Allied Telesis SwitchBlade x908 User manual

  • Hello! I am an AI chatbot trained to assist you with the Allied Telesis SwitchBlade x908 User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Software Reference for
SwitchBlade
x908 and x900 Series Switches
AlliedWare Plus Operating System
Version 5.4.2
SwitchBlade® x908
x900-12XT/S
x900-24XS
x900-24XT
x900-24XT-N
®
C613-50021-01 REV B
Software Reference for x900 Series Switches
ii AlliedWare Plus
TM
Operating System - Version 5.4.2 C613-50021-01 REV B
Acknowledgments
This product includes software developed by the University of California, Berkeley and its
contributors.
Copyright
©1982, 1986, 1990, 1991, 1993 The Regents of the University of California.
All rights reserved.
This product includes software developed by the OpenSSL Project for use in the OpenSSL
Toolkit (http://www.openssl.org/).
Copyright
©1998-2008 The OpenSSL Project. All rights reserved.
This product includes software licensed under the GNU General Public License available from:
http://www.gnu.org/licenses/gpl2.html
Source code for all GPL licensed software in this product can be obtained from the
Allied Telesis GPL Code Download Center at:
http://www.alliedtelesis.com/support/default.aspx
Allied Telesis is committed to meeting the requirements of the open source licenses including
the GNU General Public License (GPL) and will make all required source code available.
If you would like a copy of the GPL source code contained in Allied Telesis products, please
send us a request by registered mail including a check for US$15 to cover production and
shipping costs and a CD with the GPL code will be mailed to you.
GPL Code Request
Allied Telesis Labs (Ltd)
PO Box 8011
Christchurch.
New Zealand
©2012 Allied Telesis Inc. All rights reserved.
This documentation is subject to change without notice. No part of this publication may be
reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or
mechanical, including photocopying and recording for any purpose other than the purchaser’s
internal use without the written permission of Allied Telesis, Inc.
Allied Telesis, AlliedWare Plus, EPSRing, SwitchBlade, and VCStack are trademarks or registered
trademarks in the United States and elsewhere of Allied Telesis, Inc. Adobe, Acrobat, and
Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the
United States and/or other countries. Additional brands, names and products mentioned
herein may be trademarks of their respective companies.
Getting the most from this manual
Although you can view this document using Acrobat version 5, to get the best from this
manual, we recommend using Adobe Acrobat Reader version 8. You can download Acrobat
Reader 8 free from http://www.adobe.com/.
New features in this software version
For a list of new and enhanced features and commands in this version, see
Appendix B: Changes in Version 5.4.2-0.1 (with links to corresponding sections in this
Software Reference), or the Software Release Note for Version 5.4.2. Documentation can be
downloaded from the Support area of our website at
http://www.alliedtelesis.com. Note that to download software files, you need a valid user
account.
Software Reference for x900 Series Switches
C613-50021-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.2 iii
Table of Contents
Part 1 Setting up the Switch
Chapter 1. Getting Started..................................................................................................1.1
Introduction.....................................................................................................................................................................................................1.2
How to Login.................................................................................................................................................................................................1.2
How to get Command Help.................................................................................................................................................................1.3
Viewing a List of Valid Parameters.............................................................................................................................................1.3
Completing Keywords.......................................................................................................................................................................1.8
Viewing Command Error Messages..........................................................................................................................................1.9
How to Work with Command Modes.........................................................................................................................................1.10
Entering Privileged Exec Commands When in a Configuration Mode..............................................................1.13
How to See the Current Configuration.......................................................................................................................................1.15
Default Settings...........................................................................................................................................................................................1.16
The Default Configuration Script......................................................................................................................................................1.17
How to Change the Password...........................................................................................................................................................1.18
How to Set Strong Passwords...........................................................................................................................................................1.19
How to Set a Management IP Address........................................................................................................................................1.21
How to Save and Boot from the Current Configuration...................................................................................................1.22
How to Save to the Default Configuration File...............................................................................................................1.22
How to Create and Use a New Configuration File.......................................................................................................1.22
How to Return to the Factory Defaults.......................................................................................................................................1.24
How to See System Information......................................................................................................................................................1.25
Viewing Overall System Information......................................................................................................................................1.25
Viewing Temperature, Voltage, and Fan Status................................................................................................................1.26
Viewing the Serial Number..........................................................................................................................................................1.27
How to Set System Parameters........................................................................................................................................................1.27
How to Change the Telnet Session Timeout...................................................................................................................1.27
How to Name the Switch............................................................................................................................................................1.28
How to Display a Text Banner at Login...............................................................................................................................1.29
How to Set the Time and Date........................................................................................................................................................1.30
How to Show Current Settings.................................................................................................................................................1.30
How to Set the Time and Date................................................................................................................................................1.30
How to Set the Timezone...........................................................................................................................................................1.31
How to Configure Summer-time.............................................................................................................................................1.31
How to Add and Remove Users......................................................................................................................................................1.32
Pre-encrypted Passwords..............................................................................................................................................................1.33
How to Undo Settings............................................................................................................................................................................1.35
How to Use the no Parameter..................................................................................................................................................1.35
How to Use the default Parameter.........................................................................................................................................1.35
How to Upgrade the Firmware.........................................................................................................................................................1.36
Save Power With the Eco-Friendly Feature...............................................................................................................................1.37
Trouble-shoot fiber and pluggable issues.....................................................................................................................................1.38
Continuous Reboot Prevention........................................................................................................................................................1.39
Controlling “show” Command Output........................................................................................................................................1.41
Commands Available in each Mode...............................................................................................................................................1.43
User Exec Mode.................................................................................................................................................................................1.43
Software Reference for x900 Series Switches
iv AlliedWare Plus
TM
Operating System - Version 5.4.2 C613-50021-01 REV B
Privileged Exec Mode......................................................................................................................................................................1.44
Global Configuration Mode.........................................................................................................................................................1.45
AlliedWare Plus GUI................................................................................................................................................................................1.47
Chapter 2. Command Syntax Conventions in this Software Reference.........................2.1
Chapter 3. Start-up Sequence .............................................................................................3.1
AlliedWare Plus Start-up.........................................................................................................................................................................3.2
Diagnostic Menu...........................................................................................................................................................................................3.3
Bootloader Menu.........................................................................................................................................................................................3.5
Start-up Sequence.......................................................................................................................................................................................3.9
Chapter 4. CLI Navigation Commands ..............................................................................4.1
Command List...............................................................................................................................................................................................4.2
Chapter 5. User Access Commands ...................................................................................5.1
Introduction.....................................................................................................................................................................................................5.2
Command List...............................................................................................................................................................................................5.2
Chapter 6. Creating and Managing Files.............................................................................6.1
Introduction.....................................................................................................................................................................................................6.2
Working With Files.....................................................................................................................................................................................6.2
Listing files................................................................................................................................................................................................6.2
Displaying the contents of configuration and text files..................................................................................................6.4
Navigating through the filesystem..............................................................................................................................................6.4
Using the editor....................................................................................................................................................................................6.6
Creating and Using Configuration Files...........................................................................................................................................6.8
Creating a configuration file...........................................................................................................................................................6.8
Specifying the start-up configuration script...........................................................................................................................6.8
Working with configuration files...............................................................................................................................................6.10
The configuration file fallback order........................................................................................................................................6.10
Copying Files To and From Your Device....................................................................................................................................6.12
URL syntax............................................................................................................................................................................................6.12
Copying files..........................................................................................................................................................................................6.12
Copying from a Server to Running Configuration..........................................................................................................6.16
The Autoboot Feature...........................................................................................................................................................................6.17
Restoring a switch using Autoboot from external media...........................................................................................6.18
Configure Autoboot........................................................................................................................................................................6.19
Chapter 7. File Management Commands ..........................................................................7.1
Introduction.....................................................................................................................................................................................................7.3
URL Syntax and Keyword Usage................................................................................................................................................7.3
Command List...............................................................................................................................................................................................7.4
Chapter 8. System Configuration and Monitoring Commands .......................................8.1
Command List...............................................................................................................................................................................................8.3
Chapter 9. Debugging and Logging.....................................................................................9.1
Introduction.....................................................................................................................................................................................................9.2
Debugging........................................................................................................................................................................................................9.2
Logging to terminal.............................................................................................................................................................................9.2
Software Reference for x900 Series Switches
C613-50021-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.2 v
Turning off debugging........................................................................................................................................................................9.2
Logging...............................................................................................................................................................................................................9.3
Log Outputs............................................................................................................................................................................................9.3
Chapter 10. Logging Commands.......................................................................................10.1
Command List.............................................................................................................................................................................................10.2
Chapter 11. Interface Commands.....................................................................................11.1
Command List.............................................................................................................................................................................................11.2
Chapter 12. Scripting Commands.....................................................................................12.1
Command List.............................................................................................................................................................................................12.2
Chapter 13. Interface Testing Commands.......................................................................13.1
Command List.............................................................................................................................................................................................13.2
Part 2 Layer Two Switching
Chapter 14. Switching Introduction..................................................................................14.1
Introduction...................................................................................................................................................................................................14.2
Physical Layer Information....................................................................................................................................................................14.3
Switch Ports..........................................................................................................................................................................................14.3
Activating and Deactivating Switch Ports.............................................................................................................................14.4
Autonegotiation..................................................................................................................................................................................14.4
Duplex mode.......................................................................................................................................................................................14.4
Speed options......................................................................................................................................................................................14.4
MDI/MDIX Connection Modes.................................................................................................................................................14.5
Switch Bay Provisioning..........................................................................................................................................................................14.7
Provisioned Board Classes............................................................................................................................................................14.7
Applying Hardware Provisioning...............................................................................................................................................14.7
Removing or Changing XEM BAY Provisioning...............................................................................................................14.8
Displaying Provisioned Configurations...................................................................................................................................14.8
Provisioning and Change Management..............................................................................................................................14.10
Provisioning and Software Version Aspects....................................................................................................................14.11
The Layer 2 Switching Process.......................................................................................................................................................14.12
The Ingress Rules............................................................................................................................................................................14.12
The Learning Process...................................................................................................................................................................14.13
The Forwarding Process.............................................................................................................................................................14.14
The Egress Rules.............................................................................................................................................................................14.14
Layer 2 Filtering........................................................................................................................................................................................14.15
Ingress Filtering.................................................................................................................................................................................14.15
Storm-control............................................................................................................................................................................................14.16
Loop Protection.......................................................................................................................................................................................14.17
Loop Detection ..............................................................................................................................................................................14.17
Thrash Limiting.................................................................................................................................................................................14.18
Support for Jumbo Frames................................................................................................................................................................14.19
Port Mirroring...........................................................................................................................................................................................14.20
Port Security..............................................................................................................................................................................................14.21
MAC Address Learn Limits.......................................................................................................................................................14.21
IEEE 802.1X........................................................................................................................................................................................14.21
Quality of Service....................................................................................................................................................................................14.22
Software Reference for x900 Series Switches
vi AlliedWare Plus
TM
Operating System - Version 5.4.2 C613-50021-01 REV B
IGMP Snooping........................................................................................................................................................................................14.23
Chapter 15. Switching Commands....................................................................................15.1
Command List.............................................................................................................................................................................................15.3
Chapter 16. VLAN Introduction........................................................................................16.1
Introduction...................................................................................................................................................................................................16.2
Virtual LANs (VLANs)............................................................................................................................................................................16.2
Configuring VLANs...........................................................................................................................................................................16.3
VLAN Double Tagging (VLAN Stacking).....................................................................................................................................16.5
How double-tagged VLANs work...........................................................................................................................................16.5
VLAN Rules for double tagging.................................................................................................................................................16.5
Restrictions when using double-tagged VLANs...............................................................................................................16.6
Configuring double-tagged VLANs..........................................................................................................................................16.6
Private VLANs..........................................................................................................................................................................................16.11
Private VLANs for ports in access mode..........................................................................................................................16.11
Private VLAN operation with ports in access mode.................................................................................................16.13
Access mode private VLAN configuration example..................................................................................................16.14
Private VLANs for trunked ports..........................................................................................................................................16.17
Trunked port private VLAN configuration example..................................................................................................16.18
Chapter 17. VLAN Commands .........................................................................................17.1
Command List.............................................................................................................................................................................................17.2
Chapter 18. Spanning Tree Introduction: STP, RSTP, and MSTP ................................18.1
Introduction...................................................................................................................................................................................................18.2
Overview of Spanning Trees...............................................................................................................................................................18.2
Spanning tree operation................................................................................................................................................................18.2
Spanning tree modes.......................................................................................................................................................................18.4
Spanning Tree Protocol (STP)...........................................................................................................................................................18.5
Configuring STP..........................................................................................................................................................................................18.6
Rapid Spanning Tree Protocol (RSTP)..........................................................................................................................................18.8
Configuring RSTP.......................................................................................................................................................................................18.9
Multiple Spanning Tree Protocol (MSTP).................................................................................................................................18.11
Multiple Spanning Tree Instances (MSTI)..........................................................................................................................18.12
MSTP Regions...................................................................................................................................................................................18.13
Common and Internal Spanning Tree (CIST)................................................................................................................18.15
MSTP Bridge Protocol Data Units (BPDUs)...................................................................................................................18.17
Configuring MSTP................................................................................................................
...................................................................18.19
Chapter 19. Spanning Tree Commands...........................................................................19.1
Command List.............................................................................................................................................................................................19.3
Chapter 20. Link Aggregation Introduction and Configuration ....................................20.1
Introduction...................................................................................................................................................................................................20.2
Link Aggregation Control Protocol (LACP).......................................................................................................................20.2
Static and Dynamic (LACP) Link Aggregation..........................................................................................................................20.4
Static Channel Groups....................................................................................................................................................................20.4
Dynamic (LACP) Channel Groups..........................................................................................................................................20.4
Configuring an LACP Channel Group...........................................................................................................................................20.5
Configuring a Static Channel Group...............................................................................................................................................20.8
Configuring a Dynamic Channel Group.......................................................................................................................................20.9
Software Reference for x900 Series Switches
C613-50021-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.2 vii
Chapter 21. Link Aggregation Commands ......................................................................21.1
Introduction...................................................................................................................................................................................................21.2
Command List.............................................................................................................................................................................................21.2
Chapter 22. GVRP Introduction and Configuration........................................................22.1
Introduction...................................................................................................................................................................................................22.2
GVRP Example....................................................................................................................................................................................22.3
GVRP Guidelines................................................................................................................................................................................22.4
GVRP and Network Security......................................................................................................................................................22.5
GVRP-inactive Intermediate Switches....................................................................................................................................22.5
Enabling GVRP on the Switch....................................................................................................................................................22.5
Enabling GVRP on the Ports.......................................................................................................................................................22.6
Setting the GVRP Timers..............................................................................................................................................................22.6
Disabling GVRP on the Ports......................................................................................................................................................22.6
Disabling GVRP on the Switch...................................................................................................................................................22.7
Configuring and validating GVRP......................................................................................................................................................22.8
Chapter 23. GVRP Commands..........................................................................................23.1
Command List.............................................................................................................................................................................................23.2
Part 3 Layer Three, Switching and Routing
Chapter 24. Internet Protocol (IP) Addressing and Protocols ......................................24.1
Introduction...................................................................................................................................................................................................24.2
Address Resolution Protocol (ARP)...............................................................................................................................................24.3
Static ARP Entries..............................................................................................................................................................................24.3
Timing Out ARP Entries................................................................................................................................................................24.3
Deleting ARP Entries.......................................................................................................................................................................24.4
Proxy ARP..............................................................................................................................................................................................24.4
ARP Logging..........................................................................................................................................................................................24.7
Domain Name System (DNS)...........................................................................................................................................................24.8
Domain name parts..........................................................................................................................................................................24.8
Server hierarchy..................................................................................................................................................................................24.8
DNS Client............................................................................................................................................................................................24.9
DNS Relay..........................................................................................................................................................................................24.10
DHCP options..................................................................................................................................................................................24.11
Internet Control Message Protocol (ICMP)............................................................................................................................24.12
ICMP Router Discovery Protocol (IRDP).................................................................................................................................24.13
Router discovery.............................................................................................................................................................................24.13
Router discovery process...........................................................................................................................................................24.13
Configuration procedure............................................................................................................................................................24.15
Checking IP Connections...................................................................................................................................................................24.17
Ping..........................................................................................................................................................................................................24.17
Traceroute..........................................................................................................................................................................................24.17
IP Helper......................................................................................................................................................................................................24.18
IP Directed Broadcast...........................................................................................................................................................................24.19
Chapter 25. IP Addressing and Protocol Commands .....................................................25.1
Introduction...................................................................................................................................................................................................25.3
Command List.............................................................................................................................................................................................25.3
Software Reference for x900 Series Switches
viii AlliedWare Plus
TM
Operating System - Version 5.4.2 C613-50021-01 REV B
Chapter 26. IPv6 Introduction...........................................................................................26.1
Introduction...................................................................................................................................................................................................26.2
Overview........................................................................................................................................................................................................26.2
IPv6 Addresses and Prefixes................................................................................................................................................................26.3
Address types.......................................................................................................................................................................................26.3
IPv6 Headers........................................................................................................................................................................................26.5
The Internet Control Message Protocol (ICMPv6).......................................................................................................26.7
IPv6 Routing.......................................................................................................................................................................................26.10
Integration of IPv4 and IPv6......................................................................................................................................................26.10
IPv6 on your Switch...............................................................................................................................................................................26.11
Enabling IPv6......................................................................................................................................................................................26.11
IPv6 Stateless Address Autoconfiguration (SLAAC)..................................................................................................26.11
IPv6 EUI-64 Addressing...............................................................................................................................................................26.11
IPv6 Link-local Addresses...........................................................................................................................................................26.11
IPv6 RA Guard..........................................................................................................................................................................................26.12
RA Guard Introduction...............................................................................................................................................................26.12
Enabling IPv6 RA Guard..............................................................................................................................................................26.12
Chapter 27. IPv6 Commands.............................................................................................27.1
Command List.............................................................................................................................................................................................27.2
Chapter 28. IPv6to4 Tunneling Configuration.................................................................28.1
Introduction...................................................................................................................................................................................................28.2
6to4 Automatic Tunnel Configuration..........................................................................................................................................28.2
Tunneling Operation........................................................................................................................................................................28.2
6to4 tunnels operation and configuration summary.....................................................................................................28.3
Example 6to4 configuration.........................................................................................................................................................28.4
Chapter 29. IPv6to4 Tunneling Commands.....................................................................29.1
Command List.............................................................................................................................................................................................29.2
Chapter 30. Routing Protocol Overview ..........................................................................30.1
Introduction...................................................................................................................................................................................................30.2
RIP.......................................................................................................................................................................................................................30.2
OSPF.................................................................................................................................................................................................................30.2
BGP....................................................................................................................................................................................................................30.3
PIM-SM.............................................................................................................................................................................................................30.4
VRRP.................................................................................................................................................................................................................30.4
Chapter 31. Route Selection..............................................................................................31.1
Introduction...................................................................................................................................................................................................31.2
Types of Routes..........................................................................................................................................................................................31.2
Interface Routes..................................................................................................................................................................................31.2
Static Routes.........................................................................................................................................................................................31.2
Dynamic Routes.................................................................................................................................................................................31.3
RIB and FIB Routing Tables..................................................................................................................................................................31.4
Administrative Distance.................................................................................................................................................................31.5
Equal Cost Multipath Routing.....................................................................................................................................................31.7
How AlliedWare Plus Deletes Routes..................................................................................................................................31.7
How AlliedWare Plus Adds Routes.......................................................................................................................................31.8
Software Reference for x900 Series Switches
C613-50021-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.2 ix
Chapter 32. Routing Commands.......................................................................................32.1
Introduction...................................................................................................................................................................................................32.2
Command List.............................................................................................................................................................................................32.2
Chapter 33. RIP Configuration ..........................................................................................33.1
Introduction...................................................................................................................................................................................................33.2
Enabling RIP...................................................................................................................................................................................................33.2
Specifying the RIP Version....................................................................................................................................................................33.4
RIPv2 Authentication (Single Key)....................................................................................................................................................33.6
RIPv2 Text Authentication (Multiple Keys).................................................................................................................................33.8
RIPv2 md5 authentication (Multiple Keys)...............................................................................................................................33.12
Chapter 34. RIP Commands..............................................................................................34.1
Introduction...................................................................................................................................................................................................34.2
Command List.............................................................................................................................................................................................34.2
Chapter 35. RIPng Configuration......................................................................................35.1
Introduction...................................................................................................................................................................................................35.2
Enabling RIPng..............................................................................................................................................................................................35.2
Troubleshooting RIPng Adjacency...................................................................................................................................................35.5
Chapter 36. RIPng Commands..........................................................................................36.1
Introduction...................................................................................................................................................................................................36.2
Command List.............................................................................................................................................................................................36.2
Chapter 37. OSPF Introduction and Configuration ........................................................37.1
OSPF Introduction.....................................................................................................................................................................................37.2
Features...........................................................................................................................................................................................................37.2
OSPF Components...................................................................................................................................................................................37.2
Autonomous Systems.....................................................................................................................................................................37.2
Routing Areas......................................................................................................................................................................................37.3
Adjacencies and Designated Routers.....................................................................................................................................37.3
Link State Advertisements............................................................................................................................................................37.4
OSPF Packet Types..........................................................................................................................................................................37.4
OSPF States..........................................................................................................................................................................................37.5
OSPF Metrics.......................................................................................................................................................................................37.6
Automatic Cost Calculation........................................................................................................................................................37.6
Routing with OSPF...........................................................................................................................................................................37.7
Network Types...................................................................................................................................................................................37.7
Passive Interfaces................................................................................................................................................................................37.8
Authenticating OSPF........................................................................................................................................................................37.8
Redistributing External Routes...................................................................................................................................................37.9
Enabling OSPF on an Interface........................................................................................................................................................37.10
Setting priority...........................................................................................................................................................................................37.12
Configuring an Area Border Router.............................................................................................................................................37.14
Redistributing Routes Into OSPF...................................................................................................................................................37.15
OSPF Cost..................................................................................................................................................................................................37.16
Configuring Virtual Links.....................................................................................................................................................................37.19
OSPF Authentication............................................................................................................................................................................37.21
Software Reference for x900 Series Switches
x AlliedWare Plus
TM
Operating System - Version 5.4.2 C613-50021-01 REV B
Chapter 38. OSPF Commands ..........................................................................................38.1
Introduction...................................................................................................................................................................................................38.3
Command List.............................................................................................................................................................................................38.3
Chapter 39. OSPFv3 for IPv6 Introduction and Configuration......................................39.1
OSPFv3 Introduction...............................................................................................................................................................................39.2
Features...........................................................................................................................................................................................................39.2
Licensing..........................................................................................................................................................................................................39.2
Routing Overview......................................................................................................................................................................................39.3
OSPF Components...................................................................................................................................................................................39.3
Autonomous Systems.....................................................................................................................................................................39.3
Routing Areas......................................................................................................................................................................................39.3
Relationships Between Routers.................................................................................................................................................39.3
OSPFv3 Packet Types.....................................................................................................................................................................39.4
Link State Advertisements (LSAs)............................................................................................................................................39.8
LSA Header...........................................................................................................................................................................................39.8
OSPFv3 States.....................................................................................................................................................................................39.9
OSPFv3 Metrics..................................................................................................................................................................................39.9
Automatic Cost Calculation........................................................................................................................................................39.9
Network Types................................................................................................................................................................................39.10
Passive Interfaces.............................................................................................................................................................................39.10
Redistributing External Routes................................................................................................................................................39.10
Differences between OSPFV2 and OSPFv3...........................................................................................................................39.12
Configuring OSPFv3..............................................................................................................................................................................39.14
Example 1: Single-Area Network Configuration..........................................................................................................39.15
Example 2: Two-Area Network Configuration.............................................................................................................39.22
Setting Up the Metrics.................................................................................................................................................................39.24
Chapter 40. OSPFv3 for IPv6 Commands........................................................................40.1
Command List.............................................................................................................................................................................................40.2
Chapter 41. BGP Configuration ........................................................................................41.1
Introduction...................................................................................................................................................................................................41.2
Enabling BGP Peers In The Same Autonomous System.....................................................................................................41.2
Enabling BGP Between Different Autonomous Systems....................................................................................................41.4
Route Reflector...........................................................................................................................................................................................41.5
Confederations............................................................................................................................................................................................41.7
BGP Authentication...............................................................................................................................................................................41.10
Configuring BGP Graceful Reset....................................................................................................................................................41.12
Configuring BGP Graceful Restart.................................................................................................................................................41.14
Chapter 42. BGP Commands ............................................................................................42.1
Introduction...................................................................................................................................................................................................42.4
Command List.............................................................................................................................................................................................42.4
Chapter 43. Route Map Configuration..............................................................................43.1
Introduction...................................................................................................................................................................................................43.2
Route-Map.....................................................................................................................................................................................................43.2
Software Reference for x900 Series Switches
C613-50021-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.2 xi
Chapter 44. Route Map Commands..................................................................................44.1
Command List.............................................................................................................................................................................................44.2
Chapter 45. VRF-Lite Introduction and Configuration...................................................45.1
Introduction...................................................................................................................................................................................................45.2
VRF-Lite...........................................................................................................................................................................................................45.2
Configuring VRF-Lite................................................................................................................................................................................45.6
Creating and Partitioning VRF Instances...............................................................................................................................45.6
Sharing Connectivity Between VRF Instances...................................................................................................................45.7
Intra-VRF Routing....................................................................................................................................................................................45.13
Inter-VRF Routing...................................................................................................................................................................................45.13
Static Inter-VRF Routing......................................................................................................................................................................45.14
Dynamic VRF Routing..........................................................................................................................................................................45.15
Utilities Available within VRF-Lite..................................................................................................................................................45.15
Utilities Unavailable within VRF-Lite.............................................................................................................................................45.16
Chapter 46. VRF-Lite Commands.....................................................................................46.1
Introduction...................................................................................................................................................................................................46.3
Command List.............................................................................................................................................................................................46.3
Part 4 Multicast Applications
Chapter 47. Multicast Introduction and Commands.......................................................47.1
Introduction...................................................................................................................................................................................................47.2
Multicast groups..................................................................................................................................................................................47.2
Components in a multicast network......................................................................................................................................47.2
Command List.............................................................................................................................................................................................47.5
Chapter 48. IGMP and IGMP Snooping Introduction .....................................................48.1
Introduction...................................................................................................................................................................................................48.2
IGMP.................................................................................................................................................................................................................48.2
Joining a multicast group (Membership report)...............................................................................................................48.3
Staying in the multicast group (Query message).............................................................................................................48.3
Leaving the multicast group (Leave message)...................................................................................................................48.3
IGMP Snooping...........................................................................................................................................................................................48.4
How IGMP Snooping operates.................................................................................................................................................48.4
IGMP Snooping and Querier configuration example....................................................................................................48.5
Query Solicitation......................................................................................................................................................................................48.7
How Query Solicitation Works................................................................................................................................................48.7
Query Solicitation Operation.....................................................................................................................................................48.8
Speeding up IGMP convergence in a non-looped topology..................................................................................48.10
Enabling Query Solicitation on multiple switches in a looped topology.........................................................48.10
Chapter 49. IGMP and IGMP Snooping Commands.......................................................49.1
Introduction...................................................................................................................................................................................................49.2
Command List.............................................................................................................................................................................................49.2
Chapter 50. PIM-SM Introduction and Configuration.....................................................50.1
Introduction...................................................................................................................................................................................................50.2
PIM-SM.............................................................................................................................................................................................................50.2
Software Reference for x900 Series Switches
xii AlliedWare Plus
TM
Operating System - Version 5.4.2 C613-50021-01 REV B
Characteristics of PIM-SM.....................................................................................................................................................................50.2
Roles in PIM-SM..........................................................................................................................................................................................50.3
Operation of PIM-SM..............................................................................................................................................................................50.4
PIM-SM Configuration.............................................................................................................................................................................50.6
Static Rendezvous Point configuration..................................................................................................................................50.7
Dynamic Rendezvous Point configuration...........................................................................................................................50.9
Bootstrap Router configuration..............................................................................................................................................50.11
PIM-SSM.......................................................................................................................................................................................................50.14
Characteristics of PIM-SSM...............................................................................................................................................................50.14
PIM-SSM IP Address Range......................................................................................................................................................50.14
IGMPv3 and SSM-Mapping........................................................................................................................................................50.14
How PIM-SSM Works.................................................................................................................................................................50.15
How IGMP SSM-Mapping Works.........................................................................................................................................50.16
Configure PIM-SSM.......................................................................................................................................................................50.16
Chapter 51. PIM-SM Commands.......................................................................................51.1
Command List.............................................................................................................................................................................................51.2
Chapter 52. PIM-DM Introduction and Configuration....................................................52.1
Introduction...................................................................................................................................................................................................52.2
Characteristics of PIM-DM...................................................................................................................................................................52.2
PIM-DM Terminology..............................................................................................................................................................................52.3
PIM-DM Configuration...........................................................................................................................................................................52.4
Configuration Example...................................................................................................................................................................52.4
Verifying Configuration...................................................................................................................................................................52.6
Chapter 53. PIM-DM Commands......................................................................................53.1
Command List.............................................................................................................................................................................................53.2
Chapter 54. MLD Snooping Introduction and Commands.............................................54.1
Introduction...................................................................................................................................................................................................54.2
MLD Snooping....................................................................................................................................................................................54.2
Command List.............................................................................................................................................................................................54.3
Part 5 Access and Security
Chapter 55. Access Control Lists Introduction ...............................................................55.1
Introduction...................................................................................................................................................................................................55.2
Overview................................................................................................................................................................................................55.2
ACL Rules..............................................................................................................................................................................................55.3
ACL Source and Destination Addresses..............................................................................................................................55.3
ACL Reverse Masking.....................................................................................................................................................................55.3
Hardware and Software ACL Types..............................................................................................................................................55.4
Defining Hardware MAC ACLs................................................................................................................................................55.5
Defining Hardware IP ACLs........................................................................................................................................................55.6
Actions for Hardware ACLs........................................................................................................................................................55.7
Attaching hardware ACLs to interfaces................................................................................................................................55.7
Hardware ACLs and QoS classifications......................................................................................................................................55.8
Classifying Your Traffic....................................................................................................................................................................55.8
Security ACLs.......................................................................................................................................................................................55.8
QoS ACLs..............................................................................................................................................................................................55.9
Software Reference for x900 Series Switches
C613-50021-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.2 xiii
Profile Limitations..............................................................................................................................................................................55.9
Attaching hardware ACLs using QoS.................................................................................................................................55.11
Filtering hardware ACLs with QoS......................................................................................................................................55.12
Using QoS Match Commands with TCP Flags..............................................................................................................55.13
ACL Filter Sequence Numbers.......................................................................................................................................................55.15
ACL Filter Sequence Number Behavior............................................................................................................................55.15
ACL Filter Sequence Number Applicability....................................................................................................................55.15
ACL Filter Sequence Number Types..................................................................................................................................55.16
ACL Filter Sequence Configuration.............................................................................................................................................55.18
Creating ACLs in Global Configuration Mode..............................................................................................................55.20
Display the ACL configuration details.................................................................................................................................55.22
Chapter 56. IPv4 Hardware Access Control List (ACL) Commands............................56.1
Introduction...................................................................................................................................................................................................56.2
IPv4 Hardware Access List Commands and Prompts..........................................................................................................56.3
Command List.............................................................................................................................................................................................56.4
Chapter 57. IPv4 Software Access Control List (ACL) Commands..............................57.1
Introduction...................................................................................................................................................................................................57.2
IPv4 Software Access List Commands and Prompts............................................................................................................57.3
Command List.............................................................................................................................................................................................57.4
Chapter 58. IPv6 Hardware Access Control List (ACL) Commands............................58.1
Introduction...................................................................................................................................................................................................58.2
IPv6 Hardware Access List Commands and Prompts..........................................................................................................58.3
Command List.............................................................................................................................................................................................58.4
Chapter 59. IPv6 Software Access Control List (ACL) Commands..............................59.1
Introduction...................................................................................................................................................................................................59.2
IPv6 Software Access List Commands and Prompts............................................................................................................59.3
Command List.............................................................................................................................................................................................59.4
Chapter 60. Quality of Service (QoS) Introduction ........................................................60.1
Introduction...................................................................................................................................................................................................60.2
QoS Operations.................................................................................................................................................................................60.2
QoS Packet Information........................................................................................................................................................................60.3
Link Layer QoS...................................................................................................................................................................................60.3
Differentiated Services Architecture.......................................................................................................................................60.4
The Differential Services Field....................................................................................................................................................60.5
Processing pre-marked packets.................................................................................................................................................60.6
Applying QoS on Your Switch...........................................................................................................................................................60.7
Classifying your Data........................................................................................................................................................................60.7
Class Maps.............................................................................................................................................................................................60.7
Policy Maps.........................................................................................................................................................................................60.10
Premarking Your Traffic......................................................................................................................................................................60.11
CoS to egress queue premarking..........................................................................................................................................60.11
DSCP to egress queue premarking......................................................................................................................................60.13
Policing (Metering) Your Data........................................................................................................................................................60.15
Single-rate Three-color Policing.............................................................................................................................................60.16
Two-rate Three-color Policing................................................................................................................................................60.17
Configuring and Applying a Policer.......................................................................................................................................60.18
Remarking Your Data...........................................................................................................................................................................60.19
Configuring the Egress Queues......................................................................................................................................................60.21
Software Reference for x900 Series Switches
xiv AlliedWare Plus
TM
Operating System - Version 5.4.2 C613-50021-01 REV B
Fabric queues - The Internal Paths.......................................................................................................................................60.21
Egress Queues and QoS markers.........................................................................................................................................60.21
Egress Queue Commands Hierarchy..................................................................................................................................60.22
Egress Queue Shaping..........................................................................................................................................................................60.23
Scheduling...........................................................................................................................................................................................60.23
Drop Mode........................................................................................................................................................................................60.25
Egress Queue Mapping................................................................................................................................................................60.32
Storm Protection.....................................................................................................................................................................................60.33
QoS and the Switching Fabric.........................................................................................................................................................60.34
Policy-Based Routing.............................................................................................................................................................................60.35
Practical Example............................................................................................................................................................................60.35
Chapter 61. QoS Commands.............................................................................................61.1
Command List.............................................................................................................................................................................................61.3
Chapter 62. 802.1X Introduction and Configuration ......................................................62.1
Introduction...................................................................................................................................................................................................62.2
The 802.1X Implementation...............................................................................................................................................................62.2
Configuring 802.1X...................................................................................................................................................................................62.2
Chapter 63. 802.1X Commands........................................................................................63.1
Command List.............................................................................................................................................................................................63.2
Chapter 64. Authentication Introduction and Configuration ........................................64.1
Authentication Introduction.................................................................................................................................................................64.2
Tri-Authentication Introduction.................................................................................................................................................64.2
Tri-Authentication Configuration..............................................................................................................................................64.2
Configuring a Guest VLAN..........................................................................................................................................................64.3
Roaming Authentication........................................................................................................................................................................64.4
Roaming Authentication Overview.........................................................................................................................................64.5
Roaming Authentication Feature Interactions...................................................................................................................64.6
Unauthenticated Supplicant Traffic..................................................................................................................................................64.6
Deciding when a supplicant fails authentication...............................................................................................................64.8
Authentication Enhancements............................................................................................................................................................64.9
Web-authentication Enhancements........................................................................................................................................64.9
Guest VLAN Enhancements....................................................................................................................................................64.10
Failed authentication VLAN......................................................................................................................................................64.11
Limitations on allowed feature combinations.................................................................................................................64.12
Chapter 65. Authentication Commands ..........................................................................65.1
Command List.............................................................................................................................................................................................65.3
Chapter 66. AAA Introduction and Configuration..........................................................66.1
AAA Introduction......................................................................................................................................................................................66.2
Available functions and server types.......................................................................................................................................66.2
Server Groups and Method Lists..............................................................................................................................................66.3
Configuring AAA Login Authentication........................................................................................................................................66.5
AAA Configuration Tasks........................................................................................................
.....................................................66.5
Sam
ple Authentication Configurations..........................................................................................................................................66.7
Sample 802.1X Authentication Configuration..................................................................................................................66.7
Sample MAC Authentication Configuration......................................................................................................................66.8
Sample Web-Authentication Configuration.......................................................................................................................66.9
Software Reference for x900 Series Switches
C613-50021-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.2 xv
Sample Tri-Authentication Configuration.........................................................................................................................66.10
Chapter 67. AAA Commands............................................................................................67.1
Command List.............................................................................................................................................................................................67.2
Chapter 68. RADIUS Introduction and Configuration....................................................68.1
Introduction...................................................................................................................................................................................................68.2
RADIUS Packets.................................................................................................................................................................................68.3
RADIUS Attributes...........................................................................................................................................................................68.4
RADIUS Security................................................................................................................................................................................68.5
RADIUS Proxy....................................................................................................................................................................................68.6
RADIUS Accounting........................................................................................................................................................................68.7
RADIUS Configuration...........................................................................................................................................................................68.8
Switch Configuration Tasks..........................................................................................................................................................68.8
Switch to RADIUS Server Communication .......................................................................................................................68.9
AAA Server Groups Configuration......................................................................................................................................68.11
RADIUS Configuration Examples..................................................................................................................................................68.14
RADIUS Authentication..............................................................................................................................................................68.14
Single RADIUS Server Configuration..................................................................................................................................68.15
Multiple RADIUS Server Configuration.............................................................................................................................68.16
RADIUS Server Group Configuration................................................................................................................................68.16
RADIUS Server Configuration using Server Groups..................................................................................................68.17
Chapter 69. RADIUS Commands......................................................................................69.1
Command List.............................................................................................................................................................................................69.2
Chapter 70. TACACS+ Introduction and Configuration................................................70.1
Introduction...................................................................................................................................................................................................70.2
TACACS+ Overview..............................................................................................................................................................................70.2
The AlliedWare Plus TACACS+ Implementation.........................................................................................................70.2
Authentication.....................................................................................................................................................................................70.3
Authorization........................................................................................................................................................................................70.3
Accounting.............................................................................................................................................................................................70.4
Configuration................................................................................................................................................................................................70.5
Configure TACACS+......................................................................................................................................................................70.5
TACACS+ Configuration Example.........................................................................................................................................70.7
Chapter 71. TACACS+ Commands..................................................................................71.1
Command List.............................................................................................................................................................................................71.2
Chapter 72. Local RADIUS Server Introduction and Configuration.............................72.1
Local RADIUS Server Introduction.................................................................................................................................................72.2
Enable the Local RADIUS Server.............................................................................................................................................72.2
Add the Local RADIUS Server as a RADIUS Server....................................................................................................72.3
Add authenticators to the list of authenticators..............................................................................................................72.3
Configure the Local RADIUS Server User Database...................................................................................................72.4
Authenticating login sessions.......................................................................................................................................................72.5
RADIUS Authentication with User Privileges....................................................................................................................72.5
Creating certificates for single users and all users...........................................................................................................72.7
Defined RADIUS attributes list..........................................................................................................................................................72.8
Software Reference for x900 Series Switches
xvi AlliedWare Plus
TM
Operating System - Version 5.4.2 C613-50021-01 REV B
Chapter 73. Local RADIUS Server Commands...............................................................73.1
Command List.............................................................................................................................................................................................73.2
Chapter 74. Secure Shell (SSH) Introduction..................................................................74.1
Introduction...................................................................................................................................................................................................74.2
Secure Shell on the AlliedWare Plus
OS.............................................................................................................................74.2
Configuring the SSH Server.................................................................................................................................................................74.4
Creating a Host Key.........................................................................................................................................................................74.4
Enabling the Server...........................................................................................................................................................................74.4
Modifying the Server........................................................................................................................................................................74.5
Validating the Server Configuration........................................................................................................................................74.6
Adding SSH Users.............................................................................................................................................................................74.6
Authenticating SSH Users.............................................................................................................................................................74.7
Adding a Login Banner...................................................................................................................................................................74.7
Monitoring the Server and Managing Sessions.................................................................................................................74.8
Debugging the Server......................................................................................................................................................................74.8
Configuring the SSH Client..................................................................................................................................................................74.9
Modifying the Client.........................................................................................................................................................................74.9
Adding SSH Servers......................................................................................................................................................................74.10
Authenticating with a Server....................................................................................................................................................74.10
Connecting to a Server and Running Commands.......................................................................................................74.11
Copying files to and from the Server..................................................................................................................................74.11
Debugging the Client....................................................................................................................................................................74.11
Chapter 75. Secure Shell (SSH) Configuration................................................................75.1
SSH Server Configuration Example.................................................................................................................................................75.2
Chapter 76. Secure Shell (SSH) Commands....................................................................76.1
Introduction...................................................................................................................................................................................................76.2
Command List.............................................................................................................................................................................................76.2
Chapter 77. DHCP Snooping Introduction and Configuration......................................77.1
Introduction...................................................................................................................................................................................................77.2
DHCP Snooping.........................................................................................................................................................................................77.2
DHCP Snooping Database..........................................................................................................................................................77.3
DHCP Option 82..............................................................................................................................................................................77.4
Traffic Filtering with DHCP Snooping....................................................................................................................................77.6
ARP Security.........................................................................................................................................................................................77.8
MAC Address Verification............................................................................................................................................................77.8
DHCP Snooping Violations..........................................................................................................................................................77.8
Interactions with Other Features......................................................................................................................................................77.9
Configuration.............................................................................................................................................................................................77.10
Configure DHCP Snooping......................................................................................................................................................77.10
Disabling DHCP Snooping........................................................................................................................................................77.15
Related Features..............................................................................................................................................................................77.16
Chapter 78. DHCP Snooping Commands........................................................................78.1
Command List.............................................................................................................................................................................................78.2
Software Reference for x900 Series Switches
C613-50021-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.2 xvii
Part 6 Network Availability
Chapter 79. VRRP Introduction and Configuration ........................................................79.1
Introduction...................................................................................................................................................................................................79.2
Virtual Router Redundancy Protocol.............................................................................................................................................79.3
VRRP Configuration..................................................................................................................................................................................79.4
VRRP election and preempt........................................................................................................................................................79.6
VRRP authentication........................................................................................................................................................................79.7
VRRP debugging.................................................................................................................................................................................79.8
Configuration examples.................................................................................................................................................................79.9
Chapter 80. VRRP Commands ..........................................................................................80.1
Command List.............................................................................................................................................................................................80.2
Chapter 81. EPSR Introduction and Configuration.........................................................81.1
Introduction...................................................................................................................................................................................................81.2
Ring Components and Operation...................................................................................................................................................81.2
Fault Detection and Recovery............................................................................................................................................................81.4
Fault Recovery.....................................................................................................................................................................................81.4
Restoring Normal Operation......................................................................................................................................................81.6
Managing Rings with Two Breaks.............................................................................................................................................81.7
Recovery When One Break is Restored.............................................................................................................................81.8
Configuration Examples......................................................................................................................................................................81.10
Single Domain, Single Ring Network...................................................................................................................................81.10
Single Ring, Dual Domain Network.....................................................................................................................................81.15
Interconnected Rings............................................................................................................................................................................81.16
Superloop Protection...................................................................................................................................................................81.17
EPSR Superloop Prevention.....................................................................................................................................................81.18
Configuring a Basic Superloop Protected Two Ring EPSR Network...............................................................81.21
Sample Show Output...................................................................................................................................................................81.36
Adding a new data VLAN to a functioning superloop topology........................................................................81.39
EPSR and Spanning Tree Operation....................................................................................................................................81.42
Chapter 82. EPSR Commands...........................................................................................82.1
Command List.............................................................................................................................................................................................82.2
Part 7 Network Management
Chapter 83. NTP Introduction and Configuration..........................................................83.1
Introduction...................................................................................................................................................................................................83.2
Overview........................................................................................................................................................................................................83.2
NTP on the Switch...................................................................................................................................................................................83.3
Troubleshooting..........................................................................................................................................................................................83.4
Configuration Example...........................................................................................................................................................................83.5
Chapter 84. NTP Commands............................................................................................84.1
Command List.............................................................................................................................................................................................84.2
Software Reference for x900 Series Switches
xviii AlliedWare Plus
TM
Operating System - Version 5.4.2 C613-50021-01 REV B
Chapter 85. Dynamic Host Configuration Protocol (DHCP) Introduction..................85.1
Introduction...................................................................................................................................................................................................85.2
BOOTP...................................................................................................................................................................................................85.2
DHCP.......................................................................................................................................................................................................85.2
DHCP Relay Agents.........................................................................................................................................................................85.2
Configuring the DHCP Server............................................................................................................................................................85.3
Create the Pool..................................................................................................................................................................................85.3
Define the Network.........................................................................................................................................................................85.3
Define the Range...............................................................................................................................................................................85.4
Set the Lease........................................................................................................................................................................................85.4
Enable DHCP Leasequery............................................................................................................................................................85.5
Set the Options..................................................................................................................................................................................85.6
DHCP Lease Probing......................................................................................................................................................................85.7
DHCP Relay Agent Introduction......................................................................................................................................................85.8
Configuring the DHCP Relay Agent.......................................................................................................................................85.8
DHCP Relay Agent Option 82..................................................................................................................................................85.9
Configuring the DHCP Client..........................................................................................................................................................85.12
Clearing Dynamically Allocated Lease Bindings.....................................................................................................................85.12
Chapter 86. Dynamic Host Configuration Protocol (DHCP) Commands....................86.1
Command List.............................................................................................................................................................................................86.2
Chapter 87. SNMP Introduction........................................................................................87.1
Introduction...................................................................................................................................................................................................87.2
Network Management Framework.................................................................................................................................................87.2
Structure of Management Information..........................................................................................................................................87.4
Names......................................................................................................................................................................................................87.5
Instances..................................................................................................................................................................................................87.6
Syntax.......................................................................................................................................................................................................87.6
Access.......................................................................................................................................................................................................87.6
Status.........................................................................................................................................................................................................87.7
Description............................................................................................................................................................................................87.7
The SNMP Protocol.................................................................................................................................................................................87.8
SNMP Versions...................................................................................................................................................................................87.8
SNMP Messages.................................................................................................................................................................................87.9
Polling versus Event Notification...............................................................................................................................................87.9
Message Format for SNMPv1 and SNMPv2c.................................................................................................................87.10
SNMP Communities (Version v1 and v2c)......................................................................................................................87.11
SNMPv3 Entities..............................................................................................................................................................................87.11
SNMPv3 Message Protocol Format.....................................................................................................................................87.12
SNMPv1 and SNMPv2c......................................................................................................................................................................87.13
SNMP MIB Views for SNMPv1 and SNMPv2c..............................................................................................................87.13
SNMP Communities.....................................................................................................................................................................87.13
Configuration Example (SNMPv1 and v2).......................................................................................................................87.15
SNMPv3.......................................................................................................................................................................................................87.19
SNMP MIB Views for SNMPv3...............................................................................................................................................87.19
SNMP Groups..................................................................................................................................................................................87.19
SNMP Users......................................................................................................................................................................................87.19
SNMP Target Addresses............................................................................................................................................................87.19
SNMP Target Params...................................................................................................................................................................87.19
Configuration Example (SNMPv3).......................................................................................................................................87.20
Using SNMP to Manage Files and Software............................................................................................................................87.21
Copy a File to or from a TFTP Server................................................................................................................................87.21
Upgrade Software and Configuration Files.......................................................................................
...............................87.23
Software Reference for x900 Series Switches
C613-50021-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.2 xix
Chapter 88. SNMP Commands .........................................................................................88.1
Command List.............................................................................................................................................................................................88.2
Chapter 89. SNMP MIBs.....................................................................................................89.1
Introduction...................................................................................................................................................................................................89.2
About MIBs............................................................................................................................................................................................89.2
About SNMP........................................................................................................................................................................................89.2
Obtaining MIBs....................................................................................................................................................................................89.2
Loading MIBs........................................................................................................................................................................................89.3
Allied Telesis Enterprise MIB...............................................................................................................................................................89.5
AT-SMI-MIB..........................................................................................................................................................................................89.6
AT-PRODUCT-MIB.........................................................................................................................................................................89.9
AT-BOARDS-MIB..........................................................................................................................................................................89.11
AT-SYSINFO-MIB..........................................................................................................................................................................89.14
AT-XEM-MIB.....................................................................................................................................................................................89.16
AT-ENVMONv2-MIB...................................................................................................................................................................89.17
AT-VCSTACK-MIB........................................................................................................................................................................89.22
AT-MIBVERSION-MIB.................................................................................................................................................................89.26
AT-USER-MIB...................................................................................................................................................................................89.27
AT-RESOURCE-MIB.....................................................................................................................................................................89.29
AT-LICENSE-MIB............................................................................................................................................................................89.30
AT-TRIGGER-MIB..........................................................................................................................................................................89.33
AT-LOOPPROTECT-MIB.........................................................................................................................................................89.35
AT-SETUP-MIB................................................................................................................................................................................89.37
AT-DNS-CLIENT-MIB.................................................................................................................................................................89.47
AT-NTP-MIB.....................................................................................................................................................................................89.48
AT-EPSRv2-MIB...............................................................................................................................................................................89.51
AT-DHCPSN-MIB..........................................................................................................................................................................89.53
AT-FILEv2-MIB.................................................................................................................................................................................89.56
AT-LOG-MIB....................................................................................................................................................................................89.62
AT-IP-MIB............................................................................................................................................................................................89.64
Public MIBs..................................................................................................................................................................................................89.66
Private MIBs................................................................................................................................................................................................89.70
Chapter 90. LLDP Introduction and Configuration ........................................................90.1
Introduction...................................................................................................................................................................................................90.2
Link Layer Discovery Protocol...........................................................................................................................................................90.2
LLDP-MED....................................................................................................................................................................................................90.3
Voice VLAN..................................................................................................................................................................................................90.3
LLDP Advertisements.............................................................................................................................................................................90.4
Type-Length-Value (TLV).............................................................................................................................................................90.4
LLDP-MED: Location Identification TLV..............................................................................................................................90.7
Transmission and Reception................................................................................................................................................................90.8
LLDP-MED Operation....................................................................................................................................................................90.9
Storing LLDP Information..................................................................................................................................................................90.10
Configuring LLDP....................................................................................................................................................................................90.11
Configure LLDP...............................................................................................................................................................................90.12
Configure LLDP-MED..................................................................................................................................................................90.14
Configure Authentication for Voice VLAN.....................................................................................................................90.18
Chapter 91. LLDP Commands ..........................................................................................91.1
Introduction...................................................................................................................................................................................................91.2
Command List.............................................................................................................................................................................................91.2
Software Reference for x900 Series Switches
xx AlliedWare Plus
TM
Operating System - Version 5.4.2 C613-50021-01 REV B
Chapter 92. SMTP Commands..........................................................................................92.1
Command List.............................................................................................................................................................................................92.2
Chapter 93. RMON Introduction and Configuration ......................................................93.1
Introduction...................................................................................................................................................................................................93.2
Overview........................................................................................................................................................................................................93.2
RMON Configuration Example.........................................................................................................................................................93.3
Chapter 94. RMON Commands........................................................................................94.1
Command List.............................................................................................................................................................................................94.2
Chapter 95. Triggers Introduction....................................................................................95.1
Introduction...................................................................................................................................................................................................95.2
Trigger Facility..............................................................................................................................................................................................95.2
Configuring a Trigger...............................................................................................................................................................................95.2
Troubleshooting Triggers......................................................................................................................................................................95.5
Chapter 96. Triggers Configuration..................................................................................96.1
Introduction...................................................................................................................................................................................................96.2
Restrict Internet Access..........................................................................................................................................................................96.2
Capture Unusual CPU and RAM Activity....................................................................................................................................96.4
See Daily Statistics.....................................................................................................................................................................................96.6
Turn Off Power to Port LEDs............................................................................................................................................................96.7
Capture Show Output and Save to a SD Card.......................................................................................................................96.9
Load a Release File From a SD Card..........................................................................................................................................96.10
Chapter 97. Trigger Commands .......................................................................................97.1
Command List.............................................................................................................................................................................................97.2
Chapter 98. Ping Polling Introduction and Configuration..............................................98.1
Introduction...................................................................................................................................................................................................98.2
How Ping Polling Works........................................................................................................................................................................98.2
Configuring Ping Polling..........................................................................................................................................................................98.4
Creating a Polling Instance............................................................................................................................................................98.4
Customizing a Polling Instance...................................................................................................................................................98.5
Troubleshooting Ping Polling.......................................................................................................................................................98.6
Interaction with Other Protocols.....................................................................................................................................................98.7
Chapter 99. Ping-Polling Commands................................................................................99.1
Command List.............................................................................................................................................................................................99.2
Chapter 100. sFlow Introduction and Configuration ....................................................100.1
sFlow Introduction..................................................................................................................................................................................100.2
The sFlow Agent.....................................................................................................................................................................................100.3
Sampling Methods..........................................................................................................................................................................100.3
The sFlow Collector..............................................................................................................................................................................100.5
Configuring sFlow on your Switch................................................................................................................................................100.6
Configuration Procedure............................................................................................................................................................100.7
Configuration Examples..............................................................................................................................................................100.8
sFlow Datagrams..................................................................................................................................................................................100.13
/