 Security features 153 When the TACACS+ authentication method is specified, users need to input their password to promote their privileges from user-level to admin-level. The Switch will then pass this password to the TACACS+ Server for authentication. The TACACS+ Server will return a PASS or FAIL. When enable is specified, the Switch will compare this password to the Switch’s (local) password. If the passwords are the same, the Switch will return a PASS. If the two passwords are different, the Switch will return a FAIL. So, there are four applications that can be used to configure and manage the Switch; the Console, TELNET, SSH, and the Web-based configuration manager. You can assign one of three user-authentication methods to authenticate users who want to promote their user-level privileges to admin-level privileges to any of these applications. The three user-authentication methods are, TACACS+, enable, and none. TACACS+ instructs the Switch for forward the user name and password to a TACACS+ Server for authentication. The enable method relies upon the Switch itself to verify the user name and password against the user accounts stored in its memory. The none method performs no user authentication. If the TACACS+ user authentication method is specified, and all of the TACACS+ Servers have timed out, or do not exist, the Switch then will use the second method entered with this command. In the example below, the enable user authentication method will be used. To configure the authentication settings that govern the promotion of users with user-level privileges to admin-level privileges, on the Switch, use the following command: config authentication admin This command includes the following options: config authentication admin followed by: console Specifies the Console application will be authenticated. telnet Specifies the TELNET application will be authenticated. ssh Specifies the Secure Shell (SSH) application will be authenticated. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 154 Chapter 5 Security features config authentication admin followed by: all Specifies the Console, TELNET, SSH, and Web applicationswill be authenticated. tacacs+ Specifies that a TACACS+ Server will provide authentication will be authenticated. local Specifies that the Switch will provide authenticationwill be authenticated. none Specifies that no authentication will be used. Figure 73 shows the Switch being configured to use the TACACS+ user authentication method to authenticate users who want to promote their user-level privileges to admin-level privileges, for the TELNET application. Figure 73 config authentication admin :4# config authentication admin telnet tacacs+ Command: config authentication admin telnet tacacs+ Success. :4# Enabling authentication To enable the current authentication settings, use the following command: enable authentication This command includes no additional options: enable authentication There are no options 316862-B Rev 00 Chapter 5 Security features 155 Figure 74 shows the current authentication settings on the Switch being enabled. Figure 74 enable authentication :4# enable authentication Command: enable authentication Success. :4# Disabling authentication To disable the current authentication settings, use the following command: disable authentication This command includes no additional options: disable authentication There are no options Figure 75 shows the current authentication settings on the Switch being enabled. Figure 75 disable authentication :4# disable authentication Command: disable authentication Success. :4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 156 Chapter 5 Security features Displaying the Switch’s current authentication settings To display the Switch’s current authentication settings, use the following command: show authentication This command includes no additional options: show authentication There are no options Figure 76 shows the display of the Switch’s current authentication settings. Figure 76 show authentication :4# show authentication Command: show authentication Authentication Status : The amount of time for user input : The maximum user attempts : Application ----------Console Telnet SSH Web 316862-B Rev 00 Login Primary ------Local Local Local Local Login Secondary --------- Disabled 30 seconds 3 Admin Primary ------Local Local Local Admin Secondary --------- 157 Chapter 6 Configuring VLANs A virtual local area network (VLAN) is a collection of end nodes grouped by logical rather than physical location. End nodes that frequently communicate with each other are assigned to the same VLAN, regardless of where they are physically located on the network. Logically, you can equate a VLAN to a broadcast domain because broadcast packets are forwarded only to members of the VLAN on which the broadcast was initiated. This chapter describes the commands you use to configure, enable and disable, and show VLANs for Layer 2 operations. It also describes how to configure IP on a VLAN for Layer 3 operations. Specifically, it includes the following topics: Topic Page Roadmap of VLAN CLI commands 159 Creating a VLAN 160 Deleting a VLAN 162 Adding ports to a VLAN configuration 162 Deleting ports from a VLAN configuration 163 Displaying a VLAN configuration 164 Roadmap of IP interface CLI commands 167 Creating an IP interface 167 Configuring an IP interface 168 Deleting an IP interface 169 Configuring the System IP interface 170 Enabling an IP interface 171 Disabling an IP interface 172 Displaying the current IP interface configuration 172 Roadmap of forwarding database CLI commands 175 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 158 Chapter 6 Configuring VLANs Topic Page Creating a unicast forwarding database entry 176 Configuring a unicast forwarding database entry 176 Creating a multicast forwarding database entry 177 Configuring the multicast forwarding database 178 Deleting an entry from the forwarding database 179 Clearing the forwarding database 179 Displaying the multicast forwarding database 180 Displaying the unicast forwarding database 181 Configuring Layer 2 operations The following sections describe how to configure VLANs for Layer 2 operations. 316862-B Rev 00 Chapter 6 Configuring VLANs 159 Roadmap of VLAN CLI commands The following roadmap lists all of the VLAN commands and their parameters. Use this list as a quick reference or click on any entry for more information: Command Parameter create vlan <vlan_name 32> type port |ip-subnet <network_address> arp_classification_id <vlanid 1-4094> |protocol-ip |protocol-ipx802dot3 |protocol-ipx802dot2 |protocol-ipxSnap |protocol-appleTalk |protocol-decLat |protocol-decOther |protocol-sna802dot2 |protocol-snaEthernet2 |protocol-netBios |protocol-xns |protocol-vines |protocol-ipV6 |protocol-userDefined <hex 0x0-0xffff> |encap [ethernet2|IIc|snap|all] |protocol-rarp |priority [0|4|6|7] delete vlan <vlan_name 32> config vlan <vlan_name 32> add tagged <portlist> untagged <portlist> Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 160 Chapter 6 Configuring VLANs Command Parameter config vlan <vlan_name 32> delete <portlist> show vlan <vlan_name 32> |type [port |ip-subnet <network_address> arp_classification_id <vlanid 1-4094> |protocol-ip |protocol-ipx802dot3 |protocol-ipx802dot2 |protocol-ipxSnap |protocol-appleTalk |protocol-decLat |protocol-decOther |protocol-sna802dot2 |protocol-snaEthernet2 |protocol-netBios |protocol-xns |protocol-vines |protocol-ipV6 |protocol-userDefined <hex 0x0-0xffff> encap [ethernet2|IIc|snap|all] |protocol-rarp] Creating a VLAN To create a VLAN, use the following command: create vlan <vlan_name 32 > where: vlan_name 32 is the name of the VLAN that you want to create. The VLAN name can be up to 32 alphanumeric characters. 316862-B Rev 00 Chapter 6 Configuring VLANs 161 This command uses the following options: create vlan <vlan_name 32> followed by: vid <vid> Specifies the VLAN ID with which transmitted packets are tagged. The range is from 1 to 4094. type This parameter allows you to select the type of VLAN that will be created. The available types are as follows: port ip-subnet <network_address> protocol-ip protocol-ipx802dot3 protocol-ipx802dot2 protocol-ipxSnap protocol-appleTalk protocol-decLat protocol-decOther protocol-sna802dot2 protocol-snaEthernet2 protocol-netBios protocol-xns protocol-vines protocol-ipV6 protocol-userDefined <hex 0x0-0xffff> encap [ethernet2|IIc|snap|all] protocol-rarp priority [0|4|6|7] <network_address> The IP address and mask for a subnet-based VLAN. <hex 0x0-0xffff> The user-defined protocol type format in hex. The encapsulated packet format for user-defined encap [ehternet2|iic|snap|all] protocol. The possible formats are ethernet2, IIc, snap, and all. arp_classification_id <vlanid 1-4094> create an IP Subnet VLAN with ARP Classification and available options Figure 77 shows you how to create a VLAN named v1. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 162 Chapter 6 Configuring VLANs Figure 77 create vlan command PP1612G:4#create vlan v1 Command: create vlan v1 Success. PP1612G:4# Deleting a VLAN To delete a VLAN, use the following command: delete vlan <vlan_name 32 > where: vlan_name 32 is the name of the VLAN that you want to delete. Figure 78 shows you how to delete a VLAN named v1. Figure 78 delete vlan command PP1612G:4#delete vlan v1 Command: delete vlan v1 Success. PP1612G:4# Adding ports to a VLAN configuration To add ports to a VLAN, use the following command: config vlan <vlan_name 32 > add where: vlan_name 32 is the name of the VLAN to which you want to add ports. 316862-B Rev 00 Chapter 6 Configuring VLANs 163 This command uses the following options: config vlan add followed by: tagged <portlist> Indicates that the specified ports will be VLAN tagged. • portlist specifies the list of ports to add to the VLAN. To specify a range of ports, enter the beginning and end values, separated by a hyphen (e.g., 1-3). To specify non-contiguous port numbers, enter the port numbers, separated by commas (e.g., 1,4,8). untagged <portlist> Indicates that the specified ports will not be VLAN tagged. untagged is the default. • portlist specifies the list of ports to add to the VLAN. To specify a range of ports, enter the beginning and end values, separated by a hyphen (e.g., 1-3). To specify non-contiguous port numbers, enter the port numbers, separated by commas (e.g., 1,4,8). Figure 79 shows you how to add ports 4 through 8 and 10 as VLAN tagged ports. Figure 79 config vlan add command PP1612G:4#config vlan v1 add tagged 4-8,10 Command: config vlan v1 add tagged 4-8,10 Success. PP1612G:4# Deleting ports from a VLAN configuration To delete ports on a VLAN, enter the following command: config vlan <vlan_name 32 > delete <portlist> Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 164 Chapter 6 Configuring VLANs where: vlan_name 32 is the name of the VLAN that you want to delete. portlist specifies the list of ports to remove from the VLAN. To specify a range of ports, enter the beginning and end values, separated by a hyphen (e.g., 1-3). To specify non-contiguous port numbers, enter the port numbers, separated by commas (e.g., 1,4,8). Figure 80 shows you how to delete ports 4 through 8. Figure 80 config vlan delete command PP1612G:4#config vlan v1 delete 4-8 Command: config vlan v1 delete 4-8 Success. PP1612G:4# Displaying a VLAN configuration To display the current configuration for the VLAN, enter the following command: show vlan 316862-B Rev 00 Chapter 6 Configuring VLANs 165 This command uses the following options: show vlan followed by: <vlan_name 32> This is the name of the VLAN for which you want to display the current configuration. If you do not enter a VLAN name, all of the VLANs currently configured on the switch will have their configurations displayed. type This parameter allows you to select the type of VLAN that will be created. The available types are as follows: port ip-subnet <network_address> protocol-ip protocol-ipx802dot3 protocol-ipx802dot2 protocol-ipxSnap protocol-appleTalk protocol-decLat protocol-decOther protocol-sna802dot2 protocol-snaEthernet2 protocol-netBios protocol-xns protocol-vines protocol-ipV6 protocol-userDefined <hex 0x0-0xffff> encap [ethernet2|iic|snap|all] protocol-rarp Figure 81 shows you how to display the current configuration for the VLANs on the switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 166 Chapter 6 Configuring VLANs Figure 81 show vlan command PP1612G:4# show vlan Command: show vlan VID VLAN TYPE Member ports Static ports Untagged ports : : : : : 1 static 1-12 1-12 1-12 VLAN Name : default VID VLAN TYPE Member ports Static ports Untagged ports : 2 : static : : : VLAN Name : v1 VID VLAN TYPE Member ports Static ports Untagged ports : 3 : static : : : VLAN Name : v2 Total Entries : 3 PP1612G:4# Configuring Layer 3 operations The following sections describe how to configure IP on a VLAN for Layer 3 operations. 316862-B Rev 00 Chapter 6 Configuring VLANs 167 Roadmap of IP interface CLI commands The following roadmap lists all of the IP interface commands and their parameters. Use this list as a quick reference or click on any entry for more information: Command Parameter create ipif <ipif_name 12> <network_address> <vlan_name 32> state [enabled|disabled] config ipif <ipif_name 12> ipaddress <network_address> vlan <vlan_name 32> state [enabled|disabled] delete ipif <ipif_name 12> all config ipif System vlan <vlan_name 32> ipaddress <network_address> state [enabled|disabled] enable ipif <ipif_name 12> all disable ipif <ipif_name 12> all show ipif System all Creating an IP interface To create an IP interface with a network address and a subnet mask that will be assigned to a VLAN, enter the following command: create ipif <ipif_name 12 > <network_address> <vlan_name 32> state [enabled|disabled] Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 168 Chapter 6 Configuring VLANs where: ipif_name 12 is the name of the IP interface. The name can be up to 12 alphanumeric characters. network_address is the IP address and the netmask of the IP interface you wish to create. You can specify the address and mask information using the traditional format- for example, 10.1.2.3/255.0.0.0, or in the CIDR format - for example, 10.1.2.3/8. vlan_name 32 is the name of the VLAN that you want to assign to the IP interface. Figure 82 shows how to create an IP interface named ip2 that will be assigned to the VLAN named vlan2, and will be enabled. Figure 82 create ipif command PP1612G:4#create ipif ip2 20.1.1.1/8 vlan2 state enabled Command: create ipif ip2 20.1.1.1/8 vlan2 state enabled Success. PP1612G:4# Configuring an IP interface To re-configure an IP interface so that it is assigned to a new VLAN, use the following command: config ipif <ipif_name 12 > ipaddress <network_address> vlan <vlan_name 32> state [enabled|disabled] where: ipif_name 12 is the name of the IP interface. The name can be up to 12 alphanumeric characters. network_address is the IP address and the netmask of the IP interface. You can specify the address and mask information using the traditional format- for example, 10.1.2.3/255.0.0.0, or in the CIDR format - for example, 10.1.2.3/8. vlan_name 32 is the name of the VLAN that you want to assign to the IP interface. 316862-B Rev 00 Chapter 6 Configuring VLANs 169 Figure 83 shows how to assign ip2 to vlan3 and enable the interface. Figure 83 config ipif command PP1612G:4#config ipif ip2 ipaddress 20.1.1.1/8 vlan vlan3 state enabled Command: config ipif ip2 ipaddress 20.1.1.1/8 vlan vlan3 state enabled Success. PP1612G:4# Deleting an IP interface To delete the IP interface, use the following command: delete ipif This command uses the following options: delete ipif followed by: <ipif_name 12> Specifies the name of the IP interface that you want to delete. all Specifies that all IP interfaces configured on the switch will be deleted. Figure 84 shows you how to delete an IP interface named ip2. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 170 Chapter 6 Configuring VLANs Figure 84 delete ipif command PP1612G:4#delete ipif ip2 Command: delete ipif ip2 Success. PP1612G:4# Configuring the System IP interface To assign the System IP interface an IP address and a subnet mask, enter the following command: config ipif System This command uses the following options: config ipif System followed by: vlan <vlan_name 32> The name of the VLAN that corresponds to the System IP interface. ipaddress <network_address> The IP address and the netmask with which you want the System IP interface to be associated. You can specify the address and mask information using the traditional format - for example, 10.1.2.3/ 255.0.0.0, or in the CIDR format - for example, 10.1.2.3/8 state [enabled|disabled] Specifies whether you want the System IP interface to be enabled or disabled. Figure 85 shows you how to configure the System IP interface with the IP address 10.48.74.122 and a subnet mask of 255.0.0.0 (in CIDR format, 10.48.74.122/8). 316862-B Rev 00 Chapter 6 Configuring VLANs 171 Figure 85 config ipif System ipaddress command PP1612G:4#config ipif System ipaddress 10.48.74.122/8 Command: config ipif System ipaddress 10.48.74.122/8 Success. PP1612G:4# Enabling an IP interface To enable an IP interface, enter the following command: enable ipif This command uses the following options: enable ipif followed by: <ipif_name 12> Specifies the name of the IP interface that you want to enable. all Specifies that you want all of the IP interfaces configured on the switch to be enabled. Figure 86 shows you how to enable an IP interface named ip2. Figure 86 enable ipif command PP1612G:4#enable ipif ip2 Command: enable ipif ip2 Success. PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 172 Chapter 6 Configuring VLANs Disabling an IP interface To disable an IP interface, enter the following command: disable ipif This command uses the following options: disable ipif followed by: <ipif_name 12> The name of the IP interface you want to disable. all Specifies that you want all of the IP interfaces configured on the switch to be disabled. Figure 87 shows you how to disable an IP interface named ip2. Figure 87 disable ipif command PP1612G:4#disable ipif ip2 Command: disable ipif ip2 Success. PP1612G:4# Displaying the current IP interface configuration To display the current configuration of the System IP interface, enter the following command: show ipif System 316862-B Rev 00 Chapter 6 Configuring VLANs 173 This command uses the following options: show ipif System followed by: all Specifies that you want all of the IP interfaces configured on the switch to have their current configurations displayed. Figure 88 shows you how to display the current configuration of the System IP interface. Figure 88 show ipif System command PP1648T:4#show ipif System Command: show ipif System IP Interface Settings Interface Name : System IP Address : 10.48.74.122 Subnet Mask : 255.0.0.0 VLAN Name : default Admin. State : Disabled Link Status : Link UP Member Ports : 1-26 Total Entries : 1 PP1648T:4# (MANUAL) Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 174 Chapter 6 Configuring VLANs Using the forwarding database The 1600 switch maintains a database that relates MAC addresses to the switch ports that packets must be forwarded to, in order to reach the appropriate MAC address. These commands allow you to make static entries into the switch’s forwarding database. These entries will not be aged-out by the forwarding database’s age-out timer. In addition, you can specify the port (by port number) or the VLAN (by the VLAN name) on which the MAC address resides. For multicast MAC addresses, you can specify a range of ports and a VLAN. The switch enters the relationship between destination MAC or IP addresses and the Ethernet port or gateway router the destination resides on into its forwarding table. This information is then used to forward packets. This reduces the traffic congestion on the network, because packets, instead of being transmitted to all ports, are transmitted to the destination port only. For example, if Port 1 receives a packet destined for a station on Port 2, the Switch transmits that packet through Port 2 only, and transmits nothing through the other ports. This process is referred to as 'learning' the network topology. The MAC address aging time affects the learning process of the switch. Dynamic forwarding table entries, which are made up of the source MAC addresses and their associated port numbers, are deleted from the table if they are not accessed within the aging time. The aging time can be from 10 to 630 seconds with a default value of 300 seconds. A very long aging time can result in dynamic forwarding table entries that are out-of-date or nonexistent. This may cause incorrect packet forwarding decisions by the switch. If the aging time is too short, many entries are aged out too soon. This results in a high percentage of received packets whose source addresses cannot be found in the forwarding table. In this case the switch broadcasts the packet to all ports, negating many of the benefits of having a switch. Static forwarding entries are not affected by the aging time. The following sections describe the procedures you use to create, configure, delete, and display forwarding database entries. 316862-B Rev 00 Chapter 6 Configuring VLANs 175 Roadmap of forwarding database CLI commands The following roadmap lists all of forwarding database CLI commands and their parameters. Use this list as a quick reference or click on any entry for more information: Command Parameter create fdb <vlan_name 32> <macaddr> port <port> config fdb aging_time <sec 10-630> create multicast_fdb <vlan_name 32> <macaddr> config multicast_fdb <vlan_name 32> <macaddr> [add|delete] <portlist> delete fdb <vlan_name 32> <macaddr> clear fdb Vlan <vlan_name 32> Port <port> all show multicast_fdb vlan <vlan_name 32> mac_address <macaddr> show fdb port <port> vlan <vlan_name 32> mac_address <macaddr> static aging_time Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 176 Chapter 6 Configuring VLANs Creating a unicast forwarding database entry To create a static entry, use the following command create fdb <vlan_name 32 > <macaddr> port <port> where: vlan_name 32 is the name of the VLAN where the MAC address is located. macaddr is the MAC address that will be added to the switch’s unicast MAC address forwarding database. port is the port number on the switch where the specified MAC address resides. The switch will always forward traffic to the MAC address through this port. Figure 89 shows the creation of a static MAC address entry, for the MAC address 00-00-00-00-01-02 — which resides on the VLAN named default, on port 2 — to the switch’s unicast forwarding database. Figure 89 create fdb command PP1612G:4# create fdb default 00-00-00-00-01-02 port 2 Command: create fdb default 00-00-00-00-01-02 port 2 Success. PP1612G:4# Configuring a unicast forwarding database entry To configure the age-out time for the switch’s unicast MAC address forwarding database, use the following command: config fdb aging_time < sec 10-630> where: sec 10-630 is the amount of time, in seconds, that a learned MAC address will remain in the switch’s MAC address forwarding database, without being used, before being dropped from the database. 316862-B Rev 00 Chapter 6 Configuring VLANs 177 Figure 90 shows how to set the age-out time to 300 seconds. Figure 90 config fdb command PP1612G:4# config fdb aging_time 300 Command: config fdb aging_time 300 Success. PP1612G:4# Creating a multicast forwarding database entry To create a static entry, use the following command: create multicast_fdb <vlan_name 32> <macaddr> where: vlan_name 32 is the name of the VLAN where the multicast MAC address is located. macaddr is the MAC address that will be added to the switch’s multicast MAC address forwarding database. Figure 91 shows how to create a static MAC address entry for the MAC address 00-00-00-00-01-02—which resides on the VLAN named default, on port 2 — to the switch’s multicast forwarding database: Figure 91 create multicast_fdb command PP1612G:4# create multicast default 01-00-5E-00-00-00 Command: create multicast default 01-00-5E-00-00-00 Success. PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 178 Chapter 6 Configuring VLANs Configuring the multicast forwarding database To configure the switch’s multicast forwarding database, use the following command: config multicast_fdb <vlan_name 32> <macaddr> [add|delete] <portlist> where: vlan_name 32 is the name of the VLAN where the multicast MAC address is located. macaddr is the multicast MAC address. add allows you to add this multicast MAC address to the switch’s multicast MAC address forwarding database; delete allows you to remove this address from the database. portlist specifies a range of ports. Ports are specified by entering the lowest port number in a group, and then the highest port number in a group, separated by a hyphen. So, a port group including the switch ports 1, 2, and 3 would be entered as 1-3. Ports that are not contained within a group are specified by entering their port number, separated by a comma. So, the port group 1-3 and port 26 would be entered as 1-3, 26. Figure 92 shows how to add the multicast MAC address 01-00-5E-00-00-00, residing on the VLAN named default, and ports 1 through 5, to the switch’s multicast MAC address forwarding database: Figure 92 config multicast_fdb PP1612G:4# config multicast_fdb default 01-00-5E-00-00-00 add 1-5 Command: config multicast_fdb default 01-00-5E-00-00-00 add 1-5 Success. PP1612G:4# 316862-B Rev 00 Chapter 6 Configuring VLANs 179 Deleting an entry from the forwarding database To delete an entry from the forwarding database entry, use the following command: delete fdb <vlan_name 32 > <macaddr> where: vlan_name 32 is the name of the VLAN on which the MAC address resides. macaddr is the MAC address that you want to delete from the switch’s forwarding database. Figure 93 shows how to delete the MAC address 00-00-00-01-02, which resides on the VLAN named default, from the switch’s forwarding database. Figure 93 delete fdb command PP1612G:4# delete fdb default 00-00-00-00-01-02 Command: delete fdb default 00-00-00-00-01-02 Success. PP1612G:4# Clearing the forwarding database To clear the switch’s forwarding database of learned MAC addresses, use the following command: clear fdb Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 180 Chapter 6 Configuring VLANs This command includes the following options: clear fdb followed by: Vlan <vlan_name 32> Specifies the name of the VLAN for which you want to clear all learned MAC addresses from the switch’s forwarding database. Port <port> Specifies the port for which you want to clear all learned MAC addresses from the switch’s forwarding database. all Specifies that you want all learned MAC addresses cleared from the switch’s forwarding database, regardless of VLAN or port association. Figure 94 shows how to clear the switch’s forwarding database of all learned entries. Figure 94 clear fdb all command PP1612G:4# clear fdb all Command: clear fdb all Success. PP1612G:4# Displaying the multicast forwarding database To display the contents of the switch’s mutualist forwarding database, use the following command: show multicast_fdb 316862-B Rev 00 Chapter 6 Configuring VLANs 181 This command uses the following options: show multicast_fdb followed by: vlan <vlan_name 32> Displays the multicast forwarding database for a single VLAN. mac_address <macaddr> Displays the multicast forwarding database entries for a single multicast MAC address Figure 95 displays the multicast forwarding database. Figure 95 show multicast_fdb command PP1612G:4# show multicast_fdb Command: show multicast_fdb VLAN name MAC address Egress ports Mode : : : : default 01-00-5E-00-00-00 1-5 Static Total entries : 1 PP1612G:4# Displaying the unicast forwarding database To display the contents of the switch’s unicast forwarding database, use the following command: show fdb Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 182 Chapter 6 Configuring VLANs This command uses the following options: show fdb followed by: port <port> Displays the forwarding database for a single port. vlan <vlan_name 32> Displays the forwarding database for a single VLAN. mac_address <macaddr> Displays the forwarding database entries for a single multicast MAC address. static Displays only the static MAC address entries in the forwarding database. aging_time Displays the current age-out time setting. Figure 96 displays the unicast forwarding database: Figure 96 show fdb command PP1648T:4# show fdb Command: show fdb Unicast MAC Address Aging Time VID ---1 1 1 1 1 VLAN Name ---------------default default default default default Total Entries: 5 PP1648T:4# 316862-B Rev 00 = 200 MAC Address ----------------00-09-97-DA-E0-01 00-80-2D-4E-A9-00 00-80-2D-C2-CE-08 08-00-20-B0-E9-59 FF-FF-FF-FF-FF-FF Type --------Self Dynamic Dynamic Dynamic Self Port --------------CPU 1 1 1 CPU 183 Chapter 7 Configuring link aggregation groups You use link aggregation to combine a number of ports together to make a single high-bandwidth data pipeline. The participating ports are called members of a link aggregation group, with one port designated as the master port. Since you must configure all members of the link aggregation group to operate in the same manner, the configuration of the master port is applied to all members of the link aggregation group. Thus, when configuring the ports in a link aggregation group, you need to configure only the master port. The 1600 switch supports link aggregation groups. This may include from 2 to 4 switch ports each, except for a Gigabit link aggregation group which consists of 2 to 4 of the SFP Gigabit Ethernet ports of the front panel. This chapter describes the commands you use to configure, delete, and show link aggregation. Specifically, it includes the following topics: Topic Page Roadmap of CLI commands 184 Creating a link aggregation group 184 Deleting a link aggregation group 185 Configuring a link aggregation group 186 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 184 Chapter 7 Configuring link aggregation groups Roadmap of CLI commands The following roadmap lists all of the link aggregation commands and their parameters. Use this list as a quick reference or click on any entry for more information: Command Parameter create link_aggregationc group_id <value>> delete link_aggregation group_id <value> config link_aggregation group_id <value> master_port <port> ports <portlist> state [enabled|disabled] BDPU_8600_Interop [enabled|disabled] show link_aggregation group_id <value> Creating a link aggregation group Note: Before you add a port to the MLT, you must first add the port to the VLAN. For instructions on adding ports to a VLAN configuration, see Chapter 6, “Configuring VLANs.” To create a link aggregation group, use the following command: create link_aggregation 316862-B Rev 00 Chapter 7 Configuring link aggregation groups 185 This command uses the following options: create link_aggregation followed by: group_id <value> A number from 1 to 7 that identifies the link aggregation group. The switch allows you to define up to 7 link aggregation groups. The group ID identifies the link aggregation group. Figure 97 shows you how to create a link aggregation group with a group ID of 1. Figure 97 create link_aggregation command PP1648T:4# create link_aggregation group_id 1 Command: create link_aggregation group_id 1 Success. PP1648T:4# Deleting a link aggregation group To delete a link aggregation group, use the following command: delete link_aggregation This command uses the following options: delete link_aggregation followed by: group_id <value> A number from 1 to 7 that identifies the link aggregation group you want to delete. The switch allows you to define up to 7 link aggregation groups. The group ID identifies the link aggregation group. Figure 98 shows you how to delete a link aggregation group with a group ID of 6. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 186 Chapter 7 Configuring link aggregation groups Figure 98 delete link_aggregation command PP1648T:4# delete link_aggregation group_id 6 Command: delete link_aggregation group_id 6 Success. PP1648T:4# Configuring a link aggregation group To configure a link aggregation group, use the following command: config link_aggregation This command uses the following options: config link_aggregation followed by: group_id <value> A number from 1 to 7 that identifies the link aggregation group you want to configure. The switch allows you to define up to 7 link aggregation groups. The group ID identifies the link aggregation group. master_port <port> Specifies the port (by port number) that you wish to designate as the master port of the link aggregation group. All of the ports in a link aggregation group share the port configuration with the master port. ports <portlist> Specifies a range of ports for which you wish to display traffic statistics. You specify ports by entering the lowest port number in a group, and then the highest, separated by a dash. For example, you enter a port group including the switch ports 1, 2, and 3 as 1-3. You specify ports that are not contained within a group by entering their port number, separated by a comma. Thus, you enter the port group 1-3 and port 26 as 1-3, 26. 316862-B Rev 00 Chapter 7 Configuring link aggregation groups 187 config link_aggregation followed by: state [enabled|disabled] Allows you to enable or disable the specified link aggregation group. BDPU_8600_Interop [enabled|disabled] Enable this function is you would like to have an MLT connection between a Passport 8600 and the Passport 1600 under STP Figure 99 shows you how to configure a link aggregation group with a group ID of 1, a master port of 5, and ports 5 through 9 making up the link aggregation group. Figure 99 config link_aggregation command PP1648T:4# config link_aggregation group_id 1 master_port 5 ports 5-10 Command: config link_aggregation group_id 1 master_port 5 ports 5-10 Success. PP1648T:4# Displaying the link aggregation configuration To display a link aggregation configuration, use the following command: show link_aggregation This command uses the following options: show link_aggregation followed by: group_id <value> A number from 1 to 7 that identifies the link aggregation group you want to display. The switch allows you to define up to 7 link aggregation groups. The group ID identifies the link aggregation group. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 188 Chapter 7 Configuring link aggregation groups Figure 100 shows you how to display the link aggregation for group 1 on the switch. Figure 100 show link_aggregation command PP1648T:4# show link_aggregation group_id 1 Command: show link_aggregation group_id 1 Group ID Master Port Member Port Status Flooding Port BDPU 8600 Interop PP1648T:4# 316862-B Rev 00 : : : : : : 1 10 10-12 Enabled 10 Disabled 189 Chapter 8 Configuring QoS The Passport 1600 Series switches have a number of commands that allow you to specify how packets from various sources are forwarded to the switch’s four hardware priority queues. This chapter provides information on configuring Quality of Service (QoS) and utilizing those hardware queues. Specifically, it includes the following topics: Topic Page Roadmap of CLI commands 190 Establishing a QoS scheme 193 Command overview 195 Configuring the flow classifier template operating mode 196 Configuring flow classifier template mode parameters 198 Displaying the flow classifier template mode 200 Attaching a flow classifier template 201 Creating an IP filter for a flow classification template 202 Deleting an IP filter from a flow classification template 204 Creating a QoS rule 209 Deleting a QoS rule 212 Creating a Layer 4 switch rule 213 Deleting a Layer 4 switch rule 217 Creating a forwarding database filter 218 Deleting a forwarding database filter 219 Displaying a forwarding database filter 220 Enabling the IP fragment filter 221 Disabling the IP fragment filter 222 Displaying the status of the IP fragment filter 223 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 190 Chapter 8 Configuring QoS Topic Page Configuring scheduling 223 Creating a MAC priority entry 225 Deleting a MAC priority entry 226 Displaying MAC priority entries 227 Roadmap of CLI commands The following roadmap lists all of the QoS commands and their parameters. Use this list as a quick reference or click on any entry for more information: Command Parameter config flow_classifier template_<value 1-2> mode [security|qos|l4_switch] config flow_classifier template_id <value 1-2> mode_parameters [subnet_mask {src <netmask>|dst <netmask>}|qos_flavor [802.1p|dscp|dst_ip|dst_tcp_port|ds t_udp_port] |l4_session {tcp_session fields {dip|sip|tos|dst_port| src_port|tcp_flags} | udp_session fields {dip|sip|tos|dst_port| src_port} | other_session fields {dip|sip|tos|l4_protocol|icmp_msg|i gmp_type}}] show flow_classifier none config flow_classifier vlan <vlan_name> attach template_id <value 1-2> detach template_id <value 1-2> create sec_rule 316862-B Rev 00 [template_id <value 1-2> |scr_ip_address <ipaddr>|dst_ip_address <ipaddr] Chapter 8 Configuring QoS 191 Command Parameter delete sec_rule [template_id <value 1-2>]|rule_index <value>|all] create qos_rule template_id <value 1-2> 802.1p <value 0-7> dscp <value 0-63> dst_ip <ipaddr> dst_tcp_port <tcp_port_number 1-65535> dst_udp_port <udp_port_number 1-65535> priority <value 0-7> delete qos_rule template_id <value 1-2> rule_index <value> all create l4_switch_rule template_id <value 1-2> tcp_session fields (followed by) dip <ipaddr> sip <ipaddr> tos <hex 0x00-0xff> dst_port <tcp_port_number 1-65535> src_port <tcp_port_number 1-65535> tcp_flags ack|fin|psh|rst|syn|urg udp_session fields (followed by) dip <ipaddr> sip <ipaddr> tos <hex 0x00-0xff> dst_port <tcp_port_number 1-65535> Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 192 Chapter 8 Configuring QoS Command Parameter src_port <tcp_port_number 1-65535> other_session fields (followed by) dip <ipaddr> sip <ipaddr> tos <hex 0x00-0xff> protocol [icmp|igmp] icmp_message type <hex 0x00-0xff> code <hex 0x00-0xff> igmp_type [query|response] action (followed by) drop forward <priority 0-7> redirect <ipaddr> unreachable_next_hop [drop|forward] delete l4_switch_rule template_id <value 1-2> rule_index <value> all create fdbfilter vlan <vlan_name> mac_address <macaddr> delete fdbfilter vlan <vlan_name> mac_address <macaddr> vlan <vlan_name> mac_address <macaddr> all show fdbfilter vlan <vlan_name> mac_address <macaddr> vlan <vlan_name> mac_address <macaddr> 316862-B Rev 00 Chapter 8 Configuring QoS 193 Command Parameter enable ip_fragment_filter disable ip_fragment_filter show ip_fragment_filter config scheduling ports [<portlist>/all] class_id <value 0-2> max_packet <value 6-255> create mac_priority vlan <vlan_name> dst_mac_addr <macaddr> priority <value 0-7> delete mac_priority vlan <vlan_name> dst_mac_address <macaddr> vlan <vlan_name> dst_mac_address <macaddr> all show mac_priority vlan <vlan_name> vlan <vlan_name> dst_mac_addr <macaddr> dst_mac_addr <macaddr> Establishing a QoS scheme You establish a QoS scheme on the switch by following these three steps: 1 Select one of the two available templates (template_id 1 or template_id 2) to write the rules to. These are called flow classifiers when you configure them. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 194 Chapter 8 Configuring QoS 2 Set the fields of an incoming packet’s header that the switch examines, as well as the parameters that must be in those fields, to determine if the packet meets the criteria of the rule. 3 Specify the action the switch will take when it finds packets that meet the criteria. QoS templates You use the two switch templates (template_id 1 and template_id 2) to house the packet screening rules in one of three modes: • • • security qos l4_switch The default operating mode for template 1 is L4 switch mode, while the default operating mode for template 2 is QoS. Note: You can operate the two templates in the same mode. When you change the operating mode of a template, all previously entered rules are deleted and the switch reboots. You cannot enter rules that are incompatible with the template’s current operating mode. For example, you cannot enter QoS rules when the template is in L4 switch mode. Security mode In security mode, incoming packets have their IP headers examined to determine source and destination subnet addresses. These packets are then filtered if the addresses are entered into the template’s IP filtering database. QoS mode In QoS mode, an incoming packet’s priority information is examined to determine if the QoS rules should be applied, and the packet forwarded to a specified priority queue. 316862-B Rev 00 Chapter 8 Configuring QoS 195 L4 switch mode In L4 switch mode, an incoming packet’s TCP, UDP, or other header information is examined to determine if the L4 switch rule should be applied. The packet is then either forwarded or dropped, as specified. Command overview Table 10 provides an overview of the QoS commands and their functions. Table 10 QoS command overview Command Description config flow_classifier Configures the operating mode of a template. template_<value 1-2> mode config flow_classifier template_id <value 1-2> mode_parameters Configures the fields in the header of an incoming packet that the switch examines. config flow_classifier vlan <vlan_name> attach template_id <value 1-2> Attaches an already-created template to a VLAN. create sec_rule delete sec_rule Adds or deletes IP subnet filters to a template in Security mode. create dst_ipfilter delete dst_ipfilter Adds or deletes destination IP addresses to be filtered from the Switch create qos_rule delete qos_rule Adds or deletes QoS rules and actions to a template in Qos mode. create l4_switch_rule delete l4_switch_rule Adds or deletes rules and actions from a template in L4_switch mode. create fdbfilter delete fdbfilter show fdbfilter enable ip_fragment_filter disable ip_fragment_filter show ip_fragment_filter Applies to both templates, and the VLANs to which the templates are bound, regardless of the template’s operating mode. Note: You do not need fdbfilter to bind with a VLAN; however, ip_fragment_filter should be in the template with the bound VLAN. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 196 Chapter 8 Configuring QoS Table 10 QoS command overview Command Description config scheduling Assigns weights to the switch’s round-robin priority queue transmission scheme. This command is independent of the current template. create mac_priority delete mac_priority show mac_priority Directs packets with a specified MAC address as their destination to a specified priority queue. These commands are independent of the current template. Configuring the flow classifier template operating mode The Passport 1600 Series switches allow you to define two templates for flow classification, and then add some rules that determine what the switch will do with packets that meet the criteria established in these template. To modify the operation mode of both flow templates, enter the following command: config flow_classifier template_< value 1-2> mode There are two steps involved in modifying a flow classification template. 1 Delete all active rules. 2 Save the modified flow classification template to the switch’s NV-RAM, and restart the switch. Once you restart the switch, you must then attach the flow classification template to a VLAN using the config flow_classifier vlan <vlan_name> attach template_id <value 1-2> command. For more information on this command, see “Attaching a flow classifier template” on page 201.” When adding rules to a template, remember that the rules must be compatible with the template’s operating mode. For example, you cannot add a QoS rule to a security or l4_switch mode template. 316862-B Rev 00 Chapter 8 Configuring QoS 197 This command uses the following option: config flow_classifier template_<value 1-2> mode followed by: [security|qos|l4_switch] This sets the operating mode of the template. In security mode, incoming packets’s have their IP headers examined to determine source and destination subnet IP addresses. These packets are then filtered if the addresses are entered into the template’s IP filtering database. In qos mode, you can create qos-related rules to forward incoming packets to the switch’s various priority queues. In l4_switch mode, incoming packets are examined to determine the values in their L3 and L4 packet headers. Figure 101 shows how to configure template 1 in security mode and template 2 in qos mode. Figure 101 config flow classifier template_<value 1-2> mode command PP1612G:4# config flow_classifier template_1 mode security template_2 mode qos Command: config flow_classifier template_1 mode security template_2 mode qos WARNING: Change templates' modes results in system reboot! Will you continue anyway[Y/N]? Saving all configurations to NV-RAM.......... 100 % Success. PP1648G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 198 Chapter 8 Configuring QoS Configuring flow classifier template mode parameters To configure the flow classifier template mode parameters for the template whose operating mode you configured using the config flow_classifier template_id <value 1-2> mode command, enter the following: config flow_classifier template_id < value 1-2> mode_parameters For a template operating in security mode, you must enter the source and destination IP subnet masks using the config flow_classifier command, and then enter the source and destination IP address part of the network addresses using the create sec_rule command, as shown below. Entering a zero source netmask (src 0.0.0.0) will instruct the switch to ignore source IP subnets when filtering. Entering a zero destination netmask (dst 0.0.0.0) will instruct the switch to ignore destination IP subnets when filtering. For a template operating in qos mode, you must select the qos_flavor from the following list: 802.1p value, dscp value, destination TCP port number, destination UDP port number, or destination IP. For a template operating in l4_switch mode, you must define a combination of TCP session, UDP session, or other session fields for rules (created later) to fill. 316862-B Rev 00 Chapter 8 Configuring QoS 199 This command uses the following options: config flow_classifier template_id <value 1-2> mode_parameters followed by: [subnet_mask {src <netmask>|dst <netmask>}|qos_flavor [802.1p|dscp|dst_ip|dst_ tcp_port|dst_udp_port] |l4_session {tcp_session fields {dip|sip|tos|dst_port| src_port|tcp_flags} | udp_session fields {dip|sip|tos|dst_port| src_port} | other_session fields {dip|sip|tos|l4_protocol |icmp_msg|igmp_type}}] subnet_mask {src <netmask>|dst <netmask>} allows you to enter subnet masks for source and destination subnets that you can use in combination is IP addresses entered with the create sec_rule command, shown below, to filter source and destination IP subnets. These parameters are used with templates that are in the security operating mode. You can define the IP subnet filter as a source-only IP subnet filter by entering a source netmask of zero (config flow classifier src 0.0.0.0) or a destination-only IP subnet filter by entering a source netmask of zero (config flow classifer dst 0.0.0.0.) If both the source and destination netmasks are entered as 0.0.0.0 then no IP subnet filtering will take place. qos_flavor allows you to select the criteria used to determine what the switch does with packets that meet this criteria. You must choose between the value in an incoming packet’s 802.1p, dscp, dst_ip, dst_tcp_port, or dst_udp_port fields. If you select 802.1p , then incoming packets will have their 802.1p priority fields examined. l4_session allows you to modify the following types of fields: • tcp_session fields allows you to select a combination of TCP fields in an incoming packet’s header that the switch examines. You can choose a combination of the dip, sip, tos, dst_port, src_port, or tcp_flags fields in an incoming packet’s TCP header for the switch to examine. • udp_session fields allows you to select a combination of UDP fields in an incoming packet’s header that the switch examines. You can choose a combination of the dip, sip, tos, dst_port, or src_port fields in an incoming packet’s UDP header for the switch to examine. • other_session fields allows you to select from the following fields of an incoming packet’s header that the switch examines. You can choose a combination of dip, sip, tos, l4_protocol, icmp_msg or igmp_type fields in an incoming packet’s header for the switch to examine. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 200 Chapter 8 Configuring QoS Figure 102 shows you how to set the switch’s QoS criteria to examine the 802.1p priority field of incoming packets. Figure 102 config flow classifier template_id <value 1-2> mode_parameters PP1612G:4# config flow_classifier template_id 2 mode_parameters qos_flavor 802.1p Command: config flow_classifier template_id 2 mode_parameters qos_flavor 802.1p Success. PP1648G:4# Displaying the flow classifier template mode To display the flow classifier template mode, enter the following: show flow_classifier This command contains no parameters. Figure 103 shows sample results of this command. In this example, the command shows that Template 1 is in Security mode and Template 2 is in QoS mode. 316862-B Rev 00 Chapter 8 Configuring QoS 201 Figure 103 show flow_classifier command PP1612G:4# show flow_classifier Command: show flow_classifier Flow Template Table: Template ID: 1 Template Mode: SECURITY SrcSubnet Mask: 255.255.255.255 DstSubnet Mask: 0.0.0.0 Template ID: 2 Template Mode: QOS QoS Flavor: 802.1P Rule Number: 0 Attached Vlan: Rule Number: 0 Attached Vlan: PP1648G:4# Attaching a flow classifier template To attach a flow classifier template to the VLAN, enter the following command: config flow_classifier vlan < vlan_name> Packets that are received from this VLAN are examined by the switch to determine if they meet the criteria in the template. If so, the switch takes the actions specified in the template. Packets that are received from VLANs that are not attached to a template are not examined in this way. This command uses the following options: config flow_classifier vlan <vlan_name> followed by: attach template_id <value 1-2> Attaches an already-created template to a VLAN. detach template_id <value 1-2> Detaches a template from a VLAN. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 202 Chapter 8 Configuring QoS Figure 104 shows you how to attach a flow classifier named 77 to template_id 2. Figure 104 config flow_classifier vlan <vlan_name> command PP1648G:4#config flow_classifier vlan 77 attach template_id 2 Command: config flow_classifier vlan 77 attach template_id 2 Success. PP1648G:4# Creating an IP filter for a flow classification template To specify both source and destination IP network addresses (in combination with the subnet_mask {src <netmask>|dst <netmask>} parameters entered with the config flow_classifier command, as shown above) to be filtered from the switch, use the following command (it is assumed in this case that the source and destination netmasks are entered using the config flow_classifier command as 255.0.0.0): create sec_rule template_id 1 src_ip_address 10.20.30.40 dst_ip_address 10.20.30.40 Filtering source and destination subnets is then accomplished in two steps. First, enter the source and destination subnet masks using the config flow_classifier {src <netmask>|dst <netmask>} command and attach the flow classifier to a VLAN and to a template. Second, enter the IP address part of the subnet’s network address using the create sec_rule template_id <value 1-2> src_ip_address <ipaddr>|dst_ip_address <ipaddr> command. You can define the IP subnet filter as a source-only IP subnet filter by entering a source netmask of zero (config flow classifier src 0.0.0.0) or a destination-only IP subnet filter by entering a destination netmask of zero (config flow classifer dst 0.0.0.0.) If both the source and destination netmasks are entered as 0.0.0.0 then no IP subnet filtering will take place. 316862-B Rev 00 Chapter 8 Configuring QoS 203 Note: 1. When you specify a source and destination network address filter (src and dst), the IP address part of the network address is template-dependent. You must first enter the source and destination subnet masks using the config flow_classifier {src <netmask>|dst <netmask>} command. Then you can enter the IP address part of the source and destination network addresses using create sec_rule command, which will be assigned to the specified template (1 or 2). The template that the sec_rule is assigned to also must be in the security operating mode. 2. You can define the IP subnet filter as a source-only IP subnet filter by entering a source netmask of zero (config flow classifier src 0.0.0.0) or a destination-only IP subnet filter by entering a destination netmask of zero (config flow classifer dst 0.0.0.0.) If both the source and destination netmasks are entered as 0.0.0.0 then no IP subnet filtering will take place. 3. A memory limitation exists here. The two templates, template_id 1 and template_id 2, share the same amount of memory. If you reach the maximum amount of memory for one template, then you cannot enter any more rules for the remaining template. Security mode has a maximum of 64 rule entries if the combination is L4_Switch/SEC, SEC/Qos and SEC/ SEC. This command uses the following options: create sec_rule followed by: [template_id <value 1-2> |scr_ip_address <ipaddr>|dst_ip_address <ipaddr] Allows you to filter the source (src) and destination (dst) IP addresses. You must specify which of the two available templates this filter will apply to, and ensure that this template is in the security operating mode. Figure 105 shows you how to filter packets with a source and destination IP address of 192.32.96.54. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 204 Chapter 8 Configuring QoS Figure 105 create sec_rule command PP1612G:4#create sec_rule template_id 1 src_ip_address 192.32.96.54 dst_ip_address 192.32.96.54 Command: create sec_rule template_id 1 src_ip_address 192.32.96.54 dst_ip_address 192.32.96.54 Success. PP1612G:4# Deleting an IP filter from a flow classification template To delete all previously-entered IP address filter from the switch’s template 1, use the following command: delete sec_rule template 1 all Note: 1. When you want to delete an IP address filter, you must specify the template_id <value 1-2> for this IP filter, along with the rule_index <value>. 2. When you want to delete all IP address filters from a template in the security mode, you do not need to specify the rule_index. You have the option of specifying all. 316862-B Rev 00 Chapter 8 Configuring QoS 205 This command uses the following options: delete sec_rule followed by: [template_id <value 1-2>]|rule_index <value>|all] Allows you to uniquely identify the filter you want to delete. If you want to delete an IP address filter, you must specify which of the two available templates this filter applies to. If you want to delete all filters from a template in the security mode, you do not need to specify the rule_index. You have the option of specifying all, which will delete all of the IP address filters for that template. Figure 106 shows you how to delete all IP filters from the template 1. Figure 106 delete sec_rule command PP1612G:4#delete sec_rule template_id 1 all Command: delete sec_rule template_id 1 all Success. PP1612G:4# Creating a destination IP address filter To specify either a destination IP address to be filtered from the switch, use the following command: create dst_ipfilter ip_address 10.42.73.5 If you filter by destination, it means that packets with the specified IP address as the destination are dropped. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 206 Chapter 8 Configuring QoS Note: When you specify a destination IP address filter, it is template-independent. Any packet with the specified IP address as it’s destination will be dropped by the switch, regardless of the operating mode of the applicable template. This command uses the following options: create dst_ipfilter followed by: ip_address <ipaddr>] If you want to filter the IP address as a destination (dst), you do not need to specify the template id. The switch drops packets that have the IP address entered previously as their destination regardless of what operating mode the templates are in. Figure 105 shows you how to filter packets with a destination IP address of 192.32.96.54. Figure 107 create dst_ipfilter command PP1612G:4#create dst_ipfilter ip_address 192.32.96.54 Command: create dst_ipfilter ip_address 192.32.96.54 Success. PP1612G:4# 316862-B Rev 00 Chapter 8 Configuring QoS 207 Deleting a destination IP address filter To delete all previously-entered destination IP address filters from the switch, use the following command: delete dst_ipfilter all Because of the way IP filters are identified within the switch, you must enter the same destination IP address to delete a specific IP filter, or specify all to instruct the switch to delete all destination IP address filters that have been entered. Note: When you specify a destination IP address filter, it is template-independent. Any packet with the specified IP address as it’s destination will be dropped by the switch, regardless of the operating mode of the applicable template. This command uses the following options: delete dst_ipfilter followed by: [ip_address <ipaddr> |all]] Allows you to uniquely identify the filter you want to delete. If you want to delete a filter for an IP address as a destination (dst), you do not need to specify the template id. You have the option of deleting a specific IP address or deleting all destination IP filters. Figure 106 shows you how to delete an IP filter with a destination IP address of 192.32.96.54. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 208 Chapter 8 Configuring QoS Figure 108 delete dst_ipfilter command PP1612G:4#delete dst_ipfilter ip_address 192.32.96.54 Command: delete dst_ipfilter ip_address 192.32.96.54 Success. PP1612G:4# Displaying the destination IP address filter table To display all previously-entered destination IP address filters on the switch, use the following command: show dst_ipfilter Note: When you specify a destination IP address filter, it is template-independent. Any packet with the specified IP address as it’s destination will be dropped by the switch, regardless of the operating mode of the applicable template. This command has no additional options: show dst_ipfilter followed by: There are no options. Figure 106 shows you how to display the current contents of the switch’s destination IP address filter table. 316862-B Rev 00 Chapter 8 Configuring QoS 209 Figure 109 show dst_ipfilter command PP1612G:4#show dst_ipfilter Command: show dst_ipfilter Destination IP Filter Table: Destination IP Address ---------------------10.42.73.5 Total Entries: 1 PP1612G:4# Creating a QoS rule To add a QoS rule to a template, use the following command: create qos_rule template_id < value 1-2> A QoS rule determines the priority queuing of an incoming packet. The following steps are used to determine the appropriate priority queuing of a packet. 1 The switch checks to see if the packet’s source VLAN is bound to the template in current use. 2 If the current template is bound to the source VLAN, the switch checks the template to see if it is in qos mode. 3 If the current template is in qos mode, the switch then applies any qos_rule that has been entered into the template. 4 If there is no qos_rule, or the packet does not match the criteria of the qos_rule, the packet’s priority tag determines priority queuing. 5 If the packet has no priority tag, the switch uses the default priority setting or the MAC address priority setting (if the source MAC address is in the MAC address priority table). QoS rules affect all packets that are received by the switch from VLANs to which the template containing the QoS rules are bound. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 210 Chapter 8 Configuring QoS The create qos_rule command is structured in two parts. 1 It specifies the protocol (802.1p, dscp, dst_ip, dst_tcp_port,and dst_udp_port) and a parameter that will be compared to the protocol’s parameter written in incoming packet’s headers. If an incoming packet’s protocol’s parameter matches the protocol parameter entered with the create qos_rule command, the switch takes the action you specify in the second part of this command. 2 It allows you to specify the priority queue (priority < value 0-7>) the switch will forward packets that match the protocol and parameter criteria to. The switch has four hardware priority queues, and the 8 levels of priority specified by priority <value 0-7> are mapped (by default) to these four priority queues. For example, 0, 1, and 2 specify the switch’s lowest priority queue, 3 and 4 specify the next lowest priority queue, 5 and 6 specify the next highest priority queue, and 7 specifies the highest priority queue. 3 For example, 0 and 1 correspond to the switch’s highest priority queue, 2 and 3 correspond to the next lowest priority queue, and so on until 6 and 7 specify the switch’s lowest priority queue. You can configure the mapping using the config scheduling command. Incoming packets must also be from a VLAN to which the template that contains the QoS rule is attached. Note: Qos mode has a maximum of 64 rule entries if the combination is L4_Switch/Qos, SEC/QoS and Qos/QoS. This command uses the following options: create qos_rule template_id <value 1-2> followed by: 802.1p <value 0-7> Specifies the value of an incoming packet’s 802.1p priority tag that you want the switch to send to the priority queue you designate with priority <value 0-7>. dscp <value 0-63> Specifies the value of an incoming packet’s DSCP field that you want the switch to send to the priority queue you designate with priority <value 0-7>. 316862-B Rev 00 Chapter 8 Configuring QoS 211 create qos_rule template_id <value 1-2> followed by: dst_ip <ipaddr> Specifies the IP address of an incoming packet’s destination IP address field that you want the switch to send to the priority queue you designate with priority <value 0-7> . dst_tcp_port <tcp_port_number 1-65535> Specifies the TCP port number of an incoming packet’s destination TCP port field that you want the switch to send to the priority queue you designate with priority <value 0-7>. dst_udp_port <udp_port_number 1-65535> Specifies the UDP port number of an incoming packet’s destination UDP port field that you want the switch to send to the priority queue you designate with priority <value 0-7. priority <value 0-7> The priority queue to which you want the switch to send packets that meet the criteria entered previously. The switch’s default mapping between the 8 priority levels specified here, and the switch’s four hardware priority queues is to map so that: • 0 and 1 and 2 correspond to the switch’s highest priority queue • 3 and 4 correspond to the next lowest priority queue • 5 and 6 correspond to an even lower priority queue • 7 specifies the switch’s lowest priority queue This default mapping can be configured differently by a user. Figure 110 shows how to configure a QoS rule to be added to template_id 2 to send incoming packets with an 802.1p value of 3 to the switch’s lowest priority queue (priority 7). Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 212 Chapter 8 Configuring QoS Figure 110 create qos_rule command PP1648G:4#create qos_rule template_id 2 802.1p 3 priority 7 Command: create qos_rule template_id 2 802.1p 3 priority 7 Success. PP1648G:4# Deleting a QoS rule To delete a QoS rule that was entered into a template, use the following command: delete qos_rule template_id < value 1-2> QoS rules are identified by the template id of the template they are entered into, and by the numerical order in which they are entered. This command uses the following options: delete qos_rule template_id <value 1-2> followed by: rule_index <value> Deletes the QoS rule specified by the number of value . QoS rules are entered into a template in numerical order. all Deletes all of the QoS rules assigned to the specified template. Figure 111 shows how to delete the QoS rule that was entered into template_id 2 in Figure 110. In that example, only 1 QoS rule was entered, so the rule has a rule_index of 1. 316862-B Rev 00 Chapter 8 Configuring QoS 213 Figure 111 delete qos_rule command PP1648G:4#delete qos_rule template_id 2 rule_index 1 Command: delete qos_rule template_id 2 rule_index 1 Success. PP1648G:4# Creating a Layer 4 switch rule To add a Layer 4 switch rule to a template, use the following command: create l4_switch_rule template_id < value 1-2> A layer 4 rule determines whether or not the switch forwards a packet, the priority queuing of an incoming packet, or where the switch forwards a packet if the next router hop is unreachable. The following steps determine whether an incoming packet is subject to an l4_switch_rule. 1 The switch checks to see if the packet’s source VLAN is bound to the template in current use. 2 If the current template is bound to the source VLAN, the switch then checks the template to see if it is in l4_switch mode. 3 If the current template is in l4_switch mode, the switch then applies any l4_switch_rule that has been entered into the template. 4 If there is no l4_switch_rule, or the packet does not match the criteria of the l4_switch_rule, the packet is forwarded or dropped according to the switch’s default settings. l4_switch_rules affect all packets that are received by the switch from VLANs to which the template containing the l4_switch_rules are bound. The create l4_switch_rule command is structured in two parts. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 214 Chapter 8 Configuring QoS 1 It specifies the session type (tcp_session, udp_session, and other_session) and a combination of parameters that will be compared to the parameters written in incoming packet’s headers. If an incoming packet’s parameters match the parameters entered with the create l4_switch_rule command, the switch takes the action you specify in the second part of this command. 2 It allows you to specify the action the switch takes on packets that match the parameters entered in the first part of the command. These actions are drop, forward <priority 0-7>, and redirect <ipaddr> unreachable next hop [drop/ forward]. Incoming packets must also be from a VLAN to which the template that contains the l4_switch_rules are bound. Both templates (template_id 1 and template_id 2) share the same physical memory. There is only enough memory to hold a maximum of 192 l4_switch_rules. The memory used to store these l4_switch_rules is shared between the two templates. If you enter 192 l4_switch_rules into template_id 1, then there will be no memory remaining to enter l4_switch_rules into template_id 2. This command uses the following options: create l4_switch_rule template_id <value 1-2> followed by: followed by a combination of: The switch examines the packet’s TCP header to determine if the packet meets the criteria entered below. dip <ipaddr> A destination IP address. sip <ipaddr> A source IP address. tos <hex 0x00-0xff> The Type of Service (ToS) entry into a packet’s IP header. dst_port <tcp_port_number 1-65535> A destination TCP port number. src_port <tcp_port_number 1-65535> A source TCP port number. tcp_session fields 316862-B Rev 00 Chapter 8 Configuring QoS 215 create l4_switch_rule template_id <value 1-2> followed by: tcp_flags The TCP flag bit in a packet’s IP header. A packet can be examined for the following TCP flags: ack — the acknowledge number is valid. fin — finished flag, the sender is finished sending data psh — the receiver should pass this packet to the application as soon as possible. rst — reset flag, reset the connection. syn — synchronize flag, synchronize the sequence numbers. urg — urgent, an emergency packet. udp_session fields followed by a combination of: The switch will examine the packet’s UDP header to determine if the packet meets the criteria entered below. dip <ipaddr> A destination IP address. sip <ipaddr> A source IP address. tos <hex 0x00-0xff> The Type of Service entry into a packet’s IP header. dst_port <tcp_port_number 1-65535> A destination TCP port number. src_port <tcp_port_number 1-65535> A source TCP port number. other_session fields followed by a combination of: The switch will examine the packet’s header (other than TCP or UDP) to determine if the packet meets the criteria entered below. dip <ipaddr> A destination IP address. sip <ipaddr> A source IP address. tos <hex 0x00-0xff> The Type of Service entry into a packet’s IP header. protocol [icmp|igmp] The protocol field in a packet’s IP header. This parameter also has the following available options: [dip | sip | tos | icmp_message | igmp_type | action] icmp_message type <hex 0x00-0xff> code <hex 0x00-0xff> Identifies the ICMP message type. Enter a hexadecimal value, in the range 0x00 to 0xff. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 216 Chapter 8 Configuring QoS create l4_switch_rule template_id <value 1-2> followed by: igmp_type [query|response] Identifies the IGMP type. For igmp_type query, the available options are: [dip | sip | tos | protocol | icmp_message| action]. For igmp_type response, the available options are: [version_1|version_2|all] action followed by: This starts the part of the create l4_switch_rule command where you specify what you want the switch to do when if finds a packet that meets the criteria above. drop The packet will be dropped. forward <priority 0-7> The packet will be forwarded to the priority queue specified by <priority 0-7>. If no priority value is specified, the packet will be forwarded according to the switch’s default user priority settings. redirect <ipaddr> unreachable_next_hop [drop|forward] The packet will be redirected to the IP address specified with <ipaddr>. If the IP address <ipaddr> does not exist in the ARP table, the packet will become an “unreachable next hop” packet. If drop is specified, the packet will be dropped. If forward is specified, the switch will search its routing table for the destination IP address of the packet. Figure 112 shows how to configure an l4_switch_rule to be added to template_id 1. 316862-B Rev 00 Chapter 8 Configuring QoS 217 Figure 112 create l4_switch_rule command PP1612G:4# create l4_switch_rule template_id 1 tcp_session fields dip 10.1.1.1 sip 10.2.2.2 tos 0xAB dst_port 1000 src_port 2000 tcp_flags ack fin syn psh rst urg action redirect 10.3.3.3 unreachable_next_hop forward Command: create l4_switch_rule template_id 1 tcp_session fields dip 10.1.1.1 sip 10.2.2.2 tos 0xAB dst_port 1000 src_port 2000 tcp_flags ack fin syn psh rst urg action redirect 10.3.3.3 unreachable_next_hop forward Success. PP1612G:4# Deleting a Layer 4 switch rule To delete a Layer 4 switch rule entered into a template, use the following command: delete l4_switch_rule template_id <value 1-2> l4_switch_rules are identified by the template id of the template they are entered into, and by the numerical order in which they are entered. This command uses the following options: delete l4_switch_rule template_id <value 1-2> followed by: rule_index <value> Deletes the L4 switch rule specified by the number of value. L4 switch rules are entered into a template in numerical order. all Deletes all of the L4 switch rules assigned to the specified template. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 218 Chapter 8 Configuring QoS Figure 113 shows how to delete the l4_switch_rule that was entered to template_id 1 in Figure 112. In that example, only 1 l4_switch_rule was entered, so the rule has a rule_index of 1. Figure 113 delete l4_switch_rule command PP1648G:4#delete l4_switch_rule template_id 1 rule_index 1 Command: delete l4_switch_rule template_id 1 rule_index 1 Success. PP1648G:4# Creating a forwarding database filter To specify a MAC address that you wish to see filtered from the switch, enter the following command: create fdbfilter When executing this command, consider that the command fails to execute if any of the following are true: 1 If the combination of the VLAN and MAC addresses are entered into the switch’s static forwarding database. 2 If the combination of the VLAN and MAC addresses are part of a MAC address priority rule. 3 If the combination of the VLAN and MAC addresses have been dynamically entered into the switch’s forwarding database. If so, the create fdbfilter command then sets the database entry to static, and drops packets with this MAC address. You can create up to 64 MAC address forwarding database filters. 316862-B Rev 00 Chapter 8 Configuring QoS 219 This command uses the following options: create fdbfilter followed by: vlan <vlan_name> Identifies the name of the VLAN on which the MAC address you want to filter resides. mac_address <macaddr> Specifies the MAC address of the network device you want to filter from the switch. Figure 114 shows how to create a forwarding database filter for the VLAN named default, for the MAC address 00-11-22-33-44-55. Figure 114 create fdbfilter command PP1648G:4#create fdbfilter vlan default mac_address 00-11-22-33-44-55 Command: create fdbfilter vlan default mac_address 00-11-22-33-44-55 Success. PP1648G:4# Deleting a forwarding database filter To delete a forwarding database filter, enter the following command: delete fdbfilter Forwarding database filters are identified by the VLAN name and MAC address that you enter when the you first create the filter. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 220 Chapter 8 Configuring QoS This command uses the following options: delete fdbfilter followed by: vlan <vlan_name> mac_address <macaddr> Identifies the name and MAC address of the network device you want to delete from the switch. vlan <vlan_name> Identifies the name of the VLAN on which the MAC address you want to delete resides. mac_address <macaddr> Specifies the MAC address of the network device you want to delete from the switch. all Deletes all the filters in the forwarding database. Figure 115 shows how to delete a forwarding database filter for the VLAN named default, for the MAC address 00-11-22-33-44-55. Figure 115 delete fdbfilter command PP1648G:4#delete fdbfilter vlan default mac_address 00-11-22-33-44-55 Command: delete fdbfilter vlan default mac_address 00-11-22-33-44-55 Success. PP1648G:4# Displaying a forwarding database filter To display the forwarding database filters currently in use on the switch, enter the following command: show fdbfilter Forwarding database filters are identified by the VLAN name and MAC address that you enter when the you first create the filter. 316862-B Rev 00 Chapter 8 Configuring QoS 221 This command uses the following options: show fdbfilter followed by: vlan <vlan_name> Identifies the name of the VLAN on which the MAC address you want to display resides. vlan <vlan_name> mac_address <macaddr> Identifies the name of the VLAN and specifies the MAC address of the network device you want to display on the switch. mac_address <macaddr> Specifies the MAC address of the network device you want to delete from the switch. Figure 116 shows how to display a forwarding database filter for the VLAN named default, for the MAC address 00-11-22-33-44-55. Figure 116 show fdbfilter command PP1612G:4# show fdbf Command: show fdbfilter FDB Filter Table: VLAN Name MAC address -------------------------------- ----------------default 00-11-22-33-44-55 Total Entries: 1 PP1612G:4# Enabling the IP fragment filter The 1600 Series switches allow you to enable any fragmented packets that are received on a VLAN to which either of the two templates are bound. To enable the IP fragment filter, enter the following command: enable ip_fragment_filter This command contains no parameters. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 222 Chapter 8 Configuring QoS Figure 117 shows how to enable an IP fragment filter. Figure 117 enable ip_fragment_filter command PP1648G:4#enable ip_fragment_filter Command: enable ip_fragment_filter Success. PP1648G:4# Disabling the IP fragment filter The 1600 Series switches allow you to disable any fragmented packets that are received on a VLAN to which either of the two templates are bound. To disable the IP fragment filter, use the following command: disable ip_fragment_filter This command contains no parameters. Figure 118 shows how to disable an IP fragment filter. Figure 118 disable ip_fragment_filter command PP1648G:4#disable ip_fragment_filter Command: disable ip_fragment_filter Success. PP1648G:4# 316862-B Rev 00 Chapter 8 Configuring QoS 223 Displaying the status of the IP fragment filter The 1600 Series switches will allow you to display any fragmented packets that are received on a VLAN to which either of the two templates are bound. To display the status of the IP fragment filter, use the following command: show ip_fragment_filter This command contains no parameters. Figure 119 shows how to display the status of an IP fragment filter. Figure 119 show ip_fragment_filter command PP1612G:4# show ip_fragment_filter Command: show ip_fragment_filter IP Fragment Filter Status: Enabled PP1612G:4# Configuring scheduling To specify the rotation of the first three hardware priority queues on the switch, enter the following command: config scheduling There are four outgoing traffic classes on the switch. The mechanism of the first three traffic classes is weighted round-robin (WRR), while the fourth follows a strict-priority (SP) scheme. The weighted round-robin scheme guarantees a minimum bandwidth to the first three hardware priority queues on the switch. For example, if the weighted round-robin scheme is applied to port 1, with a 10, 30, 60 weighting, the queues stop transmitting packets when they reach 10%, 30%, or 60% of the ports bandwidth, respectively. The fourth queue does not stop transmitting packets until its packet buffer is empty. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 224 Chapter 8 Configuring QoS This command uses the following options: config scheduling followed by: ports [<portlist>/all] Identifies a list of ports for which you want to configure the hardware priority queue round-robin transmitting scheme. You specify the ports by entering the lowest port number in a group, followed by the highest, separated by a dash. Thus, you enter a port group including the switch ports 1, 2, and 3 as 1-3. You specify ports that are not contained within a group by entering their port number, separated by a comma. For example, you enter the port group 1-3 and port 26 as 1-3, 26. all specifies that the hardware priority queue round-robin transmitting scheme applies to all ports on the switch. class_id <value 0-2> Identifies the hardware priority queue. max_packet <value 6-255> Includes the round-robin weight of the priority queue specified previously. The value of max_packet is in 256 byte multiples and the number of bytes must be less than the MTU. Figure 120 shows how to configure scheduling for ports 1 through 10 to weight the hardware priority queue 2 as max_packet 7. Figure 120 config scheduling command PP1648G:4#config scheduling ports 1-10 class_id 2 max_packet 7 Command: scheduling ports 1-10 class_id 2 max packet 7 Success. PP1648G:4# 316862-B Rev 00 Chapter 8 Configuring QoS 225 Creating a MAC priority entry To direct packets with a specific VLAN and MAC address combination to a given priority queue on the switch, enter the following command: create mac_priority The priority value you specify is referenced to the user priority and traffic class settings currently in use on the switch. An incoming packet is first checked to see if the VLAN it was received from is bound to a template. If it is, the template is examined to see if it is in qos mode. If so, the template is examined to see if it contains an applicable rule regarding priority. If so, this rule is applied. If there is no template bound to the VLAN, the packet’s priority tag is used to determine the appropriate priority queue. If there is no priority tag on the packet, the switch compares the default port priority with the MAC priority rules- and then uses the higher of the two. When executing this command, consider that the command fails to execute if any of the following are true: 1 If the combination of VLAN and MAC addresses have a static entry in the switch’s forwarding database. 2 If the combination of VLAN and MAC addresses are entered as an fdbfilter. 3 If the combination of VLAN and MAC addresses have been dynamically entered into the switch’s forwarding database. If so, the command changes the entry to static with the destination priority value you specify. You can make up to 64 MAC priority entries. This command uses the following options: create mac_priority followed by: vlan <vlan_name> Identifies the name of the VLAN the destination MAC address resides on. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 226 Chapter 8 Configuring QoS create mac_priority followed by: dst_mac_addr <macaddr> Specifies a destination MAC address for which you want to direct packets to the priority queue that follows. priority <value 0-7> Identifies the priority queue you want packets for the MAC address to be directed to. Figure 121 shows how to create a MAC priority entry for the VLAN default for the MAC address 00-11-22-33-44-55 and instruct the switch to direct all packets it receives from this MAC address to priority queue 3. Figure 121 create mac_priority command PP1648G:4#create mac_priority vlan default dst_mac_addr 00-11-22-33-44-55 priority 3 Command: create mac_priority vlan default dst_mac_addr 00-11-22-33-44-55 priority 3 Success. PP1648G:4# Deleting a MAC priority entry To delete a MAC priority entry, enter the following command: delete mac_priority MAC priority entries are identified on the switch by a combination of the VLAN name and the destination MAC address. 316862-B Rev 00 Chapter 8 Configuring QoS 227 This command uses the following options: delete mac_priority followed by: vlan <vlan_name> dst_mac_address <macaddr> Identifies the name of the VLAN and the destination MAC address for which you want to delete the MAC priority entry. vlan <vlan_name> Identifies the name of the VLAN on which the MAC address you want to delete resides. dst_mac_address <macaddr> Specifies a destination MAC address for which you want to delete the MAC priority entry. all Deletes all the MAC priority entries on the switch. Figure 122 shows how to delete a MAC priority entry for the VLAN default for the MAC address 00-11-22-33-44-55. Figure 122 delete mac_priority command PP1648G:4#delete mac_priority vlan default dst_mac_addr 00-11-22-33-44-55 Command: delete mac_priority vlan default dst_mac_addr 00-11-22-33-44-55 Success. PP1648G:4# Displaying MAC priority entries To display one or all of the MAC priority entries on the switch, enter the following command: show mac_priority Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 228 Chapter 8 Configuring QoS This command uses the following options: show mac_priority followed by: vlan <vlan_name> Identifies the name of the VLAN for which you want to display the MAC priority entries. vlan <vlan_name> dst_mac_addr <macaddr> Specifies the VLAN and destination MAC address for which you want to display the MAC priority entries. dst_mac_addr <macaddr> Specifies the MAC address for which you want to display the MAC priorities entries. Figure 123 shows how to display the MAC priority entries for the VLAN default for the MAC address 00-11-22-33-44-55. Figure 123 show mac_priority command PP1612G:4# show mac_priority vlan default dst_mac_addr 00-11-22-33-44-55 Command: show mac_priority vlan default dst_mac_addr 00-11-22-33-44-55 MAC Priority Table: VLAN Name -----------------------default Total Entries: 1 PP1612G:4# 316862-B Rev 00 Destination MAC Address --------------00-11-22-33-44-55 Priority -------3 229 Chapter 9 Configuring traffic filters This chapter describes the commands you use to create and delete IP address filters, MAC address filters, and broadcast traffic control. Specifically, it includes the following topics: Topic Page Configuring destination IP filters 229 Creating a destination IP address filter 230 Configuring an ARP request rate limit 237 Configuring destination IP filters The 1600 Series switch allows you to filter traffic from specific IP addresses. You can specify these IP addresses as a source, a destination, or either, of network traffic. You can also instruct the switch to filter fragmented IP packets using the enable ip_fragment_filter command. Note that the switch also allows you to assign ranges of IP addresses to VLANs. You then identify each VLAN by a VLAN name, a network address, and an IP interface name. You must configure a VLAN prior to setting up the corresponding IP interface. You must then establish and implement an IP addressing scheme when the IP interfaces are set up on the switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 230 Chapter 9 Configuring traffic filters Roadmap of destination IP address filter CLI commands The following roadmap lists all of the IP address, fragment filtering commands and their parameters. Use this list as a quick reference or click on any entry for more information: Command Parameter create dst_ipfilter ip_address <ipaddr> delete dst_ipfilter [ip_address <ipaddr> |all]] show dst_ipfilter none Creating a destination IP address filter To specify either a destination IP address to be filtered from the switch, use the following command: create dst_ipfilter ip_address 10.42.73.5 If you filter by destination, it means that packets with the specified IP address as the destination are dropped. Note: When you specify a destination IP address filter, it is template-independent. Any packet with the specified IP address as it’s destination will be dropped by the switch, regardless of the operating mode of the applicable template. 316862-B Rev 00 Chapter 9 Configuring traffic filters 231 This command uses the following options: create dst_ipfilter followed by: ip_address <ipaddr> If you want to filter the IP address as a destination (dst), you do not need to specify the template id. The switch drops packets that have the IP address entered previously as their destination regardless of what operating mode the templates are in. Figure 124 shows you how to filter packets with a destination IP address of 192.32.96.54. Figure 124 create dst_ipfilter command PP1612G:4#create dst_ipfilter ip_address 192.32.96.54 Command: create dst_ipfilter ip_address 192.32.96.54 Success. PP1612G:4# Deleting a destination IP address filter To delete all previously-entered destination IP address filters from the switch, use the following command: delete dst_ipfilter all Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 232 Chapter 9 Configuring traffic filters Because of the way IP filters are identified within the switch, you must enter the same destination IP address to delete a specific IP filter, or specify all to instruct the switch to delete all destination IP address filters that have been entered. Note: When you specify a destination IP address filter, it is template-independent. Any packet with the specified IP address as it’s destination will be dropped by the switch, regardless of the operating mode of the applicable template. This command uses the following options: delete dst_ipfilter followed by: [ip_address <ipaddr> |all]] Allows you to uniquely identify the filter you want to delete. If you want to delete a filter for an IP address as a destination (dst), you do not need to specify the template id. You have the option of deleting a specific IP address or deleting all destination IP filters. Figure 125 shows you how to delete an IP filter with a destination IP address of 192.32.96.54. Figure 125 delete ipfilter command PP1612G:4#delete dst_ipfilter ip_address 192.32.96.54 Command: delete dst_ipfilter ip_address 192.32.96.54 Success. PP1612G:4# 316862-B Rev 00 Chapter 9 Configuring traffic filters 233 Displaying the destination IP address filter table To display all previously-entered destination IP address filters on the switch, use the following command: show dst_ipfilter Note: When you specify a destination IP address filter, it is template-independent. Any packet with the specified IP address as it’s destination will be dropped by the switch, regardless of the operating mode of the applicable template. This command has no additional options: show dst_ipfilter followed by: There are no options. Figure 126 shows you how to display the current contents of the switch’s destination IP address filter table. Figure 126 show dst_ipfilter command PP1612G:4#show dst_ipfilter Command: show dst_ipfilter Destination IP Filter Table: Destination IP Address ---------------------10.42.73.5 Total Entries: 1 PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 234 Chapter 9 Configuring traffic filters Configuring MAC address filters The Passport 1600 Series switch allows the filtering of traffic from specific MAC addresses. The switch uses a filtering database to segment the network and control communication between segments. It can also filter packets off the network for intrusion control. You can create static filtering entries by MAC address or IP address filtering. Note: The Passport 1600 switch supports basic MAC filtering only. If you want to filter on a MAC address, the switch will filter it if that address is in the packet as a source or destination address. It does not support filtering on a MAC address if you specify filtering on source or destination addresses only. This section describes the commands you use in creating, deleting, and showing MAC address filters. Specifically, it includes the following topics: Topic Page Roadmap of MAC address filter CLI commands 234 Creating a MAC address filter 235 Deleting a MAC address filter 235 Displaying MAC address filters 236 Roadmap of MAC address filter CLI commands The following roadmap lists all of the MAC address filter commands and their parameters. Use this list as a quick reference or click on any entry for more information: Command Parameter create fdbfilter vlan <vlan_name> mac_address <macaddr> delete fdbfilter vlan <vlan_name> mac_address <macaddr> show fdbfilter vlan <vlan_name> mac_address <macaddr> 316862-B Rev 00 Chapter 9 Configuring traffic filters 235 Creating a MAC address filter To filter a MAC address from the switch and prevent this MAC address from being dynamically entered into the switch’s forwarding database, use the following command: create fdbfilter This command uses the following options: create fdbfilter followed by: vlan <vlan_name> Identifies the name of the VLAN on which the MAC address you wish to filter from the switch resides. mac_address <macaddr> Specifies the MAC address of the network device you wish to filter from the switch. Figure 127 shows you how to filter VLAN v1 and MAC address 00-FF-BA-F4-D5-0C from the switch’s forwarding database. Figure 127 create fdbfilter command PP1648T:4#create fdbfilter vlan v1 mac_address 00-50-BA-F4-D5-0C Command: create fdbfilter vlan v1 mac_address 00-50-BA-F4-D5-0C Success. PP1648T:4# Deleting a MAC address filter To delete the filtering of a MAC address from the switch’s forwarding database, use the following command: delete fdbfilter Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 236 Chapter 9 Configuring traffic filters This command uses the following options: delete fdbfilter followed by: vlan <vlan_name> Identifies the name of the VLAN for which you wish to delete the forwarding database filter. mac_address <macaddr> Specifies the MAC address of the network device you wish to delete from the forwarding database filter. Figure 128 shows you how to delete the VLAN v1 and MAC address 00-FF-BA-F4-D5-0C filters from the switch’s forwarding database. Figure 128 delete fdbfilter command PP1648T:4#delete fdbfilter vlan v1 mac_address 00-50-BA-F4-D5-0C Command: delete fdbfilter vlan v1 mac_address 00-50-BA-F4-D5-0C Success. PP1648T:4# Displaying MAC address filters To display the switch’s MAC address filters, use the following command: show fdbfilter 316862-B Rev 00 Chapter 9 Configuring traffic filters 237 This command uses the following options: show fdbfilter followed by: vlan <vlan_name> Identifies the name of the VLAN for which you wish to display the forwarding database filter. mac_address <macaddr> Specifies the MAC address of the network device for which you wish to display the forwarding database filter. Figure 129 shows you how to display the VLAN v1 and MAC address 00-FF-BA-F4-D5-0C filters from the switch’s forwarding database. Figure 129 show fdbfilter command PP1648T:4#show fdbfilter vlan v1 mac_address 00-50-BA-F4-D5-0C Command: show fdbfilter vlan v1 mac_address 00-50-BA-F4-D5-0C FDB Filter Name VLAN Name -------------v1 MAC Address ------00-50-BA-F4-D5-0C Total Entries: 1 PP1648T:4# Configuring an ARP request rate limit The Passport 1600 series switches allow you to set limits on the rate at which the Switch will receive and process Address Resolution Protocol (ARP) request packets. There are two commands available to configure and enable the ARP rate limit control on the Switch. The first allows you to enable and disable the ARP rate limit — without changing the limit values you may have entered. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 238 Chapter 9 Configuring traffic filters The second command allows you to specify the number of ARP packets received by the Switch in one second that will trigger the ARP rate limit control. If the Switch receives more ARP packets in a second than you specify, the Switch will block all ARP requests for one second. The ARP rate limit counter is then reset, and ARP requests are again allowed — until the rate of ARP packets received by the Switch exceeds the limit you have set. The default value of the ARP request rate limit is 50 ARP packets per second, and you can specify any value between 10 and 100 packets per second. This section describes the commands you use in creating, deleting, and showing ARP request rate limits. Specifically, it includes the following topics: Topic Page Configuring the ARP request rate limit 230 Enabling the ARP request rate limit 235 Disabling the ARP request rate limit 235 Displaying the ARP request rate limit 236 Roadmap of ARP request rate limit CLI commands The following roadmap lists all of the MAC address filter commands and their parameters. Use this list as a quick reference or click on any entry for more information: Command Parameter config arp_req_rate_limit 60 <value 10-100> enable arp_req_rate_limit none disable arp_req_rate_limit none show arpentry Ipif <ipif_name 12> IPaddress <ipaddr> static 316862-B Rev 00 Chapter 9 Configuring traffic filters 239 Configuring the ARP request rate limit To set the ARP request rate limit for the switch to 60 ARP packets per second, use the following command: config arp_req_rate_limit 60 This command uses the following options: config arp_req_rate_limit followed by: <value 10-100> Specifies the rate of ARP packets received by the switch, in packets per second, that will trigger the switch’s response. The default is 50 ARP packets per second. If the number of ARP packets received by the switch exceeds the number entered here, the switch will drop all ARP request packets for one second, reset the incoming ARP packet rate counter, and then resume receiving and processing ARP packets. Figure 130 shows you how to set the ARP request rate limit to 60 ARP packets per second. Figure 130 config arp_req_rate_limit command PP1648T:4#config arp_req_rate_limit 60 Command: config arp_req_rate_limit 60 Success. PP1648T:4# Enabling the ARP request rate limit To enable the ARP request rate limit for the switch, use the following command: enable arp_req_rate_limit Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 240 Chapter 9 Configuring traffic filters This command uses no additional options: enable arp_req_rate_limit followed by: There are no options. Figure 131 shows you how to enable the ARP request rate limit. Figure 131 enable arp_req_rate_limit command PP1648T:4#enable arp_req_rate_limit Command: enable arp_req_rate_limit Success. PP1648T:4# Disabling the ARP request rate limit To disable the ARP request rate limit for the switch, use the following command: disable arp_req_rate_limit This command uses no additional options: disable arp_req_rate_limit followed by: There are no options. Figure 132 shows you how to disable the ARP request rate limit. 316862-B Rev 00 Chapter 9 Configuring traffic filters 241 Figure 132 disable arp_req_rate_limit command PP1648T:4#disable arp_req_rate_limit Command: disable arp_req_rate_limit Success. PP1648T:4# Displaying the ARP request rate limit To display the current ARP request rate limit for the switch, use the following command: show arpentry show arpentry followed by: Ipif <ipif_name 12> IPaddress <ipaddr> static Figure 133 shows you how to display the ARP request rate limit, along with the switch’s ARP table. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 242 Chapter 9 Configuring traffic filters Figure 133 show arpentry command PP1648T:4#show arpentry ARP Aging Time : 20 ARP Req Rate Limit : Enabled (50 frames/sec) Interface --------System IP Address ---------10.0.0.0 MAC Address Type -----------------------FF-FF-FF-FF-FF-FF Local/Broadcast Configuring broadcast control You use broadcast control to limit the number of broadcast, multicast, and destination not found (dlf) packets that are forwarded through the switch at any given time. Since these packet types are commonly forwarded to all ports of a given VLAN or IP interface, it is possible that other network devices could also forward these packets through alternative network routes, and that they will find there way back to the switch. The switch will then forward the packets again, and so on, until a significant portion of the network’s bandwidth is consumed. To prevent these packet-types from creating a storm on the network, you can assign a threshold, in Kp/s, for each packet type. When the number of packets received by the switch exceeds this threshold, the switch stops forwarding these packet-types - until the rate of packets received falls below the threshold. This section describes the commands you use to configure broadcast traffic control. 316862-B Rev 00 Chapter 9 Configuring traffic filters 243 Roadmap of broadcast control CLI commands The following roadmap lists the broadcast control commands and their parameters. Use this list as a quick reference or click on any entry for more information: Command Parameter config traffic control <portlist> all dlf [enabled|disabled] broadcast [enabled|disabled] multicast [enabled|disabled] threshold <value> show traffic control ports <portlist> Configuring traffic control To configure broadcast control, use the following command: config traffic control Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 244 Chapter 9 Configuring traffic filters This command uses the following options: config traffic control followed by: <portlist> You use this option to enter a group of ports that the config traffic control command is applied to. You specify ports by entering the lowest port number in a group, and then the highest, separated by a dash. For example, you enter a port group including the switch ports 1, 2, and 3 as 1-3. You specify ports that are not contained within a group by entering their port number, separated by a comma. Thus, you enter the port group 1-3 and port 26 as 1-3, 26. all Specifies that the config traffic control command applies to all of the ports on the switch. dlf [enabled|disabled] Specifies that the config traffic control command is applied to packets generated by a dlf (destination lookup fail). You must follow this parameter with enabled or disabled. broadcast [enabled|disabled] Specifies that the config traffic control command is applied to broadcast packets. You must follow this parameter with enabled or disabled. multicast [enabled|disabled] Specifies that the config traffic control command is applied to multicast packets. You must follow this parameter with enabled or disabled. threshold <value> Specifies the threshold, in Kb/s, at which the config traffic control command is applied. The default is 128 Kb/s. Figure 134 shows you an example of configuring traffic control for switch ports 1 through 3, for broadcast packets. 316862-B Rev 00 Chapter 9 Configuring traffic filters 245 Figure 134 config traffic control command PP1648T:4#config traffic control 1-3 broadcast enabled Command: config traffic control 1-3 broadcast enabled Success. PP1648T:4# Displaying traffic control settings To display the current traffic control settings on the switch, use the following command: show traffic control This command uses the following options: show traffic control followed by: ports <portlist> You use this to display the traffic control settings for a group of ports. You enter the lowest port number in a group, and then the highest, separated by a dash. For example, you enter a port group including the switch ports 1, 2, and 3 as 1-3. You specify ports that are not contained within a group by entering their port number, separated by a comma. Thus, you enter the port group 1-3 and port 26 as 1-3, 26. Figure 135 shows you how to display traffic control settings for switch ports 1 through 3. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 246 Chapter 9 Configuring traffic filters Figure 135 show traffic control command PP1648T:4#show traffic control ports 1-3 Command: show traffic control ports 1-3 Traffic Control DLF State: Ports ---1 2 3 Disabled Broadcast Storm -------Enabled Enabled Enabled Total Entries: 3 PP1648T:4# 316862-B Rev 00 Multicast Storm -------Disabled Disabled Disabled Threshold <Percentage> ---------0 0 0 247 Chapter 10 Configuring ARP, RIP, and OSPF This chapter provides overviews of the Address Resolution Protocol (ARP), the Routing Information Protocol (RIP), the Open Shortest Path First Protocol (OSPF), and OSPF packet authentication (MD5 keys), and describes how to configure each of these protocols using the CLI. Specifically, this chapter contains the following topics: Topic Page Configuring ARP 247 Configuring an ARP request rate limit 252 Configuring OSPF 261 Configuring OSPF packet authentication 291 Configuring ARP The Address Resolution Protocol (ARP) determines the correspondence between a MAC address and an IP address for a network device. The switch allows you to make static entries into its ARP table, as well as to configure the length of time a dynamically learned ARP table entry is allowed to remain without being accessed. This section describes the ARP commands. Specifically, it includes the following topics: Topic Page Roadmap of ARP CLI commands 248 Creating an ARP entry 248 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 248 Chapter 10 Configuring ARP, RIP, and OSPF Topic Page Deleting an ARP entry 249 Configuring the ARP aging time 250 Displaying the current ARP entries 250 Clearing the ARP table 251 Roadmap of ARP CLI commands The following roadmap lists some of the ARP commands and their parameters. Use this list as a quick reference or click on any command or parameter entry for more information on ARP commands. Command Parameter create arpentry <ipaddr> <macaddr> delete arpentry <ipaddr> all config arp_aging time <value> show arpentry ipif <ipif_name 12> ipaddress <ipaddr> static clear arptable Creating an ARP entry To create an ARP (Address Resolution Protocol) entry into the switch’s ARP table, enter the following command: create arpentry <ipaddr > <macaddr> where: ipaddr is the IP address that you want to associate with the MAC address. macaddr is the MAC address that you want to associate with the IP address. 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 249 Figure 136 shows how to create an ARP entry that is associated with IP address 10.48.74.121 and with MAC address 00-50-BA-00-07-36. Figure 136 create arpentry command PP1612G:4# create arpentry 10.48.74.121 00-50-BA-00-07-36 Command: create arpentry 10.48.74.121 00-50-BA-00-07-36 Success. PP1612G:4# Deleting an ARP entry To delete an ARP entry, enter the following command: delete arpentry This command uses the following options: delete arpentry followed by: <ipaddr> The IP address for which you want to delete the ARP entry on the switch. all Deletes all ARP entries on the switch. Figure 137 shows how to delete an ARP entry with the IP address 10.48.74.121. Figure 137 delete arpentry command PP1612G:4# delete arpentry 10.48.74.121 Command: delete arpentry 10.48.74.121 Success. PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 250 Chapter 10 Configuring ARP, RIP, and OSPF Configuring the ARP aging time To configure the ARP aging time, enter the following command: config arp_aging time < value> where: value is the time, in seconds, that an entry can remain in the switch’s ARP table, without being used, before it is dropped from the ARP table. The default is 20 minutes. Figure 138 shows how to configure the ARP aging time to be 30 minutes. Figure 138 config arp_aging time command PP1612G:4# config arp_aging time 30 Command: config arp_aging time 30 Success. PP1612G:4# Displaying the current ARP entries To display the current contents of the switch’s ARP table: show arpentry This command uses the following options: show arpentry followed by: ipif <ipif_name 12> 316862-B Rev 00 The name of the IP interface of the end node for which you want to display the ARP table entry for. This value can be up to 12 alphanumeric characters. Chapter 10 Configuring ARP, RIP, and OSPF 251 show arpentry followed by: ipaddress <ipaddr> The IP address corresponding to the IP interface name entered above. static Displays all of the static entries in the switch’s ARP table. Figure 139 shows the ARP table being displayed. Figure 139 show arpentry command Clearing the ARP table To clear the ARP table: clear arptable This command has no additional options. Figure 140 shows the switch’s ARP table being cleared. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 252 Chapter 10 Configuring ARP, RIP, and OSPF Figure 140 clear arptable command PP1612G:4# clear arptable Command: clear arptable Success. PP1612G:4# Configuring an ARP request rate limit The Passport 1600 series switches allow you to set limits on the rate at which the Switch will receive and process Address Resolution Protocol (ARP) request packets. There are two commands available to configure and enable the ARP rate limit control on the Switch. The first allows you to enable and disable the ARP rate limit — without changing the limit values you may have entered. The second command allows you to specify the number of ARP packets received by the Switch in one second that will trigger the ARP rate limit control. If the Switch receives more ARP packets in a second than you specify, the Switch will block all ARP requests for one second. The ARP rate limit counter is then reset, and ARP requests are again allowed — until the rate of ARP packets received by the Switch exceeds the limit you have set. The default value of the ARP request rate limit is 50 ARP packets per second, and you can specify any value between 10 and 100 packets per second. This section describes the commands you use in creating, deleting, and showing ARP request rate limits. Specifically, it includes the following topics: Topic Page Configuring the ARP request rate limit 252 Enabling the ARP request rate limit 254 Disabling the ARP request rate limit 255 Displaying the ARP request rate limit 255 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 253 Roadmap of ARP request rate limit CLI commands The following roadmap lists all of the MAC address filter commands and their parameters. Use this list as a quick reference or click on any entry for more information: Command Parameter config arp_req_rate_limit 60 <value 10-100> enable arp_req_rate_limit none disable arp_req_rate_limit none show arpentry none Configuring the ARP request rate limit To set the ARP request rate limit for the switch to 60 ARP packets per second, use the following command: config arp_req_rate_limit 60 This command uses the following options: config arp_req_rate_limit followed by: <value 10-100> Specifies the rate of ARP packets received by the switch, in packets per second, that will trigger the switch’s response. The default is 50 ARP packets per second. If the number of ARP packets received by the switch exceeds the number entered here, the switch will drop all ARP request packets for one second, reset the incoming ARP packet rate counter, and then resume receiving and processing ARP packets. Figure 141 shows you how to set the ARP request rate limit to 60 ARP packets per second. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 254 Chapter 10 Configuring ARP, RIP, and OSPF Figure 141 config arp_req_rate_limit command PP1648T:4#config arp_req_rate_limit 60 Command: config arp_req_rate_limit 60 Success. PP1648T:4# Enabling the ARP request rate limit To enable the ARP request rate limit for the switch, use the following command: enable arp_req_rate_limit This command uses no additional options: enable arp_req_rate_limit followed by: There are no options. Figure 142 shows you how to enable the ARP request rate limit. Figure 142 enable arp_req_rate_limit command PP1648T:4#enable arp_req_rate_limit Command: enable arp_req_rate_limit Success. PP1648T:4# 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 255 Disabling the ARP request rate limit To disable the ARP request rate limit for the switch, use the following command: disable arp_req_rate_limit This command uses no additional options: disable arp_req_rate_limit followed by: There are no options. Figure 143 shows you how to disable the ARP request rate limit. Figure 143 disable arp_req_rate_limit command PP1648T:4#disable arp_req_rate_limit Command: disable arp_req_rate_limit Success. PP1648T:4# Displaying the ARP request rate limit To display the current ARP request rate limit for the switch, use the following command: show arpentry This command uses no additional options: show arpentry followed by: There are no options. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 256 Chapter 10 Configuring ARP, RIP, and OSPF Figure 144 shows you how to display the ARP request rate limit, along with the switch’s ARP table. Figure 144 show arpentry command PP1648T:4#show arpentry ARP Aging Time : 20 ARP Req Rate Limit : Enabled (50 frames/sec) Interface --------System IP Address ---------10.0.0.0 MAC Address Type -----------------------FF-FF-FF-FF-FF-FF Local/Broadcast Configuring RIP The Routing Information Protocol (RIP) is a distance-vector routing protocol. There are two types of network devices running RIP - active and passive. Active devices advertise their routes to others through RIP messages, while passive devices listen to these messages. Both active and passive routers update their routing tables based upon RIP messages that active routers exchange. Only routers can run RIP in the active mode. The 1600 Series switches are active RIP devices. Every 30 seconds, a router running RIP broadcasts a routing update containing a set of pairs of network addresses and a distance (represented by the number of hops or routers between the advertising router and the remote network). So, the vector is the network address and the distance is measured by the number of routers between the local router and the remote network. RIP measures distance by an integer count of the number of hops from one network to another. A router is one hop from a directly connected network, two hops from a network that can be reached through a router, etc. The more routers between a source and a destination, the greater the RIP distance (or hop count). There are a few rules to the routing table update process that help to improve performance and stability. A router will not replace a route with a newly learned one if the new route has the same hop count (sometimes referred to as 'cost'). So learned routes are retained until a new route with a lower hop count is learned. 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 257 When learned routes are entered into the routing table, a timer is started. This timer is restarted every time this route is advertised. If the route is not advertised for a period of time (usually 180 seconds), the route is removed from the routing table. This section includes the following topics: Topic Page Roadmap of RIP CLI commands 257 Configuring RIP 258 Enabling RIP 259 Disabling RIP 260 Displaying the current RIP configuration 260 Roadmap of RIP CLI commands The following roadmap lists some of the RIP CLI commands and their parameters. Use this list as a quick reference or click on any command or parameter entry for more information on RIP commands. Command Parameter config rip ipif <ipif_name 12> rx_mode [disable|v1_only|v2_only|v1_and_ v2] tx_mode [disable|v1_only|v1_compatible|v 2_only] authentication [enabled <password>|disabled] state [enabled|disabled] enable rip disable rip show rip ipif <ipif_name 12> Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 258 Chapter 10 Configuring ARP, RIP, and OSPF Configuring RIP To configure RIP on a specific interface, use the following command: config rip ipif <ipif_name 12 > where: ipif_name 12 is the name of the IP interface on which RIP is configured. This command uses the following options: config rip ipif <ipif_name 12> followed by: Determines the version of RIP that the switch will to rx_mode [disable|v1_only|v2_only|v1_and_v2] interpret received RIP packets — as RIP version V1 only, V2 only, or V1 and V2. disable prevents the switch from receiving RIP packets. Determines the version of RIP that will be used by tx_mode [disable|v1_only|v1_compatible|v2_o the switch to format transmitted RIP packets — as RIP version V1 only, V1 compatible, or V2 only. nly] disable prevents the switch from transmitting RIP packets. authentication [enabled <password>|disabled] Enables or disables the authentication of RIP packets. If authentication is enabled, a case-sensitive password must be entered. state [enabled|disabled] Enables or disables RIP on the interface. To configure RIP on all interfaces, use the following command: config rip all 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 259 This command uses the following options: config rip all followed by: Determines the version of RIP that the switch will to rx_mode [disable|v1_only|v2_only|v1_and_v2] interpret received RIP packets — as RIP version V1 only, V2 only, or V1 and V2. disable prevents the switch from receiving RIP packets. Determines the version of RIP that will be used by tx_mode [disable|v1_only|v1_compatiable|v2_ the switch to format transmitted RIP packets — as RIP version V1 only, V1 compatible, or V2 only. only] disable prevents the switch from transmitting RIP packets. authentication [enabled <password>|disabled] Enables or disables the authentication of RIP packets. If authentication is enabled, a case-sensitive password must be entered. state [enabled|disabled] Enables or disables RIP on all interfaces. Figure 145 shows RIP being configured for the IP interface named System, and to use RIP version V1 to interpret received RIP packets. Figure 145 config rip command PP1612G:4#config rip ipif System rx_mode v1_only Command: config rip ipif System rx_mode v1_only Success. PP1612G:4# Enabling RIP To enable RIP, use the following command: enable rip Figure 146 shows RIP being enabled. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 260 Chapter 10 Configuring ARP, RIP, and OSPF Figure 146 enable rip command PP1612G:4#enable rip Command: enable rip Success. PP1612G:4# Disabling RIP To disable RIP, use the following command: disable rip Figure 147 shows RIP being disabled. Figure 147 disable rip command PP1612G:4#disable rip Command: disable rip Success. PP1612G:4# Displaying the current RIP configuration To display the current RIP configuration, use the following command: show rip 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 261 This command uses the following options: show rip followed by: ipif <ipif_name 12> The name of the IP interface for which you want to display the current RIP configuration. If you do not enter an IP interface name, the switch displays the current RIP configuration for all IP interfaces. Figure 148 shows the current RIP configuration being displayed. Figure 148 show rip command PP1648T:4# show rip Command: show rip RIP Global State : Enabled RIP Interface Settings Interface IP Address TX Mode RX Mode AuthenState tication ------------- ------------------ ---------- ------------- ---------- ----System 192.32.96.151/26 V1 Comp. V1 and V2 Disabled Disabled Total Entries : 1 PP1648T:4# PP1612G:4# Configuring OSPF The Open Shortest Path First (OSPF) is routing protocol that uses a link-state algorithm to determine routes to network destinations. A link is an interface on a router and the state is a description of that interface and its relationship to neighboring routers. The state contains information such as the IP address, subnet mask, type of network the interface is attached to, other routers attached to the network, etc. The collection of link-states are then collected in a link-state database that is maintained by routers running OSPF. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 262 Chapter 10 Configuring ARP, RIP, and OSPF OSPF specifies how routers will communicate to maintain their link-state database and defines several concepts about the topology of networks that use OSPF. To limit the extent of link-state update traffic between routers, OSPF defines the concept of Area. All routers within an area share the exact same link-state database, and a change to this database on one router triggers an update to the link-state database of all other routers in that area. Routers that have interfaces connected to more than one area are called Border Routers and take the responsibility of distributing routing information between areas. One area is defined as Area 0 or the Backbone. This area is central to the rest of the network in that all other areas have a connection (through a router) to the backbone. Only routers have connections to the backbone and OSPF is structured such that routing information changes in other areas will be introduced into the backbone, and then propagated to the rest of the network. When constructing a network to use OSPF, it is generally advisable to begin with the backbone (area 0) and work outward. There are four general categories of tasks required to setup OSPF on the 1600 switch: • • • • 316862-B Rev 00 OSPF Area Setting — the configuration of sub-domains called OSPF areas and the designating them as either normal or stub areas. Normal areas allow the advertisement of external routes and stub areas do not. OSPF IP Interface Configuration — the entry of OSPF IP Interfaces that correspond to IP interfaces configured previously on the switch. OSPF Virtual Link Configuration — the definition of OSPF areas that allow links with outside routers to access the OSPF backbone. OSPF Area Aggregation Configuration — allows OSPF areas to be represented by their network address and subnet mask. In addition, the type of link-state database advertisements can be specified for each area. Chapter 10 Configuring ARP, RIP, and OSPF 263 This section includes the following topics: Topic Page Roadmap of OSPF CLI commands 263 Enabling OSPF 265 Disabling OSPF 266 Configuring the OSPF router ID 266 Displaying the current OSPF configuration 267 Creating an OSPF area 269 Deleting an OSPF area 270 Configuring an OSPF area 271 Displaying the current OSPF area configuration 272 Creating an OSPF host route 273 Creating an OSPF area aggregation 277 Displaying the current OSPF LSDB 281 Displaying the current OSPF neighbor table 282 Displaying the current OSPF virtual neighbor table 283 Configuring an OSPF IP interface 283 Creating an OSPF virtual link 286 Configuring an OSPF virtual link 288 Deleting an OSPF virtual link 290 Displaying the currently configured OSPF virtual links 290 Roadmap of OSPF CLI commands The following roadmap lists some of the OSPF switch commands and their parameters. Use this list as a quick reference or click on any command or parameter entry for more information on OSPF switch commands. Command Parameter enable ospf disable ospf config ospf router_id <ipaddr> show ospf Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 264 Chapter 10 Configuring ARP, RIP, and OSPF Command Parameter create ospf area <area_id> type [normal|stub] stub_summary [enabled|disabled] metric <value> delete ospf area <area_id> config ospf area <area_id> type [normal|stub] stub_summary [enabled|disabled] metric <value> show ospf area <area_id> create ospf host_route <ipaddr> area <area_id> metric <value> config ospf host_route <ipaddr> area <area_id> metric <value> show ospf host_route <ipaddr> delete ospf host_route <ipaddr> create ospf aggregation <area_id> <network_address> lsdb_type [summary] advertise [enabled|disabled] delete ospf aggregation <area_id> <network_address> lsdb_type [summary] config ospf aggregation <area_id> <network_address> lsdb_type [summary] advertise [enabled|disabled] metric <value> show ospf aggregation area <area_id> show ospf lsdb area <area_id> advertise_router <ipaddr> type [rtrlink|netlink|summary|assumma ry|asextlink] show ospf neighbor show ospf virtual_neighbor area <area_id> config ospf ipif <ipif_name 12> all 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF Command 265 Parameter area <area_id> priority <value> hello_interval <sec> dead_interval <sec> authentication [none|simple <password>|md5 <key_id>] metric <value> state [enabled|disabled] show ospf ipif <ipif_name 12> all create ospf virtual_link <area_id> <neighbor_id> hello_interval <sec> dead_interval <sec> authentication [none|simple <password>|md5 <key_id>] config ospf virtual_link <area_id> <neighbor_id> hello_interval <sec> dead_interval <sec> authentication [none|simple <password>|md5 <key_id>] delete ospf virtual_link <area_id> <neighbor_id> show ospf virtual_link area <area_id> <neighbor_id> Enabling OSPF To enable OSPF on the switch, use the following command: enable ospf This command uses no additional options: Figure 149 shows OSPF being enabled. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 266 Chapter 10 Configuring ARP, RIP, and OSPF Figure 149 enable ospf command PP1612G:4#enable ospf Command: enable ospf Success. PP1612G:4# Disabling OSPF To disable OSPF on the switch, use the following command: disable ospf Figure 150 shows OSPF being disabled. Figure 150 disable ospf command PP1612G:4#disable ospf Command: disable ospf Success. PP1612G:4# Configuring the OSPF router ID An OSPF router ID is a 32-bit number (in the same form as an IP address — xxx.xxx.xxx.xxx) that uniquely identifies the switch in OSPF domain. It is common to assign the highest IP address assigned to the switch as the OSPF router ID. In the case of a 10.x.x.x network, this would be 10.255.255.255, but any unique 32-bit number will do. If 0.0.0.0 is entered, the highest IP address assigned to the switch will become the OSPF router ID for the switch. 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 267 To configure the OSPF router ID, use the following command: config ospf router_id < ipaddr> where: ipaddr is the OSPF router ID. Figure 151 shows the configuration of the OSPF router ID to be 10.48.74.122. Figure 151 config ospf router_id command PP1612G:4#config ospf router_id 10.48.74.122 Command: config ospf router_id 10.48.74.122 Success. PP1612G:4# Displaying the current OSPF configuration To display the current OSPF configuration, use the following command: show ospf Figure 152 shows the current OSPF configuration being displayed. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 268 Chapter 10 Configuring ARP, RIP, and OSPF Figure 152 show ospf command - partial display PP1612G:4# show ospf Command: show ospf OSPF Router ID : 192.32.96.54 (Auto selected) State : Disabled OSPF Interface Settings Interface IP Address Area ID State Link Status ------------ ------------------ --------------- -------- --------ip2 10.1.2.3/8 0.0.0.0 Disabled Link DOWN System 192.32.96.54/26 0.0.0.0 Disabled Link Up Metric --------1 1 Total Entries : 2 OSPF Area Settings Area ID Type Stub Import Summary LSA Stub Default Cost --------------- ------ ----------------------- ----------------0.0.0.0 Normal None None Total Entries : 1 Virtual Interface Configuration Transit Virtual Hello Dead Authentication Link Area ID Neighbor Router Interval Interval Status --------------- --------------- -------- -------- -------------- -----Total Entries : 0 OSPF Area Aggregation Settings Area ID Aggregated LSDB Advertise Network Address Type --------------- ------------------ -------- --------Total Entries : 0 OSPF Host Route Settings Host Address Metric Area ID TOS --------------- ------ --------------- --Total Entries : 0 PP1612G:4# 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 269 Creating an OSPF area OSPF areas can be designated as either normal or stub. Normal OSPF areas allow link-state database (LSDB) advertisements of routes to networks that are external to the area, Stub areas do not allow the LSDB advertisement of external routes. Stub areas use a default summary route (0.0.0.0) to reach external destinations. OSPF area definitions are as follows: Area ID — A 32-bit number in the form of an IP address (xxx.xxx.xxx.xxx) that uniquely identifies the OSPF area in the OSPF domain. Normal — OSPF areas that allow AS-external-LSAs to be flooded into them. Stub — OSPF areas that do not allow AS-external_LSAs to be flooded into them. To create an OSPF area, use the following command: create ospf area <area_id > type [normal|stub] where: area_id is the OSPF area ID. type specifies the mode of operation in the OSPF area. normal indicates OSPF areas that allow AS-external_LSAs to be flooded into them. stub indicates OSPF areas that do not allow AS-external_LSAs to be flooded into them. This command uses the following options: create ospf area <area_id> type [normal|stub] followed by: stub_summary [enabled|disabled] Enables or disables the OSPF area to import summary LSA advertisements. metric <value> This is a number between 0 and 65535 that represents the OSPF area cost. The default is 1. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 270 Chapter 10 Configuring ARP, RIP, and OSPF Figure 153 shows the configuration of the OSPF area with the area ID of 10.48.74.122, and the type normal. Figure 153 create ospf area command PP1612G:4#create ospf area 10.48.74.122 type normal Command: create ospf area 10.48.74.122 type normal Success. PP1612G:4# Deleting an OSPF area To delete an OSPF area, use the following command: delete ospf area <area_id > where: area_id is the OSPF area ID. Figure 154 shows the deletion of the OSPF area with the area ID of 10.48.74.122. Figure 154 delete ospf area command PP1612G:4#delete ospf area 10.48.74.122 Command: delete ospf area 10.48.74.122 Success. PP1612G:4# 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 271 Configuring an OSPF area OSPF areas can be designated as either normal or stub. Normal OSPF areas allow link-state database (LSDB) advertisements of routes to networks that are external to the area. Stub areas do not allow the LSDB advertisement of external routes. Stub areas use a default summary external route (0.0.0.0 or Area 0) to reach external destinations. To configure an OSPF area, use the following command: config ospf area <area_id > type [normal|stub] where: area_id is the OSPF area ID. type specifies the mode of operation in the OSPF area. normal indicates that LSAs for routes outside the area are allowed. stub indicates that LSAs for routes outside the area are not allowed. This command uses the following options: config ospf area <area_id> type [normal|stub] followed by: stub_summary [enabled|disabled] Enables or disables the OSPF area to import summary LSA advertisements. metric <value> This is a number between 0 and 65535 that represents the OSPF area cost. The default is 0. Figure 155 shows how to configure an OSPF area with the area ID of 10.48.74.122 to be of type stub, how to enable stub summary LSAs to be imported, and how to configure an OSPF cost of 1. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 272 Chapter 10 Configuring ARP, RIP, and OSPF Figure 155 config ospf area command PP1612G:4#config ospf area 10.48.74.122 type stub stub_summary enabled metric 1 Command: config ospf area 10.48.74.122 type stub stub_summary enabled metric 1 Success. PP1612G:4# Displaying the current OSPF area configuration To display the current OSPF area configuration, use the following command: show ospf area This command uses the following option: show ospf area followed by: <area_id> This is the OSPF area ID. Figure 156 shows the current OSPF area configuration being displayed. 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 273 Figure 156 show ospf area command PP1612G:4#show ospf area Command: show ospf area Area ID Type Stub Import Summary LSA Stub DefaultCost 0.0.0.0 Normal None 10.48.74.122 Stub None None Enabled 1 Total Entries: 2 PP1612G:4# Creating an OSPF host route This command allows you to make a static entry into the switch’s OSPF host table for host computers that are directly connected to the switch, so that their IP addresses and route metrics can be advertised to other OSPF areas. To create an OSPF host route, use the following command: create ospf host_route < ipaddr> where: ipaddr is the IP address of the host. This command uses the following options: create ospf host_route <ipaddr> followed by: area <area_id> This is the OSPF area ID where the host computer is located. metric <value> This is a number between 0 and 65535 that represents the OSPF area cost. The default is 1. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 274 Chapter 10 Configuring ARP, RIP, and OSPF Figure 157 shows how to create an OSPF host route between the host’s IP address 10.48.74.122 and the OSPF area 10.1.1.1, with an OSPF area cost of 2. Figure 157 create ospf host_route command PP1612G:4#create ospf host_route 10.48.74.122 area 10.1.1.1 metric 2 Command: create ospf host_route 10.48.74.122 area 10.1.1.1 metric 2 Success. PP1612G:4# Configuring an OSPF host route This command allows you to configure a static entry into the switch’s OSPF host table for host computers that are directly connected to the switch, so that their IP addresses and route metrics can be advertised to other OSPF areas. To configure the OSPF host route, use the following command: config ospf host_route < ipaddr> where: ipaddr is the IP address of the host. This command uses the following options: config ospf host_route <ipaddr> followed by: area <area_id> This is the OSPF area ID where the host computer is located. metric <value> This is a number between 0 and 65535 that represents the OSPF area cost. The default is 1. 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 275 Figure 158 shows how to configure the OSPF host route between the host’s IP address 10.48.74.122 and the OSPF area 10.1.1.1, to use the OSPF area cost of 1. Figure 158 config ospf host_route command PP1612G:4#config ospf host_route 10.48.74.122 area 10.1.1.1 metric 1 Command: config ospf host_route 10.48.74.122 area 10.1.1.1 metric 1 Success. PP1612G:4# Displaying the currently configured OSPF host routes To display the OSPF host route, use the following command: show ospf host_route This command uses the following options: show ospf host_route followed by: <ipaddr> This is the IP address of the host. Figure 159 shows the display of the currently configured OSPF host routes. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 276 Chapter 10 Configuring ARP, RIP, and OSPF Figure 159 show ospf host_route command PP1612G:4# show ospf host_route Command: show ospf host_route OSPF Host Route Settings Host Address Metric Area ID TOS --------------- ------ --------------- --2.2.2.2 1 0.0.0.0 0 (Ready) Total Entries : 1 PP1612G:4# Deleting an OSPF host route To delete an OSPF host route, use the following command: delete ospf host_route <ipaddr> where: ipaddr is the IP address of the host. Figure 160 shows how to delete an OSPF host route, where the host’s IP address 10.48.74.122. Figure 160 delete ospf host_route command PP1612G:4#delete ospf host_route 10.48.74.122 Command: delete ospf host_route 10.48.74.122 Success. PP1612G:4# 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 277 Creating an OSPF area aggregation This command allows OSPF areas to be represented by their network addresses and subnet masks. In this way, all of the range of IP addresses assigned to an OSPF area can be advertised by just two numbers — the network address and subnet mask. In addition, the type of link-state database advertisements can be specified for each area. To create an OSPF area aggregation, use the following command: create ospf aggregation < area_id> <network_address> lsdb_type [summary] where: area_id is the OSPF area ID. network_address is the IP address that corresponds to the OSPF area ID. lsdb_type is the type of address aggregation that OSPF will use. Currently, only summary is supported. This command uses the following option: create ospf aggregation <area_id> <network_address> lsdb_type [summary] followed by: advertise [enabled|disabled] Enables or disables the advertisement trigger. Figure 161 shows how to create an OSPF area aggregation for the OSPF area 10.1.1.1, and the network address 10.48.76.122/16, how to specify the LSDB type to summary, and how to enable the advertisement trigger. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 278 Chapter 10 Configuring ARP, RIP, and OSPF Figure 161 create ospf aggregation command PP1612G:4#create ospf aggregation 10.1.1.1 10.48.76.122/16 lsdb_type summary advertise enabled Command: create ospf aggregation 10.1.1.1 10.48.76.122/16 lsdb_type summary advertise enabled Success. PP1612G:4# Deleting an OSPF area aggregation To delete an OSPF area aggregation, use the following command: delete ospf aggregation < area_id> <network_address> lsdb_type [summary] where: area_id is the OSPF area ID. network_address is the IP address that corresponds to the OSPF area ID. lsdb_type is the type of address aggregation that OSPF uses. Currently, only summary is supported. Figure 162 shows how to delete the OSPF area aggregation for the OSPF area 10.1.1.1, and the network address 10.48.76.122/16, with the LSDB type being summary. Figure 162 delete ospf aggregation command PP1612G:4#delete ospf aggregation 10.1.1.1 10.48.76.122/16 lsdb_type summary Command: delete ospf aggregation 10.1.1.1 10.48.76..122/16 lsdb_type summary Success. PP1612G:4# 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 279 Configuring an OSPF area aggregation This command allows you to configure how OSPF areas are aggregated so that each area can be represented by its network address and subnet mask. In this way, all of the range of IP addresses assigned to an OSPF area can be advertised by just two numbers — the network address and subnet mask. In addition, the type of link-state database advertisements can be specified for each area. To configure an OSPF area aggregation, use the following command: config ospf aggregation < area_id> <network_address> lsdb_type [summary] where: area_id is the OSPF area ID. network_address is the IP address that corresponds to the OSPF area ID. lsdb_type is the type of address aggregation that OSPF will use. Currently, only summary is supported. This command uses the following options: config ospf aggregation <area_id> <network_address> lsdb_type [summary] followed by: advertise [enabled|disabled] Enables or disables the advertisement trigger. metric <value> Specifies a number between 0 and 65535 that represents the OSPF area cost. The default is 0. Figure 163 shows how to configure an OSPF area aggregation for the OSPF area 10.1.1.1, and the network address 10.48.76.122/16, with the LSDB type being summary and the advertisement trigger disabled: Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 280 Chapter 10 Configuring ARP, RIP, and OSPF Figure 163 configure ospf aggregation command PP1612G:4# config ospf aggregation 10.1.1.1 10.48.76.122/16 lsdb_type summary advertise disabled Command: config ospf aggregation 10.1.1.1 10.48.76.122/16 lsdb_type summary advertise disabled Success. PP1612G:4# Displaying the currently configured OSPF area aggregations To display the currently configured OSPF area aggregations, use the following command: show ospf aggregation This command uses the following options. show ospf aggregation followed by: area <area_id> Indicates the OSPF area ID that you want to display. Figure 164 shows the currently configured OSPF area aggregations. 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 281 Figure 164 show ospf aggregation command PP1612G:4#show ospf aggregation Command: show ospf aggregation OSPF Area Aggregation Settings Area ID Aggregated LSDB Network Address Type Advertise ------------ --------------------- -------------- ------------10.1.1.1 10.0.0.0/8 Summary Enabled 10.1.1.1 20.2.0.0/16 Summary Enabled Total Entries: 2 PP1612G:4# Displaying the current OSPF LSDB To display the current OSPF LSDB, use the following command: show ospf lsdb This command uses the following options: show ospf lsdb followed by: area <area_id> Indicates the OSPF area ID in the LSDB that you want to display. advertise_router <ipaddr> Indicates the OSPF router ID of the advertising router in the LSDB that you want to display. Specifies the type of link in the LSDB that you want type [rtrlink|netlink|summary|assummary| to display. asextlink] Figure 165 shows the current OSPF LSDB. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 282 Chapter 10 Configuring ARP, RIP, and OSPF Figure 165 show ospf lsdb command PP1648T:4# show ospf lsdb Command: show ospf lsdb Area LSDB Advertising Link State Cost Sequence ID Type Router ID ID Number --------------- --------- --------------- ------------------ -------- ---------0.0.0.0 RTRLink 50.48.75.73 50.48.75.73 * 0x80000002 Total Entries: 1 PP1648T:4# Displaying the current OSPF neighbor table To display the current OSPF neighbor table, use the following command: show ospf neighbor Figure 166 shows the display of the current OSPF neighbor table. Figure 166 show ospf neighbor command PP1612G:4#show ospf neighbor Command: show ospf neighbor IP Address of Router ID of Neighbor Neighbor Neighbor Neighbor Priority State ------------ --------------- 151.201.0.1 10.200.5.12 1 Full 201.3.0.2 10.200.5.7 1 Full 201.3.10.39 10.200.5.39 1 Full Total Entries: 3 316862-B Rev 00 -------- ------------ Chapter 10 Configuring ARP, RIP, and OSPF 283 Displaying the current OSPF virtual neighbor table To display the current OSPF virtual neighbor table, use the following command: show ospf virtual_neighbor This command uses the following options: show ospf virtual_neighbor followed by: Indicates the OSPF area ID of the virtual neighbor that you want to display. area <area_id> Figure 167 shows the display of the current OSPF LSDB. Figure 167 show ospf virtual_neighbor command PP1612G:4#show ospf virtual_link Command: show ospf virtual_link Transit Virtual Hello Dead Area ID Neighbor Router Interval Interval AuthenticationLink Status ----------- ------------------------ -------- ------------------3.3.3.3 10.200.5.7 10 60 None UP 3.3.3.3 10.200.5.36 10 60 None UP Total Entries : 2 PP1612G:4# Configuring an OSPF IP interface This command allows you to assign a previously configured IP interface on the switch for a previously configured OSPF area. The IP interface is identified by name, and represents a VLAN (also previously configured on the switch). To configure the OSPF IP interface, use the following command: config ospf ipif <ipif_name 12 > Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 284 Chapter 10 Configuring ARP, RIP, and OSPF where: ipif_name 12 is the name of the IP interface. The name can be up to 12 alphanumeric characters. This command uses the following options: config ospf ipif <ipif_name 12> followed by: all Specifies that this OSPF IP interface configuration will apply to all the IP interfaces on the switch. area <area_id> Specifies the OSPF area ID. priority <value> Determines the Designated Router (DR). • value is a number between 0 and 255. The higher the number, the higher the priority. For example, 255 represents a higher priority than 200. hello_interval <sec> Specifies the amount of time, in seconds, between the transmission of OSPF Hello packets. • sec is a value between 1 and 65535 seconds, inclusive. Note: The Hello Interval, Dead Interval, Authorization Type, and Authorization Key should be the same for all routers on the network. dead_interval <sec> Specifies the maximum length of time, in seconds, between the receipt of successive Hello packets from a neighbor router before the area router declares the neighbor router down. • sec is a value between 1 and 65535 seconds, inclusive. The Dead Interval must be evenly divisible by the Hello Interval. authentication [none|simple <password>|md5 <key_id>] Specifies the type of authentication required between routers. • password is an 8-character, case-sensitive password. You specify a password when you select simple authentication • key_id is a previously defined MD5 key ID. For instructions on configuring an entry in the MD5 key table, see “Configuring OSPF packet authentication” on page 291. 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 285 config ospf ipif <ipif_name 12> followed by: metric <value> Indicates the OSPF area cost. • value is a number between 0 and 65535, inclusive. The default is 1. state [enabled|disabled] Enables or disables the OSPF IP interface. Figure 168 shows the configuration of the OSPF IP interface named System. Figure 168 config ospf ipif command PP1612G:4#config ospf ipif System priority 2 hello_interval 15 metric 2 state enabled Command: config ospf ipif System priority 2 metric 2 state enabled hello_interval 15 Success. PP1612G:4# Displaying currently configured OSPF IP interfaces To display the current configured OSPF IP interfaces: show ospf ipif This command uses the following options: show ospf followed by: <ipif_name 12> Specifies the OSPF IP interface that you want to display. all Specifies that you want all of the currently configured OSPF IP interfaces on the switch to be displayed. Figure 169 shows the currently configured OSPF IP interfaces being displayed. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 286 Chapter 10 Configuring ARP, RIP, and OSPF Figure 169 show ospf all command PP1648T:4# show ospf all Command: show ospf all OSPF Interface Settings Interface Name: System 26 (Link Up) Network Medium Type: BROADCAST Area ID: 0.0.0.0 Disabled Priority: 1 DR Address: None Hello Interval: 10 Transmit Delay: 1 IP Address: 192.32.96.151/ Metric: 1 Administrative State: DR State: DOWN Backup DR Address: None Dead Interval: 40 Retransmit Time: 5 Total Entries : 1 PP1648T:4# Creating an OSPF virtual link You use virtual links to restore or increase connectivity of the backbone. Virtual links may be configured between any pair of area border routers that have interfaces to a common (non-backbone) area. The virtual link appears as an unnumbered point-to-point link in the graph for the backbone. You must configure the virtual link in both of the area border routers. To create an OSPF virtual link, use the following command: create ospf virtual_link < area_id> <neighbor_id> where: area_id is the OSPF Transit area ID. neighbor_id is the OSPF router ID of the neighbor. 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 287 This command uses the following options: create ospf virtual_link <area_id> <neighbor_id> followed by: hello_interval <sec> Specifies the amount of time, in seconds, between the transmission of OSPF Hello packets. • sec is a value between 1 and 65535 seconds, inclusive. Note: The Hello Interval, Dead Interval, Authorization Type, and Authorization Key should be the same for all routers on the network. dead_interval <sec> Specifies the maximum length of time, in seconds, between the receipt of successive Hello packets from a neighbor router before the area router declares the neighbor router down. • sec is a value between 1 and 65535 seconds, inclusive. The Dead Interval must be evenly divisible by the Hello Interval. authentication [none|simple <password>|md5 <key_id>] Specifies the type of authentication required between routers. • password is an 8-character, case-sensitive password. You specify a password when you select simple authentication. • key_id is a previously defined MD5 key ID. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 288 Chapter 10 Configuring ARP, RIP, and OSPF Figure 170 shows how to create an OSPF virtual link between the OSPF area 10.1.1.1 and the OSPF area 20.1.1.1 with a hello interval of 10 seconds between the transmission of hello packets. Figure 170 create ospf virtual_link command PP1612G:4#create ospf virtual_link 10.1.1.1 20.1.1.1 hello_interval 10 Command: create ospf virtual_link 10.1.1.1 20.1.1.1 hello_interval 10 Success. PP1612G:4# Configuring an OSPF virtual link This command allows OSPF areas to be represented by their network address and subnet mask. In this way, all of the range of IP addresses assigned to an OSPF area can be advertised by just two numbers — the network address and subnet mask. In addition, the type of link-state database advertisements can be specified for each area. To configure an OSPF virtual link, use the following command: config ospf virtual_link < area_id> <neighbor_id> where: area_id is the OSPF Transit area ID. neighbor_id is the OSPF router ID of the neighbor. 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 289 This command uses the following options: config ospf virtual_link <area_id> <neighbor_id> followed by: hello_interval <sec> Specifies the amount of time, in seconds, between the transmission of OSPF Hello packets. • sec is a value between 1 and 65535 seconds, inclusive. Note: The Hello Interval, Dead Interval, Authorization Type, and Authorization Key should be the same for all routers on the network. dead_interval <sec> Specifies the maximum length of time, in seconds, between the receipt of successive Hello packets from a neighbor router before the area router declares the neighbor router down. • sec is a value between 1 and 65535 seconds, inclusive. The Dead Interval must be evenly divisible by the Hello Interval. authentication [none|simple <password>|md5 <key_id>] Specifies the type of authentication required between routers. • password is an 8-character, case-sensitive password. You specify a password when you select simple authentication. • key_id is a previously defined MD5 key ID. Figure 171 shows the configuration of an OSPF virtual link between the OSPF area 10.1.1.1 and the OSPF area 20.1.1.1 with a hello interval of 20 seconds between the transmission of hello packets. Figure 171 config ospf virtual_link command PP1612G:4#config ospf virtual_link 10.1.1.2 20.1.1.1 hello_interval 20 Command: config ospf virtual_link 10.1.1.2 20.1.1.1 hello_interval 20 Success. PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 290 Chapter 10 Configuring ARP, RIP, and OSPF Deleting an OSPF virtual link To delete an OSPF virtual link, use the following command: delete ospf virtual_link < area_id> <neighbor_id> where: area_id is the OSPF Transit area ID. neighbor_id is the OSPF router ID of the neighbor. Figure 172 shows the deletion of an OSPF virtual link between the OSPF area 10.1.1.1 and the OSPF area 20.1.1.1. Figure 172 delete ospf virtual_link command PP1612G:4#delete ospf virtual_link 10.1.12 20.1.1.1 Command: delete ospf virtual_link 10.1.12 20.1.1.1 Success. PP1612G:4# Displaying the currently configured OSPF virtual links To display the currently configured OSPF virtual links: show ospf virtual_link This command uses the following options: show ospf virtual_link followed by: area <area_id> Specifies the OSPF area ID of the virtual link that you want to display. <neighbor_id> Specifies the OSPF router ID of the neighbor that you want to display. 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 291 Figure 173 displays the currently configured OSPF virtual links: Figure 173 show ospf virtual_link command PP1612G:4# show ospf virtual_link Command: show ospf virtual_link Virtual Interface Configuration Transit Virtual Hello Dead Authentication Link Area ID Neighbor Router Interval Interval Status --------------- --------------- -------- -------- -------------- -----10.0.0.0 20.0.0.0 10 60 None DOWN Total Entries: 1 PP1612G:4# Configuring OSPF packet authentication A Message Digest - version 5 (MD5) key is an alphanumeric string of up to 16 case-sensitive characters that you use to authenticate every packet exchanged between OSPF routers. You can also use it as a security mechanism to limit the exchange of network topology information to authorized routers in the OSPF domain. This section describes the commands you use to configure MD5 and also create, delete, and show MD5 key table entries. Specifically, it includes the following topics: Topic Page Roadmap of MD5 CLI commands 292 Creating an entry to the MD5 key table 292 Deleting an MD5 key table entry 293 Configuring an MD5 key 293 Displaying the current MD5 key table 294 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 292 Chapter 10 Configuring ARP, RIP, and OSPF Roadmap of MD5 CLI commands The following roadmap lists all of the MD5 commands and their parameters. Use this list as a quick reference or click on any entry for more information: Command Parameter create md5 key <key_id> <password 16> delete md5 key <key_id> config md5 key <key_id> <password 16> show md5 <key_id> Creating an entry to the MD5 key table To create an entry into the switch’s MD5 key table which can be used to authenticate exchanges between OSPF routers, use the following command: create md5 key <key_id> <password 16> where: key_id is the MD5 key ID with values between 1 and 255. password 16 is a case-sensitive alphanumeric string of up to 16 characters. Figure 174 shows how to create a new key entry into the switch’s MD5 key table with the key ID 2 and the password internet. Figure 174 create md5 key command PP1612G:4#create md5 key 2 internet Command: create md5 key 2 internet Success. PP1612G:4# 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 293 Deleting an MD5 key table entry To delete the MD5 key table entry, use the following command: delete md5 key <key_id> where: key_id is the MD5 key ID with values between 1 and 255. Figure 175 shows how to delete an MD5 key table entry with the key ID 1. Figure 175 delete md5 key command PP1612G:4#delete md5 key 1 Command: delete md5 key 1 Success. PP1612G:4# Configuring an MD5 key To configure an MD5 key which can be used to authenticate exchanges between OSPF routers, enter the following command: config md5 key <key_id> <password 16> where: key_id is the MD5 key ID with values between 1 and 255. password 16 is a case-sensitive alphanumeric string of up to 16 characters. Figure 176 shows how to configure MD5 to use key ID 1 and the password customer. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 294 Chapter 10 Configuring ARP, RIP, and OSPF Figure 176 config md5 command PP1612G:4#config md5 key 1 customer Command: config md5 key 1 customer Success. PP1612G:4# Displaying the current MD5 key table To display the switch’s current MD5 key table, use the following command: show md5 This command uses the following options: show md5 followed by: <key_id> Specifies the MD5 key ID that you want to display. Figure 177 shows how to display the switch’s MD5 key table. 316862-B Rev 00 Chapter 10 Configuring ARP, RIP, and OSPF 295 Figure 177 show md5 command PP1612G:4#show md5 Command: show md5 MD5 Key Table Configurations Key-ID -----1 2 3 4 Key --customer develop fireball intelligent Total Entries:4 PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 296 Chapter 10 Configuring ARP, RIP, and OSPF 316862-B Rev 00 297 Chapter 11 Configuring IP routes and route redistribution This chapter describes the route table and route redistribution commands. Specifically, it includes the following topics: Topic Page Using the route table 298 Roadmap of route table CLI commands 298 Creating an IP route 299 Creating a default IP route 300 Displaying the IP routes 301 Configuring IP routes 301 Configuring default IP routes 303 Configuring IP routes with max static routes 304 Using route redistribution 306 Roadmap of route redistribution CLI commands 307 Creating a route redistribution from RIP to OSPF 307 Creating a route redistribution from OSPF to RIP 309 Deleting a route redistribution 311 Configuring a route redistribution between RIP and OSPF 312 Configuring a route redistribution between OSPF and RIP 314 Displaying the route redistribution settings 315 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 298 Chapter 11 Configuring IP routes and route redistribution Using the route table The Passport 1600 switch allows you to make static entries into the switch’s IP routing table. IP routing is based on the network address of the destination IP address. Each routing table entry on the switch has a corresponding network addresses. For each network address, a corresponding gateway is listed. A gateway is used to communicate with remote networks. The gateway does not have to be directly connected to the remote network, it simply needs to be the first place to go on the way to the remote network. A default gateway is defined as the gateway that connects the local network to the backbone or to the Internet. A default gateway is used whenever no specific route is found for a given packet, or when there are several gateways on a network that all have similar connections. For the Passport 1600 CLI, a default IP route is a route to a default gateway. Roadmap of route table CLI commands The following roadmap lists some of the route table commands and their parameters. Use this list as a quick reference or click on any command or parameter entry for more information on route table commands. Command Parameter create iproute default <network_address> create iproute default <ipaddr> <metric> create iproute <network address> <ipaddr> <metric> delete iproute default show iproute <network_address> static rip 316862-B Rev 00 Chapter 11 Configuring IP routes and route redistribution Command 299 Parameter ospf config iproute default max_static_route config iproute default <ipaddr> <metric 1-65535> config iproute max_static_route <int 0-512> Creating an IP route To create an IP route, enter the following command: create iproute This command uses the following options: create iproute followed by: default Creates a default IP route entry. <network_address> Specifies the IP address and subnet mask of the IP interface you want create an IP route for. You can specify the address and mask information using the traditional format — for example, 10.1.2.3/255.0.0.0, or in the CIDR format — for example, 10.1.2.3/8. Figure 178 shows the creation of an IP route between 10.48.74,121, with a subnet mask of 255.0.0.0, a gateway at IP address 10.1.1.254, and a route metric of 1. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 300 Chapter 11 Configuring IP routes and route redistribution Figure 178 create iproute command PP1648T:4# create iproute 10.48.74.121/255.0.0.0 10.1.1.254 1 Command: create iproute 10.48.74.121/8 10.1.1.254 1 Success. PP1648T:4# Creating a default IP route To create a default IP route, enter the following command: create iproute default This command uses the following options: create iproute default followed by: followed by: <ipaddr> Identifies the IP address of the next hop. This can be a bridge, a router, or a gateway. <metric> Specifies a numerical value representing the relative distance between the source and the destination along the IP route. The default is 1. Creating an IP route using a network address To create an IP route using a network address, enter the following command: create iproute <network address> 316862-B Rev 00 Chapter 11 Configuring IP routes and route redistribution 301 This command uses the following options: create iproute <network address> followed by: followed by: <ipaddr> Identifies the IP address of the next hop. This can be a bridge, a router, or a gateway. <metric> Specifies a numerical value representing the relative distance between the source and the destination along the IP route. The default is 1. Deleting an IP route To delete an IP route, enter the following command: delete iproute default Figure 179 shows the deletion of an IP route. Figure 179 delete iproute command PP1648T:4# delete iproute default Command: delete iproute default Success. PP1648T:4# Displaying the IP routes To display the current IP routes in the switch’s routing table, enter the following command: show iproute Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 302 Chapter 11 Configuring IP routes and route redistribution This command uses the following options: show iproute followed by: <network_address> Specifies the IP address and subnet mask of the IP interface for which you want display the IP route, if it exists. You can specify the address and mask information using the traditional format — for example, 10.1.2.3/255.0.0.0, or in the CIDR format — for example, 10.1.2.3/8. static You can choose to display the switch’s IP routing table by the way the route was entered — static, for IP routes entered statical. rip You can choose to display the switch’s IP routing table by the way the route was entered — rip — for routes discovered by RIP (Routing Information Protocol), or ospf — for routes discovered by OSPF (Open Shortest Path First) ospf You can choose to display the switch’s IP routing table by the way the route was entered — ospf — for routes discovered by OSPF (Open Shortest Path First) Figure 180 shows the display of the switch’s routing table. Figure 180 show iproute command PP1648T:4# show iproute Command: show iproute Routing Table IP Address/Netmask Gateway Interface Cost Protocol ------------------ --------------- ------------ -------- -------------0.0.0.0 10.254.254.254System 1 Default 11.0.0.0/29 11.0.0.2 v2 1 Local 11.0.0.32/29 11.0.0.25 v3 15 OSPF 12.1.40.0/24 11.0.0.25 v3 8 OSPF 31.1.40.0/24 201.8.0.1 v5 2 RIP (Age: 26) Total Entries: 5 PP1648T:4# 316862-B Rev 00 Chapter 11 Configuring IP routes and route redistribution 303 Configuring IP routes To configure IP routes, enter the following command: config iproute This command uses the following options: config iproute followed by: default This option modifies the default route which has been created. max_static_route This option creates the maximum entry for static routes. Figure 181 shows the display of the config iproute command. Figure 181 config iproute command PP1648T:4# config iproute Command: config iproute Next possible completions: default max_static_route PP1648T:4# Configuring default IP routes To modify the default IP route, enter the following command: config iproute default Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 304 Chapter 11 Configuring IP routes and route redistribution This command uses the following options: config iproute default followed by: <ipaddr> Identifies the IP address of the next hop. This can be a bridge, router or gateway. <metric 1-65535> Specifies a numerical value representing the relative distance between the source destination along the IP route. The default value is 1. Figure 182 shows the display of the config iproute default command. Figure 182 config iproute default command PP1648T:4# config iproute default Command: config iproute default Next possible completions: <ipaddr> <metric 1-65535> PP1648T:4# Configuring IP routes with max static routes To set up the maximum static route number, enter the following command: config iproute max_static_route This command uses the following options: config iproute max_static_route followed by: <int 0-512> 316862-B Rev 00 Identifies the maximum number of static route entries for users’ configurations. The default value is 32. Chapter 11 Configuring IP routes and route redistribution 305 Note: Due to memory limitations, reserving more space for static route entries reduces the number of maximum dynamic routes. Before changing the default setting, please refer to Table 11. Table 11 Unicast/multicast ratios for dynamic and static iproute and arp values Unicast/ multicast ratio of 75/25 Unicast/ multicast ratio of 100/0 Dynamic iproute Static iproute Dynamic arp Static arp 1404 0 1372 32 1372 32 1372 32 1340 64 1372 32 1276 128 1372 32 1148 256 1372 32 892 512 1372 32 Dynamic iproute Static iproute Dynamic arp Static arp 1918 0 1372 32 1886 32 1372 32 1854 64 1372 32 1790 128 1372 32 1662 256 1372 32 1406 512 1372 32 Figure 183 shows the display of the config iproute command. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 306 Chapter 11 Configuring IP routes and route redistribution Figure 183 config iproute max_static_route command PP1648T:4# config iproute max_static_route Command: config iproute max_static_route Next possible completions: <int 0-512> PP1648T:4# Using route redistribution Route redistribution allows routers on the network that are running different routing protocols to exchange routing information. This is accomplished by comparing the routes stored in the various router’s routing tables and assigning appropriate metrics. This information is then exchanged among the various routers according to the individual routers current routing protocol. The switch can redistribute routing information between the OSPF and RIP routing protocols to all routers on the network (that are running either OSPF or RIP). Routing information entered into the switch’s static routing table and the IP interface routing information (local to the switch) can also be redistributed. The Route Redistribution commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters) in the following table: 316862-B Rev 00 Chapter 11 Configuring IP routes and route redistribution 307 Roadmap of route redistribution CLI commands The following roadmap lists some of the route redistribution commands and their parameters. Use this list as a quick reference or click on any command or parameter entry for more information on route redistribution commands. Command Parameter create route redistribute dst ospf src rip mettype [type_1|type_2] metric <value> create route redistribute dst rip src ospf [all|internal|external|type_1|type_2| inter+e1|inter+e2] metric <value> delete route redistribute dst [rip|ospf] src [rip|static|local| ospf] config route redistribute dst ospf src rip mettype [1|2] metric <value> config route redistribute dst rip src ospf [all|internal|external|type_1|type_2| inter+e1|inter+e2] metric <value> show route redistribute dst rip src ospf dst [rip|ospf] src [rip|static|local|ospf] Creating a route redistribution from RIP to OSPF The source for the routing information to redistribute is OSPF, the switch’s static routing table, and the switch’s local IP interface routing information. You can also choose how the RIP routing metric is calculated for redistribution to OSPF. To redistribute routes between RIP and OSPF (RIP as the source, and OSPF as the destination), enter the following command: create route redistribute dst ospf src rip Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 308 Chapter 11 Configuring IP routes and route redistribution Note that rip allows you to redistribute routes discovered through the Routing Information Protocol (RIP). You can also specify static and local as the source of the routing information to redistribute. Static refers to manual entries in the switch’s routing table, while local redistributes routing information from within the switch’s routing table. This command uses the following options: create route redistribute dst ospf src rip followed by: mettype [type_1|type_2] Allows you to choose between the two methods of calculating the routing metric when redistributing routing information. type_1 — (for redistributing from RIP to OSPF) calculates the metric by adding the destination’s interface cost to the metric entered in the metric field, below. type_2 — uses the metric entered in the metric field without change. type_2 only applies when the destination field is OSPF. Allows you to enter a value for an OSPF interface cost that will be used when redistributing routes from RIP to OSPF. Entering a metric value of 0 specifies transparency. metric <value> Table 12 shows the allowed values for the OSPF routing metrics: Table 12 Allowed values for the OSPF routing metrics Route Source Metric Metric Type RIP 0 to 16777214 mettype 1 mettype 2 Static 0 to 16777214 mettype 1 mettype 2 Local 0 to 16777214 mettype 1 mettype 2 The RIP metric value 0 will be redistributed in OSPF as 20. 316862-B Rev 00 Chapter 11 Configuring IP routes and route redistribution 309 Figure 184 shows how to redistribute routing information between RIP and OSPF, with RIP as the source and OSPF as the destination. Figure 184 create route redistribute dst ospf src rip command PP1648T:4# create route redistribute dst ospf src rip Command: create route redistribute dst ospf src rip Success. PP1648T:4# Creating a route redistribution from OSPF to RIP The source for the routing information to redistribute is OSPF, the switch’s static routing table, and the switch’s local IP interface routing information. You can choose the type of OSPF route to redistribute, as well as how the routing metric information will be redistributed to RIP. To redistribute routes between OSPF and RIP (OSPF as the source and RIP as the destination), enter the following command: create route redistribute dst rip src ospf Note that ospf allows you to redistribute routes discovered through Open Shortest Path First (OSPF). You can also specify static and local as the source of the routing information to redistribute. Static refers to manual entries in the switch’s routing table, while local redistributes routing information from within the switch’s routing table. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 310 Chapter 11 Configuring IP routes and route redistribution This command uses the following options: create route redistribute dst rip src ospf followed by: [all|internal|external|type_1|type_ Follow ospf with one or more of the following OSPF type descriptors: 2|inter+e1|inter+e2] all — redistributes all OSPF routes in the switch’s routing table to RIP. internal — redistributes only OSPF internal routes to RIP. external — redistributes only OSPF external routes to RIP. type_1 — redistributes OSPF type 1 LSAs (Link State Advertisements) type_2 — redistributes OSPF type 2 LSAs inter+e1 — redistributes OSPF internal, external and Type 1 routes to RIP inter+e2 — redistributes OSPF internal, external and Type 2 routes to RIP Allows you to enter a value for an OSPF interface cost that is used when redistributing routes from RIP to OSPF. Entering a metric value of 0 specifies transparency. metric <value> Table 13 shows the allowed values for the routing metrics Table 13 Allowed values for the routing metrics Route Source Metric Type OSPF 0 to 16 all type_1 type_2 internal type_1 internal type_2 external internal RIP 0 to 16 not applicable Figure 185 shows how to redistribute all OSPF routes in the switch’s routing table to RIP with an OSPF interface cost of 2. 316862-B Rev 00 Chapter 11 Configuring IP routes and route redistribution 311 Figure 185 create route redistribute dst rip src ospf command PP1648T:4# create route redistribute dst rip src ospf all metric 2 Command: create route redistribute dst rip src ospf all metric 2 Success. PP1648T:4# Deleting a route redistribution To delete a route redistribution configuration, enter the following command: delete route redistribute This command uses the following options: delete route redistribute followed by: dst [rip|ospf] Allows you to select the destination for the route redistribution you want to delete. If the route redistribution is from RIP to OSPF, then OSPF is the destination protocol. src [rip|static|local| ospf] Allows you to select the source for the route redistribution you what to delete. If the route redistribution is from RIP to OSPF, then RIP is the source protocol. Figure 186 shows how to delete a route redistribution between RIP and OSPF with RIP as the destination and OSPF as the source. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 312 Chapter 11 Configuring IP routes and route redistribution Figure 186 delete route redistribute command PP1648T:4# delete route redistribute dst rip src ospf Command: delete route redistribute dst rip src ospf Success. PP1648T:4# Configuring a route redistribution between RIP and OSPF To configure a route redistribution configuration between RIP and OSPF with RIP as the source, and OSPF as the destination, enter the following command: config route redistribute dst ospf src rip Note that rip allows you to redistribute routes discovered through the Routing Information Protocol (RIP). You can also specify static and local as the source of the routing information to redistribute. Static refers to manual entries in the switch’s routing table, while local redistributes routing information from within the switch’s routing table. 316862-B Rev 00 Chapter 11 Configuring IP routes and route redistribution 313 This command uses the following options: config route redistribute dst ospf src rip followed by: mettype [1|2] Allows you to choose between two methods of calculating the routing metric when redistributing routing information. 1 — (for redistributing from RIP to OSPF) calculates the metric by adding the destination’s interface cost to the metric entered in the metric field, below. 2 — uses the metric entered in the metric field without change. type_2 only applies when the destination field is OSPF. metric <value> Allows you to enter a value for an OSPF interface cost that will be used when redistributing routes from RIP to OSPF. Figure 187 shows how to configure route redistribution from RIP to OSPF using the metric calculation method 1 and a metric value of 2: Figure 187 config route redistribute dst ospf src rip command PP1648T:4# config route redistribute dst ospf src rip mettype 1 metric 2 Command: config route redistribute dst ospf src rip mettype 1 metric 2 Success. PP1648T:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 314 Chapter 11 Configuring IP routes and route redistribution Configuring a route redistribution between OSPF and RIP To configure a route redistribution configuration between RIP and OSPF with RIP as the destination, and OSPF as the source, enter the following command: config route redistribute dst rip src ospf Note that ospf allows you to redistribute routes discovered through Open Shortest Path First (OSPF). You can also specify static and local as the source of the routing information to redistribute. Static refers to manual entries in the switch’s routing table, while local redistributes routing information from within the switch’s routing table. This command uses the following options: config route redistribute dst rip src ospf followed by: [all|internal|exter Follow ospf with one or more of the following OSPF type descriptors: nal|type_1|type_2|i all — redistributes all OSPF routes in the switch’s routing table to RIP nter+e1|inter+e2] internal — redistributes only OSPF internal routes to RIP external — redistributes only OSPF external routes to RIP type_1 — redistributes OSPF type 1 LSAs (Link State Advertisements) type_2 — redistributes OSPF type 2 LSAs inter+e1— redistributes OSPF internal, external, and Type 1 routes to RIP inter +e2 — redistributes OSPF internal, external, and Type 2 routes to RIP metric <value> Allows you to enter a value for an OSPF interface cost that will be used when redistributing routes from RIP to OSPF. Figure 188 shows the configuration of a route redistribution from OSPF to RIP to use OSPF type all and a metric value of 3. 316862-B Rev 00 Chapter 11 Configuring IP routes and route redistribution 315 Figure 188 config route redistribute dst rip src ospf command PP1648T:4# config route redistribute dst rip src ospf all metric 3 Command: config route redistribute dst rip src ospf all metric 3 Success. PP1648T:4# Displaying the route redistribution settings To display the switch’s route redistribution settings for redistributing routing information from OSPF to RIP, enter the following command: show route redistribute dst rip src ospf This command uses the following options: show route redistribute followed by: dst [rip|ospf] Allows you to select the destination protocol for the routing information redistribution settings you want to display. If no destination protocol is specified, the switch will display all of its routing information redistribution settings. src [rip|static|local|ospf] Allows you to select the source protocol for the routing information redistribution settings you want to display. Figure 189 shows the display of the routing information redistribution settings. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 316 Chapter 11 Configuring IP routes and route redistribution Figure 189 show route redistribute command PP1648T:4# show route redistribute Command: show route redistribute Route Redistribution Settings Source Protocol -------OSPF RIP LOCAL Destination Protocol -----------RIP OSPF OSPF Total Entries : 3 PP1648T:4# 316862-B Rev 00 Type Metric -------All Type-1 Type-2 -----------Transparency 2 20 317 Chapter 12 Configuring VRRP This chapter describes the CLI commands that you can use to configure the VRRP (Virtual Router Redundancy Protocol) on the Switch. The Virtual Router Redundancy Protocol (VRRP) dynamically assigns responsiblity for a virtual router to one of the VRRP routers on your LAN. The VRRP router controlling the IP address associated with a virtual router is called the Master, and forwards packets sent to this IP address. This allows any of the Virtual Router IP addresses on the LAN to be used as the default first hop router by end-hosts. The advantage gained from using VRRP is a higher availablity defalut path without requiring configuration of dynamic routing or router discovery protocols on every end-host. The use of a statically configured default route is popular as it minimizes configuration and processing overhead on the end-host and is widely supported. This creates a single point of failure in your LAN, however. Loss of the default router resulte in a catastrophic event, isolating all end-hosts that are unable to detect any alternate path that may be available. The VRRP is designed to eliminate the single point of failure inherent in the static default routed environment. VRRP specifies an election protocol that dynamically assigns responsibility for a virtual router to one of the VRRP routers on your LAN. The VRRP router controlling the IP address associated with a virtual router is called the Master, and forwards packets sent to this IP address. The election process provides dynamic fail-over in the forwarding responsibility should the Master become unavailable. Any of the virtual router’s IP addresses on a LAN can then be used as the default first hop router by end-hosts. The advantage gained from using VRRP is a higher availability default path without requiring configuration of dynamic routing or router discovery protocols on every end-host. You can assign a VRRP IP interface to every VLAN (and corresponding IP interface) configured on the Switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 318 Chapter 12 Configuring VRRP The VRRP commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters) in the following table. Roadmap of VRRP features Command Parameter create vrrp ipif <ipif_name> vrid <int 1-255> authtype [none | simple authdata <string> | ip authdata <string>] admin [up | down] priority <int 1-255> advint <int 1-255> preempt [true | false] critical ipaddress <ipaddr> criticalip [enabled | disabled] holddowntimer <int 0-21600> delete vrrp ipif <ipif_name> vrid <int_1-255> config vrrp ipif <ipif_name> authtype [none|simple authdate <string>] vrid <int 1-255> admin [up | down] priority <int 1-255> advint <int 1-255> preempt [true | false] critical ip address <ipaddr> criticalip [enabled | disabled] holddowntimer <int 0-21600> show vrrp ipif <ipif_name> vrid <int 1-255> enable vrrp ping disable vrrp ping 316862-B Rev 00 Chapter 12 Configuring VRRP 319 Creating a VRRP IP Interface To create a VRRP IP interface on the Switch, use the following command: create vrrp ipif This command includes the following options: create vrrp ipif followed by: <ipif_name> This is the name of the IP interface that the VRRP entry is being created for. This IP interface must have been previously created, and assigned to a VLAN, on the Switch. authtype [none | simple authdata <string> | ip authdata <string>] Specifies the type of authentication that will be used. The same authentication method must be specified for all routers that will particpate in the VRRP none specifies that no authentication will be used. If simple authdata is specified, you must enter an alphanumeric string of no more than 8 characters in the <string> field. This same string must be entered for all routers that will participate in the VRRP. It is used as a simple password, and will be compared when VRRP message packets are received by a router. If the two strings do not match, the packet will be dropped. If ip authdata is specified, you must supply an alpha numeric authentication string, or no more than 16 characters in the <string> field. This same string must be entered for all routers that will participate in the VRRP. An MD5 message digest is generated using this string, and will be compared when VRRP message packets are recieved by a router. If the two digests do not match, the packet will be dropped. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 320 Chapter 12 Configuring VRRP create vrrp ipif followed by: vrid <int 1-255> This is an integer that will be used to identify this VRRP group from other VRRP groups that may be defined on your network. All routers that will participate in this VRRP group must be assigned the same VRID (for example, 1), but this number must be different from the VRID that is assigned to other VRRP groups that may be created or configured on your network. ipaddress <ipaddr> This is the virtual IP address that will be assigned to the VRRP entry. This is also the IP address of the default gateway that will be statically assigned to end-hosts. This virtual IP address must be assigned to all routers that will participate in this VRRP group. admin [up | down] Specifies the state of the administration of the VRRP entry. If up is specified, the router will participate in VRRP. If down is specified, the router will not participate in VRRP. priority <int 1-255> This is a relative number that will be used in the election of a Master router from the group of routers that will participate in VRRP. A higher number will increase the probability that this router will be elected as the Master router. A lower number will increase the probability that this router will be elected as a backup router. 255 is used to indicate that this router will always be the Master, and no backup router can become the Master, unless the Master stops functioning. The default value is 100. If all routers participating in VRRP are assigned the same priority value, the router with the higher physical IP address will be elected as the Master. advint <int 1-255> This is the time interval, in seconds, between sending VRRP message packets. The default value is 1 second. The same advint value must be assigned to all routers participating in this VRRP group. 316862-B Rev 00 Chapter 12 Configuring VRRP 321 create vrrp ipif followed by: preempt [true | false] This specifies the behavior of backup routers in the VRRP group. The same preempt setting (true or false) must be set for all routers participating in this VRRP group. If preempt is set to true, and a backup router’s priority is larger than the Master’s priority, the backup will become the Master, and the Master will become the backup. If preempt is set to false, a backup router can not become a Master router. critical ip address <ipaddr> This is a physical IP address that provides the most direct route to the Internet or other critical network connections, from this router. This must be a real IP address assigned to a real device on the network. If the connection between the Master router and this IP address is not functioning, a new Master will be elected from the backup routers participating in the VRRP. If the connection to a backup router to this IP address is also not functioning, this backup router can not become the Master. You can assign different critical IP addresses to different routers participating in the VRRP. In this way, you can define multiple routes to the Internet or other critical network connections. criticalip [enabled | disabled] This is used to enable or disable the critical ip address command above. The default is disabled. holddowntimer <int 0-21600> This is the time interval, in seconds, that the router will wait after being booted to start VRRP. All routers participating in this VRRP group must have the same holddowntimer value. The default is 0 seconds. A longer time interval may be specified if multiple routes must be learned by the Switch from other devices on the network. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 322 Chapter 12 Configuring VRRP Figure 190 shows the creation of a VRRP entry for the IP interface System with the vrid 1 and the virtual IP address 10.1.1.1. Figure 190 create vrrp ipif :4#create vrrp ipif System vrid 1 ipaddress 10.1.1.1 Command: create vrrp System vrid 1 ipaddress 10.1.1.1 Success. :4# Configuring a VRRP IP Interface To configure a VRRP IP interface on the Switch, use the following command: config vrrp ipif 316862-B Rev 00 Chapter 12 Configuring VRRP 323 This command includes the following options: config vrrp ipif followed by: <ipif_name> This is the name of the IP interface that the VRRP entry that is being configured. This IP interface must have been previously created, and assigned to a VLAN, on the Switch. authtype [none | simple authdata <string> | ip authdata <string] Specifies the type of authentication that will be used. The same authentication method must be specified for all routers that will particpate in the VRRP none specifies that no authentication will be used. If simple authdata is specified, you must enter an alphanumeric string of no more than 8 characters in the <string> field. This same string must be entered for all routers that will participate in the VRRP. It is used as a simple password, and will be compared when VRRP message packets are received by a router. If the two strings do not match, the packet will be dropped. If ip authdata is specified, you must supply an alpha numeric authentication string, or no more than 16 characters in the <string> field. This same string must be entered for all routers that will participate in the VRRP. An MD5 message digest is generated using this string, and will be compared when VRRP message packets are recieved by a router. If the two digests do not match, the packet will be dropped. vrid <int 1-255> This is an integer that will be used to identify this VRRP group from other VRRP groups that may be defined on your network. All routers that will participate in this VRRP group must be assigned the same VRID (for example, 1), but this number must be different from the VRID that is assigned to other VRRP groups that may be created or configured on your network. admin [up | down] Specifies the state of the administration of the VRRP entry. If up is specified, the router will participate in VRRP. If down is specified, the router will not participate in VRRP. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 324 Chapter 12 Configuring VRRP config vrrp ipif followed by: priority <int 1-255> This is a relative number that will be used in the election of a Master router from the group of routers that will participate in VRRP. A higher number will increase the probability that this router will be elected as the Master router. A lower number will increase the probability that this router will be elected as a backup router. 255 is used to indicate that this router will always be the Master, and no backup router can become the Master, unless the Master stops functioning. The default value is 100. If all routers participating in VRRP are assigned the same priority value, the router with the higher physical IP address will be elected as the Master. advint <int 1-255> This is the time interval, in seconds, between sending VRRP message packets. The default value is 1 second. The same advint value must be assigned to all routers participating in this VRRP group. preempt [true | false] This specifies the behavior of backup routers in the VRRP group. The same preempt setting (true or false) must be set for all routers participating in this VRRP group. If preempt is set to true, and a backup router’s priority is larger than the Master’s priority, the backup will become the Master, and the Master will become the backup. If preempt is set to false, a backup router can not become a Master router. 316862-B Rev 00 Chapter 12 Configuring VRRP 325 config vrrp ipif followed by: critical ip address <ipaddr> This is a physical IP address that provides the most direct route to the Internet or other critical network connections, from this router. This must be a real IP address assigned to a real device on the network. If the connection between the Master router and this IP address is not functioning, a new Master will be elected from the backup routers participating in the VRRP. If the connection to a backup router to this IP address is also not functioning, this backup router can not become the Master. You can assign different critical IP addresses to different routers participating in the VRRP. In this way, you can define multiple routes to the Internet or other critical network connections. criticalip [enabled | disabled] This is used to enable or disable the critical ip address command above. The default is disabled. holddowntimer <int 0-21600> This is the time interval, in seconds, that the router will wait after being booted to start VRRP. All routers participating in this VRRP group must have the same holddowntimer value. The default is 0 seconds. A longer time interval may be specified if multiple routes must be learned by the Switch from other devices on the network. Figure 191 shows the configuration of the VRRP entry for the IP interface System to make the entry’s priority set to 4. Figure 191 config vrrp ipif :4# config vrrp ipif System vrid 1 priority 4 Command: config vrrp ipif System vrid 1 priority 4 Success. :4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 326 Chapter 12 Configuring VRRP Displaying a VRRP IP interface configuration To display a VRRP IP interface configuration on the Switch, use the following command: show vrrp ipif This command includes the following options: show vrrp ipif followed by: <ipif_name> This is the name of the IP interface that the VRRP entry is being displayed. This IP interface must have been previously created, and assigned to a VLAN, on the Switch. vrid <int 1-255> This is an integer that will be used to identify the VRRP entry. 316862-B Rev 00 Chapter 12 Configuring VRRP 327 Figure 192 shows the VRRP entry for the IP interface System. Figure 192 show vrrp ipif :4# show vrrp ipif System vrid 1 Command: show vrrp System vrid 1 VRRP : Disabled Ping Virtal IP Address : Disabled Interface Name Authentication type : System : None VRID : 1 Current State : Init Advertisement Interval: 1 second(s) Preemption Mode : Preempt Priority : 4 Administrator Status: Down HoldDownTimer : 0 Master IP addresses : 10.42.73.88 IP addresses backed up : 10.1.1.1 Critical IP : Disabled Critical IP addresses : 0.0.0.0 Total Entries: 1 :4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 328 Chapter 12 Configuring VRRP Deleting a VRRP IP interface configuration To delete all VRRP IP interface configurations on the Switch, use the following command: delete vrrp This command includes the following options: delete vrrp followed by: ipif This allows you to select a specifid VRRP IP interface (or VRRP group) to be deleted from the Switch. If you simply enter delete vrrp, the Switch will delete all VRRP groups that have been configured. <ipif_name> This is the name of the IP interface that the VRRP entry is being created for. vrid <int 1-255> This is an integer that will be used to identify the VRRP entry. Figure 193 shows the deletion of the VRRP entry for the IP interface System. Figure 193 delete vrrp :4# delete vrrp ipif System vrid 1 Command: delete vrrp ipif System vrid 1 Success. :4# 316862-B Rev 00 Chapter 12 Configuring VRRP 329 Enabling a VRRP IP interface configuration To enable a VRRP IP interface configuration on the Switch, use the following command: enable vrrp This command includes the following options: enable vrrp followed by: ping This allows the virtual IP address to be “pinged” from end-hosts to verify connectivity. The default is disabled (no ping parameter entered). If the ping parameter is specified, the command will only enable the virtual IP address to be “pinged”. If the ping parameter is not specified the command will enable the VRRP protocol on the Switch. Figure 194 shows VRRP being enabled on the Switch. Figure 194 enable vrrp :4# enable vrrp Command: enable vrrp Success. :4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 330 Chapter 12 Configuring VRRP Disabling a VRRP IP interface configuration To enable a VRRP IP interface configuration on the Switch, use the following command: disable vrrp This command includes the following options: disable vrrp followed by: ping This allows the virtual IP address to be “pinged” from end-hosts to verify connectivity. The default is disabled (no ping parameter entered). If the ping parameter is specified, the command will only enable the virtual IP address to be “pinged”. If the ping parameter is not specified the command will enable the VRRP protocol on the Switch. Figure 194 shows VRRP being disabled on the Switch. Figure 195 disable vrrp :4# disable vrrp Command: disable vrrp Success. :4# 316862-B Rev 00 331 Chapter 13 Configuring BootP and DNS relay This chapter describes how to configure Bootstrap Protocol (BootP) relay and Dynamic Name Server (DNS) relay. Specifically, it includes the following topics: Topic Page Configuring BootP relay 331 Configuring DNS relay 338 Configuring BootP relay The BootP relay enables end stations to use a BootP server to obtain TCP/IP configuration information, even if the BootP server is not on the local IP interface. If the BootP server and end station are on the same IP interface, no relay is necessary. If the BootP server and the end station are on different IP interfaces, a relay agent is necessary for the switch to forward the BootP messages. The relay agent forwards these packets between IP interfaces, and therefore must know the IP addresses of the BootP servers and their respective IP interface names. When the switch receives packets destined for a BootP server, it forwards them to specific servers as defined in the BootP relay configuration. The switch also forwards packets from the BootP servers to the appropriate IP interfaces. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 332 Chapter 13 Configuring BootP and DNS relay This chapter includes the following topics: Topic Page Roadmap of BootP relay commands 332 Configuring BootP relay 333 Adding a BootP relay address 334 Deleting a BootP relay address 335 Enabling BootP relay 336 Displaying the current BootP relay configuration 337 Roadmap of BootP relay commands The following roadmap lists some of the BootP relay commands and their parameters. Use this list as a quick reference or click on any command or parameter entry for more information on BootP relay commands. Command Parameter config bootp_relay hops <value 1-16> time <sec 0-65535> config bootp_relay add ipif <ipif_name> <ipaddr> config bootp_relay delete ipif <ipif_name> <ipaddr> enable bootp_relay disable bootp_relay show bootp_relay 316862-B Rev 00 ipif <ipif_name> Chapter 13 Configuring BootP and DNS relay 333 Configuring BootP relay To configure BootP relay, use the following command: config bootp_relay This command contains the following parameters: config bootp_relay followed by: hops <value 1-16> The maximum number of router hops that the BootP packets can cross before being dropped. time <sec 0-65535> The minimum amount of time, in seconds, within which the switch must relay the BootP request. If this time is exceeded, the switch will drop the BootP packet. Figure 196 shows BootP relay being configured to allow the BootP packets to cross 4 routers, and to set the BootP relay timer to 2 seconds. Figure 196 config bootp_relay command PP1612G:4#config bootp_relay hops 4 time 2 Command: config bootp_relay hops 4 time 2 Success. PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 334 Chapter 13 Configuring BootP and DNS relay Adding a BootP relay address To add an IP address of a BootP relay server, use the following command: config bootp_relay add This command contains the following parameters: config bootp_relay add followed by: ipif <ipif_name> This is the name of the IP interface on the switch where the BootP server’s packets will be relayed to. <ipaddr> This is the IP address of the BootP server. Figure 197 shows the addition of a BootP relay server, located on the IP interface named System, and having the IP address 10.43.21.12. Figure 197 config bootp_relay add command PP1612G:4#config bootp_relay add ipif System 10.43.21.12 Command: config bootp_relay add ipif System 10.43.21.12 Success. PP1612G:4# 316862-B Rev 00 Chapter 13 Configuring BootP and DNS relay 335 Deleting a BootP relay address To delete an IP address of a BootP relay server, use the following command: config bootp_relay delete This command contains the following parameters: config bootp_relay delete followed by: ipif <ipif_name> This is the name of the IP interface on the switch where the BootP server’s packets will be relayed to. <ipaddr> This is the IP address of the BootP server. Figure 198 shows the deletion of a BootP relay server, located on the IP interface named System, and having the IP address 10.43.21.12. Figure 198 config bootp_relay delete command PP1612G:4#config bootp_relay delete ipif System 10.43.21.12 Command: config bootp_relay delete ipif System 10.43.21.12 Success. PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 336 Chapter 13 Configuring BootP and DNS relay Enabling BootP relay To enable BootP relay, use the following command: enable bootp_relay Figure 199 shows BootP relay being enabled. Figure 199 enable bootp_relay command PP1612G:4#enable bootp_relay Command: enable bootp_relay Success. PP1612G:4# Disabling BootP relay To disable BootP relay, use the following command: disable bootp_relay This command uses no additional options. Figure 200 shows BootP relay being disabled. Figure 200 disable bootp_relay command PP1612G:4#disable bootp_relay Command: disable bootp_relay Success. PP1612G:4# 316862-B Rev 00 Chapter 13 Configuring BootP and DNS relay 337 Displaying the current BootP relay configuration To display the current BootP relay configuration, use the following command: show bootp_relay This command contains the following parameters: show bootp_relay ipif <ipif_name> The BootP relay configuration can be displayed on a per-IP interface basis. This is the name of the IP interface you want to display the BootP relay configuration for. If no IP interface name is specified, the switch will display all of the BootP configurations on the switch. Figure 201 shows the current BootP relay configuration being displayed. Figure 201 show bootp_relay command PP1612G:4#show bootp_relay ipif System Command: show bootp_relay ipif System bootp Relay Status :Disabled bootp Hops Count Limit :4 bootp Relay Time Threshold :0 Interface Server 1 --------- -------System Server 2 -------- Server 3 --------- Server 4 --------- 10.48.74.122 10.23.12.34 10.12.34.12 10.48.75.121 Total Entries: 1 PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 338 Chapter 13 Configuring BootP and DNS relay Configuring DNS relay DNS relay enables end stations to use a DNS server to obtain IP addresses that correspond to URLs, even if the DNS server is not on the local IP interface. If the DNS server and end station are on the same IP interface, no relay is necessary. If the DNS server and the end station are on different IP interfaces, a relay agent is necessary for the switch to forward the DNS messages. The relay agent forwards these packets between IP interfaces, and therefore must know the IP addresses of the DNS servers and their respective IP interface names. When the switch receives packets destined for a DNS server, it forwards them to specific servers as defined in the DNS relay configuration. The switch also forwards packets from the DNS servers to the appropriate IP interfaces. This chapter includes the following topics: Topic Page Roadmap of DNS relay CLI commands 339 Configuring DNS relay 339 Enabling DNS relay 341 Disabling DNS relay 341 Enabling the DNS relay cache 342 Disabling the DNS relay cache 342 Enabling the DNS static table 343 Disabling the DNS static table 343 Displaying the current DNS relay configuration 344 316862-B Rev 00 Chapter 13 Configuring BootP and DNS relay 339 Roadmap of DNS relay CLI commands The following roadmap lists some of the DNS relay commands and their parameters. Use this list as a quick reference or click on any command or parameter entry for more information on DNS relay commands. Command Parameter config dnsr primary secondary nameserver <ipaddr> config dnsr add static <domain_name> <ipaddr> config dnsr delete static <domain_name> <ipaddr> enable dnsr disable dnsr enable dnsr cache disable dnsr cache enable dnsr static disable dnsr static show dnsr static Configuring DNS relay To configure DNS relay to relay packets from the primary DNS server, you can use the following set of commands: config dnsr config dnsr add config dnsr delete Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 340 Chapter 13 Configuring BootP and DNS relay This command uses the following options: config dnsr followed by: primary This specifies that the DNS server, located at the IP address entered following nameserver, below, is the primary DNS server. secondary This specifies that the DNS server, located at the IP address entered following nameserver, below, is the secondary DNS server. nameserver <ipaddr> This is the IP address of the DNS server. config dnsr add followed by: static <domain_name> This specifies that the entry into the switch’s DNS cache will be static (no timeout). <ipaddr> This specifies the IP address of the DNS cache entry. config dnsr delete followed by: static <domain_name> This specifies that the entry into the switch’s DNS cache will be static (no timeout). <ipaddr> This specifies the IP address of the DNS cache entry. Figure 202 shows DNS relay being configured to relay packets from the primary DNS server, located at the IP address 10.43.21.12. Figure 202 config dnsr command PP1612G:4#config dnsr primary nameserver 10.43.21.12 Command: config dnsr primary nameserver 10.43.21.12 Success PP1612G:4# 316862-B Rev 00 Chapter 13 Configuring BootP and DNS relay 341 Enabling DNS relay To enable DNS relay, use the following command: enable dnsr This command uses no additional options: Figure 203 shows DNS relay being enabled. Figure 203 enable dnsr command PP1612G:4#enable dnsr Command: enable dnsr Success. PP1612G:4# Disabling DNS relay To disable DNS relay, use the following command: disable dnsr This command uses no additional options: Figure 204 shows DNS relay being disabled. Figure 204 disable dnsr command PP1612G:4#disable dnsr Command: disable dnsr Success. PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 342 Chapter 13 Configuring BootP and DNS relay Enabling the DNS relay cache To enable the DNS relay cache, use the following command: enable dnsr cache This command uses no additional options: Figure 205 shows the DNS relay cache being enabled. Figure 205 disable dnsr command PP1612G:4#enable dnsr cache Command: enable dnsr cache Success. PP1612G:4# Disabling the DNS relay cache To disable the DNS relay cache, use the following command: disable dnsr cache This command uses no additional options: Figure 206 shows the DNS relay cache being enabled. Figure 206 disable dnsr cache command PP1612G:4#disable dnsr cache Command: disable dnsr cache Success. PP1612G:4# 316862-B Rev 00 Chapter 13 Configuring BootP and DNS relay 343 Enabling the DNS static table To enable the DNS relay static table, use the following command: enable dnsr static This command uses no additional options: Figure 207 shows the DNS relay static table being enabled. Figure 207 enable dnsr static command PP1612G:4#enable dnsr static Command: enable dnsr static Success. PP1612G:4# Disabling the DNS static table To disable the DNS relay static table, use the following command: disable dnsr static This command uses no additional options: Figure 208 shows the DNS relay static table being enabled. Figure 208 disable dnsr static command PP1612G:4#disable dnsr static Command: disable dnsr static Success. PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 344 Chapter 13 Configuring BootP and DNS relay Displaying the current DNS relay configuration To disable the DNS relay static table, use the following command: show dnsr This command uses the following options: show dnsr followed by: static The DNS relay static table can be displayed by specifing this parameter. Figure 209 shows the current DNS relay configuration being displayed. Figure 209 show dnsr static command PP1612G:4#show dnsr static Command: show dnsr static DNS Relay Static Table Domain Name IP Address -------------------------------------www.123.com 10.12.12.123 bbs.ntu.edu. 140.112.1.23 Total Entries: 2 PP1612G:4# 316862-B Rev 00 345 Chapter 14 Configuring SNMP The Simple Network Management Protocol (SNMP) is a protocol for remotely monitoring and configuring network devices. SNMP enables network management stations to read and modify the settings of gateways, routers, switches, and other network devices. SNMP can be used to perform many of the same functions as a directly-connected console, or can be used within an integrated network management software package. SNMP performs the following functions: • • • Sending and receiving SNMP packets through the IP protocol. Collecting information about the status and current configuration of network devices. Modifying the configuration of network devices. The 1600 switch has a software program called an “agent” that processes SNMP requests, but the user program that makes the requests and collects the responses runs on a management station (a designated computer on the network). The SNMP agent and the user program both use the UDP/IP protocols to exchange packets. You use “community strings” to ensure that both the router SNMP agent and the remote user SNMP application program discard packets from unauthorized users. The remote user SNMP application and the router SNMP must use the same community string. SNMP community strings of up to 20 characters may be entered under the Remote Management Setup menu of the console program. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 346 Chapter 14 Configuring SNMP Caution: The Passport 1600 Series Layer 3 Switch software version 1.1 are encrypted. When the switch starts for the first time, it uses the default community string. It is strongly recommend that you change the default community string immediately after the installation. This chapter describes the commands you use to configure SNMP. Specifically, it includes the following topics: Topic Page Roadmap of SNMP CLI commands 347 Configuring SNMP 348 Managing SNMP traps 358 316862-B Rev 00 Chapter 14 Configuring SNMP 347 Roadmap of SNMP CLI commands The following roadmap lists some of the SNMP CLI commands and their parameters. Use this list as a quick reference or click on any command or parameter entry for more information: Command Parameter create snmp community <community_string> [readonly|readwrite] delete snmp community <community_string> create trusted_host <ipaddr> <netmask> delete trusted_host <ipaddr> <netmask> config snmp community <community_string> [readonly|readwrite] config snmp system_name <sw_name> config snmp location <sw_location> config snmp system_contact <sw_contact> show snmp community trap_receiver show trusted_host <ipaddr> <netmask> create snmp trap_receiver <ipaddr> <community_string> delete snmp trap_receiver <ipaddr> enable snmp disable snmp enable snmp authenticate traps disable snmp authenticate traps Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 348 Chapter 14 Configuring SNMP Configuring SNMP This section describes how to create and delete SNMP community strings and trusted hosts, to configure SNMP contact information, and to display SNMP configuration information. It contains the following topics: Topic Page Creating an SNMP community string 348 Deleting an SNMP community string 349 Creating a trusted host 350 Deleting a trusted host 351 Configuring an SNMP community string 351 Configuring the SNMP system name 353 Configuring the SNMP location 353 Configuring the SNMP system contact 354 Displaying the current SNMP configuration 355 Displaying the currently configured trusted hosts 357 Creating an SNMP community string To create an SNMP community string, use the following command: create snmp community This command contains the following parameters: create snmp community followed by: <community_string> An alphanumeric string of up to 32 characters used to authentication of users wanting access to the switch's SNMP agent. [readonly|readwrite] SNMP management stations using the above community string can have read-only access or read/write access to the switch's SNMP agent. The default read-only community string is “public.” The default read/write community string is “private.” 316862-B Rev 00 Chapter 14 Configuring SNMP 349 Figure 210 shows the creation of the SNMP community string “System” and gives this string read/write access. Figure 210 create snmp community command PP1612G:4#create snmp community System readwrite Command: create snmp community System readwrite Success. PP1612G:4# Deleting an SNMP community string To delete an SNMP community string, use the following command: delete snmp community < community_string> This command contains the following parameters: delete snmp community followed by: <community_string> An alphanumeric string of up to 32 characters used to authenticate users who want to access the switch's SNMP agent. where: community_string is an alphanumeric string of up to 32 characters used to authenticate users who want access to the switch’s SNMP agent. Figure 211 shows an example of the output for this command. In this example, the SNMP community string System is deleted. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 350 Chapter 14 Configuring SNMP Figure 211 delete snmp community command PP1612G:4#delete snmp community System Command: delete snmp community System Success. PP1612G:4# Creating a trusted host To create a trusted host, use the following command: create trusted_host create trusted_host followed by: <ipaddr> This parameter specifies the IP address of the remote management station that will be a trusted host <netmask> Specifies the subnet mask corresponding to the IP address above Figure 212 shows the creation of a trusted host with an IP address of 10.48.74.121. Figure 212 create trusted_host command PP1612G:4#create trusted_host 10.48.74.121 Command: create trusted_host 10.48.74.121 Success. PP1612G:4# 316862-B Rev 00 Chapter 14 Configuring SNMP 351 Deleting a trusted host To delete a trusted host, use the following command: delete trusted_host delete trusted_host followed by: <ipaddr> This parameter specifies the IP address of the remote management station that will be deleted as a trusted host <netmask> Specifies the subnet mask corresponding to the IP address above where: ipaddr is the IP address of the remote management station that will be deleted as a trusted host. netmask is the subnet mask corresponding to the IP address above. Figure 213 shows the deletion of a trusted host with an IP address of 10.48.74.121. Figure 213 delete trusted_host command PP1612G:4#delete trusted_host 10.48.74.121 Command: delete trusted_host 10.48.74.121 Success. PP1612G:4# Configuring an SNMP community string To configure an SNMP community string, use the following command: config snmp community Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 352 Chapter 14 Configuring SNMP This command contains the following parameters: create snmp community followed by: <community_string> An alphanumeric string of up to 32 characters used to authenticate users who want access to the switch's SNMP agent. [readonly|readwrite] SNMP management stations using the above community string can have read-only access or read/write access to the switch's SNMP agent. The default read-only community string is “public.” The default read/write community string is “private.” Figure 214 shows the configuration of the SNMP community string “Passport” and gives this string read/write access. Figure 214 config snmp community command PP1648T:4# create snmp community Passport readwrite Command: create snmp community Passport readwrite Success. PP1612G:4#config snmp community Passport readwrite Command: config snmp community Passport readwrite Success. PP1612G:4# 316862-B Rev 00 Chapter 14 Configuring SNMP 353 Configuring the SNMP system name To configure an SNMP system name for the switch, use the following command: config snmp system_name < sw_name> config snmp system_name followed by: <sw_name> The name of the switch. The name can be up to 128 alphanumeric characters. Figure 215 shows the configuration of the SNMP name “coolbob.” Figure 215 config snmp system_name command PP1612G:4#config snmp system_name coolbob Command: config snmp system_name coolbob Success. PP1612G:4# Configuring the SNMP location To configure an SNMP location for the switch, use the following command: config snmp location <sw_location> Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 354 Chapter 14 Configuring SNMP where: config snmp location followed by: <sw_location> The location of the switch. The location can be up to 128 alphanumeric characters. Figure 216 shows the configuration of the SNMP location “HereThere.” Figure 216 config snmp system_location command PP1612G:4#config snmp system_location HereThere Command: config snmp system_location HereThere Success. PP1612G:4# Configuring the SNMP system contact To configure an SNMP system contact for the switch, use the following command: config snmp system_contact < sw_contact> config snmp system_contact followed by: <sw_contact> The name of the contact for the switch. The contact is usually the person or group responsible for the switch. The name can be up to 128 alphanumeric characters. Figure 217 shows the configuration of the SNMP system contact named “Mike.” 316862-B Rev 00 Chapter 14 Configuring SNMP 355 Figure 217 config snmp system_contact command PP1612G:4#config snmp system_contact Mike Command: config snmp system_contact Mike Success. PP1612G:4# Displaying the current SNMP configuration To display the current SNMP configuration on the switch, use the following command: show snmp This command contains the following parameters: show snmp followed by: community trap_receiver Figure 218 shows the current SNMP configuration on the switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 356 Chapter 14 Configuring SNMP Figure 218 show snmp command PP1648T:4#show snmp Command: show snmp System Name System Location System Contact SNMP Trap Authenticate Traps SNMP Status : : : : : : PP1648T Community String ---------------**** **** **** Rights ---------------------Read-Only Read/Write Read-Only Enabled Enabled Enabled Total Entries: 3 IP Address -------------10.1.1.100 Total Entries: 1 PP1648T:4# 316862-B Rev 00 Community String ----------------**** Chapter 14 Configuring SNMP 357 Displaying the currently configured trusted hosts To display the currently configured trusted hosts on the switch, use the following command: show trusted_host show trusted_host followed by: <ipaddr> Specifies the IP address of the trusted host that you want to display <netmask> Specifies the IP mask value of the trusted host that you want to display. This command includes the option <ipaddr>, which allows you to specify the trusted host that you want to display. Figure 219 shows the currently configured trusted hosts on the switch. Figure 219 show trusted_host command PP1648T:4#show trusted_host Command: show trusted_host Management Stations: IP Address --------------10.12.53.251 11.1.1.1 PP1648T:4# Mask --------------255.0.0.0 255.0.0.0 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 358 Chapter 14 Configuring SNMP Managing SNMP traps Traps are messages that alert network personnel of events that occur on the switch. The events can be as serious as a reboot (someone accidentally turned OFF the switch), or less serious like a port status change. The switch generates traps and sends them to the trap recipient (or network manager). Trap recipients are special users of the network who are given certain rights and access in overseeing the maintenance of the network. Trap recipients will receive traps sent from the switch; they must immediately take certain actions to avoid future failure or breakdown of the network. You can also specify which network managers may receive traps from the switch by entering a list of the IP addresses of authorized network managers. Up to four trap recipient IP addresses, and four corresponding SNMP community strings can be entered. SNMP community strings function like passwords in that the community string entered for a given IP address must be used in the management station software, or a trap will be sent. This section contains the following topics: Topic Page Creating an SNMP trap receiver 358 Deleting an SNMP trap receiver 359 Enabling the transmission of SNMP traps 360 Disabling the transmission of SNMP traps 360 Enabling the authentication of SNMP traps 361 Disabling the authentication of SNMP traps 361 Creating an SNMP trap receiver To create an SNMP trap receiver, use the following command: create snmp trap_receiver 316862-B Rev 00 Chapter 14 Configuring SNMP 359 This command contains the following parameters: create snmp trap_receiver followed by: <ipaddr> The IP address of the remote management station that will receive SNMP traps generated by the switch’s SNMP agent. <community_string> An alphanumeric string of up to 32 characters used to authenticate users wanting access to the switch's SNMP agent. Figure 220 shows the creation of an SNMP trap receiver that has an IP address of 10.1.1.1 and will use the community string System. Figure 220 create snmp trap_receiver command PP1612G:4#create snmp trap_receiver 10.1.1.1 System Command: create snmp trap_receiver 10.1.1.1 System Success. PP1612G:4# Deleting an SNMP trap receiver To delete an SNMP trap receiver, use the following command: delete snmp trap_receiver < ipaddr> delete snmp trap_receiver followed by: <ipaddr> Specifies the IP address of the remot management station that will receive SNMP traps generated by the switch’s SNMP agent. Figure 221 shows the deletion of an SNMP trap receiver that has an IP address of 10.1.1.1. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 360 Chapter 14 Configuring SNMP Figure 221 delete snmp trap_receiver command PP1612G:4#delete snmp trap_receiver 10.1.1.1 Command: delete snmp trap_receiver 10.1.1.1 Success. PP1612G:4# Enabling the transmission of SNMP traps To enable the switch’s SNMP agent to send traps, use the following command: enable snmp Figure 222 shows the enabling of the transmission of SNMP traps on the switch. Figure 222 enable snmp command PP1612G:4#enable snmp Command: enable snmp Success. PP1612G:4# Disabling the transmission of SNMP traps To disable the switch’s SNMP agent sending traps, use the following command: disable snmp Figure 223 shows the disabling of the transmission of SNMP traps on the switch. 316862-B Rev 00 Chapter 14 Configuring SNMP 361 Figure 223 disable snmp command PP1612G:4#disable snmp Command: disable snmp Success. PP1612G:4# Enabling the authentication of SNMP traps To enable the authentication of SNMP traps, use the following command: enable snmp authenticate traps Figure 224 shows enabling the authentication of SNMP traps on the switch. Figure 224 enable snmp authenticate traps command PP1612G:4#enable snmp authenticate traps Command: enable snmp authenticate traps Success. PP1612G:4# Disabling the authentication of SNMP traps To disable the authentication of SNMP traps, use the following command: disable snmp authenticate traps Figure 225 shows disabling the authentication of SNMP traps on the switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 362 Chapter 14 Configuring SNMP Figure 225 disable snmp authenticate traps command PP1612G:4#disable snmp authenticate traps Command: disable snmp authenticate traps Success. PP1612G:4# 316862-B Rev 00 363 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) Configuring IGMP To receive multicast packets, end users must inform nearby routers that they want to become a member of a multicast group. The Internet Group Management Protocol (IGMP) is used by multicast routers to maintain multicast group membership. IGMP is used to determine whether the switch should forward multicast packets it receives to the other IP interfaces or not. When the switch has received a multicast packet, it will check to determine if there is at least one member of a multicast group that has requested to receive multicast packets from this source. If there is one member, the packet is forwarded. If there are no members, the packet is dropped. IGMP snooping allows the switch to “snoop,” or to capture the IGMP message packets, and examine their contents, as these packets pass between hosts and routers. When the switch receives an IGMP join message from a host for a given multicast group, the switch then adds the host’s IGMP information into its list for that group. When the switch receives an IGMP leave message for a host, it will remove the host from its list for that multicast group. This chapter describes the IP multicast commands. Specifically, it includes the following topics: Topic Page Roadmap of IGMP commands 364 The IP multicast cache commands allow you to display the entries into 389 the switch’s IP multicasting cache for specific groups and IP addresses. Configuring IGMP snooping 368 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 364 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) Roadmap of IGMP commands The following roadmap lists some of the IGMP commands and their parameters. Use this list as a quick reference or click on any command or parameter entry for more information on IGMP commands. Command Parameter config igmp ipif <ipif_name> all version <value> query_interval <sec> max_response_time <sec> robustness_variable <value> last_member_query_interval <value> state [enabled|disabled] show igmp ipif <ipif_name> show igmp group group <group> ipif <ipif_name> config igmp_snooping all host_timeout <sec> router_timeout <sec> leave_timer <sec> state [enabled|disabled] config igmp_snooping querier <vlan_name> all query_interval <sec> max_response_time <sec> robustness_variable <value> last_member_query_interval <sec> state [enabled|disabled] 316862-B Rev 00 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) Command Parameter config router_ports <vlan_name> [add|delete] <portlist> enable igmp_snooping forward_mcrouter_only show igmp_snooping vlan <vlan_name> show igmp_snooping group vlan <vlan_name> 365 show igmp_snooping forwarding vlan <vlan_name> show router_ports vlan <vlan_name> [static|dynamic] Configuring IGMP To configure IGMP for all IP interfaces on the switch to use IGMP version 1, and to enable IGMP, enter the following command: config igmp This command uses the following options: config igmp followed by: ipif <ipif_name> Specifies the name of the IP interface for which you wish to configure IGMP. all Indicates that this IGMP configuration is applied to all IP interfaces on the switch. followed by: version <value> Identifies the IGMP version number. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 366 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) config igmp followed by: query_interval <sec> Designates the time, in seconds, between general query transmissions. max_response_time <sec> Specifies the maximum amount of time, in seconds, that the switch will wait for reports from group members. robustness_variable <value> Specifies a tuning variable for networks that are expected to lose a large number of packets. A number between 2 and 255 can be entered, with larger values being specified for networks that are expected to lose a larger number of packets. The default is 2. last_member_query_interval <value> Specifies the Max Response Time inserted into Group-Specific Queries sent in response to Leave Group messages. It also identifies the amount of time between Group-Specific Query messages. The default is 1 second. state [enabled|disabled] Enables or disables IGMP for the IP interface specified above. Figure 226 shows IGMP being configured for all the IP interfaces on the switch to use IGMP version 1, and that IGMP is enabled. Figure 226 config igmp command PP1648T:4# config igmp all version 1 state enabled Command: config igmp all version 1 state enabled Success. PP1648T:4# 316862-B Rev 00 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) 367 Displaying IGMP settings for all IP interfaces To display the IGMP settings for all IP interfaces on the switch. show igmp This command uses the following options: show igmp followed by: ipif <ipif_name> Specifies the name of the IP interface name for which you want to display the current IGMP configuration. If no IP interface name is specified, the switch will display the IGMP configuration for all the IP interfaces on the switch. Figure 227 shows IGMP being configured for all the IP interfaces on the switch to use IGMP version 1, and that IGMP is enabled. Figure 227 show igmp command PP1612G:4# show igmp Command: show igmp IGMP Interface Configurations Interface IP Address ------------ --------------System 192.32.96.54/26 ip2 10.1.2.3/8 Ver- Query Maximum Robust- Last sion Inter- Response ness Member val Time Value Query Interval ---- ------ -------- ------- -----2 125 10 2 1 2 125 10 2 1 State ------Disabled Disabled Total Entries: 2 PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 368 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) Displaying the IGMP group settings To display the IGMP group settings for all IP interfaces on the switch. show igmp group This command uses the following options: show igmp group followed by: group <group> Identifies the multicast group ID. ipif <ipif_name> Identifies the IP interface name for which you wish to display the current IGMP configuration. If no IP interface name is specified, the switch displays the IGMP configuration for all the IP interfaces on the switch. Figure 228 shows IGMP being configured for all the IP interfaces on the switch to use IGMP version 1, and that IGMP is enabled. Figure 228 show igmp group command PP1612G:4# show igmp group Command: show igmp group Interface ------------ Multicast Group --------------- Last Reporter --------------- IP Querier --------------- IP Expire --------- Total Entries: 0 PP1612G:4# Configuring IGMP snooping To configure your switch to perform IGMP snooping on all the VLANs on the switch, use the following command: config igmp_snooping all 316862-B Rev 00 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) 369 This command includes the following options: config igmp_snooping all followed by: host_timeout <sec> Specifies the maximum amount of time a host can be a member of a multicast group without the switch receiving a host membership report. The default value is 70 seconds. router_timeout <sec> Specifies the maximum time, in seconds, that a route remains in the switch’s memory without the switch receiving a host membership report. The default value is 70 seconds. leave_timer <sec> Designates the amount of time a route will remain in the switch’s memory after receiving a leave group message from a host. The default is 2 seconds. state [enabled|disabled] Enables or disables this IGMP Snooping configuration. Figure 229 shows how to configure and enable IGMP snooping for all VLANs on the switch with a host timeout value of 250 seconds. Figure 229 config igmp_snooping all command PP1648T:4#config igmp_snooping all host_timeout 250 state enabled Command: config igmp_snooping all host_timeout 250 state enabled Success. PP1648T:4# Configuring IGMP snooping querier You can use the IGMP querier feature to configure the time in seconds between general query transmissions, the maximum time in seconds to wait for reports from members, and the permitted packet loss value that guarantees IGMP snooping. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 370 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) To configure the IGMP snooping querier feature, use the following command: config igmp_snooping querier This command includes the following options: config igmp_snooping querier followed by: <vlan_name> Identifies the name of the VLAN to which the IGMP snooping querier configuration applies all Specifies that this IGMP Snooping querier configuration will be applied to all VLANs on the switch. followed by: query_interval <sec> Designates the amount of time, in seconds, between general query transmissions. The default setting is 30 seconds. max_response_time <sec> Specifies the maximum amount of time, in seconds, that the switch will wait for reports from members. The default is 10 seconds. robustness_variable <value> Specifies a tuning variable for networks that are expected to lose a large number of packets. A number between 2 and 255 can be entered, with larger values being specified for networks that are expected to lose a larger number of packets. The default is 2. last_member_query_interval Identifies the Max Response Time inserted into Group-Specific Queries sent in response to <sec> Leave Group messages, and is also the amount of time between Group-Specific Query messages. The default is 1 second. state [enabled|disabled] Enables or disables IGMP for the IP interface specified above. Figure 230 shows how to configure and enable IGMP snooping querier for a VLAN named default, with a query interval of 125 seconds: 316862-B Rev 00 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) 371 Figure 230 config igmp_snooping querier command PP1648T:4#config igmp_snooping querier default query_interval 125 state enabled Command: config igmp_snooping querier default query_interval 125 state enabled Success. PP1648T:4# Configuring router ports You can designate a range of switch ports as being connected to multicast-enabled routers. This feature ensures that all packets with such a router as its destination will reach the multicast-enabled router regardless of the protocol type. To configure a range of ports as router ports, use the following command: config router_ports This command includes the following options: config router_ports followed by: <vlan_name> Specifies the name of the VLAN on which the router port resides [add|delete] <portlist> Allows you to add or delete a range of ports. You can specify the ports to add or delete by first entering the lowest port number in a group, and then the highest port number in a group, separated by a dash. For example, to enter a port group that includes switch ports 1, 2, and 3, you enter 1-3. To enter ports that are not contained within a group enter the port numbers, separated by a comma. For example, port group 1-3 and port 26 are entered as 1-3, 26 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 372 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) Figure 231 shows how to configure switch ports 1 through 3 to be router ports. Figure 231 config router_ports command PP1648T:4#config router_ports default add 1-3 Command: config router_ports default add 1-3 Success. PP1648T:4# Enabling IGMP snooping You can globally enable IGMP snooping on the switch. When you enable IGMP snooping on the switch, the switch forwards all multicast traffic to any IP router and forwards traffic to the VLAN in which a client shows up. To globally enable IGMP snooping on the switch, use the following command: enable igmp_snooping If you want the switch to forward all multicast traffic only to a multicast-enabled router, include the forward_mcrouter_only parameter in the command line; otherwise, the switch forwards all multicast traffic to any IP router. As a switch, the Passport 1600 can also prune group memberships per port within a VLAN. This feature, igmp_snooping filtering, allows you to optimize the IP multicast data flow for a group within a VLAN to only those ports that are members of the group. The switch listens to group reports from each port and builds a database of multicast group members per port. The switch suppresses the reports heard by not forwarding them out to other hosts, forcing the members to continuously send their own reports. Furthermore, the switch forwards multicast data only to the participating group members within the VLAN. 316862-B Rev 00 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) 373 This command includes the following options: enable igmp_snooping followed by: forward_mcrouter_only Specifies that the switch forward all multicast traffic to a multicast-enabled router only. If this parameter is not entered, the switch forwards all multicast traffic to any IP router. filtering Specifies that the switch forward multicast traffic for a group within a VLAN to only those ports that are members of the group Figure 232 shows how to configure and enable IGMP snooping to forward all multicast traffic only to a multicast-enabled router. Figure 232 enable igmp_snooping command PP1648T:4# enable igmp_snooping forward_mcrouter_only Command: enable igmp_snooping forward_mcrouter_only Success. PP1648T:4# Disabling IGMP snooping You can disable IGMP snooping on the switch only if IP multicast routing is not being used. Disabling IGMP snooping allows all IGMP and IP multicast traffic to flood within a given IP interface. To globally disable IGMP snooping on the switch, use the following command: disable igmp_snooping Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 374 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) This command includes the following options: disable igmp_snooping followed by: filtering Specifies that “unknown” IGMP packets will be filtered from the snooping process. When filtering is specified, only “registered” IGMP packets will be snooped. Figure 233 shows how to disable IGMP snooping on the switch. Figure 233 disable igmp_snooping command PP1648T:4# disable igmp_snooping Command: disable igmp_snooping Success. PP1648T:4# Displaying the current IGMP snooping configuration You can display the current IGMP snooping configuration on the switch. To display the current IGMP snooping configuration, use the following show command: show igmp_snooping 316862-B Rev 00 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) 375 This command includes the following options: show igmp_snooping followed by: vlan <vlan_name> Specifies the name of the VLAN for which you want to view the IGMP snooping configuration Note: The IGMP snooping feature can be configured differently for each VLAN on the switch. Figure 234 shows how to display the IGMP snooping configuration on the switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 376 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) Figure 234 show igmp_snooping command PP1648T:4# show igmp_snooping Command: show igmp_snooping IGMP Snooping Global State Multicast router Only Multicast Filtering VLAN Name Query Interval Max Response Time Robustness Value Last Member Query Interval Host Timeout Route Timeout Leave Timer Querier State Querier Router Behavior State : Disabled : Disabled : Enabled : default : 125 : 10 : 2 : 1 : 260 : 260 : 2 : Disabled : Non-Querier : Disabled VLAN Name Query Interval Max Response Time Robustness Value Last Member Query Interval Host Timeout Route Timeout Leave Timer Querier State Querier Router Behavior State : : : : : : : : : : : Total Entries: 2 PP1648T:4# 316862-B Rev 00 vlan2 125 10 2 1 260 260 2 Disabled Non-Querier Disabled Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) 377 Displaying IGMP snooping groups You can display current IGMP snooping group configurations on the switch. To display the current IGMP snooping group configuration, use the following show command: show igmp_snooping group This command includes the following options: show igmp_snooping followed by: vlan <vlan_name> Specifies the name of the VLAN for which you want to view the IGMP snooping group configuration Note: The IGMP snooping feature can be configured differently for each VLAN on the switch. Figure 235 shows how to display the current IGMP snooping group configuration. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 378 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) Figure 235 show igmp_snooping group PP1648T:4# show igmp_snooping group Command: show igmp_snooping group VLAN Name : Multicast group: MAC address : Reports : Port Member : default 224.0.0.2 01-00-5E-00-00-02 1 7,26 VLAN Name : Multicast group: MAC address : Reports : Port Member : VLAN Name : Multicast group: MAC address : Reports : Port Member : default 224.0.0.9 01-00-5E-00-00-09 1 7,26 default 234.5.6.7 01-00-5E-05-06-07 1 9,26 VLAN Name : Multicast group: MAC address : Reports : Port Member : default 236.54.63.75 01-00-5E-36-3F-4B 1 7,26 VLAN Name : Multicast group: MAC address : Reports : Port Member : default 239.255.255.250 01-00-5E-7F-FF-FA 2 7,26 VLAN Name : Multicast group: MAC address : Reports : Port Member : default 239.255.255.254 01-00-5E-7F-FF-FE 1 7,26 Total Entries : 6 PP1648T:4# 316862-B Rev 00 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) 379 Displaying IGMP snooping forwarding table You can display information about the IGMP snooping forwarding table. To display the current IGMP snooping forwarding table, use the following show command: show igmp_snooping forwarding This command includes the following options: show igmp_snooping forwarding followed by: vlan <vlan_name> Specifies the name of the VLAN for which you want to view the IGMP snooping forwarding configuration Note: You can configure the IGMP snooping feature differently for each VLAN on the switch. Figure 236 shows how to display information about the IGMP snooping forwarding table. Figure 236 show igmp_snooping forwarding command PP1648T:4# show igmp_snooping forwarding Command: show igmp_snooping forwarding VLAN Name : default Source IP : 10.44.45.66 Multicast group : 224.0.0.2 Port Member : 24 Total Entries : 1 PP1648T:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 380 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) Displaying the list of router ports You can display the currently configured router ports on the switch. To display the current list of router ports, use the following command: show router_ports This command includes the following options: show router_ports followed by: vlan <vlan_name> Specifies the name of the VLAN for which you want to view the list of router ports. [static|dynamic] Allows you to view the list of router ports based on the method used to add a port to the router port list: • static — entered manually • dynamic — discovered automatically by the switch. Figure 237 shows sample output for this command. Figure 237 show router_ports command PP1648T:4# show router_ports Command: show router_ports VLAN Name : default Static router port : Dynamic router port: 11 VLAN Name : v2 Static router port : 17-22 Dynamic router port: Total Entries: 2 PP1648T:4# 316862-B Rev 00 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) 381 Configuring DVMRP This section describes the CLI commands that you can use to configure the DVMRP (Distance Vector Multicast Routing Protocol) on the Switch. The Distance Vector Multicast Routing Protocol (DVMRP) is a hop-based method of building multicast delivery trees from multicast sources to all nodes of a network. DVMRP resembles the Routing Information Protocol (RIP), but is extended for multicast delivery. It relies upon RIP hop counts to calculate 'shortest paths' back to the source of a multicast message, but defines a 'route cost' to calculate which branches of a multicast delivery tree should be 'pruned' - once the delivery tree is established. Route cost is a relative number that is used by DVMRP to calculate which branches of a multicast delivery tree should be 'pruned'. The 'cost' is relative to other costs assigned to other DVMRP routes throughout the network. The higher the route cost, the lower the probability that the current route will be chosen to be an active branch of the multicast delivery tree (not 'pruned') - if there is an alternative route. DVMRP commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters) in the following table: Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 382 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) Command Parameter config dvmrp ipif <ipif_name 12> all metric <value 1-31> probe <sec 1-65535> neighbor_timeout <sec 1-65535> state [enabled | disabled] show dvmrp ipif <ipif_name> enable dvmrp disable dvmrp show dvmrp routing_table ipaddress <network_address> show dvmrp neighbor ipif <ipif_name 12> ipaddress <network_address> show dvmrp nexthop ipif <ipif_name 12> ipaddress <network_address> 316862-B Rev 00 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) 383 Configuring DVMRP To configure DVMRP for the IP interface named System, to use a neighbor timeout of 30 seconds, and a DVMRP route cost of 2, use the following command: config dvmrp ipif System neighbor_timeout 30 metric 2 This command contains the following parameters: Table 14 config dvmrp config dvmrp followed by: ipif <ipif_name> This is the name of the IP interface that this DVMRP configuration will apply to. all This specifies that this DVMRP configuration will apply to all the IP interfaces on the switch. metric <value> This allows you to assign a DVMRP route cost to the IP interface (entered above). A DVMRP route cost is a number that represents the relative cost of using this route, as opposed to using an alternative route, in the construction of a multicast delivery tree. The default cost is 1. probe <second> This is the amount of time, in seconds, between queries to determine if a multicast group is present on a given router’s subnet. The default is 10 second. neighbor_timeout <second> The time period, in seconds, that the switch will retain DVMRP neighbor router reports before issuing poison route messages. The default is 35 seconds. state [enabled/disabled] This allows you to enable or disable DVMRP. Figure shows DVMRP being configured for the IP interface System, to use a neighbor timeout of 30 seconds and a DVMRP route cost of 2: Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 384 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) Figure 238 config dvmrp :4# config dvmrp ipif System metric 2 neighbor_timeout 30 Command: config dvmrp ipif System metric 2 neighbor_timeout 30 Success. :4# Enabling DVMRP To enable DVMRP, use the following command: enable dvmrp This command contains no additional parameters: Table 15 enable dvmrp enable dvmrp This command has no additional parameters. Figure shows DVMRP being enabled: Figure 239 enable dvmrp :4# enable dvmrp Command: enable dvmrp Success. :4# 316862-B Rev 00 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) 385 Disabling DVMRP To disable DVMRP, use the following command: disable dvmrp This command contains no additional parameters: Table 16 disable dvmrp disable dvmrp This command has no additional parameters. Figure shows DVMRP being disabled: Figure 240 disable dvmrp :4# disable dvmrp Command: disable dvmrp Success. :4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 386 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) Displaying the current DVMRP routing table To display the current DVMRP routing table, use the following command: show dvmrp routing_table This command contains the following parameters: Table 17 show dvmrp routing_table show dvmrp routing table followed by: ipaddress <network_address> Figure shows the current DVMRP routing table being displayed: Figure 241 show dvmrp routing_table :4# show dvmrp routing table Command: show dvmrp routing table DVMRP Routing Table Source AddressSoruce MaskNext Hop RouterLearnedInterfaceExpire -------------------------------------------------------------- Total Entries: 0 :4# 316862-B Rev 00 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) 387 Displaying the current DVMRP neighbor router table To display the current DVMRP neighbor router table, use the following command: show dvmrp neighbor This command contains the following parameters: Table 18 show dvmrp neighbor show dvmrp neighbor followed by: ipif <ipif_name> This is the name of the IP interface for which you want to display the DVMRP neighbor router table. ipaddress <network_address> This is the IP address of a neighbor router. Figure shows the current DVMRP neighbor router table being displayed: Figure 242 show dvmrp neighbor :4# show dvmrp neighbor Command: show dvmrp neighbor DVMRP Neighbor Address Table Interface Neighbor AddressGeneration IDExpire Time --------- ---------------------------------------- Total Entries: 0 :4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 388 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) Displaying the current DVMRP nexthop router table To display the current DVMRP neighbor router table, use the following command: show dvmrp nexthop This command contains the following parameters: Table 19 show dvmrp next hop show dvmrp nexthop followed by: ipif <ipif_name> This is the name of the IP interface for which you want to display the DVMRP nexthop router table. ipaddress <network_address> This is the IP address of a neighbor router. Figure shows the current DVMRP nexthop router table being displayed: Figure 243 show dvmrp nexthop :4# show dvmrp nexthop Command: show dvmrp nexthop DVMRP Routing Next Hop Table Source IP AddressSoruce Mask ---------------------------- Total Entries: 0 :4# 316862-B Rev 00 Interface NameType ------------------ Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) 389 Displaying the current DVMRP configuration To display the current DVMRP configuration, use the following command: show dvmrp This command contains the following parameters: Table 20 show dvmrp show dvmrp followed by: ipif <ipif_name> This is the name of the IP interface for which you want to display the current DVMRP configuration. Figure shows the current DVMRP configuration being displayed: Figure 244 show dvmrp :4# show dvmrp Command: show dvmrp DVMRP Global State : Disabled Interface IP Address Neighbor TimeoutProbe --------- ---------------------------------System 10.42.73.88/830 10 Metric State ------ ----2 Disabled Total Entries: 1 :4# Displaying the Switch’s IP multicast cache The IP multicast cache commands allow you to display the entries into the switch’s IP multicasting cache for specific groups and IP addresses. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 390 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) The IP multicasting commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters) in the following table. Roadmap of IP multicast cache commands Table 21 IP multicasting cache commands Command Parameter show ipmc cache group <group> ipaddress <network_address> show ipmc ipif <ipif_name> Displaying the Switch’s IP multicast cache To display the switch’s IP multicast cache, use the following command: show ipmc cache This command contains the following parameters: Table 22 show ipmc cache show ipmc cache followed by: group <group> This is the multicast group ID. ipaddress <network_address> This is the IP address and subnet mask for a multicast destination. If no IP address is entered, the switch will display all of the destination IP addresses in it’s IP multicasting forwarding table. Figure shows the switch’s IP multicast cache being displayed: 316862-B Rev 00 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) 391 Figure 245 show ipmc cache :4# show ipmc cache Command: show ipmc cache Multicast Source IP Source IP Group Address Mask --------- --------- --------- Upstream Neighbor -------- Expire Time ------ Routing Protocol -------- Total Entries: 0 :4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 392 Chapter 15 Configuring Multicasting (IGMP, IGMP Snooping, and DVMRP) Displaying the switch’s IP multicast table To display the switch’s IP multicast table, use the following command: show ipmc This command contains the following parameters: Table 23 show ipmc show ipmc followed by: ipif <ipif_name> This is the name of the IP interface for which you want to display the IP multicast table. Figure shows the switch’s IP multicast table being displayed: Figure 246 show ipmc :4# show ipmc Command: show ipmc Interface Name -------------System Total Entries: 1 :4# 316862-B Rev 00 IP Address ---------10.42.73.88 Multicast Routing ----------------INACT 393 Chapter 16 Monitoring the network The Passport 1600 switch provides extensive network monitoring that can be viewed using the network monitoring commands described in this chapter. This chapter describes the network monitoring commands. Specifically, it includes the following topics: Topic Page Roadmap of network monitoring commands 394 Displaying port traffic statistics 395 Displaying port error statistics 397 Displaying port utilization 399 Clearing the switch counters 401 Clearing the switch log 402 Displaying the switch log 403 Configuring port mirroring 403 Displaying the current mirror settings 406 Enabling and disabling RMON 407 Checking network links 408 Determining the network route using traceroute 409 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 394 Chapter 16 Monitoring the network Roadmap of network monitoring commands The following roadmap lists some of the network monitoring commands and their parameters. Use this list as a quick reference or click on any command or parameter entry for more information on monitoring networks. Command Parameter show packet ports <portlist> show error ports <portlist> show utilization clear counters ports <portlist> clear log show log index <value> config mirror port <port> add source ports <portlist> [rx|tx|both] config mirror port <port> delete source ports <portlist> [rx|tx|both] enable mirror disable mirror show mirror enable rmon disable rmon ping <ipaddr> times <values 1-255> timeout <sec 1-99> traceroute <ipaddr> ttl <value 1-60> port <value 30000-64900> timeout <sec 1-65535> probe <value 1-9> 316862-B Rev 00 Chapter 16 Monitoring the network 395 Displaying port traffic statistics To display the traffic statistics for a port, use the following command: show packet ports This command uses the following option: show packet ports followed by: <portlist> Specifies a range of ports you want to display the traffic statistics for. Ports are specified by entering the lowest port number in a group, and then the highest port number in a group, separated by a dash. So, a port group including the switch ports 1, 2, and 3 would be entered as 1-3. Ports that are not contained within a group are specified by entering their port number, separated by a comma. So, the port group 1-3 and port 26 would be entered as 1-3, 26. Figure 247 shows the traffic statistics collected by the switch for port 7. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 396 Chapter 16 Monitoring the network Figure 247 show packet ports command PP1648T:4# show packet ports 7 Command: show packet ports 7 Port number : Frame Size -----------64 65-127 128-255 256-511 512-1023 1024-Max Size 7 Frame Counts -----------2 0 0 0 0 0 Frames/sec ---------0 0 0 0 0 0 Unicast RX Multicast RX Broadcast RX Unicast TX Multicast TX Broadcast TX 0 1 0 0 1 0 0 0 0 0 0 0 Frame Type ---------RX Bytes RX Frames Total --------64 1 Total/sec --------0 0 TX Bytes TX Frames 64 1 0 0 Table 24 shows the definitions for terms related to displaying port traffic statistics. 316862-B Rev 00 Chapter 16 Monitoring the network 397 Table 24 show packet port definitions Term Definition Frames The number of packets (or frames) received or transmitted by the switch with the size, in octets, given by the column on the right. Frames/sec The number of packets (or frames) transmitted or received, per second, by the switch. Unicast RX Displays the number of unicast packets received by the switch in total number (Frames) and the rate (Frames/sec). Multicast RX Displays the number of multicast packets received by the switch in total number (Frames) and the rate (Frames/sec). Broadcast RX Displays the number of broadcast packets received by the switch in total number (Frames) and the rate (Frames/sec). RX Bytes Displays the number of bytes (octets) received by the switch in total number (Total), and rate (Total/sec). RX Frames Displays the number of packets (frames) received by the switch in total number (Total), and rate (Total/sec). Unicast TX Displays the number of unicast packets transmitted by the switch in total number (Frames) and the rate (Frames/sec). Multicast TX Displays the number of multicast packets transmitted by the switch in total number (Frames) and the rate (Frames/sec). Broadcast TX Displays the number of broadcast packets transmitted by the switch in total number (Frames) and the rate (Frames/sec). TX Bytes Displays the number of bytes (octets) transmitted by the switch in total number (Total), and rate (Total/sec). TX Frames Displays the number of packets (frames) transmitted by the switch in total number (Total), and rate (Total/sec). Displaying port error statistics The following are definitions for terms related to displaying port error statistics: Term Definition For received packets CRC Error For 10 Mbps ports, the counter records CRC errors (FCS or alignment errors). For 100 Mbps ports, the counter records the sum of CRC errors and code errors (frames received with rxerror signal). Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 398 Chapter 16 Monitoring the network Term Definition Undersize The total number of frames received that were less than 64 octets long (excluding framing bits, but including FCS octets) and were otherwise well formed. Oversize The total number of frames received that were longer than 1518 octets (excluding framing bits, but including FCS octets) and were otherwise well formed. Fragment The total number of frames received that were less that 64 octets in length (excluding framing bits, but including FCS octets) and had either an FCS or an alignment error. Jabber The total number of frames received that were longer than 1518 octets (excluding framing bits, but including FCS octets), and had either an FCS or an alignment error. For transmitted packets Excessive Collision Excessive Collisions. The number of frames for which transmission failed due to excessive collisions. Late Collision The number of times that a collision is detected later than 512 bit-times into the transmission of a packet. Collision To display error statistics for the switch’s ports, use the following command: show error ports show error ports followed by: <portlist> 316862-B Rev 00 Specifies a range of ports for which you want to display error statistics. Ports are specified by entering the lowest port number in a group, and then the highest port number in a group, separated by a dash. So, a port group including the switch ports 1, 2, and 3 would be entered as 1-3. Ports that are not contained within a group are specified by entering their port number, separated by a comma. So, the port group 1-3 and port 26 would be entered as 1-3, 26. Chapter 16 Monitoring the network 399 where: portlist specifies the ports for which you want to display traffic statistics. Ports are specified by entering the lowest port number in a group, and then the highest port number in a group, separated by a dash. A port group, including the switch ports 1, 2, and 3, would be entered as 1-3. Ports that are not contained within a group are specified by entering their port number, separated by a comma. For example, the port group 1-3 and port 26 would be entered as 1-3, 26. Figure 248 shows the traffic statistics collected by the switch for port 3. Figure 248 show error ports command PP1648T:4# show error ports 7 Command: show error ports 7 Port number : 7 RX Frames --------0 0 0 0 0 CRC Error Undersize Oversize Fragment Jabber Excessive Collision Late Collision Collision TX Frames --------0 0 0 Displaying port utilization The following are definitions for terms related to displaying port utilization: Term Definition Port The switch's port number. TX/sec The rate at which the given port is transmitting packets, in packets per second. RX/sec The rate at which the given port is receiving packets, in packets per second. Util The percentage utilization of the given port's available bandwidth. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 400 Chapter 16 Monitoring the network To display the bandwidth utilization, in real time: show utilization Figure 249 shows the bandwidth utilization for the switch: Figure 249 show utilization command PP1624G:4# show utilization Port 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 TX/sec 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 PP1624G:4# 316862-B Rev 00 RX/sec 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Util 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Port 22 23 244 25 26 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 TX/sec 0 0 0 0 19 0 0 0 0 0 0 0 0 30 0 0 0 0 0 0 0 RX/sec 0 0 0 0 49 0 0 0 0 0 0 30 0 0 0 0 0 0 0 0 0 Util 0 0 0 0 1 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 Chapter 16 Monitoring the network 401 Clearing the switch counters To clear the switch counters, use the following command: clear counters This command uses the following option: clear counters followed by: ports <portlist> Specifies that you only want to clear the counters for the ports specified in the < portlist>. If this parameter is not specified, the counters for all of the ports on the switch will be cleared. • portlist is the range of ports for which you want to clear counters. Ports are specified by entering the lowest port number in a group, and then the highest port number in a group, separated by a dash. So, a port group including the switch ports 1, 2, and 3 would be entered as 1-3. Ports that are not contained within a group are specified by entering their port number, separated by a comma. So, the port group 1-3 and port 26 would be entered as 1-3, 26. Figure 250 shows how to clear counters for ports 7 through 9, inclusive. Figure 250 clear counters ports command PP1612G:4# clear counters ports 7-9 Command: clear counters ports 7-9 Success. PP1612G:4# Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 402 Chapter 16 Monitoring the network Clearing the switch log To clear the switch log: clear log Figure 251 shows how to clear the switch log. Figure 251 clear log command PP1612G:4# clear log Command: clear log Success. PP1612G:4# 316862-B Rev 00 Chapter 16 Monitoring the network 403 Displaying the switch log To display the switch log, use the following command: show log This command uses the following option: show log followed by: index <value> Specifies the index number for which you want to display the switch log. Figure 252 shows how to display the switch’s log. Figure 252 show log command PP1648T:4# show log Command: show log Index ----2 Date&Time Log Text ------------------- ----------------------------------------2004/03/12 10:10:49 clear log (Username:rwa from Telnet client 10.12.53.251) 1 2004/03/12 10:10:49 clear log tables successfully (Username: rwa from Telnet client 10.12.53.251) PP1648T:4# Configuring port mirroring Port mirroring allows a range of ports to have all of their traffic duplicated and sent to a designated port, where a network sniffer or other device can monitor the network traffic. For the range of ports to be mirrored, you can also specify that only traffic received by, sent by or both is mirrored to the target port. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 404 Chapter 16 Monitoring the network Configuring a mirror port To configure a mirror port, use the following command: config mirror port <port > add source ports <portlist> [rx|tx|both] where: port is the number of the port that will become a mirror for the ports listed in portlist. portlist is the range of ports whose traffic is mirrored in the mirror port. To specify a range, enter the beginning and end values, separated by a hyphen. You specify ports that are not contained within a group by entering their port number, separated by a comma. Thus, you enter the port group 1-3 and port 26 as 1-3, 26. rx mirrors the packets received by the source ports. tx mirrors the packets transmitted by the source ports. both mirrors all packets that pass through the source ports. Figure 253 shows you how to configure port 5 as the mirror port, and ports 1 through 4 as the source ports. All traffic passing through the source ports are mirrored to port 5. Figure 253 config mirror port add command PP1612G:4#config mirror port 5 add source ports 1-4 both Command: config mirror port 5 add source ports 1-4 both Success. Deleting a mirror port To delete a mirror port, use the following command: config mirror port <port > delete source ports <portlist> [rx|tx|both] 316862-B Rev 00 Chapter 16 Monitoring the network 405 where: port is the number of the port that is a mirror for the ports listed in portlist. portlist is the range of ports whose traffic is mirrored in the mirror port. To specify a range, enter the beginning and end values, separated by a hyphen. You specify ports that are not contained within a group by entering their port number, separated by a comma. Thus, you enter the port group 1-3 and port 26 as 1-3, 26. rx mirrors the packets received by the source ports. tx mirrors the packets transmitted by the source ports. both mirrors all packets that pass through the source ports. Figure 254 shows you how to delete port 5 as the mirror port, and ports 1 through 4 as the source ports. Figure 254 config mirror port delete command PP1612G:4# config mirror port 5 delete source ports 1-4 both Command: config mirror port 5 delete source ports 1-4 both Success. PP1612G:4# Enabling a mirror port To enable port mirroring on the switch, use the following command: enable mirror Figure 255 shows you how to enable port mirroring on the switch. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 406 Chapter 16 Monitoring the network Figure 255 enable mirror command PP1612G:4#enable mirror Command: enable mirror Success. PP1612G:4# Disabling a mirror port To disable port mirroring on the switch, use the following command: disable mirror Figure 256 shows you how to disable port mirroring on the switch. Figure 256 disable mirror command PP1612G:4#disable mirror Command: disable mirror. Success. PP1612G:4# Displaying the current mirror settings To display the current port mirroring settings on the switch, use the following command: show mirror Figure 257 shows you how to display the current mirror settings on the switch. 316862-B Rev 00 Chapter 16 Monitoring the network 407 Figure 257 show mirror command PP1648T:4# show mirror Command: show mirror Current Settings Mirror Status: Enabled Target Port : 9 Mirrored Port RX: TX: 1-5 PP1648T:4# Enabling and disabling RMON To enable RMON, use the following command: enable rmon Figure 258 shows enabling RMON on the switch: Figure 258 enable rmon command PP1612G:4#enable rmon Command: enable rmon Success. PP1612G:4# To disable RMON, use the following command: disable rmon Figure 259 shows disabling RMON on the switch: Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 408 Chapter 16 Monitoring the network Figure 259 disable rmon command PP1612G:4#disable rmon Command: disable rmon Success. PP1612G:4# Checking network links To verify the network link between the switch and another network device, use the following command: ping <ipaddr> where: ipaddr is the IP address of the network device at the remote end of the link. This IP address must be on the same subnet as the switch. This command contains the following parameters: ping followed by: times <values 1-255> The number of times the remote network device will be “pinged.” timeout <sec 1-99> The length of time, in seconds, the switch will wait for a response from the remote network device after sending a ping packet. Note: You cannot ping an interface if its ports are in blocking mode and the link is up. 316862-B Rev 00 Chapter 16 Monitoring the network 409 Figure 260 shows the switch sending 4 ping packets to the IP address 10.48.74.128. Figure 260 ping command PP1612G:4# ping 10.48.74.121 times 4 Command: ping 10.48.74.121 Reply from 10.48.74.121, time<10ms Reply from 10.48.74.121, time<10ms Reply from 10.48.74.121, time<10ms Reply from 10.48.74.121, time<10ms Ping Statistics for 10.48.74.121 Packets: Sent=4, Received=4, Lost=0 PP1612G:4# Determining the network route using traceroute To verify the network link between the switch and another network device, use the following command: traceroute <ipaddr> where: ipaddr is the IP address of the remote network device to be pinged. This command contains the following parameters: traceroute followed by: ttl <value 1-60> The time to live (TTL) value of the trace route request. This is the maximum number of routers the traceroute command can cross while seeking the network path between two devices. port <value 30000-64900> The port number. timeout <sec 1-65535> The maximum amount of time, in seconds, the switch will wait for a response. probe <value 1-9> The number of times the switch will try the traceroute command. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 410 Chapter 16 Monitoring the network Figure 261 shows the switch tracing the route between the switch and the network device with the IP address 10.48.74.121, with 3 probes: Figure 261 traceroute command PP1612G:4# traceroute 10.48.74.121 probe 3 Command: traceroute 10.48.74.121 probe 3 1 <10ms. 10.48.74.121 1 <10ms. 10.48.74.121 1 <10ms. 10.48.74.121 PP1612G:4# 316862-B Rev 00 411 Chapter 17 CLI configuration examples This chapter provides configuration examples for common Passport 1600 Series switch tasks and includes the CLI commands that you use to create the configuration examples. It includes the following topics: Topic Page Resetting the switch to its factory defaults 412 Configuring the default VLAN for management access 412 Downloading firmware and uploading configuration files 415 Creating new port-based VLANS 416 Disabling Spanning Tree 419 Configuring link aggregation groups 420 Enabling OSPF 421 Configuring OSPF MD5 authentication 427 Configuring an OSPF stub area 428 Configuring OSPF route distribution 430 Configuring RIP base 433 Selecting Tx and Rx RIP v2 mode 435 Configuring broadcast and multicast storm control 436 Configuring egress queue weight 437 Configuring QoS and IP filtering 438 Setting QoS priority for destination TCP flows 443 Dropping TCP flows 445 Filtering MAC addresses 446 Configuring forward-to-next-hop 448 Filtering IP addresses 449 Dropping fragmented IP packets 450 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 412 Chapter 17 CLI configuration examples Resetting the switch to its factory defaults To reset the switch to its factory defaults, use the following command: PP1648T:4# reset config Configuring the default VLAN for management access By default, all ports are assigned to the default VLAN, named default. This VLAN has an IP interface named System and an IP address of 10.90.90.90/8. You can change the System IP address to meet the IP subnet requirements used in your network. After you have changed the IP address, you can use TELNET or Device Manager to access and manage your switch. Note: The Passport 1600 Series switch requires names when you create or edit VLANs or IP addresses. The VLAN name can be up to 32 characters in length and is case-sensitive. For this configuration, you will not create a new VLAN or IP address; you will simply change the settings for the default VLAN, named default, and the default IP address, named System. This example shows you how to create the default VLAN, as follows: • • • Configure the default VLAN to use port 1 only. Change the System IP address to 10.1.1.10/24. Create a default gateway with an address 10.1.1.1. Figure 262 illustrates this configuration example. 316862-A Rev 00 Chapter 17 CLI configuration examples 413 Figure 262 Configuration example — configuring the default VLAN for access Passport 1648T Default gateway 10.1.1.1 Port 1 Management IP 10.1.1.10/24 10825EL To perform this configuration, you connect your PC or terminal to the console port on the switch using the 9-pin serial connector, and you set your terminal to 9600 bps 8/N/1. Configuration example — configuring the default VLAN This section describes how to configure the default VLAN for this example. For more information about the commands used in this section, see Chapter 1, “Setting up the switch,” and Chapter 6, “Configuring VLANs.” 1 Log on to the switch by entering the following commands: Login: rwa Password: rwa (rwa appears as ***) 2 View the default privileges by entering the following command: PP1648T:4# show account Command: show account Current Accounts: Username --------------rwa 3 Access Level -----------Admin View the VLAN configuration by entering the following command: PP1648T:4# show vlan Command: show vlan Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 414 Chapter 17 CLI configuration examples VID VLAN TYPE Member ports Static ports Untagged ports : : : : : 1 static 1-52 1-52 1-52 VLAN Name : default Note that all ports are under the default VLAN. 4 Remove all ports from the default VLAN, except port 1, by entering the following command: PP1648T:4# config vlan default delete 2-52 5 Change the default System IP address to 10.1.1.10/24 by entering the following command: PP1648T:4# config ipif System ipaddress 10.1.1.10/24 vlan default state enable 6 Add a default gateway address with an address of 10.1.1.1: PP1648T:4# create iproute default 10.1.1.1 7 Save the configuration by entering the following command: PP1648T:4# save Viewing the VLAN and IP addresses To view the VLAN and IP addresses that you have just configured, use the following procedures: 1 View the VLAN using the following command: PP1648T:4# show vlan Command: show vlan VID VLAN TYPE Member ports Static ports Untagged ports : : : : : 1 static 1 1 1 VLAN Name Total Entries : 1 2 316862-A Rev 00 View the IP addresses used using the following command: : default Chapter 17 CLI configuration examples 415 PP1648T:4# show ipif Command: show ipif IP Interface Settings Interface Name IP Address Subnet Mask VLAN Name Admin. State Link Status Member Ports : : : : : : : System 10.1.1.1 (MANUAL) 255.255.255.0 default Enabled Link UP 1 Total Entries : 1 PP1648T:4# Downloading firmware and uploading configuration files To download firmware, enter the following command: PP1648T:4# download firmware <ipaddr> <path_filename 64> where: ipaddr is the IP address of the remote TFTP server. path_filename 64 is the DOS path and filename of the firmware file on the remote TFTP server. The path filename can be up to 64 characters. To upload a configuration file, enter the following command: PP1648T:4# upload config <ipaddr> <path_filename 64> where: ipaddr is the IP address of the remote TFTP server. path_filename 64 is the DOS path and filename of a file on the remote TFTP server that will receive the configuration file from the switch. The path filename can be up to 64 characters. For more information about the commands used in this section, see Chapter 2, “Managing switch operations.” Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 416 Chapter 17 CLI configuration examples Creating new port-based VLANS For this example, you create two new VLANs, as follows: • • • Create a port-based VLAN with a PVID of 10 that uses ports 10-12 Create a port-based VLAN with a PVID of 12 that uses ports 13-14 Add a tagged uplink port for both VLAN 10 and VLAN 12 that uses port 49 Figure 263 illustrates this configuration example. Figure 263 Configuration example -— creating a new port-based VLAN VLAN 10 Passport 8600 Passport 1648T Tagged VLAN 12 VLAN 10 and 12 10825EB Configuration example — creating port-based VLANs This section describes how to configure the Passport 1600 Series switch for this example. For more information about the commands used in this section, see Chapter 6, “Configuring VLANs.” 1 Add VLAN 10: a The following command creates VLAN 10: PP1648T:4# create vlan vlan_10 vid 10 b The following command adds untagged ports 10, 11, and 12 to VLAN 10: PP1648T:4# config vlan vlan_10 add untagged 10-12 c The following command adds tagged port 49 to VLAN 10: PP1648T:4# config vlan vlan_10 add tagged 49 2 Add VLAN 12: a The following command creates VLAN 12: PP1648T:4# create vlan vlan_12 vid 12 316862-A Rev 00 Chapter 17 CLI configuration examples b 417 The following command adds untagged ports 13 and 14 to VLAN 10: PP1648T:4# config vlan vlan_12 add untagged 13-14 c The following command adds tagged port 49 to VLAN 12: PP1648T:4# config vlan vlan_12 add tagged 49 Viewing VLANs To view the VLANs that you have just configured, use the following command PP1648T:4# show vlan Command: show vlan VID VLAN TYPE Member ports Static ports Untagged ports : : : : : 1 static 1 1 1 VLAN Name : default VID VLAN TYPE Member ports Static ports Untagged ports : : : : : 10 static 10-12, 49 10-12, 49 10-12 VLAN Name : vlan_10 VID VLAN TYPE Member ports Static ports Untagged ports : : : : : 12 static 13-14, 49 13-14, 49 13-14 VLAN Name : vlan_12 Total Entries : 3 Viewing the forwarding database To view the forwarding database, use the following command: PP1648T:4# show fdb {port <port>| vlan <vlan_name 32>|mac_accress <macaddr>|static|aging_time} Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 418 Chapter 17 CLI configuration examples where: port specifies port number. vlan_name_32 specifies a VLAN. macaddr is a multicast MAC address. Example: PP1648T:4# show fdb Command: show fdb Unicast MAC Address Aging Time VID ---1 1 1 1 1 1 1 2 2 2 3 3 3 3 3 VLAN Name ---------------default default default default default default default vlan_2 vlan_2 vlan_2 vlan_3 vlan_3 vlan_3 vlan_3 vlan_3 Total Entries: 15 316862-A Rev 00 = 300 MAC Address ----------------00-03-4B-D8-7E-E1 00-09-97-E3-40-01 00-60-F3-20-59-4B 00-80-2D-AF-CE-0F 00-E0-4C-88-AE-67 01-00-5E-00-00-04 FF-FF-FF-FF-FF-FF 00-09-97-E3-40-02 01-00-5E-00-00-04 FF-FF-FF-FF-FF-FF 00-09-97-E3-40-03 00-E0-7B-82-9C-60 00-E0-7B-82-9E-0C 01-00-5E-00-00-04 FF-FF-FF-FF-FF-FF Type --------Dynamic Self Dynamic Dynamic Dynamic Multicast Self Self Multicast Self Self Dynamic Dynamic Multicast Self Port --------------1 CPU 1 1 1 CPU CPU CPU CPU 49 49 CPU Chapter 17 CLI configuration examples 419 Disabling Spanning Tree The Passport 1600 Series switch currently supports one instance of Spanning Tree. You can disable Spanning Tree for a specific port or globally. For more information about the commands used in this section, see Chapter 4, “Configuring Spanning Tree.” Configuration example — disabling Spanning Tree To disable Spanning globally, use the following command: PP1648T:4# disable stp Command: disable stp Success. To disable Spanning Tree for a specific port, use the following command. In this example, you disable Spanning Tree for port 12. PP1648T:4# config stp ports 12 state disabled Command: config stp ports 12 state disabled Success. Viewing Spanning Tree status To view the status of Spanning Tree, use the following commands: PP1648T:4# show stp Command: show stp STP Status Max Age Hello Time Forward Delay Priority Forwarding BPDU : : : : : : Disabled 20 2 15 32768 Enabled PP1648T:4# show stp ports Command: show stp ports Port ---- Connection State Cost Priority Status ------------------------ ---- -------- STP Name ---------- ------ Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 420 Chapter 17 CLI configuration examples 1 2 3 4 5 6 7 8 9 10 11 12 100M/Full/None Link Down Link Down Link Down Link Down Link Down Link Down Link Down Link Down Link Down Link Down 100M/Half/None Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Disabled *19 *19 *19 *19 *19 *19 *19 *19 *19 *19 *19 *19 128 128 128 128 128 128 128 128 128 128 128 128 Forwarding Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Forwarding s0 s0 s0 s0 s0 s0 s0 s0 s0 s0 s0 s0 Configuring link aggregation groups The Passport 1600 supports up to seven multilink trunking (MLT) groups with up to four ports per group. Each MLT group has a flooding port. You use the flooding port to flood packets with unknown MAC destinations. For this example, you create MLT group 1 with ports 1/27 and 1/28. Figure 264 illustrates this configuration example. Figure 264 Configuration example — creating MLT group with ports 27 and 28 Passport 1648T Passport 8600 27 28 10825EV 316862-A Rev 00 Chapter 17 CLI configuration examples 421 Configuration example — configuring link aggregation groups This section describes how to configure the Passport 1600 Series switch for this example. For more information about the commands used in this section, see Chapter 7, “Configuring link aggregation groups.” 1 Create MLT group 1: PP1648T:4#: create link_aggregation group_id 1 2 Add the MLT port to MLT group 1: PP1648T:4#: config link_aggregation group_id 1 master_port 27 ports 27-28 state enabled 3 View the MLT configuration: PP1648T:4#: show link_aggregation Enabling OSPF For this example, you create two new VLANs, as follows: • • • • • Create VLAN 2 using untagged port 12 and add IP address 10.50.1.1/24. Create VLAN 3 using untagged port 49 and add IP address 10.1.1.66/30. Enable OSPF area 0 for both VLAN 2 and VLAN 3. Add an OSPF router ID of 10.50.1.1. Set the router priority so that the Passport 1648T never becomes the Designated Router. Figure 265 illustrates this configuration example. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 422 Chapter 17 CLI configuration examples Figure 265 Configuration example — enabling OSPF in the default area 0 Passport 1648T VLAN 2 10.50.1.0/24 .1 VLAN 3 10.1.1.68/30 .69 OSPF Area 0 .70 10825EF Configuration example — enabling OSPF globally This section describes how to configure the Passport 1600 Series switch for this example. For more information about the commands used in this section, see Chapter 10, “Configuring ARP, RIP, and OSPF.” 1 Enable OSPF globally, using the following command: PP1648T:4#: enable ospf 2 Add VLAN 2: The following command creates VLAN 2 with a VLAN name of vlan_2: PP1648T:4# create vlan vlan_2 vid 2 3 Add untagged ports to VLAN 2: The following command adds untagged port 12 to VLAN 2: PP1648T:4# config vlan vlan_2 add untagged 12 4 Add IP address to VLAN 2: The following command creates an IP interface with the name ip_2 and adds it to VLAN 2: PP1648T:4# create ipif ip_2 10.50.1.1/25 vlan_2 state enabled 5 Enable OSPF on VLAN 2, using the following command: PP1648T:4# config ospf ipif ip_2 state enabled 6 Add VLAN 3: a 316862-A Rev 00 The following command creates VLAN 3 with a VLAN name of vlan_3: Chapter 17 CLI configuration examples 423 PP1648T:4# create vlan vlan_3 vid 3 b The following command adds untagged port 49 to VLAN 3: PP1648T:4# config vlan vlan_3 add untagged 49 7 Add IP address to VLAN 3: The following command creates an IP interface with the name ip_3 and adds it to VLAN 3: PP1648T:4# create ipif ip_3 10.1.1.69/30 vlan_3 state enabled 8 Enable OSPF on VLAN 3: PP1648T:4# config ospf ipif ip_3 state enabled 9 Add OSPF router ID 10.50.1.1: PP1648T:4# config ospf router_id 10.50.1.1 10 Configure OSPF router priority to 0 for IP interface ip_2 and ip_3: PP1648T:4# config ospf ipif ip_2 area 0.0.0.0 priority 0 PP1648T:4# config ospf ipif ip_3 area 0.0.0.0 priority 0 11 Save the configuration: PP1648T:4# save 12 Use the following show commands: PP1648T:4# show ospf PP1648T:4# show ospf lsdb PP1648T:4# show ospf ipif <ipif name> PP1648T:4# show ospf area PP1648T:4# show ospf neighbor PP1648T:4# show ospf aggregation PP1648T:4# show ospf host_route PP1648T:4# show ospf virtual_link PP1648T:4# show ospf virtual_neighbor PP1648T:4# show ospf all Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 424 Chapter 17 CLI configuration examples PP1648T:4# show iproute PP1648T:4# show ipif PP1648T:4# show arpentry PP1648T:4# ping <ip address> PP1648T:4# traceroute <ip address> PP1648T:4# traceroute <ip address> {ttl <value 1-60>|port <value 30000-64900>|timeout <sec 1-65535>|probe <value 1-9>} Viewing OSPF status and routes To view OSPF status and routes, use the following command: PP1648T:4# show ospf Command: show ospf OSPF Router ID : 10.50.1.1 State : Enabled OSPF Interface Settings Interface IP Address Area ID State Link Status ------------ ------------------ --------------- -------- --------ip_3 10.1.1.69/30 0.0.0.0 Enabled Link Up ip_2 10.50.1.1/24 0.0.0.0 Enabled Link Up System 10.1.1.10/24 0.0.0.0 Disabled Link Up Metric --------1 1 1 Total Entries : 3 OSPF Area Settings Area ID Type Stub Import Summary LSA Stub Default Cost --------------- ------ ----------------------- ----------------0.0.0.0 Normal None None Total Entries : 1 Virtual Interface Configuration Transit 316862-A Rev 00 Virtual Hello Dead Authentication Link Chapter 17 CLI configuration examples 425 Area ID Neighbor Router Interval Interval Status --------------- --------------- -------- -------- -------------- -----Total Entries : 0 OSPF Area Aggregation Settings Area ID Aggregated LSDB Advertise Network Address Type --------------- ------------------ -------- --------Total Entries : 0 OSPF Host Route Settings Host Address Metric Area ID TOS --------------- ------ --------------- --Total Entries : 0 Viewing OSPF neighbor status To view OSPF neighbor status, use the following command: PP1648T:4# show ospf neighbor Command: show ospf neighbor IP Address of Neighbor --------------10.1.1.70 Router ID of Neighbor --------------1.1.1.3 Neighbor Priority -------1 Neighbor State ------------Full Total Entries: 1 Viewing OSPF LSDB To view the OSPF link state database, use the following command: PP1648T:4# show ospf lsdb Command: show ospf lsdb Area LSDB Advertising Link State Cost Sequence ID Type Router ID ID Number --------------- --------- --------------- ------------------ -------- ---------- Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 426 Chapter 17 CLI configuration examples 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 RTRLink RTRLink RTRLink RTRLink RTRLink RTRLink RTRLink RTRLink NETLink NETLink NETLink NETLink NETLink NETLink NETLink ASExtLink ASExtLink 1.1.1.1 1.1.1.2 1.1.1.3 1.1.1.4 1.1.1.10 1.1.1.55 10.50.1.1 47.133.59.49 1.1.1.3 1.1.1.4 1.1.1.4 1.1.1.3 1.1.1.3 1.1.1.1 1.1.1.4 1.1.1.1 1.1.1.3 1.1.1.1 1.1.1.2 1.1.1.3 1.1.1.4 1.1.1.10 1.1.1.55 10.50.1.1 47.133.59.49 10.1.1.2/30 10.1.1.6/30 10.1.1.10/30 10.1.1.14/30 10.1.1.70/30 10.20.1.1/24 90.1.1.1/24 0.0.0.0 1.1.1.1/32 * * * * * * * * * * * * * * * 100 60000 0x800005DE 0x80000593 0x80000404 0x800005CC 0x80000521 0x800002A5 0x80000008 0x80000002 0x80000397 0x800004E9 0x80000214 0x80000244 0x80000002 0x8000029D 0x80000128 0x80000368 0x800003D5 Total Entries: 16 Viewing the Passport 1600 Series switch route table To view the switch route table, use the following command: PP1648T:4# show iproute Command: show iproute Routing Table IP Address/Netmask -----------------0.0.0.0 1.1.1.1/32 1.1.1.2/32 1.1.1.3/32 1.1.1.4/32 1.1.1.10/32 1.1.1.55/32 10.1.1.0/30 10.1.1.4/30 10.1.1.8/30 10.1.1.12/30 10.1.1.68/30 316862-A Rev 00 Gateway --------------47.133.59.1 10.1.1.70 10.1.1.70 10.1.1.70 10.1.1.70 10.1.1.70 10.1.1.70 10.1.1.70 10.1.1.70 10.1.1.70 10.1.1.70 0.0.0.0 Interface -----------System ip_3 ip_3 ip_3 ip_3 ip_3 ip_3 ip_3 ip_3 ip_3 ip_3 ip_3 Hops -------1 12 12 11 13 14 13 2 3 3 2 1 Protocol -------Default OSPF OSPF OSPF OSPF OSPF OSPF OSPF OSPF OSPF OSPF Local Chapter 17 CLI configuration examples 10.1.1.72/30 10.1.5.0/24 10.1.20.0/24 10.1.30.0/24 10.1.60.0/24 10.5.1.0/24 10.20.1.0/24 10.50.1.0/24 47.133.59.0/24 90.1.1.0/24 10.1.1.70 10.1.1.70 10.1.1.70 10.1.1.70 10.1.1.70 10.1.1.70 10.1.1.70 0.0.0.0 0.0.0.0 10.1.1.70 ip_3 ip_3 ip_3 ip_3 ip_3 ip_3 ip_3 ip_2 System ip_3 4 12 12 11 12 11 12 1 1 13 427 OSPF OSPF OSPF OSPF OSPF OSPF OSPF Local Local OSPF Total Entries : 22 Configuring OSPF MD5 authentication The Passport 1600 implementation of OSPF includes security mechanisms to prevent the OSPF routing domain from being attacked by unauthorized routers. This prevents someone from joining an OSPF domain and advertising false information in its OSPF LSAs. Likewise, it prevents a misconfigured router from joining an OSPF domain. The Passport 1600 Series switch supports both Simple and MD5 mechanisms. The Simple Password is a text password mechanism, only routers that contain the same authentication id in their LSA headers can communicate with each other. MD5 is the preferred method of OSPF security as it provides standards based (RFC 1321) authentication using 128-bit encryption. For this example, you enable MD5 authentication for the Passport 8600 using an MD5 key of passport1234. Figure 266 illustrates this configuration example. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 428 Chapter 17 CLI configuration examples Figure 266 Configuration example — MD5 authentication Passport 8600 Passport 1648T ipif = ip_3 Configure MD5 key with 'passport 1234' 10825EG Configuration example — creating an MD5 key This section describes how to configure the Passport 1600 Series switch for this example. For more information about the commands used in this section, see Chapter 10, “Configuring ARP, RIP, and OSPF.” 1 Create the MD5 key for the Passport 8600: PP1648T:4# create md5 key 1 PP8600 2 Assign the password passport1234 to the MD5 key: PP1648T:4# config md5 key 1 passport1234 3 Add the MD5 key to the appropriate OSPF interface: PP1648T:4# config ospf ipif ip_3 authentication md5 1 4 View the MD5 configuration: PP1648T:4# show md5 Configuring an OSPF stub area A stub area does not receive advertisements for external routes (AS-external LSAs, type 5) from an Area Border Router, which reduces the size of the link state database. Instead, routing to external destinations from within a stub area is based simply on the default route originated by a stub area border router. A stub area has only one area border router. Any packets destined outside the area are simply routed to that area border exit point where the packets are examined by the area border router and forwarded to a destination. ASBR’s cannot be supported within a stub area. Without AS-external LSA’s, stub area’s cannot support virtual links. 316862-A Rev 00 Chapter 17 CLI configuration examples 429 For this example, you create a stub area and two new VLANs, as follows: • • • • • • Create a stub area with an area ID of 0.0.0.2. Create VLAN 2 using untagged port 12. Add stub area to VLAN 2 Create VLAN 3 using untagged port 49. Enable OSPF on VLAN 3 Add OSPF router ID 10.50.1.1 Figure 267 illustrates this configuration example. Figure 267 Configuration example — OSPF stub area Passport 1648T VLAN 2 10.50.1.1/24 Passport 8600 VLAN 3 10.1.1.68/30 .69 Stub Area 2 .70 Area 0 10825EH Configuration example — configuring a stub area This section describes how to configure the Passport 1600 Series switch for this example. For more information about the commands used in this section, see Chapter 6, “Configuring VLANs” and Chapter 10, “Configuring ARP, RIP, and OSPF.” 1 Enable OSPF globally: PP1648T:4# enable ospf 2 Create a stub area with an area ID of 0.0.0.2: PP1648T:4# create ospf area 0.0.0.2 type stub 3 Add VLAN 2: a The following command creates VLAN 2 with a VLAN name of vlan_2: Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 430 Chapter 17 CLI configuration examples PP1648T:4# create vlan vlan_2 vid 2 b The following command adds untagged port 12 to VLAN 2: PP1648T:4# config vlan vlan_2 add untagged 12 c The following command creates an IP interface with the name ip_2 and adds it to VLAN 2: PP1648T:4# create ipif ip_2 10.50.1.1/24 vlan_2 state enabled 4 Add OSPF stub area 2 to VLAN 2: PP1648T:4# config ospf ipif ip_2 area 0.0.0.2 state enable 5 Add VLAN 3: a The following command creates VLAN 3 with a VLAN name of vlan_3: PP1648T:4# create vlan vlan_3 vid 3 b The following command adds untagged port 49 to VLAN 3: PP1648T:4# config vlan vlan_3 add untagged 49 c The following command creates an IP interface with the name ip_3 and adds it to VLAN 3: PP1648T:4# create ipif ip_3 10.1.1.69/30 vlan_3 state enabled 6 Enable OSPF on VLAN 3: PP1648T:4# config ospf ipif ip_3 area 0.0.0.2 state enable 7 Add an OSPF router ID of 10.50.1.1: PP1648T:4# config ospf router_id 10.50.1.1 8 Save the configuration: PP1648T:4# save Configuring OSPF route distribution For this example, you configure the Passport 1600 switch to redistribute: 316862-A Rev 00 Chapter 17 CLI configuration examples • • • 431 OSPF routes to RIP RIP to OSPF using External Type 1 metrics Local interfaces to OSPF using External Type 1 metrics Figure 268 illustrates this configuration example. Figure 268 Configuration example — OSPF route distribution Passport 1648T Router VLAN 4 10.1.1.76/30 .78 VLAN 3 10.1.1.68/30 .69 .77 OSPF Area 0 .70 OSPF ASBR RIP 10825EI Configuration example — configuring OSPF route distribution This section describes how to configure the Passport 1600 Series switch for this example. For more information about the commands used in this section, see Chapter 6, “Configuring VLANs,” Chapter 10, “Configuring ARP, RIP, and OSPF,” and Chapter 11, “Configuring IP routes and route redistribution.” 1 Enable OSPF globally: PP1648T:4# enable ospf 2 Add VLAN 3: a The following command creates VLAN 3 with a VLAN name of vlan_3: PP1648T:4# create vlan vlan_3 vid 3 b The following command adds untagged port 49 to VLAN 3: PP1648T:4# config vlan vlan_3 add untagged 49 c The following command creates an IP interface with the name ip_3 and adds it to VLAN 3: PP1648T:4# create ipif ip_3 10.1.1.69/30 vlan_3 state enabled Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 432 Chapter 17 CLI configuration examples 3 Enable OSPF on VLAN 3: PP1648T:4# config ospf ipif ip_3 area 0.0.0.2 state enable 4 Add an OSPF router ID of 10.1.1.69: PP1648T:4# config ospf router_id 10.1.1.69 5 Configure an OSPF router priority to 0 for IP interface ip_3: PP1648T:4# config ospf ipif ip_3 area 0.0.0.0 priority 0 6 Add VLAN 4: a The following command creates VLAN 4 with a VLAN name of vlan_4: PP1648T:4# create vlan vlan_4 vid 4 b The following command adds untagged port 12 to VLAN 4: PP1648T:4# config vlan vlan_4 add untagged 12 c The following command creates an IP interface with the name ip_4 and adds it to VLAN 4: PP1648T:4# create ipif ip_4 10.1.1.77/30 vlan_4 state enabled 7 Add RIP to VLAN 4: PP1648T:4# config rip ipif ip_4 state enabled 8 Configure VLAN 4 to operate in RIP version 2 only: PP1648T:4# config rip ipif ip_4 tx_mode v2_only rx_mode v2_only 9 Enable RIP: PP1648T:4# enable rip 10 Configure route redistribution from OSPF to RIP: PP1648T:4# create route redistribute dst rip src ospf all 11 Configure route redistribution to redistribute RIP routes to OSPF using a metric value of Type-1: PP1648T:4# create route redistribute dst ospf src rip mettype 1 316862-A Rev 00 Chapter 17 CLI configuration examples 433 12 Configure route redistribution to redistribute the Passport 100 local interfaces to OSPF using a metric value of Type-1: PP1648T:4# create route redistribute dst ospf src local mettype 1 13 Save the configuration: PP1648T:4# save Configuring RIP base For this example, you create two VLANs, as follows: • • • Create VLAN 2 using untagged port 12 Create VLAN 3 using untagged GigE port 49 Enable RIP for both VLAN 2 and VLAN 3 Figure 269 illustrates this configuration example. Figure 269 Configuration example — RIP base Passport 1648T VLAN 2 VLAN 3 10.1.1.68/30 10.50.1.0/24 .1 .69 RIP .70 10825EJ Configuration example — configuring RIP base This section describes how to configure the Passport 1600 Series switch for this example. For more information about the commands used in this section, see Chapter 6, “Configuring VLANs” and Chapter 10, “Configuring ARP, RIP, and OSPF.” Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 434 Chapter 17 CLI configuration examples 1 Enable RIP globally: PP1648T:4# enable rip 2 Add VLAN 3: a The following command creates VLAN 3 with a VLAN name of vlan_3: PP1648T:4# create vlan vlan_3 vid 3 b The following command adds untagged port 49 to VLAN 3: PP1648T:4# config vlan vlan_3 add untagged 49 c The following command creates an IP interface with the name ip_3 and adds it to VLAN 3: PP1648T:4# create ipif ip_3 10.1.1.69/30 vlan_3 state enabled 3 Enable RIP on VLAN 3: PP1648T:4# config rip ipif ip_3 state enable 4 Add VLAN 2: a The following command creates VLAN 2 with a VLAN name of vlan_2: PP1648T:4# create vlan vlan_2 vid 2 b The following command adds untagged ports 12, 13, and 14 to VLAN 2: PP1648T:4# config vlan vlan_2 add untagged 12-14 c The following command creates an IP interface with the name ip_2 and address 10.50.1.1/24 and adds it to VLAN 2: PP1648T:4# create ipif ip_2 10.50.1.1/24 vlan_2 state enabled 5 Enable RIP on VLAN 2: PP1648T:4# config rip ipif ip_2 state enable 6 Save the configuration: PP1648T:4# save 7 Use the following show commands PP1648T:4# show rip PP1648T:4# show rip ipif <ipif name> PP1648T:4# show iproute 316862-A Rev 00 Chapter 17 CLI configuration examples 435 PP1648T:4# show ipif PP1648T:4# show arpentry PP1648T:4# ping <ip address> PP1648T:4# traceroute <ip address> PP1648T:4# traceroute <ip address> {ttl <value 1-60>|port <value 30000-64900>|timeout <sec 1-65535>|probe <value 1-9>} Selecting Tx and Rx RIP v2 mode By default, the Passport 1600 Series switch uses RIP v1_compatible transmit mode and RIP v1_and_v2 receive mode. This allows the Passport 8600 to operate in both RIP modes of operation. The Passport 1600 supports four transmit modes: • • • • Disabled – indicates that no RIP updates are sent on this interface V1_only – specifies only RIP v1 packets updates V2_only – specifies only RIP v2 packets updates V1_compatible – specifies only broadcast RIP v2 updates The Passport 1600 supports four receive modes: • • • • Disabled - prevents the reception of RIP packets V1_only – specifies that only RIP v1 packets will be accepted V2_only – specifies that only RIP v2 packets will be accepted V1_and_v2 – specifies that both RIP v1 and v2 packets will be accepted Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 436 Chapter 17 CLI configuration examples Configuration example — configuring RIP TX and RX mode to v2 To configure the RIP transmit and receive mode to version 2, use the following command: PP1648T:4# config rip ipif ip_4 tx_mode v2_only rx_mode v2_only state enabled For more information about this command, see Chapter 10, “Configuring ARP, RIP, and OSPF.” Configuring broadcast and multicast storm control You can configure the Passport 1600 Series switch to limit the amount of broadcast or multicast traffic received on a port. The threshold is expressed as a percentage from 10 to 100 percent. For more information about the commands used in this section, see Chapter 9, “Configuring traffic filters.” Configuration example — enabling thresholds To enable broadcast threshold, use the following command: PP1648T:4# config traffic control <port number> broadcast enabled threshold <percentage 10-100> To enable multicast threshold, use the following command: PP1648T:4# config traffic control <port number> multicast enabled threshold <percentage 10-100> 316862-A Rev 00 Chapter 17 CLI configuration examples 437 Displaying thresholds To display the configured thresholds, use the following show commands: PP1648T:4# show traffic control PP1648T:4# show traffic control ports <port list> Configuring egress queue weight The Passport 1600 Series switch contains 4 hardware priority queues. Three of these queues use Deficit Weighted Round Robin, while the fourth uses Strict Priority. Incoming packets are be mapped to one of these four queues. By default, the weight is assigned evenly for all the Deficit Weighted Round Robin ports. To view the queues, use the following command: PP1648T:4# show scheduling Command: show scheduling Port Scheduling Table: Port Traffic Class 0 ------ --------------1 WRR Sched 6 2 WRR Sched 6 3 WRR Sched 6 4 WRR Sched 6 5 WRR Sched 6 6 WRR Sched 6 Traffic Class 1 --------------WRR Sched 6 WRR Sched 6 WRR Sched 6 WRR Sched 6 WRR Sched 6 WRR Sched 6 Traffic Class 2 --------------WRR Sched 6 WRR Sched 6 WRR Sched 6 WRR Sched 6 WRR Sched 6 WRR Sched 6 Traffic Class 3 --------------Strict Priority Strict Priority Strict Priority Strict Priority Strict Priority Strict Priority The output from the show scheduling command shows that the weight assigned to Traffic Class 0 to 2, inclusive, are all configured to the same value of 6. You can change this value, using a range from 0 to 255. This value specifies the maximum number of packets a given hardware priority queue can transmit before allowing the next lowest hardware priority queue to begin transmitting its packet. For example, if you specify 3, then the highest hardware priority queue (number 3) is allowed to transmit 3 packets; the next lowest hardware priority queue (number 2) is allowed to transmit 3 packets, and so on, until all of the queues have transmitted 3 packets. The process then repeats. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 438 Chapter 17 CLI configuration examples For this example, you prioritize traffic on egress port 39, as shown below: 802.1p value Default PP1600 priority queue Configured queue weight desired 5,6 2 65% 3,4 1 25% 0,1,2 0 10% Figure 270 Configuration example — egress queue weight Passport 1648T 802.1p = 2 802.1p = 3 802.1p = 5 Port 39 (egress) ingress 10825EC Configuration example — configuring port scheduling This section shows how to configure the Passport 1600 Series switch for this example. For more information about the following commands, see Chapter 8, “Configuring QoS.” PP1648T:4# config scheduling ports 39 class_id 0 max_packet 25 PP1648T:4# config scheduling ports 39 class_id 1 max_packet 65 PP1648T:4# config scheduling ports 39 class_id 2 max_packet 165 Configuring QoS and IP filtering To configure filters on the Passport 1600, you perform the following steps: 1 Configure the template mode 2 Configure the flow classifiers 3 Configure the template rule 316862-A Rev 00 Chapter 17 CLI configuration examples 4 439 Add the template rule to a VLAN For more information about the commands used in the following sections, see Chapter 8, “Configuring QoS.” Step 1: Configuring the template mode The Passport 1600 supports two base templates that can be programmed in one of three modes: • • • Security - when a template operates in security mode, it acts like a source IP filter. Packets that match a rule are considered dangerous to network security and are unconditionally dropped. Qos - when a template operates in QoS mode, packets that match require some levels of bandwidth guarantee. l4-switch - when a template operates in l2_switch mode, you must further define the combination fields of the packet header (IP and L4 header) to be examined. To configure Template 1: PP1648T:4# config flow_classifier template_1 mode <security qos l4_switch> To configure Template 2: PP1648T:4# config flow_classifier template_2 mode <security qos l4_switch> Step 2: Configuring the flow classifiers The following sections describe how to configure the L4_switch and the QoS flow classifiers. Configuring the L4_switch flow classifier By default, the L4_switch classifier is used for Template 1. When configuring the L4_switch template mode, there are thee types of sessions available, with various fields available under each session. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 440 Chapter 17 CLI configuration examples • • • TCP Session UDP Session Other Session The following displays the various fields available for each session: • • • Tcp_session field options — dip – checks destination IP address must be checked or not — sip – checks source IP address must be checked or not — tos – checks IP ToS field must be checked or not — dst_port – checks destination TCP port number must be checked or not — src_port – checks source TCP port number must be checked or not — tcp_flags – checks TCP flags must be checked or not Udp_session field options — dip – checks destination IP address must be checked or not — dip – checks source IP address must be checked or not — tos – checks IP ToS field must be checked or not — dst_port – checks destination UDP port number must be checked or not — src_port – checks sourceUDP port number must be checked or not Other_session field options — dip – checks destination IP address must be checked or not — sip – checks source IP address must be checked or not — tos – checks IP ToS field must be checked or not — l4_protocol – checks Checks L4 protocol must be checked or not — icmp_msg – checks ICMP message must be checked or not — igmp_type – checks whether the IGMP type must be checked or not Configuration examples — configuring the L4_switch classifier To configure TCP session fields, use the following command: PP1648T:4# config flow_classifier template_id 1 mode_parameters l4_session tcp_session fields {dip|sip|tos|dst_port|src_port|tcp_flags} 316862-A Rev 00 Chapter 17 CLI configuration examples 441 For example, if you want the switch to search for the TCP destination port and destination IP address only in an incoming packet’s TCP header, enter the following command: PP1648T:4# config flow_classifier template_id 1 mode_parameters l4_session tcp_session fields dip dst_port To configure UDP session fields, use the following command: PP1648T:4# config flow_classifier template_id 1 mode_parameters l4_session udp_session fields {dip|sip|tos|dst_port|src_port|tcp_flags} To configure Other session fields, use the following command: PP1648T:4# config flow_classifier template_id 1 mode_parameters l4_session other_session fields {dip|sip|tos|l4_protocol|icmp_msg|igmp_type} To configure all optional settings, enter the following command: PP1648T:4# config flow_classifier template_id 1 mode_parameters l4_session tcp_session fields dip sip tos dst_port src_port tcp_flags udp_session fields dip sip tos dst_port src_port other_session fields dip sip tos l4_protocol icmp_msg igmp_type Configuring the QoS flow classifier By default, the QoS classifier is used for Template 2. The following list defines what characteristics an incoming packet must meet: • • • • • 802.1p DSCP IP TCP UDP Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 442 Chapter 17 CLI configuration examples Configuration example — configuring the QoS flow classifier To configure the QoS flow classifier, enter the following command: PP1648T:4# config flow_classifier template_id 2 mode_parameters qos_flavor <802.1p dscp dst_ip dst_tcp_port dst_udp_port> Step 3: Configuring the template rule Once the template and flow classifier has been configured, you need to configure a template rule. When configuring the template rule, you need to define which template ID to use: L4_switch or QoS. The list of available options depends on how you configured the flow classifier. Configuration example — using the L4_switch template Depending on the flow classifier fields you selected (see page 440), enter all the appropriate files. The following command is an example using TCP session: PP1648T:4# create l4_switch_rule template_id <1-2> tcp_session fields sip <src IP address> tos <ToS value in hex> dst_port <dst TCP port number> src_port <src TCP port number> action {drop|forward|redirect} Configuration example — using the QoS template Depending on the flow classifier fields you selected (see page 442), enter all the appropriate files. The following command is an example using IP as the selected QoS flow classifier: PP1648T:4# create qos_rule template_id <1-2> dst_tcp_port <TCP Port Number> priority <1-7> 316862-A Rev 00 Chapter 17 CLI configuration examples 443 Step 4: Binding the template rule to a VLAN The final step is to bind the template rule or rules configured in the Step 3 to the appropriate VLAN or VLANs. Note: You can only bind one template ID to a VLAN. Configuration example — adding the template to a VLAN To add the template to the appropriate VLAN, enter the following command: PP1648T:4# config flow_classifier vlan <vlan_name> attach template_id <value 1-2> Once the filter has been defined, you can view the flow classifier configuration by entering the following command: PP1648T:4# show flow_classifier Setting QoS priority for destination TCP flows For this example, you prioritize traffic, based on the TCP destination port number, and apply the QoS priority to all the ingress VLANs. Prioritize the traffic, using the following numbers: • • • Destination TCP Port = 80 to QoS Level 0 Destination TCP Port = 23 to QoS Level 3 Destination TCP Port = 21 to QoS Level 5 Figure 271 illustrates this configuration example. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 444 Chapter 17 CLI configuration examples Figure 271 Configuration example — setting QoS priority Passport 1648T VLAN 10, 192.85.10.1/24 VLAN 11, 192.85.11.1/24 VLAN 12, 192.85.11.1/24 Port 39 VLAN 13, 192.85.13.1/24 (egress) ingress 10825ED Configuration example — setting QoS Priority for destination TCP flows This section describes how to configure the Passport 1600 Series switch for this example. For more information about the commands used in this section, see Chapter 8, “Configuring QoS.” After you configure the appropriate VLAN and IP addresses, create the IP template. By default, the template mode for QoS is already enabled using ID = 2. If it is not, enter the following command: PP1648T:4# config flow_classifier template_2 mode qos To configure the QoS flow classifier, enter the following command: PP1648T:4# config flow_classifier template_id 2 mode_parameters qos_flavor dst_tcp_port To configure the QoS template rule, enter the following commands: PP1648T:4# create qos_rule template_id 2 dst_tcp_port 80 priority 0 PP1648T:4# create qos_rule template_id 2 dst_tcp_port 23 priority 3 PP1648T:4# create qos_rule template_id 2 dst_tcp_port 21 priority 5 316862-A Rev 00 Chapter 17 CLI configuration examples 445 To attach the newly created template rule to all the appropriate VLANs, enter the following commands: PP1648T:4# config flow_classifier vlan 10 attach template_id 2 PP1648T:4# config flow_classifier vlan 11 attach template_id 2 PP1648T:4# config flow_classifier vlan 12 attach template_id 2 Dropping TCP flows For this example, you drop both TELNET and FTP from egressing from VLAN 10 only. Figure 190 illustrates this configuration example. Figure 272 Configuration example — dropping TCP flows Passport 1648T VLAN 10, 192.85.10.1/24 VLAN 11, 192.85.11.1/24 VLAN 12, 192.85.11.1/24 Port 39 VLAN 13, 192.85.13.1/24 (egress) ingress 10825ED Configuration example — dropping TCP flows This section describes how to configure filtering for the Passport 1600 Series switch for this example, which assumes that you’ve already configured VLAN 10, VLAN 11, and VLAN 12. For more information about the commands used in this section, see Chapter 8, “Configuring QoS.” After you’ve configured the VLANs and IP addresses, you create the IP template. By default, the template mode for L4_switch is already enabled using ID = 1. If it has not already been enabled, enter the following command: PP1648T:4# config flow_classifier template_1 mode l4_switch Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 446 Chapter 17 CLI configuration examples To configure the L4_switch flow classifier, enter the following command: PP1648T:4# config flow_classifier template_id 1 mode_parameters l4_session tcp_session fields dst_port To configure the L4_switch template rule, enter the following commands: PP1648T:4# create l4_switch_rule template_id 1 tcp_session fields dst_port 21 action drop PP1648T:4# create l4_switch_rule template_id 1 tcp_session fields dst_port 23 action drop To attach the newly created template rule to the appropriate VLAN, enter the following command: PP1648T:4# config flow_classifier vlan 10 attach template_id 1 Viewing the template rule To view template rule, enter the following command: PP1648T:4# show template_rule template_id 1 Filtering MAC addresses The Passport 1600 Series switch can be configured to filter on specific MAC address on a per VLAN basis. For this example, you add a filter to drop MAC address of 00:00:00:00:00:0a from VLAN 10. Figure 273 illustrates this configuration example. 316862-A Rev 00 Chapter 17 CLI configuration examples 447 Figure 273 Configuration example — filtering MAC addresses Passport 1648T VLAN 10, 192.85.10.1/24 Port 39 VLAN 13, 192.85.13.1/24 (egress) ingress 10825EE Configuration example — filtering MAC addresses This section describes how to configure the Passport 1600 Series switch for this example. For more information about the commands used in this section see Chapter 9, “Configuring traffic filters.” To add the MAC filter, enter the following command: PP1648T:4# create fdbfilter vlan 10 mac_address 00-00-00-00-00-0A To delete the MAC filter, enter the following command: PP1648T:4# delete fdbfilter vlan 10 mac_address 00-00-00-00-00-0a Viewing the fdb filter To view the fdb filter, enter the following command: PP1648T:4# show fdbfilter Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 448 Chapter 17 CLI configuration examples Configuring forward-to-next-hop When you use the L4_switch template mode, one of the action items is redirect, which provides a forward-to-next-hop action. For this example, you perform the following tasks: • • • For all FTP traffic to host 192.4.4.3, use a next-hop of 10.1.1.74 to the Passport 8600B, instead of the shortest hop of 10.1.1.70 to the Passport 8600A. Use the shortest next-hop of 10.1.1.70 in case 10.1.1.74 should fail. Configure the Passport 1648T with an ACL to filter on destination IP = 192.4.4.3 and TCP port = 23, with a redirect (forward-to-next-hop) action to 10.1.1.74. Figure 274 illustrates this configuration example. Figure 274 Configuration example — forward-to-next-hop Passport 8600A Passport 1648T VLAN 10 .1 192.85.10.3/24 69 70 10.1.1.68/30 .73 192.4.4.3/24 10.1.1.72/30 .74 Passport 8600B 10825EW Configuration example — forward-next-hop This section describes how to configure the Passport 1600 Series switch for this example. For more information about the commands used in this section see Chapter 8, “Configuring QoS.” By default, the template mode for L4_switch is already enabled using ID = 1. If it is not, use the following command: PP1648T:4# config flow_classifier template_1 mode l4_switch 316862-A Rev 00 Chapter 17 CLI configuration examples 1 449 Configure the L4_switch flow classifier: PP1648T:4# config flow_classifier template_id 1 mode_parameters l4_session tcp_session fields dip dst_port 2 Configure the L4_switch template rule: PP1648T:4# create l4_switch_rule template_id 1 tcp_session fields dip 192.4.4.3 dst_port 21 action redirect 10.1.1.73 unreachable_next_hop forward 3 Attach the newly created template rule to all the appropriate VLANs: PP1648T:4# config flow_classifier vlan 10 attach template_id 1 4 Use the following show command to view the configuration: PP1648T:4# show flow_classifier Flow Template Table: Template ID: 1 Template Mode: L4_SWITCH TCP Session: DST_IP DST_Port DESTINATION_TCP_PORT Template ID: 2 Template Mode: QOS QoS Flavor: UDP Session: Other Session: Rule Number: 1 Attached Vlan: Rule Number: 0 Attached Vlan: 10 Filtering IP addresses You can configure the Passport 1600 Series switch to filter on specific destination IP addresses. Unlike MAC filtering, IP filtering is not associated with a VLAN or port; it is applied globally on the Passport 1600. For this example, you add an IP filter to block forwarding to IP address 10.1.1.10. Figure 275 illustrates this example. Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 450 Chapter 17 CLI configuration examples Figure 275 Configuration example — filtering IP addresses Passport 1648T VLAN 10, 192.85.10.1/24 Port 39 VLAN 13, 192.85.13.1/24 (egress) ingress 10825EE Configuration example — filtering IP addresses This section describes how to configure the Passport 1600 Series switch for this example. For more information about the commands used in this section see Chapter 9, “Configuring traffic filters.” To create a destination IP Filter, enter the following command: PP1648T:4# create ipfilter type dst ip_address 192.85.10.10 To delete the IP filter, enter the following command: PP1648T:4# delete ipfilter type dst ip_address 192.85.10.10 Viewing the IP filter To view the destination IP filter, enter the following command: PP1648T:4# show dst_ipfilter Dropping fragmented IP packets The Passport 1600 Series switch has a Global parameter that enables you to allow or drop fragmented IP packets. Unless the IP Fragment field is 0x00 or 0x4000, all packets will be dropped by the Passport 1600. For more information about the commands used in this section see Chapter 9, “Configuring traffic filters.” 316862-A Rev 00 Chapter 17 CLI configuration examples 451 To enable the Passport 1600 to drop fragmented packets, enter the following command: PP1648T:4# enable ip_fragment_filter To display the status of the IP Fragment filter, enter the following command: PP1648T:4# show ip_fragment_filter Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 452 Chapter 17 CLI configuration examples 316862-A Rev 00 453 Index A adding ports to a VLAN 158 options 157, 159 assigning IP address ranges to VLANs 227 available commands prompt 43 B basic switch CLI commands, roadmap 46 binding a flow classifier template 196 C cable, serial 36 changing the switch serial port settings 57 options 58 CLI roadmap of basic switch CLI commands 46 roadmap of IGMP commands 354, 381 roadmap of IP address filter and interface CLI commands 228 roadmap of link aggregation CLI commands 180 roadmap of MAC address filter CLI commands 232, 236, 251 roadmap of MD5 CLI commands 290 roadmap of port configuration CLI commands 73, 87 roadmap of QoS CLI commands 186 roadmap of route redistribution CLI commands 300 roadmap of route table CLI commands 296 roadmap of storm control CLI commands 240 roadmap of STP CLI commands 80 roadmap of VLAN CLI commands 156, 163, 171 commands basic switch 45 config account 49 config flow classifier template_id mode options 192 config flow_classifier template_id mode_parameters 193 options 194 config flow_classifier template_id mode 192 config flow_classifier vlan 196 config ipif System options 166 config link_aggregation 182 options 182 config mirror port 395 config scheduling 220 options 221 config serial_port 57 options 58 config stp 80 options 81 config traffic control 241 options 241 config vlan add 158 options 157, 159 config vlan delete 159 configuring a range of router ports 361 options 361 configuring an IP interface 164 configuring IGMP 355 options 355 configuring IGMP snooping 358 options 359 configuring IGMP snooping querier 360 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 454 Index options 360 configuring ports 74, 93, 131, 133, 135, 136, 137, 139, 140, 142, 143, 144, 145, 146, 147, 148, 149, 150, 152, 153 options 75, 77, 130, 131, 132, 133, 135, 136, 138, 139, 140, 142, 143, 144, 145, 146, 147, 148, 149, 151, 152, 153, 154 configuring route redistribution between OSPF and RIP 307 between OSPF and RIP, options 307 between RIP and OSPF 305 between RIP and OSPF, options 306 create fdbfilter 215, 233, 237, 238, 239, 251, 252, 253 options 215, 233, 237, 238, 239, 251, 252, 253 create ipfilter 197, 201, 228 options 198, 202, 229 create ipif 163 create l4_switch_rule options 211 create link_aggregation 180 options 181 create mac_priority 222 options 222 create qos_rule 206 options 207 create user account 47, 102, 106, 110, 111, 112, 113, 114, 115, 117, 118, 119, 120, 122, 128, 313, 316, 319, 321, 322 options 48, 103, 107, 110, 111, 112, 113, 115, 116, 117, 118, 119, 121, 122, 128, 313, 316, 319, 321, 322 create vlan 156 create_l4_switch_rule 210 creating an IP route 297 options 297 creating route redistribution OSPF to RIP 302 OSPF to RIP, options 303 RIP to OSPF 300 RIP to OSPF, options 301 delete fdbfilter 216, 233 options 216, 234 316862-B Rev 00 delete ipfilter 200, 203, 205, 229, 231 options 200, 203, 205, 230, 231 delete ipif options 165 delete l4_switch_rule 214 options 214 delete link_aggregation 181 options 181 delete mac_priority 223 options 224 delete mirror port 396 delete qos_rule 209 options 209 delete vlan 158 deleting a route redistribution 304 options 304 deleting an IP route 298 dir 40 disable clipaging 59 disable ip_fragment_filter 219 disable ipif 168 options 168 disable mirror 398 disable stp 82 disable TELNET 61, 62 display fdbfilter options 217 displaying current IGMP snooping configuration 364 options 365 displaying current port configuration 76, 78 options 76, 78 displaying IGMP group settings 358 options 358 displaying IGMP IP interface settings 357 options 357 displaying IGMP snooping forwarding table 369 options 369 displaying IGMP snooping groups 367 options 367 displaying IP routes 298 options 298 displaying route redistribution settings 308 Index options 308 displaying the list of router ports 370 options 370 download configuration 65 download firmware 65 options 66 downloading and uploading files 64 enable clipaging 58 enable ip_fragment_filter 218 enable ipif 167 enable mirror 397 enable stp 82 enable TELNET 60, 61 options 60, 62 globally disabling IGMP snooping 364 globally enabling IGMP snooping 362 options 363 login 71 logout 71 question mark (?) 40 reboot 69 reset 70 options 70 save 63 show account 49 show fdbfilter 217, 234 options 235 show flow_classifier template_id mode 195 show ip_fragment_filter 219 show ipif System 168 options 169 show link_aggregation 183 options 184 show mac_priority 224 options 225 show mirror 398 show serial_port 56 show session 55 show stp 83 show stp_ports 85 options 85 show switch 55 show traffic control 242 options 242 455 show vlan 160 options 161 sub-commands and parameters 43 top-level 43 up arrow 42 configuration examples configuring an OSPF stub area 420 configuring broadcast control 428 configuring egress queue weight 429 configuring OSPF MD5 authentication 419 configuring OSPF route redistribution 422 configuring QoS and IP filtering 430 configuring RIP base 425 configuring the default VLAN 404 creating port-based VLANs 408 disabling Spanning Tree 411 dropping fragmented IP packets 442 dropping TCP flows 437 enabling OSPF 413 filtering IP addresses 441 filtering MAC addresses 438 resetting switch to factory defaults 404 selecting tx and rx RIP v2 mode 427 setting QoS priority for destination TCP flows 435 configure a mirror port 395 configuring a link aggregation group 182 options 182 configuring a range of router ports 361 options 361 configuring an existing user account 49 configuring an IP interface 164 configuring broadcast storm control 241 options 241 configuring flow classifier template mode parameters options 194 configuring IGMP 355 options 355 configuring IGMP snooping 358 options 359 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 456 Index configuring IGMP snooping querier 360 options 360 configuring ports 74, 93, 131, 133, 135, 136, 137, 139, 140, 142, 143, 144, 145, 146, 147, 148, 149, 150, 152, 153 options 75, 77, 130, 131, 132, 133, 135, 136, 138, 139, 140, 142, 143, 144, 145, 146, 147, 148, 149, 151, 152, 153, 154 configuring route redistribution between OSPF and RIP 307 options 307 between RIP and OSPF 305 options 306 configuring scheduling 220 options 221 configuring STP on the switch 80 options 81 configuring the flow classifier template mode parameters 193 configuring the flow classifier template operating mode 192 options 192 configuring the system IP interface options 166 Console port connecting 35 interface description 35 conventions, text 31 creating a forwarding database filter 215 options 215 creating a link aggregation group 180 options 181 creating a MAC address filter 233, 237, 238, 239, 251, 252, 253 options 233, 237, 238, 239, 251, 252, 253 creating a MAC priority entry 222 options 222 creating a QoS rule 206 options 207 316862-B Rev 00 creating a user account 47, 102, 106, 110, 111, 112, 113, 114, 115, 117, 118, 119, 120, 122, 128, 313, 316, 319, 321, 322 options 48, 103, 107, 110, 111, 112, 113, 115, 116, 117, 118, 119, 121, 122, 128, 313, 316, 319, 321, 322 creating a VLAN 156 creating an IP filter for a flow classification template 197, 201, 228 options 198, 202, 229 creating an IP interface 163 creating an IP route 297 options 297 creating an L4 switch rule 210 options 211 creating route redistribution OSPF to RIP 302 options 303 RIP to OSPF 300 options 301 customer support 33 D defaults login names and passwords 39 deleting a forwarding database filter 216 options 216 deleting a link aggregation group 181 options 181 deleting a MAC address filter 233 options 234 deleting a MAC priority entry 223 deleting a mac priority entry options 224 deleting a mirror port 396 deleting a QoS rule 209 options 209 deleting a route redistribution 304 options 304 Index deleting a VLAN 158 deleting an IP filter from a flow classification template 200, 203, 205, 229, 231 options 200, 203, 205, 230, 231 deleting an IP interface options 165 deleting an IP route 298 displaying mac priority entries options 225 displaying route redistribution settings 308 options 308 displaying the current IP interface configuration 168 options 169 deleting an L4 switch rule 214 options 214 displaying the current port mirror settings 398 deleting ports on a VLAN 159 displaying the list of router ports 370 options 370 disabling an IP interface 168 options 168 457 displaying the flow classifier template mode 195 disabling CLI paging 59 displaying the status of an STP port group 85 options 85 disabling port mirroring on the switch 398 displaying the status of the IP fragment filter 219 disabling TELNET as a communication protocol 61, 62 displaying the switch MAC address filters 234 options 235 disabling the IP fragment filter 219 downloading a configuration file 65 displaying a forwarding database filter 217 options 217 downloading and uploading file commands 64 displaying a link aggregation configuration 183 options 184 displaying current IGMP snooping configuration 364 options 365 displaying current port configuration 76, 78 options 76, 78 displaying current VLAN configuration 160 options 161 displaying IGMP group settings 358 options 358 displaying IGMP IP interface settings 357 options 357 displaying IGMP snooping forwarding table 369 options 369 displaying IGMP snooping groups 367 options 367 displaying IP routes 298 options 298 downloading switch firmware 65 options 66 E enabling an IP interface 167 enabling CLI paging 58 enabling port mirroring on the switch 397 enabling TELNET connections 60, 61 options 60, 62 enabling the IP fragment filter 218 F filtering database filters packets off the network 232 segments network and control communication 232 G globally disabling IGMP snooping 364 displaying MAC priority entries 224 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 458 Index globally enabling IGMP snooping 362 options 363 H helpful editing commands dir 40 question mark (?) 40 up arrow 42 M MAC address filter CLI commands, roadmap 232, 236, 251 MAC address filtering 232 MD5 CLI commands, roadmap 290 definition 289 key table entry definitions 290 usage 289 I multiple page display keys 43 IGMP join and leave messages 353 snooping function 353 N IGMP CLI commands, roadmap 354, 381 next possible completions message 41 IP address filter and interface CLI commands, roadmap 228 P IP address filters and interfaces 227 Passport 1600 Series switch available commands prompt 43 line editing keys 42 multiple page display keys 43 next possible completions message 41 port mirroring 395 IP multicast IGMP join and leave messages 353 IGMP’s role in multicast groups 353 obtaining multicast group membership 353 receiving multicast packets 353 IP routing based on network addresses 296 passwords default 39 ping command 400 L port configuration CLI commands, roadmap 73, 87 line editing keys 42 port mirroring 395 link aggregation 1600 Series switch support 179 master port configuration 179 participating ports 179 purpose 179 product support 33 link aggregation CLI commands, roadmap 180 Q logging into the switch 71 QoS CLI commands, roadmap 186 command overview 191 configuring and utilizing hardware queues 185 establishing a scheme 189 template operating modes 190 logging out of the switch 71 login names default 39 316862-B Rev 00 protocol settings, terminal 36 publications, hard copy 33 Index configuring 345 displaying configuration 346 displaying trusted hosts 347 location configuring 345 overview of 337 system name configuring 344 trap receivers creating 349 deleting 350 traps disabling authentication of 352 disabling transmission of 351 enabling authentication of 351 enabling transmission of 350 managing 348 trusted host creating 342 deleting 342 l4_switch mode 190 qos mode 190 security mode 190 template_id 1 and template_id 2 190 R rebooting the switch 69 resetting the switch 70 options 70 RMON, enabling 399 route redistribution between OSPF and RIP 299 CLI commands, roadmap 300 definition 299 operation 299 route table CLI commands, roadmap 296 route table entries corresponding network addresses and gateways 296 default gateways 296 storm control assigns thresholds for each packet type 240 limits the not found (dlf) packets 240 RS-232 Console port 35 storm control CLI commands, roadmap 240 S saving switch configuration to NV-RAM 63 showing an existing user account 49 showing current switch management sessions 55 showing current switch status 55 showing the current status of the serial port 56 showing traffic control settings 242 options 242 SNMP community string configuring 343 community strings creating 340 deleting 341 description of 337 contact 459 STP blocks duplicate links 79 CLI commands, roadmap 80 establishes a primary link 79 globally disabling 82 globally displaying status 83 globally enabling 82 operates on two levels port level 79 switch level 79 uses duplicate links when primary fails 79 support, Nortel Networks 33 T technical publications 33 technical support 33 terminal protocol, setting 36 Command Line Interface Reference Guide for the Passport 1600 Series Layer 3 Switch, Version 1.1 460 Index terminal, connecting 35 text conventions 31 traceroute command 401 U understanding basic switch commands 45 using IP address filters and interfaces 227 using MAC address filtering 232 using sub-commands and parameters 43 using top-level commands 43 V VLANs assigning IP address ranges 227 CLI commands, roadmap 156, 163, 171 collection of end nodes 155 equate to a broadcast domain 155 grouped by logic not location 155 316862-B Rev 00