Allied Telesis x600-24Ts, x600-24Ts/XP, x600-48Ts, x600-48Ts/XP Software Reference Manual

  • Hello! I am an AI chatbot trained to assist you with the Allied Telesis x600-24Ts Software Reference Manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
x600 Series Switches
AlliedWare Plus Operating System
Software Reference for Version 5.3.1
x600-24Ts
x600-24Ts/XP
x600-48Ts
x600-48Ts/XP
C613-50006-01-Rev B
Software Reference for Allied Telesis x600 Series Switches
ii AlliedWare PlusTM Operating System - Software Version 5.3.1-01 C613-50006-01 REV B
Acknowledgements
This product includes software developed by the University of California, Berkeley and its
contributors. Copyright ©1982, 1986, 1990, 1991, 1993 The Regents of the University of
California. All rights reserved
This product includes software licensed under the GNU General Public License available from:
http://www.gnu.org/licenses/gpl2.html
Source code for all GPL licensed software in this product can be obtained from the
Allied Telesis GPL Code Download Centre at:
http://www.alliedtelesis.com/support/default.aspx
Allied Telesis is committed to meeting the requirements of the open source licenses including
the GNU General Public License (GPL) and will make all required source code available.
If you would like a copy of the GPL source code contained in Allied Telesis products, please
send us a request by registered mail including a cheque for US$15 to cover production and
shipping costs and a CD with the GPL code will be mailed to you.
GPL Code Request
Allied Telesis Labs (Ltd)
PO Box 8011
Christchurch.
New Zealand
Copyright © 2008 Allied Telesis, Inc. All Rights Reserved.
This documentation is subject to change without notice. No part of this publication may be
reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or
mechanical, including photocopying and recording for any purpose other than the purchaser’s
internal use without the written permission of Allied Telesis, Inc.
Allied Telesis and AlliedWare Plus are trademarks or registered trademarks in the United States
and elsewhere of Allied Telesis, Inc. Adobe, Acrobat, and Reader are either registered
trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other
countries. Additional brands, names and products mentioned herein may be trademarks of
their respective companies.
Getting the most from this manual
Although you can view this document using Acrobat version 5, to get the best from
this manual, we recommend using Adobe Acrobat Reader version 8.
You can download Acrobat Reader 8 free from http://www.adobe.com/
Software Reference for Allied Telesis x600 Series Switches
C613-50006-01 REV B AlliedWare PlusTM Operating System - Software Version 5.3.1-01 iii
What’s new in AlliedWare Plus 5.3.1?
Loop Protection
Thrash Limiting
Loop Protection Thrash Limiting, also known as Rapid MAC Movement, detects and resolves
network loops.
See Chapter 14, Loop Protection for information about the Loop Protection feature.
Loop Detection Loop Detection works in conjunction with Thrash Limiting. With Thrash Limiting, the switch
only detects a loop when a storm has occurred. Loop Detection sends special packets that the
switch listens for.
See Chapter 14, Loop Detection for information about the Loop Detection feature.
IPv6 AlliedWare Plus lets you prepare your network for IPv6. As well as allowing wire-speed IPv6
unicast traffic routing and forwarding, IPv6 support enables your switch to tunnel IPv6 traffic
over IPv4 networks, and with MLD Snooping, to intelligently manage IPv6 multicast streams.
See the following chapters for more information on IPv6:
“IPv6 Introduction” on page 24.1
“IPv6 Commands” on page 25.1
“IPv6to4 Tunneling Commands” on page 27.1
“IPv6to4 Tunneling Configuration” on page 26.1
“RIP Configuration” on page 31.1
“RIP Commands” on page 32.1.
Graphical User
Interface (GUI)
The GUI delivers maximum benefits with minimal complexity. The AlliedWare Plus GUI
provides extensive monitoring capabilities, and essential configuration capabilities.
For more information on the AlliedWare Plus GUI, see, “Appendix C: GUI Reference”.
Broadcast
Forwarding
In a Wake-on-LAN environment, an L3 switch needs to forward the Wake on LAN broadcast
packets across different subnets. Normal operation would limit the broadcast to all devices on
the same subnet, but with Broadcast Forwarding, you can configure the L3 switch to allow
broadcast packets to reach other subnets too.
See the command, “ip directed-broadcast” on page 23.12 for more information.
IP Helper When an L3 switch is configured as an IP Helper, the switch can relay broadcasts from clients in
different subnets to their destination, instead of blocking them. With IP Helper, Windows client
machines can be on a different subnet to the Windows server, and NetBIOS broadcasts that
are fundamental to the Windows network can still successfully pass between the switches.
See the commands, “ip helper-address” on page 23.15, and “ip forward-protocol
udp” on page 23.13 for more information.
MLD Snooping MLD Snooping reduces the amount of multicast traffic on a network by sending the streams
only to interested recipients, instead of flooding to all recipients. This results in far more
efficient use of network bandwidth.
See the command “ipv6 mld snooping” on page 47.10 for more information.
PIM Dense Mode PIM Dense Mode (PIM-DM), which is easier to configure than PIM Sparse Mode (PIM-SM), is
used in situations where there is plenty of bandwidth and a high number of recipients - for
example in LAN environments.
Software Reference for Allied Telesis x600 Series Switches
iv AlliedWare PlusTM Operating System - Software Version 5.3.1-01 C613-50006-01 REV B
See the chapters “PIM-DM Commands” on page 46.1, “PIM-DM Configuration” on
page 45.1 for information on the PIM Dense Mode feature.
New 5.3.1
Commands
See Appendix A: Command List and Appendix B: Release Notes for links to commands
introduced into the AlliedWare Plus 5.3.1software release.
Software Reference for Allied Telesis x600 Series Switches
C613-50006-01 REV B AlliedWare PlusTM Operating System - Software Version 5.3.1-01 v
Table of Contents
Part 1 Setting up the Switch
Chapter 1. Getting Started ..................................................................................................1.1
Introduction..................................................................................................................................................................................................... 1.2
How to log-in................................................................................................................................................................................................. 1.2
How to get command help ................................................................................................................................................................... 1.2
Viewing a list of valid parameters..................................................................................................................................... 1.3
Completing keywords............................................................................................................................................................. 1.7
Viewing command error messages ................................................................................................................................. 1.9
How to work with command modes ............................................................................................................................................1.10
How to see the current configuration...........................................................................................................................................1.14
Default settings............................................................................................................................................................................................1.15
The default configuration script .........................................................................................................................................................1.16
How to change the password............................................................................................................................................................1.17
How to set a management IP address ..........................................................................................................................................1.17
How to save and boot from the current configuration.......................................................................................................1.18
How to save to the default configuration file..........................................................................................................1.18
How to create and use a new configuration file ...................................................................................................1.18
How to return to the factory defaults...........................................................................................................................................1.20
How to see system information........................................................................................................................................................1.21
Viewing overall system information ..............................................................................................................................1.21
Viewing temperature, voltage, and fan status..........................................................................................................1.22
Viewing the serial number..................................................................................................................................................1.23
How to set system parameters .........................................................................................................................................................1.23
How to change the telnet session timeout ..............................................................................................................1.23
How to name the switch ....................................................................................................................................................1.24
How to display a text banner at login.........................................................................................................................1.24
How to set the time and date ...........................................................................................................................................................1.26
How to show current settings .........................................................................................................................................1.26
How to set the time and date .........................................................................................................................................1.26
How to set the timezone..................................................................................................................................................1.26
How to configure summer-time.....................................................................................................................................1.27
How to add and remove users..........................................................................................................................................................1.28
Pre-encrypted passwords....................................................................................................................................................1.28
How to undo settings..............................................................................................................................................................................1.30
How to use the no parameter .........................................................................................................................................1.30
How to use the default parameter................................................................................................................................1.30
How to upgrade the firmware...........................................................................................................................................................1.31
Controlling “show” command output ...........................................................................................................................................1.32
Commands available in each mode.................................................................................................................................................1.34
User Exec mode ......................................................................................................................................................................1.34
Privileged Exec mode............................................................................................................................................................1.35
Global Configuration mode...............................................................................................................................................1.36
AlliedWare Plus GUI................................................................................................................................................................................1.38
Software Reference for Allied Telesis x600 Series Switches
vi AlliedWare PlusTM Operating System - Software Version 5.3.1-01 C613-50006-01 REV B
Chapter 2. Command Syntax Conventions in this Software Reference .........................2.1
Chapter 3. Start-up Sequence .............................................................................................3.1
AlliedWare Plus™ Start-up.................................................................................................................................................................... 3.2
Diagnostic menu........................................................................................................................................................................................... 3.2
Bootloader menu......................................................................................................................................................................................... 3.4
Start-up sequence........................................................................................................................................................................................ 3.8
Chapter 4. CLI Navigation Commands ..............................................................................4.1
Introduction..................................................................................................................................................................................................... 4.2
Chapter 5. User Access Commands ...................................................................................5.1
Introduction..................................................................................................................................................................................................... 5.2
Chapter 6. Creating and Managing Files.............................................................................6.1
Introduction..................................................................................................................................................................................................... 6.2
Working with files........................................................................................................................................................................................ 6.2
Listing files ...................................................................................................................................................................................... 6.2
Displaying the contents of configuration and text files........................................................................................ 6.4
Navigating through the file system................................................................................................................................... 6.4
Using the editor.......................................................................................................................................................................... 6.6
Creating and Using Configuration Files ........................................................................................................................................... 6.7
Creating a Configuration File .............................................................................................................................................. 6.7
Specifying the Start-up Configuration Script.............................................................................................................. 6.7
Working with Configuration Files..................................................................................................................................... 6.8
Copying Files To and From Your Device ...................................................................................................................................... 6.9
URL Syntax.................................................................................................................................................................................... 6.9
Copying files.................................................................................................................................................................................. 6.9
Copying from a Server to Running Configuration................................................................................................6.12
Chapter 7. File Management Commands ..........................................................................7.1
Introduction..................................................................................................................................................................................................... 7.3
Chapter 8. System Configuration and Monitoring Commands .......................................8.1
Introduction..................................................................................................................................................................................................... 8.2
Chapter 9. Debugging and Logging .....................................................................................9.1
Introduction..................................................................................................................................................................................................... 9.2
Debugging ........................................................................................................................................................................................................ 9.2
Logging to terminal................................................................................................................................................................... 9.2
Turning off debugging.............................................................................................................................................................. 9.2
Logging ............................................................................................................................................................................................................... 9.3
Log Outputs ................................................................................................................................................................................. 9.3
Chapter 10. Logging Commands.......................................................................................10.1
Chapter 11. Scripting Commands.....................................................................................11.1
Chapter 12. Interface Commands.....................................................................................12.1
Introduction...................................................................................................................................................................................................12.2
Software Reference for Allied Telesis x600 Series Switches
C613-50006-01 REV B AlliedWare PlusTM Operating System - Software Version 5.3.1-01 vii
Chapter 13. Interface Testing Commands.......................................................................13.1
Introduction...................................................................................................................................................................................................13.2
Part 2 Layer Two Switching
Chapter 14. Switching Introduction..................................................................................14.1
Introduction...................................................................................................................................................................................................14.2
Physical Layer Information ....................................................................................................................................................................14.3
Switch Ports................................................................................................................................................................................14.3
Port ranges ..................................................................................................................................................................................14.3
Activating and Deactivating Switch Ports ..................................................................................................................14.4
Autonegotiation........................................................................................................................................................................14.4
Duplex mode.............................................................................................................................................................................14.4
Speed options............................................................................................................................................................................14.4
Configuring the port speed................................................................................................................................................14.5
MDI MDIX Connection Modes (10BASE-T) ..........................................................................................................14.5
The Layer 2 Switching Process ..........................................................................................................................................................14.7
The Ingress Rules.....................................................................................................................................................................14.7
The Learning Process ............................................................................................................................................................14.8
The Forwarding Process ......................................................................................................................................................14.9
The Egress Rules ......................................................................................................................................................................14.9
Layer 2 Filtering........................................................................................................................................................................................14.10
Ingress Filtering.......................................................................................................................................................................14.10
Channel Groups (Link Aggregation)............................................................................................................................................14.11
Static Channel Groups.......................................................................................................................................................14.11
LACP Channel Groups .....................................................................................................................................................14.11
Storm Control ..........................................................................................................................................................................................14.13
Loop Protection.......................................................................................................................................................................................14.14
Loop Detection ....................................................................................................................................................................14.14
Thrash Limiting.......................................................................................................................................................................14.15
Port Mirroring ...........................................................................................................................................................................................14.16
Port Security ..............................................................................................................................................................................................14.17
MAC Address Learn Limits.............................................................................................................................................14.17
IEEE 802.1X .............................................................................................................................................................................14.17
Quality of Service....................................................................................................................................................................................14.18
IGMP Snooping ........................................................................................................................................................................................14.19
Chapter 15. Switching Commands....................................................................................15.1
Chapter 16. VLAN Introduction........................................................................................16.1
Introduction...................................................................................................................................................................................................16.2
Configuring VLANs.................................................................................................................................................................16.3
VLAN Double Tagging (VLAN Stacking).....................................................................................................................................16.5
How double-tagged VLANs work.................................................................................................................................16.5
VLAN Rules for Double Tagging....................................................................................................................................16.5
Restrictions when using Double-Tagged VLANs..................................................................................................16.6
Configuring Double-Tagged VLANs.............................................................................................................................16.6
Private VLANs .............................................................................................................................................................................................16.8
Membership Rules...................................................................................................................................................................16.8
Promiscuous Ports ..................................................................................................................................................................16.9
Host Ports....................................................................................................................................................................................16.9
Private VLAN Operation .................................................................................................................................................16.10
Example Configuration......................................................................................................................................................16.11
Software Reference for Allied Telesis x600 Series Switches
viii AlliedWare PlusTM Operating System - Software Version 5.3.1-01 C613-50006-01 REV B
Chapter 17. VLAN Commands .........................................................................................17.1
VLAN Commands.....................................................................................................................................................................................17.2
Chapter 18. Spanning Tree Introduction:
STP, RSTP, and MSTP18.1
Introduction...................................................................................................................................................................................................18.2
Overview of Spanning Trees...............................................................................................................................................................18.2
Spanning tree operation ......................................................................................................................................................18.2
Spanning tree modes.............................................................................................................................................................18.4
Spanning Tree Protocol (STP) ...........................................................................................................................................................18.5
Configuring STP ..........................................................................................................................................................................................18.5
Rapid Spanning Tree Protocol (RSTP) ..........................................................................................................................................18.6
Configuring RSTP.......................................................................................................................................................................................18.8
Multiple Spanning Tree Protocol (MSTP).................................................................................................................................18.10
Multiple Spanning Tree Instances (MSTI) ...............................................................................................................18.11
MSTP Regions.........................................................................................................................................................................18.12
Common and Internal Spanning Tree (CIST)......................................................................................................18.14
MSTP Bridge Protocol Data Units (BPDUs).........................................................................................................18.16
Configuring MSTP...................................................................................................................................................................................18.18
Chapter 19. Spanning Tree Commands ...........................................................................19.1
Introduction...................................................................................................................................................................................................19.2
Chapter 20. Link Aggregation Configuration...................................................................20.1
Introduction...................................................................................................................................................................................................20.2
Configuring LACP......................................................................................................................................................................................20.2
Chapter 21. Link Aggregation Commands ......................................................................21.1
Introduction...................................................................................................................................................................................................21.2
Part 3 Layer Three, Switching and Routing
Chapter 22. Internet Protocol (IP) Addressing and Protocols ......................................22.1
Introduction...................................................................................................................................................................................................22.2
Address Resolution Protocol (ARP)...............................................................................................................................................22.3
Static ARP Entries....................................................................................................................................................................22.3
Timing Out ARP Entries ......................................................................................................................................................22.3
Deleting ARP Entries .............................................................................................................................................................22.4
Proxy ARP ...................................................................................................................................................................................22.4
Domain Name System (DNS)...........................................................................................................................................................22.7
Internet Control Message Protocol (ICMP) ...............................................................................................................................22.9
ICMP Router Discovery Protocol (IRDP).................................................................................................................................22.10
Checking IP Connections ...................................................................................................................................................................22.13
Ping................................................................................................................................................................................................22.13
Traceroute................................................................................................................................................................................22.13
IP Helper......................................................................................................................................................................................................22.14
IP Directed Broadcast...........................................................................................................................................................................22.14
Chapter 23. IP Addressing and Protocol Commands .....................................................23.1
Introduction...................................................................................................................................................................................................23.2
Software Reference for Allied Telesis x600 Series Switches
C613-50006-01 REV B AlliedWare PlusTM Operating System - Software Version 5.3.1-01 ix
Chapter 24. IPv6 Introduction ...........................................................................................24.1
Introduction...................................................................................................................................................................................................24.2
Overview ........................................................................................................................................................................................................24.2
IPv6 Addresses and Prefixes................................................................................................................................................................24.3
Address types ............................................................................................................................................................................24.3
IPv6 Headers..............................................................................................................................................................................24.4
The Internet Control Message Protocol (ICMPv6) .............................................................................................24.7
IPv6 Routing................................................................................................................................................................................24.9
Integration of IPv4 and IPv6............................................................................................................................................24.10
IPv6 on your Switch...............................................................................................................................................................................24.10
Enabling IPv6............................................................................................................................................................................24.10
The 6bone Network ..........................................................................................................................................................24.10
Chapter 25. IPv6 Commands.............................................................................................25.1
Introduction...................................................................................................................................................................................................25.2
Chapter 26. IPv6to4 Tunneling Configuration.................................................................26.1
Introduction...................................................................................................................................................................................................26.2
6to4 Automatic Tunnel Configuration ..........................................................................................................................................26.2
Tunneling Operation .............................................................................................................................................................26.2
6to4 tunnels operation and configuration summary ...........................................................................................26.3
Sample 6to4 configuration .................................................................................................................................................26.4
Chapter 27. IPv6to4 Tunneling Commands.....................................................................27.1
Introduction...................................................................................................................................................................................................27.2
Chapter 28. Routing Protocol Overview ..........................................................................28.1
Introduction...................................................................................................................................................................................................28.2
RIP.......................................................................................................................................................................................................................28.2
OSPF .................................................................................................................................................................................................................28.2
BGP....................................................................................................................................................................................................................28.3
PIM-SM.............................................................................................................................................................................................................28.4
VRRP .................................................................................................................................................................................................................28.4
Chapter 29. Route Selection ..............................................................................................29.1
Introduction...................................................................................................................................................................................................29.2
Types of Routes..........................................................................................................................................................................................29.2
Interface Routes........................................................................................................................................................................29.2
Static Routes...............................................................................................................................................................................29.2
Dynamic Routes .......................................................................................................................................................................29.2
RIB and FIB Routing Tables ..................................................................................................................................................................29.4
Administrative Distance .......................................................................................................................................................29.4
Equal Cost Multipath Routing...........................................................................................................................................29.5
How the AlliedWare PlusTM OS Adds Routes .....................................................................................................29.7
How the AlliedWare PlusTM OS Deletes Routes................................................................................................29.8
Chapter 30. Routing Commands.......................................................................................30.1
Introduction...................................................................................................................................................................................................30.2
Chapter 31. RIP Configuration ..........................................................................................31.1
Introduction...................................................................................................................................................................................................31.2
Software Reference for Allied Telesis x600 Series Switches
x AlliedWare PlusTM Operating System - Software Version 5.3.1-01 C613-50006-01 REV B
Enabling RIP...................................................................................................................................................................................................31.2
Specifying the RIP version .....................................................................................................................................................................31.3
RIPv2 authentication (single key) ......................................................................................................................................................31.4
RIPv2 text authentication (multiple keys) ....................................................................................................................................31.6
RIPv2 md5 authentication (multiple keys)...................................................................................................................................31.9
Chapter 32. RIP Commands ..............................................................................................32.1
Introduction...................................................................................................................................................................................................32.2
Chapter 33. RIPng Configuration ......................................................................................33.1
Introduction...................................................................................................................................................................................................33.2
Enabling RIPng..............................................................................................................................................................................................33.2
Troubleshooting RIPng Adjacency ...................................................................................................................................................33.4
Step 1. Confirm the Interface is not shutdown......................................................................................................33.4
Step 2. Confirm RIPng is enabled on the Interface..............................................................................................33.4
Step 3. Check the Interface is not a Passive Interface........................................................................................33.5
Step 4. Ensure RIPng Advertisements get exchanged........................................................................................33.5
Chapter 34. RIPng Commands ..........................................................................................34.1
Introduction...................................................................................................................................................................................................34.2
Chapter 35. OSPF Configuration ......................................................................................35.1
Introduction...................................................................................................................................................................................................35.2
Terminology..................................................................................................................................................................................................35.2
Enabling OSPF on an Interface...........................................................................................................................................................35.3
Setting priority..............................................................................................................................................................................................35.4
Configuring an Area Border Router................................................................................................................................................35.6
Redistributing routes into OSPF........................................................................................................................................................35.7
OSPF Cost .....................................................................................................................................................................................................35.8
Configuring Virtual Links .....................................................................................................................................................................35.10
OSPF Authentication ............................................................................................................................................................................35.11
Chapter 36. OSPF Commands ..........................................................................................36.1
Introduction...................................................................................................................................................................................................36.3
Chapter 37. BGP Configuration ........................................................................................37.1
Introduction...................................................................................................................................................................................................37.2
Enabling BGP Peers in the same AS ...............................................................................................................................................37.2
Enabling BGP between different Autonomous Systems.....................................................................................................37.3
Route-Map.....................................................................................................................................................................................................37.4
Route Reflector...........................................................................................................................................................................................37.6
Confederations............................................................................................................................................................................................37.8
Chapter 38. BGP Commands ............................................................................................38.1
Introduction...................................................................................................................................................................................................38.4
Chapter 39. Route Map Commands..................................................................................39.1
Introduction...................................................................................................................................................................................................39.2
Software Reference for Allied Telesis x600 Series Switches
C613-50006-01 REV B AlliedWare PlusTM Operating System - Software Version 5.3.1-01 xi
Part 4 Multicast Applications
Chapter 40. IGMP Snooping Configuration .....................................................................40.1
Introduction...................................................................................................................................................................................................40.2
Configuring Switch 1................................................................................................................................................................................40.3
Chapter 41. IGMP Multicast Commands..........................................................................41.1
Introduction...................................................................................................................................................................................................41.2
Chapter 42. Common Multicast Commands ...................................................................42.1
Introduction...................................................................................................................................................................................................42.2
Chapter 43. PIM-SM Configuration...................................................................................43.1
Introduction...................................................................................................................................................................................................43.2
PIM Sparse Mode ....................................................................................................................................................................43.2
Chapter 44. PIM-SM Commands.......................................................................................44.1
Introduction...................................................................................................................................................................................................44.2
Chapter 45. PIM-DM Configuration ..................................................................................45.1
Introduction...................................................................................................................................................................................................45.2
Characteristics of PIM-DM.................................................................................................................................................45.2
PIM-DM Terminology ...........................................................................................................................................................45.3
PIM-DM Configuration ...........................................................................................................................................................................45.4
Configuration Example.........................................................................................................................................................45.4
Verifying Configuration ...........................................................................................................................................................................45.8
Chapter 46. PIM-DM Commands ......................................................................................46.1
Introduction...................................................................................................................................................................................................46.2
Chapter 47. MLD Snooping Commands...........................................................................47.1
Introduction...................................................................................................................................................................................................47.2
Part 5 Access and Security
Chapter 48. Access Control Lists Introduction ...............................................................48.1
Introduction...................................................................................................................................................................................................48.2
Classifying Your Traffic............................................................................................................................................................................48.3
Security Access Control Lists............................................................................................................................................48.3
QoS Access Control Lists...................................................................................................................................................48.3
ACL Types.....................................................................................................................................................................................................48.4
Hardware MAC Access Control Lists .........................................................................................................................48.4
Hardware IP Access Control Lists .................................................................................................................................48.5
Actions for Hardware Access Control Lists.............................................................................................................48.6
Applying Access Control Lists............................................................................................................................................................48.7
Attaching Access Control Lists to a Port.....................................................................................................................................48.8
Filtering with the QoS Match Commands................................................................................................................................48.10
TCP Flags...................................................................................................................................................................................48.10
Software Reference for Allied Telesis x600 Series Switches
xii AlliedWare PlusTM Operating System - Software Version 5.3.1-01 C613-50006-01 REV B
Chapter 49. Access Control List (ACL) Commands.......................................................49.1
Introduction...................................................................................................................................................................................................49.2
Chapter 50. Quality of Service (QoS) ...............................................................................50.1
Introduction...................................................................................................................................................................................................50.2
QoS Operations.......................................................................................................................................................................50.2
QoS Packet Information ........................................................................................................................................................................50.3
Link Layer QOS........................................................................................................................................................................50.3
Differentiated Services Architecture.............................................................................................................................50.4
The Differential Services Field..........................................................................................................................................50.6
Processing pre-marked packets.......................................................................................................................................50.7
Applying QoS on Your Switch...........................................................................................................................................................50.8
Classifying your Data .............................................................................................................................................................50.8
Class Maps...................................................................................................................................................................................50.8
Policy Maps...............................................................................................................................................................................50.11
Premarking and Remarking your Traffic.....................................................................................................................................50.12
CoS to egress queue premarking................................................................................................................................50.12
DSCP to egress queue premarking............................................................................................................................50.14
Policing (Metering) Your Data ........................................................................................................................................................50.16
Single-rate three-color policing.....................................................................................................................................50.16
Two rate three-color policing .......................................................................................................................................50.17
Configuring and Applying a Policer ............................................................................................................................50.18
Remarking Your Data...........................................................................................................................................................................50.19
Configuring the Egress Queues ......................................................................................................................................................50.20
Egress Queues and QoS markers...............................................................................................................................50.20
Egress Queue Commands Hierarchy .......................................................................................................................50.20
Egress Queue Shaping..........................................................................................................................................................................50.22
Drop Mode..............................................................................................................................................................................50.23
Storm Protection.....................................................................................................................................................................................50.24
Chapter 51. QoS Commands.............................................................................................51.1
Introduction...................................................................................................................................................................................................51.2
Chapter 52. 802.1X Configuration ....................................................................................52.1
Introduction...................................................................................................................................................................................................52.2
The 802.1X Implementation ...............................................................................................................................................................52.2
Configuring 802.1X...................................................................................................................................................................................52.2
Chapter 53. 802.1X Commands ........................................................................................53.1
Chapter 54. Authentication Configuration ......................................................................54.1
Authentication Introduction.................................................................................................................................................................54.2
Tri-Authentication Introduction ......................................................................................................................................54.2
Tri-Authentication Configuration ...................................................................................................................................54.2
Configure 802.1X for dynamic VLAN assignment...............................................................................................54.3
Chapter 55. Authentication Commands ..........................................................................55.1
Chapter 56. AAA Introduction and Configuration..........................................................56.1
AAA Introduction......................................................................................................................................................................................56.2
Available functions and server types ............................................................................................................................56.2
Server Groups and Method Lists ...................................................................................................................................56.2
Software Reference for Allied Telesis x600 Series Switches
C613-50006-01 REV B AlliedWare PlusTM Operating System - Software Version 5.3.1-01 xiii
Configuring AAA Login Authentication........................................................................................................................................56.4
AAA Configuration Tasks...................................................................................................................................................56.4
Chapter 57. AAA Commands............................................................................................57.1
Chapter 58. RADIUS Commands......................................................................................58.1
Chapter 59. Local RADIUS Server
Introduction and Configuration59.1
Local RADIUS Server Introduction................................................................................................................................................59.2
Enable the Local RADIUS Server...................................................................................................................................59.2
Add the Local RADIUS Server as a RADIUS Server..........................................................................................59.3
Add authenticators to the list of authenticators....................................................................................................59.3
Configure the Local RADIUS Server User Database .........................................................................................59.3
Authenticating login sessions.............................................................................................................................................59.4
Creating certificates for single users and all users.................................................................................................59.6
Defined RADIUS attributes list........................................................................................................................................59.6
Chapter 60. Local RADIUS Server Commands..............................................................60.1
Chapter 61. Secure Shell (SSH) Introduction..................................................................61.1
Introduction...................................................................................................................................................................................................61.2
Secure Shell on the AlliedWare PlusTM OS.............................................................................................................61.2
Configuring the SSH Server .................................................................................................................................................................61.3
Creating a Host Key...............................................................................................................................................................61.3
Enabling the Server.................................................................................................................................................................61.4
Modifying the Server..............................................................................................................................................................61.4
Validating the Server Configuration ..............................................................................................................................61.5
Adding SSH Users...................................................................................................................................................................61.5
Authenticating SSH Users...................................................................................................................................................61.6
Adding a Login Banner .........................................................................................................................................................61.6
Monitoring the Server and Managing Sessions .......................................................................................................61.7
Debugging the Server............................................................................................................................................................61.7
Configuring the SSH Client ..................................................................................................................................................................61.8
Modifying the Client...............................................................................................................................................................61.8
Adding SSH Servers ...............................................................................................................................................................61.9
Authenticating with a Server.............................................................................................................................................61.9
Connecting to a Server and Running Commands................................................................................................61.9
Copying files to and from the Server........................................................................................................................61.10
Debugging the Client..........................................................................................................................................................61.10
Chapter 62. Secure Shell Configuration ...........................................................................62.1
Configuring the SSH Server ................................................................................................................................................................62.2
Chapter 63. Secure Shell Commands...............................................................................63.1
Part 6 Network Availability
VRRP Introduction 1
Introduction...................................................................................................................................................................................................64.2
Virtual Router Redundancy Protocol .............................................................................................................................................64.3
Software Reference for Allied Telesis x600 Series Switches
xiv AlliedWare PlusTM Operating System - Software Version 5.3.1-01 C613-50006-01 REV B
VRRP Configuration..................................................................................................................................................................................64.4
VRRP Election and Pre-empt............................................................................................................................................64.5
VRRP Authentication.............................................................................................................................................................64.6
VRRP Debugging......................................................................................................................................................................64.6
Configuration Examples.......................................................................................................................................................64.7
VRRP Commands 1
Introduction...................................................................................................................................................................................................65.2
Typical command sequences ..............................................................................................................................................................65.2
VRRP Commands......................................................................................................................................................................................65.3
EPSR Introduction 1
Introduction...................................................................................................................................................................................................66.2
Ring Components and Operation ...................................................................................................................................................66.2
Fault Detection and Recovery............................................................................................................................................................66.4
Fault Recovery...........................................................................................................................................................................66.4
Restoring Normal Operation ...........................................................................................................................................66.5
Configuration Examples .........................................................................................................................................................................66.6
Single Domain, Single Ring Network............................................................................................................................66.6
Single Ring, Dual Domain Network...........................................................................................................................66.11
EPSR and Spanning Tree Operation .........................................................................................................................66.12
EPSR Commands 1
Part 7 Network Management
Chapter 68. NTP Introduction ..........................................................................................68.1
Introduction...................................................................................................................................................................................................68.2
Overview ........................................................................................................................................................................................................68.2
NTP on the Switch ...................................................................................................................................................................................68.3
Troubleshooting..........................................................................................................................................................................................68.3
Configuration Example ...........................................................................................................................................................................68.4
Chapter 69. NTP Commands ............................................................................................69.1
Chapter 70. Dynamic Host Configuration Protocol (DHCP) Introduction..................70.1
Introduction...................................................................................................................................................................................................70.2
BOOTP .........................................................................................................................................................................................70.2
DHCP.............................................................................................................................................................................................70.2
DHCP Relay Agents ..............................................................................................................................................................70.2
Configuring the DHCP Server............................................................................................................................................................70.3
Create the Pool........................................................................................................................................................................70.3
Define the Network ..............................................................................................................................................................70.3
Define the Range.....................................................................................................................................................................70.4
Set the Lease..............................................................................................................................................................................70.4
Set the Options ........................................................................................................................................................................70.4
Configuring the DHCP Relay Agent...............................................................................................................................................70.5
Configuring the DHCP Relay Agent.............................................................................................................................70.6
DHCP Relay Agent Option 82........................................................................................................................................70.7
Configuring the DHCP Client.............................................................................................................................................................70.9
Software Reference for Allied Telesis x600 Series Switches
C613-50006-01 REV B AlliedWare PlusTM Operating System - Software Version 5.3.1-01 xv
Chapter 71. Dynamic Host Configuration Protocol (DHCP) Commands....................71.1
Chapter 72. SNMP Introduction........................................................................................72.1
Introduction...................................................................................................................................................................................................72.2
Network Management Framework.................................................................................................................................................72.2
Structure of Management Information ..........................................................................................................................................72.4
Names............................................................................................................................................................................................72.5
Instances........................................................................................................................................................................................72.6
Syntax.............................................................................................................................................................................................72.6
Access ............................................................................................................................................................................................72.6
Status ..............................................................................................................................................................................................72.7
Description..................................................................................................................................................................................72.7
SNMP Versions.........................................................................................................................................................................72.8
SNMP Messages .......................................................................................................................................................................72.9
Polling versus Event Notification.....................................................................................................................................72.9
Message Format for SNMPv1 and SNMPv2c ......................................................................................................72.10
SNMP Communities (Version v1 and v2c) ...........................................................................................................72.11
SNMPv3 Entities....................................................................................................................................................................72.11
SNMP Engine ..........................................................................................................................................................................72.11
SNMPv3 Message Protocol Format...........................................................................................................................72.12
SNMPv1 and SNMPv2c .....................................................................................................................................................................72.13
SNMP MIB Views for SNMPv1 and SNMPv2c ...................................................................................................72.13
SNMP Communities ...........................................................................................................................................................72.13
Configuration Example (SNMPv1 and v2).............................................................................................................72.15
SNMPv3 ......................................................................................................................................................................................................72.17
SNMP MIB Views for SNMPv3.....................................................................................................................................72.17
SNMP Groups ........................................................................................................................................................................72.17
SNMP Users ............................................................................................................................................................................72.17
SNMP Target Addresses..................................................................................................................................................72.17
SNMP Target Params.........................................................................................................................................................72.17
Configuration Example (SNMPv3) .............................................................................................................................72.18
Chapter 73. SNMP Commands .........................................................................................73.1
Chapter 74. SNMP MIBs.....................................................................................................74.1
Introduction...................................................................................................................................................................................................74.2
About MIBs .................................................................................................................................................................................74.2
About SNMP..............................................................................................................................................................................74.2
Obtaining MIBs..........................................................................................................................................................................74.2
Loading MIBs ..............................................................................................................................................................................74.3
Allied Telesis Enterprise MIB...............................................................................................................................................................74.5
AT-SMI-MIB ................................................................................................................................................................................74.6
AT-PRODUCT-MIB...............................................................................................................................................................74.9
AT-BOARDS-MIB ................................................................................................................................................................74.10
AT-SYSINFO-MIB ................................................................................................................................................................74.12
AT-XEM-MIB ..........................................................................................................................................................................74.14
AT-ENVMONv2-MIB ........................................................................................................................................................74.15
AT-VCSTACK-MIB..............................................................................................................................................................74.22
AT-USER-MIB.........................................................................................................................................................................74.26
AT-RESOURCE-MIB ..........................................................................................................................................................74.27
AT-LICENSE-MIB .................................................................................................................................................................74.28
AT-TRIGGER-MIB................................................................................................................................................................74.31
AT-LOOPPROTECT-MIB...............................................................................................................................................74.33
AT-SETUP-MIB ......................................................................................................................................................................74.35
AT-DNS-CLIENT-MIB.......................................................................................................................................................74.41
Software Reference for Allied Telesis x600 Series Switches
xvi AlliedWare PlusTM Operating System - Software Version 5.3.1-01 C613-50006-01 REV B
AT-NTP-MIB ...........................................................................................................................................................................74.42
AT-EPSRv2-MIB.....................................................................................................................................................................74.45
AT-FILEv2-MIB .......................................................................................................................................................................74.48
AT-LOG-MIB ..........................................................................................................................................................................74.55
AT-IP-MIB .................................................................................................................................................................................74.57
Public MIBs..................................................................................................................................................................................................74.59
Chapter 75. SMTP Commands..........................................................................................75.1
Chapter 76. RMON Commands ........................................................................................76.1
Introduction...................................................................................................................................................................................................76.2
Chapter 77. Triggers Introduction ....................................................................................77.1
Introduction...................................................................................................................................................................................................77.2
Configuring a Trigger ...............................................................................................................................................................................77.2
Troubleshooting Triggers ......................................................................................................................................................................77.4
Chapter 78. Triggers Configuration..................................................................................78.1
Introduction...................................................................................................................................................................................................78.2
Restrict Internet Access..........................................................................................................................................................................78.2
Capturing Unusual CPU and RAM Activity................................................................................................................................78.3
Seeing Daily Statistics...............................................................................................................................................................................78.5
Chapter 79. Trigger Commands .......................................................................................79.1
Chapter 80. Ping Polling Introduction ..............................................................................80.1
Introduction...................................................................................................................................................................................................80.2
How Ping Polling Works........................................................................................................................................................................80.2
Configuring Ping Polling..........................................................................................................................................................................80.4
Creating a Polling Instance..................................................................................................................................................80.4
Customizing a Polling Instance.........................................................................................................................................80.5
Troubleshooting Ping Polling.............................................................................................................................................80.6
Interaction with Other Protocols .....................................................................................................................................................80.6
Chapter 81. Ping Polling Commands ................................................................................81.1
Introduction...................................................................................................................................................................................................81.2
Part 8 Virtual Chassis Stacking
Chapter 82. Stacking Introduction..................................................................................................... 82.1
VCS Introduction .......................................................................................................................................................................................82.2
VCS Supported Platforms...................................................................................................................................................82.2
Features of Virtual Chassis Stacking ..............................................................................................................................82.2
The Physical Stack ...................................................................................................................................................................82.3
Stack Back-to-Back Configuration ..................................................................................................................................82.3
Resilient Stacked Topology................................................................................................................................................82.5
Stack Formation..........................................................................................................................................................................................82.7
The Role of the Stack Master...........................................................................................................................................82.7
Stack Management VLAN ..................................................................................................................................................82.8
Stack Member Failure and Recovery.........................................................................................................................82.10
Software Reference for Allied Telesis x600 Series Switches
C613-50006-01 REV B AlliedWare PlusTM Operating System - Software Version 5.3.1-01 xvii
VCS Failure Recovery.........................................................................................................................................................82.12
Stack Maintenance ...............................................................................................................................................................82.12
Software Version Auto Synchronization ...................................................................................................................................82.14
Introduction .............................................................................................................................................................................82.14
How Autosynchronization Works..............................................................................................................................82.14
Chapter 83. Stacking Commands..................................................................................................... 83.1
Introduction...................................................................................................................................................................................................83.2
Appendix A: Command List
Appendix B: Release Notes
Appendix C: GUI Reference
Introduction..................................................................................................................................................................................................... 1.2
Installing and Setting-up the GUI ........................................................................................................................................................ 1.3
System Requirements.............................................................................................................................................................. 1.3
Installing the GUI to your switch using an SD card ............................................................................................... 1.3
Installing the GUI to Your Switch Via TFTP server................................................................................................ 1.5
Using the GUI ................................................................................................................................................................................................ 1.7
System > Status > System Details .................................................................................................................................. 1.9
System > Status > System Date and Time................................................................................................................ 1.9
System > Status > Top Ten Utilised Ports ..............................................................................................................1.10
System > File Management > Copy File....................................................................................................................1.15
System > File Management > Move File ...................................................................................................................1.15
System > Stacking > Configure Stacking ...................................................................................................................1.17
System > Stacking > Configure Stack Member.....................................................................................................1.18
System > License Management > Add Feature License..................................................................................1.20
Switching > Ports > Monitor Port.................................................................................................................................1.23
Switching > Ports > Configure Port.............................................................................................................................1.24
Switching > VLANs > Add VLAN................................................................................................................................1.27
Switching > Link Aggregation > Add Static Channel .........................................................................................1.30
Switching > Link Aggregation > Add Dynamic Channel..................................................................................1.30
IP > IP Interfaces > Configure Primary IP Address..............................................................................................1.33
IP > IP Interfaces > Add Secondary IP Address....................................................................................................1.33
IP > Static Routes > Add Static Route.......................................................................................................................1.35
IP > DNS > Add DNS Server.........................................................................................................................................1.38
IP > IGMP Snooping > Configure Interface.............................................................................................................1.40
Management > NTP > Add NTP Association ......................................................................................................1.48
Management > Logs > Export Logs ............................................................................................................................1.53
Software Reference for Allied Telesis x600 Series Switches
xviii AlliedWare PlusTM Operating System - Software Version 5.3.1-01 C613-50006-01 REV B
Part 1: Setting up the Switch
Chapter 1 Getting Started
Chapter 2 Command Syntax Conventions in this Software Reference
Chapter 3 Start-up Sequence
Chapter 4 CLI Navigation Commands
Chapter 5 User Access Commands
Chapter 6 Creating and Managing Files
Chapter 7 File Management Commands
Chapter 8 System Configuration and Monitoring Commands
Chapter 9 Debugging and Logging
Chapter 10 Logging Commands
Chapter 11 Scripting Commands
Chapter 12 Interface Commands
Chapter 13 Interface Testing Commands
/