IX5-28GPX

Allied Telesis IX5-28GPX User manual

  • Hello! I am an AI chatbot trained to assist you with the Allied Telesis IX5-28GPX User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Software Reference for IX5-28GPX Switches
AlliedWare Plus
Operating System
Version 5.4.4-0.4
C613-50041-01 REV C
Software Reference for IX5-28GPX Switches
ii AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 C613-50041-01 REV C
Acknowledgments
This product includes software developed by the University of California, Berkeley and its
contributors.
Copyright
©1982, 1986, 1990, 1991, 1993 The Regents of the University of California.
All rights reserved.
This product includes software developed by the OpenSSL Project for use in the OpenSSL
Toolkit (http://www.openssl.org/).
Copyright
©1998-2008 The OpenSSL Project. All rights reserved.
This product includes software licensed under the GNU General Public License available
from:
http://www.gnu.org/licenses/gpl2.html
Source code for all GPL licensed software in this product can be obtained from the
Allied Telesis GPL Code Download Center at:
http://www.alliedtelesis.com/support/default.aspx
Allied Telesis is committed to meeting the requirements of the open source licenses
including the GNU General Public License (GPL) and will make all required source code
available.
If you would like a copy of the GPL source code contained in Allied Telesis products, please
send us a request by registered mail including a check for US$15 to cover production and
shipping costs and a CD with the GPL code will be mailed to you.
GPL Code Request
Allied Telesis Labs (Ltd)
PO Box 8011
Christchurch.
New Zealand
©2014 Allied Telesis Inc. All rights reserved.
This documentation is subject to change without notice. No part of this publication may
be reproduced, stored in a retrieval system, or transmitted in any form or any means
electronic or mechanical, including photocopying and recording for any purpose other
than the purchasers internal use without the written permission of Allied Telesis, Inc.
Allied Telesis, AlliedWare Plus, EPSRing, SwitchBlade, and VCStack are trademarks or
registered trademarks in the United States and elsewhere of Allied Telesis, Inc. Adobe,
Acrobat, and Reader are either registered trademarks or trademarks of Adobe Systems
Incorporated in the United States and/or other countries. Additional brands, names and
products mentioned herein may be trademarks of their respective companies.
Getting the most from this manual
Although you can view this document using Acrobat version 5, to get the best from this
manual, we recommend using Adobe Acrobat Reader version 8. You can download
Acrobat Reader 8 free from http://www.adobe.com/.
New features in this software version
For a list of new and enhanced features and commands in this version, see
Appendix B: Changes in Version 5.4.4-0.4 (with links to corresponding sections in this
Software Reference), or the Software Release Note for Version 5.4.4-0.4. Documentation
can be downloaded from the Support area of our website at
http://www.alliedtelesis.com. Note that to download software files, you need a valid
user account.
Software Reference for IX5-28GPX Switches
C613-50041-01 REV C AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 iii
Table of Contents
Part 1: Setting up the Switch
Chapter 1: Getting Started
Introduction...................................................................................................................................................................... 1.2
How to Login.................................................................................................................................................................... 1.2
How to get Command Help........................................................................................................................................ 1.3
Viewing a List of Valid Parameters .................................................................................................................... 1.3
Completing Keywords ........................................................................................................................................... 1.5
Viewing Command Error Messages .................................................................................................................. 1.6
How to Work with Command Modes...................................................................................................................... 1.7
Entering Privileged Exec Commands When in a Configuration Mode ................................................ 1.9
How to See the Current Configuration................................................................................................................. 1.10
Default Settings.............................................................................................................................................................1.11
The Default Configuration Script............................................................................................................................ 1.11
How to Change the Password..................................................................................................................................1.12
How to Set Strong Passwords..................................................................................................................................1.13
How to Set an IP Address on VLAN 1..................................................................................................................... 1.15
How to Save and Boot from the Current Configuration.................................................................................1.16
How to Save to the Default Configuration File...........................................................................................1.16
How to Create and Use a New Configuration File .....................................................................................1.16
How to Return to the Factory Defaults .................................................................................................................1.18
How to See System Information .............................................................................................................................1.19
Viewing Overall System Information..............................................................................................................1.19
Viewing Temperature, Voltage, and Fan Status .........................................................................................1.20
Viewing the Serial Number ................................................................................................................................ 1.21
How to Set System Parameters ...............................................................................................................................1.21
How to Change the Telnet Session Timeout ...............................................................................................1.21
How to Name the Switch ....................................................................................................................................1.22
How to Display a Text Banner at Login..........................................................................................................1.23
How to Set the Time and Date.................................................................................................................................1.24
How to Show Current Settings ......................................................................................................................... 1.24
How to Set the Time and Date..........................................................................................................................1.24
How to Set the Timezone ................................................................................................................................... 1.25
How to Configure Summer-time .....................................................................................................................1.25
How to Add and Remove Users...............................................................................................................................1.26
Pre-encrypted Passwords ...................................................................................................................................1.27
How to Undo Settings................................................................................................................................................. 1.28
How to Use the no Parameter ........................................................................................................................... 1.28
How to Use the default Parameter ..................................................................................................................1.28
How to Upgrade the Firmware................................................................................................................................1.29
Save Power With the Eco-Friendly Feature......................................................................................................... 1.30
Eco-Friendly.............................................................................................................................................................1.30
Trouble-shoot fiber and pluggable issues...........................................................................................................1.31
Using the Find Me feature.........................................................................................................................................1.32
Continuous Reboot Prevention...............................................................................................................................1.33
Controlling “show” Command Output.................................................................................................................1.35
Software Reference for IX5-28GPX Switches
iv AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 C613-50041-01 REV C
AlliedWare Plus GUI .....................................................................................................................................................1.37
Chapter 2: Command Syntax Conventions in this Software Reference
Chapter 3: Start-up Sequence
AlliedWare Plus Start-up .............................................................................................................................................. 3.2
Diagnostic Menu............................................................................................................................................................. 3.3
Bootloader Menu............................................................................................................................................................ 3.5
Start-up Sequence.......................................................................................................................................................... 3.7
Chapter 4: CLI Navigation Commands
Command List.................................................................................................................................................................. 4.2
Chapter 5: User Access Commands
Introduction...................................................................................................................................................................... 5.2
Command List.................................................................................................................................................................. 5.2
Chapter 6: Creating and Managing Files
Introduction...................................................................................................................................................................... 6.2
USB support...................................................................................................................................................................... 6.2
Working With Files ......................................................................................................................................................... 6.2
Listing files ................................................................................................................................................................. 6.2
Displaying the contents of configuration and text files ............................................................................ 6.4
Navigating through the filesystem ................................................................................................................... 6.4
Using the editor........................................................................................................................................................ 6.7
Creating and Using Configuration Files ................................................................................................................. 6.8
Creating a configuration file................................................................................................................................ 6.8
Specifying the start-up configuration script.................................................................................................. 6.8
Working with configuration files .....................................................................................................................6.10
The configuration file fallback order ..............................................................................................................6.10
Copying Files To and From Your Device ..............................................................................................................6.12
URL syntax................................................................................................................................................................6.12
Copying files............................................................................................................................................................6.13
Copying from a Server to Running Configuration.....................................................................................6.16
The Autoboot Feature ................................................................................................................................................6.17
Restoring a switch using Autoboot from external media....................................................................... 6.18
Configure Autoboot .............................................................................................................................................6.19
Chapter 7: File Management Commands
Introduction...................................................................................................................................................................... 7.3
URL Syntax and Keyword Usage ........................................................................................................................ 7.3
Command List.................................................................................................................................................................. 7.5
Chapter 8: Licensing Introduction and Configuration
Introduction...................................................................................................................................................................... 8.2
About licensing VCStack ....................................................................................................................................... 8.2
Licensing Terminology .......................................................................................................................................... 8.2
Applying a new feature license on a stand-alone switch ................................................................................ 8.3
VCStack Licensing Configuration.............................................................................................................................. 8.4
Adding a new switch to a VCStack .................................................................................................................... 8.4
Adding a new feature license to a VCStack.................................................................................................... 8.7
Software Reference for IX5-28GPX Switches
C613-50041-01 REV C AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 v
Chapter 9: Licensing Commands
Command List.................................................................................................................................................................. 9.2
Chapter 10: System Configuration and Monitoring Commands
Command List................................................................................................................................................................ 10.2
Chapter 11: Debugging and Logging
Introduction....................................................................................................................................................................11.2
Debugging...................................................................................................................................................................... 11.2
Logging to terminal..............................................................................................................................................11.2
Turning off debugging ........................................................................................................................................ 11.3
Logging ............................................................................................................................................................................ 11.3
Log Outputs.............................................................................................................................................................11.4
Chapter 12: Logging Commands
Command List................................................................................................................................................................ 12.2
Chapter 13: Scripting Commands
Command List................................................................................................................................................................ 13.2
Chapter 14: Interface Commands
Command List................................................................................................................................................................ 14.2
Chapter 15: Interface Testing Commands
Command List................................................................................................................................................................ 15.2
Software Reference for IX5-28GPX Switches
vi AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 C613-50041-01 REV C
Part 2: Layer Two Switching
Chapter 16: Switching Introduction
Introduction....................................................................................................................................................................16.2
Physical Layer Information........................................................................................................................................ 16.3
Switch Ports .............................................................................................................................................................16.3
Activating and Deactivating Switch Ports ....................................................................................................16.4
Autonegotiation.....................................................................................................................................................16.4
Duplex mode...........................................................................................................................................................16.4
Speed options.........................................................................................................................................................16.4
MDI/MDIX Connection Modes.......................................................................................................................... 16.5
The Layer 2 Switching Process.................................................................................................................................16.6
The Ingress Rules ...................................................................................................................................................16.6
The Learning Process ...........................................................................................................................................16.7
The Forwarding Process......................................................................................................................................16.8
The Egress Rules.....................................................................................................................................................16.8
Layer 2 Filtering.............................................................................................................................................................16.9
Ingress Filtering...................................................................................................................................................... 16.9
Storm-control...............................................................................................................................................................16.10
Loop Protection...........................................................................................................................................................16.11
Loop Detection ....................................................................................................................................................16.11
Thrash Limiting.....................................................................................................................................................16.12
Support for Jumbo Frames .....................................................................................................................................16.13
Port Mirroring...............................................................................................................................................................16.14
Port Security .................................................................................................................................................................16.15
MAC Address Learn Limits................................................................................................................................16.15
IEEE 802.1X.............................................................................................................................................................16.15
Quality of Service........................................................................................................................................................16.16
IGMP Snooping............................................................................................................................................................16.17
Chapter 17: Switching Commands
Command List................................................................................................................................................................ 17.2
Chapter 18: VLAN Introduction
Introduction....................................................................................................................................................................18.2
Virtual LANs (VLANs)....................................................................................................................................................18.2
Configuring VLANs................................................................................................................................................18.3
VLAN Double Tagging (VLAN Stacking) ...............................................................................................................18.5
How double-tagged VLANs work .................................................................................................................... 18.5
VLAN Rules for double tagging ........................................................................................................................18.5
Restrictions when using double-tagged VLANs.........................................................................................18.6
Configuring double-tagged VLANs ................................................................................................................18.6
Private VLANs...............................................................................................................................................................18.11
Private VLANs for ports in access mode ......................................................................................................18.11
Private VLAN operation with ports in access mode................................................................................18.13
Access mode private VLAN configuration example................................................................................18.14
Private VLANs for trunked ports.....................................................................................................................18.17
Trunked port private VLAN configuration example................................................................................18.18
Protocol based VLAN configuration example...........................................................................................18.21
VLAN Statistics .............................................................................................................................................................18.24
Counter Operation ..............................................................................................................................................18.24
Software Reference for IX5-28GPX Switches
C613-50041-01 REV C AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 vii
Chapter 19: VLAN Commands
Command List................................................................................................................................................................ 19.2
Chapter 20: Spanning Tree Introduction: STP, RSTP, and MSTP
Introduction....................................................................................................................................................................20.2
Overview of Spanning Trees..................................................................................................................................... 20.2
Spanning tree operation.....................................................................................................................................20.2
Spanning tree modes...........................................................................................................................................20.4
Spanning Tree Protocol (STP)...................................................................................................................................20.5
Configuring STP ............................................................................................................................................................ 20.6
Rapid Spanning Tree Protocol (RSTP) ...................................................................................................................20.8
Configuring RSTP..........................................................................................................................................................20.9
Multiple Spanning Tree Protocol (MSTP)...........................................................................................................20.11
Multiple Spanning Tree Instances (MSTI)....................................................................................................20.12
MSTP Regions........................................................................................................................................................20.13
Common and Internal Spanning Tree (CIST).............................................................................................20.15
MSTP Bridge Protocol Data Units (BPDUs) .................................................................................................20.17
Configuring MSTP.......................................................................................................................................................20.19
Chapter 21: Spanning Tree Commands
Command List................................................................................................................................................................ 21.3
Chapter 22: Link Aggregation Introduction and Configuration
Introduction and Overview....................................................................................................................................... 22.2
Static and Dynamic (LACP) Link Aggregation....................................................................................................22.3
Static Channel Groups .........................................................................................................................................22.3
Dynamic (LACP) Channel Groups ....................................................................................................................22.3
Link Aggregation Control Protocol (LACP)................................................................................................... 22.4
Configuring an LACP Channel Group....................................................................................................................22.5
Minimal LACP Group Configuration ...............................................................................................................22.8
Configuring a Static Channel Group......................................................................................................................22.9
Chapter 23: Link Aggregation Commands
Introduction....................................................................................................................................................................23.2
Command List................................................................................................................................................................23.3
Chapter 24: Power over Ethernet Introduction
Introduction....................................................................................................................................................................24.2
PoE standards..........................................................................................................................................................24.2
PoE (all standards) .................................................................................................................................................24.3
PoE (IEEE 802.3af)................................................................................................................................................... 24.3
Enhanced PoE .........................................................................................................................................................24.3
PoE+ (IEEE 802.3at)................................................................................................................................................ 24.4
Differences between PoE and PoE+ ...............................................................................................................24.4
LLDP-MED (TIA-1057) with PoE+ (IEEE 802.3at)...................................................................................
....... 24.5
Po
E and Po
E+ Applications................................................................................................................................ 24.5
Power Device (PD) discovery.............................................................................................................................24.5
Power classes .......................................................................................................................................................... 24.6
Power through the cable: ................................................................................................................................... 24.7
Cable Types.............................................................................................................................................................24.7
Static and Automatic Power Allocation......................................................................................................... 24.7
AW+ PoE and PoE+ Implementation ....................................................................................................................24.8
Power Capacity.......................................................................................................................................................24.8
Software Reference for IX5-28GPX Switches
viii AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 C613-50041-01 REV C
PoE Port Allocation and Distribution..............................................................................................................24.8
Power threshold.....................................................................................................................................................24.9
Negotiating Power Requirements...................................................................................................................24.9
PoE port management.........................................................................................................................................24.9
Powered Device (PD) detection .....................................................................................................................24.10
Port prioritization.................................................................................................................................................24.10
Software monitoring ..........................................................................................................................................24.11
AW+ PoE and PoE+ Configuration .......................................................................................................................24.12
Add a description for a PoE or PoE+ port ...................................................................................................24.12
Configuring Capacity and Priority on a PoE or PoE+ Port.....................................................................24.13
Remotely monitoring power for all connected PDs ...............................................................................24.14
Chapter 25: Power over Ethernet Commands
Introduction....................................................................................................................................................................25.2
Command List................................................................................................................................................................25.2
Chapter 26: GVRP Introduction and Configuration
Introduction....................................................................................................................................................................26.2
GVRP Example.........................................................................................................................................................26.3
GVRP Guidelines.....................................................................................................................................................26.4
GVRP and Network Security...............................................................................................................................26.5
GVRP-inactive Intermediate Switches............................................................................................................26.5
Enabling GVRP on the Switch............................................................................................................................26.5
Enabling GVRP on the Ports...............................................................................................................................26.6
Setting the GVRP Timers ..................................................................................................................................... 26.6
Disabling GVRP on the Ports..............................................................................................................................26.7
Disabling GVRP on the Switch ..........................................................................................................................26.7
Configuring and validating GVRP...........................................................................................................................26.8
Chapter 27: GVRP Commands
Command List................................................................................................................................................................ 27.2
Software Reference for IX5-28GPX Switches
C613-50041-01 REV C AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 ix
Part 3: Layer Three, Switching and Routing
Chapter 28: Internet Protocol (IP) Addressing and Protocols
Introduction....................................................................................................................................................................28.2
Address Resolution Protocol (ARP) ........................................................................................................................ 28.3
Static ARP Entries................................................................................................................................................... 28.3
Timing Out ARP Entries .......................................................................................................................................28.3
Deleting ARP Entries.............................................................................................................................................28.4
Proxy ARP .................................................................................................................................................................28.4
ARP Logging............................................................................................................................................................28.7
Domain Name System (DNS)....................................................................................................................................28.8
Domain name parts .............................................................................................................................................. 28.8
Server hierarchy .....................................................................................................................................................28.8
DNS Client ................................................................................................................................................................ 28.9
DNS Relay ...............................................................................................................................................................28.10
DHCP options........................................................................................................................................................28.12
Internet Control Message Protocol (ICMP)........................................................................................................28.13
Checking IP Connections.........................................................................................................................................28.14
Ping...........................................................................................................................................................................28.14
Traceroute ..............................................................................................................................................................28.14
IP Helper.........................................................................................................................................................................28.15
IP Directed Broadcast ................................................................................................................................................28.16
Chapter 29: IP Addressing and Protocol Commands
Introduction....................................................................................................................................................................29.2
Command List................................................................................................................................................................29.3
Chapter 30: IPv6 Introduction
Introduction....................................................................................................................................................................30.2
Overview..........................................................................................................................................................................30.2
IPv6 Addresses and Prefixes .....................................................................................................................................30.3
Address types..........................................................................................................................................................30.3
IPv6 Headers............................................................................................................................................................30.5
The Internet Control Message Protocol (ICMPv6)......................................................................................30.7
IPv6 Routing ..........................................................................................................................................................30.10
Integration of IPv4 and IPv6 ............................................................................................................................30.10
IPv6 on your Switch ...................................................................................................................................................30.11
Enabling IPv6.........................................................................................................................................................30.11
IPv6 Stateless Address Autoconfiguration (SLAAC)................................................................................30.11
IPv6 EUI-64 Addressing......................................................................................................................................30.11
IPv6 Link-local Addresses..................................................................................................................................30.11
IPv6 RA Guard ..............................................................................................................................................................30.12
RA Guard Introduction.......................................................................................................................................30.12
Enabling IPv6 RA Guard.....................................................................................................................................30.12
Chapter 31: IPv6 Commands
Command List................................................................................................................................................................ 31.2
Software Reference for IX5-28GPX Switches
xAlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 C613-50041-01 REV C
Chapter 32: IPv6to4 Tunneling Configuration
Introduction....................................................................................................................................................................32.2
6to4 Automatic Tunnel Configuration.................................................................................................................. 32.2
Tunneling Operation............................................................................................................................................ 32.2
6to4 tunnels operation and configuration summary............................................................................... 32.3
Example 6to4 configuration.............................................................................................................................. 32.4
Chapter 33: IPv6to4 Tunneling Commands
Command List................................................................................................................................................................ 33.2
Chapter 34: Route Selection
Introduction....................................................................................................................................................................34.2
Types of Routes .............................................................................................................................................................34.2
Interface Routes .....................................................................................................................................................34.2
Static Routes............................................................................................................................................................ 34.2
RIB and FIB Routing Tables........................................................................................................................................ 34.3
Understanding the Routing Information Base (RIB)..................................................................................34.3
Administrative Distance......................................................................................................................................34.5
Metric ......................................................................................................................................................................... 34.6
Equal Cost Multipath Routing........................................................................................................................... 34.6
How AlliedWare Plus Deletes Routes ............................................................................................................. 34.7
How AlliedWare Plus Adds Routes ..................................................................................................................34.8
Troubleshooting routes not installed to the RIB........................................................................................34.9
Troubleshooting routes not installed to the FIB ........................................................................................34.9
Chapter 35: Routing Commands
Introduction....................................................................................................................................................................35.2
Command List................................................................................................................................................................35.2
Software Reference for IX5-28GPX Switches
C613-50041-01 REV C AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 xi
Part 4: Multicast Applications
Chapter 36: Multicast Introduction and Commands
Multicast Introduction ................................................................................................................................................36.2
Multicast groups ....................................................................................................................................................36.3
Components in a multicast network ..............................................................................................................36.3
Command List................................................................................................................................................................36.5
Chapter 37: IGMP and IGMP Snooping Introduction
Introduction....................................................................................................................................................................37.2
IGMP ..................................................................................................................................................................................37.2
Joining a multicast group (Membership report)........................................................................................ 37.3
Staying in the multicast group (Query message)....................................................................................... 37.3
Leaving the multicast group (Leave message) ...........................................................................................37.3
IGMP Snooping..............................................................................................................................................................37.4
How IGMP Snooping operates..........................................................................................................................37.4
IGMP Snooping and Querier configuration example............................................................................... 37.5
Query Solicitation.........................................................................................................................................................37.7
How Query Solicitation Works ..........................................................................................................................37.7
Query Solicitation Operation.............................................................................................................................37.7
Speeding up IGMP convergence in a non-looped topology...............................................................37.10
Enabling Query Solicitation on multiple switches in a looped topology........................................37.10
Chapter 38: IGMP and IGMP Snooping Commands
Introduction....................................................................................................................................................................38.2
Command List................................................................................................................................................................38.2
Chapter 39: MLD and MLD Snooping Introduction and Commands
MLD Introduction .........................................................................................................................................................39.2
MLD Snooping........................................................................................................................................................ 39.3
MLD Snooping Configuration Examples.......................................................................................................39.4
Command List................................................................................................................................................................ 39.7
Software Reference for IX5-28GPX Switches
xii AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 C613-50041-01 REV C
Part 5: Access and Security
Chapter 40: Access Control Lists Introduction
Introduction....................................................................................................................................................................40.2
Overview................................................................................................................................................................... 40.2
ACL Rules ..................................................................................................................................................................40.3
ACL Source and Destination Addresses ........................................................................................................40.3
ACL Reverse Masking ...........................................................................................................................................40.3
Hardware and Software ACL Types........................................................................................................................ 40.4
Defining Hardware MAC ACLs ..........................................................................................................................40.5
Defining Hardware IP ACLs ................................................................................................................................40.6
Actions for Hardware ACLs.................................................................................................................................40.7
Attaching hardware ACLs to interfaces.........................................................................................................40.7
Hardware ACLs and QoS classifications................................................................................................................40.8
Classifying Your Traffic.........................................................................................................................................40.8
Security ACLs...........................................................................................................................................................40.8
QoS ACLs...................................................................................................................................................................40.9
Attaching hardware ACLs using QoS .............................................................................................................40.9
Filtering hardware ACLs with QoS.................................................................................................................40.11
Using QoS Match Commands with TCP Flags...........................................................................................40.12
ACL Filter Sequence Numbers ...............................................................................................................................40.14
ACL Filter Sequence Number Behavior .......................................................................................................40.14
ACL Filter Sequence Number Applicability................................................................................................40.14
ACL Filter Sequence Number Types .............................................................................................................40.15
ACL Filter Sequence Configuration......................................................................................................................40.17
Creating ACLs in Global Configuration Mode...........................................................................................40.19
Display the ACL configuration details..........................................................................................................40.21
Chapter 41: IPv4 Hardware Access Control List (ACL) Commands
Introduction....................................................................................................................................................................41.2
IPv4 Hardware Access List Commands and Prompts ......................................................................................41.3
Command List................................................................................................................................................................ 41.4
Chapter 42: IPv4 Software Access Control List (ACL) Commands
Introduction....................................................................................................................................................................42.2
IPv4 Software Access List Commands and Prompts........................................................................................ 42.3
Command List................................................................................................................................................................ 42.4
Chapter 43: IPv6 Hardware Access Control List (ACL) Commands
Introduction....................................................................................................................................................................43.2
IPv6 Hardware Access List Commands and Prompts ......................................................................................43.3
Command List................................................................................................................................................................ 43.4
Chapter 44: IPv6 Software Access Control List (ACL) Commands
Introduction....................................................................................................................................................................44.2
IPv6 Software Access List Commands and Prompts........................................................................................ 44.3
Command List................................................................................................................................................................ 44.4
Chapter 45: Quality of Service (QoS) Introduction
Introduction....................................................................................................................................................................45.2
QoS Operations ...................................................................................................................................................... 45.2
QoS Packet Information .............................................................................................................................................45.3
Software Reference for IX5-28GPX Switches
C613-50041-01 REV C AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 xiii
Link Layer QoS ........................................................................................................................................................ 45.3
Differentiated Services Architecture............................................................................................................... 45.4
The Differential Services Field...........................................................................................................................45.5
Processing pre-marked packets .......................................................................................................................45.6
Applying QoS on Your Switch..................................................................................................................................45.7
Classifying your Data............................................................................................................................................ 45.7
Class Maps ................................................................................................................................................................45.7
Policy Maps ............................................................................................................................................................45.10
Premarking and Remarking Your Traffic ............................................................................................................45.11
CoS to egress queue premarking ..................................................................................................................45.11
DSCP to egress queue premarking ...............................................................................................................45.13
Policing (Metering) Your Data................................................................................................................................45.15
Single-rate Three-color Policing.....................................................................................................................45.15
Two-rate Three-color Policing.........................................................................................................................45.16
Configuring and Applying a Policer..............................................................................................................45.17
Remarking Your Data ................................................................................................................................................45.18
Configuring the Egress Queues.............................................................................................................................45.19
Egress Queues and QoS markers ...................................................................................................................45.19
Egress Queue Commands Hierarchy ............................................................................................................45.20
Egress Queue Shaping..............................................................................................................................................45.21
Scheduling .............................................................................................................................................................45.21
Drop Mode .............................................................................................................................................................45.22
Storm Protection.........................................................................................................................................................45.24
Policy-Based Routing ................................................................................................................................................45.25
Practical Example.................................................................................................................................................45.25
Chapter 46: QoS Commands
Command List................................................................................................................................................................ 46.2
Chapter 47: 802.1X Introduction and Configuration
Introduction....................................................................................................................................................................47.2
802.1X System Components ............................................................................................................................. 47.2
The 802.1X Implementation .....................................................................................................................................47.5
Configuring 802.1X ...................................................................................................................................................... 47.6
Chapter 48: 802.1X Commands
Command List................................................................................................................................................................ 48.2
Chapter 49: Authentication Introduction and Configuration
Authentication Introduction .................................................................................................................................... 49.2
Configuring a Guest VLAN..................................................................................................................................49.2
802.1X-Authentication ...............................................................................................................................................49.3
Web-Authentication....................................................................................................................................................49.4
What is Web-Authentication? ...........................................................................................................................49.4
Web-Authentication Basics................................................................................................................................ 49.4
Configuring Web-Authentication....................................................................................................................49.6
Starting a Web-Authentication Session ........................................................................................................49.9
Support for Protocols Underlying Web-Authentication .......................................................................49.10
Web-Authentication Timeout Connect.......................................................................................................49.14
Web Authorization Proxy..................................................................................................................................49.14
MAC-Authentication..................................................................................................................................................49.15
Why is MAC-Authentication Required? .......................................................................................................49.15
How Does MAC-Authentication Work? .......................................................................................................49.15
Configuring MAC-Authentication .................................................................................................................49.16
Software Reference for IX5-28GPX Switches
xiv AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 C613-50041-01 REV C
Tri-Authentication......................................................................................................................................................49.17
Tri-Authentication Configuration.........................................................................................................................49.17
Two-step Authentication ........................................................................................................................................49.19
Ensuring Authentication Methods Require Different Usernames and Passwords .............................49.20
Roaming Authentication .........................................................................................................................................49.21
Roaming Authentication Overview ..............................................................................................................49.22
Roaming Authentication Feature Interactions .........................................................................................49.23
Unauthenticated Supplicant Traffic.....................................................................................................................49.24
Deciding When a Supplicant Fails Authentication..................................................................................49.26
Failed Authentication VLAN ............................................................................................................................49.27
Limitations on Allowed Feature Combinations........................................................................................49.27
Chapter 50: Authentication Commands
Command List................................................................................................................................................................ 50.3
Chapter 51: AAA Introduction and Configuration
AAA Introduction.......................................................................................................................................................... 51.2
Available functions and server types..............................................................................................................51.2
Server Groups and Method Lists......................................................................................................................51.3
Configuring AAA Login Authentication ...............................................................................................................51.5
AAA Configuration Tasks .................................................................................................................................... 51.5
Sample Authentication Configurations................................................................................................................51.7
Sample 802.1X Authentication Configuration............................................................................................51.7
Sample MAC Authentication Configuration................................................................................................ 51.8
Sample Web-Authentication Configuration................................................................................................51.9
Sample Tri-Authentication Configuration..................................................................................................51.10
Chapter 52: AAA Commands
Command List................................................................................................................................................................ 52.2
Chapter 53: RADIUS Introduction and Configuration
Introduction....................................................................................................................................................................53.2
RADIUS Packets ......................................................................................................................................................53.3
RADIUS Attributes .................................................................................................................................................53.4
RADIUS Security .....................................................................................................................................................53.5
RADIUS Proxy ..........................................................................................................................................................53.6
RADIUS Accounting ..............................................................................................................................................53.7
RADIUS Configuration ................................................................................................................................................53.8
Switch Configuration Tasks................................................................................................................................53.8
Switch to RADIUS Server Communication ...................................................................................................53.9
AAA Server Groups Configuration................................................................................................
.................53.11
RADIU
S Co
nfiguration Examples ..........................................................................................................................53.14
RADIUS Authentication .....................................................................................................................................53.14
Single RADIUS Server Configuration ............................................................................................................53.15
Multiple RADIUS Server Configuration ........................................................................................................53.16
RADIUS Server Group Configuration............................................................................................................53.16
RADIUS Server Configuration using Server Groups ................................................................................53.17
Chapter 54: RADIUS Commands
Command List................................................................................................................................................................ 54.2
Software Reference for IX5-28GPX Switches
C613-50041-01 REV C AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 xv
Chapter 55: TACACS+ Introduction and Configuration
Introduction....................................................................................................................................................................55.2
TACACS+ Overview...................................................................................................................................................... 55.2
The AlliedWare Plus TACACS+ Implementation ........................................................................................ 55.2
Authentication........................................................................................................................................................ 55.3
Authorization ..........................................................................................................................................................55.3
Accounting...............................................................................................................................................................55.4
Configuration.................................................................................................................................................................55.5
Configure TACACS+.............................................................................................................................................. 55.5
TACACS+ Configuration Example ...................................................................................................................55.7
Chapter 56: TACACS+ Commands
Command List................................................................................................................................................................ 56.2
Chapter 57: Local RADIUS Server Introduction and Configuration
Local RADIUS Server Introduction..........................................................................................................................57.2
Enable the Local RADIUS Server....................................................................................................................... 57.2
Add the Local RADIUS Server as a RADIUS Server .....................................................................................57.3
Add authenticators to the list of authenticators........................................................................................ 57.3
Configure the Local RADIUS Server User Database ..................................................................................57.4
Authenticating login sessions...........................................................................................................................57.5
RADIUS Authentication with User Privileges...............................................................................................57.5
Creating certificates for single users and all users.....................................................................................57.8
Defined RADIUS attributes list.................................................................................................................................57.9
Chapter 58: Local RADIUS Server Commands
Command List................................................................................................................................................................ 58.2
Chapter 59: Secure Shell (SSH) Introduction
Introduction....................................................................................................................................................................59.2
Secure Shell on the AlliedWare Plus
OS.........................................................................................................59.2
Configuring the SSH Server ...................................................................................................................................... 59.4
Creating a Host Key...............................................................................................................................................59.4
Enabling the Server...............................................................................................................................................59.4
Modifying the Server............................................................................................................................................59.5
Validating the Server Configuration............................................................................................................... 59.6
Adding SSH Users .................................................................................................................................................. 59.6
Authenticating SSH Users...................................................................................................................................59.7
Adding a Login Banner........................................................................................................................................59.7
Monitoring the Server and Managing Sessions.......................................................................................... 59.8
Debugging the Server.......................................................................................................................................... 59.8
Configuring the SSH Client ....................................................................................................................................... 59.9
Modifying the Client.............................................................................................................................................59.9
Adding SSH Servers ............................................................................................................................................59.10
Authenticating with a Server...........................................................................................................................59.10
Connecting to a Server and Running Commands...................................................................................59.11
Copying files to and from the Server............................................................................................................59.11
Debugging the Client ........................................................................................................................................59.11
Chapter 60: Secure Shell (SSH) Configuration
SSH Server Configuration Example........................................................................................................................60.2
Software Reference for IX5-28GPX Switches
xvi AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 C613-50041-01 REV C
Chapter 61: Secure Shell (SSH) Commands
Introduction....................................................................................................................................................................61.2
Command List................................................................................................................................................................61.2
Chapter 62: DHCP Snooping Introduction and Configuration
Introduction....................................................................................................................................................................62.2
DHCP Snooping.............................................................................................................................................................62.2
DHCP Snooping Database..................................................................................................................................62.3
DHCP Relay Agent Option 82............................................................................................................................62.4
Traffic Filtering with DHCP Snooping ............................................................................................................62.6
ARP Security.............................................................................................................................................................62.8
MAC Address Verification ................................................................................................................................... 62.8
DHCP Snooping Violations................................................................................................................................. 62.8
Interactions with Other Features ............................................................................................................................62.9
Configuration...............................................................................................................................................................62.10
Configure DHCP Snooping...............................................................................................................................62.10
Disabling DHCP Snooping................................................................................................................................62.16
Related Features ..................................................................................................................................................62.16
Chapter 63: DHCP Snooping Commands
Command List................................................................................................................................................................ 63.2
Software Reference for IX5-28GPX Switches
C613-50041-01 REV C AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 xvii
Part 6: Network Availability
Chapter 64: VRRP Introduction and Configuration
VRRP Introduction ........................................................................................................................................................64.2
Virtual Router Redundancy Protocol.....................................................................................................................64.3
VRRP Configuration for IPv4 ..................................................................................................................................... 64.4
VRRP election and preempt for IPv4...............................................................................................................64.6
VRRP Configuration for IPv6 ..................................................................................................................................... 64.8
VRRP election and preempt for IPv6.............................................................................................................64.11
VRRP debugging.........................................................................................................................................................64.13
VRRP Configuration Examples ...............................................................................................................................64.14
VRRP Preferred with Backup Configuration...............................................................................................64.14
VRRP Circuit Failover Configuration .............................................................................................................64.17
VRRPv2 to VRRPv3 Transition Configuration.............................................................................................64.22
VRRP IPv6 Configuration Example.................................................................................................................64.28
Chapter 65: VRRP Commands
Command List................................................................................................................................................................ 65.2
Chapter 66: EPSR Introduction and Configuration
Introduction....................................................................................................................................................................66.2
Ring Components and Operation .......................................................................................................................... 66.2
Fault Detection and Recovery..................................................................................................................................66.4
Fault Recovery ........................................................................................................................................................66.4
Restoring Normal Operation .............................................................................................................................66.6
Managing Rings with Two Breaks....................................................................................................................66.7
Recovery When One Break is Restored..........................................................................................................66.8
Configuration Examples...........................................................................................................................................66.10
Single Domain, Single Ring Network............................................................................................................66.10
Single Ring, Dual Domain Network...............................................................................................................66.15
Interconnected Rings................................................................................................................................................66.16
Superloop Protection.........................................................................................................................................66.17
EPSR Superloop Prevention.............................................................................................................................66.18
Configuring a Basic Superloop Protected Two Ring EPSR Network..................................................66.21
Sample Show Output.........................................................................................................................................66.37
Adding a new data VLAN to a functioning superloop topology........................................................66.40
EPSR and Spanning Tree Operation..............................................................................................................66.43
Chapter 67: EPSR Commands
Command List................................................................................................................................................................ 67.2
Software Reference for IX5-28GPX Switches
xviii AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 C613-50041-01 REV C
Part 7: Network Management
Chapter 68: AMF Introduction and Configuration
Introduction to AMF ....................................................................................................................................................68.2
AMF Supported Products and Software Versions.............................................................................................68.2
Key benefits of AMF.....................................................................................................................................................68.3
Unified command-line.........................................................................................................................................68.3
Configuration backup and recovery...............................................................................................................68.3
Rolling firmware upgrade...................................................................................................................................68.3
AMF Terminology.........................................................................................................................................................68.4
AMF network guidelines............................................................................................................................................68.8
Retention and use of the ‘manager’ username ..........................................................................................68.8
Loop-free data plane............................................................................................................................................68.8
Aggregators.............................................................................................................................................................68.8
VCStacks....................................................................................................................................................................68.8
AMF Tunneling (virtual links).............................................................................................................................68.8
AMF external removable media.....................................................................................................................68.13
AMF interaction with QoS and ACLs.............................................................................................................68.13
NTP and AMF.........................................................................................................................................................68.14
Configuring AMF.........................................................................................................................................................68.15
Simple AMF example with a single master ................................................................................................68.15
Verifying the AMF network .....................................................................................................................................68.21
Using the AMF network............................................................................................................................................68.22
AMF backups.........................................................................................................................................................68.22
Safe removal of external storage media......................................................................................................68.22
Performing a manual backup.................................................................................................................................68.24
Backups on VCStacks running as AMF masters ...............................................................................................68.25
Node recovery..............................................................................................................................................................68.27
Automatic node recovery.................................................................................................................................68.27
A “Clean” node......................................................................................................................................................68.28
Manual node recovery .......................................................................................................................................68.29
Node recovery on VCStacks .............................................................................................................................68.30
AMF safe configuration ............................................................................................................................................68.31
Adding a preconfigured device to the network.......................................................................................68.33
Using the unified CLI with working-sets .....................................................................................................68.34
Automatic working-set groups.......................................................................................................................68.35
User-defined working-set groups..................................................................................................................68.36
Executing commands on working-sets .......................................................................................................68.37
Interactive commands.......................................................................................................................................68.39
Rolling-reboot firmware upgrade ........................................................................................................................68.40
Performing a rolling reboot upgrade...........................................................................................................68.42
Chapter 69: AMF Commands
Introduction....................................................................................................................................................................69.2
AMF Naming Convention ................................................................................................................................... 69.2
Chapter 70: NTP Introduction and Configuration
Introduction....................................................................................................................................................................70.2
Overview..........................................................................................................................................................................70.2
NTP on the Switch ........................................................................................................................................................70.3
Troubleshooting ...........................................................................................................................................................70.4
Configuration Example...............................................................................................................................................70.5
Software Reference for IX5-28GPX Switches
C613-50041-01 REV C AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 xix
Chapter 71: NTP Commands
Command List................................................................................................................................................................ 71.2
Chapter 72: Dynamic Host Configuration Protocol (DHCP) Introduction
Introduction....................................................................................................................................................................72.2
BOOTP........................................................................................................................................................................72.2
DHCP ..........................................................................................................................................................................72.2
DHCP Relay Agents ...............................................................................................................................................72.2
Configuring the DHCP Server...................................................................................................................................72.3
Create the Pool .......................................................................................................................................................72.3
Define the Network...............................................................................................................................................72.3
Define the Range ...................................................................................................................................................72.4
Set the Lease ...........................................................................................................................................................72.4
Enable DHCP Leasequery ................................................................................................................................... 72.5
Set the Options.......................................................................................................................................................72.6
DHCP Lease Probing.............................................................................................................................................72.7
DHCP Relay Agent Introduction.............................................................................................................................. 72.8
Configuring the DHCP Relay Agent ................................................................................................................72.8
DHCP Relay Agent Information Option (Option 82) .................................................................................72.9
DHCPv6 Relay Agent Notification for DHCPv6 PD...................................................................................72.12
Configuring the DHCP Client..................................................................................................................................72.13
Clearing Dynamically Allocated Lease Bindings .............................................................................................72.13
Chapter 73: Dynamic Host Configuration Protocol (DHCP) Commands
Command List................................................................................................................................................................ 73.2
Chapter 74: DHCP for IPv6 (DHCPv6)
Introduction and Configuration
DHCPv6 Introduction.................................................................................................................................................. 74.2
DHCPv6 for IPv6 .....................................................................................................................................................74.3
DHCPv6 Prefix Delegation..................................................................................................................................74.4
DHCPv6 RFCs...........................................................................................................................................................74.4
DHCPv6 Messages.................................................................................................................................................74.5
DHCPv6 Renewal and Rebinding.....................................................................................................................74.8
Stateful DHCPv6 Message Exchange..............................................................................................................74.9
Stateless DHCPv6 Message Exchange .........................................................................................................74.10
DHCPv6 Relay Agent Stateful Message Exchange ..................................................................................74.11
DHCPv6 Prefix Delegation Message Exchange.........................................................................................74.12
DHCPv6 Client and Server Identification ...........................................................................................................74.13
DHCPv6 Server and Client Functionality............................................................................................................74.14
DHCPv6 Server Functionality ..........................................................................................................................74.14
DHCPv6 Client Functionality ...........................................................................................................................74.16
Configuring DHCPv6 Prefix Delegation..............................................................................................................74.17
Configuring the DHCPv6 Server Delegation Pool ...................................................................................74.17
Configuring the DHCPv6 PD Client..............................................................................................................74.18
Configure DHCPv6 Server/Stateful Client (Prefix)....................................................................................74.19
Configure DHCPv6 Server/Stateful Client (Range) ..................................................................................74.20
Configure DHCPv6 Server/Stateless Client ................................................................................................74.21
Configure DHCPv6 Relay / Server / Client...................................................................................................74.22
Configure PD Server / PD Client / Stateless Client...................................................................................74.27
Configure PD via DHCPv6 Relay.....................................................................................................................74.29
Configure PD subdelegation with SLAAC...................................................................................................74.31
Configure PD subdelegation for multiple VLANs ....................................................................................74.34
Configure DHCPv6 Relay with recursive PD subdelegation ................................................................74.37
Software Reference for IX5-28GPX Switches
xx AlliedWare Plus
TM
Operating System - Version 5.4.4-0.4 C613-50041-01 REV C
PD Subdelegation System Configuration..........................................................................................................74.40
Stateful_Client Configuration .........................................................................................................................74.42
Stateless_Client Configuration.......................................................................................................................74.42
PD_Client Configuration...................................................................................................................................74.42
DHCPv6_Relay Configuration .........................................................................................................................74.43
PD_Subdelegation Configuration .................................................................................................................74.44
PD_Server1 Configuration................................................................................................................................74.45
PD_Server2 Configuration................................................................................................................................74.45
Chapter 75: DHCP for IPv6 (DHCPv6) Commands
Command List................................................................................................................................................................ 75.2
Chapter 76: SNMP Introduction
Introduction....................................................................................................................................................................76.2
Network Management Framework........................................................................................................................76.2
Structure of Management Information ................................................................................................................76.4
Names ........................................................................................................................................................................ 76.5
Instances ...................................................................................................................................................................76.6
Syntax ........................................................................................................................................................................76.7
Access ........................................................................................................................................................................ 76.7
Status .........................................................................................................................................................................76.7
Description...............................................................................................................................................................76.7
The SNMP Protocol ......................................................................................................................................................76.8
SNMP Versions........................................................................................................................................................ 76.8
SNMP Messages .....................................................................................................................................................76.9
Polling versus Event Notification.....................................................................................................................76.9
Message Format for SNMPv1 and SNMPv2c..............................................................................................76.10
SNMP Communities (Version v1 and v2c) ..................................................................................................76.11
SNMPv3 Entities ...................................................................................................................................................76.11
SNMPv3 Message Protocol Format...............................................................................................................76.12
SNMPv1 and SNMPv2c .............................................................................................................................................76.13
SNMP MIB Views for SNMPv1 and SNMPv2c .............................................................................................76.13
SNMP Communities............................................................................................................................................76.13
Configuration Example (SNMPv1 and v2) ..................................................................................................76.15
SNMPv3 ..........................................................................................................................................................................76.18
SNMP MIB Views for SNMPv3 ..........................................................................................................................76.18
SNMP Groups ........................................................................................................................................................76.18
SNMP Users............................................................................................................................................................76.18
Configuration Example (SNMPv3) .................................................................................................................76.19
Using SNMP to Manage Files and Software ......................................................................................................76.20
Copy a File to or from a TFTP Server.............................................................................................................76.20
Upgrade Software and Configuration Files................................................................................................76.22
Chapter 77: SNMP Commands
Command List................................................................................................................................................................ 77.2
/