Aruba 8100 User guide

Category
Networking
Type
User guide

This manual is also suitable for

AOS-CX 10.12 Layer-2
Bridging Guide
8100, 83xx, 9300, 10000 Switch Series
Published: May 2023
Edition: 1
|2
Copyright Information
© Copyright 2023 Hewlett Packard Enterprise Development LP.
This product includes code licensed under certain open source licenses which require source
compliance. The corresponding source for these components is available upon request. This offer is
valid to anyone in receipt of this information and shall expire three years following the date of the final
distribution of this product version by Hewlett Packard Enterprise Company. To obtain such source
code, please check if the code is available in the HPE Software Center at
https://myenterpriselicense.hpe.com/cwp-ui/software but, if not, send a written request for specific
software version and product for which you want the open source code. Along with the request, please
send a check or money order in the amount of US $10.00 to:
Hewlett Packard Enterprise Company
Attn: General Counsel
WW Corporate Headquarters
1701 E Mossy Oaks Rd Spring, TX 77389
United States of America.
Notices
The information contained herein is subject to change without notice. The only warranties for Hewlett
Packard Enterprise products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an
additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or
omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession,
use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer
Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government
under vendor's standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard
Enterprise website.
Acknowledgment
Intel®, Itanium®, Optane™, Pentium®, Xeon®, Intel Inside®, and the Intel Inside logo are trademarks of
Intel Corporation in the U.S. and other countries.
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in
the United States and/or other countries.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java® and Oracle® are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
All third-party marks are property of their respective owners.
Contents
Contents
Contents 3
About this document 8
Applicable products 8
Latest version available online 8
Command syntax notation conventions 8
About the examples 9
Identifying switch ports and interfaces 9
Introduction 11
MAC address table 12
MAC address table commands 13
clear mac-address 13
mac-address-table age-time 14
show mac-address-table 15
show mac-address-table address 16
show mac-address-table count 17
show mac-address-table dynamic 18
show mac-address-table interface 20
show mac-address-table lockout 20
show mac-address-table port 21
show mac-address-table static 22
show mac-address-table vlan 23
static-mac 23
VLANs 25
VLAN interfaces 25
Access interface 25
Trunk interface 26
Traffic handling summary 27
Comparing VLAN commands on PVOS, Comware, and AOS-CX 28
Protocol-mapped VLANs 29
MAC-based VLANs 29
VLAN translation 30
Assigning a VLAN to an interface 30
Assigning a VLAN ID to an access interface 30
Assigning a VLAN ID to a trunk interface 31
Assigning a native VLAN ID to a trunk interface 33
VLAN numbering 33
Configuring VLANs 34
Creating and enabling a VLAN 34
Disabling a VLAN 34
Viewing VLAN configuration information 34
VLAN scenario 36
UUFB 42
VLAN commands 43
description 43
AOS-CX 10.12 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 3
Contents |4
vlan name 43
show capacities-status vlan-count 44
show capacities svi-count 44
show capacities vlan-count 45
show capacities-status vlan-translation 46
show system internal-vlan-range 46
show vlan 47
show vlan port 48
show vlan summary 49
show vlan translation 50
show vlan translation pending 52
show vlan voice 52
shutdown 53
system internal-vlan-range 54
trunk-dynamic-vlan-include 55
uufb 56
vlan 57
vlan access 58
vlan protocol 59
vlan translate 61
vlan trunk allowed 63
vlan trunk native 64
vlan trunk native tag 65
voice 66
QinQ 68
QinQ feature interactions 68
QinQtypes 69
Selective QinQ 69
Transparent QinQ 69
Configuring and displaying QinQ 70
QinQ limitations 71
QinQ commands 72
debug vlan qinq 72
diag-dump l2vlan basic 72
qinq port-type 73
qinq ethertype 74
qinq vlan-map 74
show qinq 75
show qinq detail 76
show qinq interface 77
show running-config qinq 78
show tech qinq 79
svlan 80
Loop protection 82
Interaction with other protocols 83
Configuring loop protection 83
Loop protect commands 85
loop-protect 85
loop-protect action 86
loop-protect re-enable-timer 87
loop-protect transmit-interval 88
loop-protect trap loop-detected 88
loop-protect vlan 89
show loop-protect 90
MVRP 93
MVRP functionality and limitations 93
MRP messages 94
Join message 94
New message 94
Leave message 95
LeaveAll message 95
Configuring MVRP 95
MVRP scenario 1 96
MVRP scenario 2 100
MVRP commands 107
clear mvrp statistics 107
mvrp 108
mvrp registration 109
mvrp timer 110
show mvrp config 111
show mvrp state 111
show mvrp statistics 112
Spanning tree protocols (STP) 115
Protocols and feature details 115
STP 115
Root bridge 115
Root port 115
Designated bridge and designated port 115
Path cost 116
STP timers 116
BPDU forwarding mechanism 117
STP protocol packets 117
Comparing spanning tree options 118
Preparing for spanning tree configuration 118
STP cost calculation 119
Simplified calculation overview 119
Calculation example 120
STP supported platforms and scale 125
Scale 125
MSTP protocol and feature details 125
MSTP key concepts 126
MSTP configuration tasks 129
MSTP considerations and best practices 130
MSTP use cases 131
MSTP use case: Preventing loops 131
MSTP use case: Deterministic root bridges 134
Switch A configuration 135
Switch B configuration 135
Switch C and D configuration 136
Checking the configuration 136
Observe port behavior and state 137
MSTP use case: BPDU protection 139
MSTP use case: Root protection 141
MSTP use case: Spanning tree on edge ports 144
MSTP commands 147
clear spanning-tree statistics 147
show spanning-tree 147
show spanning-tree detail 148
show spanning-tree inconsistent-ports 150
AOS-CX 10.12 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 5
Contents |6
show spanning-tree mst 151
show spanning-tree mst-config 153
show spanning-tree mst detail 154
show spanning-tree mst <INSTANCE-ID> 158
show spanning-tree mst <INSTANCE-ID> detail 159
show spanning-tree mst interface 160
show spanning-tree summary port 161
show spanning-tree summary root 162
spanning-tree 163
spanning-tree bpdu-filter 163
spanning-tree bpdu-guard 164
spanning-tree bpdu-guard timeout 165
spanning-tree config-name 166
spanning-tree config-revision 167
spanning-tree cost 168
spanning-tree forward-delay 169
spanning-tree hello-time 169
spanning-tree instance cost 170
spanning-tree instance port-priority 171
spanning-tree instance priority 172
spanning-tree instance vlan 173
spanning-tree link-type 174
spanning-tree loop-guard 175
spanning-tree max-age 176
spanning-tree max-hops 176
spanning-tree mode 177
spanning-tree port-priority 178
spanning-tree port-type 179
spanning-tree priority 180
spanning-tree root-guard 181
spanning-tree rpvst-filter 182
spanning-tree rpvst-guard 183
spanning-tree tcn-guard 183
spanning-tree transmit-hold-count 184
spanning-tree trap 185
MSTP debugging and troubleshooting 188
MSTP FAQ 189
RPVST+ protocol and feature details 191
RPVST+ vPorts 194
RPVST+ configuration tasks 195
Viewing RPVST+ information 197
RPVST+ Considerations and best practices 197
RPVST+ use cases 199
RPVST+ use case: Deterministic root bridges 199
Switch A configuration 200
Switch B configuration 201
Switch C and D configuration 201
Checking the configuration 202
Observe port behavior and state 202
RPVST+ use case: BPDU protection 205
RPVST+ use case: Root protection 208
RPVST+ use case: Spanning tree on edge ports 210
RPVST+ use case: Preventing loops 211
RPVST+ commands 214
clear spanning-tree statistics 214
show capacities rpvst 214
show capacities-status rpvst 215
show spanning-tree 215
show spanning-tree detail 217
show spanning-tree inconsistent-ports 218
show spanning-tree summary port 219
show spanning-tree summary root 220
show spanning-tree vlan 221
show spanning-tree vlan detail 222
spanning-tree bpdu-guard timeout 224
spanning-tree extend-system-id 225
spanning-tree ignore-pvid-inconsistency 225
spanning-tree link-type 227
spanning-tree mode 227
spanning-tree pathcost-type 228
spanning-tree rpvst-mstp interconnect vlan 229
spanning-tree tcn-guard 230
spanning-tree vlan 231
spanning-tree vlan cost 232
spanning-tree vlan port-priority 233
spanning-tree trap 233
RPVST+ debugging and troubleshooting 236
RPVST+ FAQ 237
UDLD 238
Configuring UDLD 239
UDLD scenario 240
UDLD commands 241
clear udld statistics 241
show udld 242
udld 244
udld interval 245
udld mode 247
udld retries 249
Private VLAN 250
Private VLAN commands 255
diag-dump private-vlan basic 255
private-vlan 256
private-vlan port-type 257
show capacities private-vlan 259
show capacities-status private-vlan 259
show private-vlan 260
show private-vlan association 261
show private-vlan inconsistency 262
show private-vlan port-type 264
show running-configuration private-vlan 265
show tech private-vlan 266
Support and Other Resources 268
Accessing Aruba Support 268
Accessing Updates 269
Aruba Support Portal 269
My Networking 269
Warranty Information 269
Regulatory Information 269
Documentation Feedback 270
AOS-CX 10.12 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 7
Chapter 1
About this document
About this document
This document describes features of the AOS-CX network operating system. It is intended for
administrators responsible for installing, configuring, and managing Aruba switches on a network.
Applicable products
This document applies to the following products:
nAruba 8100 Switch Series (R9W94A, R9W95A, R9W96A, R9W97A)
nAruba 8320 Switch Series (JL479A, JL579A, JL581A)
nAruba 8325 Switch Series (JL624A, JL625A, JL626A, JL627A)
nAruba 8360 Switch Series (JL700A, JL701A, JL702A, JL703A, JL706A, JL707A, JL708A, JL709A, JL710A,
JL711A, JL700C, JL701C, JL702C, JL703C, JL706C, JL707C, JL708C, JL709C, JL710C, JL711C, JL704C, JL705C,
JL719C, JL718C, JL717C, JL720C, JL722C, JL721C )
nAruba 9300 Switch Series (R9A29A, R9A30A, R8Z96A)
nAruba 10000 Switch Series (R8P13A, R8P14A)
Latest version available online
Updates to this document can occur after initial publication. For the latest versions of product
documentation, see the links provided in Support and Other Resources.
Command syntax notation conventions
Convention Usage
example-text Identifies commands and their options and operands, code examples,
filenames, pathnames, and output displayed in a command window. Items
that appear like the example text in the previous column are to be entered
exactly as shown and are required unless enclosed in brackets ([ ]).
example-text In code and screen examples, indicates text entered by a user.
Any of the following:
n<example-text>
n<example-text>
nexample-text
nexample-text
Identifies a placeholder—such as a parameter or a variable—that you must
substitute with an actual value in a command or in code:
nFor output formats where italic text cannot be displayed, variables
are enclosed in angle brackets (< >). Substitute the text—including
the enclosing angle brackets—with an actual value.
nFor output formats where italic text can be displayed, variables
might or might not be enclosed in angle brackets. Substitute the
text including the enclosing angle brackets, if any, with an actual
value.
AOS-CX 10.12 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 8
About this document |9
Convention Usage
|Vertical bar. A logical OR that separates multiple items from which you can
choose only one.
Any spaces that are on either side of the vertical bar are included for
readability and are not a required part of the command syntax.
{ } Braces. Indicates that at least one of the enclosed items is required.
[ ] Brackets. Indicates that the enclosed item or items are optional.
or
...
Ellipsis:
nIn code and screen examples, a vertical or horizontal ellipsis indicates an
omission of information.
nIn syntax using brackets and braces, an ellipsis indicates items that can be
repeated. When an item followed by ellipses is enclosed in brackets, zero
or more items can be specified.
About the examples
Examples in this document are representative and might not match your particular switch or
environment.
The slot and port numbers in this document are for illustration only and might be unavailable on your
switch.
Understanding the CLI prompts
When illustrating the prompts in the command line interface (CLI), this document uses the generic term
switch, instead of the host name of the switch. For example:
switch>
The CLI prompt indicates the current command context. For example:
switch>
Indicates the operator command context.
switch#
Indicates the manager command context.
switch(CONTEXT-NAME)#
Indicates the configuration context for a feature. For example:
switch(config-if)#
Identifies the interface context.
Variable information in CLI prompts
In certain configuration contexts, the prompt may include variable information. For example, when in
the VLAN configuration context, a VLAN number appears in the prompt:
switch(config-vlan-100)#
When referring to this context, this document uses the syntax:
switch(config-vlan-<VLAN-ID>)#
Where <VLAN-ID> is a variable representing the VLAN number.
Identifying switch ports and interfaces
Physical ports on the switch and their corresponding logical software interfaces are identified using the
format:
member/slot/port
On the 83xx, 9300, and 10000 Switch Series
nmember: Always 1. VSF is not supported on this switch.
nslot: Always 1. This is not a modular switch, so there are no slots.
nport: Physical number of a port on the switch.
For example, the logical interface 1/1/4 in software is associated with physical port 4 on the switch.
If using breakout cables, the port designation changes to x:y, where x is the physical port and y is the lane when
split to 4 x 10G or 4 x 25G. For example, the logical interface 1/1/4:2 in software is associated with lane 2 on
physical port 4 in slot 1 on member 1.
AOS-CX 10.12 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 10
Chapter 2
Introduction
Introduction
Switches use network bridging to facilitate the interconnection of local area networks (LANs) so that
traffic can be exchanged between devices. Bridging occurs at layer 2 of the OSI model.
When creating network bridges on HPE switches, network administrators can configure MAC addressing,
VLANs, and various loop prevention protocols.
Devices on a network are identified by their MAC address. The switch maintains a MAC address table
where it stores information about the other Ethernet interfaces to which a switch is connected. The table
enables the switch to send outgoing data (Ethernet frames) on the specific port required to reach its
destination, instead of broadcasting the data on all ports (flooding).
VLANs are primarily used to provide network segmentation at layer 2. VLANs enable the grouping of
users by logical function instead of physical location. Layer 2 VLANs can be associated with a single
physical port, or multiple aggregated ports (referred to as LAG, short form for Link Aggregation). Link
Aggregation enables a logical grouping of individual interfaces to function as a single, higher-speed link,
providing dramatically increased bandwidth. This mechanism provides network resiliency when
individual link failures occur. Aruba switches include advanced network resiliency through MCLAG (Multi
Chassis Link Aggregation) which offers network resiliency on individual device failure as well.
When multiple individual links are connected to one another, there is a possibility that multiple paths
(loops) will exist between devices. Loops reduce network operational efficiency. AOS-CX provides several
features to detect and avoid loops, including:
nMSTP: Multiple-Instance spanning tree protocol (MSTP) ensures that only one active path exists
between any two nodes in a spanning tree instance. A spanning tree instance comprises a unique set
of VLANs, and belongs to a specific spanning tree region. A region can comprise multiple spanning
tree instances (each with a different set of VLANs), and allows one active path among regions in a
network.
nRPVST+: Rapid Per VLAN Spanning Tree+ (RPVST+) is an updated implementation of STP (Spanning
Tree Protocol). It enables the creation of a separate spanning tree for each VLAN on a switch, and
ensures that only one active, loop-free path exists between any two nodes on a given VLAN.
nLoop Protection: In cases where spanning tree protocols cannot be used to prevent loops at the edge
of the network, loop protection may provide a suitable alternative. Loop protection can find loops in
untagged layer 2 links, as well as on tagged VLANs.
AOS-CX also supports the MVRP (Multiple VLAN Registration Protocol), a registration protocol defined by
IEEE, which propagates VLAN information dynamically across devices. It also enables devices to learn
and automatically synchronize VLAN configuration information, reducing the configuration workload.
Additionally, AOS-CX supports the Unidirectional Link Detection (UDLD) protocol. UDLD monitors the link
between two network devices, and if the link fails, blocks the ports on both ends of the link. UDLD is
useful for detecting failures in fiber links and trunks.
AOS-CX 10.12 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 11
Chapter 3
MAC address table
MAC address table
The MAC address table is where the switch stores information about the other Ethernet interfaces to
which it is connected on a network. The table enables the switch to send outgoing data (Ethernet
frames) on the specific port required to reach its destination, instead of broadcasting the data on all
ports (flooding).
The MAC address table can contain two types of entries:
nStatic: Static entries are manually added to the table by a switch administrator. Static entries have
higher priority than dynamic entries. Static entries remain active until they are removed by the switch
administrator.
nDynamic: Dynamic entries are automatically added to the table through a process called MAC
learning, in which the switch retrieves the source MAC address (and VLAN ID, if present) of each
Ethernet frame received on a port. If the retrieved address does not exist in the table, it is added.
Dynamic entries remain in the table for a predetermined amount of time (defined with the command
mac-address-table age-time), after which they are automatically deleted.
Dynamic MAC address learning does not distinguish between illegitimate and legitimate frames, which
can invite security hazards. When Host A is connected to port A, a MAC address entry will be learned for
the MAC address of Host A (for example, MAC A). When an illegal user sends frames with MAC A as the
source MAC address to port B, the device performs the following operations:
1. Learns a new MAC address entry with port B as the outgoing interface and overwrites the old
entry for MAC A.
2. Forwards frames destined for MAC A out of port B to the illegal user.
As a result, the illegal user obtains the data of Host A. To improve the security for Host A, manually
configure a static entry to bind Host A to port A. Then, the frames destined for Host A are always sent
out of port A. Other hosts using the forged MAC address of Host A cannot obtain the frames destined
for Host A.
For example, in the following topology, switch A learns the MAC addresses of ports on switch B, C, and D.
This way, traffic between any two switches is not broadcast to the other switches. For example, if server
1 sends traffic to server 3, it does not get broadcast onto the link to switch C, only on the link to switch D.
AOS-CX 10.12 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 12
MAC address table |13
MAC address table commands
clear mac-address
clear mac-address {interface <INTERFACE> | port <PORT-NUM> [vlan <VLAN-ID>] | vlan <VLAN-
ID> [port <PORT-NUM>] | <MAC-ADDR> [vlan <VLAN-ID>] [force]}
Description
Clears the dynamic learned MAC addresses on the specified interface, combination of interface and
VLAN, port, VLAN, combination of port and VLAN, MACaddress, or combination of MAC address and
VLAN. The command does not clear any port-security learned MAC addresses.
Port-security MACaddresses are cleared when the port on which the MAC addresses were learned are
shut down or the port-access-security feature is disabled on the port or the switch.
Parameter Description
<INTERFACE> Specifies the list of interfaces, for example, 1/1/1 or 1/1/1-
1/1/3 or lag1 or vxlan1.
<PORT-NUM> Specifies a physical port on the switch. Format:
member/slot/port.
<VLAN-ID> Specifies the number of a VLAN.
<MAC-ADDR> Specifies the MACaddress.
force Clears the specified MAC address even if the MAC address is
internally programmed by MAC management.
Examples
Clearing the learned MAC addresses on a port:
switch# clear mac-address port 1/1/1
Clearing the learned MAC addresses on a combination of a VLAN and a port:
switch# clear mac-address port 1/1/1 vlan 20
switch# clear mac-address vlan 2 port 1/1/3
Clearing the learned MAC addresses on a combination of a VLAN and an interface or a list of interfaces:
switch# clear mac-address interface 1/1/1 vlan 10
switch# clear mac-address vlan 1 interface 1/1/1-1/1/3
Clearing the specified MAC addresses entry on the VLAN:
switch# clear mac-address 14:FA:01:F1:8B:8F vlan 1
Clearing the specified MAC addresses entry by force:
switch# clear mac-address 14:FA:01:F1:8B:8F force
Command History
Release Modification
10.09 Added parameters for interface and MAC address.
10.07 or earlier --
Command Information
Platforms Command context Authority
All platforms Manager (#)Administrators or local user group members with execution rights
for this command.
mac-address-table age-time
mac-address-table age-time <SECONDS>
no mac-address-table age-time [<SECONDS>]
Description
Sets the maximum amount of time a MAC address remains in the MAC address table. When this time
expires, the MAC address is removed.
The no form of this command resets the MAC aging timer to the default value (300 seconds).
AOS-CX 10.12 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 14
MAC address table |15
Parameter Description
age-time <SECONDS> Specifies the MAC address aging time in seconds. Range: 60 to
3600. Default: 300.
Example
switch(config)# mac-address-table age-time 120
Command History
Release Modification
10.07 or earlier --
Command Information
Platforms Command context Authority
All platforms config Administrators or local user group members with execution rights
for this command.
show mac-address-table
show mac-address-table [hsc] [vsx-peer]
Description
Shows MAC address table information. If HSC is enabled, MAC addresses discovered by the HSC
manager are also displayed.
Parameter Description
[hsc] Displays only MAC address discovered by the HSC manager on the
remote controller.
vsx-peer Shows the output from the VSX peer switch. If the switches do not
have the VSX configuration or the ISL is down, the output from the
VSX peer switch is not displayed. This parameter is available on
switches that support VSX.
Examples
Showing output when table entries exist:
switch# show mac-address-table
MAC age-time : 300 seconds
Number of MAC addresses : 5
MAC Address VLAN Type Port
--------------------------------------------------
00:00:00:00:00:05 1 dynamic 1/1/2
00:00:00:00:00:06 2 dynamic 1/1/1
00:00:00:00:00:08 3 hsc vxlan1(10.1.1.1)
00:00:00:00:00:12 3 hsc vxlan1(10.1.1.3)
00:00:00:00:00:34 3 hsc vxlan1(10.1.1.4)
Showing output that includes information about an IPv6 VXLAN:
3C-T-6300-27# show mac-address-table
MAC age-time : 300 seconds
Number of MAC addresses : 2
MAC Address VLAN Type Port
--------------------------------------------------------------
00:50:56:8d:44:13 1001 dynamic 1/1/2
00:50:56:8d:45:63 1002 evpn vxlan1(1920:1680:1:1::2)
Showing output when there are no MAC table entries:
switch# show mac-address-table
No MAC entries found.
Showing only MAC address discovered by the HSC manager:
switch# show mac-address-table hsc
Number of MAC addresses : 3
MAC Address VLAN Type Port
---------------------------------------------------------
00:00:00:00:00:08 3 hsc vxlan1(10.1.1.1)
00:00:00:00:00:12 3 hsc vxlan1(10.1.1.3)
00:00:00:00:00:34 3 hsc vxlan1(10.1.1.4)
Command History
Release Modification
10.07 or earlier --
Command Information
Platforms Command context Authority
All platforms Operator (>) or Manager
(#)
Operators or Administrators or local user group members with
execution rights for this command. Operators can execute this
command from the operator context (>) only.
show mac-address-table address
show mac-address-table address <MAC-ADDR> [vsx-peer]
Description
Shows MAC address table information for a specific MAC address.
AOS-CX 10.12 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 16
MAC address table |17
Parameter Description
<MAC-ADDR> Specifies the MAC address.
vsx-peer Shows the output from the VSX peer switch. If the switches do not
have the VSX configuration or the ISL is down, the output from the
VSX peer switch is not displayed. This parameter is available on
switches that support VSX.
Example
switch# show mac-address-table address 00:00:00:00:00:01
MAC age-time : 300 seconds
Number of MAC addresses : 2
MAC Address VLAN Type Port
--------------------------------------------------
00:00:00:00:00:01 2 dynamic 1/1/1
00:00:00:00:00:01 1 dynamic 1/1/1
Command History
Release Modification
10.07 or earlier --
Command Information
Platforms Command context Authority
All platforms Operator (>) or Manager
(#)
Operators or Administrators or local user group members with
execution rights for this command. Operators can execute this
command from the operator context (>) only.
show mac-address-table count
show mac-address-table count
[dynamic | port <PORT-NUM> | vlan <VLAN-ID>] [vsx-peer]
Description
Displays the number of MAC addresses.
Parameter Description
dynamic Show the count of dynamically learned MAC addresses.
<PORT-NUM> Specifies a physical port on the switch. Format:
member/slot/port.
vlan <VLAN-ID> Specifies the number of a VLAN.
vsx-peer Shows the output from the VSX peer switch. If the switches do not
have the VSX configuration or the ISL is down, the output from the
VSX peer switch is not displayed. This parameter is available on
switches that support VSX.
Examples
Showing the number of MAC addresses:
switch# show mac-address-table count
Number of MAC addresses : 8
Showing the number of dynamically learned MAC addresses:
switch# show mac-address-table count dynamic
Number of MAC addresses : 8
Showing the number of MAC addresses per physical port on the switch:
switch# show mac-address-table count port 1/1/1
Number of MAC addresses : 2
Showing the number of MAC addresses per VLAN:
switch# show mac-address-table count vlan 100
Number of MAC addresses : 5
Showing the number of MAC addresses on the VSX primary and secondary (peer) switch:
vsx-primary# show mac-address-table count
Number of MAC addresses : 26114
vsx-primary# show mac-address-table count vsx-peer
Number of MAC addresses : 26113
Command History
Release Modification
10.07 or earlier --
Command Information
Platforms Command context Authority
All platforms Operator (>) or Manager
(#)
Operators or Administrators or local user group members with
execution rights for this command. Operators can execute this
command from the operator context (>) only.
show mac-address-table dynamic
show mac-address-table dynamic [port <PORT-NUM> | vlan <VLAN-ID>] [vsx-peer]
Description
Shows MAC address table information about dynamically learned MAC addresses.
AOS-CX 10.12 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 18
MAC address table |19
Parameter Description
<PORT-NUM> Specifies a physical port on the switch. Format:
member/slot/port.
<VLAN-ID> Specifies the number of a VLAN.
vsx-peer Shows the output from the VSX peer switch. If the switches do not
have the VSX configuration or the ISL is down, the output from the
VSX peer switch is not displayed. This parameter is available on
switches that support VSX.
Examples
Showing all dynamic MAC address table entries:
switch# show mac-address-table dynamic
MAC age-time : 300 seconds
Number of MAC addresses : 2
MAC Address VLAN Type Port
--------------------------------------------------
00:00:00:00:00:05 1 dynamic 1/1/2
00:00:00:00:00:06 2 dynamic 1/1/1
Showing dynamic MAC address table entries for VLAN 1:
switch# show mac-address-table dynamic vlan 1
MAC age-time : 300 seconds
Number of MAC addresses : 1
MAC Address VLAN Type Port
--------------------------------------------------
00:00:00:00:00:05 1 dynamic 1/1/2
Showing dynamic MAC address table entries for port 1/1/1:
switch# show mac-address-table dynamic port 1/1/1
MAC age-time : 300 seconds
Number of MAC addresses : 1
MAC Address VLAN Type Port
--------------------------------------------------
00:00:00:00:00:06 2 dynamic 1/1/1
Command History
Release Modification
10.07 or earlier --
Command Information
Platforms Command context Authority
All platforms Operator (>) or Manager
(#)
Operators or Administrators or local user group members with
execution rights for this command. Operators can execute this
command from the operator context (>) only.
show mac-address-table interface
show mac-address-table interface <INTERFACE>
Description
Shows the MAC address table entries for the specified interface.
Parameter Description
<INTERFACE> Specifies an interface or a list of interfaces on the switch.
Examples
Showing the MAC address table entries for interface 1/1/1:
switch# show mac-address-table interface 1/1/1
MAC age-time : 300 seconds
Number of MAC addresses : 1
MAC Address VLAN Type Interface
--------------------------------------------------
00:00:00:00:00:01 2 dynamic 1/1/1
Command History
Release Modification
10.09 Command introduced
Command Information
Platforms Command context Authority
All platforms Operator (>) or Manager
(#)
Operators or Administrators or local user group members with
execution rights for this command. Operators can execute this
command from the operator context (>) only.
show mac-address-table lockout
show mac-address-table lockout [vsx-peer]
Description
Shows MAC lockout table information.
AOS-CX 10.12 Layer-2 Bridging Guide | 8100, 83xx, 9300, 10000 Switch Series 20
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270

Aruba 8100 User guide

Category
Networking
Type
User guide
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI