x610-24Ts

Allied Telesis x610-24Ts, x610-24Ts/X-POE , x610-48Ts User manual

  • Hello! I am an AI chatbot trained to assist you with the Allied Telesis x610-24Ts User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Software Reference for x610 Series Switches
AlliedWare Plus Operating System
Version 5.4.1
x610-24Ts and x610-24Ts/X
x610-48Ts and x610-48TsX
x610-24Ts-PoE+ and x610-24TsX-PoE+
x610-48Ts-PoE+ and x610-48TsX-PoE+
C613-50018-01-REV A
Software Reference for x610 Series Switches
ii AlliedWare Plus
TM
Operating System - Version 5.4.1 C613-50018-01 REV A
Acknowledgments
This product includes software developed by the University of California, Berkeley and its
contributors.
Copyright
©1982, 1986, 1990, 1991, 1993 The Regents of the University of California.
All rights reserved.
This product includes software developed by the OpenSSL Project for use in the OpenSSL
To o l k i t ( http://www.openssl.org/).
Copyright
©1998-2008 The OpenSSL Project. All rights reserved.
This product includes software licensed under the GNU General Public License available from:
http://www.gnu.org/licenses/gpl2.html
Source code for all GPL licensed software in this product can be obtained from the
Allied Telesis GPL Code Download Center at:
http://www.alliedtelesis.com/support/default.aspx
Allied Telesis is committed to meeting the requirements of the open source licenses including
the GNU General Public License (GPL) and will make all required source code available.
If you would like a copy of the GPL source code contained in Allied Telesis products, please
send us a request by registered mail including a check for US$15 to cover production and
shipping costs and a CD with the GPL code will be mailed to you.
GPL Code Request
Allied Telesis Labs (Ltd)
PO Box 8011
Christchurch.
New Zealand
©2011 Allied Telesis Inc. All rights reserved.
This documentation is subject to change without notice. No part of this publication may be
reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or
mechanical, including photocopying and recording for any purpose other than the purchaser’s
internal use without the written permission of Allied Telesis, Inc.
Allied Telesis, AlliedWare Plus, EPSRing, SwitchBlade, and VCStack are trademarks or registered
trademarks in the United States and elsewhere of Allied Telesis, Inc. Adobe, Acrobat, and
Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the
United States and/or other countries. Additional brands, names and products mentioned
herein may be trademarks of their respective companies.
Software Release Notes
Software Release Notes for Version 5.4.1 documentation can be downloaded from the
Support area of our website at http://www.alliedtelesis.com. Note that to download software
files, you will need a valid user account.
Software Reference for x610 Series Switches
C613-50018-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.1 iii
Table of Contents
Part 1 Setting up the Switch
Chapter 1. Getting Started ...................................................................................................11
Introduction..................................................................................................................................................................................................... 1.2
How to Login................................................................................................................................................................................................. 1.2
How to get Command Help................................................................................................................................................................. 1.3
Viewing a List of Valid Parameters............................................................................................................................................. 1.3
Completing Keywords....................................................................................................................................................................... 1.9
Viewing Command Error Messages........................................................................................................................................1.10
How to Work with Command Modes.........................................................................................................................................1.11
Entering Privileged Exec Commands When in a Configuration Mode ..............................................................1.14
How to See the Current Configuration .......................................................................................................................................1.16
Default Settings ...........................................................................................................................................................................................1.17
The Default Configuration Script......................................................................................................................................................1.18
How to Change the Password...........................................................................................................................................................1.19
How to Set Strong Passwords...........................................................................................................................................................1.20
How to Set an IP Address on VLAN 1 ........................................................................................................................................1.22
How to Save and Boot from the Current Configuration...................................................................................................1.23
How to Save to the Default Configuration File ...............................................................................................................1.23
How to Create and Use a New Configuration File.......................................................................................................1.23
How to Return to the Factory Defaults .......................................................................................................................................1.25
How to See System Information ......................................................................................................................................................1.26
Viewing Overall System Information ......................................................................................................................................1.26
Viewing Temperature, Voltage, and Fan Status................................................................................................................1.27
Viewing the Serial Number..........................................................................................................................................................1.28
How to Set System Parameters........................................................................................................................................................1.28
How to Change the Telnet Session Timeout...................................................................................................................1.28
How to Name the Switch............................................................................................................................................................1.29
How to Display a Text Banner at Login...............................................................................................................................1.30
How to Set the Time and Date........................................................................................................................................................1.31
How to Show Current Settings.................................................................................................................................................1.31
How to Set the Time and Date................................................................................................................................................1.31
How to Set the Timezone ...........................................................................................................................................................1.32
How to Configure Summer-time .............................................................................................................................................1.32
How to Add and Remove Users......................................................................................................................................................1.33
Pre-encrypted Passwords..............................................................................................................................................................1.34
How to Undo Settings............................................................................................................................................................................1.36
How to Use the no Parameter ..................................................................................................................................................1.36
How to Use the default Parameter.........................................................................................................................................1.36
How to Upgrade the Firmware.........................................................................................................................................................1.37
Save Power With the Eco-Ecofriendly Feature........................................................................................................................1.38
Continuous Reboot Prevention ........................................................................................................................................................1.39
Controlling “show” Command Output ........................................................................................................................................1.41
Commands Available in each Mode ...............................................................................................................................................1.43
User Exec Mode.................................................................................................................................................................................1.43
Privileged Exec Mode......................................................................................................................................................................1.44
Software Reference for x610 Series Switches
iv AlliedWare Plus
TM
Operating System - Version 5.4.1 C613-50018-01 REV A
Global Configuration Mode.........................................................................................................................................................1.45
Chapter 2. Command Syntax Conventions in this Software Reference ..........................21
Chapter 3. Start-up Sequence ..............................................................................................31
AlliedWare Plus Start-up......................................................................................................................................................................... 3.2
Diagnostic Menu........................................................................................................................................................................................... 3.3
Bootloader Menu......................................................................................................................................................................................... 3.5
Start-up Sequence....................................................................................................................................................................................... 3.9
Chapter 4. CLI Navigation Commands ...............................................................................41
Command List ............................................................................................................................................................................................... 4.2
Chapter 5. User Access Commands ....................................................................................51
Command List ............................................................................................................................................................................................... 5.2
Chapter 6. Creating and Managing Files..............................................................................61
Introduction..................................................................................................................................................................................................... 6.2
Working With Files..................................................................................................................................................................................... 6.2
Listing files ................................................................................................................................................................................................ 6.2
Displaying the contents of configuration and text files .................................................................................................. 6.4
Navigating through the filesystem .............................................................................................................................................. 6.4
Using the editor.................................................................................................................................................................................... 6.6
Creating and Using Configuration Files ........................................................................................................................................... 6.8
Creating a configuration file ........................................................................................................................................................... 6.8
Specifying the start-up configuration script........................................................................................................................... 6.8
Working with configuration files ................................................................................................................................................. 6.9
The configuration file fallback order........................................................................................................................................6.10
Copying Files To and From Your Device ....................................................................................................................................6.12
URL syntax ............................................................................................................................................................................................6.12
Copying files..........................................................................................................................................................................................6.12
Copying from a Server to Running Configuration..........................................................................................................6.16
Chapter 7. File Management Commands ...........................................................................71
Introduction..................................................................................................................................................................................................... 7.3
URL Syntax and Keyword Usage................................................................................................................................................ 7.3
Command List ............................................................................................................................................................................................... 7.4
Chapter 8. System Configuration and Monitoring Commands ........................................81
Command List ............................................................................................................................................................................................... 8.3
Chapter 9. Debugging and Logging ......................................................................................91
Introduction..................................................................................................................................................................................................... 9.2
Debugging ........................................................................................................................................................................................................ 9.2
Logging to terminal ............................................................................................................................................................................. 9.2
Turning off debugging........................................................................................................................................................................ 9.2
Logging ............................................................................................................................................................................................................... 9.3
Log Outputs............................................................................................................................................................................................ 9.3
Software Reference for x610 Series Switches
C613-50018-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.1 v
Chapter 10. Logging Commands........................................................................................101
Command List .............................................................................................................................................................................................10.2
Chapter 11. Scripting Commands......................................................................................111
Command List .............................................................................................................................................................................................11.2
Chapter 12. Interface Commands......................................................................................121
Command List .............................................................................................................................................................................................12.2
Chapter 13. Interface Testing Commands........................................................................131
Command List .............................................................................................................................................................................................13.2
Part 2 Layer Two Switching
Chapter 14. Switching Introduction...................................................................................141
Introduction...................................................................................................................................................................................................14.2
Physical Layer Information ....................................................................................................................................................................14.3
Switch Ports ..........................................................................................................................................................................................14.3
Port ranges.............................................................................................................................................................................................14.3
Activating and Deactivating Switch Ports.............................................................................................................................14.4
Autonegotiation..................................................................................................................................................................................14.4
Duplex mode.......................................................................................................................................................................................14.4
Speed options......................................................................................................................................................................................14.5
Configuring the port speed..........................................................................................................................................................14.5
MDI MDIX Connection Modes (10BASE-T) ....................................................................................................................14.6
The Layer 2 Switching Process ..........................................................................................................................................................14.7
The Ingress Rules ...............................................................................................................................................................................14.7
The Learning Process ......................................................................................................................................................................14.8
The Forwarding Process ................................................................................................................................................................14.9
The Egress Rules ................................................................................................................................................................................14.9
Layer 2 Filtering........................................................................................................................................................................................14.10
Ingress Filtering .................................................................................................................................................................................14.10
Static and Dynamic (LACP) Link Aggregation .......................................................................................................................14.11
Static Channel Groups.................................................................................................................................................................14.11
Dynamic (LACP) Channel Groups.......................................................................................................................................14.12
Storm-control............................................................................................................................................................................................14.14
Loop Protection.......................................................................................................................................................................................14.15
Loop Detection ..............................................................................................................................................................................14.15
Thrash Limiting .................................................................................................................................................................................14.16
Port Mirroring ...........................................................................................................................................................................................14.18
Port Security ..............................................................................................................................................................................................14.19
MAC Address Learn Limits.......................................................................................................................................................14.19
IEEE 802.1X........................................................................................................................................................................................14.19
Quality of Service....................................................................................................................................................................................14.20
IGMP Snooping ........................................................................................................................................................................................14.21
Chapter 15. Switching Commands.....................................................................................151
Command List .............................................................................................................................................................................................15.2
Software Reference for x610 Series Switches
vi AlliedWare Plus
TM
Operating System - Version 5.4.1 C613-50018-01 REV A
Chapter 16. VLAN Introduction.........................................................................................161
Introduction...................................................................................................................................................................................................16.2
Virtual LANs (VLANs)............................................................................................................................................................................16.2
Configuring VLANs...........................................................................................................................................................................16.3
VLAN Double Tagging (VLAN Stacking).....................................................................................................................................16.5
How double-tagged VLANs work...........................................................................................................................................16.5
VLAN Rules for double tagging.................................................................................................................................................16.5
Restrictions when using double-tagged VLANs...............................................................................................................16.6
Configuring double-tagged VLANs..........................................................................................................................................16.6
Private VLANs ..........................................................................................................................................................................................16.11
Private VLANs for ports in access mode..........................................................................................................................16.11
Private VLAN operation with ports in access mode .................................................................................................16.13
Access mode private VLAN configuration example ..................................................................................................16.14
Private VLANs for trunked ports ..........................................................................................................................................16.17
Trunked port private VLAN configuration example ..................................................................................................16.18
VLAN Statistics.........................................................................................................................................................................................16.21
Counter Operation .......................................................................................................................................................................16.21
Chapter 17. VLAN Commands ..........................................................................................171
Command List .............................................................................................................................................................................................17.2
Chapter 18. Spanning Tree Introduction: STP, RSTP, and MSTP .................................181
Introduction...................................................................................................................................................................................................18.2
Overview of Spanning Trees...............................................................................................................................................................18.2
Spanning tree operation ................................................................................................................................................................18.2
Spanning tree modes.......................................................................................................................................................................18.4
Spanning Tree Protocol (STP) ...........................................................................................................................................................18.5
Configuring STP ..........................................................................................................................................................................................18.6
Rapid Spanning Tree Protocol (RSTP) ..........................................................................................................................................18.8
Configuring RSTP.......................................................................................................................................................................................18.9
Multiple Spanning Tree Protocol (MSTP).................................................................................................................................18.11
Multiple Spanning Tree Instances (MSTI)..........................................................................................................................18.12
MSTP Regions...................................................................................................................................................................................18.13
Common and Internal Spanning Tree (CIST)................................................................................................................18.15
MSTP Bridge Protocol Data Units (BPDUs)...................................................................................................................18.17
Configuring MSTP...............................................................................................................
....................................................................18.19
Chapter 19.
Spanning Tree Commands ...
.........................................................................191
Command List .............................................................................................................................................................................................19.2
Chapter 20. Link Aggregation Introduction and Configuration .....................................201
Introduction...................................................................................................................................................................................................20.2
Link Aggregation Control Protocol (LACP).......................................................................................................................20.2
Configuring A LACP Channel Group ............................................................................................................................................20.3
Configuring A Static Channel Group..............................................................................................................................................20.6
Chapter 21. Link Aggregation Commands .......................................................................211
Command List .............................................................................................................................................................................................21.2
Chapter 22. Power over Ethernet Introduction ...............................................................221
Introduction...................................................................................................................................................................................................22.2
PoE (IEEE 802.3af) & PoE+ (IEEE 802.3at) standards ..................................................................................................22.2
Software Reference for x610 Series Switches
C613-50018-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.1 vii
PoE (IEEE 802.3af).............................................................................................................................................................................22.3
PoE+ (IEEE 802.3at).........................................................................................................................................................................22.3
Enhanced PoE ......................................................................................................................................................................................22.3
Differences between PoE, PoE+, and Enhanced PoE...................................................................................................22.4
The Advantages of PoE, PoE+, and Enhanced PoE.......................................................................................................22.4
LLDP-MED (TIA-1057) with PoE+ (IEEE 802.3at)........................................................................................................22.5
PoE and PoE+ Uses .........................................................................................................................................................................22.5
Power Device (PD) discovery....................................................................................................................................................22.6
Power classes .......................................................................................................................................................................................22.6
Power through the cable: 10/100BASE-TX .......................................................................................................................22.7
Power through the cable: 1000BASE-TX............................................................................................................................22.8
AW+ PoE and POE+ Implementation.........................................................................................................................................22.8
Power capacity ....................................................................................................................................................................................22.9
Power threshold.................................................................................................................................................................................22.9
Power through the cable............................................................................................................................................................22.10
PoE port management.................................................................................................................................................................22.10
Powered Device (PD) detection...........................................................................................................................................22.11
Powered Device (PD) classification .....................................................................................................................................22.11
Port prioritization............................................................................................................................................................................22.11
Software monitoring .....................................................................................................................................................................22.12
AW+ PoE and PoE+ Configuration............................................................................................................................................22.14
Configure a PD description for a PoE or PoE+ port.................................................................................................22.14
Configuring capacity and priority on a PoE or PoE+ port......................................................................................22.15
Remotely monitoring power for all connected PDs ..................................................................................................22.16
Chapter 23. Power over Ethernet
Commands231
Introduction...................................................................................................................................................................................................23.2
Command List .............................................................................................................................................................................................23.3
Chapter 24. GVRP Introduction and Configuration.........................................................241
Introduction...................................................................................................................................................................................................24.2
GVRP Example....................................................................................................................................................................................24.3
GVRP Guidelines................................................................................................................................................................................24.4
GVRP and Network Security......................................................................................................................................................24.5
GVRP-inactive Intermediate Switches....................................................................................................................................24.5
Enabling GVRP on the Switch ....................................................................................................................................................24.5
Enabling GVRP on the Ports .......................................................................................................................................................24.6
Setting the GVRP Timers ..............................................................................................................................................................24.6
Disabling GVRP on the Ports......................................................................................................................................................24.7
Disabling GVRP on the Switch...................................................................................................................................................24.7
Configuring and Validating GVRP .....................................................................................................................................................24.8
Chapter 25. GVRP Commands...........................................................................................251
Command List .............................................................................................................................................................................................25.2
Part 3 Layer Three, Switching and Routing
Chapter 26. Internet Protocol (IP) Addressing and Protocols .......................................261
Introduction...................................................................................................................................................................................................26.2
Address Resolution Protocol (ARP)...............................................................................................................................................26.3
Static ARP Entries..............................................................................................................................................................................26.3
Software Reference for x610 Series Switches
viii AlliedWare Plus
TM
Operating System - Version 5.4.1 C613-50018-01 REV A
Timing Out ARP Entries ................................................................................................................................................................26.3
Deleting ARP Entries .......................................................................................................................................................................26.4
Proxy ARP..............................................................................................................................................................................................26.4
ARP Logging..........................................................................................................................................................................................26.7
Domain Name System (DNS)...........................................................................................................................................................26.8
Domain name parts..........................................................................................................................................................................26.8
Server hierarchy..................................................................................................................................................................................26.8
DNS Client............................................................................................................................................................................................26.8
DNS Relay ..........................................................................................................................................................................................26.10
DHCP options..................................................................................................................................................................................26.11
Internet Control Message Protocol (ICMP) ............................................................................................................................26.12
ICMP Router Discovery Protocol (IRDP).................................................................................................................................26.13
Router discovery .............................................................................................................................................................................26.14
Router discovery process...........................................................................................................................................................26.14
Configuration procedure............................................................................................................................................................26.16
Checking IP Connections ...................................................................................................................................................................26.18
Ping..........................................................................................................................................................................................................26.18
Traceroute ..........................................................................................................................................................................................26.18
IP Helper......................................................................................................................................................................................................26.19
IP Directed Broadcast...........................................................................................................................................................................26.20
Chapter 27. IP Addressing and Protocol Commands ......................................................271
Command List .............................................................................................................................................................................................27.3
Chapter 28. IPv6 Introduction ............................................................................................281
Introduction...................................................................................................................................................................................................28.2
Overview ........................................................................................................................................................................................................28.2
IPv6 Addresses and Prefixes................................................................................................................................................................28.3
Address types.......................................................................................................................................................................................28.3
IPv6 Headers ........................................................................................................................................................................................28.5
The Internet Control Message Protocol (ICMPv6) .......................................................................................................28.7
IPv6 Routing.......................................................................................................................................................................................28.11
Integration of IPv4 and IPv6......................................................................................................................................................28.11
IPv6 on your Switch...............................................................................................................................................................................28.12
Enabling IPv6......................................................................................................................................................................................28.12
Chapter 29. IPv6 Commands..............................................................................................291
Command List .............................................................................................................................................................................................29.2
Chapter 30. IPv6to4 Tunneling Configuration..................................................................301
Introduction...................................................................................................................................................................................................30.2
6to4 Automatic Tunnel Configuration ..........................................................................................................................................30.2
Tunneling Operation........................................................................................................................................................................30.2
6to4 tunnels operation and configuration summary .....................................................................................................30.3
Example 6to4 configuration.........................................................................................................................................................30.4
Chapter 31. IPv6to4 Tunneling Commands......................................................................311
Command List .............................................................................................................................................................................................31.2
Chapter 32. Routing Protocol Overview ...........................................................................321
Introduction...................................................................................................................................................................................................32.2
RIP.......................................................................................................................................................................................................................32.2
Software Reference for x610 Series Switches
C613-50018-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.1 ix
OSPF .................................................................................................................................................................................................................32.2
BGP....................................................................................................................................................................................................................32.3
PIM-SM.............................................................................................................................................................................................................32.4
VRRP .................................................................................................................................................................................................................32.4
Chapter 33. Route Selection ...............................................................................................331
Introduction...................................................................................................................................................................................................33.2
Types of Routes..........................................................................................................................................................................................33.2
Interface Routes..................................................................................................................................................................................33.2
Static Routes.........................................................................................................................................................................................33.2
Dynamic Routes .................................................................................................................................................................................33.3
RIB and FIB Routing Tables ..................................................................................................................................................................33.4
Administrative Distance .................................................................................................................................................................33.5
Equal Cost Multipath Routing.....................................................................................................................................................33.7
How AlliedWare Plus Deletes Routes..................................................................................................................................33.7
How AlliedWare Plus Adds Routes .......................................................................................................................................33.8
Chapter 34. Routing Commands........................................................................................341
Command List .............................................................................................................................................................................................34.2
Chapter 35. RIP Configuration ...........................................................................................351
Introduction...................................................................................................................................................................................................35.2
Enabling RIP...................................................................................................................................................................................................35.2
Specifying the RIP Version ....................................................................................................................................................................35.4
RIPv2 Authentication (Single Key)....................................................................................................................................................35.6
RIPv2 Text Authentication (Multiple Keys).................................................................................................................................35.8
RIPv2 md5 authentication (multiple keys)................................................................................................................................35.12
Chapter 36. RIP Commands ...............................................................................................361
Command List .............................................................................................................................................................................................36.2
Chapter 37. RIPng Configuration .......................................................................................371
Introduction...................................................................................................................................................................................................37.2
Enabling RIPng..............................................................................................................................................................................................37.2
Troubleshooting RIPng Adjacency ...................................................................................................................................................37.4
Chapter 38. RIPng Commands ...........................................................................................381
Introduction...................................................................................................................................................................................................38.2
Command List .............................................................................................................................................................................................38.2
Chapter 39. OSPF Introduction and Configuration .........................................................391
OSPF Introduction.....................................................................................................................................................................................39.2
Features ...........................................................................................................................................................................................................39.2
OSPF Components...................................................................................................................................................................................39.2
Autonomous Systems .....................................................................................................................................................................39.2
Routing Areas ......................................................................................................................................................................................39.3
Adjacencies and Designated Routers.....................................................................................................................................39.3
Link State Advertisements............................................................................................................................................................39.4
OSPF Packet Types ..........................................................................................................................................................................39.4
OSPF States ..........................................................................................................................................................................................39.5
OSPF Metrics .......................................................................................................................................................................................39.6
Software Reference for x610 Series Switches
x AlliedWare Plus
TM
Operating System - Version 5.4.1 C613-50018-01 REV A
Automatic Cost Calculation ........................................................................................................................................................39.6
Routing with OSPF ...........................................................................................................................................................................39.7
Network Types...................................................................................................................................................................................39.7
Passive Interfaces................................................................................................................................................................................39.8
Authenticating OSPF........................................................................................................................................................................39.8
Redistributing External Routes...................................................................................................................................................39.9
Enabling OSPF on an Interface........................................................................................................................................................39.10
Setting priority...........................................................................................................................................................................................39.12
Configuring an Area Border Router.............................................................................................................................................39.14
Redistributing Routes Into OSPF ...................................................................................................................................................39.15
OSPF Cost ..................................................................................................................................................................................................39.16
Configuring Virtual Links .....................................................................................................................................................................39.19
OSPF Authentication ............................................................................................................................................................................39.21
Chapter 40. OSPF Commands ...........................................................................................401
Command List .............................................................................................................................................................................................40.3
Chapter 41. OSPFv3 for IPv6 Introduction and Configuration.......................................411
OSPFv3 Introduction ...............................................................................................................................................................................41.2
Features ...........................................................................................................................................................................................................41.2
Licensing ..........................................................................................................................................................................................................41.2
Routing Overview......................................................................................................................................................................................41.3
OSPF Components...................................................................................................................................................................................41.3
Autonomous Systems .....................................................................................................................................................................41.3
Routing Areas ......................................................................................................................................................................................41.3
Relationships Between Routers.................................................................................................................................................41.3
OSPFv3 Packet Types .....................................................................................................................................................................41.4
Link State Advertisements (LSAs)............................................................................................................................................41.8
LSA Header...........................................................................................................................................................................................41.8
OSPFv3 States .....................................................................................................................................................................................41.9
OSPFv3 Metrics ..................................................................................................................................................................................41.9
Automatic Cost Calculation ........................................................................................................................................................41.9
Network Types................................................................................................................................................................................41.10
Passive Interfaces.............................................................................................................................................................................41.10
Redistributing External Routes................................................................................................................................................41.11
Differences between OSPFV2 and OSPFv3 ...........................................................................................................................41.12
Configuring OSPFv3 ..............................................................................................................................................................................41.14
Example 1: Single-Area Network Configuration ..........................................................................................................41.15
Example 2: Two-Area Network Configuration.............................................................................................................41.22
Setting Up the Metrics.................................................................................................................................................................41.24
Chapter 42. OSPFv3 for IPv6 Commands.........................................................................421
Command List .............................................................................................................................................................................................42.2
Chapter 43. BGP Configuration .........................................................................................431
Introduction...................................................................................................................................................................................................43.2
Enabling BGP Peers In The Same Autonomous System.....................................................................................................43.2
Enabling BGP Between Different Autonomous Systems....................................................................................................43.4
Route Reflector...........................................................................................................................................................................................43.5
Confederations............................................................................................................................................................................................43.7
BGP Authentication...............................................................................................................................................................................43.10
Configuring BGP Graceful Reset....................................................................................................................................................43.12
Configuring BGP Graceful Restart.................................................................................................................................................43.14
Software Reference for x610 Series Switches
C613-50018-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.1 xi
Chapter 44. BGP Commands .............................................................................................441
Command List .............................................................................................................................................................................................44.4
Chapter 45. Route Map Configuration...............................................................................451
Introduction...................................................................................................................................................................................................45.2
Route-Map.....................................................................................................................................................................................................45.2
Chapter 46. Route Map Commands...................................................................................461
Command List .............................................................................................................................................................................................46.2
Chapter 47. VRF-Lite Introduction and Configuration....................................................471
Introduction to VRF-Lite........................................................................................................................................................................47.2
Configuring VRF-Lite................................................................................................................................................................................47.4
Creating and Partitioning VRF Instances...............................................................................................................................47.4
Sharing Connectivity Between VRF Instances ...................................................................................................................47.5
Intra-VRF Routing....................................................................................................................................................................................47.11
Inter-VRF Routing ...................................................................................................................................................................................47.11
Static Inter-VRF Routing......................................................................................................................................................................47.12
Dynamic VRF Routing ..........................................................................................................................................................................47.13
Utilities Available within VRF-Lite..................................................................................................................................................47.13
Utilities Unvailable within VRF-Lite...............................................................................................................................................47.14
Chapter 48. VRF-Lite Commands......................................................................................481
Command List .............................................................................................................................................................................................48.3
Part 4 Multicast Applications
Chapter 49. Multicast Introduction and Commands........................................................491
Introduction...................................................................................................................................................................................................49.2
Multicast groups..................................................................................................................................................................................49.2
Components in a multicast network ......................................................................................................................................49.2
Command List .............................................................................................................................................................................................49.5
Chapter 50. IGMP and IGMP Snooping Introduction ......................................................501
Introduction...................................................................................................................................................................................................50.2
IGMP .................................................................................................................................................................................................................50.2
Joining a multicast group (Membership report) ...............................................................................................................50.3
Staying in the multicast group (Query message).............................................................................................................50.3
Leaving the multicast group (Leave message)...................................................................................................................50.3
IGMP Snooping ...........................................................................................................................................................................................50.4
How IGMP Snooping operates .................................................................................................................................................50.4
IGMP Snooping and Querier configuration example....................................................................................................50.5
Query Solicitation......................................................................................................................................................................................50.7
How Query Solicitation Works ................................................................................................................................................50.7
Query Solicitation Operation .....................................................................................................................................................50.8
Speeding up IGMP convergence in a non-looped topology..................................................................................50.10
Enabling Query Solicitation on multiple switches in a looped topology.........................................................50.10
Software Reference for x610 Series Switches
xii AlliedWare Plus
TM
Operating System - Version 5.4.1 C613-50018-01 REV A
Chapter 51. IGMP and IGMP Snooping Commands ........................................................511
Introduction...................................................................................................................................................................................................51.2
Command List .............................................................................................................................................................................................51.2
Chapter 52. PIM-SM Introduction and Configuration......................................................521
Introduction...................................................................................................................................................................................................52.2
Characteristics of PIM-SM.....................................................................................................................................................................52.2
Roles in PIM-SM..........................................................................................................................................................................................52.3
Operation of PIM-SM..............................................................................................................................................................................52.4
PIM-SM Configuration.............................................................................................................................................................................52.6
Static Rendezvous Point configuration ..................................................................................................................................52.7
Dynamic Rendezvous Point configuration...........................................................................................................................52.9
Bootstrap Router configuration..............................................................................................................................................52.11
Chapter 53. PIM-SM Commands........................................................................................531
Command List .............................................................................................................................................................................................53.2
Chapter 54. PIM-DM Introduction and Configuration .....................................................541
Introduction...................................................................................................................................................................................................54.2
Characteristics of PIM-DM ...................................................................................................................................................................54.2
PIM-DM Terminology..............................................................................................................................................................................54.3
PIM-DM Configuration ...........................................................................................................................................................................54.4
Configuration Example ...................................................................................................................................................................54.4
Verifying Configuration ...................................................................................................................................................................54.7
Chapter 55. PIM-DM Commands .......................................................................................551
Command List .............................................................................................................................................................................................55.2
Chapter 56. MLD Snooping Introduction and Commands..............................................561
Introduction...................................................................................................................................................................................................56.2
MLD Snooping ....................................................................................................................................................................................56.2
Command List .............................................................................................................................................................................................56.3
Part 5 Access and Security
Chapter 57. Access Control Lists Introduction ................................................................571
Introduction...................................................................................................................................................................................................57.2
Overview................................................................................................................................................................................................57.2
ACL Rules ..............................................................................................................................................................................................57.3
ACL Source and Destination Addresses..............................................................................................................................57.3
ACL Reverse Masking .....................................................................................................................................................................57.3
Hardware and Software ACL Types ..............................................................................................................................................57.4
Defining Hardware MAC ACLs ................................................................................................................................................57.5
Defining Hardware IP ACLs ........................................................................................................................................................57.6
Actions for Hardware ACLs........................................................................................................................................................57.7
Attaching hardware ACLs to interfaces................................................................................................................................57.7
Hardware ACLs and QoS classifications......................................................................................................................................57.8
Classifying Your Traffic....................................................................................................................................................................57.8
Security ACLs.......................................................................................................................................................................................57.8
QoS ACLs..............................................................................................................................................................................................57.9
Software Reference for x610 Series Switches
C613-50018-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.1 xiii
Attaching hardware ACLs using QoS.................................................................................................................................57.10
Filtering hardware ACLs with QoS ......................................................................................................................................57.11
Using QoS Match Commands with TCP Flags..............................................................................................................57.12
ACL Filter Sequence Numbers.......................................................................................................................................................57.14
ACL Filter Sequence Number Behavior............................................................................................................................57.14
ACL Filter Sequence Number Applicability ....................................................................................................................57.14
ACL Filter Sequence Number Types..................................................................................................................................57.15
ACL Filter Sequence Configuration .............................................................................................................................................57.17
Creating ACLs in Global Configuration Mode ..............................................................................................................57.19
Display the ACL configuration details.................................................................................................................................57.21
Chapter 58. IPv4 Hardware Access Control List (ACL) Commands.............................581
Introduction...................................................................................................................................................................................................58.2
IPv4 Hardware Access List Commands and Prompts..........................................................................................................58.3
Command List .............................................................................................................................................................................................58.4
Chapter 59. IPv4 Software Access Control List (ACL) Commands...............................591
Introduction...................................................................................................................................................................................................59.2
IPv4 Software Access List Commands and Prompts ............................................................................................................59.2
Command List .............................................................................................................................................................................................59.4
Chapter 60. IPv6 Software Access Control List (ACL) Commands...............................601
Introduction...................................................................................................................................................................................................60.2
IPv6 Software Access List Commands and Prompts ............................................................................................................60.2
Command List .............................................................................................................................................................................................60.3
Chapter 61. Quality of Service (QoS) Introduction .........................................................611
Introduction...................................................................................................................................................................................................61.2
QoS Operations.................................................................................................................................................................................61.2
QoS Packet Information ........................................................................................................................................................................61.3
Link Layer QoS ...................................................................................................................................................................................61.3
Differentiated Services Architecture.......................................................................................................................................61.4
The Differential Services Field ....................................................................................................................................................61.5
Processing pre-marked packets .................................................................................................................................................61.6
Applying QoS on Your Switch...........................................................................................................................................................61.7
Classifying your Data........................................................................................................................................................................61.7
Class Maps .............................................................................................................................................................................................61.7
Policy Maps.........................................................................................................................................................................................61.10
Premarking and Remarking Your Traffic....................................................................................................................................61.11
CoS to egress queue premarking..........................................................................................................................................61.11
DSCP to egress queue premarking......................................................................................................................................61.13
Policing (Metering) Your Data ........................................................................................................................................................61.15
Single-rate Three-color Policing .............................................................................................................................................61.15
Two-rate Three-color Policing................................................................................................................................................61.16
Configuring and Applying a Policer.......................................................................................................................................61.17
Remarking Your Data...........................................................................................................................................................................61.18
Configuring the Egress Queues ......................................................................................................................................................61.19
Egress Queues and QoS markers.........................................................................................................................................61.19
Egress Queue Commands Hierarchy..................................................................................................................................61.19
Egress Queue Shaping..........................................................................................................................................................................61.21
Drop Mode ........................................................................................................................................................................................61.22
Storm Protection.....................................................................................................................................................................................61.23
Policy-Based Routing.............................................................................................................................................................................61.24
Practical Example ............................................................................................................................................................................61.24
Software Reference for x610 Series Switches
xiv AlliedWare Plus
TM
Operating System - Version 5.4.1 C613-50018-01 REV A
Chapter 62. QoS Commands..............................................................................................621
Command List .............................................................................................................................................................................................62.3
Chapter 63. 802.1X Introduction and Configuration .......................................................631
Introduction...................................................................................................................................................................................................63.2
The 802.1X Implementation ...............................................................................................................................................................63.2
Configuring 802.1X...................................................................................................................................................................................63.2
Chapter 64. 802.1X Commands .........................................................................................641
Command List .............................................................................................................................................................................................64.2
Chapter 65. Authentication Introduction and Configuration .........................................651
Authentication Introduction.................................................................................................................................................................65.2
Tri-Authentication Introduction.................................................................................................................................................65.2
Tri-Authentication Configuration..............................................................................................................................................65.2
Configuring a Guest VLAN..........................................................................................................................................................65.3
Roaming Authentication ........................................................................................................................................................................65.4
Roaming Authentication Overview.........................................................................................................................................65.5
Roaming Authentication Feature Interactions...................................................................................................................65.6
Unauthenticated Supplicant Traffic..................................................................................................................................................65.7
Deciding when a supplicant fails authentication...............................................................................................................65.9
Authentication Enhancements.........................................................................................................................................................65.10
Web-authentication Enhancements.....................................................................................................................................65.10
Guest VLAN Enhancements ....................................................................................................................................................65.11
Failed authentication VLAN......................................................................................................................................................65.12
Limitations on allowed feature combinations.................................................................................................................65.12
Chapter 66. Authentication Commands ...........................................................................661
Command List .............................................................................................................................................................................................66.3
Chapter 67. AAA Introduction and Configuration...........................................................671
AAA Introduction......................................................................................................................................................................................67.2
Available functions and server types.......................................................................................................................................67.2
Server Groups and Method Lists..............................................................................................................................................67.2
Configuring AAA Login Authentication........................................................................................................................................67.4
AAA Configuration Tasks .............................................................................................................................................................67.4
Sample Authentication Configurations..........................................................................................................................................67.6
Sample 802.1X Authentication Configuration ..................................................................................................................67.6
Sample MAC Authentication Configuration ......................................................................................................................67.7
Sample Web-Authentication Configuration.......................................................................................................................67.8
Sample Tri-Authentication Configuration............................................................................................................................67.9
Chapter 68. AAA Commands.............................................................................................681
Command List .............................................................................................................................................................................................68.2
Chapter 69. RADIUS Introduction and Confi
guration....................................
.................691
Introduction...................................................................................................................................................................................................69.2
RADIUS Packets.................................................................................................................................................................................69.3
RADIUS Attributes ...........................................................................................................................................................................69.4
RADIUS Security................................................................................................................................................................................69.5
RADIUS Proxy ....................................................................................................................................................................................69.6
Software Reference for x610 Series Switches
C613-50018-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.1 xv
RADIUS Accounting ........................................................................................................................................................................69.7
RADIUS Configuration ...........................................................................................................................................................................69.8
Switch Configuration Tasks..........................................................................................................................................................69.8
Switch to RADIUS Server Communication .......................................................................................................................69.9
AAA Server Groups Configuration......................................................................................................................................69.11
RADIUS Configuration Examples..................................................................................................................................................69.14
RADIUS Authentication..............................................................................................................................................................69.14
Single RADIUS Server Configuration ..................................................................................................................................69.16
Multiple RADIUS Server Configuration .............................................................................................................................69.16
RADIUS Server Group Configuration ................................................................................................................................69.17
RADIUS Server Configuration using Server Groups..................................................................................................69.17
Chapter 70. RADIUS Commands.......................................................................................701
Command List .............................................................................................................................................................................................70.2
Chapter 71. TACACS+ Introduction and Configuration.................................................711
Introduction...................................................................................................................................................................................................71.2
TACACS+ Overview..............................................................................................................................................................................71.2
Authentication .....................................................................................................................................................................................71.2
Authorization........................................................................................................................................................................................71.3
Configuration................................................................................................................................................................................................71.4
Configure TACACS+......................................................................................................................................................................71.4
TACACS+ Configuration Example.........................................................................................................................................71.5
Chapter 72. TACACS+ Commands...................................................................................721
Command List .............................................................................................................................................................................................72.2
Chapter 73. Local RADIUS Server Introduction and Configuration..............................731
Local RADIUS Server Introduction................................................................................................................................................73.2
Enable the Local RADIUS Server.............................................................................................................................................73.2
Add the Local RADIUS Server as a RADIUS Server....................................................................................................73.3
Add authenticators to the list of authenticators..............................................................................................................73.3
Configure the Local RADIUS Server User Database ...................................................................................................73.4
Authenticating login sessions.......................................................................................................................................................73.5
RADIUS Authentication with User Privileges....................................................................................................................73.5
Creating certificates for single users and all users...........................................................................................................73.7
Defined RADIUS attributes list..........................................................................................................................................................73.8
Chapter 74. Local RADIUS Server Commands................................................................741
Command List .............................................................................................................................................................................................74.2
Chapter 75. Secure Shell (SSH) Introduction...................................................................751
Introduction...................................................................................................................................................................................................75.2
Secure Shell on the AlliedWare Plus
OS.............................................................................................................................75.2
Configuring the SSH Server .................................................................................................................................................................75.4
Creating a Host Key.........................................................................................................................................................................75.4
Enabling the Server ...........................................................................................................................................................................75.4
Modifying the Server........................................................................................................................................................................75.5
Validating the Server Configuration ........................................................................................................................................75.6
Adding SSH Users.............................................................................................................................................................................75.6
Authenticating SSH Users.............................................................................................................................................................75.7
Adding a Login Banner ...................................................................................................................................................................75.7
Software Reference for x610 Series Switches
xvi AlliedWare Plus
TM
Operating System - Version 5.4.1 C613-50018-01 REV A
Monitoring the Server and Managing Sessions .................................................................................................................75.8
Debugging the Server......................................................................................................................................................................75.8
Configuring the SSH Client ..................................................................................................................................................................75.9
Modifying the Client.........................................................................................................................................................................75.9
Adding SSH Servers ......................................................................................................................................................................75.10
Authenticating with a Server....................................................................................................................................................75.10
Connecting to a Server and Running Commands.......................................................................................................75.11
Copying files to and from the Server..................................................................................................................................75.11
Debugging the Client....................................................................................................................................................................75.11
Chapter 76. Secure Shell (SSH) Configuration.................................................................761
SSH Server Configuration Example.................................................................................................................................................76.2
Chapter 77. Secure Shell (SSH) Commands.....................................................................771
Command List .............................................................................................................................................................................................77.2
Chapter 78. DHCP Snooping Introduction and Configuration .......................................781
Introduction...................................................................................................................................................................................................78.2
DHCP Snooping.........................................................................................................................................................................................78.3
DHCP Snooping Database ..........................................................................................................................................................78.3
DHCP Option 82..............................................................................................................................................................................78.4
Traffic Filtering with DHCP Snooping....................................................................................................................................78.7
ARP Security.........................................................................................................................................................................................78.9
MAC Address Verification............................................................................................................................................................78.9
DHCP Snooping Violations..........................................................................................................................................................78.9
Interactions with Other Features...................................................................................................................................................78.10
Configuration.............................................................................................................................................................................................78.11
Configure DHCP Snooping ......................................................................................................................................................78.11
Disabling DHCP Snooping ........................................................................................................................................................78.16
Related Features..............................................................................................................................................................................78.16
Chapter 79. DHCP Snooping Commands .........................................................................791
Command List .............................................................................................................................................................................................79.2
Part 6 Network Availability
Chapter 80. VRRP Introduction and Configuration .........................................................801
Introduction...................................................................................................................................................................................................80.2
Virtual Router Redundancy Protocol .............................................................................................................................................80.3
VRRP Configuration..................................................................................................................................................................................80.4
VRRP election and preempt........................................................................................................................................................80.6
VRRP authentication ........................................................................................................................................................................80.7
VRRP debugging .................................................................................................................................................................................80.8
Configuration examples .................................................................................................................................................................80.9
Chapter 81. VRRP Commands ...........................................................................................811
Command List .............................................................................................................................................................................................81.2
Chapter 82. EPSR Introduction and Configuration..........................................................821
Introduction...................................................................................................................................................................................................82.2
Software Reference for x610 Series Switches
C613-50018-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.1 xvii
Ring Components and Operation ...................................................................................................................................................82.2
Fault Detection and Recovery............................................................................................................................................................82.4
Fault Recovery.....................................................................................................................................................................................82.4
Restoring Normal Operation......................................................................................................................................................82.6
Managing Rings with Two Breaks .............................................................................................................................................82.7
Recovery When One Break is Restored .............................................................................................................................82.8
Configuration Examples ......................................................................................................................................................................82.10
Single Domain, Single Ring Network...................................................................................................................................82.10
Single Ring, Dual Domain Network.....................................................................................................................................82.15
EPSR and Spanning Tree Operation....................................................................................................................................82.16
Chapter 83. EPSR Commands............................................................................................831
Command List .............................................................................................................................................................................................83.2
Part 7 Network Management
Chapter 84. NTP Introduction and Configuration ...........................................................841
Introduction...................................................................................................................................................................................................84.2
Overview ........................................................................................................................................................................................................84.2
NTP on the Switch ...................................................................................................................................................................................84.3
Troubleshooting..........................................................................................................................................................................................84.4
Configuration Example ...........................................................................................................................................................................84.5
Chapter 85. NTP Commands .............................................................................................851
Command List .............................................................................................................................................................................................85.2
Chapter 86. Dynamic Host Configuration Protocol (DHCP) Introduction...................861
Introduction...................................................................................................................................................................................................86.2
BOOTP ...................................................................................................................................................................................................86.2
DHCP.......................................................................................................................................................................................................86.2
DHCP Relay Agents.........................................................................................................................................................................86.2
Configuring the DHCP Server............................................................................................................................................................86.3
Create the Pool ..................................................................................................................................................................................86.3
Define the Network.........................................................................................................................................................................86.3
Define the Range ...............................................................................................................................................................................86.4
Set the Lease........................................................................................................................................................................................86.4
Enable DHCP Leasequery............................................................................................................................................................86.4
Set the Options ..................................................................................................................................................................................86.6
DHCP Lease Probing ......................................................................................................................................................................86.7
Configuring the DHCP Relay Agent...............................................................................................................................................86.8
Configuring the DHCP Relay Agent.......................................................................................................................................86.8
DHCP Relay Agent Option 82..................................................................................................................................................86.9
Configuring the DHCP Client..........................................................................................................................................................86.12
Clearing Dynamically Allocated Lease Bindings.....................................................................................................................86.13
Chapter 87. Dynamic Host Configuration Protocol (DHCP) Commands.....................871
Command List .............................................................................................................................................................................................87.2
Chapter 88. SNMP Introduction.........................................................................................881
Introduction...................................................................................................................................................................................................88.2
Network Management Framework.................................................................................................................................................88.2
Software Reference for x610 Series Switches
xviii AlliedWare Plus
TM
Operating System - Version 5.4.1 C613-50018-01 REV A
Structure of Management Information ..........................................................................................................................................88.4
Names......................................................................................................................................................................................................88.5
Instances..................................................................................................................................................................................................88.6
Syntax .......................................................................................................................................................................................................88.6
Access.......................................................................................................................................................................................................88.6
Status.........................................................................................................................................................................................................88.7
Description ............................................................................................................................................................................................88.7
The SNMP Protocol.................................................................................................................................................................................88.8
SNMP Versions ...................................................................................................................................................................................88.8
SNMP Messages .................................................................................................................................................................................88.9
Polling versus Event Notification...............................................................................................................................................88.9
Message Format for SNMPv1 and SNMPv2c.................................................................................................................88.10
SNMP Communities (Version v1 and v2c)......................................................................................................................88.11
SNMPv3 Entities..............................................................................................................................................................................88.11
SNMPv3 Message Protocol Format.....................................................................................................................................88.12
SNMPv1 and SNMPv2c .....................................................................................................................................................................88.13
SNMP MIB Views for SNMPv1 and SNMPv2c..............................................................................................................88.13
SNMP Communities .....................................................................................................................................................................88.13
Configuration Example (SNMPv1 and v2).......................................................................................................................88.15
SNMPv3 ......................................................................................................................................................................................................88.19
SNMP MIB Views for SNMPv3...............................................................................................................................................88.19
SNMP Groups ..................................................................................................................................................................................88.19
SNMP Users ......................................................................................................................................................................................88.19
SNMP Target Addresses ............................................................................................................................................................88.19
SNMP Target Params...................................................................................................................................................................88.19
Configuration Example (SNMPv3) .......................................................................................................................................88.20
Using SNMP to Manage Files and Software............................................................................................................................88.20
Copy a File to or from a TFTP Server................................................................................................................................88.21
Upgrade Software and Configuration Files......................................................................................................................88.22
Chapter 89. SNMP Commands ..........................................................................................891
Command List .............................................................................................................................................................................................89.2
Chapter 90. SNMP MIBs......................................................................................................901
Introduction...................................................................................................................................................................................................90.2
About MIBs............................................................................................................................................................................................90.2
About SNMP........................................................................................................................................................................................90.2
Obtaining MIBs....................................................................................................................................................................................90.2
Loading MIBs ........................................................................................................................................................................................90.3
Allied Telesis Enterprise MIB...............................................................................................................................................................90.5
AT-SMI-MIB ..........................................................................................................................................................................................90.6
AT-PRODUCT-MIB.........................................................................................................................................................................90.9
AT-BOARDS-MIB ..........................................................................................................................................................................90.11
AT-SYSINFO-MIB ..........................................................................................................................................................................90.14
AT-XEM-MIB.....................................................................................................................................................................................90.16
AT-ENVMONv2-MIB...................................................................................................................................................................90.17
AT-VCSTACK-MIB........................................................................................................................................................................90.22
AT-MIBVERSION-MIB.................................................................................................................................................................90.26
AT-USER-MIB ...................................................................................................................................................................................90.27
AT-RESOURCE-MIB.....................................................................................................................................................................90.29
AT-LICENSE-MIB............................................................................................................................................................................90.30
AT-TRIGGER-MIB..........................................................................................................................................................................90.33
AT-LOOPPROTECT-MIB.........................................................................................................................................................90.35
AT-SETUP-MIB ...................................................................................................................
.............................................................90.37
AT-
DNS-CLIENT
-MIB.................................................................................................................................................................90.47
AT-NTP-MIB .....................................................................................................................................................................................90.48
Software Reference for x610 Series Switches
C613-50018-01 REV A AlliedWare Plus
TM
Operating System - Version 5.4.1 xix
AT-EPSRv2-MIB...............................................................................................................................................................................90.51
AT-DHCPSN-MIB..........................................................................................................................................................................90.53
AT-FILEv2-MIB .................................................................................................................................................................................90.56
AT-LOG-MIB ....................................................................................................................................................................................90.62
AT-IP-MIB............................................................................................................................................................................................90.64
AT-VLAN-MIB..................................................................................................................................................................................90.66
Public MIBs..................................................................................................................................................................................................90.68
Private MIBs................................................................................................................................................................................................90.73
Chapter 91. LLDP Introduction and Configuration .........................................................911
Introduction...................................................................................................................................................................................................91.2
Link Layer Discovery Protocol ...........................................................................................................................................................91.2
LLDP-MED ....................................................................................................................................................................................................91.3
Voice VLAN..................................................................................................................................................................................................91.3
LLDP Advertisements .............................................................................................................................................................................91.4
Type-Length-Value (TLV) .............................................................................................................................................................91.4
LLDP-MED: Location Identification TLV ..............................................................................................................................91.7
Transmission and Reception................................................................................................................................................................91.8
LLDP-MED Operation....................................................................................................................................................................91.9
Storing LLDP Information ..................................................................................................................................................................91.10
Configuring LLDP....................................................................................................................................................................................91.11
Configure LLDP...............................................................................................................................................................................91.12
Configure LLDP-MED..................................................................................................................................................................91.14
Configure Authentication for Voice VLAN .....................................................................................................................91.19
Chapter 92. LLDP Commands ...........................................................................................921
Introduction...................................................................................................................................................................................................92.2
Command List .............................................................................................................................................................................................92.2
Chapter 93. SMTP Commands...........................................................................................931
Command List .............................................................................................................................................................................................93.2
Chapter 94. RMON Introduction and Configuration .......................................................941
Introduction...................................................................................................................................................................................................94.2
Overview ........................................................................................................................................................................................................94.2
RMON Configuration Example .........................................................................................................................................................94.3
Chapter 95. RMON Commands .........................................................................................951
Command List .............................................................................................................................................................................................95.2
Chapter 96. Triggers Introduction .....................................................................................961
Introduction...................................................................................................................................................................................................96.2
Trigger Facility ..............................................................................................................................................................................................96.2
Configuring a Trigger ...............................................................................................................................................................................96.2
Troubleshooting Triggers ......................................................................................................................................................................96.5
Chapter 97. Triggers Configuration...................................................................................971
Introduction...................................................................................................................................................................................................97.2
Restrict Internet Access..........................................................................................................................................................................97.2
Capture Unusual CPU and RAM Activity....................................................................................................................................97.4
See Daily Statistics.....................................................................................................................................................................................97.6
Software Reference for x610 Series Switches
xx AlliedWare Plus
TM
Operating System - Version 5.4.1 C613-50018-01 REV A
Turn Off Power to Port LEDs............................................................................................................................................................97.7
Capture Show Output and Save to a SD Card.......................................................................................................................97.9
Load a Release File From a SD Card ..........................................................................................................................................97.10
Chapter 98. Trigger Commands ........................................................................................981
Command List .............................................................................................................................................................................................98.2
Chapter 99. Ping Polling Introduction and Configuration ...............................................991
Introduction...................................................................................................................................................................................................99.2
How Ping Polling Works........................................................................................................................................................................99.2
Configuring Ping Polling..........................................................................................................................................................................99.4
Creating a Polling Instance............................................................................................................................................................99.4
Customizing a Polling Instance ...................................................................................................................................................99.5
Troubleshooting Ping Polling.......................................................................................................................................................99.6
Interaction with Other Protocols .....................................................................................................................................................99.6
Chapter 100. Ping Polling Commands .............................................................................1001
Command List ..........................................................................................................................................................................................100.2
Chapter 101. sFlow Introduction and Configuration .....................................................1011
sFlow Introduction..................................................................................................................................................................................101.2
The sFlow Agent .....................................................................................................................................................................................101.3
Sampling Methods ..........................................................................................................................................................................101.3
The sFlow Collector..............................................................................................................................................................................101.5
Configuring sFlow on your Switch ................................................................................................................................................101.6
Configuration Procedure............................................................................................................................................................101.7
Configuration Examples ..............................................................................................................................................................101.8
sFlow Datagrams..................................................................................................................................................................................101.13
The sFlow MIB.......................................................................................................................................................................................101.15
Chapter 102. sFlow Commands .......................................................................................1021
Command List ..........................................................................................................................................................................................102.2
Part 8 Virtual Chassis Stacking
Chapter 103. Stacking Introduction.................................................................................1031
VCStack Introduction............................................................................................................................................................................103.2
Features of Virtual Chassis Stacking .....................................................................................................................................103.2
VCStack Supported Platforms.................................................................................................................................................103.2
The Physical Stack...........................................................................................................................................................................103.2
Two Switch Stack Configuration............................................................................................................................................103.3
Resilient Stacked Topology.......................................................................................................................................................103.7
Stack Formation.......................................................................................................................................................................................103.9
The Role of the Stack Master..................................................................................................................................................103.9
Mixed-mode VCStack...............................................................................................................................................................103.11
Stack Management VLAN ......................................................................................................................................................103.11
Stack Member Failure and Recovery ........................................................................................................................................103.14
Fixed or Virtual MAC Addressing ......................................................................................................................................103.14
Stack Resiliency Link...................................................................................................................................................................103.15
Stack Failure Recovery..............................................................................................................................................................103.17
Stack Separation and Recovery ...........................................................................................................................................103.17
/