Aruba JL588A Configuration Guide

Category
Networking
Type
Configuration Guide
HPE FlexFabric 5710 Switch Series
Fundamentals Configuration Guide
Software version: Release 671x and later
Document version: 6W100-20230822
© Copyright 2023 Hewlett Packard Enterprise Development LP
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard
Enterprise products and services are set forth in the express warranty statements accompanying such
products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett
Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or
copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s
standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise
website.
Acknowledgments
Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the
United States and other countries.
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java and Oracle are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
i
Contents
Using the CLI ································································································· 1
About the CLI ····················································································································································· 1
Using CLI views ················································································································································· 1
About CLI views ········································································································································· 1
Entering system view from user view ········································································································· 2
Returning to the upper-level view from a view ··························································································· 2
Returning to user view ······························································································································· 2
Accessing the CLI online help ···························································································································· 3
Using the undo form of a command ··················································································································· 3
Entering a command ·········································································································································· 4
Editing a command line ······························································································································ 4
Entering a text or string type value for an argument ·················································································· 5
Entering an interface type ·························································································································· 5
Abbreviating commands ····························································································································· 6
Configuring and using command aliases ··································································································· 6
Configuring and using hotkeys ··················································································································· 7
Enabling redisplaying entered-but-not-submitted commands ···································································· 9
Understanding command-line syntax error messages ······················································································· 9
Using the command history feature ················································································································· 10
About command history buffers ··············································································································· 10
Command buffering rules ························································································································· 10
Managing and using the command history buffers ·················································································· 10
Repeating commands in the command history buffer for a user line ······················································· 11
Controlling the CLI output ································································································································ 11
Pausing between screens of output ········································································································· 11
Numbering each output line from a display command ············································································· 12
Filtering the output from a display command ··························································································· 13
Saving the output from a display command to a file ················································································ 16
Viewing and managing the output from a display command effectively ··················································· 17
Configuring RBAC ······················································································· 18
About RBAC ····················································································································································· 18
Permission assignment ···························································································································· 18
User role assignment ······························································································································· 20
FIPS compliance ·············································································································································· 21
RBAC tasks at a glance ··································································································································· 21
Creating a user role·········································································································································· 21
Configuring user role rules ······························································································································· 22
Configuring a feature group ····························································································································· 23
Configuring resource access policies··············································································································· 24
About resource access policies················································································································ 24
Restrictions and guidelines for resource access policy configuration ······················································ 24
Configuring the interface policy for a user role························································································· 24
Configuring the VLAN policy for a user role ····························································································· 25
Configuring the VPN instance policy for a user role················································································· 25
Assigning user roles ········································································································································· 25
Restrictions and guidelines for user role assignment ··············································································· 25
Enabling the default user role feature ······································································································ 26
Assigning user roles to remote AAA authentication users ······································································· 26
Assigning user roles to local AAA authentication users ··········································································· 26
Assigning user roles to non-AAA authentication users on user lines ······················································· 27
Configuring temporary user role authorization ································································································· 27
About temporary user role authorization ·································································································· 27
Restrictions and guidelines for temporary user role authorization ··························································· 28
Setting the authentication mode for temporary user role authorization···················································· 29
Specifying the default target user role for temporary user role authorization··········································· 29
Setting an authentication password for temporary user role authorization ·············································· 29
ii
Automatically obtaining the login username for temporary user role authorization·································· 30
Obtaining temporary user role authorization ···························································································· 30
Display and maintenance commands for RBAC ······························································································ 31
RBAC configuration examples ························································································································· 31
Example: Configuring RBAC for local AAA authentication users ····························································· 31
Example: Configuring RBAC for RADIUS authentication users ······························································· 33
Example: Configuring RBAC temporary user role authorization (HWTACACS authentication) ··············· 36
Example: Configuring RBAC temporary user role authorization (RADIUS authentication) ······················ 40
Troubleshooting RBAC ···································································································································· 43
Local users have more access permissions than intended ······································································ 43
Login attempts by RADIUS users always fail ··························································································· 43
Login overview ····························································································· 44
Using the console port for the first device access ········································ 45
Configuring CLI login ··················································································· 46
About CLI login················································································································································· 46
User lines ················································································································································· 46
Login authentication modes ····················································································································· 46
User roles ················································································································································· 47
FIPS compliance ·············································································································································· 47
Restrictions and guidelines: CLI login configuration ························································································ 47
Configuring console login ································································································································· 48
About console login ·································································································································· 48
Restrictions and guidelines ······················································································································ 48
Console login configuration tasks at a glance ·························································································· 48
Configuring console login authentication ································································································· 48
Configuring common console login settings ····························································································· 50
Configuring Telnet login ··································································································································· 52
About Telnet login ···································································································································· 52
Restrictions and guidelines ······················································································································ 52
Configuring the device as a Telnet server ································································································ 53
Using the device to log in to a Telnet server ···························································································· 56
Configuring SSH login ······································································································································ 57
About SSH login ······································································································································· 57
Configuring the device as an SSH server ································································································ 57
Using the device to log in to an SSH server····························································································· 59
Display and maintenance commands for CLI login ·························································································· 59
Accessing the device through SNMP ··························································· 61
Configuring RESTful access ········································································ 62
About RESTful access ····································································································································· 62
FIPS compliance ·············································································································································· 62
Configuring RESTful access over HTTP ·········································································································· 62
Configuring RESTful access over HTTPS ······································································································· 63
Controlling user access to the device ·························································· 64
About login user access control ······················································································································· 64
FIPS compliance ·············································································································································· 64
Controlling Telnet and SSH logins ··················································································································· 64
Controlling Telnet logins ··························································································································· 64
Controlling SSH logins ····························································································································· 65
Example: Controlling Telnet login ············································································································ 65
Controlling SNMP access ································································································································ 66
About SNMP access control ···················································································································· 66
Example: Controlling SNMP access ········································································································ 66
Configuring command authorization ················································································································ 66
About command authorization ················································································································· 66
Restrictions and guidelines ······················································································································ 67
Procedure ················································································································································· 67
iii
Example: Configuring command authorization ························································································ 68
Configuring command accounting ··················································································································· 69
About command accounting ····················································································································· 69
Restrictions and guidelines ······················································································································ 70
Procedure ················································································································································· 70
Example: Configuring command accounting ···························································································· 71
Configuring FTP ·························································································· 73
About FTP ························································································································································ 73
FTP file transfer modes ···························································································································· 73
FTP operation modes ······························································································································· 73
FIPS compliance ·············································································································································· 73
Using the device as an FTP server ·················································································································· 73
FTP server configuration tasks at a glance ······························································································ 73
Restrictions and guidelines for FTP server configuration ········································································· 74
Enabling the FTP server ·························································································································· 74
Configuring client authentication and authorization ················································································· 74
Configuring FTP server access control ···································································································· 74
Setting connection management parameters ·························································································· 75
Specifying an SSL server policy for SFTP connections ··········································································· 75
Setting the DSCP value for outgoing FTP packets ·················································································· 76
Manually releasing FTP connections ······································································································· 76
Display and maintenance commands for the FTP server ········································································ 76
Example: Using the device as an FTP server ·························································································· 76
Using the device as an FTP client ··················································································································· 78
FTP client configuration tasks at a glance ······························································································· 78
Establishing an FTP connection··············································································································· 78
Displaying command help information ····································································································· 79
Displaying directories and files on the FTP server ··················································································· 79
Managing directories on the FTP server ·································································································· 80
Managing directories on the FTP client ···································································································· 80
Working with files on the FTP server ······································································································· 80
Changing to another user account ··········································································································· 81
Maintaining and troubleshooting the FTP connection ·············································································· 81
Terminating the FTP connection ·············································································································· 82
Display and maintenance commands for the FTP client ·········································································· 82
Example: Using the device as an FTP client ···························································································· 83
Configuring TFTP ························································································ 85
About TFTP ······················································································································································ 85
FIPS compliance ·············································································································································· 85
Restrictions and guidelines: TFTP configuration······························································································ 85
Configuring the device as a TFTP server········································································································· 85
Configuring and using the IPv4 TFTP client····································································································· 85
Configuring and using the IPv6 TFTP client····································································································· 86
Managing file systems ················································································· 87
About file system management ························································································································ 87
Storage media and file systems ··············································································································· 87
Directories ················································································································································ 88
Files ·························································································································································· 88
Specifying a directory name or file name ································································································· 89
FIPS compliance ·············································································································································· 89
Restrictions and guidelines: File system management ···················································································· 89
Managing storage media and file systems ······································································································· 90
Partitioning a storage medium ················································································································· 90
Mounting or unmounting a file system ····································································································· 90
Formatting a file system ··························································································································· 91
Repairing a file system ····························································································································· 91
Managing files and directories ························································································································· 91
Setting the operation mode for files and directories ················································································· 91
Displaying file and directory information ·································································································· 92
iv
Displaying the contents of a text file········································································································· 92
Displaying the working directory ·············································································································· 92
Changing the working directory ················································································································ 92
Creating a directory ·································································································································· 92
Renaming a file or directory ····················································································································· 92
Copying a file ··········································································································································· 93
Moving a file ············································································································································· 93
Deleting and restoring files ······················································································································· 93
Deleting a directory ·································································································································· 94
Archiving files and directories ·················································································································· 94
Extracting files and directories ················································································································· 94
Compressing a file ··································································································································· 95
Decompressing a file ································································································································ 95
Calculating the file digest ························································································································· 95
Executing a batch file ······································································································································· 95
Managing configuration files ········································································ 96
About configuration file management··············································································································· 96
Configuration types ·································································································································· 96
Configuration file types and file selection process at startup ··································································· 97
Next-startup configuration file redundancy······························································································· 97
Configuration file content organization and format ··················································································· 97
Configuration rollback ······························································································································ 98
FIPS compliance ·············································································································································· 98
Enabling configuration encryption ···················································································································· 98
Assigning a user exclusive write access to the configuration ·········································································· 99
Disabling automatic system-wide next-startup configuration file operations ···················································· 99
Saving the running configuration ··················································································································· 100
Comparing configurations for their differences ······························································································ 102
Configuring configuration rollback ·················································································································· 103
Configuration rollback tasks at a glance ································································································ 103
Setting configuration archive parameters ······························································································· 103
Archiving the running configuration ········································································································ 105
Rolling back configuration ······················································································································ 106
Configuring configuration commit delay ········································································································· 107
Specifying a next-startup configuration file ···································································································· 107
Backing up and restoring the main next-startup configuration file ································································· 108
About backing up and restoring the main next-startup configuration file ··············································· 108
Restrictions and guidelines for configuration backup and restoration ···················································· 108
Prerequisites for configuration backup and restoration ·········································································· 108
Backing up the main next-startup configuration file to a TFTP server ··················································· 109
Restoring the main next-startup configuration file from a TFTP server ·················································· 109
Deleting a next-startup configuration file ········································································································ 109
Display and maintenance commands for configuration files ·········································································· 110
Upgrading software ···················································································· 112
About software upgrade ································································································································· 112
Software types ······································································································································· 112
Software release forms ·························································································································· 113
Upgrade methods ··································································································································· 113
Software image loading ·························································································································· 113
Digitally signed software images ···················································································································· 114
Restrictions and guidelines: Software upgrade ······························································································ 114
Upgrading device software by using the boot loader method ········································································ 115
Software upgrade tasks at a glance ······································································································· 115
Prerequisites ·········································································································································· 115
Preloading the BootWare image to BootWare ······················································································· 115
Specifying startup images and completing the upgrade ········································································ 116
Synchronizing startup images from the master device to subordinate devices ····································· 116
Display and maintenance commands for software image settings ································································ 117
Software upgrade examples ·························································································································· 117
Example: Upgrading device software ····································································································· 117
v
Performing an ISSU ··················································································· 119
About ISSU ···················································································································································· 119
ISSU advantages ··································································································································· 119
ISSU methods ········································································································································ 119
ISSU commands ···································································································································· 120
Restrictions and guidelines: ISSU ·················································································································· 120
Prerequisites for ISSU···································································································································· 121
Logging in to the device through the console port ················································································· 121
Identifying availability of ISSU ················································································································ 121
Verifying the device operating status ····································································································· 122
Preparing the upgrade images ··············································································································· 122
Identifying the ISSU methods················································································································· 122
Verifying the device configuration ·········································································································· 122
Verifying feature status ·························································································································· 123
Determining the upgrade procedure ······································································································ 124
Adjusting and saving the running configuration ····················································································· 124
Performing an ISSU in one step····················································································································· 124
Performing an ISSU step by step by using issu commands ·········································································· 125
Performing a compatible upgrade on a multichassis IRF fabric ····························································· 125
Performing an incompatible upgrade on a multichassis IRF fabric ························································ 126
Performing an incremental upgrade on a single-chassis IRF fabric······················································· 127
Performing a reboot or incompatible upgrade on a single-chassis IRF fabric ········································ 128
Performing an ISSU by using install commands ···························································································· 129
ISSU tasks at a glance ··························································································································· 129
Decompressing an .ipe file ····················································································································· 129
Installing and upgrading software images ······························································································ 129
Deactivating software images ················································································································ 130
Rolling back the running software images ····························································································· 131
Aborting a software activate or deactivate operation ············································································· 132
Committing software changes ················································································································ 132
Verifying software images ······················································································································ 132
Deleting inactive software images·········································································································· 132
Terminating the ongoing ISSU process forcibly ····························································································· 133
Display and maintenance commands for ISSU ····························································································· 133
Examples of using issu commands for ISSU ································································································· 134
Example: Upgrading the system software to a compatible version ························································ 134
Example: Upgrading the system software to an incompatible version ··················································· 139
Example: Rolling back the system software··························································································· 143
Examples of using install commands for ISSU ······························································································ 147
Example: Upgrading the system software ······························································································ 147
Example: Rolling back a feature ············································································································ 149
Configuring graceful insertion and removal ················································ 151
About graceful insertion and removal ············································································································ 151
GIR modes ············································································································································· 151
How GIR works ······································································································································ 151
GIR snapshots ······································································································································· 152
GIR tasks at a glance ····································································································································· 153
Configuring a custom profile ·························································································································· 153
Switching to maintenance mode ···················································································································· 155
Switching back to normal mode ····················································································································· 156
Manually switching back to normal mode ······························································································ 156
Configuring GIR to automatically switch back to normal mode ······························································ 157
Managing GIR snapshots······························································································································· 157
Manually creating a snapshot ················································································································ 157
Manually deleting snapshots ·················································································································· 157
Including additional data in snapshots ··································································································· 158
Configuring advanced GIR features ··············································································································· 158
Configuring the delay for the device to enter maintenance mode ·························································· 158
Specifying a delay for after_maintenance snapshot creation ································································· 158
Display and maintenance commands for GIR ······························································································· 159
vi
GIR configuration examples ··························································································································· 159
Example: Configuring GIR in an ECMP-based node redundancy environment ····································· 159
Example: Configuring GIR on a DR system ··························································································· 161
Using the emergency shell ········································································· 164
About the emergency shell····························································································································· 164
Restrictions and guidelines: Emergency shell································································································ 164
Emergency shell tasks at a glance················································································································· 164
Managing the file systems······························································································································ 164
Obtaining a system image from a file server ·································································································· 165
About obtaining a system image from a file server ················································································ 165
System image acquisition tasks at a glance ·························································································· 165
Configuring the management Ethernet interface ··················································································· 165
Checking the connectivity to the file server ···························································································· 166
Displaying boot image version information ···························································································· 166
Downloading a system image ················································································································ 167
Loading the system image ····························································································································· 167
Rebooting the device ····································································································································· 167
Display and maintenance commands for emergency shell ············································································ 168
Emergency shell usage examples ················································································································· 168
Example: Using the emergency shell ····································································································· 168
Using automatic configuration ···································································· 171
About automatic configuration························································································································ 171
Using server-based automatic configuration ·································································································· 171
About server-based automatic configuration·························································································· 171
Typical server-based automatic configuration network ·········································································· 171
Server-based automatic configuration tasks at a glance ······································································· 172
Configuring the file server ······················································································································ 172
Preparing configuration files ··················································································································· 172
Preparing script files ······························································································································· 173
Configuring the DHCP server ················································································································· 174
Configuring the DNS server ··················································································································· 176
Configuring the gateway ························································································································ 176
Preparing the interface used for automatic configuration······································································· 176
Starting and completing automatic configuration ··················································································· 177
Server-based automatic configuration examples ··························································································· 177
Example: Using a TFTP server for automatic configuration ··································································· 177
Example: Using an HTTP server and Tcl scripts for automatic configuration ········································ 182
Example: Using an HTTP server and Python scripts for automatic configuration·································· 183
Example: Setting up an IRF fabric ········································································································· 184
Configuring preprovisioning ······································································· 187
About preprovisioning ···································································································································· 187
Restrictions and guidelines: Preprovisioning ································································································· 187
Enabling preprovisioning ································································································································ 187
Display and maintenance commands for preprovisioned settings ································································· 187
Managing the device ·················································································· 188
Device management tasks at a glance ·········································································································· 188
Configuring the device name ························································································································· 188
Configuring the system time··························································································································· 189
About the system time ···························································································································· 189
Restrictions and guidelines for configuring the system time ·································································· 189
System time configuration tasks at a glance ·························································································· 189
Setting the system time at the CLI ········································································································· 190
Obtaining the UTC time through a time protocol ···················································································· 190
Setting the time zone ····························································································································· 190
Setting the daylight saving time ············································································································· 191
Enabling displaying the copyright statement ·································································································· 191
Configuring banners ······································································································································· 191
Disabling password recovery capability ········································································································· 193
vii
Disabling USB interfaces ······························································································································· 193
Setting the device operating mode ················································································································ 193
Setting the hardware resource operating mode ····························································································· 194
Setting the port status detection timer ··········································································································· 195
Monitoring CPU usage ··································································································································· 195
Setting memory alarm thresholds ·················································································································· 197
Configuring resource monitoring ···················································································································· 199
Setting the temperature alarm thresholds ······································································································ 200
Configuring parity error logging for entries on forwarding chips ···································································· 201
Configuring consistency error logging for software and hardware forwarding entries ··································· 202
Configuring uncorrectable parity error and ECC error logging for entries on forwarding chips ····················· 202
Specifying the preferred airflow direction ······································································································· 203
Verifying and diagnosing transceiver modules ······························································································ 203
Verifying transceiver modules ················································································································ 203
Diagnosing transceiver modules ············································································································ 204
Configuring transceiver monitoring ················································································································ 204
Scheduling a task ··········································································································································· 205
About task scheduling ···························································································································· 205
Restrictions and guidelines ···················································································································· 205
Procedure ··············································································································································· 205
Example: Scheduling a task ··················································································································· 206
Rebooting the device ····································································································································· 210
About device reboot ······························································································································· 210
Restrictions and guidelines for device reboot ························································································ 210
Rebooting the device immediately at the CLI························································································· 210
Scheduling a device reboot ···················································································································· 211
Restoring the factory-default configuration ···································································································· 211
Display and maintenance commands for device management configuration ················································ 212
Using Tcl ··································································································· 214
About Tcl ························································································································································ 214
Restrictions and guidelines: Tcl ····················································································································· 214
Using Tcl commands to configure the device ································································································ 214
Restrictions and guidelines ···················································································································· 214
Procedure ··············································································································································· 214
Executing Comware commands in Tcl configuration view ············································································· 215
About executing Comware commands in Tcl configuration view ··························································· 215
Restrictions and guidelines ···················································································································· 215
Procedure ··············································································································································· 215
Using Python ····························································································· 217
About Python·················································································································································· 217
Executing a Python script······························································································································· 217
Entering the Python shell ······························································································································· 217
Importing and using the extended Python API ······························································································· 217
Importing the entire extended API and using the API ············································································ 217
Importing an extended API function and using the function ··································································· 218
Exiting the Python shell ·································································································································· 218
Python usage examples ································································································································· 218
Example: Using a Python script for device configuration ······································································· 218
Comware 7 extended Python API ······························································ 220
channel··························································································································································· 220
CLI·································································································································································· 221
get_error························································································································································· 221
get_output ······················································································································································ 222
get_self_slot ··················································································································································· 222
get_slot_info ··················································································································································· 223
get_slot_range ··············································································································································· 223
get_standby_slot ············································································································································ 224
Transfer ·························································································································································· 224
send ······························································································································································· 225
viii
SYSLOG ························································································································································ 226
Document conventions and icons ······························································ 227
Conventions ··················································································································································· 227
Network topology icons ·································································································································· 228
Support and other resources ····································································· 229
Accessing Hewlett Packard Enterprise Support····························································································· 229
Accessing updates ········································································································································· 229
Websites ················································································································································ 230
Customer self repair ······························································································································· 230
Remote support ······································································································································ 230
Documentation feedback ······················································································································· 230
Index ·········································································································· 232
1
Using the CLI
About the CLI
At the command-line interface (CLI), you can enter text commands to configure, manage, and
monitor the device.
You can use different methods to log in to the CLI. For example, you can log in through the console
port or Telnet. For more information about login methods, see "Login overview."
Using CLI views
About CLI views
Commands are grouped in different views by feature. To use a command, you must enter its view.
CLI views are hierarchically organized, as shown in Figure 1. Each view has a unique prompt, from
which you can identify where you are and what you can do. For example, the prompt
[Sysname-vlan100] shows that you are in VLAN 100 view and can configure attributes for that
VLAN.
Figure 1 CLI views
You are placed in user view immediately after you log in to the CLI.
In user view, you can perform the following tasks:
Perform basic operations including display, debug, file management, FTP, Telnet, clock setting,
and reboot.
Enter system view.
In system view, you can perform the following tasks:
Configure settings that affect the device as a whole, such as the daylight saving time, banners,
and hotkeys.
Enter feature views.
For example, you can perform the following tasks:
Enter interface view to configure interface parameters.
VLAN view
Interface
view
……
System
view
User view
Local user
view
Probe view
User line
view
2
Enter VLAN view to add ports to the VLAN.
Enter user line view to configure login user attributes.
A feature view might have child views. For example, NQA operation view has the child view
HTTP operation view.
Enter probe view by using the probe command.
The probe view provides display, debugging, and maintenance commands, which are mainly
used by developers and testers for system fault diagnosis and system operation monitoring.
CAUTION:
Use the commands in probe view under the guidance of engineers to avoid system exceptions
caused by incorrect operations.
For more information about the commands in probe view, see the probe commands manual for
each feature.
To display all commands available in a view, enter a question mark (?) at the view prompt.
Entering system view from user view
To enter system view from user view, execute the following command:
system-view
Returning to the upper-level view from a view
Restrictions and guidelines
Executing the quit command in user view terminates your connection to the device.
To return from public key view to system view, you must use the peer-public-key end
command.
Procedure
To return to the upper-level view from a view, execute the following command:
quit
Returning to user view
About this task
This feature enables you to return to user view from any other view by performing a single operation.
You do not need to execute the quit command multiple times.
Procedure
To return directly to user view from any other view except Tcl configuration view and the Python shell,
use one of the following methods:
Execute the return command.
Press Ctrl+Z.
To return to user view from Tcl configuration view, use the tclquit command.
To return to user view from the Python shell, use the exit() command.
3
Accessing the CLI online help
The CLI online help is context sensitive. Enter a question mark at any prompt or in any position of a
command to display all available options.
To access the CLI online help, use one of the following methods:
Enter a question mark at a view prompt to display the first keyword of every command available
in the view. For example:
<Sysname> ?
User view commands:
archive Archive configuration
arp Address Resolution Protocol (ARP) module
backup Backup the startup configuration file to a TFTP server
boot-loader Software image file management
...
Enter a space and a question mark after a command keyword to display all available keywords
and arguments.
If the question mark is in the place of a keyword, the CLI displays all possible keywords,
each with a brief description. For example:
<Sysname> terminal ?
debugging Enable to display debugging logs on the current terminal
logging Display logs on the current terminal
monitor Enable to display logs on the current terminal
If the question mark is in the place of an argument, the CLI displays the description for the
argument. For example:
<Sysname> system-view
[Sysname] interface vlan-interface ?
<1-4094> Vlan-interface interface number
[Sysname] interface vlan-interface 1 ?
<cr>
[Sysname] interface vlan-interface 1
<1-4094> is the value range for the argument. <cr> indicates that the command is complete
and you can press Enter to execute the command.
Enter an incomplete keyword string followed by a question mark to display all keywords starting
with that string. The CLI also displays the descriptions for the keywords. For example:
<Sysname> f?
fdisk Partition a storage medium
fixdisk Check and repair a storage medium
format Format a storage medium
free Release a connection
ftp Open an FTP connection
<Sysname> display ftp?
ftp FTP module
ftp-server FTP server information
ftp-user FTP user information
Using the undo form of a command
Most configuration commands have an undo form for the following tasks:
4
Canceling a configuration.
Restoring the default.
Disabling a feature.
For example, the info-center enable command enables the information center. The undo
info-center enable command disables the information center.
Entering a command
When you enter a command, you can perform the following tasks:
Use keys or hotkeys to edit the command line.
Use abbreviated keywords or keyword aliases.
Editing a command line
To edit a command line, use the keys listed in Table 1 or the hotkeys listed in Table 4. When you are
finished, you can press Enter to execute the command.
The command edit buffer can contain a maximum of 511 characters. If the total length of a command
line exceeds the limit after you press Tab to complete the last keyword or argument, the system does
not complete the keyword.
Table 1 Command line editing keys
Keys
Function
Common keys
If the edit buffer is not full, pressing a common key inserts a character at the
cursor and moves the cursor to the right. The edit buffer can store up to 511
characters. Unless the buffer is full, all common characters that you enter
before pressing
Enter
are saved in the edit buffer.
Backspace Deletes the character to the left of the cursor and moves the cursor back
one character.
Left arrow key (
) Moves the cursor one character to the left.
Right arrow key (
) Moves the cursor one character to the right.
Up arrow key (
) Displays the previous command in the command history buffer.
Down arrow key (
) Displays the next command in the command history buffer.
Tab
If you press Tab after typing part of a keyword, the system automatically
completes the keyword.
If a unique match is found, the system displays the complete keyword.
If there is more than one match, press Tab multiple times to pick the
keyword you want to enter.
If there is no match, the system does not modify what you entered but
displays it again in the next line.
The device supports the following special commands:
#Used by the system in a configuration file as separators for adjacent sections.
versionUsed by the system in a configuration file to indicate the software version
information. For example, version 7.1. xxx, Release xxx.
These commands are special because of the following reasons:
These commands are not intended for you to use at the CLI.
5
You can enter the # command in any view or the version command in system view, or enter
any values for them. For example, you can enter # abc or version abc. However, the
settings do not take effect.
The device does not provide any online help information for these commands.
Entering a text or string type value for an argument
A text type argument value can contain any characters except question marks (?).
A string type argument value can contain any printable characters except question marks (?).
To include a quotation mark (") or backward slash (\) in a string type argument value, prefix the
character with an escape key (\), for example, \" and \\.
To include a blank space in a string type argument value, enclose the value in quotation marks,
for example, ''my device''.
A specific argument might have more requirements. For more information, see the relevant
command reference.
To enter a printable character, you can enter the character or its ASCII code in the range of 32 to 126.
Entering an interface type
You can enter an interface type in one of the following formats:
Full spelling of the interface type.
An abbreviation that uniquely identifies the interface type.
Acronym of the interface type.
For a command line, all interface types are case insensitive. The following table shows the full
spellings and acronyms of interface types.
For example, to use the interface command to enter the view of interface Ten-GigabitEthernet
1/0/1, you can enter the command line in the following formats:
interface ten-gigabitethernet 1/0/1
interface ten 1/0/1
interface xge 1/0/1
Spaces between the interface types and interfaces are not required.
Table 2 Full spellings and acronyms of interface types
Full spelling
Acronym
Bridge-Aggregation BAGG
FortyGigE FGE
HundredGigE HGE
InLoopBack InLoop
LoopBack Loop
M-GigabitEthernet MGE
Multicast Tunnel MTunnel
NULL NULL
Register-Tunnel REG
6
Full spelling
Acronym
Route-Aggregation RAGG
SAN-Aggregation SAGG
S-Channel S-Ch
Schannel-Aggregation SCH-AGG
Schannel-Bundle SCH-B
Ten-GigabitEthernet XGE
Tunnel Tun
Vfc Vfc
Vsi-interface Vsi
Vlan-interface Vlan-int
Abbreviating commands
You can enter a command line quickly by entering incomplete keywords that uniquely identify the
complete command. In user view, for example, commands starting with an s include startup
saved-configuration and system-view. To enter the command system-view, you need
to type only sy. To enter the command startup saved-configuration, type st s.
You can also press Tab to complete an incomplete keyword.
Configuring and using command aliases
About this task
You can configure one or more aliases for a command or the starting keywords of commands. Then,
you can use the aliases to execute the command or commands. If the command or commands have
undo forms, you can also use the aliases to execute the undo command or commands.
For example, if you configure the shiprt alias for display ip routing-table, you can enter
shiprt to execute the display ip routing-table command. If you configure the ship alias
for display ip, you can use ship to execute all commands starting with display ip, including:
Enter ship routing-table to execute the display ip routing-table command.
Enter ship interface to execute the display ip interface command.
The device provides a set of system-defined command aliases, as listed in Table 3.
Table 3 System-defined command aliases
Command or command keyword
acl
return
delete
quit
sysname
info-center
7
Command or command keyword
undo
display
save
Restrictions and guidelines
A command alias can be used only as the first keyword of a command or the second keyword of the
undo form of a command.
After you successfully execute a command by using an alias, the system saves the command,
instead of the alias, to the running configuration.
The command string can include up to nine parameters. Each parameter starts with the dollar sign ($)
and a sequence number in the range of 1 to 9. For example, you can configure the alias shinc for
the display ip $1 | include $2 command. Then, to execute the display ip
routing-table | include Static command, you need to enter only shinc
routing-table Static.
To use an alias for a command that has parameters, you must specify a value for each parameter. If
you fail to do so, the system informs you that the command is incomplete and displays the command
string represented by the alias.
System-defined command aliases cannot be deleted.
Procedure
1. Enter system view.
system-view
2. Configure a command alias.
alias alias command
By default, the device has a set of command aliases, as listed in Table 3.
3. (Optional.) Display command aliases.
display alias [ alias ]
This command is available in any view.
Configuring and using hotkeys
About this task
The device supports a set of hotkeys. Pressing a hotkey executes the command or function assigned
to the hotkey. Table 4 shows the hotkeys and their default definitions. You can configure all the
hotkeys except Ctrl+].
If a hotkey is also defined by the terminal software you are using to interact with the device, you can
reconfigure the hotkey or remove the hotkey.
Restrictions and guidelines
A hotkey can correspond to only one command or function. If you assign multiple commands or
functions to the same hotkey, the most recently assigned command or function takes effect.
A command or function can be assigned to multiple hotkeys. You can use any of the hotkeys to
execute the command or function.
If a hotkey is also defined by the terminal software you are using to interact with the device, the
terminal software definition takes effect.
8
Procedure
1. Enter system view.
system-view
2. Assign a command to a hotkey.
hotkey hotkey { command | function function | none }
Table 4 shows the default definitions for the hotkeys.
3. (Optional.) Display hotkeys.
display hotkey
This command is available in any view.
Table 4 Default definitions for hotkeys
Hotkey
Function or command
Ctrl+A move_the_cursor_to_the_beginning_of_the_line: Moves the cursor to the
beginning of a line.
Ctrl+B move_the_cursor_one_character_to_the_left: Moves the cursor one
character to the left.
Ctrl+C stop_the_current_command: Stops the current command.
Ctrl+D erase_the_character_at_the_cursor: Deletes the character at the cursor.
Ctrl+E move_the_cursor_to_the_end_of_the_line: Moves the cursor to the end of a
line.
Ctrl+F move_the_cursor_one_character_to_the_right: Moves the cursor one
character to the right.
Ctrl+G
display current-configuration
: Display the running configuration.
Ctrl+H erase_the_character_to_the_left_of_the_cursor: Deletes the character to the
left of the cursor.
Ctrl+L
display ip routing-table
: Display the IPv4 routing table information.
Ctrl+N display_the_next_command_in_the_history_buffer: Displays the next
command in the history buffer. Password configuration commands, if any, are
skipped.
Ctrl+O
undo debugging all
: Disable all debugging functions.
Ctrl+P display_the_previous_command_in_the_history_buffer: Displays the
previous command in the history buffer. Password configuration commands, if
any, are skipped.
Ctrl+R redisplay_the_current_line: Redisplays the current line.
Ctrl+T N/A
Ctrl+U N/A
Ctrl+W delete_the_word_to_the_left_of_the_cursor: Deletes the word to the left of the
cursor.
Ctrl+X delete_all_characters_from_the_beginning_of_the_line_to_the_cursor:
Deletes all characters to the left of the cursor.
Ctrl+Y delete_all_characters_from_the_cursor_to_the_end_of_the_line: Deletes all
characters from the cursor to the end of the line.
Ctrl+Z
return_to_the_User_View
: Returns to user view.
Ctrl+] kill_incoming_connection_or_redirect_connection: Terminates the current
connection.
9
Hotkey
Function or command
Esc+B move_the_cursor_back_one_word: Moves the cursor back one word.
Esc+D delete_all_characters_from_the_cursor_to_the_end_of_the_word: Deletes
all characters from the cursor to the end of the word.
Esc+F move_the_cursor_forward_one_word: Moves the cursor forward one word.
Enabling redisplaying entered-but-not-submitted commands
About this task
Your input might be interrupted by system information output. If redisplaying
entered-but-not-submitted commands is enabled, the system redisplays your input after finishing the
output. You can then continue entering the command line.
Procedure
1. Enter system view.
system-view
2. Enable redisplaying entered-but-not-submitted commands.
info-center synchronous
By default, the system does not redisplay entered-but-not-submitted commands.
For more information about this command, see Network Management and Monitoring
Command Reference.
Understanding command-line syntax error
messages
After you press Enter to submit a command, the command line interpreter examines the command
syntax.
If the command passes syntax check, the CLI executes the command.
If the command fails syntax check, the CLI displays an error message.
Table 5 Common command-line syntax error messages
Syntax error message
Cause
% Unrecognized command found at '^' position. The keyword in the marked position is invalid.
% Incomplete command found at '^' position. One or more required keywords or arguments are
missing.
% Ambiguous command found at '^' position. The entered character sequence matches more than
one command.
% Too many parameters found at '^' position. The entered character sequence contains excessive
keywords or arguments.
% Wrong parameter found at '^' position. The argument in the marked position is invalid.
10
Using the command history feature
About command history buffers
The system automatically saves commands successfully executed by a login user to the following
two command history buffers:
Command history buffer for the user line.
Command history buffer for all user lines.
Table 6 Comparison between the two types of command history buffers
Item Command history buffer for
a user line
Command history buffer for all
user lines
Which commands are saved in
the buffer? Commands successfully executed
by the current user of the user line. Commands successfully executed
by all login users.
Can commands in the buffer
be displayed? Yes. Yes.
Can commands in the buffer
be recalled? Yes. No.
Are buffered commands
cleared when the user logs
out? Yes. No.
Is the buffer size adjustable? Yes. No. The buffer size is fixed at 1024.
Command buffering rules
The system follows these rules when buffering commands:
If you use incomplete keywords when entering a command, the system buffers the command in
the exact form that you used.
If you use an alias when entering a command, the system transforms the alias to the
represented command or command keywords before buffering the command.
If you enter a command in the same format multiple times in succession, the system buffers the
command only once. If you enter a command in different formats multiple times, the system
buffers each command format. For example, display cu and display
current-configuration are buffered as two entries but successive repetitions of
display cu create only one entry.
To buffer a new command when a buffer is full, the system deletes the oldest command entry in
the buffer.
Managing and using the command history buffers
Displaying the commands in command history buffers
To display the commands in command history buffers, execute the following commands in any view:
Display the commands in command history buffers for a user line.
display history-command
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268

Aruba JL588A Configuration Guide

Category
Networking
Type
Configuration Guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI