IX5-28GPX

Allied Telesis IX5-28GPX User manual

  • Hello! I am an AI chatbot trained to assist you with the Allied Telesis IX5-28GPX User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Software Reference for IX5-28GPX Switches
AlliedWare Plus Operating System
Version 5.4.3-3.7
C613-50034-01-REV A
Software Reference for IX5-28GPX Switches
ii AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 C613-50034-01 REV A
Acknowledgments
This product includes software developed by the University of California, Berkeley and its
contributors.
Copyright
©1982, 1986, 1990, 1991, 1993 The Regents of the University of California.
All rights reserved.
This product includes software developed by the OpenSSL Project for use in the OpenSSL
Toolkit (http://www.openssl.org/).
Copyright
©1998-2008 The OpenSSL Project. All rights reserved.
This product includes software licensed under the GNU General Public License available
from:
http://www.gnu.org/licenses/gpl2.html
Source code for all GPL licensed software in this product can be obtained from the
Allied Telesis GPL Code Download Center at:
http://www.alliedtelesis.com/support/default.aspx
Allied Telesis is committed to meeting the requirements of the open source licenses
including the GNU General Public License (GPL) and will make all required source code
available.
If you would like a copy of the GPL source code contained in Allied Telesis products, please
send us a request by registered mail including a check for US$15 to cover production and
shipping costs and a CD with the GPL code will be mailed to you.
GPL Code Request
Allied Telesis Labs (Ltd)
PO Box 8011
Christchurch.
New Zealand
©2013 Allied Telesis Inc. All rights reserved.
This documentation is subject to change without notice. No part of this publication may
be reproduced, stored in a retrieval system, or transmitted in any form or any means
electronic or mechanical, including photocopying and recording for any purpose other
than the purchasers internal use without the written permission of Allied Telesis, Inc.
Allied Telesis, AlliedWare Plus, EPSRing, SwitchBlade, and VCStack are trademarks or
registered trademarks in the United States and elsewhere of Allied Telesis, Inc. Adobe,
Acrobat, and Reader are either registered trademarks or trademarks of Adobe Systems
Incorporated in the United States and/or other countries. Additional brands, names and
products mentioned herein may be trademarks of their respective companies.
Getting the most from this manual
Although you can view this document using Acrobat version 5, to get the best from this
manual, we recommend using Adobe Acrobat Reader version 8. You can download
Acrobat Reader 8 free from http://www.adobe.com/.
Software Reference for IX5-28GPX Switches
C613-50034-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 iii
Table of Contents
Part 1: Setting up the Switch
Chapter 1: Getting Started
Introduction...................................................................................................................................................................... 1.2
How to Login.................................................................................................................................................................... 1.2
How to get Command Help........................................................................................................................................ 1.3
Viewing a List of Valid Parameters .................................................................................................................... 1.3
Completing Keywords ........................................................................................................................................... 1.5
Viewing Command Error Messages .................................................................................................................. 1.6
How to Work with Command Modes...................................................................................................................... 1.7
Entering Privileged Exec Commands When in a Configuration Mode ................................................ 1.9
How to See the Current Configuration.................................................................................................................1.10
Default Settings.............................................................................................................................................................1.11
The Default Configuration Script............................................................................................................................1.12
How to Change the Password..................................................................................................................................1.13
How to Set Strong Passwords..................................................................................................................................1.14
How to Set an IP Address on VLAN 1.....................................................................................................................1.16
How to Save and Boot from the Current Configuration.................................................................................1.17
How to Save to the Default Configuration File...........................................................................................1.17
How to Create and Use a New Configuration File .....................................................................................1.17
How to Return to the Factory Defaults .................................................................................................................1.19
How to See System Information .............................................................................................................................1.20
Viewing Overall System Information..............................................................................................................1.20
Viewing Temperature, Voltage, and Fan Status .........................................................................................1.21
Viewing the Serial Number ................................................................................................................................1.21
How to Set System Parameters ...............................................................................................................................1.22
How to Change the Telnet Session Timeout ...............................................................................................1.22
How to Name the Switch ....................................................................................................................................1.22
How to Display a Text Banner at Login..........................................................................................................1.23
How to Set the Time and Date.................................................................................................................................1.25
How to Show Current Settings .........................................................................................................................1.25
How to Set the Time and Date..........................................................................................................................1.25
How to Set the Timezone ...................................................................................................................................1.26
How to Configure Summer-time .....................................................................................................................1.26
How to Add and Remove Users...............................................................................................................................1.27
Pre-encrypted Passwords ...................................................................................................................................1.28
How to Undo Settings.................................................................................................................................................1.30
How to Use the no Parameter ...........................................................................................................................1.30
How to Use the default Parameter ..................................................................................................................1.30
How to Upgrade the Firmware................................................................................................................................1.31
Save Power With the Eco-Friendly Feature......................................................................................................... 1.32
Eco-Friendly.............................................................................................................................................................1.32
Trouble-shoot fiber and pluggable issues........................................................................................................... 1.33
Using the Find Me feature......................................................................................................................................... 1.34
Continuous Reboot Prevention...............................................................................................................................1.35
Controlling “show” Command Output.................................................................................................................1.37
Software Reference for IX5-28GPX Switches
iv AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 C613-50034-01 REV A
AlliedWare Plus GUI .....................................................................................................................................................1.39
Chapter 2: Command Syntax Conventions in this Software Reference
Chapter 3: Start-up Sequence
AlliedWare Plus Start-up .............................................................................................................................................. 3.2
Diagnostic Menu............................................................................................................................................................. 3.3
Bootloader Menu............................................................................................................................................................ 3.5
Start-up Sequence.......................................................................................................................................................... 3.7
Chapter 4: CLI Navigation Commands
Command List.................................................................................................................................................................. 4.2
Chapter 5: User Access Commands
Introduction...................................................................................................................................................................... 5.2
Command List.................................................................................................................................................................. 5.2
Chapter 6: Creating and Managing Files
Introduction...................................................................................................................................................................... 6.2
USB support...................................................................................................................................................................... 6.2
Working With Files ......................................................................................................................................................... 6.2
Listing files ................................................................................................................................................................. 6.2
Displaying the contents of configuration and text files ............................................................................ 6.4
Navigating through the filesystem ................................................................................................................... 6.4
Using the editor........................................................................................................................................................ 6.6
Creating and Using Configuration Files ................................................................................................................. 6.7
Creating a configuration file................................................................................................................................ 6.7
Specifying the start-up configuration script.................................................................................................. 6.7
Working with configuration files ....................................................................................................................... 6.8
The configuration file fallback order ................................................................................................................ 6.9
Copying Files To and From Your Device ..............................................................................................................6.11
URL syntax................................................................................................................................................................ 6.11
Copying files............................................................................................................................................................ 6.11
Copying from a Server to Running Configuration.....................................................................................6.15
Chapter 7: File Management Commands
Introduction...................................................................................................................................................................... 7.3
URL Syntax and Keyword Usage ........................................................................................................................ 7.3
Command List.................................................................................................................................................................. 7.4
Chapter 8: System Configuration and Monitoring Commands
Command List.................................................................................................................................................................. 8.3
Chapter 9: Debugging and Logging
Introduction...................................................................................................................................................................... 9.2
Debugging........................................................................................................................................................................ 9.2
Logging to terminal................................................................................................................................................ 9.2
Turning off debugging .......................................................................................................................................... 9.3
Logging .............................................................................................................................................................................. 9.3
Log Outputs............................................................................................................................................................... 9.4
Software Reference for IX5-28GPX Switches
C613-50034-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 v
Chapter 10: Logging Commands
Command List................................................................................................................................................................ 10.2
Chapter 11: Scripting Commands
Command List................................................................................................................................................................ 11.2
Chapter 12: Interface Commands
Command List................................................................................................................................................................ 12.2
Chapter 13: Interface Testing Commands
Command List................................................................................................................................................................ 13.2
Part 2: Layer Two Switching
Chapter 14: Switching Introduction
Introduction....................................................................................................................................................................14.2
Physical Layer Information........................................................................................................................................14.3
Switch Ports.............................................................................................................................................................14.3
Activating and Deactivating Switch Ports ....................................................................................................14.4
Autonegotiation.....................................................................................................................................................14.4
Duplex mode...........................................................................................................................................................14.4
Speed options.........................................................................................................................................................14.4
MDI/MDIX Connection Modes..........................................................................................................................14.5
The Layer 2 Switching Process.................................................................................................................................14.7
The Ingress Rules ...................................................................................................................................................14.7
The Learning Process ...........................................................................................................................................14.8
The Forwarding Process......................................................................................................................................14.9
The Egress Rules.....................................................................................................................................................14.9
Layer 2 Filtering...........................................................................................................................................................14.10
Ingress Filtering....................................................................................................................................................14.10
Storm-control...............................................................................................................................................................14.11
Loop Protection...........................................................................................................................................................14.12
Loop Detection ....................................................................................................................................................14.12
Thrash Limiting.....................................................................................................................................................14.13
Support for Jumbo Frames .....................................................................................................................................14.14
Port Mirroring...............................................................................................................................................................14.15
Port Security .................................................................................................................................................................14.16
MAC Address Learn Limits................................................................................................................................14.16
IEEE 802.1X.............................................................................................................................................................14.16
Quality of Service........................................................................................................................................................14.17
IGMP Snooping............................................................................................................................................................14.18
Chapter 15: Switching Commands
Command List................................................................................................................................................................ 15.3
Chapter 16: VLAN Introduction
Introduction....................................................................................................................................................................16.2
Virtual LANs (VLANs)....................................................................................................................................................16.2
Configuring VLANs................................................................................................................................................ 16.3
VLAN Double Tagging (VLAN Stacking) ...............................................................................................................16.5
Software Reference for IX5-28GPX Switches
vi AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 C613-50034-01 REV A
How double-tagged VLANs work ....................................................................................................................16.5
VLAN Rules for double tagging ........................................................................................................................16.5
Restrictions when using double-tagged VLANs.........................................................................................16.6
Configuring double-tagged VLANs ................................................................................................................16.6
Private VLANs...............................................................................................................................................................16.11
Private VLANs for ports in access mode ......................................................................................................16.11
Private VLAN operation with ports in access mode................................................................................16.13
Access mode private VLAN configuration example................................................................................16.14
Private VLANs for trunked ports.....................................................................................................................16.17
Trunked port private VLAN configuration example................................................................................16.18
Protocol based VLAN configuration example...........................................................................................16.21
VLAN Statistics .............................................................................................................................................................16.24
Counter Operation ..............................................................................................................................................16.24
Chapter 17: VLAN Commands
Command List................................................................................................................................................................ 17.2
Chapter 18: Spanning Tree Introduction: STP, RSTP, and MSTP
Introduction....................................................................................................................................................................18.2
Overview of Spanning Trees.....................................................................................................................................18.2
Spanning tree operation.....................................................................................................................................18.2
Spanning tree modes...........................................................................................................................................18.4
Spanning Tree Protocol (STP)................................................................................................................................... 18.5
Configuring STP ............................................................................................................................................................18.6
Rapid Spanning Tree Protocol (RSTP) ...................................................................................................................18.8
Configuring RSTP.......................................................................................................................................................... 18.9
Multiple Spanning Tree Protocol (MSTP)...........................................................................................................18.11
Multiple Spanning Tree Instances (MSTI)....................................................................................................18.12
MSTP Regions........................................................................................................................................................18.13
Common and Internal Spanning Tree (CIST).............................................................................................18.15
MSTP Bridge Protocol Data Units (BPDUs) .................................................................................................18.17
Configuring MSTP.......................................................................................................................................................18.19
Chapter 19: Spanning Tree Commands
Command List................................................................................................................................................................ 19.3
Chapter 20: Link Aggregation Introduction and Configuration
Introduction and Overview.......................................................................................................................................20.2
Static and Dynamic (LACP) Link Aggregation....................................................................................................20.3
Static Channel Groups .........................................................................................................................................20.3
Dynamic (LACP) Channel Groups ....................................................................................................................20.3
Link Aggregation Control Protocol (LACP)................................................................................................... 20.3
Configuring an LACP Channel Group.................................................................................................................... 20.5
Minimal LACP Group Configuration ............................................................................................................... 20.8
Configuring a Static Channel Group...................................................................................................................... 20.9
Chapter 21: Link Aggregation Commands
Introduction....................................................................................................................................................................21.2
Command List................................................................................................................................................................21.3
Chapter 22: Power over Ethernet Introduction
Introduction....................................................................................................................................................................22.2
Software Reference for IX5-28GPX Switches
C613-50034-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 vii
PoE standards.......................................................................................................................................................... 22.2
PoE (all standards) ................................................................................................................................................. 22.3
PoE (IEEE 802.3af)................................................................................................................................................... 22.3
Enhanced PoE .........................................................................................................................................................22.3
PoE+ (IEEE 802.3at)................................................................................................................................................ 22.4
Differences between PoE and PoE+ ............................................................................................................... 22.4
LLDP-MED (TIA-1057) with PoE+ (IEEE 802.3at)..........................................................................................22.4
PoE and PoE+ Applications................................................................................................................................ 22.5
Power Device (PD) discovery.............................................................................................................................22.5
Power classes .......................................................................................................................................................... 22.5
Power through the cable.................................................................................................................................... 22.6
Cable Types.............................................................................................................................................................. 22.7
Static and Automatic Power Allocation.........................................................................................................22.7
AW+ PoE and PoE+ Implementation ....................................................................................................................22.8
Power Capacity.......................................................................................................................................................22.8
PoE Port Allocation and Distribution..............................................................................................................22.8
Power threshold.....................................................................................................................................................22.9
Negotiating Power Requirements...................................................................................................................22.9
PoE port management.........................................................................................................................................22.9
Powered Device (PD) detection .....................................................................................................................22.10
Port prioritization.................................................................................................................................................22.10
Software monitoring ..........................................................................................................................................22.11
AW+ PoE and PoE+ Configuration .......................................................................................................................22.12
Add a description for a PoE or PoE+ port ...................................................................................................22.12
Configuring Capacity and Priority on a PoE or PoE+ Port.....................................................................22.13
Remotely monitoring power for all connected PDs ...............................................................................22.14
Chapter 23: Power over Ethernet Commands
Introduction....................................................................................................................................................................23.2
Command List................................................................................................................................................................23.2
Chapter 24: GVRP Introduction and Configuration
Introduction....................................................................................................................................................................24.2
GVRP Example.........................................................................................................................................................24.3
GVRP Guidelines.....................................................................................................................................................24.4
GVRP and Network Security...............................................................................................................................24.5
GVRP-inactive Intermediate Switches............................................................................................................24.5
Enabling GVRP on the Switch............................................................................................................................ 24.5
Enabling GVRP on the Ports...............................................................................................................................24.6
Setting the GVRP Timers .....................................................................................................................................24.6
Disabling GVRP on the Ports..............................................................................................................................24.7
Disabling GVRP on the Switch .....................................................................................................
.....................24.7
Configuring and validating GVRP...........................................................................................................................24.8
Chapter 25: GVRP Commands
Command List................................................................................................................................................................ 25.2
Software Reference for IX5-28GPX Switches
viii AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 C613-50034-01 REV A
Part 3: Layer Three, Switching and Routing
Chapter 26: Internet Protocol (IP) Addressing and Protocols
Introduction....................................................................................................................................................................26.2
Address Resolution Protocol (ARP) ........................................................................................................................26.3
Static ARP Entries...................................................................................................................................................26.3
Timing Out ARP Entries ....................................................................................................................................... 26.3
Deleting ARP Entries.............................................................................................................................................26.4
Proxy ARP .................................................................................................................................................................26.4
ARP Logging ............................................................................................................................................................ 26.7
Domain Name System (DNS)....................................................................................................................................26.8
Domain name parts ..............................................................................................................................................26.8
Server hierarchy .....................................................................................................................................................26.8
DNS Client ................................................................................................................................................................26.9
DNS Relay ...............................................................................................................................................................26.10
DHCP options........................................................................................................................................................26.12
Internet Control Message Protocol (ICMP)........................................................................................................26.13
Checking IP Connections.........................................................................................................................................26.14
Ping...........................................................................................................................................................................26.14
Traceroute ..............................................................................................................................................................26.14
IP Helper.........................................................................................................................................................................26.15
IP Directed Broadcast ................................................................................................................................................26.16
Chapter 27: IP Addressing and Protocol Commands
Introduction....................................................................................................................................................................27.3
Command List................................................................................................................................................................27.4
Chapter 28: IPv6 Introduction
Introduction....................................................................................................................................................................28.2
Overview..........................................................................................................................................................................28.2
IPv6 Addresses and Prefixes ..................................................................................................................................... 28.3
Address types..........................................................................................................................................................28.3
IPv6 Headers............................................................................................................................................................28.5
The Internet Control Message Protocol (ICMPv6)......................................................................................28.7
IPv6 Routing ..........................................................................................................................................................28.10
Integration of IPv4 and IPv6 ............................................................................................................................28.10
IPv6 on your Switch ...................................................................................................................................................28.11
Enabling IPv6.........................................................................................................................................................28.11
IPv6 Stateless Address Autoconfiguration (SLAAC)................................................................................28.11
IPv6 EUI-64 Addressing......................................................................................................................................28.11
IPv6 Link-local Addresses..................................................................................................................................28.12
IPv6 RA Guard ..............................................................................................................................................................28.13
RA Guard Introduction.......................................................................................................................................28.13
Enabling IPv6 RA Guard.....................................................................................................................................28.13
Chapter 29: IPv6 Commands
Command List................................................................................................................................................................ 29.2
Software Reference for IX5-28GPX Switches
C613-50034-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 ix
Chapter 30: IPv6to4 Tunneling Configuration
Introduction....................................................................................................................................................................30.2
6to4 Automatic Tunnel Configuration..................................................................................................................30.2
Tunneling Operation............................................................................................................................................ 30.2
6to4 tunnels operation and configuration summary............................................................................... 30.3
Example 6to4 configuration ..............................................................................................................................30.4
Chapter 31: IPv6to4 Tunneling Commands
Command List................................................................................................................................................................ 31.2
Chapter 32: Route Selection
Introduction....................................................................................................................................................................32.2
Types of Routes .............................................................................................................................................................32.2
Interface Routes .....................................................................................................................................................32.2
Static Routes............................................................................................................................................................32.2
RIB and FIB Routing Tables........................................................................................................................................32.3
Administrative Distance...................................................................................................................................... 32.3
Equal Cost Multipath Routing........................................................................................................................... 32.5
How AlliedWare Plus Deletes Routes .............................................................................................................32.5
How AlliedWare Plus Adds Routes ..................................................................................................................32.6
Chapter 33: Routing Commands
Introduction....................................................................................................................................................................33.2
Command List................................................................................................................................................................33.2
Part 4: Multicast Applications
Chapter 34: Multicast Introduction and Commands
Multicast Introduction ................................................................................................................................................ 34.2
Multicast groups ....................................................................................................................................................34.3
Components in a multicast network .............................................................................................................. 34.3
Command List................................................................................................................................................................34.5
Chapter 35: IGMP and IGMP Snooping Introduction
Introduction....................................................................................................................................................................35.2
IGMP ..................................................................................................................................................................................35.2
Joining a multicast group (Membership report)........................................................................................ 35.3
Staying in the multicast group (Query message).......................................................................................35.4
Leaving the multicast group (Leave message) ...........................................................................................35.4
IGMP Snooping..............................................................................................................................................................35.5
How IGMP Snooping operates..........................................................................................................................35.5
IGMP Snooping and Querier configuration example...............................................................................35.6
Query Solicitation.........................................................................................................................................................35.9
How Query Solicitation Works ..........................................................................................................................35.9
Query Solicitation Operation.............................................................................................................................35.9
Speeding up IGMP convergence in a non-looped topology...............................................................35.12
Enabling Query Solicitation on multiple switches in a looped topology........................................35.12
Software Reference for IX5-28GPX Switches
xAlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 C613-50034-01 REV A
Chapter 36: IGMP and IGMP Snooping Commands
Introduction....................................................................................................................................................................36.2
Command List................................................................................................................................................................36.2
Chapter 37: MLD and MLD Snooping Introduction and Commands
MLD Introduction .........................................................................................................................................................37.2
MLD Snooping........................................................................................................................................................37.3
MLD Snooping Configuration Examples.......................................................................................................37.4
Command List................................................................................................................................................................ 37.7
Part 5: Access and Security
Chapter 38: Access Control Lists Introduction
Introduction....................................................................................................................................................................38.2
Overview................................................................................................................................................................... 38.2
ACL Rules .................................................................................................................................................................. 38.3
ACL Source and Destination Addresses ........................................................................................................38.3
ACL Reverse Masking ...........................................................................................................................................38.3
Hardware and Software ACL Types........................................................................................................................ 38.4
Defining Hardware MAC ACLs ..........................................................................................................................38.5
Defining Hardware IP ACLs ................................................................................................................................ 38.6
Actions for Hardware ACLs.................................................................................................................................38.7
Attaching hardware ACLs to interfaces.........................................................................................................38.7
Hardware ACLs and QoS classifications................................................................................................................38.8
Classifying Your Traffic.........................................................................................................................................38.8
Security ACLs...........................................................................................................................................................38.8
QoS ACLs...................................................................................................................................................................38.9
Attaching hardware ACLs using QoS ............................................................................................................. 38.9
Filtering hardware ACLs with QoS.................................................................................................................38.11
Using QoS Match Commands with TCP Flags...........................................................................................38.12
ACL Filter Sequence Numbers ...............................................................................................................................38.14
ACL Filter Sequence Number Behavior .......................................................................................................38.14
ACL Filter Sequence Number Applicability................................................................................................38.14
ACL Filter Sequence Number Types .............................................................................................................38.15
ACL Filter Sequence Configuration......................................................................................................................38.17
Creating ACLs in Global Configuration Mode...........................................................................................38.19
Display the ACL configuration details..........................................................................................................38.21
Chapter 39: IPv4 Hardware Access Control List (ACL) Commands
Introduction....................................................................................................................................................................39.2
IPv4 Hardware Access List Commands and Prompts ......................................................................................39.3
Command List................................................................................................................................................................ 39.4
Chapter 40: IPv4 Software Access Control List (ACL) Commands
Introduction....................................................................................................................................................................40.2
IPv4 Software Access List Commands and Prompts........................................................................................ 40.3
Command List................................................................................................................................................................ 40.4
Software Reference for IX5-28GPX Switches
C613-50034-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 xi
Chapter 41: IPv6 Software Access Control List (ACL) Commands
Introduction....................................................................................................................................................................41.2
IPv6 Software Access List Commands and Prompts........................................................................................ 41.3
Command List................................................................................................................................................................ 41.4
Chapter 42: Quality of Service (QoS) Introduction
Introduction....................................................................................................................................................................42.2
QoS Operations ......................................................................................................................................................42.2
QoS Packet Information ............................................................................................................................................. 42.3
Link Layer QoS ........................................................................................................................................................42.3
Differentiated Services Architecture............................................................................................................... 42.4
The Differential Services Field...........................................................................................................................42.5
Processing pre-marked packets .......................................................................................................................42.6
Applying QoS on Your Switch..................................................................................................................................42.7
Classifying your Data............................................................................................................................................ 42.7
Class Maps ................................................................................................................................................................42.7
Policy Maps ............................................................................................................................................................42.10
Premarking and Remarking Your Traffic ............................................................................................................42.11
CoS to egress queue premarking ..................................................................................................................42.11
DSCP to egress queue premarking ...............................................................................................................42.13
Policing (Metering) Your Data................................................................................................................................42.15
Single-rate Three-color Policing.....................................................................................................................42.15
Two-rate Three-color Policing.........................................................................................................................42.16
Configuring and Applying a Policer..............................................................................................................42.17
Remarking Your Data ................................................................................................................................................42.18
Configuring the Egress Queues.............................................................................................................................42.19
Egress Queues and QoS markers ...................................................................................................................42.19
Egress Queue Commands Hierarchy ............................................................................................................42.20
Egress Queue Shaping..............................................................................................................................................42.21
Scheduling .............................................................................................................................................................42.21
Drop Mode .............................................................................................................................................................42.22
Storm Protection.........................................................................................................................................................42.24
Chapter 43: QoS Commands
Command List................................................................................................................................................................ 43.2
Chapter 44: 802.1X Introduction and Configuration
Introduction....................................................................................................................................................................44.2
802.1X System Components .............................................................................................................................44.2
The 802.1X Implementation .....................................................................................................................................44.5
Configuring 802.1X ......................................................................................................................................................44.7
Chapter 45: 802.1X Commands
Command List................................................................................................................................................................ 45.2
Software Reference for IX5-28GPX Switches
xii AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 C613-50034-01 REV A
Chapter 46: Authentication Introduction and Configuration
Authentication Introduction ....................................................................................................................................46.2
Configuring a Guest VLAN..................................................................................................................................46.2
802.1X-Authentication ............................................................................................................................................... 46.3
Web-Authentication....................................................................................................................................................46.4
What is Web-Authentication? ...........................................................................................................................46.4
Web-Authentication Basics................................................................................................................................ 46.4
Configuring Web-Authentication....................................................................................................................46.6
Starting a Web-Authentication Session ........................................................................................................46.8
Support for Protocols Underlying Web-Authentication .........................................................................46.9
Web-Authentication Timeout Connect.......................................................................................................46.13
Web Authorization Proxy..................................................................................................................................46.14
MAC-Authentication..................................................................................................................................................46.15
Why is MAC-Authentication Required? .......................................................................................................46.15
How Does MAC-Authentication Work? .......................................................................................................46.15
Configuring MAC-Authentication .................................................................................................................46.15
Tri-Authentication Configuration.........................................................................................................................46.18
Two-step Authorization ..........................................................................................................................................46.20
Roaming Authentication .........................................................................................................................................46.21
Roaming Authentication Overview ..............................................................................................................46.22
Roaming Authentication Feature Interactions .........................................................................................46.23
Unauthenticated Supplicant Traffic.....................................................................................................................46.24
Deciding When a Supplicant Fails Authentication..................................................................................46.26
Failed Authentication VLAN ............................................................................................................................46.27
Limitations on Allowed Feature Combinations........................................................................................46.27
Chapter 47: Authentication Commands
Command List................................................................................................................................................................ 47.3
Chapter 48: AAA Introduction and Configuration
AAA Introduction.......................................................................................................................................................... 48.2
Available functions and server types..............................................................................................................48.2
Server Groups and Method Lists......................................................................................................................48.3
Configuring AAA Login Authentication ...............................................................................................................48.5
AAA Configuration Tasks .................................................................................................................................... 48.5
Sample Authentication Configurations................................................................................................................48.7
Sample 802.1X Authentication Configuration............................................................................................48.7
Sample MAC Authentication Configuration................................................................................................ 48.8
Sample Web-Authentication Configuration................................................................................................48.9
Sample Tri-Authentication Configuration..................................................................................................48.10
Chapter 49: AAA Commands
Command List................................................................................................................................................................ 49.2
Software Reference for IX5-28GPX Switches
C613-50034-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 xiii
Chapter 50: RADIUS Introduction and Configuration
Introduction....................................................................................................................................................................50.2
RADIUS Packets ...................................................................................................................................................... 50.3
RADIUS Attributes ................................................................................................................................................. 50.4
RADIUS Security .....................................................................................................................................................50.5
RADIUS Proxy ..........................................................................................................................................................50.6
RADIUS Accounting ..............................................................................................................................................50.7
RADIUS Configuration ................................................................................................................................................ 50.8
Switch Configuration Tasks................................................................................................................................50.8
Switch to RADIUS Server Communication ...................................................................................................50.9
AAA Server Groups Configuration.................................................................................................................50.11
RADIUS Configuration Examples ..........................................................................................................................50.14
RADIUS Authentication .....................................................................................................................................50.14
Single RADIUS Server Configuration ............................................................................................................50.15
Multiple RADIUS Server Configuration ........................................................................................................50.16
RADIUS Server Group Configuration............................................................................................................50.16
RADIUS Server Configuration using Server Groups ................................................................................50.17
Chapter 51: RADIUS Commands
Command List................................................................................................................................................................ 51.2
Chapter 52: TACACS+ Introduction and Configuration
Introduction....................................................................................................................................................................52.2
TACACS+ Overview......................................................................................................................................................52.2
The AlliedWare Plus TACACS+ Implementation ........................................................................................ 52.2
Authentication........................................................................................................................................................ 52.3
Authorization ..........................................................................................................................................................52.3
Accounting...............................................................................................................................................................52.4
Configuration.................................................................................................................................................................52.5
Configure TACACS+..............................................................................................................................................52.5
TACACS+ Configuration Example ...................................................................................................................52.7
Chapter 53: TACACS+ Commands
Command List................................................................................................................................................................ 53.2
Chapter 54: Local RADIUS Server Introduction and Configuration
Local RADIUS Server Introduction.......................................................................................................................... 54.2
Enable the Local RADIUS Server....................................................................................................................... 54.2
Add the Local RADIUS Server as a RADIUS Server .....................................................................................54.3
Add authenticators to the list of authenticators........................................................................................54.3
Configure the Local RADIUS Server User Database .................................................................................. 54.4
Authenticating login sessions........................................................................................................................... 54.5
RADIUS Authentication with User Privileges...............................................................................................54.5
Creating certificates for single users and all users..................................................................................... 54.8
Defined RADIUS attributes list.................................................................................................................................54.9
Chapter 55: Local RADIUS Server Commands
Command List................................................................................................................................................................ 55.2
Software Reference for IX5-28GPX Switches
xiv AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 C613-50034-01 REV A
Chapter 56: Secure Shell (SSH) Introduction
Introduction....................................................................................................................................................................56.2
Secure Shell on the AlliedWare Plus
OS.........................................................................................................56.2
Configuring the SSH Server ......................................................................................................................................56.4
Creating a Host Key...............................................................................................................................................56.4
Enabling the Server...............................................................................................................................................56.4
Modifying the Server............................................................................................................................................56.5
Validating the Server Configuration...............................................................................................................56.6
Adding SSH Users ..................................................................................................................................................56.6
Authenticating SSH Users................................................................................................................................... 56.7
Adding a Login Banner........................................................................................................................................56.7
Monitoring the Server and Managing Sessions.......................................................................................... 56.8
Debugging the Server..........................................................................................................................................56.8
Configuring the SSH Client .......................................................................................................................................56.9
Modifying the Client............................................................................................................................................. 56.9
Adding SSH Servers ............................................................................................................................................56.10
Authenticating with a Server...........................................................................................................................56.10
Connecting to a Server and Running Commands...................................................................................56.11
Copying files to and from the Server............................................................................................................56.11
Debugging the Client ........................................................................................................................................56.11
Chapter 57: Secure Shell (SSH) Configuration
SSH Server Configuration Example........................................................................................................................57.2
Chapter 58: Secure Shell (SSH) Commands
Introduction....................................................................................................................................................................58.2
Command List................................................................................................................................................................58.2
Chapter 59: DHCP Snooping Introduction and Configuration
Introduction....................................................................................................................................................................59.2
DHCP Snooping.............................................................................................................................................................59.2
DHCP Snooping Database..................................................................................................................................59.3
DHCP Relay Agent Option 82............................................................................................................................59.4
Traffic Filtering with DHCP Snooping ............................................................................................................59.5
ARP Security.............................................................................................................................................................59.8
MAC Address Verification ...................................................................................................................................59.8
DHCP Snooping Violations.................................................................................................................................59.8
Interactions with Other Features ............................................................................................................................59.9
Configuration...............................................................................................................................................................59.10
Configure DHCP Snooping...............................................................................................................................59.10
Disabling DHCP Snooping................................................................................................................................59.15
Related Features ..................................................................................................................................................59.16
Chapter 60: DHCP Snooping Commands
Command List................................................................................................................................................................ 60.2
Software Reference for IX5-28GPX Switches
C613-50034-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 xv
Part 6: Network Availability
Chapter 61: VRRP Introduction and Configuration
VRRP Introduction ........................................................................................................................................................61.2
Virtual Router Redundancy Protocol.....................................................................................................................61.3
VRRP Configuration for IPv4 .....................................................................................................................................61.4
VRRP election and preempt for IPv4............................................................................................................... 61.6
VRRP Configuration for IPv6 .....................................................................................................................................61.8
VRRP election and preempt for IPv6.............................................................................................................61.11
VRRP debugging.........................................................................................................................................................61.13
VRRP Configuration Examples ...............................................................................................................................61.14
VRRP Preferred Master with Backup Configuration ................................................................................61.14
VRRP Circuit Failover Configuration .............................................................................................................61.17
VRRPv2 to VRRPv3 Transition Configuration.............................................................................................61.22
VRRP IPv6 Configuration Example.................................................................................................................61.28
Chapter 62: VRRP Commands
Command List................................................................................................................................................................ 62.2
Chapter 63: EPSR Introduction and Configuration
Introduction....................................................................................................................................................................63.2
Ring Components and Operation ..........................................................................................................................63.2
Fault Detection and Recovery..................................................................................................................................63.4
Fault Recovery ........................................................................................................................................................ 63.4
Restoring Normal Operation .............................................................................................................................63.6
Managing Rings with Two Breaks....................................................................................................................63.7
Recovery When One Break is Restored..........................................................................................................63.9
Configuration Examples...........................................................................................................................................63.11
Single Domain, Single Ring Network............................................................................................................63.11
Single Ring, Dual Domain Network...............................................................................................................63.16
Interconnected Rings................................................................................................................................................63.17
Superloop Protection.........................................................................................................................................63.18
EPSR Superloop Prevention.............................................................................................................................63.19
Configuring a Basic Superloop Protected Two Ring EPSR Network..................................................63.22
Sample Show Output.........................................................................................................................................63.38
Adding a new data VLAN to a functioning superloop topology........................................................63.41
EPSR and Spanning Tree Operation..............................................................................................................63.44
Chapter 64: EPSR Commands
Command List................................................................................................................................................................ 64.2
Software Reference for IX5-28GPX Switches
xvi AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 C613-50034-01 REV A
Part 7: Network Management
Chapter 65: AMF Introduction and Configuration
Introduction....................................................................................................................................................................65.2
AMF Supported Products and Software Versions............................................................................................. 65.2
Key benefits of AMF.....................................................................................................................................................65.3
Unified command-line......................................................................................................................................... 65.3
Configuration backup and recovery............................................................................................................... 65.3
Rolling firmware upgrade................................................................................................................................... 65.3
AMF Terminology.........................................................................................................................................................65.4
AMF network guidelines............................................................................................................................................65.8
Retention and use of the ‘manager’ username .......................................................................................... 65.8
Loop-free data plane............................................................................................................................................65.8
Aggregators.............................................................................................................................................................65.8
VCStacks....................................................................................................................................................................65.8
AMF external removable media.......................................................................................................................65.8
AMF interaction with QoS and ACLs...............................................................................................................65.9
NTP and AMF...........................................................................................................................................................65.9
Configuring AMF.........................................................................................................................................................65.10
Simple AMF example with a single master ................................................................................................65.10
Verifying the AMF network .....................................................................................................................................65.20
Using the AMF network............................................................................................................................................65.21
AMF backups.........................................................................................................................................................65.21
Safe removal of external storage media......................................................................................................65.21
Performing a manual backup.................................................................................................................................65.23
Backups on VCStacks running as AMF masters ...............................................................................................65.25
Node recovery..............................................................................................................................................................65.27
Automatic node recovery.................................................................................................................................65.27
A “Clean” node......................................................................................................................................................65.28
Manual node recovery .......................................................................................................................................65.29
Node recovery on VCStacks.............................................................................................................................65.30
AMF safe configuration ............................................................................................................................................65.31
Adding a preconfigured device to the network.......................................................................................65.33
Using the unified CLI with working-sets .....................................................................................................65.34
Automatic working-set groups.......................................................................................................................65.35
User-defined working-set groups..................................................................................................................65.36
Executing commands on working-sets .......................................................................................................65.37
Interactive commands.......................................................................................................................................65.39
Rolling-reboot firmware upgrade ........................................................................................................................65.40
Performing a rolling reboot upgrade...........................................................................................................65.42
Chapter 66: AMF Commands
AMF Naming Convention ..........................................................................................................................................66.2
Command List................................................................................................................................................................66.3
Chapter 67: NTP Introduction and Configuration
Introduction....................................................................................................................................................................67.2
Overview..........................................................................................................................................................................67.2
NTP on the Switch ........................................................................................................................................................67.3
Troubleshooting ...........................................................................................................................................................67.4
Configuration Example...............................................................................................................................................67.5
Software Reference for IX5-28GPX Switches
C613-50034-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 xvii
Chapter 68: NTP Commands
Command List................................................................................................................................................................ 68.2
Chapter 69: Dynamic Host Configuration Protocol (DHCP) Introduction
Introduction....................................................................................................................................................................69.2
BOOTP........................................................................................................................................................................69.2
DHCP ..........................................................................................................................................................................69.2
DHCP Relay Agents ............................................................................................................................................... 69.3
Configuring the DHCP Server...................................................................................................................................69.3
Create the Pool .......................................................................................................................................................69.4
Define the Network...............................................................................................................................................69.4
Define the Range ................................................................................................................................................... 69.5
Set the Lease ...........................................................................................................................................................69.5
Enable DHCP Leasequery ...................................................................................................................................69.6
Set the Options.......................................................................................................................................................69.7
DHCP Lease Probing............................................................................................................................................. 69.8
DHCP Relay Agent Introduction.............................................................................................................................. 69.9
Configuring the DHCP Relay Agent ................................................................................................................69.9
DHCP Relay Agent Information Option (Option 82) ...............................................................................69.10
DHCPv6 Relay Agent Notification for DHCPv6 PD...................................................................................69.13
Configuring the DHCP Client..................................................................................................................................69.14
Clearing Dynamically Allocated Lease Bindings .............................................................................................69.14
Chapter 70: Dynamic Host Configuration Protocol (DHCP) Commands
Command List................................................................................................................................................................ 70.2
Chapter 71: DHCP for IPv6 (DHCPv6) Introduction and Configuration
DHCPv6 Introduction.................................................................................................................................................. 71.2
DHCPv6 for IPv6 .....................................................................................................................................................71.3
DHCPv6 Prefix Delegation..................................................................................................................................71.3
DHCPv6 RFCs...........................................................................................................................................................71.4
DHCPv6 Messages.................................................................................................................................................71.5
DHCPv6 Renewal and Rebinding.....................................................................................................................71.8
Stateful DHCPv6 Message Exchange..............................................................................................................71.9
Stateless DHCPv6 Message Exchange .........................................................................................................71.10
DHCPv6 Relay Agent Stateful Message Exchange ..................................................................................71.11
DHCPv6 Prefix Delegation Message Exchange.........................................................................................71.12
DHCPv6 Client and Server Identification ...........................................................................................................71.13
DHCPv6 Server and Client Functionality............................................................................................................71.14
DHCPv6 Server Functionality ..........................................................................................................................71.14
DHCPv6 Client Functionality ...........................................................................................................................71.16
Configuring DHCPv6 Prefix Delegation..............................................................................................................71.17
Configuring the DHCPv6 Server Delegation Pool ...................................................................................71.17
Configuring the DHCPv6 PD Client..............................................................................................................71.18
Configure DHCPv6 Server/Stateful Client (Prefix)....................................................................................71.19
Configure DHCPv6 Server/Stateful Client (Range) ..................................................................................71.21
Configure DHCPv6 Server/Stateless Client ................................................................................................71.23
Configure DHCPv6 Relay / Server / Client...................................................................................................71.25
Configure PD Server / PD Client / Stateless Client...................................................................................71.30
Configure PD via DHCPv6 Relay.....................................................................................................................71.32
Configure PD subdelegation with SLAAC...................................................................................................71.35
Configure PD subdelegation for multiple VLANs ....................................................................................71.38
Configure DHCPv6 Relay with recursive PD subdelegation ................................................................71.41
PD Subdelegation System Configuration..........................................................................................................71.45
Software Reference for IX5-28GPX Switches
xviii AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 C613-50034-01 REV A
Stateful_Client Configuration .........................................................................................................................71.47
Stateless_Client Configuration.......................................................................................................................71.47
PD_Client Configuration...................................................................................................................................71.47
DHCPv6_Relay Configuration .........................................................................................................................71.48
PD_Subdelegation Configuration .................................................................................................................71.49
PD_Server1 Configuration................................................................................................................................71.50
PD_Server2 Configuration................................................................................................................................71.50
Chapter 72: DHCP for IPv6 (DHCPv6) Commands
Command List................................................................................................................................................................ 72.2
Chapter 73: SNMP Introduction
Introduction....................................................................................................................................................................73.2
Network Management Framework........................................................................................................................73.2
Structure of Management Information ................................................................................................................73.4
Names ........................................................................................................................................................................73.5
Instances ...................................................................................................................................................................73.6
Syntax ........................................................................................................................................................................73.7
Access ........................................................................................................................................................................73.7
Status .........................................................................................................................................................................73.7
Description...............................................................................................................................................................73.7
The SNMP Protocol ......................................................................................................................................................73.8
SNMP Versions........................................................................................................................................................73.8
SNMP Messages .....................................................................................................................................................73.9
Polling versus Event Notification.....................................................................................................................73.9
Message Format for SNMPv1 and SNMPv2c..............................................................................................73.10
SNMP Communities (Version v1 and v2c) ..................................................................................................73.11
SNMPv3 Entities ...................................................................................................................................................73.11
SNMPv3 Message Protocol Format...............................................................................................................73.12
SNMPv1 and SNMPv2c .............................................................................................................................................73.13
SNMP MIB Views for SNMPv1 and SNMPv2c .............................................................................................73.13
SNMP Communities............................................................................................................................................73.13
Configuration Example (SNMPv1 and v2) ..................................................................................................73.15
SNMPv3 ..........................................................................................................................................................................73.18
SNMP MIB Views for SNMPv3 ..........................................................................................................................73.18
SNMP Groups ........................................................................................................................................................73.18
SNMP Users............................................................................................................................................................73.18
Configuration Example (SNMPv3) .................................................................................................................73.19
Using SNMP to Manage Files and Software ......................................................................................................73.20
Copy a File to or from a TFTP Server.............................................................................................................73.20
Upgrade Software and Configuration Files................................................................................................73.22
Chapter 74: SNMP Commands
Command List................................................................................................................................................................ 74.2
Chapter 75: SNMP MIBs
Introduction....................................................................................................................................................................75.2
About MIBs...............................................................................................................................................................75.2
About SNMP ............................................................................................................................................................75.2
Obtaining MIBs.......................................................................................................................................................75.2
Loading MIBs...........................................................................................................................................................75.3
Allied Telesis Enterprise MIB.....................................................................................................................................75.5
AT-SMI-MIB...............................................................................................................................................................75.6
AT-PRODUCTS-MIB................................................................................................................................................ 75.8
Software Reference for IX5-28GPX Switches
C613-50034-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 xix
AT-BOARDS-MIB...................................................................................................................................................75.10
AT-SYSINFO-MIB...................................................................................................................................................75.14
AT-ENVMONv2-MIB.............................................................................................................................................75.19
AT-VCSTACK-MIB .................................................................................................................................................75.25
AT-MIBVERSION-MIB...........................................................................................................................................75.29
AT-USER-MIB .........................................................................................................................................................75.30
AT-RESOURCE-MIB ..............................................................................................................................................75.33
AT-LICENSE-MIB ...................................................................................................................................................75.35
AT-TRIGGER-MIB...................................................................................................................................................75.38
AT-LOOPPROTECT-MIB ......................................................................................................................................75.40
AT-SETUP-MIB .......................................................................................................................................................75.42
AT-DNS-CLIENT-MIB............................................................................................................................................75.51
AT-NTP-MIB............................................................................................................................................................75.52
AT-EPSRv2-MIB .....................................................................................................................................................75.55
AT-DHCPSN-MIB...................................................................................................................................................75.58
AT-FILEv2-MIB .......................................................................................................................................................75.61
AT-LOG-MIB ...........................................................................................................................................................75.67
AT-IP-MIB ................................................................................................................................................................75.69
AT-VLANINFO-MIB...............................................................................................................................................75.71
Public MIBs....................................................................................................................................................................75.73
Private MIBs ..................................................................................................................................................................75.78
Chapter 76: LLDP Introduction and Configuration
Introduction....................................................................................................................................................................76.2
Link Layer Discovery Protocol..................................................................................................................................76.2
LLDP-MED........................................................................................................................................................................76.3
Voice VLAN......................................................................................................................................................................76.3
LLDP Advertisements..................................................................................................................................................76.4
Type-Length-Value (TLV) .................................................................................................................................... 76.4
LLDP-MED: Location Identification TLV.........................................................................................................76.7
Transmission and Reception ....................................................................................................................................76.8
LLDP-MED Operation ........................................................................................................................................... 76.9
Storing LLDP Information........................................................................................................................................76.10
Configuring LLDP .......................................................................................................................................................76.11
Configure LLDP.....................................................................................................................................................76.12
Configure LLDP-MED..........................................................................................................................................76.14
Configure Authentication for Voice VLAN..................................................................................................76.18
Chapter 77: LLDP Commands
Introduction....................................................................................................................................................................77.2
Command List................................................................................................................................................................77.2
Chapter 78: SMTP Commands
Command List................................................................................................................................................................ 78.2
Chapter 79: RMON Introduction and Configuration
Introduction....................................................................................................................................................................79.2
Overview..........................................................................................................................................................................79.2
RMON Configuration Example................................................................................................................................. 79.4
Chapter 80: RMON Commands
Command List................................................................................................................................................................ 80.2
Software Reference for IX5-28GPX Switches
xx AlliedWare Plus
TM
Operating System - Version 5.4.3-3.7 C613-50034-01 REV A
Chapter 81: Triggers Introduction
Introduction....................................................................................................................................................................81.2
Trigger Facility ...............................................................................................................................................................81.2
Configuring a Trigger..................................................................................................................................................81.2
Troubleshooting Triggers..........................................................................................................................................81.5
Chapter 82: Triggers Configuration
Introduction....................................................................................................................................................................82.2
Restrict Internet Access .............................................................................................................................................. 82.2
Capture Unusual CPU and RAM Activity ..............................................................................................................82.4
See Daily Statistics........................................................................................................................................................82.6
Turn Off Power to Port LEDs .....................................................................................................................................82.7
Reduce Power Supplied to Ports.............................................................................................................................82.9
Capture Show Output and Save to a USB Storage Device ..........................................................................82.11
Load a Release File From a USB Storage Device..............................................................................................82.12
Chapter 83: Trigger Commands
Command List................................................................................................................................................................ 83.2
Chapter 84: Ping Polling Introduction and Configuration
Introduction....................................................................................................................................................................84.2
How Ping Polling Works.............................................................................................................................................84.2
Configuring Ping Polling............................................................................................................................................84.4
Creating a Polling Instance ................................................................................................................................ 84.4
Customizing a Polling Instance ........................................................................................................................84.5
Troubleshooting Ping Polling ...........................................................................................................................84.6
Interaction with Other Protocols ............................................................................................................................ 84.7
Chapter 85: Ping-Polling Commands
Command List................................................................................................................................................................ 85.2
Chapter 86: sFlow Introduction and Configuration
sFlow Introduction.......................................................................................................................................................86.2
The sFlow Agent ...........................................................................................................................................................86.3
Sampling Methods................................................................................................................................................86.3
The sFlow Collector......................................................................................................................................................86.5
Configuring sFlow on your Switch......................................................................................................................... 86.6
Configuration Procedure ....................................................................................................................................86.7
Configuration Examples......................................................................................................................................86.8
sFlow Datagrams ........................................................................................................................................................86.13
The sFlow MIB ..............................................................................................................................................................86.14
Chapter 87: sFlow Commands
Command List................................................................................................................................................................ 87.2
/