GS924MPX

Allied Telesis GS924MPX, GS924MX, GS948MPX, GS948MX User manual

  • Hello! I am an AI chatbot trained to assist you with the Allied Telesis GS924MPX User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Software Reference for GS900MX/MPX Series
Switches
AlliedWare Plus
Operating System
Version 5.4.4E-1.x
C613-50065-01 REV B
AT-GS924MX
AT-GS924MPX
AT-GS948MX
AT-GS948MPX
Software Reference for GS900MX/MPX Series Switches
ii AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x C613-50065-01 REV B
Acknowledgments
This product includes software developed by the University of California, Berkeley and its
contributors.
Copyright
©1982, 1986, 1990, 1991, 1993 The Regents of the University of California.
All rights reserved.
This product includes software developed by the OpenSSL Project for use in the OpenSSL
Toolkit. For information about this see www.openssl.org/
Copyright
©1998-2008 The OpenSSL Project. All rights reserved.
This product includes software licensed under the GNU General Public License available
from: www.gnu.org/licenses/gpl2.html
Source code for all GPL licensed software in this product can be obtained from the Allied
Telesis GPL Code Download Center at: www.alliedtelesis.com/support/default.aspx
Allied Telesis is committed to meeting the requirements of the open source licenses
including the GNU General Public License (GPL) and will make all required source code
available.
If you would like a copy of the GPL source code contained in Allied Telesis products, please
send us a request by registered mail including a check for US$15 to cover production and
shipping costs and a CD with the GPL code will be mailed to you.
GPL Code Request
Allied Telesis Labs (Ltd)
PO Box 8011
Christchurch
New Zealand
©2015 Allied Telesis Inc. All rights reserved.
This documentation is subject to change without notice. No part of this publication may
be reproduced, stored in a retrieval system, or transmitted in any form or any means
electronic or mechanical, including photocopying and recording for any purpose other
than the purchasers internal use without the written permission of Allied Telesis, Inc.
Allied Telesis, AlliedWare Plus, EPSRing, SwitchBlade, and VCStack are trademarks or
registered trademarks in the United States and elsewhere of Allied Telesis, Inc. Adobe,
Acrobat, and Reader are either registered trademarks or trademarks of Adobe Systems
Incorporated in the United States and/or other countries. Additional brands, names and
products mentioned herein may be trademarks of their respective companies.
Getting the most from this manual
Although you can view this document using Acrobat version 5, to get the best from this
manual, we recommend using Adobe Acrobat Reader version 8 or later. You can download
Acrobat free from www.adobe.com/
Software Reference for GS900MX/MPX Series Switches
C613-50065-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x iii
Table of Contents
Part 1: Setting up the Switch
Chapter 1: Getting Started
Introduction...................................................................................................................................................................... 1.2
How to Login.................................................................................................................................................................... 1.2
How to Get Command Help ....................................................................................................................................... 1.3
Viewing a List of Valid Parameters .................................................................................................................... 1.3
Completing Keywords ........................................................................................................................................... 1.5
Viewing Command Error Messages .................................................................................................................. 1.6
How to Work with Command Modes...................................................................................................................... 1.7
Entering Privileged Exec Commands when in a Configuration Mode................................................. 1.9
How to See the Current Configuration................................................................................................................. 1.10
Default Settings.............................................................................................................................................................1.11
The Default Configuration......................................................................................................................................... 1.12
How to Change the Password..................................................................................................................................1.13
How to Set Strong Passwords..................................................................................................................................1.14
How to Set an IP Address on VLAN 1.....................................................................................................................1.16
How to Save and Boot from the Current Configuration.................................................................................1.17
How to Save to the Default Configuration File...........................................................................................1.17
How to Create and Use a New Configuration File .....................................................................................1.17
How to Return to the Factory Defaults.................................................................................................................1.19
How to See System Information .............................................................................................................................1.20
Viewing Overall System Information..............................................................................................................1.20
Viewing Voltage, Fan Status, and Temperature .........................................................................................1.20
Viewing the Serial Number ................................................................................................................................ 1.21
How to Set System Parameters ...............................................................................................................................1.22
How to Change the Telnet Session Timeout ............................................................................................... 1.22
How to Name the Switch....................................................................................................................................1.23
How to Display a Text Banner at Login.......................................................................................................... 1.24
How to Set the Time and Date................................................................................................................................. 1.25
How to Show Current Settings .........................................................................................................................1.25
How to Set the Time and Date..........................................................................................................................1.25
How to Set the Timezone ................................................................................................................................... 1.26
How to Configure Summer-Time.....................................................................................................................1.26
How to Add and Remove Users...............................................................................................................................1.27
Pre-Encrypted Passwords ................................................................................................................................... 1.28
How to Undo Settings.................................................................................................................................................1.30
How to Use the no Parameter ...........................................................................................................................1.30
How to Use the default Parameter .................................................................................................................. 1.30
How to Upgrade the Firmware................................................................................................................................ 1.31
Save Power with the Eco-Friendly Feature..........................................................................................................1.32
The Eco-Friendly LED Feature ...........................................................................................................................1.32
The Eco-Friendly LPI Feature.............................................................................................................................1.32
Trouble-shoot Fiber and Pluggable Issues..........................................................................................................1.33
Using the Find Me feature.........................................................................................................................................1.34
Controlling “show” Command Output.................................................................................................................1.35
Software Reference for GS900MX/MPX Series Switches
iv AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x C613-50065-01 REV B
Chapter 2: Command Syntax Conventions in this Software Reference
Chapter 3: Start-Up Sequence
AlliedWare Plus Start-Up.............................................................................................................................................. 3.2
Diagnostic Menu............................................................................................................................................................. 3.3
Bootloader Menu............................................................................................................................................................ 3.4
Start-Up Sequence .......................................................................................................................................................3.10
Chapter 4: CLI Navigation Commands
Command List.................................................................................................................................................................. 4.2
Chapter 5: User Access Commands
Introduction...................................................................................................................................................................... 5.2
Command List.................................................................................................................................................................. 5.2
Using plain passwords........................................................................................................................................... 5.5
Using encrypted passwords ................................................................................................................................ 5.5
Using hidden passwords....................................................................................................................................... 5.6
Using plain passwords........................................................................................................................................... 5.8
Using encrypted passwords ................................................................................................................................ 5.8
Using hidden passwords....................................................................................................................................... 5.9
Chapter 6: Creating and Managing Files
Introduction...................................................................................................................................................................... 6.2
USB Support ..................................................................................................................................................................... 6.2
Working with Files.......................................................................................................................................................... 6.2
Listing Files................................................................................................................................................................. 6.3
Displaying the Contents of Configuration and Text Files ......................................................................... 6.4
Navigating Through the File System ................................................................................................................ 6.4
Using the Editor........................................................................................................................................................ 6.6
Creating and Using Configuration Files ................................................................................................................. 6.8
Creating a Configuration File .............................................................................................................................. 6.8
Specifying the Start-Up Configuration Script................................................................................................ 6.8
Working with Configuration Files...................................................................................................................... 6.9
The Configuration File Fallback Order ...........................................................................................................6.10
Copying Files to and from Your Device................................................................................................................6.12
URL Syntax ...............................................................................................................................................................6.12
Copying Files...........................................................................................................................................................6.13
Copying from a Server to Running Configuration.....................................................................................6.17
The Autoboot Feature ................................................................................................................................................ 6.19
Restoring a Switch Using Autoboot from External Media ......................................................................6.20
Configure Autoboot ............................................................................................................................................. 6.22
Chapter 7: File Management Commands
Introduction...................................................................................................................................................................... 7.3
URL Syntax and Keyword Usage ........................................................................................................................ 7.3
Command List.................................................................................................................................................................. 7.5
Chapter 8: System Configuration and Monitoring Commands
Command List.................................................................................................................................................................. 8.2
Software Reference for GS900MX/MPX Series Switches
C613-50065-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x v
Chapter 9: Debugging and Logging
Introduction...................................................................................................................................................................... 9.2
Debugging........................................................................................................................................................................ 9.2
Logging to a Terminal............................................................................................................................................ 9.2
Turning Off Debugging......................................................................................................................................... 9.3
Logging .............................................................................................................................................................................. 9.3
Log Outputs............................................................................................................................................................... 9.4
Chapter 10: Logging Commands
Command List................................................................................................................................................................ 10.2
Chapter 11: Scripting Commands
Command List................................................................................................................................................................ 11.2
Chapter 12: Interface Commands
Command List................................................................................................................................................................ 12.2
Chapter 13: Interface Testing Commands
Command List................................................................................................................................................................ 13.2
Part 2: Layer Two Switching
Chapter 14: Switching Introduction
Introduction....................................................................................................................................................................14.2
Physical Layer Information........................................................................................................................................14.3
Switch Ports .............................................................................................................................................................14.3
Activating and Deactivating Switch Ports ....................................................................................................14.4
Autonegotiation.....................................................................................................................................................14.4
Duplex Mode...........................................................................................................................................................14.4
Speed Options ........................................................................................................................................................14.4
MDI/MDIX Connection Modes..........................................................................................................................14.5
The Layer 2 Switching Process.................................................................................................................................14.7
The Ingress Rules ................................................................................................................................................... 14.7
The Learning Process ...........................................................................................................................................14.8
The Forwarding Process......................................................................................................................................14.9
The Egress Rules.....................................................................................................................................................14.9
Layer 2 Filtering...........................................................................................................................................................14.11
Ingress Filtering....................................................................................................................................................14.11
Storm Control...............................................................................................................................................................14.12
Loop Protection...........................................................................................................................................................14.13
Loop Detection ....................................................................................................................................................14.13
Thrash Limiting.....................................................................................................................................................14.14
Support for Jumbo Frames .....................................................................................................................................14.16
Port Mirroring...............................................................................................................................................................14.17
Port Security .................................................................................................................................................................14.18
IEEE 802.1X.............................................................................................................................................................14.18
Static MAC Address.............................................................................................................................................14.18
Quality of Service........................................................................................................................................................14.19
IGMP Snooping............................................................................................................................................................14.20
Software Reference for GS900MX/MPX Series Switches
vi AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x C613-50065-01 REV B
Chapter 15: Switching Commands
Command List................................................................................................................................................................ 15.2
Chapter 16: VLAN Introduction
VLANs Introduction...................................................................................................................................................... 16.2
Virtual LANs (VLANs)....................................................................................................................................................16.2
Configuring VLANs................................................................................................................................................ 16.3
Private VLANs.................................................................................................................................................................16.5
Private VLANs for Ports in Access Mode........................................................................................................16.5
Private VLAN Operation with Ports in Access Mode.................................................................................16.7
Access Mode Private VLAN Configuration Example ................................................................................. 16.8
Private VLANs for Trunked Ports ....................................................................................................................16.11
Trunked Port Private VLAN Configuration Example ...............................................................................16.12
Protocol Based VLAN Configuration Example ..........................................................................................16.16
Chapter 17: VLAN Commands
Command List................................................................................................................................................................ 17.2
Chapter 18: Spanning Tree Introduction: STP, RSTP, and MSTP
Introduction....................................................................................................................................................................18.2
Overview of Spanning Trees.....................................................................................................................................18.2
Spanning Tree Operation ................................................................................................................................... 18.2
Spanning Tree Modes .......................................................................................................................................... 18.4
Spanning Tree Protocol (STP)................................................................................................................................... 18.5
Configuring STP ............................................................................................................................................................18.6
Rapid Spanning Tree Protocol (RSTP) ...................................................................................................................18.8
Configuring RSTP.......................................................................................................................................................... 18.9
Multiple Spanning Tree Protocol (MSTP)...........................................................................................................18.11
Multiple Spanning Tree Instances (MSTI)....................................................................................................18.12
MSTP Regions........................................................................................................................................................18.13
Common and Internal Spanning Tree (CIST).............................................................................................18.15
MSTP Bridge Protocol Data Units (BPDUs) .................................................................................................18.17
Configuring MSTP.......................................................................................................................................................18.19
Chapter 19: Spanning Tree Commands
Command List................................................................................................................................................................ 19.3
Chapter 20: Link Aggregation Introduction and Configuration
Introduction and Overview.......................................................................................................................................20.2
Static and Dynamic (LACP) Link Aggregation....................................................................................................20.3
Static Channel Groups .........................................................................................................................................20.3
Dynamic (LACP) Channel Groups .................................................................................................................... 20.3
Link Aggregation Control Protocol (LACP)...................................................................................................20.3
Configuring an LACP Channel Group....................................................................................................................20.5
Minimal LACP Group Configuration ...............................................................................................................20.8
Configuring a Static Channel Group......................................................................................................................20.9
Chapter 21: Link Aggregation Commands
Introduction....................................................................................................................................................................21.2
Command List................................................................................................................................................................ 21.3
Software Reference for GS900MX/MPX Series Switches
C613-50065-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x vii
Chapter 22: Power over Ethernet Introduction
Introduction....................................................................................................................................................................22.2
PoE Standards.........................................................................................................................................................22.2
PoE (all standards) .................................................................................................................................................22.3
PoE (IEEE 802.3af)...................................................................................................................................................22.3
Enhanced PoE .........................................................................................................................................................22.3
PoE+ (IEEE 802.3at)................................................................................................................................................22.3
Differences Between PoE and PoE+................................................................................................................22.5
LLDP-MED (TIA-1057) with PoE+ (IEEE 802.3at)..........................................................................................22.5
PoE and PoE+ Applications................................................................................................................................22.5
Power Device (PD) Discovery ............................................................................................................................22.5
Power Classes..........................................................................................................................................................22.6
Power through the Cable ...................................................................................................................................22.7
Cable Types.............................................................................................................................................................. 22.8
Static and Automatic Power Allocation.........................................................................................................22.8
PoE and PoE+ Implementation ...............................................................................................................................22.9
Power Capacity.......................................................................................................................................................22.9
PoE Port Allocation and Distribution.............................................................................................................. 22.9
Power Threshold....................................................................................................................................................22.9
Negotiating Power Requirements.................................................................................................................22.10
PoE Port Management.......................................................................................................................................22.10
Powered Device (PD) Detection.....................................................................................................................22.10
Port Prioritization.................................................................................................................................................22.10
Software Monitoring ..........................................................................................................................................22.12
PoE and PoE+ Configuration..................................................................................................................................22.13
Add a Description for a PoE or PoE+ Port ...................................................................................................22.13
Configuring Capacity and Priority on a PoE or PoE+ Port.....................................................................22.14
Remotely Monitoring Power for all Connected PDs ...............................................................................22.15
Chapter 23: Power over Ethernet Commands
Introduction....................................................................................................................................................................23.2
Command List................................................................................................................................................................23.2
Part 3: IP and IPv6
Chapter 24: Internet Protocol (IP) Addressing and Protocols
Introduction....................................................................................................................................................................24.2
Address Resolution Protocol (ARP) ........................................................................................................................ 24.3
Static ARP Entries...................................................................................................................................................24.3
Timing Out ARP Entries ....................................................................................................................................... 24.3
Deleting ARP Entries.............................................................................................................................................24.4
ARP Logging............................................................................................................................................................ 24.5
DNS Client .......................................................................................................................................................................24.6
Internet Control Message Protocol (ICMP)..........................................................................................................24.8
Checking IP Connections...........................................................................................................................................24.9
Ping.............................................................................................................................................................................24.9
Traceroute ................................................................................................................................................................ 24.9
Chapter 25: IP Addressing and Protocol Commands
Introduction....................................................................................................................................................................25.2
Command List................................................................................................................................................................25.3
Software Reference for GS900MX/MPX Series Switches
viii AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x C613-50065-01 REV B
Chapter 26: IPv6 Introduction
Introduction....................................................................................................................................................................26.2
Overview..........................................................................................................................................................................26.2
IPv6 Addresses and Prefixes .....................................................................................................................................26.3
Address Types.........................................................................................................................................................26.3
IPv6 Headers............................................................................................................................................................26.4
The Internet Control Message Protocol (ICMPv6)...................................................................................... 26.7
IPv6 Routing ..........................................................................................................................................................26.10
Integration of IPv4 and IPv6 ............................................................................................................................26.10
IPv6 on your Switch ...................................................................................................................................................26.11
Enabling IPv6.........................................................................................................................................................26.11
IPv6 Stateless Address Autoconfiguration (SLAAC)................................................................................26.11
IPv6 EUI-64 Addressing......................................................................................................................................26.11
IPv6 Link-local Addresses..................................................................................................................................26.12
Chapter 27: IPv6 Commands
Command List................................................................................................................................................................ 27.2
Chapter 28: Route Selection
Introduction....................................................................................................................................................................28.2
Types of Routes .............................................................................................................................................................28.2
Interface Routes .....................................................................................................................................................28.2
Static Routes............................................................................................................................................................28.2
RIP Routes.................................................................................................................................................................28.3
RIB and FIB Routing Tables........................................................................................................................................28.4
Understanding the Routing Information Base (RIB).................................................................................. 28.4
Administrative Distance...................................................................................................................................... 28.5
Metric .........................................................................................................................................................................28.6
Equal Cost Multipath Routing...........................................................................................................................28.7
How AlliedWare Plus Deletes Routes ............................................................................................................. 28.7
How AlliedWare Plus Adds Routes ..................................................................................................................28.8
Troubleshooting Routes not Installed in the RIB .......................................................................................28.9
Troubleshooting Routes not Installed in the FIB........................................................................................28.9
Chapter 29: Routing Commands
Introduction....................................................................................................................................................................29.2
Command List................................................................................................................................................................29.3
Chapter 30: RIP Configuration
Introduction....................................................................................................................................................................30.2
Enabling RIP.................................................................................................................................................................... 30.2
Specifying the RIP Version......................................................................................................................................... 30.4
RIPv2 Authentication (Single Key).......................................................................................................................... 30.6
RIPv2 Text Authentication (Multiple Keys)..........................................................................................................30.8
RIPv2 md5 authentication (Multiple Keys) ........................................................................................................30.12
Chapter 31: RIP Commands
Introduction....................................................................................................................................................................31.2
Command List................................................................................................................................................................31.3
Software Reference for GS900MX/MPX Series Switches
C613-50065-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x ix
Part 4: Multicast Applications
Chapter 32: IGMP Snooping Introduction
Introduction....................................................................................................................................................................32.2
IGMP ..................................................................................................................................................................................32.3
Joining a Multicast Group (Membership Report)....................................................................................... 32.4
Staying in the Multicast Group (Query Message) ......................................................................................32.4
Leaving the Multicast Group (Leave Message)...........................................................................................32.4
IGMP Snooping..............................................................................................................................................................32.5
How IGMP Snooping Operates.........................................................................................................................32.5
IGMP Snooping and Querier Configuration Example ..............................................................................32.6
Query Solicitation .........................................................................................................................................................32.9
How Query Solicitation Works ..........................................................................................................................32.9
Query Solicitation Operation............................................................................................................................. 32.9
Speeding up IGMP Convergence in a Non-Looped Topology............................................................32.12
Enabling Query Solicitation on Multiple Switches in a Looped Topology .....................................32.12
Chapter 33: IGMP Snooping Commands
Introduction....................................................................................................................................................................33.2
Command List................................................................................................................................................................33.2
Chapter 34: MLD Snooping Introduction and Configuration
Introduction....................................................................................................................................................................34.2
MLD Snooping........................................................................................................................................................ 34.2
Chapter 35: MLD Snooping Commands
Command List................................................................................................................................................................ 35.2
Part 5: Access and Security
Chapter 36: Access Control Lists Introduction
Introduction....................................................................................................................................................................36.2
Overview...................................................................................................................................................................36.2
ACL Rules ..................................................................................................................................................................36.3
ACL Source and Destination Addresses ........................................................................................................36.3
ACL Reverse Masking ...........................................................................................................................................36.3
Hardware and Software ACL Types........................................................................................................................36.4
Defining Hardware MAC ACLs ..........................................................................................................................36.5
Defining Hardware IP ACLs ................................................................................................................................36.6
Actions for Hardware ACLs.................................................................................................................................36.7
Attaching Hardware ACLs to Interfaces ........................................................................................................36.7
Hardware ACLs and QoS Classifications...............................................................................................................36.8
Classifying Your Traffic.........................................................................................................................................36.8
Security ACLs...........................................................................................................................................................36.8
QoS ACLs...................................................................................................................................................................36.9
Attaching Hardware ACLs Using QoS ............................................................................................................36.9
Filtering Hardware ACLs with QoS ................................................................................................................36.11
Using QoS Match Commands with TCP Flags...........................................................................................36.11
ACL Filter Sequence Numbers ...............................................................................................................................36.14
ACL Filter Sequence Number Behavior .......................................................................................................36.14
ACL Filter Sequence Number Applicability................................................................................................36.14
Software Reference for GS900MX/MPX Series Switches
xAlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x C613-50065-01 REV B
ACL Filter Sequence Number Types .............................................................................................................36.15
ACL Filter Sequence Configuration......................................................................................................................36.18
Creating ACLs in Global Configuration Mode...........................................................................................36.20
Display the ACL configuration details..........................................................................................................36.22
Chapter 37: IPv4 Hardware Access Control List (ACL) Commands
Introduction....................................................................................................................................................................37.2
IPv4 Hardware Access List Commands and Prompts ...................................................................................... 37.3
Command List................................................................................................................................................................ 37.4
Chapter 38: IPv4 Software Access Control List (ACL) Commands
Introduction....................................................................................................................................................................38.2
IPv4 Software Access List Commands and Prompts........................................................................................38.3
Command List................................................................................................................................................................ 38.4
Chapter 39: IPv6 Software Access Control List (ACL) Commands
Introduction....................................................................................................................................................................39.2
IPv6 Software Access List Commands and Prompts........................................................................................39.3
Command List................................................................................................................................................................ 39.4
Chapter 40: Quality of Service (QoS) Introduction
Introduction....................................................................................................................................................................40.2
QoS Operations ......................................................................................................................................................40.2
QoS Packet Information .............................................................................................................................................40.3
Link Layer QoS ........................................................................................................................................................ 40.3
Differentiated Services Architecture...............................................................................................................40.4
The Differential Services Field...........................................................................................................................40.5
Processing Pre-Marked Packets........................................................................................................................40.6
Applying QoS on Your Switch..................................................................................................................................40.7
Classifying Your Data ..................................................................................................................................................40.7
Class Maps ................................................................................................................................................................ 40.7
Policy Maps ............................................................................................................................................................40.10
Premarking and Remarking Your Traffic ............................................................................................................40.11
CoS to Egress Queue Premarking ..................................................................................................................40.11
DSCP to Egress Queue Premarking...............................................................................................................40.13
Policing (Metering) Your Data................................................................................................................................40.15
Single-Rate Three-Color Policing ...................................................................................................................40.15
Two-Rate Three-Color Policing.......................................................................................................................40.16
Configuring and Applying a Policer..............................................................................................................40.17
Remarking Your Data ................................................................................................................................................40.18
Configuring the Egress Queues.............................................................................................................................40.19
Egress Queues and QoS markers ...................................................................................................................40.19
Egress Queue Commands Hierarchy ............................................................................................................40.19
Egress Queue Shaping..............................................................................................................................................40.21
Scheduling .............................................................................................................................................................40.21
Drop Mode .............................................................................................................................................................40.22
Storm Protection.........................................................................................................................................................40.24
Chapter 41: QoS Commands
Command List................................................................................................................................................................ 41.2
Software Reference for GS900MX/MPX Series Switches
C613-50065-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x xi
Chapter 42: Authentication Introduction and Configuration
Authentication Introduction ....................................................................................................................................42.2
Configuring a Guest VLAN..................................................................................................................................42.2
802.1X-Authentication ...............................................................................................................................................42.3
Web-Authentication....................................................................................................................................................42.4
What is Web-Authentication? ...........................................................................................................................42.4
Web-Authentication Basics................................................................................................................................42.4
Configuring Web-Authentication....................................................................................................................42.6
Starting a Web-Authentication Session ........................................................................................................ 42.8
Configuring an External Login Page.............................................................................................................42.10
Customizing Web-Authentication Login Page .........................................................................................42.13
Support for Protocols Underlying Web-Authentication .......................................................................42.15
Web-Authentication Timeout Connect .......................................................................................................42.20
Web Authorization Proxy..................................................................................................................................42.21
MAC-Authentication..................................................................................................................................................42.22
Why is MAC-Authentication Required? .......................................................................................................42.22
How Does MAC-Authentication Work? .......................................................................................................42.22
Configuring MAC-Authentication .................................................................................................................42.23
Tri-Authentication......................................................................................................................................................42.24
Tri-Authentication Configuration.........................................................................................................................42.25
Two-Step Authentication ........................................................................................................................................42.27
Ensuring Authentication Methods Require Different Usernames and Passwords .............................42.28
Roaming Authentication .........................................................................................................................................42.29
Roaming Authentication Overview ..............................................................................................................42.30
Roaming Authentication Feature Interactions .........................................................................................42.31
Unauthenticated Supplicant Traffic.....................................................................................................................42.32
Deciding When a Supplicant Fails Authentication..................................................................................42.34
Failed Authentication VLAN ............................................................................................................................42.35
Limitations on Allowed Feature Combinations........................................................................................42.35
Chapter 43: Authentication Commands
Command List................................................................................................................................................................ 43.3
Chapter 44: AAA Introduction and Configuration
AAA Introduction..........................................................................................................................................................44.2
Available Functions and Server Types ........................................................................................................... 44.2
Server Groups and Method Lists......................................................................................................................44.3
Configuring AAA Login Authentication ...............................................................................................................44.5
AAA Configuration Tasks ....................................................................................................................................44.5
Sample Authentication Configurations................................................................................................................44.7
Sample 802.1X-Authentication Configuration ........................................................................................... 44.7
Sample MAC-Authentication Configuration ...............................................................................................44.8
Sample Web-Authentication Configuration........................................................................................
........ 44.9
Sample Tri-Authentication Configuration..................................................................................................44.10
Chapter 45: AAA Commands
Command List................................................................................................................................................................ 45.2
Chapter 46: 802.1X Introduction and Configuration
Introduction....................................................................................................................................................................46.2
802.1X System Components .............................................................................................................................46.2
The 802.1X Implementation .....................................................................................................................................46.5
Configuring 802.1X ......................................................................................................................................................46.6
Software Reference for GS900MX/MPX Series Switches
xii AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x C613-50065-01 REV B
Chapter 47: 802.1X Commands
Command List................................................................................................................................................................ 47.2
Chapter 48: RADIUS Introduction and Configuration
Introduction....................................................................................................................................................................48.2
RADIUS Packets ...................................................................................................................................................... 48.3
RADIUS Attributes .................................................................................................................................................48.4
RADIUS Security .....................................................................................................................................................48.5
RADIUS Proxy .......................................................................................................................................................... 48.6
RADIUS Accounting .............................................................................................................................................. 48.7
RADIUS Configuration ................................................................................................................................................ 48.9
Switch Configuration Tasks................................................................................................................................48.9
Switch to RADIUS Server Communication .................................................................................................48.10
AAA Server Groups Configuration.................................................................................................................48.12
RADIUS Configuration Examples ..........................................................................................................................48.15
RADIUS Authentication .....................................................................................................................................48.15
Single RADIUS Server Configuration ............................................................................................................48.16
Multiple RADIUS Server Configuration ........................................................................................................48.17
RADIUS Server Group Configuration............................................................................................................48.17
RADIUS Server Configuration using Server Groups ................................................................................48.18
Chapter 49: RADIUS Commands
Command List................................................................................................................................................................ 49.2
Chapter 50: TACACS+ Introduction and Configuration
Introduction....................................................................................................................................................................50.2
TACACS+ Overview......................................................................................................................................................50.2
The AlliedWare Plus TACACS+ Implementation ........................................................................................50.2
Authentication........................................................................................................................................................50.3
Authorization .......................................................................................................................................................... 50.3
Accounting...............................................................................................................................................................50.4
Configuration.................................................................................................................................................................50.5
Configure TACACS+..............................................................................................................................................50.5
TACACS+ Configuration Example ...................................................................................................................50.7
Chapter 51: TACACS+ Commands
Command List................................................................................................................................................................ 51.2
Chapter 52: Secure Shell (SSH) Introduction
Introduction....................................................................................................................................................................52.2
Secure Shell on the AlliedWare Plus
OS......................................................................................................... 52.2
Configuring the SSH Server ......................................................................................................................................52.4
Creating a Host Key............................................................................................................................................... 52.4
Enabling the Server...............................................................................................................................................52.4
Modifying the Server............................................................................................................................................52.5
Validating the Server Configuration...............................................................................................................52.6
Adding SSH Users ..................................................................................................................................................52.6
Authenticating SSH Users...................................................................................................................................52.7
Adding a Login Banner........................................................................................................................................ 52.7
Monitoring the Server and Managing Sessions..........................................................................................52.8
Debugging the Server..........................................................................................................................................52.8
Configuring the SSH Client .......................................................................................................................................52.9
Modifying the Client.............................................................................................................................................52.9
Software Reference for GS900MX/MPX Series Switches
C613-50065-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x xiii
Adding SSH Servers ............................................................................................................................................52.10
Authenticating with a Server...........................................................................................................................52.10
Connecting to a Server and Running Commands...................................................................................52.11
Copying files to and from the Server............................................................................................................52.11
Debugging the Client ........................................................................................................................................52.11
Chapter 53: Secure Shell (SSH) Configuration
SSH Server Configuration Example........................................................................................................................53.2
Chapter 54: Secure Shell (SSH) Commands
Introduction....................................................................................................................................................................54.2
Command List................................................................................................................................................................54.2
Chapter 55: DHCP Snooping Introduction and Configuration
Introduction....................................................................................................................................................................55.2
DHCP Snooping.............................................................................................................................................................55.2
DHCP Snooping Database..................................................................................................................................55.3
DHCP Relay Agent Option 82............................................................................................................................55.4
Traffic Filtering with DHCP Snooping ............................................................................................................55.6
ARP Security.............................................................................................................................................................55.8
MAC Address Verification ...................................................................................................................................55.8
DHCP Snooping Violations.................................................................................................................................55.8
Interactions with Other Features ............................................................................................................................55.9
Configuration...............................................................................................................................................................55.10
Configure DHCP Snooping...............................................................................................................................55.10
Disabling DHCP Snooping................................................................................................................................55.16
Related Features ..................................................................................................................................................55.16
Chapter 56: DHCP Snooping Commands
Command List................................................................................................................................................................ 56.2
Part 6: Network Availability
Chapter 57: EPSR Introduction and Configuration
Introduction....................................................................................................................................................................57.2
Ring Components and Operation ..........................................................................................................................57.2
Fault Detection and Recovery..................................................................................................................................57.4
Fault Recovery ........................................................................................................................................................57.4
Restoring Normal Operation .............................................................................................................................57.5
Managing Rings with Two Breaks....................................................................................................................57.6
Recovery When One Break is Restored.......................................................................................................... 57.8
Configuration Examples...........................................................................................................................................57.10
Single Domain, Single Ring Network............................................................................................................57.10
Single Ring, Dual Domain Network...............................................................................................................57.16
Interconnected Rings................................................................................................................................................57.17
Superloop Protection.........................................................................................................................................57.18
EPSR Superloop Prevention.............................................................................................................................57.19
Configuring a Basic Superloop Protected Two Ring EPSR Network..................................................57.22
Sample Show Output .........................................................................................................................................57.37
Adding a New Data VLAN to a Functioning Superloop Topology.....................................................57.41
EPSR and Spanning Tree Operation..............................................................................................................57.44
Software Reference for GS900MX/MPX Series Switches
xiv AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x C613-50065-01 REV B
Chapter 58: EPSR Commands
Command List................................................................................................................................................................ 58.2
Chapter 59: RRP Snooping Introduction and Commands
RRP Snooping Introduction ......................................................................................................................................59.2
Command List................................................................................................................................................................ 59.3
Part 7: Network Management
Chapter 60: AMF Introduction and Configuration
Introduction to AMF .................................................................................................................................................... 60.2
AMF on GS900MX/MPX Series Switches: AMF Edge........................................................................................ 60.2
AMF Supported Products and Software Versions............................................................................................. 60.2
Key Benefits of AMF .....................................................................................................................................................60.4
Unified Command-Line ....................................................................................................................................... 60.4
Configuration Backup and Recovery.............................................................................................................. 60.4
Rolling-Reboot Upgrade ..................................................................................................................................... 60.4
Node Provisioning................................................................................................................................................. 60.5
AMF Terminology and Introduction......................................................................................................................60.6
AMF Network ..........................................................................................................................................................60.6
AMF Nodes...............................................................................................................................................................60.6
Node Licensing.......................................................................................................................................................60.6
Node Interconnection..........................................................................................................................................60.7
AMF Domains..........................................................................................................................................................60.7
AMF Network Operational Concepts ....................................................................................................................60.9
Retention and Use of the ‘Manager’ Username..........................................................................................60.9
Working-Set .............................................................................................................................................................60.9
AMF Restricted Login .........................................................................................................................................60.10
Loop-Free Data Plane.........................................................................................................................................60.10
Aggregators...........................................................................................................................................................60.10
VCStacks..................................................................................................................................................................60.10
AMF External Removable Media ....................................................................................................................60.10
AMF Interaction with QoS and ACLs.............................................................................................................60.11
NTP and AMF.........................................................................................................................................................60.11
Configuring AMF.........................................................................................................................................................60.13
Verifying the AMF Network.....................................................................................................................................60.19
Configuring Multiple Nodes at the Same Time: the Unified CLI................................................................60.21
Working-Set Groups ...........................................................................................................................................60.22
Executing Commands on Working-Sets......................................................................................................60.23
Interactive Commands ......................................................................................................................................60.26
AMF Backups ................................................................................................................................................................60.27
Using External Media Storage.........................................................................................................................60.27
Performing a Manual Backup..........................................................................................................................60.28
Backing up to Remote Servers........................................................................................................................60.29
Node Recovery ............................................................................................................................................................60.31
Automatic Node Recovery ...............................................................................................................................60.31
Restoring a Node to a “Clean” State..............................................................................................................60.32
Manual Node Recovery .....................................................................................................................................60.33
Node Recovery on VCStacks............................................................................................................................60.34
AMF Safe Configuration ...........................................................................................................................................60.35
Detecting AMF Safe Configuration Operation..........................................................................................60.35
AMF Safe Configuration Procedures ............................................................................................................60.35
Undoing an AMF Safe Configuration ...........................................................................................................60.36
Software Reference for GS900MX/MPX Series Switches
C613-50065-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x xv
Rolling-Reboot Firmware Upgrade......................................................................................................................60.38
Performing a Rolling-Reboot Upgrade ........................................................................................................60.40
Node Provisioning......................................................................................................................................................60.42
Chapter 61: AMF Commands
Introduction....................................................................................................................................................................61.3
AMF on GS900MX/MPX Series Switches: AMF Edge.................................................................................61.3
AMF Naming Convention ...................................................................................................................................61.3
Chapter 62: NTP Introduction and Configuration
Introduction....................................................................................................................................................................62.2
Overview..........................................................................................................................................................................62.2
NTP on the Switch ........................................................................................................................................................ 62.3
Troubleshooting ...........................................................................................................................................................62.4
Configuration Example...............................................................................................................................................62.5
Chapter 63: NTP Commands
Command List................................................................................................................................................................ 63.2
Chapter 64: Dynamic Host Configuration Protocol (DHCP) Introduction
Introduction....................................................................................................................................................................64.2
DHCP ..........................................................................................................................................................................64.2
DHCP Relay Agents ...............................................................................................................................................64.2
Configuring the DHCP Client....................................................................................................................................64.3
DHCP Relay Agent Introduction..............................................................................................................................64.4
Configuring the DHCP Relay Agent ................................................................................................................64.4
DHCP Relay Agent Information Option (Option 82) .................................................................................64.5
Chapter 65: Dynamic Host Configuration Protocol (DHCP) Commands
Command List................................................................................................................................................................ 65.2
Chapter 66: SNMP Introduction
Introduction....................................................................................................................................................................66.2
Network Management Framework........................................................................................................................66.2
Structure of Management Information ................................................................................................................66.4
Names ........................................................................................................................................................................66.5
Instances ................................................................................................................................................................... 66.6
Syntax ........................................................................................................................................................................66.7
Access ........................................................................................................................................................................66.7
Status .........................................................................................................................................................................66.7
Description...............................................................................................................................................................66.7
The SNMP Protocol ...................................................................................................................................................... 66.8
SNMP Versions........................................................................................................................................................66.8
SNMP Messages .....................................................................................................................................................66.9
Polling versus Event Notification.....................................................................................................................66.9
Message Format for SNMPv1 and SNMPv2c..............................................................................................66.10
SNMP Communities (Version v1 and v2c) ..................................................................................................66.11
SNMPv3 Entities ...................................................................................................................................................66.11
SNMPv3 Message Protocol Format...............................................................................................................66.12
SNMPv1 and SNMPv2c .............................................................................................................................................66.13
SNMP MIB Views for SNMPv1 and SNMPv2c .............................................................................................66.13
SNMP Communities............................................................................................................................................66.13
Software Reference for GS900MX/MPX Series Switches
xvi AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x C613-50065-01 REV B
Configuration Example (SNMPv1 and v2) ..................................................................................................66.15
SNMPv3 ..........................................................................................................................................................................66.18
SNMP MIB Views for SNMPv3 ..........................................................................................................................66.18
SNMP Groups ........................................................................................................................................................66.18
SNMP Users............................................................................................................................................................66.18
Configuration Example (SNMPv3) .................................................................................................................66.19
Using SNMP to Manage Files and Software ......................................................................................................66.20
Copy a File to or from a TFTP Server.............................................................................................................66.20
Upgrade Software and Configuration Files................................................................................................66.22
Chapter 67: SNMP Commands
Command List................................................................................................................................................................ 67.2
Chapter 68: SNMP MIBs
Introduction....................................................................................................................................................................68.2
About MIBs...............................................................................................................................................................68.2
About SNMP ............................................................................................................................................................68.2
Obtaining MIBs.......................................................................................................................................................68.2
Loading MIBs...........................................................................................................................................................68.3
Allied Telesis Enterprise MIB..................................................................................................................................... 68.5
AT-ALMMON-MIB .................................................................................................................................................. 68.6
AT-ATMF-MIB ..........................................................................................................................................................68.8
AT-BOARDS-MIB...................................................................................................................................................68.13
AT-DHCPSN-MIB...................................................................................................................................................68.17
AT-DNS-CLIENT-MIB............................................................................................................................................68.20
AT-ENVMONv2-MIB.............................................................................................................................................68.21
AT-EPSRv2-MIB .....................................................................................................................................................68.29
AT-FILEv2-MIB .......................................................................................................................................................68.32
AT-IP-MIB ................................................................................................................................................................68.39
AT-LICENSE-MIB ...................................................................................................................................................68.41
AT-LOG-MIB ...........................................................................................................................................................68.44
AT-LOOPPROTECT-MIB ......................................................................................................................................68.46
AT-MIBVERSION-MIB...........................................................................................................................................68.48
AT-NTP-MIB............................................................................................................................................................68.49
AT-PRODUCTS-MIB..............................................................................................................................................68.52
AT-RESOURCE-MIB ..............................................................................................................................................68.55
AT-SETUP-MIB .......................................................................................................................................................68.57
AT-SMI-MIB.............................................................................................................................................................68.66
AT-SYSINFO-MIB...................................................................................................................................................68.68
AT-TRIGGER-MIB...................................................................................................................................................68.73
AT-USER-MIB .........................................................................................................................................................68.75
AT-VCSTACK-MIB .................................................................................................................................................68.77
Other Enterprise MIBs ...............................................................................................................................................68.82
Public MIBs....................................................................................................................................................................68.83
Chapter 69: LLDP, LLDP-MED and Voice VLAN Introduction and Configuration
Introduction....................................................................................................................................................................69.2
Link Layer Discovery Protocol..................................................................................................................................69.2
LLDP-MED........................................................................................................................................................................69.3
Voice VLAN...................................................................................................................................................................... 69.3
LLDP Advertisements..................................................................................................................................................69.4
Type-Length-Value (TLV) ....................................................................................................................................69.4
LLDP-MED: Location Identification TLV.........................................................................................................69.7
Transmission and Reception ....................................................................................................................................69.8
LLDP-MED Operation .............................................................................................................
.............................. 69.9
Software Reference for GS900MX/MPX Series Switches
C613-50065-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x xvii
Storing LLDP Information........................................................................................................................................69.10
Configuring LLDP .......................................................................................................................................................69.11
Configure LLDP.....................................................................................................................................................69.12
Configure LLDP-MED..........................................................................................................................................69.14
Configure Authentication for Voice VLAN..................................................................................................69.18
Chapter 70: LLDP Commands
Introduction....................................................................................................................................................................70.2
Command List................................................................................................................................................................70.2
Chapter 71: SMTP Commands
Command List................................................................................................................................................................ 71.2
Chapter 72: RMON Introduction and Configuration
Introduction....................................................................................................................................................................72.2
Overview..........................................................................................................................................................................72.2
RMON Configuration Example.................................................................................................................................72.3
Chapter 73: RMON Commands
Command List................................................................................................................................................................ 73.2
Chapter 74: Triggers Introduction
Introduction....................................................................................................................................................................74.2
Trigger Facility ...............................................................................................................................................................74.2
Configuring a Trigger..................................................................................................................................................74.2
Troubleshooting Triggers..........................................................................................................................................74.5
Chapter 75: Triggers Configuration
Introduction....................................................................................................................................................................75.2
Restrict Internet Access ..............................................................................................................................................75.2
Capture Unusual CPU and RAM Activity ..............................................................................................................75.4
See Daily Statistics........................................................................................................................................................75.6
Turn Off Power to Port LEDs .....................................................................................................................................75.7
Reduce Power Supplied to Ports.............................................................................................................................75.9
Capture Show Output and Save to a USB Storage Device ..........................................................................75.11
Load a Release File From a USB Storage Device..............................................................................................75.12
Chapter 76: Trigger Commands
Command List................................................................................................................................................................ 76.2
Chapter 77: Cable Fault Locator Introduction
Introduction to the Cable Fault Locator...............................................................................................................77.2
Capabilities...............................................................................................................................................................77.2
TDR Operating Principles....................................................................................................................................77.2
Using the Cable Fault Locator..................................................................................................................................77.3
Chapter 78: Cable Fault Locator Commands
Command List................................................................................................................................................................ 78.2
Software Reference for GS900MX/MPX Series Switches
xviii AlliedWare Plus
TM
Operating System - Version 5.4.4E-1.x C613-50065-01 REV B
Chapter 79: Ping Polling Introduction and Configuration
Introduction....................................................................................................................................................................79.2
How Ping Polling Works............................................................................................................................................. 79.2
Configuring Ping Polling............................................................................................................................................ 79.4
Creating a Polling Instance ................................................................................................................................79.4
Customizing a Polling Instance ........................................................................................................................79.5
Troubleshooting Ping Polling ...........................................................................................................................79.6
Interaction with Other Protocols ............................................................................................................................79.7
Chapter 80: Ping-Polling Commands
Command List................................................................................................................................................................ 80.2
Part 8: Virtual Chassis Stacking
Chapter 81: VCStack Introduction
VCStack Introduction ..................................................................................................................................................81.2
Features of Virtual Chassis Stacking ...............................................................................................................81.2
VCStack Capable Switches ................................................................................................................................. 81.3
The Physical Stack .................................................................................................................................................81.3
Two-Switch Stack Configuration......................................................................................................................81.4
Multiple Switch Stack Configuration.............................................................................................................. 81.4
Resilient Stacked Topology................................................................................................................................81.5
Stack Formation ............................................................................................................................................................ 81.9
The Role of the Stack Master .............................................................................................................................81.9
Stack Management VLAN .................................................................................................................................81.10
Stack Member Failure and Recovery ...................................................................................................................81.13
Fixed or Virtual MAC Addressing ...................................................................................................................81.13
Stack Resiliency Link...........................................................................................................................................81.14
Stack Failure Recovery .......................................................................................................................................81.15
Stack Separation and Recovery ......................................................................................................................81.16
Stack Maintenance..............................................................................................................................................81.16
Disabled Master Monitoring (DMM) ....................................................................................................................81.18
Provisioning (Stack Members) ...............................................................................................................................81.20
Provisioned Board Classes................................................................................................................................81.20
Applying Hardware Provisioning...................................................................................................................81.20
Removing Hardware Provisioning.................................................................................................................81.22
Displaying Provisioned Configurations.......................................................................................................81.23
Provisioning and Configuration Management.........................................................................................81.24
Software Version Auto Synchronization ............................................................................................................81.25
Introduction...........................................................................................................................................................81.25
How Auto Synchronization Works ................................................................................................................81.25
Chapter 82: Stacking Commands
Introduction....................................................................................................................................................................82.2
Command List................................................................................................................................................................82.3
Command List
Glossary
Part 1: Setting up the Switch
Chapter 1 Getting Started
Chapter 2 Command Syntax Conventions in this Software
Reference
Chapter 3 Start-Up Sequence
Chapter 4 CLI Navigation Commands
Chapter 5 User Access Commands
Chapter 6 Creating and Managing Files
Chapter 7 File Management Commands
Chapter 8 System Configuration and Monitoring
Commands
Chapter 9 Debugging and Logging
Chapter 10 Logging Commands
Chapter 11 Scripting Commands
Chapter 12 Interface Commands
Chapter 13 Interface Testing Commands
/