3Com 4210G CLI Guide

1293
3Com Switch 4210G Family Command Reference Guide Switch 4210G 24-Port Switch 4210G 48-Port Switch 4210G NT 24-Port Switch 4210G NT 48-Port Switch 4210G PWR 24-Port Switch 4210G PWR 48-Port Product Version: Release 2202 Manual Version: 6W100-20100205 www.3com.com 3Com Corporation 350 Campus Drive, Marlborough, MA, USA 01752 3064

Transcript of 3Com 4210G CLI Guide

3Com Switch 4210G Family Command Reference Guide

Switch 4210G 24-Port Switch 4210G 48-Port Switch 4210G NT 24-Port Switch 4210G NT 48-Port Switch 4210G PWR 24-Port Switch 4210G PWR 48-Port

Product Version: Release 2202 Manual Version: 6W100-20100205www.3com.com 3Com Corporation 350 Campus Drive, Marlborough, MA, USA 01752 3064

Copyright 2010, 3Com Corporation. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from 3Com Corporation. 3Com Corporation reserves the right to revise this documentation and to make changes in content from time to time without obligation on the part of 3Com Corporation to provide notification of such revision or change. 3Com Corporation provides this documentation without warranty, term, or condition of any kind, either implied or expressed, including, but not limited to, the implied warranties, terms or conditions of merchantability, satisfactory quality, and fitness for a particular purpose. 3Com may make improvements or changes in the product(s) and/or the program(s) described in this documentation at any time. If there is any software on removable media described in this documentation, it is furnished under a license agreement included with the product as a separate document, in the hard copy documentation, or on the removable media in a directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy, please contact 3Com and a copy will be provided to you. UNITED STATES GOVERNMENT LEGEND If you are a United States government agency, then this documentation and the software described herein are provided to you subject to the following: All technical data and computer software are commercial in nature and developed solely at private expense. Software is delivered as Commercial Computer Software as defined in DFARS 252.227-7014 (June 1995) or as a commercial item as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in 3Coms standard commercial license for the Software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov 1995) or FAR 52.227-14 (June 1987), whichever is applicable. You agree not to remove or deface any portion of any legend provided on any licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide. Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered in other countries. 3Com and the 3Com logo are registered trademarks of 3Com Corporation. All other company and product names may be trademarks of the respective companies with which they are associated.

ENVIRONMENTAL STATEMENTIt is the policy of 3Com Corporation to be environmentally-friendly in all operations. To uphold our policy, we are committed to: Establishing environmental performance standards that comply with national legislation and regulations. Conserving energy, materials and natural resources in all operations. Reducing the waste generated by all operations. Ensuring that all waste conforms to recognized environmental standards. Maximizing the recyclable and reusable content of all products. Ensuring that all products can be recycled, reused and disposed of safely. Ensuring that all products are labelled according to recognized environmental standards. Improving our environmental record on a continual basis.

End of Life Statement3Com processes allow for the recovery, reclamation and safe disposal of all end-of-life electronic components.

Regulated Materials Statement3Com products do not contain any hazardous or ozone-depleting material.

Environmental Statement about the DocumentationThe documentation for this product is printed on paper that comes from sustainable, managed forests; it is fully biodegradable and recyclable, and is completely chlorine-free. The varnish is environmentally-friendly, and the inks are vegetable-based with a low heavy-metal content.

About This ManualOrganization3Com Switch 4210G Family Command Reference Guide is organized as follows: Volume 00-Command Index 01-Access Volume Command Index Ethernet Port LLDP GVRP IP Addressing 02-IP Services Volume DHCP Relay Agent DNS sFlow 03-IP Routing Volume 04-Multicast Volume 05-QoS Volume IP Routing Table IGMP Snooping QoS Policy Traffic Mirroring AAA 06-Security Volume EAD Fast Deployment IP Source Guard Public Key 07-High Availability Volume Smart Link Ethernet OAM Logging into an Ethernet Switch File System Management 08-System Volume HTTPS MAC Address Table Management Hotfix IRF Static Routing Multicast VLAN Priority Mapping User Profile RADIUS HABP SSH2.0 ACL Monitor Link Connectivity Fault Detection Controlling Login Users FTP SNMP MAC Information Configuration NQA IPC RRPP Track Basic System Configuration TFTP MIB System Maintaining and Debugging NTP PoE Device Management HTTP RMON Information Center Cluster Management DLDP HWTACACS MAC Authentication PKI 802.1X Port Security SSL IPv6 Static Routing MLD Snooping Traffic Shaping and Line Rate IPv6 Multicast VLAN Congestion Management Link Aggregation VLAN QinQ ARP DHCP Client IP Performance Optimization Port Isolation Isolate-User-VLAN BPDU Tunneling Proxy ARP DHCP Snooping UDP Helper MSTP Voice VLAN Port Mirroring ARP Attack Defense BOOTP Client IPv6 Basics Features

ConventionsThe manual uses the following conventions:

Command conventionsConvention Boldface italic [] { x | y | ... } [ x | y | ... ] { x | y | ... } * [ x | y | ... ] * & # Description The keywords of a command line are in Boldface. Command arguments are in italic. Items (keywords or arguments) in square brackets [ ] are optional. Alternative items are grouped in braces and separated by vertical bars. One is selected. Optional alternative items are grouped in square brackets and separated by vertical bars. One or none is selected. Alternative items are grouped in braces and separated by vertical bars. A minimum of one or a maximum of all can be selected. Optional alternative items are grouped in square brackets and separated by vertical bars. Many or none can be selected. The argument(s) before the ampersand (&) sign can be entered 1 to n times. A line starting with the # sign is comments.

GUI conventionsConvention [] / Description Button names are inside angle brackets. For example, click . Window names, menu items, data table and field names are inside square brackets. For example, pop up the [New User] window. Multi-level menus are separated by forward slashes. For example, [File/Create/Folder].

SymbolsConvention Description Means reader be extremely careful. Improper operation may cause bodily injury. Means reader be careful. Improper operation may cause data loss or damage to equipment. Means a complementary description.

Related DocumentationIn addition to this manual, each 3com Switch 4210G documentation set includes the following: Manual 3Com Switch 4210G Family Configuration Guide-Release 2202 3Com Switch 4210G Family Getting Started Guide Description Describe how to configure your 4210G Switch using the supported protocols and CLI commands. This guide provides all the information you need to install and use the 3Com Switch 4210G Family.

Obtaining DocumentationYou can access the most up-to-date 3Com product documentation on the World Wide Web at this URL: http://www.3com.com.

Appendix A Command IndexThe command index includes all the commands in the Command Manual, which are arranged alphabetically.

ABCDEFGHIJKLMNOPQRSTUVWXYZ

Aaccess-limit access-limit enable accounting accounting command accounting default accounting lan-access accounting login accounting optional acl acl acl copy acl ipv6 acl ipv6 copy acl ipv6 logging frequence acl ipv6 name acl logging frequence acl name activation-key active region-configuration add-member administrator-address advantage-factor apply poe-profile apply poe-profile interface 06-Security Volume 06-Security Volume 05-QoS Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 01-Access Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 1-1 1-1 1-6 1-2 1-3 1-4 1-5 1-6 14-5 2-1 14-6 14-20 14-21 14-32 14-22 14-32 14-7 1-1 3-1 20-14 20-15 18-1 23-1 23-2

A-1

archive configuration archive configuration interval archive configuration location archive configuration max arp anti-attack active-ack enable arp anti-attack source-mac arp anti-attack source-mac aging-time arp anti-attack source-mac exclude-mac arp anti-attack source-mac threshold arp anti-attack valid-ack enable arp check enable arp detection enable arp detection mode arp detection static-bind arp detection trust arp detection validate arp max-learning-num arp rate-limit arp resolving-route enable arp source-suppression enable arp source-suppression limit arp static arp timer aging ascii attribute authentication default authentication lan-access authentication login authentication-mode authorization command authorization default

08-System Volume 08-System Volume 08-System Volume 08-System Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 08-System Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 06-Security Volume 06-Security Volume

5-15 5-16 5-17 5-18 4-3 4-4 4-5 4-6 4-6 4-8 2-1 4-9 4-10 4-10 4-11 4-12 2-1 4-8 4-3 4-1 4-1 2-2 2-3 6-6 11-1 1-6 1-7 1-8 1-2 1-9 1-10

A-2

authorization lan-access authorization login authorization-attribute auto-build auto-execute command

06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 08-System Volume

1-11 1-12 1-13 20-16 1-3

Bbackup startup-configuration binary bind-attribute black-list add-mac black-list delete-mac boot-loader file bootrom bootrom-update security-check enable bpdu-drop any bpdu-tunnel dot1q bpdu-tunnel tunnel-dmac broadcast-suppression build bye bye 08-System Volume 08-System Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 08-System Volume 06-Security Volume 08-System Volume 5-19 6-7 1-15 20-17 20-18 4-1 4-2 4-4 3-2 10-1 10-2 1-1 20-18 10-16 6-7

Cca identifier car cd cd cd cdup cdup certificate request entity 06-Security Volume 05-QoS Volume 06-Security Volume 08-System Volume 08-System Volume 06-Security Volume 08-System Volume 06-Security Volume 11-2 1-6 10-16 5-1 6-8 10-17 6-8 11-3

A-3

certificate request from certificate request mode certificate request polling certificate request url cfd cc enable cfd cc interval cfd enable cfd linktrace cfd linktrace auto-detection cfd loopback cfd ma cfd md cfd mep cfd mep enable cfd mip-rule cfd remote-mep cfd service-instance check region-configuration ciphersuite classifier behavior client-verify enable clock datetime clock summer-time one-off clock summer-time repeating clock timezone close close-mode wait cluster cluster enable cluster switch-to cluster-local-user

06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 01-Access Volume 06-Security Volume 05-QoS Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume

11-3 11-4 11-5 11-5 6-1 6-1 6-2 6-3 6-4 6-5 6-6 6-7 6-7 6-8 6-9 6-10 6-11 3-2 12-1 1-15 12-2 3-1 3-1 3-3 3-4 6-9 12-2 20-20 20-20 20-21 20-22

A-4

cluster-mac cluster-mac syn-interval cluster-snmp-agent community cluster-snmp-agent group v3 cluster-snmp-agent mib-view included cluster-snmp-agent usm-user v3 codec-type command accounting command authorization command-alias enable command-alias mapping command-privilege level common-name configuration replace file control-vlan copy copyright-info enable country crl check crl update-period crl url cut connection

08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 06-Security Volume 08-System Volume 07-High Availability Volume 08-System Volume 08-System Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume

20-22 20-23 20-24 20-25 20-26 20-26 18-1 1-4 1-5 3-5 3-5 3-6 11-6 5-20 3-1 5-2 3-8 11-7 11-7 11-8 11-8 1-16

Ddatabits data-fill data-flow-format (HWTACACS scheme view) data-flow-format (RADIUS scheme view) data-size debugging debugging delete 08-System Volume 08-System Volume 06-Security Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 06-Security VolumeA-5

1-5 18-2 3-1 2-1 18-3 6-10 15-8 10-18

delete delete delete ipv6 static-routes all delete static-routes all delete-member description description description description (any NQA test type view) description (for IPv4) description (for IPv6) destination ip destination port dhcp relay address-check dhcp relay information circuit-id format-type dhcp relay information circuit-id string dhcp relay information enable dhcp relay information format dhcp relay information remote-id format-type dhcp relay information remote-id string dhcp relay information strategy dhcp relay release ip dhcp relay security static dhcp relay security tracker dhcp relay server-detect dhcp relay server-group dhcp relay server-select dhcp select relay dhcp-snooping dhcp-snooping information circuit-id format-type dhcp-snooping information circuit-id string

08-System Volume 08-System Volume 03-IP Routing Volume 03-IP Routing Volume 08-System Volume 01-Access Volume 01-Access Volume 01-Access Volume 08-System Volume 06-Security Volume 06-Security Volume 08-System Volume 08-System Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume

5-3 6-11 3-1 2-1 20-28 1-2 1-1 5-1 18-4 14-8 14-22 18-5 18-5 5-1 5-2 5-2 5-3 5-4 5-5 5-6 5-7 5-7 5-8 5-9 5-10 5-10 5-11 5-12 7-1 7-2

02-IP Services VolumeA-6

7-2

dhcp-snooping information enable dhcp-snooping information format dhcp-snooping information remote-id format-type dhcp-snooping information remote-id string dhcp-snooping information strategy dhcp-snooping trust dir dir dir disconnect display acl display acl ipv6 display acl resource display archive configuration display arp display arp anti-attack source-mac display arp detection display arp detection statistics display arp ip-address display arp source-suppression display arp timer aging display boot-loader display bootp client display brief interface display cfd linktrace-reply display cfd linktrace-reply auto-detection display cfd ma display cfd md display cfd mep display cfd mp display cfd remote-mep

02-IP Services Volume 02-IP Services Volume 02-IP Services Volume

7-3 7-4 7-5

02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 08-System Volume 02-IP Services Volume 01-Access Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability VolumeA-7

7-6 7-7 7-7 10-18 5-4 6-11 6-13 14-9 14-23 14-1 5-20 2-3 4-7 4-13 4-13 2-5 4-2 2-6 4-4 8-1 1-3 6-12 6-13 6-14 6-15 6-16 6-19 6-20

display cfd service-instance display cfd status display channel display clipboard display clock display cluster display cluster base-topology display cluster black-list display cluster candidates display cluster current-topology display cluster members display command-alias display connection display cpu-usage display cpu-usage history display current-configuration display debugging display default-configuration display device display device manuinfo display dhcp client display dhcp relay display dhcp relay information display dhcp relay security display dhcp relay security statistics display dhcp relay security tracker display dhcp relay server-group display dhcp relay statistics display dhcp-snooping display dhcp-snooping information display dhcp-snooping packet statistics

07-High Availability Volume 07-High Availability Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume

6-21 6-22 16-1 3-9 3-9 20-28 20-30 20-32 20-32 20-34 20-36 3-10 1-17 4-5 4-7 3-10 15-9 3-12 4-10 4-11 6-1 5-13 5-13 5-14 5-15 5-16 5-16 5-17 7-8 7-9 7-10

A-8

display dhcp-snooping trust display diagnostic-information display dldp display dldp statistics display dns domain display dns dynamic-host display dns ipv6 dynamic-host display dns ipv6 server display dns server display domain display dot1x display environment display fan display fib display fib ip-address display ftp client configuration display ftp-server display ftp-user display garp statistics display garp timer display gvrp local-vlan interface display gvrp state display gvrp statistics display gvrp status display gvrp vlan-operation interface display habp display habp table display habp traffic display history-command display hotkey display hwtacacs

02-IP Services Volume 08-System Volume 07-High Availability Volume 07-High Availability Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 06-Security Volume 06-Security Volume 08-System Volume 08-System Volume 02-IP Services Volume 02-IP Services Volume 08-System Volume 08-System Volume 08-System Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 08-System Volume 06-Security Volume

7-11 3-12 4-1 4-3 9-1 9-2 12-1 12-2 9-3 1-18 4-1 4-12 4-13 10-1 10-3 6-13 6-1 6-2 8-1 8-2 8-3 8-3 8-4 8-5 8-5 6-1 6-1 6-2 3-13 3-14 3-1

A-9

display icmp statistics display igmp-snooping group display igmp-snooping statistics display info-center display interface display interface vlan-interface display ip check source display ip host display ip http display ip https display ip interface display ip interface brief display ip routing-table display ip routing-table acl display ip routing-table ip-address display ip routing-table ip-prefix display ip routing-table protocol display ip routing-table statistics display ip socket display ip statistics display ipc channel display ipc link display ipc multicast-group display ipc node display ipc packet display ipc performance display ipc queue display ip-subnet-vlan interface display ip-subnet-vlan vlan display ipv6 fib display ipv6 host

02-IP Services Volume 04-IP Multicast Volume 04-IP Multicast Volume 08-System Volume 01-Access Volume 01-Access Volume 06-Security Volume 02-IP Services Volume 08-System Volume 08-System Volume 02-IP Services Volume 02-IP Services Volume 03-IP Routing Volume 03-IP Routing Volume 03-IP Routing Volume 03-IP Routing Volume 03-IP Routing Volume 03-IP Routing Volume 02-IP Services Volume 02-IP Services Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 01-Access Volume 01-Access Volume 02-IP Services Volume 02-IP Services Volume

10-4 1-1 1-2 16-2 1-6 5-2 9-1 9-4 8-1 9-1 1-1 1-3 1-1 1-4 1-7 1-9 1-10 1-11 10-5 10-8 22-1 22-2 22-3 22-4 22-4 22-5 22-7 5-27 5-28 12-3 12-4

A-10

display ipv6 interface display ipv6 neighbors display ipv6 neighbors count display ipv6 pathmtu display ipv6 routing-table display ipv6 routing-table acl display ipv6 routing-table ipv6-address display ipv6 routing-table ipv6-address1 ipv6-address2 display ipv6 routing-table ipv6-prefix display ipv6 routing-table protocol display ipv6 routing-table statistics display ipv6 routing-table verbose display ipv6 socket display ipv6 statistics display irf display irf configuration display irf topology display isolate-user-vlan display lacp system-id display link-aggregation load-sharing mode display link-aggregation member-port display link-aggregation summary display link-aggregation verbose display lldp local-information display lldp neighbor-information display lldp statistics display lldp status display lldp tlv-config display local-proxy-arp display local-user display logbuffer

02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 03-IP Routing Volume 03-IP Routing Volume 03-IP Routing Volume 03-IP Routing Volume

12-5 12-9 12-10 12-11 1-12 1-13 1-14 1-15

03-IP Routing Volume 03-IP Routing Volume 03-IP Routing Volume 03-IP Routing Volume 02-IP Services Volume 02-IP Services Volume 08-System Volume 08-System Volume 08-System Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 02-IP Services Volume 06-Security Volume 08-System VolumeA-11

1-16 1-17 1-18 1-18 12-12 12-14 21-1 21-2 21-3 6-1 1-2 1-2 1-4 1-6 1-8 4-1 4-5 4-11 4-12 4-14 3-1 1-20 16-4

display logbuffer summary display loopback-detection display mac-address display mac-address aging-time display mac-authentication display mac-vlan display mac-vlan interface display memory display mib-style display mirroring-group display mld-snooping group display mld-snooping statistics display monitor-link group display multicast-vlan display multicast-vlan ipv6 display ndp display nqa history display nqa result display nqa server status display nqa statistics display ntdp display ntdp device-list display ntdp single-device mac-address display ntp-service sessions display ntp-service status display ntp-service trace display oam display oam configuration display oam critical-event display oam link-event display packet-drop interface

08-System Volume 01-Access Volume 08-System Volume 08-System Volume 06-Security Volume 01-Access Volume 01-Access Volume 08-System Volume 08-System Volume 01-Access Volume 04-IP Multicast Volume 04-IP Multicast Volume 07-High Availability Volume 04-IP Multicast Volume 04-IP Multicast Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 01-Access Volume

16-6 1-10 13-1 13-2 7-1 5-18 5-19 4-13 11-1 11-1 3-1 3-2 2-1 2-1 4-1 20-1 18-6 18-7 18-39 18-11 20-7 20-8 20-10 19-1 19-3 19-4 5-1 5-4 5-6 5-7 1-11

A-12

display packet-drop summary display patch information display pki certificate display pki certificate access-control-policy display pki certificate attribute-group display pki crl domain display poe device display poe interface display poe interface power display poe pse display poe pse interface display poe pse interface power display poe-profile display poe-profile interface display port display port combo display port-group manual display port-isolate group display port-security display port-security mac-address block display port-security mac-address security display power display protocol-vlan interface display protocol-vlan vlan display proxy-arp display public-key local public display public-key peer display qos gts interface display qos lr interface display qos map-table display qos policy

01-Access Volume 08-System Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 01-Access Volume 01-Access Volume 02-IP Services Volume 06-Security Volume 06-Security Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume

1-11 17-1 11-9 11-11 11-12 11-12 23-2 23-3 23-6 23-8 23-9 23-10 23-11 23-14 5-9 1-12 1-13 2-1 8-1 8-3 8-4 4-14 5-22 5-23 3-1 13-1 13-2 3-1 3-2 2-1 1-15

A-13

display qos policy global display qos policy interface display qos sp interface display qos trust interface display qos vlan-policy display qos wfq interface display qos wrr interface display radius scheme display radius statistics display reboot-type display rmon alarm display rmon event display rmon eventlog display rmon history display rmon prialarm display rmon statistics display rps display rrpp brief display rrpp ring-group display rrpp statistics display rrpp verbose display saved-configuration display schedule job display schedule reboot display sflow display sftp client source display smart-link flush display smart-link group display snmp-agent community display snmp-agent group display snmp-agent local-engineid

05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 06-Security Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 08-System Volume 08-System Volume 08-System Volume 02-IP Services Volume 06-Security Volume 07-High Availability Volume 07-High Availability Volume 08-System Volume 08-System Volume 08-System Volume

1-16 1-18 4-1 2-4 1-19 4-1 4-2 2-2 2-4 4-15 12-1 12-2 12-3 12-4 12-7 12-8 4-16 3-2 3-3 3-4 3-7 5-21 4-16 4-17 13-1 10-19 1-1 1-2 10-1 10-2 10-3

A-14

display snmp-agent mib-view display snmp-agent statistics display snmp-agent sys-info display snmp-agent trap queue display snmp-agent trap-list display snmp-agent usm-user display ssh client source display ssh server display ssh server-info display ssh user-information display ssl client-policy display ssl server-policy display startup display stop-accounting-buffer display stop-accounting-buffer display storm-constrain display stp display stp abnormal-port display stp down-port display stp history display stp region-configuration display stp root display stp tc display switchover state display system-failure display tcp ipv6 statistics display tcp ipv6 status display tcp statistics display tcp status display telnet client configuration display tftp client configuration

08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 06-Security Volume 06-Security Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 08-System Volume 08-System Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 08-System Volume 08-System Volume

10-4 10-5 10-7 10-8 10-8 10-9 10-8 10-1 10-9 10-2 12-3 12-4 5-23 2-7 3-4 1-14 3-3 3-8 3-9 3-10 3-11 3-12 3-13 21-5 4-17 12-17 12-20 10-10 10-12 1-6 7-1

A-15

display this display time-range display track display traffic behavior display traffic classifier display transceiver display transceiver alarm display transceiver diagnosis display transceiver manuinfo display trapbuffer display udp ipv6 statistics display udp statistics display udp-helper server display user-bind display user-group display user-interface display user-profile display users display version display vlan display voice vlan oui display voice vlan state display web users dldp authentication-mode dldp delaydown-timer dldp enable dldp interval dldp reset dldp unidirectional-shutdown dldp work-mode dns domain

08-System Volume 06-Security Volume 07-High Availability Volume 05-QoS Volume 05-QoS Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 06-Security Volume 06-Security Volume 08-System Volume 05-QoS Volume 08-System Volume 08-System Volume 01-Access Volume 01-Access Volume 01-Access Volume 08-System Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 02-IP Services Volume

3-15 14-2 7-1 1-8 1-1 4-22 4-18 4-21 4-23 16-7 12-21 10-13 11-1 9-2 1-22 1-7 6-1 1-8 3-16 5-3 7-1 7-2 1-9 4-4 4-5 4-5 4-6 4-7 4-8 4-8 9-4

A-16

dns proxy enable dns resolve dns server dns server ipv6 domain domain default enable domain ring dot1x dot1x authentication-method dot1x free-ip dot1x guest-vlan dot1x handshake dot1x mandatory-domain dot1x max-user dot1x multicast-trigger dot1x port-control dot1x port-method dot1x quiet-period dot1x re-authenticate dot1x retry dot1x timer dot1x timer ead-timeout dot1x url duplex

02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 06-Security Volume 06-Security Volume 07-High Availability Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 01-Access Volume

9-5 9-6 9-6 12-22 1-23 1-23 3-10 4-4 4-5 5-1 4-6 4-8 4-8 4-9 4-10 4-11 4-12 4-13 4-14 4-14 4-15 5-2 5-2 1-15

Eenable log updown enable snmp trap updown enable snmp trap updown escape-key execute exit 08-System Volume 01-Access Volume 08-System Volume 08-System Volume 08-System Volume 06-Security VolumeA-17

16-8 1-10 10-10 1-10 5-5 10-20

expiration-date

06-Security Volume

1-24

Ffast-leave (IGMP-Snooping view) fast-leave (MLD-Snooping view) file prompt filename filter fixdisk flow-control flow-control flow-interval flush enable format fqdn free ftp user free user-interface free web-users frequency ftp ftp client source ftp ipv6 ftp server acl ftp server enable ftp timeout ftp update ftp-server 04-IP Multicast Volume 04-IP Multicast Volume 08-System Volume 08-System Volume 05-QoS Volume 08-System Volume 01-Access Volume 08-System Volume 01-Access Volume 07-High Availability Volume 08-System Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 1-3 3-3 5-6 18-16 1-9 5-7 1-16 1-11 1-17 1-3 5-7 11-14 6-3 1-12 2-2 18-16 6-14 6-15 6-16 6-3 6-4 6-4 6-5 20-38

Ggarp timer hold garp timer join garp timer leave 01-Access Volume 01-Access Volume 01-Access Volume 8-6 8-6 8-7

A-18

garp timer leaveall get get gratuitous-arp-learning enable gratuitous-arp-sending enable group group-member group-policy (IGMP-Snooping view) group-policy (MLD-Snooping view) gvrp gvrp registration

01-Access Volume 06-Security Volume 08-System Volume 02-IP Services Volume 02-IP Services Volume 06-Security Volume 01-Access Volume 04-IP Multicast Volume 04-IP Multicast Volume 01-Access Volume 01-Access Volume

8-8 10-20 6-17 2-7 2-7 1-25 1-17 1-4 3-4 8-9 8-9

Hhabp enable habp server vlan habp timer handshake timeout header help history-command max-size history-records holdtime host-aging-time (IGMP-Snooping view) host-aging-time (MLD-Snooping view) hotkey http-version hwtacacs nas-ip hwtacacs scheme 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 04-IP Multicast Volume 04-IP Multicast Volume 08-System Volume 08-System Volume 06-Security Volume 06-Security Volume 6-3 6-4 6-4 12-5 3-16 10-21 1-13 18-17 20-39 1-5 3-5 3-18 18-18 3-4 3-5

Iidle-cut enable idle-timeout 06-Security Volume 08-System Volume 1-25 1-13

A-19

if-match igmp-snooping igmp-snooping drop-unknown igmp-snooping enable igmp-snooping fast-leave igmp-snooping general-query source-ip igmp-snooping group-limit igmp-snooping group-policy igmp-snooping host-aging-time igmp-snooping host-join igmp-snooping last-member-query-interval igmp-snooping max-response-time igmp-snooping overflow-replace igmp-snooping querier igmp-snooping query-interval igmp-snooping router-aging-time igmp-snooping source-deny igmp-snooping special-query source-ip igmp-snooping static-group igmp-snooping static-router-port igmp-snooping version import info-center channel name info-center console channel info-center enable info-center logbuffer info-center loghost info-center loghost source info-center monitor channel info-center snmp channel info-center source

05-QoS Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 05-QoS Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume

1-2 1-6 1-6 1-7 1-8 1-9 1-9 1-10 1-11 1-12 1-13 1-14 1-15 1-15 1-16 1-17 1-17 1-18 1-19 1-20 1-21 2-2 16-9 16-9 16-10 16-11 16-11 16-12 16-13 16-14 16-15

A-20

info-center synchronous info-center timestamp info-center timestamp loghost info-center trapbuffer instance interface interface bridge-aggregation interface vlan-interface ip (PKI entity view) ip address ip address ip address bootp-alloc ip address dhcp-alloc ip check source ip forward-broadcast (interface view) ip forward-broadcast (system view) ip host ip http acl ip http enable ip http port ip https acl ip https certificate access-control-policy ip https enable ip https port ip https ssl-server-policy ip redirects enable ip route-static ip route-static default-preference ip ttl-expires enable ip unreachables enable ipc performance enable

08-System Volume 08-System Volume 08-System Volume 08-System Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 06-Security Volume 01-Access Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 06-Security Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 02-IP Services Volume 03-IP Routing Volume 03-IP Routing Volume 02-IP Services Volume 02-IP Services Volume 08-System Volume

16-17 16-19 16-20 16-21 3-14 1-18 1-10 5-4 11-14 5-5 1-4 8-2 6-3 9-3 10-14 10-15 9-7 8-2 8-2 8-3 9-2 9-2 9-3 9-4 9-4 10-15 2-2 2-3 10-16 10-16 22-8

A-21

ip-pool ip-subnet-vlan ipv6 ipv6 address ipv6 address auto link-local ipv6 address eui-64 ipv6 address link-local ipv6 hoplimit-expires enable ipv6 host ipv6 icmp-error ipv6 icmpv6 multicast-echo-reply enable ipv6 nd autoconfig managed-address-flag ipv6 nd autoconfig other-flag ipv6 nd dad attempts ipv6 nd hop-limit ipv6 nd ns retrans-timer ipv6 nd nud reachable-time ipv6 nd ra halt ipv6 nd ra interval ipv6 nd ra prefix ipv6 nd ra router-lifetime ipv6 neighbor ipv6 neighbors max-learning-num ipv6 pathmtu ipv6 pathmtu age ipv6 route-static irf auto-update enable irf link-delay irf mac-address persistent irf member irf-port irf member priority

08-System Volume 01-Access Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 03-IP Routing Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume

20-40 5-29 12-23 12-23 12-24 12-25 12-26 12-27 12-27 12-28 12-28 12-29 12-30 12-30 12-31 12-32 12-32 12-33 12-34 12-34 12-35 12-36 12-37 12-38 12-38 3-2 21-6 21-7 21-8 21-8 21-10

A-22

irf member renumber irf switch-to isolate-user-vlan isolate-user-vlan enable

08-System Volume 08-System Volume 01-Access Volume 01-Access Volume

21-11 21-12 6-2 6-4

Jjumboframe enable 01-Access Volume 1-18

Kkey (HWTACACS scheme view) key (RADIUS scheme view) 06-Security Volume 06-Security Volume 3-6 2-8

Llacp port-priority lacp system-priority last-listener-query-interval (MLD-Snooping view) last-member-query-interval (IGMP-Snooping view) lcd ldap-server link-aggregation load-sharing mode (aggregate interface view) link-aggregation load-sharing mode (system view) link-aggregation mode link-delay lldp admin-status lldp check-change-interval lldp compliance admin-status cdp lldp compliance cdp lldp enable lldp encapsulation snap lldp fast-count 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access VolumeA-23

01-Access Volume 01-Access Volume 04-IP Multicast Volume

1-11 1-12 3-6

04-IP Multicast Volume

1-21

08-System Volume 06-Security Volume 01-Access Volume

6-18 11-15 1-13

01-Access Volume

1-12

1-14 1-19 4-16 4-16 4-17 4-18 4-18 4-19 4-20

lldp hold-multiplier lldp management-address-format string lldp management-address-tlv lldp notification remote-change enable lldp timer notification-interval lldp timer reinit-delay lldp timer tx-delay lldp timer tx-interval lldp tlv-enable locality local-proxy-arp enable local-user local-user password-display-mode lock logging-host loopback loopback-detection control enable loopback-detection enable loopback-detection interval-time loopback-detection per-vlan enable ls ls

01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 06-Security Volume 02-IP Services Volume 06-Security Volume 06-Security Volume 08-System Volume 08-System Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 06-Security Volume 08-System Volume

4-20 4-21 4-22 4-22 4-23 4-24 4-24 4-25 4-25 11-16 3-2 1-26 1-27 1-14 20-40 1-20 1-21 1-21 1-22 1-23 10-21 6-18

Mmac-address (Interface view) mac-address (system view) mac-address information enable (Ethernet interface view) mac-address information enable (system view) mac-address information interval mac-address information mode mac-address information queue-length 08-System Volume 08-System Volume 08-System Volume 08-System Volume 14-2 14-2 14-3 14-4 08-System Volume 08-System Volume 08-System Volume 13-3 13-4 14-1

A-24

mac-address mac-learning disable mac-address max-mac-count (Interface view) mac-address timer mac-authentication mac-authentication domain mac-authentication timer mac-authentication user-name-format mac-vlan enable mac-vlan mac-address management-vlan management-vlan synchronization enable max-response-time (IGMP-Snooping view) max-response-time (MLD-Snooping view) mdi mib-style mirroring-group mirroring-group mirroring-port mirroring-group monitor-egress mirroring-group monitor-port mirroring-group remote-probe vlan mirroring-port mirror-to mkdir mkdir mkdir mld-snooping mld-snooping enable mld-snooping fast-leave mld-snooping general-query source-ip mld-snooping group-limit mld-snooping group-policy

08-System Volume 08-System Volume 08-System Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 01-Access Volume 01-Access Volume 08-System Volume 08-System Volume 04-IP Multicast Volume 04-IP Multicast Volume 01-Access Volume 08-System Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 05-QoS Volume 06-Security Volume 08-System Volume 08-System Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume

13-5 13-6 13-7 7-3 7-4 7-4 7-5 5-20 5-20 20-41 20-42 1-22 3-7 1-24 11-1 11-2 11-3 11-4 11-5 11-6 11-7 5-1 10-22 5-8 6-20 3-7 3-8 3-9 3-9 3-10 3-11

A-25

mld-snooping host-aging-time mld-snooping host-join mld-snooping last-listener-query-interval mld-snooping max-response-time mld-snooping overflow-replace mld-snooping querier mld-snooping query-interval mld-snooping router-aging-time mld-snooping source-deny mld-snooping special-query source-ip mld-snooping static-group mld-snooping static-router-port mld-snooping version monitor-link group monitor-port more move multicast-suppression multicast-vlan multicast-vlan ipv6

04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 04-IP Multicast Volume 07-High Availability Volume 01-Access Volume 08-System Volume 08-System Volume 01-Access Volume 04-IP Multicast Volume 04-IP Multicast Volume

3-12 3-13 3-14 3-15 3-15 3-16 3-17 3-18 3-18 3-19 3-20 3-21 3-22 2-2 11-8 5-9 5-10 1-25 2-2 4-2

Nname nas-ip (HWTACACS scheme view) nas-ip (RADIUS scheme view) ndp enable ndp timer aging ndp timer hello nest next-hop nm-interface vlan-interface nqa 01-Access Volume 06-Security Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 01-Access Volume 08-System Volume 08-System Volume 08-System VolumeA-26

5-6 3-6 2-8 20-4 20-5 20-6 9-1 18-18 20-43 18-19

nqa agent enable nqa agent max-concurrent nqa schedule nqa server enable nqa server tcp-connect nqa server udp-echo ntdp enable ntdp explore ntdp hop ntdp timer ntdp timer hop-delay ntdp timer port-delay ntp-service access ntp-service authentication enable ntp-service authentication-keyid ntp-service broadcast-client ntp-service broadcast-server ntp-service in-interface disable ntp-service max-dynamic-sessions ntp-service multicast-client ntp-service multicast-server ntp-service reliable authentication-keyid ntp-service source-interface ntp-service unicast-peer ntp-service unicast-server

08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume

18-19 18-20 18-21 18-39 18-40 18-41 20-11 20-11 20-12 20-13 20-13 20-14 19-5 19-6 19-7 19-8 19-8 19-9 19-9 19-10 19-11 19-12 19-12 19-13 19-14

Ooam enable oam errored-frame period oam errored-frame threshold oam errored-frame-period period oam errored-frame-period threshold 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability VolumeA-27

5-9 5-10 5-10 5-11 5-12

oam errored-frame-seconds period oam errored-frame-seconds threshold oam errored-symbol period oam errored-symbol threshold oam loopback oam mode open open ipv6 operation (FTP test type view) operation (HTTP test type view) operation interface organization organization-unit overflow-replace (IGMP-Snooping view) overflow-replace (MLD-Snooping view)

07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 06-Security Volume 06-Security Volume 04-IP Multicast Volume 04-IP Multicast Volume

5-12 5-13 5-13 5-14 5-15 5-15 6-20 6-21 18-22 18-22 18-23 11-16 11-17 1-23 3-22

Ppacket-filter packet-filter ipv6 parity passive password password (FTP test type view) patch active patch deactive patch delete patch install patch load patch location patch run peer-public-key end ping 06-Security Volume 06-Security Volume 08-System Volume 08-System Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 06-Security Volume 08-System VolumeA-28

14-33 14-34 1-15 6-22 1-28 18-24 17-2 17-2 17-3 17-4 17-5 17-5 17-6 13-3 15-1

ping ipv6 pki certificate access-control-policy pki certificate attribute-group pki delete-certificate pki domain pki entity pki import-certificate pki request-certificate domain pki retrieval-certificate pki retrieval-crl domain pki validate-certificate pki-domain poe disconnect poe enable poe legacy enable poe max-power poe mode poe pd-description poe pd-policy priority poe priority poe update poe utilization-threshold poe-profile port port port port (IPv6 multicast VLAN view) port (multicast VLAN view) port access vlan port hybrid ip-subnet-vlan vlan port hybrid protocol-vlan

08-System Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 01-Access Volume 07-High Availability Volume 07-High Availability Volume 04-IP Multicast Volume 04-IP Multicast Volume 01-Access Volume 01-Access Volume 01-Access Volume

15-4 11-17 11-18 11-19 11-19 11-20 11-21 11-21 11-22 11-23 11-23 12-6 23-15 23-15 23-16 23-17 23-17 23-18 23-19 23-19 23-20 23-21 23-22 5-10 1-3 2-2 4-3 2-2 5-10 5-30 5-24

A-29

port hybrid pvid vlan port hybrid vlan port link-aggregation group port link-type port monitor-link group port multicast-vlan port multicast-vlan ipv6 port smart-link group port trunk permit vlan port trunk pvid vlan port-group manual port-isolate enable port-security authorization ignore port-security enable port-security intrusion-mode port-security mac-address security port-security max-mac-count port-security ntk-mode port-security oui port-security port-mode port-security timer disableport port-security trap preemption delay preemption mode prefer-cipher primary accounting (HWTACACS scheme view) primary accounting (RADIUS scheme view) primary authentication (HWTACACS scheme view) primary authentication (RADIUS scheme view) primary authorization

01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 07-High Availability Volume 04-IP Multicast Volume 04-IP Multicast Volume 07-High Availability Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 07-High Availability Volume 07-High Availability Volume 06-Security Volume 06-Security Volume

5-11 5-12 1-15 5-14 2-3 2-3 4-3 1-4 5-15 5-17 1-26 2-2 8-6 8-6 8-7 8-8 8-9 8-10 8-11 8-12 8-13 8-14 1-5 1-6 12-6 3-7

06-Security Volume 06-Security Volume

2-9 3-8

06-Security Volume 06-Security Volume

2-10 3-9

A-30

probe count probe packet-interval probe packet-number probe packet-timeout probe timeout protected-vlan protected-vlan protocol inbound protocol-vlan proxy-arp enable public-key local create public-key local destroy public-key local export dsa public-key local export rsa public-key peer public-key peer import sshkey public-key-code begin public-key-code end put put pwd pwd pwd

08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 07-High Availability Volume 07-High Availability Volume 08-System Volume 01-Access Volume 02-IP Services Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 06-Security Volume 08-System Volume 08-System Volume

18-24 18-25 18-26 18-26 18-27 1-7 3-11 1-16 5-25 3-2 13-5 13-6 13-7 13-8 13-9 13-10 13-4 13-4 10-22 6-23 10-23 5-10 6-23

Qqinq enable qinq ethernet-type qinq vid qos apply policy qos apply policy global qos bandwidth queue qos gts 01-Access Volume 01-Access Volume 01-Access Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS VolumeA-31

9-3 9-4 9-5 1-21 1-21 4-4 3-2

qos lr outbound qos map-table qos policy qos priority qos sp qos trust qos vlan-policy qos wfq qos wfq weight qos wrr qos wrr group quit quit quit

05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 06-Security Volume 08-System Volume 08-System Volume

3-3 2-2 1-22 2-3 4-4 2-5 1-23 4-5 4-6 4-6 4-7 10-24 3-20 6-24

Rradius client radius nas-ip radius scheme radius trap raw-vlan-id inbound reaction reaction trap reboot reboot member redirect region-name remark dot1p remark drop-precedence remark dscp remark ip-precedence remark local-precedence 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 01-Access Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 05-QoS Volume 01-Access Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS Volume 05-QoS VolumeA-32

2-11 2-12 2-13 2-14 9-2 18-28 18-29 4-24 20-43 1-9 3-15 1-10 1-11 1-11 1-13 1-13

remotehelp remove rename rename report-aggregation (IGMP-Snooping view) report-aggregation (MLD-Snooping view) reset acl counter reset acl ipv6 counter reset arp reset arp detection statistics reset counters interface reset counters interface reset dhcp relay statistics reset dhcp-snooping reset dhcp-snooping packet statistics reset dldp statistics reset dns dynamic-host reset dns ipv6 dynamic-host reset dot1x statistics reset garp statistics reset hwtacacs statistics reset igmp-snooping group reset igmp-snooping statistics reset ip routing-table statistics protocol reset ip statistics reset ipc performance reset ipv6 neighbors reset ipv6 pathmtu reset ipv6 routing-table statistics reset ipv6 statistics reset lacp statistics

08-System Volume 06-Security Volume 06-Security Volume 08-System Volume 04-IP Multicast Volume 04-IP Multicast Volume 06-Security Volume 06-Security Volume 02-IP Services Volume 02-IP Services Volume 01-Access Volume 01-Access Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 07-High Availability Volume 02-IP Services Volume 02-IP Services Volume 06-Security Volume 01-Access Volume 06-Security Volume 04-IP Multicast Volume 04-IP Multicast Volume 03-IP Routing Volume 02-IP Services Volume 08-System Volume 02-IP Services Volume 02-IP Services Volume 03-IP Routing Volume 02-IP Services Volume 01-Access Volume

6-24 10-24 10-25 5-11 1-23 3-23 14-10 14-24 2-6 4-14 1-27 1-16 5-19 7-11 7-12 4-9 9-7 12-39 4-16 8-10 3-10 1-24 1-25 1-20 10-17 22-9 12-39 12-40 1-20 12-41 1-16

A-33

reset logbuffer reset mac-authentication statistics reset mld-snooping group reset mld-snooping statistics reset ndp statistics reset oam reset packet-drop interface reset qos policy global reset qos vlan-policy reset radius statistics reset recycle-bin reset rrpp statistics reset saved-configuration reset smart-link statistics reset stop-accounting-buffer reset stop-accounting-buffer reset stp reset tcp ipv6 statistics reset tcp statistics reset trapbuffer reset udp ipv6 statistics reset udp statistics reset udp-helper packet reset unused porttag restore startup-configuration retry retry realtime-accounting retry stop-accounting (HWTACACS scheme view) retry stop-accounting (RADIUS scheme view) return revision-level

08-System Volume 06-Security Volume 04-IP Multicast Volume 04-IP Multicast Volume 08-System Volume 07-High Availability Volume 01-Access Volume 05-QoS Volume 05-QoS Volume 06-Security Volume 08-System Volume 07-High Availability Volume 08-System Volume 07-High Availability Volume 06-Security Volume 06-Security Volume 01-Access Volume 02-IP Services Volume 02-IP Services Volume 08-System Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 08-System Volume 08-System Volume 06-Security Volume 06-Security Volume 06-Security Volume

16-21 7-7 3-24 3-24 20-6 5-16 1-27 1-23 1-24 2-14 5-11 3-12 5-24 1-8 2-15 3-10 3-16 12-41 10-17 16-22 12-42 10-18 11-1 4-25 5-25 2-16 2-17 3-11

06-Security Volume 08-System Volume 01-Access VolumeA-34

2-18 3-20 3-16

ring ring enable rmdir rmdir rmdir rmon alarm rmon event rmon history rmon prialarm rmon statistics root-certificate fingerprint route-option bypass-route router-aging-time (IGMP-Snooping view) router-aging-time (MLD-Snooping view) rrpp domain rrpp enable rrpp ring-group rule (access control policy view) rule (advanced IPv4 ACL view) rule (advanced IPv6 ACL view) rule (basic IPv4 ACL view) rule (basic IPv6 ACL view) rule (Ethernet frame header ACL view) rule comment (for IPv4) rule comment (for IPv6)

07-High Availability Volume 07-High Availability Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 06-Security Volume 08-System Volume 04-IP Multicast Volume 04-IP Multicast Volume 07-High Availability Volume 07-High Availability Volume 07-High Availability Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume

3-12 3-15 10-25 5-14 6-27 12-10 12-12 12-13 12-14 12-17 11-24 18-30 1-25 3-25 3-15 3-16 3-17 11-25 14-12 14-26 14-10 14-25 14-16 14-18 14-30

Ssave schedule job schedule reboot at schedule reboot delay screen-length 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System VolumeA-35

5-26 4-26 4-27 4-29 1-16

screen-length disable secondary accounting (HWTACACS scheme view) secondary accounting (RADIUS scheme view) secondary authentication (HWTACACS scheme view) secondary authentication (RADIUS scheme view) secondary authorization security-policy-server self-service-url enable send server-type service-type session set authentication password sflow agent ip sflow collector ip sflow enable sflow interval sflow sampling-mode sflow sampling-rate sftp sftp client ipv6 source sftp client source sftp ipv6 sftp server enable sftp server idle-timeout shell shutdown shutdown shutdown

08-System Volume 06-Security Volume

3-21 3-12

06-Security Volume 06-Security Volume

2-18 3-12

06-Security Volume

2-19

06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 01-Access Volume 01-Access Volume 01-Access Volume

3-13 2-20 1-29 1-17 2-21 1-30 12-7 1-18 13-2 13-3 13-3 13-4 13-5 13-6 10-26 10-27 10-27 10-28 10-15 10-15 1-19 1-28 1-17 5-7

A-36

shutdown-interval slave auto-update config smart-link flush enable smart-link group snmp-agent snmp-agent calculate-password snmp-agent community snmp-agent group snmp-agent local-engineid snmp-agent log snmp-agent mib-view snmp-agent packet max-size snmp-agent sys-info snmp-agent target-host snmp-agent trap enable snmp-agent trap if-mib link extended snmp-agent trap life snmp-agent trap queue-size snmp-agent trap source snmp-agent usm-user { v1 | v2c } snmp-agent usm-user v3 snmp-host source interface source ip source port source-deny (IGMP-Snooping view) source-deny (MLD-Snooping view) speed speed speed auto ssh client authentication server

08-System Volume 08-System Volume 07-High Availability Volume 07-High Availability Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 04-IP Multicast Volume 04-IP Multicast Volume 01-Access Volume 08-System Volume 01-Access Volume 06-Security Volume

4-30 5-28 1-8 1-9 10-11 10-12 10-13 10-15 10-16 10-17 10-17 10-18 10-19 10-20 10-22 10-23 10-24 10-24 10-25 10-26 10-27 20-44 18-30 18-31 18-32 1-26 3-26 1-29 1-20 1-30 10-10

A-37

ssh client first-time enable ssh client ipv6 source ssh client source ssh server authentication-retries ssh server authentication-timeout ssh server compatible-ssh1x enable ssh server enable ssh server rekey-interval ssh user ssh2 ssh2 ipv6 ssl client-policy ssl server-policy startup bootrom-access enable startup saved-configuration state state state statistics hold-time statistics interval statistics max-group step (for IPv4) step (for IPv6) stop-accounting-buffer enable (HWTACACS scheme view) stop-accounting-buffer enable (RADIUS scheme view) stopbits storm-constrain storm-constrain control storm-constrain enable log storm-constrain enable trap

06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 08-System Volume 06-Security Volume 06-Security Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 06-Security Volume 06-Security Volume 06-Security Volume

10-10 10-11 10-12 10-3 10-4 10-5 10-5 10-6 10-7 10-12 10-14 12-8 12-9 4-31 5-29 1-30 2-22 11-25 18-32 18-34 18-33 14-19 14-31 3-14

06-Security Volume

2-23

08-System Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume

1-20 1-31 1-32 1-33 1-34

A-38

storm-constrain interval stp bpdu-protection stp bridge-diameter stp compliance stp config-digest-snooping stp cost stp edged-port stp enable stp loop-protection stp max-hops stp mcheck stp mode stp no-agreement-check stp pathcost-standard stp point-to-point stp port priority stp port-log stp priority stp region-configuration stp root primary stp root secondary stp root-protection stp tc-protection stp tc-protection threshold stp timer forward-delay stp timer hello stp timer max-age stp timer-factor stp transmit-limit subvlan (IPv6 multicast VLAN view) subvlan (multicast VLAN view)

01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 04-IP Multicast Volume 04-IP Multicast Volume

1-34 3-17 3-18 3-19 3-19 3-20 3-21 3-22 3-23 3-24 3-25 3-25 3-26 3-27 3-28 3-29 3-30 3-31 3-32 3-32 3-33 3-34 3-34 3-35 3-36 3-37 3-38 3-38 3-39 4-4 2-4

A-39

super super password sysname sysname system-failure system-view

08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume

3-21 3-22 1-21 3-23 4-32 3-24

Ttcp ipv6 timer fin-timeout tcp ipv6 timer syn-timeout tcp ipv6 window tcp timer fin-timeout tcp timer syn-timeout tcp window telnet telnet client source telnet ipv6 telnet server enable terminal debugging terminal logging terminal monitor terminal trapping terminal type tftp tftp client source tftp ipv6 tftp-server tftp-server acl timer timer timer quiet (HWTACACS scheme view) timer quiet (RADIUS scheme view) 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 07-High Availability Volume 08-System Volume 06-Security Volume 06-Security VolumeA-40

12-42 12-43 12-43 10-18 10-19 10-20 1-22 1-24 1-23 1-24 16-22 16-23 16-24 16-25 1-25 7-2 7-4 7-5 20-45 7-1 3-17 20-45 3-15 2-24

timer realtime-accounting (HWTACACS scheme view) timer realtime-accounting (RADIUS scheme view) timer response-timeout (HWTACACS scheme view) timer response-timeout (RADIUS scheme view) time-range topology accept topology restore-from topology save-to tos tracert tracert ipv6 track nqa traffic behavior traffic classifier ttl type

06-Security Volume

3-15

06-Security Volume

2-24

06-Security Volume

3-16

06-Security Volume 06-Security Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 08-System Volume 07-High Availability Volume 05-QoS Volume 05-QoS Volume 08-System Volume 08-System Volume

2-25 14-3 20-46 20-47 20-47 18-35 15-6 15-7 7-2 1-14 1-5 18-35 18-36

Uudp-helper enable udp-helper port udp-helper server undelete unicast-suppression url user user privilege level user-bind user-group user-interface username (FTP test type view) 02-IP Services Volume 02-IP Services Volume 02-IP Services Volume 08-System Volume 01-Access Volume 08-System Volume 08-System Volume 08-System Volume 06-Security Volume 06-Security Volume 08-System Volume 08-System VolumeA-41

11-2 11-2 11-3 5-14 1-35 18-37 6-27 1-26 9-4 1-31 1-26 18-37

user-name-format (HWTACACS scheme view) user-name-format (RADIUS scheme view) user-profile user-profile enable

06-Security Volume 06-Security Volume 05-QoS Volume 05-QoS Volume

3-17 2-26 6-2 6-2

Vverbose version virtual-cable-test vlan vlan precedence vlan-mapping modulo voice vlan aging voice vlan enable voice vlan mac-address voice vlan mode auto voice vlan security enable vpn-instance (ICMP echo test type view) 08-System Volume 06-Security Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 01-Access Volume 08-System Volume 6-28 12-9 1-37 5-7 5-21 3-40 7-3 7-4 7-4 7-6 7-6 18-38

W X Y Z

A-42

Table of Contents1 Ethernet Port Configuration Commands1-1 Ethernet Port Configuration Commands 1-1 broadcast-suppression 1-1 description 1-2 display brief interface1-3 display interface1-6 display loopback-detection 1-10 display packet-drop interface 1-11 display packet-drop summary 1-11 display port combo 1-12 display port-group manual 1-13 display storm-constrain1-14 duplex 1-15 flow-control 1-16 flow-interval 1-17 group-member 1-17 interface1-18 jumboframe enable1-18 link-delay 1-19 loopback 1-20 loopback-detection control enable1-21 loopback-detection enable 1-21 loopback-detection interval-time1-22 loopback-detection per-vlan enable 1-23 mdi 1-24 multicast-suppression1-25 port-group manual 1-26 reset counters interface 1-27 reset packet-drop interface1-27 shutdown 1-28 speed 1-29 speed auto1-30 storm-constrain1-31 storm-constrain control 1-32 storm-constrain enable log 1-33 storm-constrain enable trap1-34 storm-constrain interval 1-34 unicast-suppression1-35 virtual-cable-test 1-37 1 Link Aggregation Configuration Commands1-1 Link Aggregation Configuration Commands 1-1 description 1-1 display lacp system-id 1-2i

display link-aggregation load-sharing mode1-2 display link-aggregation member-port 1-4 display link-aggregation summary1-6 display link-aggregation verbose1-8 enable snmp trap updown 1-10 interface bridge-aggregation 1-10 lacp port-priority1-11 lacp system-priority1-12 link-aggregation load-sharing mode (system view)1-12 link-aggregation load-sharing mode (aggregate interface view) 1-13 link-aggregation mode 1-14 port link-aggregation group 1-15 reset counters interface 1-16 reset lacp statistics 1-16 shutdown 1-17 2 Port Isolation Configuration Commands 2-1 Port Isolation Configuration Commands 2-1 display port-isolate group 2-1 port-isolate enable 2-2 3 MSTP Configuration Commands 3-1 MSTP Configuration Commands 3-1 active region-configuration 3-1 bpdu-drop any 3-2 check region-configuration 3-2 display stp3-3 display stp abnormal-port 3-8 display stp down-port3-9 display stp history 3-10 display stp region-configuration3-11 display stp root 3-12 display stp tc3-13 instance 3-14 region-name 3-15 reset stp3-16 revision-level3-16 stp bpdu-protection3-17 stp bridge-diameter3-18 stp compliance3-19 stp config-digest-snooping 3-19 stp cost 3-20 stp edged-port 3-21 stp enable 3-22 stp loop-protection 3-23 stp max-hops 3-24 stp mcheck 3-25 stp mode3-25 stp no-agreement-check3-26ii

stp pathcost-standard 3-27 stp point-to-point3-28 stp port priority3-29 stp port-log3-30 stp priority 3-31 stp region-configuration 3-32 stp root primary3-32 stp root secondary 3-33 stp root-protection3-34 stp tc-protection 3-34 stp tc-protection threshold 3-35 stp timer forward-delay 3-36 stp timer hello 3-37 stp timer max-age3-38 stp timer-factor3-38 stp transmit-limit 3-39 vlan-mapping modulo 3-40 4 LLDP Configuration Commands 4-1 LLDP Configuration Commands 4-1 display lldp local-information 4-1 display lldp neighbor-information4-5 display lldp statistics 4-11 display lldp status 4-12 display lldp tlv-config 4-14 lldp admin-status 4-16 lldp check-change-interval4-16 lldp compliance admin-status cdp 4-17 lldp compliance cdp 4-18 lldp enable 4-18 lldp encapsulation snap 4-19 lldp fast-count 4-20 lldp hold-multiplier4-20 lldp management-address-format string4-21 lldp management-address-tlv 4-22 lldp notification remote-change enable4-22 lldp timer notification-interval4-23 lldp timer reinit-delay 4-24 lldp timer tx-delay 4-24 lldp timer tx-interval 4-25 lldp tlv-enable 4-25 5 VLAN Configuration Commands5-1 VLAN Configuration Commands5-1 description 5-1 display interface vlan-interface5-2 display vlan5-3 interface vlan-interface 5-4 ip address 5-5iii

name5-6 shutdown 5-7 vlan 5-7 Port-Based VLAN Configuration Commands5-9 display port 5-9 port5-10 port access vlan5-10 port hybrid pvid vlan 5-11 port hybrid vlan 5-12 port link-type 5-14 port trunk permit vlan5-15 port trunk pvid vlan 5-17 MAC Address-Based VLAN Configuration Commands 5-18 display mac-vlan5-18 display mac-vlan interface5-19 mac-vlan enable 5-20 mac-vlan mac-address 5-20 vlan precedence 5-21 Protocol-Based VLAN Configuration Commands 5-22 display protocol-vlan interface5-22 display protocol-vlan vlan 5-23 port hybrid protocol-vlan 5-24 protocol-vlan 5-25 IP Subnet-Based VLAN Configuration Commands 5-27 display ip-subnet-vlan interface5-27 display ip-subnet-vlan vlan 5-28 ip-subnet-vlan 5-29 port hybrid ip-subnet-vlan vlan 5-30 6 Isolate-User-VLAN Configuration Commands6-1 Isolate-User-VLAN Configuration Commands 6-1 display isolate-user-vlan 6-1 isolate-user-vlan 6-2 isolate-user-vlan enable 6-4 7 Voice VLAN Configuration Commands 7-1 Voice VLAN Configuration Commands7-1 display voice vlan oui7-1 display voice vlan state7-2 voice vlan aging7-3 voice vlan enable7-4 voice vlan mac-address7-4 voice vlan mode auto7-6 voice vlan security enable 7-6 8 GVRP Configuration Commands 8-1 GVRP Configuration Commands 8-1 display garp statistics 8-1 display garp timer 8-2 display gvrp local-vlan interface 8-3iv

display gvrp state8-3 display gvrp statistics8-4 display gvrp status8-5 display gvrp vlan-operation interface8-5 garp timer hold8-6 garp timer join8-6 garp timer leave8-7 garp timer leaveall 8-8 gvrp8-9 gvrp registration8-9 reset garp statistics8-10 9 QinQ Configuration Commands9-1 QinQ Configuration Commands9-1 nest 9-1 raw-vlan-id inbound 9-2 qinq enable 9-3 qinq ethernet-type9-4 qinq vid 9-5 10 BPDU Tunneling Configuration Commands10-1 BPDU Tunneling Configuration Commands 10-1 bpdu-tunnel dot1q10-1 bpdu-tunnel tunnel-dmac10-2 11 Port Mirroring Configuration Commands 11-1 Port Mirroring Configuration Commands 11-1 display mirroring-group11-1 mirroring-group 11-2 mirroring-group mirroring-port 11-3 mirroring-group monitor-egress11-4 mirroring-group monitor-port 11-5 mirroring-group remote-probe vlan11-6 mirroring-port 11-7 monitor-port 11-8

v

1Syntax

Ethernet Port Configuration Commands

Ethernet Port Configuration Commandsbroadcast-suppression

broadcast-suppression { ratio | pps max-pps } undo broadcast-suppression View Ethernet port view, port group view Default Level 2: System level Parameters ratio: Maximum percentage of broadcast traffic to the total transmission capability of an Ethernet port. The smaller the ratio, the less broadcast traffic is allowed to pass through the interface. this argument ranges from 1 to 100. pps max-pps: Specifies the maximum number of broadcast packets that can be forwarded on an Ethernet port per second (in pps, representing packets per second). For a Gigabit port, the value range is 1 to 1488100. For a 10-Gigabit port, the value range is 1 to 14881000. Note that: When a suppression granularity larger than 1 is specified on the device, the value of the pps keyword should be no smaller than and an integral multiple of the granularity. The broadcast suppression threshold value configured through this keyword on an Ethernet port may not be the one that actually takes effect. To display the actual broadcast suppression threshold value on an Ethernet port, you can use the display interface command. When no suppression granularity is specified or the suppression granularity is set to 1, the value of the pps keyword should be no smaller than 1, and the broadcast suppression threshold value is the one that actually takes effect on the Ethernet port. Description Use the broadcast-suppression command to set a broadcast traffic threshold on one or multiple Ethernet ports. Use the undo broadcast-suppression command to restore the default. By default, all broadcast traffic is allowed to pass through an Ethernet port, that is, broadcast traffic is not suppressed.

1-1

If you execute this command in Ethernet port view, the configuration takes effect only on the current interface. If you execute this command in port-group view, the configuration takes effect on all the ports in the port group. When broadcast traffic exceeds the broadcast traffic threshold, the system begins to discard broadcast packets until the broadcast traffic drops below the threshold to ensure operation of network services.

If you set different suppression ratios in Ethernet port view or port-group view for multiple times, the latest configuration takes effect. Do not use the broadcast-suppression command along with the storm-constrain command. Otherwise, the broadcast storm suppression ratio configured may get invalid.

Examples # For Ethernet port GigabitEthernet 1/0/1, allow broadcast traffic equivalent to 20% of the total transmission capability of GigabitEthernet 1/0/1 to pass. system-view [Sysname] interface GigabitEthernet 1/0/1 [Sysname-GigabitEthernet1/0/1] broadcast-suppression 20

# For all the ports of the manual port group named group1, allow broadcast traffic equivalent to 20% of the total transmission capability of each port to pass and suppress excessive broadcast packets. system-view [Sysname] port-group manual group1 [Sysname-port-group-manual-group1] group-member GigabitEthernet 1/0/2 [Sysname-port-group-manual-group1] group-member GigabitEthernet 1/0/3 [Sysname-port-group-manual-group1] broadcast-suppression 20

descriptionSyntax description text undo description View Ethernet port view Default Level 2: System level Parameters text: Description of an Ethernet port, a string of 1 to 80 characters. Currently, the device supports the following types of characters or symbols: standard English characters (numbers and case-sensitive

1-2

letters), special English characters, spaces, and other characters or symbols that conform to the Unicode standard.

A port description can be the mixture of English characters and other Unicode characters. The mixed description cannot exceed the specified length. To use a type of Unicode characters or symbols in a port description, you need to install the corresponding Input Method Editor (IME) and log in to the device through remote login software that supports this character type. Each Unicode character or symbol (non-English characters) takes the space of two regular characters. When the length of a description string reaches or exceeds the maximum line width on the terminal software, the software starts a new line, possibly breaking a Unicode character into two. As a result, garbled characters may be displayed at the end of a line.

Description Use the description command to set the description string of the current interface. Use the undo description command to restore the default. By default, the description of an interface is the interface name followed by the interface string, GigabitEthernet1/0/1 Interface for example. Related commands: display interface. Examples # Configure the description string of interface GigabitEthernet 1/0/1 as lanswitch-interface. system-view [Sysname] interface GigabitEthernet 1/0/1 [Sysname-GigabitEthernet1/0/1] description lanswitch-interface

display brief interfaceSyntax display brief interface [ interface-type [ interface-number ] ] [ | { begin | exclude | include } regular-expression ] View Any view Default Level 1: Monitor level Parameters interface-type: Type of a specified interface. interface-number: Number of a specified interface.1-3

|: Uses a regular expression to filter output information. For detailed description on regular expression, refer to Basic System Configuration in the System Volume. begin: Displays the line that matches the regular expression and all the subsequent lines. exclude: Displays the lines that do not match the regular expression. include: Displays the lines that match the regular expression. regular-expression: Regular expression, a string of 1 to 256 characters. Note that this argument is case-sensitive. Description Use the display brief interface command to display brief interface information. If neither interface type nor interface number is specified, all interface information will be displayed. If only interface type is specified, then only information of this particular type of interface will be displayed. If both interface type and interface number are specified, then only information of the specified interface will be displayed. Related commands: interface. Examples # Display the brief information of interfaces. display brief interface The brief information of interface(s) under route mode: Interface Loop1 NULL0 Vlan1 Vlan10 Vlan100 Link UP UP UP DOWN Protocol-link Protocol type UP(spoofing) UP(spoofing) UP DOWN LOOP NULL ETHERNET ETHERNET ETHERNET Main IP 2.2.2.1 -192.168.0.153 1.1.1.1 --

ADM DOWN DOWN

The brief information of interface(s) under bridge mode: Interface BAGG1 GE1/0/1 GE1/0/2 GE1/0/3 GE1/0/4 GE1/0/5 GE1/0/6 GE1/0/7 GE1/0/8 GE1/0/9 GE1/0/10 GE1/0/11 GE1/0/12 Link DOWN DOWN DOWN DOWN UP DOWN DOWN DOWN DOWN DOWN DOWN DOWN DOWN Speed auto auto auto auto 1G(a) auto auto auto auto auto auto auto auto Duplex auto auto auto auto Link-type PVID access access access access 1 1 1 1 1 1 1 1 1 1 1 1 1

full(a) access auto auto auto auto auto auto auto auto access access access access access access trunk trunk

# Display the information of interfaces beginning with the string spoof. display brief interface | begin spoof

1-4

The brief information of interface(s) under route mode: Interface Loop0 NULL0 Vlan999 Link UP UP UP Protocol-link Protocol type UP(spoofing) UP(spoofing) UP LOOP NULL ETHERNET Main IP 5.5.5.5 -10.1.1.1

# Display the brief information of all UP interfaces. display brief interface | include UP The brief information of interface(s) under route mode: Interface Loop0 NULL0 Vlan999 Link UP UP UP Protocol-link Protocol type UP(spoofing) UP(spoofing) UP LOOP NULL ETHERNET Main IP 5.5.5.5 -10.1.1.1

The brief information of interface(s) under bridge mode: Interface GE1/0/7 GE1/0/9 Link UP UP Speed 100M(a) 100M(a) Duplex Link-type PVID 303 999

full(a) trunk full(a) access

# Display the brief information of all interfaces excluding Ethernet ports. display brief interface | exclude GE The brief information of interface(s) under route mode: Interface Loop1 NULL0 Vlan1 Vlan10 Vlan100 Link UP UP UP DOWN Protocol-link Protocol type UP(spoofing) UP(spoofing) UP DOWN LOOP NULL ETHERNET ETHERNET ETHERNET Main IP 2.2.2.1 -192.168.0.153 1.1.1.1 --

ADM DOWN DOWN

The brief information of interface(s) under bridge mode: Interface BAGG1 Link DOWN Speed auto Duplex auto Link-type PVID access 1

Table 1-1 display brief interface command output description Field The brief information of interface(s) under route mode: Interface Link Protocol-link Protocol type The brief information of interface(s) under bridge mode: Speed Description Brief information of interface(s) in route mode Abbreviated interface name Interface physical link state, which can be up or down Interface protocol link state, which can be up or down Interface protocol type Brief information of interface(s) in bridge mode Interface rate, in bps

1-5

Field Duplex PVID

Description Duplex mode, which can be half (half duplex), full (full duplex), or auto (auto-negotiation). Default VLAN ID

display interfaceSyntax display interface [ interface-type [ interface-number ] ] View Any view Default Level 1: Monitor level Parameters interface-type: Type of a specified interface. interface-number: Number of a specified interface. Description Use the display interface command to display the current state of a specified interface and related information. If neither interface type nor interface number is specified, all interface information will be displayed. If only interface type is specified, then only information of this particular type of interface will be displayed. If both interface type and interface number are specified, then only information of the specified interface will be displayed. Related commands: interface. Examples # Display the current state of interface GigabitEthernet 1/0/1 and related information. display interface GigabitEthernet 1/0/1 GigabitEthernet1/0/1 current state: DOWN IP Packet Frame Type: PKTFMT_ETHNT_2, Hardware Address: 000f-e200-8048 Description: GigabitEthernet1/0/1 Interface Loopback is not set Media type is twisted pair, port hardware type is 100_BASE_TX Unknown-speed mode, unknown-duplex mode Link speed type is autonegotiation, link duplex type is autonegotiation Flow-control is not enabled The Maximum Frame Length is 9216 Broadcast MAX-ratio: 100% Unicast MAX-ratio: 100%

1-6

Multicast MAX-ratio: 100% Allow jumbo frame to pass PVID: 100 Mdi type: auto Link delay is 0(sec) Port link-type: access Tagged VLAN ID : none

Untagged VLAN ID : 100 Port priority: 0 Peak value of input: 96132560 bytes/sec, at 2007-10-26 07:05:06 Peak value of output: 0 bytes/sec, at 2000-04-26 12:00:12 Last 300 seconds input: 6 packets/sec 678 bytes/sec Last 300 seconds output: 1 packets/sec 179 bytes/sec Input (total): 61745144 packets, 12152212250 bytes 0 unicasts, 47519150 broadcasts, 12121681 multicasts Input (normal): 61745144 packets, - bytes 205227373 unicasts, 47519150 broadcasts, 12121681 multicasts Input: 0 input errors, 0 runts, 0 giants, 0 throttles 0 CRC, 0 frame, - overruns, 0 aborts - ignored, - parity errors Output (total): 1395522 packets, 183608303 bytes 0 unicasts, 13 broadcasts, 1273860 multicasts, 0 pauses Output (normal): 1395522 packets, - bytes 0 unicasts, 13 broadcasts, 1273860 multicasts, 0 pauses Output: 0 output errors, - underruns, - buffer failures 0 aborts, 0 deferred, 0 collisions, 0 late collisions 0 lost carrier, - no carrier 20% 17%

Table 1-2 display interface command output description Field GigabitEthernet1/0/1 current state IP Packet Frame Type Description Unknown-speed mode unknown-duplex mode The Maximum Frame Length Broadcast MAX-ratio Description Current physical link state of the Ethernet port Frame type of the Ethernet port Description of the interface Unknown-speed mode, in which mode speed is negotiated between the current host and the peer. Unknown-duplex mode, in which mode speed is negotiated between the current host and the peer. The maximum frame length allowed on an interface Broadcast storm suppression ratio (the maximum ratio of allowed number of broadcast packets to overall traffic through an interface) Unicast storm suppression ratio (the maximum ratio of allowed number of unknown unicast packets to overall traffic over an interface)

Unicast MAX-ratio

1-7

Field Multicast MAX-ratio PVID Mdi type Link delay Port link-type Tagged VLAN ID

Description Multicast storm suppression ratio (the maximum ratio of allowed number of multicast packets to overall traffic through an interface) Default VLAN ID Cable type The suppression time of physical-link-state changes Interface link type, which could be access, trunk, and hybrid. VLANs whose packets are sent through the port with VLAN tag kept VLANs whose packets are sent through the port with VLAN tag stripped off Peak value of inbound traffic, in bytes/sec. Peak value of outbound traffic, in bytes/sec.

Untagged VLAN ID Peak value of input Peak value of output Last 300 seconds input: 0 packets/sec 0 bytes/sec Last 300 seconds output: 0 packets/sec 0 bytes/sec Input (total): 61745144 packets, 12152212250 bytes 0 unicasts, 47519150 broadcasts, 12121681 multicasts Input (normal): 61745144 packets, - bytes 205227373 unicasts, 47519150 broadcasts, 12121681 multicasts input errors runts

Average rate of input and output traffic in the last 300 seconds, in pps and Bps Packet statistics on the inbound direction of the interface, including the statistics of normal packets,and abnormal packets, in packets and bytes Number of unicast packets, broadcast packets, and multicast packets on the inbound direction of the interface Normal packet statistics on the inbound direction of the interface, including the statistics of normal packets in packets and bytes Number of unicast packets, broadcast packets, and multicast packets on the inbound direction of the interface. Input packets with errors Frames received that were shorter than 64 bytes, yet in correct formats, and contained valid CRCs Frames received that were longer than the maximum frame length supported on the interface:

giants

For an Ethernet interface that permits jumbo frames, giants refer to frames that are longer than 9212 bytes (without VLAN tags) or 9216 bytes (with VLAN tags). For an Ethernet interface that forbids jumbo frames, giants refer to frames that are longer than 1522 bytes (without VLAN tags) or 1526 bytes (with VLAN tags) The number of times the receiver on the interface was disabled, possibly because of buffer or CPU overload Total number of packets received that had a normal length, but contained checksum errors Total number of frames that contained checksum errors and a non-integer number of bytes Number of times the receive rate of the interface exceeded the capacity of the input queue, causing packets to be discarded

throttles CRC frame - overruns

1-8

Field

Description Total number of illegal packets received, including: Fragment frames: Frames that were shorter than 64 bytes (with an integral or non-integral length) and contained checksum errors Jabber frames: Frames that were longer than the maximum frame length supported on the Ethernet interface and contained checksum errors (the frame lengths in bytes may or may not be integers). For an Ethernet interface that permits jumbo frames, jabber frames refer to frames that are longer than 9212 bytes (without VLAN tags) or 9216 bytes (with VLAN tags) and contain checksum errors; for an Ethernet interface that forbids jumbo frames, jabber frames refer to frames that are longer than 1522 bytes (without VLAN tags) or 1526 bytes (with VLAN tags) and contain checksum errors. Symbol error frames: Frames that contained at least one undefined symbol Unknown operation code frames: Frames that were MAC control frames but not pause frames Length error frames: Frames whose 802.3 length fields did not match the actual frame lengths (46 bytes to 1500 bytes) Number of received packets ignored by the interface because the interface hardware ran low on internal buffers Total number of frames with parity errors Packet statistics on the outbound direction of the interface, including the statistics of normal packets, abnormal packets, and normal pause frames, in packets and bytes Number of unicast packets, broadcast packets, multicast packets, and pause frames on the outbound direction of the interface Normal packet statistics on the outbound direction of the interface, including the statistics of normal packets and pause frames, in packets and bytes Number of unicast packets, broadcast packets, multicast packets, and pause frames on the outbound direction of the interface. Output packets with errors Number of times the transmit rate of the interface exceeded the capacity of the output queue, causing packets to be discarded. This is a very rare hardware-related problem. Number of packets dropped because the interface ran low on output buffers Number of packets that failed to be transmitted due to causes such as Ethernet collisions Number of frames whose first transmission attempt was delayed, due to traffic on the network media, and that were successfully transmitted later Number of times frames were delayed due to Ethernet collisions detected during the transmission Number of times frames were delayed due to the detection of collisions after the first 512 bits of the frames were already on the network

aborts

- ignored - parity errors Output (total): 1395522 packets, 183608303 bytes 0 unicasts, 13 broadcasts, 1273860 multicasts, 0 pauses Output (normal): 1395522 packets, - bytes 0 unicasts, 13 broadcasts, 1273860 multicasts, 0 pauses output errors - underruns

- buffer failures aborts

deferred

collisions

late collisions

1-9

Field lost carrier - no carrier

Description Number of times the carrier was lost during transmission. This counter applies to serial WAN interfaces. Number of times the carrier was not present in the transmission. This counter applies to serial WAN interfaces.

- indicates that the corresponding entry is not supported.

display loopback-detectionSyntax display loopback-detection View Any view Default Level 1