Aruba R9G11A User guide

Category
Networking
Type
User guide
AOS-CX 10.13 Layer-2
Bridging Guide
8100, 83xx, 9300, 10000 Switch Series
Published: November 2023
Edition: 1
|2
Copyright Information
© Copyright 2023 Hewlett Packard Enterprise Development LP.
This product includes code licensed under certain open source licenses which require source
compliance. The corresponding source for these components is available upon request. This offer is
valid to anyone in receipt of this information and shall expire three years following the date of the final
distribution of this product version by Hewlett Packard Enterprise Company. To obtain such source
code, please check if the code is available in the HPE Software Center at
https://myenterpriselicense.hpe.com/cwp-ui/software but, if not, send a written request for specific
software version and product for which you want the open source code. Along with the request, please
send a check or money order in the amount of US $10.00 to:
Hewlett Packard Enterprise Company
Attn: General Counsel
WW Corporate Headquarters
1701 E Mossy Oaks Rd Spring, TX 77389
United States of America.
Notices
The information contained herein is subject to change without notice. The only warranties for Hewlett
Packard Enterprise products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an
additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or
omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession,
use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer
Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government
under vendor's standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard
Enterprise website.
Acknowledgment
Intel®, Itanium®, Optane™, Pentium®, Xeon®, Intel Inside®, and the Intel Inside logo are trademarks of
Intel Corporation in the U.S. and other countries.
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in
the United States and/or other countries.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java® and Oracle® are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
All third-party marks are property of their respective owners.
Contents
Contents
Contents 3
About this document 9
Applicable products 9
Latest version available online 9
Command syntax notation conventions 9
About the examples 10
Identifying switch ports and interfaces 10
Introduction 12
MAC address table 13
MAC address table commands 14
clear mac-address 14
clear mac-address-table 16
mac-address-table age-time 17
show mac-address-table 17
show mac-address-table address 19
show mac-address-table count 20
show mac-address-table dynamic 21
show mac-address-table interface 22
show mac-address-table lockout 23
show mac address table mac move 23
show mac-address-table mac-move 25
show mac-address-table port 26
show mac-address-table static 27
show mac-address-table vlan 28
static-mac 28
VLANs 30
VLAN interfaces 30
Access interface 30
Trunk interface 31
Traffic handling summary 32
Comparing VLAN commands on PVOS, Comware, and AOS-CX 33
Protocol-mapped VLANs 34
MAC-based VLANs 34
VLAN translation 35
Assigning a VLAN to an interface 35
Assigning a VLAN ID to an access interface 35
Assigning a VLAN ID to a trunk interface 36
Assigning a native VLAN ID to a trunk interface 38
VLAN numbering 38
Configuring VLANs 39
Creating and enabling a VLAN 39
Disabling a VLAN 39
AOS-CX 10.13 Layer-2 Bridging Guide 3
Contents |4
Viewing VLAN configuration information 39
VLAN scenario 41
UUFB 47
VLAN commands 48
description 48
vlan name 48
show capacities-status vlan-count 49
show capacities svi-count 49
show capacities vlan-count 50
show capacities-status vlan-translation 51
show system internal-vlan-range 51
show vlan 52
show vlan port 53
show vlan summary 54
show vlan translation 55
show vlan translation pending 57
show vlan voice 57
shutdown 58
system internal-vlan-range 59
trunk-dynamic-vlan-include 60
uufb 61
vlan 62
vlan access 63
vlan protocol 64
vlan translate 66
vlan trunk allowed 68
vlan trunk native 69
vlan trunk native tag 70
voice 71
QinQ 73
QinQ feature interactions 73
QinQtypes 74
Selective QinQ 74
Transparent QinQ 74
Configuring and displaying QinQ 75
QinQ limitations 76
QinQ commands 77
debug vlan qinq 77
diag-dump l2vlan basic 77
qinq port-type 78
qinq ethertype 79
qinq vlan-map 80
show qinq 80
show qinq detail 81
show qinq interface 82
show running-config qinq 83
show tech qinq 84
svlan 85
Loop protection 87
Interaction with other protocols 88
Configuring loop protection 88
Loop protect commands 90
loop-protect 90
loop-protect action 91
AOS-CX 10.13 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 5
loop-protect re-enable-timer 92
loop-protect transmit-interval 93
loop-protect trap loop-detected 93
loop-protect vlan 94
show loop-protect 95
MVRP 98
MVRP functionality and limitations 98
MRP messages 99
Join message 99
New message 99
Leave message 100
LeaveAll message 100
Configuring MVRP 100
MVRP scenario 1 101
MVRP scenario 2 105
MVRP commands 112
clear mvrp statistics 112
mvrp 113
mvrp registration 114
mvrp timer 115
show mvrp config 116
show mvrp state 116
show mvrp statistics 117
Spanning tree protocols (STP) 120
Protocols and feature details 120
STP 120
Root bridge 120
Root port 120
Designated bridge and designated port 120
Path cost 121
STP timers 121
BPDU forwarding mechanism 122
STP protocol packets 122
Comparing spanning tree options 123
Preparing for spanning tree configuration 123
STP cost calculation 124
Simplified calculation overview 124
Calculation example 125
STP supported platforms and scale 130
Scale 130
MSTP protocol and feature details 130
MSTP key concepts 131
MSTP configuration tasks 134
MSTP considerations and best practices 135
MSTP use cases 136
MSTP use case: Preventing loops 136
MSTP use case: Deterministic root bridges 139
Switch A configuration 140
Switch B configuration 140
Switch C and D configuration 141
Checking the configuration 141
Observe port behavior and state 142
MSTP use case: BPDU protection 144
MSTP use case: Root protection 146
Contents |6
MSTP use case: Spanning tree on edge ports 149
MSTP commands 152
clear spanning-tree statistics 152
show spanning-tree 152
show spanning-tree detail 153
show spanning-tree inconsistent-ports 155
show spanning-tree mst 156
show spanning-tree mst-config 158
show spanning-tree mst detail 159
show spanning-tree mst <INSTANCE-ID> 163
show spanning-tree mst <INSTANCE-ID> detail 164
show spanning-tree mst interface 165
show spanning-tree summary port 166
show spanning-tree summary root 167
spanning-tree 168
spanning-tree bpdu-filter 168
spanning-tree bpdu-guard 169
spanning-tree bpdu-guard timeout 170
spanning-tree config-name 171
spanning-tree config-revision 172
spanning-tree cost 173
spanning-tree forward-delay 174
spanning-tree hello-time 174
spanning-tree instance cost 175
spanning-tree instance port-priority 176
spanning-tree instance priority 177
spanning-tree instance vlan 178
spanning-tree link-type 179
spanning-tree loop-guard 180
spanning-tree max-age 181
spanning-tree max-hops 182
spanning-tree mode 182
spanning-tree port-priority 184
spanning-tree port-type 185
spanning-tree priority 186
spanning-tree root-guard 187
spanning-tree rpvst-filter 187
spanning-tree rpvst-guard 188
spanning-tree tcn-guard 189
spanning-tree transmit-hold-count 190
spanning-tree trap 190
MSTP debugging and troubleshooting 193
MSTP FAQ 194
RPVST+ protocol and feature details 196
RPVST+ vPorts 199
RPVST+ configuration tasks 200
Viewing RPVST+ information 202
RPVST+ Considerations and best practices 202
RPVST+ use cases 204
RPVST+ use case: Deterministic root bridges 204
Switch A configuration 205
Switch B configuration 206
Switch C and D configuration 206
Checking the configuration 207
Observe port behavior and state 208
RPVST+ use case: BPDU protection 210
AOS-CX 10.13 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 7
RPVST+ use case: Root protection 213
RPVST+ use case: Spanning tree on edge ports 215
RPVST+ use case: Preventing loops 216
RPVST+ commands 219
clear spanning-tree statistics 219
show capacities rpvst 219
show capacities-status rpvst 220
show spanning-tree 220
show spanning-tree detail 222
show spanning-tree inconsistent-ports 223
show spanning-tree summary port 224
show spanning-tree summary root 225
show spanning-tree vlan 226
show spanning-tree vlan detail 227
spanning-tree bpdu-guard timeout 229
spanning-tree extend-system-id 230
spanning-tree ignore-pvid-inconsistency 230
spanning-tree link-type 232
spanning-tree mode 232
spanning-tree pathcost-type 234
spanning-tree rpvst-mstp interconnect vlan 235
spanning-tree tcn-guard 235
spanning-tree vlan 236
spanning-tree vlan cost 237
spanning-tree vlan port-priority 238
spanning-tree trap 239
RPVST+ debugging and troubleshooting 242
RPVST+ FAQ 243
UDLD 244
Configuring UDLD 245
UDLD scenario 246
UDLD commands 247
clear udld statistics 247
show udld 248
udld 250
udld interval 251
udld mode 253
udld retries 255
Private VLAN 256
Private VLAN commands 261
diag-dump private-vlan basic 261
private-vlan 262
private-vlan port-type 263
show capacities private-vlan 265
show capacities-status private-vlan 265
show private-vlan 266
show private-vlan association 267
show private-vlan inconsistency 268
show private-vlan port-type 270
show running-configuration private-vlan 271
show tech private-vlan 272
Support and Other Resources 274
Accessing Aruba Support 274
Contents |8
Accessing Updates 275
Aruba Support Portal 275
My Networking 275
Warranty Information 275
Regulatory Information 275
Documentation Feedback 276
Chapter 1
About this document
About this document
This document describes features of the AOS-CX network operating system. It is intended for
administrators responsible for installing, configuring, and managing Aruba switches on a network.
Applicable products
This document applies to the following products:
nAruba 8100 Switch Series (R9W94A, R9W95A, R9W96A, R9W97A)
nAruba 8320 Switch Series (JL479A, JL579A, JL581A)
nAruba 8325 Switch Series (JL624A, JL625A, JL626A, JL627A)
nAruba 8360 Switch Series (JL700A, JL701A, JL702A, JL703A, JL706A, JL707A, JL708A, JL709A, JL710A,
JL711A, JL700C, JL701C, JL702C, JL703C, JL706C, JL707C, JL708C, JL709C, JL710C, JL711C, JL704C, JL705C,
JL719C, JL718C, JL717C, JL720C, JL722C, JL721C )
nAruba 9300 Switch Series (R9A29A, R9A30A, R8Z96A)
nAruba 10000 Switch Series (R8P13A, R8P14A)
Latest version available online
Updates to this document can occur after initial publication. For the latest versions of product
documentation, see the links provided in Support and Other Resources.
Command syntax notation conventions
Convention Usage
example-text Identifies commands and their options and operands, code examples,
filenames, pathnames, and output displayed in a command window. Items
that appear like the example text in the previous column are to be entered
exactly as shown and are required unless enclosed in brackets ([ ]).
example-text In code and screen examples, indicates text entered by a user.
Any of the following:
n<example-text>
n<example-text>
nexample-text
nexample-text
Identifies a placeholder—such as a parameter or a variable—that you must
substitute with an actual value in a command or in code:
nFor output formats where italic text cannot be displayed, variables
are enclosed in angle brackets (< >). Substitute the text—including
the enclosing angle brackets—with an actual value.
nFor output formats where italic text can be displayed, variables
might or might not be enclosed in angle brackets. Substitute the
text including the enclosing angle brackets, if any, with an actual
value.
AOS-CX 10.13 Layer-2 Bridging Guide 9
About this document |10
Convention Usage
|Vertical bar. A logical OR that separates multiple items from which you can
choose only one.
Any spaces that are on either side of the vertical bar are included for
readability and are not a required part of the command syntax.
{ } Braces. Indicates that at least one of the enclosed items is required.
[ ] Brackets. Indicates that the enclosed item or items are optional.
or
...
Ellipsis:
nIn code and screen examples, a vertical or horizontal ellipsis indicates an
omission of information.
nIn syntax using brackets and braces, an ellipsis indicates items that can be
repeated. When an item followed by ellipses is enclosed in brackets, zero
or more items can be specified.
About the examples
Examples in this document are representative and might not match your particular switch or
environment.
The slot and port numbers in this document are for illustration only and might be unavailable on your
switch.
Understanding the CLI prompts
When illustrating the prompts in the command line interface (CLI), this document uses the generic term
switch, instead of the host name of the switch. For example:
switch>
The CLI prompt indicates the current command context. For example:
switch>
Indicates the operator command context.
switch#
Indicates the manager command context.
switch(CONTEXT-NAME)#
Indicates the configuration context for a feature. For example:
switch(config-if)#
Identifies the interface context.
Variable information in CLI prompts
In certain configuration contexts, the prompt may include variable information. For example, when in
the VLAN configuration context, a VLAN number appears in the prompt:
switch(config-vlan-100)#
When referring to this context, this document uses the syntax:
switch(config-vlan-<VLAN-ID>)#
Where <VLAN-ID> is a variable representing the VLAN number.
Identifying switch ports and interfaces
AOS-CX 10.13 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 11
Physical ports on the switch and their corresponding logical software interfaces are identified using the
format:
member/slot/port
On the 83xx, 9300, and 10000 Switch Series
nmember: Always 1. VSF is not supported on this switch.
nslot: Always 1. This is not a modular switch, so there are no slots.
nport: Physical number of a port on the switch.
For example, the logical interface 1/1/4 in software is associated with physical port 4 on the switch.
If using breakout cables, the port designation changes to x:y, where x is the physical port and y is the lane when
split to 4 x 10G or 4 x 25G. For example, the logical interface 1/1/4:2 in software is associated with lane 2 on
physical port 4 in slot 1 on member 1.
Chapter 2
Introduction
Introduction
Switches use network bridging to facilitate the interconnection of local area networks (LANs) so that
traffic can be exchanged between devices. Bridging occurs at layer 2 of the OSI model.
When creating network bridges on HPE switches, network administrators can configure MAC addressing,
VLANs, and various loop prevention protocols.
Devices on a network are identified by their MAC address. The switch maintains a MAC address table
where it stores information about the other Ethernet interfaces to which a switch is connected. The table
enables the switch to send outgoing data (Ethernet frames) on the specific port required to reach its
destination, instead of broadcasting the data on all ports (flooding).
VLANs are primarily used to provide network segmentation at layer 2. VLANs enable the grouping of
users by logical function instead of physical location. Layer 2 VLANs can be associated with a single
physical port, or multiple aggregated ports (referred to as LAG, short form for Link Aggregation). Link
Aggregation enables a logical grouping of individual interfaces to function as a single, higher-speed link,
providing dramatically increased bandwidth. This mechanism provides network resiliency when
individual link failures occur. Aruba switches include advanced network resiliency through MCLAG (Multi
Chassis Link Aggregation) which offers network resiliency on individual device failure as well.
When multiple individual links are connected to one another, there is a possibility that multiple paths
(loops) will exist between devices. Loops reduce network operational efficiency. AOS-CX provides several
features to detect and avoid loops, including:
nMSTP: Multiple-Instance spanning tree protocol (MSTP) ensures that only one active path exists
between any two nodes in a spanning tree instance. A spanning tree instance comprises a unique set
of VLANs, and belongs to a specific spanning tree region. A region can comprise multiple spanning
tree instances (each with a different set of VLANs), and allows one active path among regions in a
network.
nRPVST+: Rapid Per VLAN Spanning Tree+ (RPVST+) is an updated implementation of STP (Spanning
Tree Protocol). It enables the creation of a separate spanning tree for each VLAN on a switch, and
ensures that only one active, loop-free path exists between any two nodes on a given VLAN.
nLoop Protection: In cases where spanning tree protocols cannot be used to prevent loops at the edge
of the network, loop protection may provide a suitable alternative. Loop protection can find loops in
untagged layer 2 links, as well as on tagged VLANs.
AOS-CX also supports the MVRP (Multiple VLAN Registration Protocol), a registration protocol defined by
IEEE, which propagates VLAN information dynamically across devices. It also enables devices to learn
and automatically synchronize VLAN configuration information, reducing the configuration workload.
Additionally, AOS-CX supports the Unidirectional Link Detection (UDLD) protocol. UDLD monitors the link
between two network devices, and if the link fails, blocks the ports on both ends of the link. UDLD is
useful for detecting failures in fiber links and trunks.
AOS-CX 10.13 Layer-2 Bridging Guide 12
Chapter 3
MAC address table
MAC address table
The MAC address table is where the switch stores information about the other Ethernet interfaces to
which it is connected on a network. The table enables the switch to send outgoing data (Ethernet
frames) on the specific port required to reach its destination, instead of broadcasting the data on all
ports (flooding).
The MAC address table can contain two types of entries:
nStatic: Static entries are manually added to the table by a switch administrator. Static entries have
higher priority than dynamic entries. Static entries remain active until they are removed by the switch
administrator.
nDynamic: Dynamic entries are automatically added to the table through a process called MAC
learning, in which the switch retrieves the source MAC address (and VLAN ID, if present) of each
Ethernet frame received on a port. If the retrieved address does not exist in the table, it is added.
Dynamic entries remain in the table for a predetermined amount of time (defined with the command
mac-address-table age-time), after which they are automatically deleted.
Dynamic MAC address learning does not distinguish between illegitimate and legitimate frames, which
can invite security hazards. When Host A is connected to port A, a MAC address entry will be learned for
the MAC address of Host A (for example, MAC A). When an illegal user sends frames with MAC A as the
source MAC address to port B, the device performs the following operations:
1. Learns a new MAC address entry with port B as the outgoing interface and overwrites the old
entry for MAC A.
2. Forwards frames destined for MAC A out of port B to the illegal user.
As a result, the illegal user obtains the data of Host A. To improve the security for Host A, manually
configure a static entry to bind Host A to port A. Then, the frames destined for Host A are always sent
out of port A. Other hosts using the forged MAC address of Host A cannot obtain the frames destined
for Host A.
For example, in the following topology, switch A learns the MAC addresses of ports on switch B, C, and D.
This way, traffic between any two switches is not broadcast to the other switches. For example, if server
1 sends traffic to server 3, it does not get broadcast onto the link to switch C, only on the link to switch D.
AOS-CX 10.13 Layer-2 Bridging Guide 13
MAC address table |14
MAC address table commands
clear mac-address
clear mac-address {interface <INTERFACE> | port <PORT-NUM> [vlan <VLAN-ID>] | vlan <VLAN-
ID> [port <PORT-NUM>] | <MAC-ADDR> [vlan <VLAN-ID>] [force]| <mac-address mac-move
[address <mac-address> vlan <vlan>] | [vlan <VLAN>]
<VLAN-ID>]}
Description
Clears the dynamic learned MAC addresses on the specified interface, combination of interface and
VLAN, port, VLAN, combination of port and VLAN, MACaddress, or combination of MAC address and
VLAN. The command does not clear any port-security learned MAC addresses.
Port-security MACaddresses are cleared when the port on which the MAC addresses were learned are
shut down or the port-access-security feature is disabled on the port or the switch.
Parameter Description
<INTERFACE> Specifies the list of interfaces, for example, 1/1/1 or 1/1/1-
1/1/3 or lag1 or vxlan1.
<PORT-NUM> Specifies a physical port on the switch. Format:
member/slot/port.
<VLAN-ID> Specifies the number of a VLAN.
<MAC-ADDR> Specifies the MACaddress.
<mac-address mac-move> Clears the MAC move count and move history for a specified list
or range of VLANs, or for a specific MAC address and VLANs.
AOS-CX 10.13 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 15
Parameter Description
When the MAC address and VLANs are not mentioned, the
statistics for all MAC addresses are cleared.
force Clears the specified MAC address even if the MAC address is
internally programmed by MAC management.
Examples
Clearing the learned MAC addresses on a port:
switch# clear mac-address port 1/1/1
Clearing the learned MAC addresses on a combination of a VLAN and a port:
switch# clear mac-address port 1/1/1 vlan 20
switch# clear mac-address vlan 2 port 1/1/3
Clearing the learned MAC addresses on a combination of a VLAN and an interface or a list of interfaces:
switch# clear mac-address interface 1/1/1 vlan 10
switch# clear mac-address vlan 1 interface 1/1/1-1/1/3
Clearing the specified MAC addresses entry on the VLAN:
switch# clear mac-address 14:FA:01:F1:8B:8F vlan 1
Clearing the specified MAC addresses entry by force:
switch# clear mac-address 14:FA:01:F1:8B:8F force
Clearing the learned MAC move addresses on a port:
switch# clear mac-address mac-move
Clearing the learned MAC move addresses on a combination of a VLAN and an interface or a list of
interfaces:
switch# clear mac-address mac-move address 00:00:00:00:00:01 vlan 10
Clearing the MAC move addresses entries on the VLAN:
MAC address table |16
switch# clear mac-address mac-move vlan 10-20
Command History
Release Modification
10.13 The mac-address mac-move parameter was introduced.
10.09 Added parameters for interface and MAC address.
10.07 or earlier --
Command Information
Platforms Command context Authority
All platforms Manager (#)Administrators or local user group members with execution rights
for this command.
clear mac-address-table
clear mac-address-table
address <mac-address>
vlan <1-4094>
Description
This command is used to clear the MAC move count and move history for a single MAC address or
VLAN, or for a range of VLANs. If no specific MAC address or VLAN is specified, this command clears
statistics for all MAC addresses.
Parameter Description
address (Optional) Clear information for a specific MAC address.
vlan <1-4094> (Optional) Clear move information for specific VLAN.
Examples
Clearing MAC move statistics for all MAC addresses.
switch# clear mac-address mac-move
Clearing MAC move statistics for MAC addresses in a range of VLANs.
switch# clear mac-address mac-move vlan 10-20
Clearing MAC move addresses from a specific MAC address and VLAN:
switch# clear mac-address mac-move address 00:00:00:00:00:01 vlan 10
AOS-CX 10.13 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 17
Command History
Release Modification
10.13 or earlier Command introduced.
Command Information
Platforms Command context Authority
All platforms Operator (>) or Manager
(#)
Operators or Administrators or local user group members with
execution rights for this command. Operators can execute this
command from the operator context (>) only.
mac-address-table age-time
mac-address-table age-time <SECONDS>
no mac-address-table age-time [<SECONDS>]
Description
Sets the maximum amount of time a MAC address remains in the MAC address table. When this time
expires, the MAC address is removed.
The no form of this command resets the MAC aging timer to the default value (300 seconds).
Parameter Description
age-time <SECONDS> Specifies the MAC address aging time in seconds. Range: 60 to
3600. Default: 300.
Example
switch(config)# mac-address-table age-time 120
Command History
Release Modification
10.07 or earlier --
Command Information
Platforms Command context Authority
All platforms config Administrators or local user group members with execution rights
for this command.
show mac-address-table
show mac-address-table [hsc] [vsx-peer]
Description
MAC address table |18
Shows MAC address table information. If HSC is enabled, MAC addresses discovered by the HSC
manager are also displayed.
Parameter Description
[hsc] Displays only MAC address discovered by the HSC manager on the
remote controller.
vsx-peer Shows the output from the VSX peer switch. If the switches do not
have the VSX configuration or the ISL is down, the output from the
VSX peer switch is not displayed. This parameter is available on
switches that support VSX.
Examples
Showing output when table entries exist:
switch# show mac-address-table
MAC age-time : 300 seconds
Number of MAC addresses : 5
MAC Address VLAN Type Port
--------------------------------------------------
00:00:00:00:00:05 1 dynamic 1/1/2
00:00:00:00:00:06 2 dynamic 1/1/1
00:00:00:00:00:08 3 hsc vxlan1(10.1.1.1)
00:00:00:00:00:12 3 hsc vxlan1(10.1.1.3)
00:00:00:00:00:34 3 hsc vxlan1(10.1.1.4)
Showing output that includes information about an IPv6 VXLAN:
3C-T-6300-27# show mac-address-table
MAC age-time : 300 seconds
Number of MAC addresses : 2
MAC Address VLAN Type Port
--------------------------------------------------------------
00:50:56:8d:44:13 1001 dynamic 1/1/2
00:50:56:8d:45:63 1002 evpn vxlan1(1920:1680:1:1::2)
Showing output when there are no MAC table entries:
switch# show mac-address-table
No MAC entries found.
Showing only MAC address discovered by the HSC manager:
switch# show mac-address-table hsc
Number of MAC addresses : 3
MAC Address VLAN Type Port
---------------------------------------------------------
00:00:00:00:00:08 3 hsc vxlan1(10.1.1.1)
00:00:00:00:00:12 3 hsc vxlan1(10.1.1.3)
00:00:00:00:00:34 3 hsc vxlan1(10.1.1.4)
Command History
AOS-CX 10.13 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 19
Release Modification
10.07 or earlier --
Command Information
Platforms Command context Authority
All platforms Operator (>) or Manager
(#)
Operators or Administrators or local user group members with
execution rights for this command. Operators can execute this
command from the operator context (>) only.
show mac-address-table address
show mac-address-table address <MAC-ADDR> [vsx-peer]
Description
Shows MAC address table information for a specific MAC address.
Parameter Description
<MAC-ADDR> Specifies the MAC address.
vsx-peer Shows the output from the VSX peer switch. If the switches do not
have the VSX configuration or the ISL is down, the output from the
VSX peer switch is not displayed. This parameter is available on
switches that support VSX.
Example
switch# show mac-address-table address 00:00:00:00:00:01
MAC age-time : 300 seconds
Number of MAC addresses : 2
MAC Address VLAN Type Port
--------------------------------------------------
00:00:00:00:00:01 2 dynamic 1/1/1
00:00:00:00:00:01 1 dynamic 1/1/1
Command History
Release Modification
10.07 or earlier --
Command Information
Platforms Command context Authority
All platforms Operator (>) or Manager
(#)
Operators or Administrators or local user group members with
execution rights for this command. Operators can execute this
command from the operator context (>) only.
MAC address table |20
show mac-address-table count
show mac-address-table count
[dynamic | port <PORT-NUM> | vlan <VLAN-ID>] [vsx-peer]
Description
Displays the number of MAC addresses.
Parameter Description
dynamic Show the count of dynamically learned MAC addresses.
<PORT-NUM> Specifies a physical port on the switch. Format:
member/slot/port.
vlan <VLAN-ID> Specifies the number of a VLAN.
vsx-peer Shows the output from the VSX peer switch. If the switches do not
have the VSX configuration or the ISL is down, the output from the
VSX peer switch is not displayed. This parameter is available on
switches that support VSX.
Examples
Showing the number of MAC addresses:
switch# show mac-address-table count
Number of MAC addresses : 8
Showing the number of dynamically learned MAC addresses:
switch# show mac-address-table count dynamic
Number of MAC addresses : 8
Showing the number of MAC addresses per physical port on the switch:
switch# show mac-address-table count port 1/1/1
Number of MAC addresses : 2
Showing the number of MAC addresses per VLAN:
switch# show mac-address-table count vlan 100
Number of MAC addresses : 5
Showing the number of MAC addresses on the VSX primary and secondary (peer) switch:
vsx-primary# show mac-address-table count
Number of MAC addresses : 26114
vsx-primary# show mac-address-table count vsx-peer
Number of MAC addresses : 26113
Command History
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276

Aruba R9G11A User guide

Category
Networking
Type
User guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI